<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic WLC Deauthentication flood attack in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wlc-deauthentication-flood-attack/m-p/2475153#M6710</link>
    <description>&lt;P&gt;I would like to know what actions can take a Wireless Lan Controller when one of the register Access Points receives an Authentication, Deauthentication or a Disassociation Flood Attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also i would like to know what can be the best practices to mitigate these attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot.&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jul 2021 07:12:43 GMT</pubDate>
    <dc:creator>Diego Prada</dc:creator>
    <dc:date>2021-07-05T07:12:43Z</dc:date>
    <item>
      <title>WLC Deauthentication flood attack</title>
      <link>https://community.cisco.com/t5/wireless/wlc-deauthentication-flood-attack/m-p/2475153#M6710</link>
      <description>&lt;P&gt;I would like to know what actions can take a Wireless Lan Controller when one of the register Access Points receives an Authentication, Deauthentication or a Disassociation Flood Attack.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also i would like to know what can be the best practices to mitigate these attacks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 07:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-deauthentication-flood-attack/m-p/2475153#M6710</guid>
      <dc:creator>Diego Prada</dc:creator>
      <dc:date>2021-07-05T07:12:43Z</dc:date>
    </item>
    <item>
      <title>WLC Deauthentication flood attack</title>
      <link>https://community.cisco.com/t5/wireless/wlc-deauthentication-flood-attack/m-p/2475154#M6711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Refer you to Rogue Management, Attack Detection and Threat Mitigation document.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-21899"&gt;https://supportforums.cisco.com/docs/DOC-21899&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Feb 2014 09:43:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-deauthentication-flood-attack/m-p/2475154#M6711</guid>
      <dc:creator>Naveen Kumar</dc:creator>
      <dc:date>2014-02-26T09:43:39Z</dc:date>
    </item>
    <item>
      <title>WLC Deauthentication flood attack</title>
      <link>https://community.cisco.com/t5/wireless/wlc-deauthentication-flood-attack/m-p/2475155#M6712</link>
      <description>&lt;P&gt;The most important thing is to locate the attacker and isolate it.&lt;/P&gt;&lt;P&gt;The attack can be intentional (by an attacker) or unintentional (by problematic WLAN driver or by neighbor rogue WLAN system).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By finding the attack source you decide what will you do:&lt;/P&gt;&lt;P&gt;- if problematic driver fix it or otherwise isolate it.&lt;/P&gt;&lt;P&gt;- if neighbor rogue WLANs contact their admin and ask them to add your WLAN as friendly one.&lt;/P&gt;&lt;P&gt;- if an attacker you decide what you will do. You may call 911&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To help locating the attack sources, Cisco provides Mobility Service Engine (MSE):&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/c/en/us/products/wireless/mobility-services-engine/index.html"&gt;http://www.cisco.com/c/en/us/products/wireless/mobility-services-engine/index.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this is useful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Amjad&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: blue;"&gt;Rating useful replies is more useful than saying &lt;SPAN style="color: green;"&gt; "&lt;SPAN style="text-decoration: underline;"&gt;Thank you&lt;/SPAN&gt;"&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Mar 2015 11:47:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-deauthentication-flood-attack/m-p/2475155#M6712</guid>
      <dc:creator>Amjad Abdullah</dc:creator>
      <dc:date>2015-03-07T11:47:23Z</dc:date>
    </item>
  </channel>
</rss>

