<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic WLC &amp;quot;rogue containment&amp;quot; - What does it actually do? in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012588#M9766</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have read the part of the WLC config guide about rogue containment, but what does it actually do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It says it sends deauth and deassoc frames to clients of rougue access points.  This to me actually seems like we are performing a DOS on another neighbors WLAN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone confirm what it actually does in detail?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it send deauth messages to a "neighbors APs clients" dis-authenticating it from the "neighbors AP", thus causes the client to lose his own connection to his legitimate AP, or does it send de-auths that say,  just dont come near my AP (on my network) ????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the frequency of packets that get sent to the neighboring APs clients?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it send these frames to a broadcast or unicast MAC?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it send these frames to other neighbor rougue APs or just clients?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any legal ramifications of doing this, ie, can you be prosecuted?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this the only containment method that Cisco Support?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And, any other info/documentation that anyone may have on this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thx indeed, for all the kind help so far :))&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ken&lt;/P&gt;</description>
    <pubDate>Sat, 03 Jul 2021 22:50:11 GMT</pubDate>
    <dc:creator>kfarrington</dc:creator>
    <dc:date>2021-07-03T22:50:11Z</dc:date>
    <item>
      <title>WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012588#M9766</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have read the part of the WLC config guide about rogue containment, but what does it actually do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It says it sends deauth and deassoc frames to clients of rougue access points.  This to me actually seems like we are performing a DOS on another neighbors WLAN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone confirm what it actually does in detail?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it send deauth messages to a "neighbors APs clients" dis-authenticating it from the "neighbors AP", thus causes the client to lose his own connection to his legitimate AP, or does it send de-auths that say,  just dont come near my AP (on my network) ????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the frequency of packets that get sent to the neighboring APs clients?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it send these frames to a broadcast or unicast MAC?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it send these frames to other neighbor rougue APs or just clients?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any legal ramifications of doing this, ie, can you be prosecuted?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this the only containment method that Cisco Support?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And, any other info/documentation that anyone may have on this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thx indeed, for all the kind help so far :))&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ken&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jul 2021 22:50:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012588#M9766</guid>
      <dc:creator>kfarrington</dc:creator>
      <dc:date>2021-07-03T22:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012589#M9767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A lot of good questions, some of which may require the use of a sniffer to answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some good info though,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a0080722d8c.shtml#Determination" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a0080722d8c.shtml#Determination&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been lazy and just pointing at urls, but, hey, an answer is an answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rogue Location Discovery Protocol (RLDP)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RLDP is an active approach, which is used when rogue AP has no authentication (Open Authentication) configured. This mode, which is disabled by default, instructs an AP to move to the rogue channel and connect to the rogue as a client. The AP then tries to obtain an IP address and forward a User Datagram Protocol (UDP) packet (port 6352) that contains the local AP and rogue connection information to the controller through the rogue AP. If the controller receives this packet, the alarm is set to notify the network administrator that a rogue AP was discovered on the wired network with the RLDP feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: Use the debug dot11 rldp enable command in order to check if the Lightweight AP associates and receives a DHCP address from the rogue AP. This command also displays the UDP packet sent by the Lightweight AP to the controller.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A sample of a UDP (destination port 6352) packet sent by the Lightweight AP is shown here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;0020 0a 01 01 0d 0a 01 .......(.*...... 0030 01 1e 00 07 85 92 78 01 00 00 00 00 00 00 00 00 ......x......... 0040 00 00 00 00 00 00 00 00 00 00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first 5 bytes of the data contain the DHCP address given to the local mode AP by the rogue AP. The next 5 bytes are the IP address of the controller, followed by 6 bytes that represent the rogue AP MAC address. Then, there are 18 bytes of zeros.&lt;/P&gt;&lt;P&gt;Passive Operation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This approach is used when rogue AP has some form of authentication, either WEP or WPA. When a form of authentication is configured on rogue AP, the Lightweight AP cannot associate because it does not know the key configured on the rogue AP. The process begins with the controller when it passes on the list of rogue client MAC addresses to an AP that is configured as a rogue detector. The rogue detector scans all connected and configured subnets for ARP requests, and ARP searches for a matching Layer 2 address. If a match is discovered, the controller notifies the network administrator that a rogue is detected on the wired subnet.&lt;/P&gt;&lt;P&gt;Active Rogue Containment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once a rogue client is detected on the wired network, the network administrator is able to contain both the rogue AP and the rogue clients. This can be achieved because 802.11 de-authentication packets are sent to clients that are associated to rogue APs so that the threat that such a hole creates is mitigated. Each time there is an attempt to contain the rogue AP, nearly 15% of the Lightweight AP's resource is used. Therefore, it is suggested to physically locate and remove the rogue AP once it is contained.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe it only sends de-auths&lt;/P&gt;&lt;P&gt;The frequency should be the same as the one the rogue is detected on&lt;/P&gt;&lt;P&gt;I believe it is just to the clients&lt;/P&gt;&lt;P&gt;Yes, there are legal ramifcations for everything&lt;/P&gt;&lt;P&gt;It is the main type of "automatic" containment on the wireless. You could make use of manual forms of containment and/or prevention&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 May 2008 18:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012589#M9767</guid>
      <dc:creator>ericgarnel</dc:creator>
      <dc:date>2008-05-08T18:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012590#M9768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Eric is correct here. There is one other caveat to be considered. When containing either through RLDP or manually, the number of APs performing the containment make a significant difference in the effectiveness of the containment. A 4 AP containment sends deauths from 4 APs and mathematically insures that client will not attach to the rogue AP. Always remember the FCC good neighbor policy and be sure that the rogue is actually a threat to your network (hardwired to your network). All those rabid coffee drinkers at Starbucks would be pretty ticked off if you blocked their mrning emails with coffee.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 May 2008 21:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012590#M9768</guid>
      <dc:creator>dennischolmes</dc:creator>
      <dc:date>2008-05-08T21:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012591#M9769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thx guys,  that is much help :))&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 May 2008 11:31:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012591#M9769</guid>
      <dc:creator>kfarrington</dc:creator>
      <dc:date>2008-05-09T11:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012592#M9770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ken:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me share one other caveat which was a surprise when I learned about it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to Cisco TAC, containment is a tool for the PREVENTION of new associations of clients with rogue APs.  Clients that are ALREADY connected to the rogue AP will not be affected by containment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, unless there is a sufficient level of traffic between the associated client and the rogue AP, the wireless system will not be able to detect the presence of the client on the rogue AP.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore, just because the system says that a rogue AP has no clients attached to it - you can't accept that as absolutely true.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While containment will not force associated clients off of a rogue AP, it can still be a valuable tool to prevent future clients from attaching to rogue access points / adhocs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Please remember to rate helpful posts)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 May 2008 14:21:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012592#M9770</guid>
      <dc:creator>johnruffing</dc:creator>
      <dc:date>2008-05-13T14:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012593#M9771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Somebody at TAC is mistaken. Deauthentication packets are sent to the clients with the spoofed mac address of the rogue AP. I do this in the lab and on demos weekly. Get yourself a linksys, set a laptop to a constant ping on that linksys, and then contain it with 4 APS. You will clearly see the packets drop and until you stop the containment you will see no ping replies. Deauth packets are just that. They tell the client it has been deauthenticated. Containment has no other methodolgy to contain. Let me know the TAC Engineer's contact info please and I will clarify that with them.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 May 2008 21:57:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012593#M9771</guid>
      <dc:creator>dennischolmes</dc:creator>
      <dc:date>2008-05-13T21:57:52Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012594#M9772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all Again &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I have found myself a little linksys and put it in range of one of my LWAPs on my wireless network.  I will sniff this tomorrow as I have left my airmagnet at home, but can we clarify that this diagram is correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thx indeed,&lt;/P&gt;&lt;P&gt;Ken&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 May 2008 15:50:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012594#M9772</guid>
      <dc:creator>kfarrington</dc:creator>
      <dc:date>2008-05-14T15:50:07Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012595#M9773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your diagram looks correct... 2 tiny things to keep in mind:&lt;/P&gt;&lt;P&gt;1. Your client needs to be in range of your valid AP. You spoof the rogue AP's MAC, but of course your valid AP is at at different physical location. Sometimes if your AP is too far from the client, you hear the rogue, but the client doesn't hear your deauth...&lt;/P&gt;&lt;P&gt;2. You have to manually deauth, it's not automatic...&lt;/P&gt;&lt;P&gt;Have fun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jerome&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 May 2008 17:22:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012595#M9773</guid>
      <dc:creator>jeromehenry_2</dc:creator>
      <dc:date>2008-05-14T17:22:56Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012596#M9774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One other little tid bit I mentioned earlier. Do NOT contain local businesses that are not a direct threat to your network. This is a direct violation of the FCC good neighbor policy. When you send deauth packets all clients attached to the rogue get those and are dropped. Not just your clients. Contain with care my friend. If the local coffee shop is a problem then set your clients to only attach to a particular list of APs by mac address. This will keep them home where they need to stay and will not get the FCC and a bunch of lawyers on your case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 May 2008 21:13:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012596#M9774</guid>
      <dc:creator>dennischolmes</dc:creator>
      <dc:date>2008-05-14T21:13:06Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012597#M9775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks to both of you for your kind comments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "FCC good neighbor policy" for the USA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am looking on the &lt;A class="jive-link-custom" href="http://www.fcc.gov/telecom.html" target="_blank"&gt;http://www.fcc.gov/telecom.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But is very hard to find the document.  I assume this is just an advisory, and does anyone know of any such other policied in other regions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once again, many thx indeed for all the help thus far &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ken&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 May 2008 06:28:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012597#M9775</guid>
      <dc:creator>kfarrington</dc:creator>
      <dc:date>2008-05-15T06:28:19Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012598#M9776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jerome,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thx indeed.  That is most helpful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kindest regards,&lt;/P&gt;&lt;P&gt;Ken&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 May 2008 06:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012598#M9776</guid>
      <dc:creator>kfarrington</dc:creator>
      <dc:date>2008-05-15T06:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012599#M9777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey guys,  just tested this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does exacly what you guys say :))&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I just use no authentication (open network) it just drops a couple of packets here and there.  When I enable wpa2 on the linksys,  it eventually disconnects the connect client (about 3-5 minutes) and then the client cannot connect to the linksys anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cool stuff guys :)))))&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scary tho......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this sound about right to you guys as you are the subject experts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thx&lt;/P&gt;&lt;P&gt;Ken&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 May 2008 07:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012599#M9777</guid>
      <dc:creator>kfarrington</dc:creator>
      <dc:date>2008-05-15T07:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012600#M9778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correction:  When you enable WPA2,  it only takes about 30 seconds or less to disconnect the client after further tests.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All de-auth packets coming from the WLC (via the AP) have the spoofed mac address of the linksys :))&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;Ken&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 May 2008 08:26:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012600#M9778</guid>
      <dc:creator>kfarrington</dc:creator>
      <dc:date>2008-05-15T08:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012601#M9779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hihi, glad to see it works!&lt;/P&gt;&lt;P&gt;Usually, the stronger the encryption mechanism, the more often client renews its key, the easier the containment...&lt;/P&gt;&lt;P&gt;Each regulatory domain has different sets of rules, but most of them condemn blocking other people's network if they are legitimate networks... so yes, use with caution, only for direct threats...&lt;/P&gt;&lt;P&gt;With CCX5 and the Cisco MFP, Cisco clients in Cisco networks will be immune against this type of containment...&lt;/P&gt;&lt;P&gt;Jerome&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 May 2008 09:52:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012601#M9779</guid>
      <dc:creator>jeromehenry_2</dc:creator>
      <dc:date>2008-05-15T09:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012602#M9780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just an observation....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We see a lot of linksys wifi routers that exhibitors bring in for their booths during events at the convention center. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We will get a call on the radio that they are having trouble with their connection and sure enough, they have their wireless enabled on their router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The linksys router will bog down to a crawl and even become completely unresponsive from either the wireless or wired side.  &lt;/P&gt;&lt;P&gt;We have them turn off their wireless and the router is fine for the rest of the time. The more recent linksys routers seem to be affected more.  We will occasionally see other retail brands, but for the most part, the majority of wifi routers are linksys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do not make use of containment at it takes away from radio performance, but the default effect of our high density wireless upon linksys routers does help "contain" rogues!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 May 2008 12:01:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012602#M9780</guid>
      <dc:creator>ericgarnel</dc:creator>
      <dc:date>2008-05-15T12:01:00Z</dc:date>
    </item>
    <item>
      <title>Hi Eric,Sorry to wake this</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012603#M9781</link>
      <description>&lt;P&gt;Hi Eric,&lt;/P&gt;&lt;P&gt;Sorry to wake this thread after 7years. Im wondering "how do I stop a wireless containment war".&lt;/P&gt;&lt;P&gt;Imagine this scenario, company A has its client a and company B has client b, both companies sharing the same building. So coy A sends de-authenticate packets to B because it doesnt want its users to connect to B or it just does not tolerate other SSIDs in its environs.Coy B does the same thing. So both company ends up with non-working wireless.&lt;/P&gt;&lt;P&gt;Another situation is that a crazy staff brings in this smart device that can send de-auth packet to my company's AP.&lt;/P&gt;&lt;P&gt;Question is, does Cisco WLC have a feature to ensure that legitimate client stay connected irrespective of de-auth packet from another AP?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2015 16:57:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012603#M9781</guid>
      <dc:creator>ele203026</dc:creator>
      <dc:date>2015-08-27T16:57:55Z</dc:date>
    </item>
    <item>
      <title>Hi Elemzy, Few comments to</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012604#M9782</link>
      <description>&lt;P&gt;Hi Elemzy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Few comments to clarify the behavior:&lt;/P&gt;&lt;P&gt;- when you choose to contain a "rogue SSID", a message warns you that this could have legal consequences. What this means is that you do not have the right to contain a legitimate network. In the scenario you describe, both companies would be at fault, because each is trying to block a legitimate other network. Recent examples with various brands show that when the FCC is called for help for such illegal behavior, the fine can be expensive for the offender. Containment is solely for situations where the rogue is in your facility (and if you are not sure... well you should make sure before you contain :-)). Containment is not automatic, but a conscious admin choice.&lt;/P&gt;&lt;P&gt;- There are mechanisms (RLDP, rogue on wire) to help you decide if the rogue is on your network or not.&lt;/P&gt;&lt;P&gt;- There is no mechanism to resist a deauth (it is part of the protocol). However, there is a protocol called 802.11w (also known as PMF, for which Cisco has a more elaborate and older solution called MFP) that allows the AP and the clients to agree on a hash, and therefore ignore any external deauth message. This would effectively achieve the protection you describe.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hth&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jerome&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2015 22:36:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012604#M9782</guid>
      <dc:creator>Jerome Henry</dc:creator>
      <dc:date>2015-08-27T22:36:40Z</dc:date>
    </item>
    <item>
      <title>#802.11w/mfp doesn't work</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012605#M9783</link>
      <description>&lt;P&gt;#802.11w/mfp doesn't work with open/tkip/wep enabled wlan. It works only with WPA2-PSK or WPA2-802.1x. 802.11w supported from WLC code 7.4.&lt;BR /&gt;#Some clients doesn't honor Broadcast deauth and can be contained only using Unicast deauths &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;#Alternatively, attacker can spoof wireless client MAC and send de-auth attack to its connected AP &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;FCC fine on Rogue containment:-&lt;BR /&gt;http://www.cnn.com/2014/10/03/travel/marriott-fcc-wi-fi-fine/&lt;/P&gt;&lt;P&gt;It requires the WLAN environment ie., WLC code and wireless clients that supports 802.11w.&lt;BR /&gt;#client mfp support require ccxv5 certified clients.&lt;BR /&gt;#802.11w is supported by win 8 or higher only.&lt;BR /&gt;#Device Classification Guide - Look for 802.11w support&lt;BR /&gt;http://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-0/device_classification_guide.html&lt;/P&gt;&lt;P&gt;#Restrictions for 802.11w:-&lt;BR /&gt;http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_01010000.html#d62114e888a1635&lt;/P&gt;</description>
      <pubDate>Sun, 06 Sep 2015 08:12:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012605#M9783</guid>
      <dc:creator>Saravanan Lakshmanan</dc:creator>
      <dc:date>2015-09-06T08:12:19Z</dc:date>
    </item>
    <item>
      <title>Can you please help me on the</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012606#M9784</link>
      <description>&lt;P&gt;Can you please help me on the following case&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/users/engrsajidkhan&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2016 08:40:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/1012606#M9784</guid>
      <dc:creator>sajid gul</dc:creator>
      <dc:date>2016-10-05T08:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: WLC "rogue containment" - What does it actually do?</title>
      <link>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/5244443#M279556</link>
      <description>&lt;P&gt;If the Station is advertising Open - it's not for Business use AND IF say it is for Guests...then it's actually Public Access (service users) NOT Protected access as in for Rights/Enterprise use. Open SSIDS can easily be proper Rogue, this is a very easy tack for hackers. Rogues rightly should be shunned and any clients alerted/cast off - by a Protected Business System needing clean-air. As for legal rams - really?! There's a valid case for big data protecting itself and other users. Business class Controlled systems do this (RLDP) - by design, it's why they are the edge of the point! No finer tools imho.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2025 16:29:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wlc-quot-rogue-containment-quot-what-does-it-actually-do/m-p/5244443#M279556</guid>
      <dc:creator>Paul Davidson</dc:creator>
      <dc:date>2025-01-07T16:29:35Z</dc:date>
    </item>
  </channel>
</rss>

