Rogue Access Point (AP) detection is based on the detection of an unknown radio interface broadcasting over the air. When radio monitoring detects a rogue AP, a new fault is generated.
The dadio monitoring feature uses the radio measurement capabilities on Cisco IOS APs and Cisco Client Adapters to discover any new 802.11 APs that are transmitting beacons. Both clients and APs periodically scan for other 802.11 beacon frames on all channels. Reports of detected beacons are returned to the Radio Manager, which validates these beacons against a list of APs known to be authorized to provide wireless access. A newly discovered AP that cannot be identified as a known authorized AP generates an administrator alert. You can categorize this new AP as one of these AP types:
Access Point Category Types
An AP that is authorized to provide wireless access to the LAN and requires management services provided by the WLSE.
Note: Only managed APs can participate in Radio Manager operations.
An AP that is authorized to provide wireless access to the LAN but does not require any management services from the WLSE.
An AP that is not connected to the LAN, but is known to be detectable by the client's or the AP's 802.11 radios within the managed WLAN. A friendly AP is an AP that you know exists. For example, a neighboring network's AP or a neighboring company's AP.
An AP that may or may not be connected to the LAN is detected by the client's or the AP's 802.11 radios within the managed WLAN, and has not been identified as Friendly, Unmanaged, or Managed. By default, all unknown radios are classified as Rogue until you change them to Friendly, Unmanaged, or Managed.
Use the fields in this table to change the classification of an AP from Rogue to Friendly or to delete the rogue AP from the database.
Rogue Access Point Details Table
Basic Service Set ( BSS) identifier.
The state of the device.
The name of the vendor that manufactured this AP.
Change To Friendly AP
To add this AP to the list of recognized APs, click Change To Friendly AP. Then refresh your browser window to view the updated fault display.
Note: It may be a few seconds before the classification is changed.
To delete this unknown AP, click Delete. Then refresh your browser window to view the updated fault display.
Note: It may be a few seconds before the rogue AP is deleted.
Hi all, I have an issue that I am trying to resolve. I have a Nexus 7k and I am trying to build an EEM script to send a syslog message to a syslog server when an IP SLA track goes down. I can verify through show event manager events action-log t...
I have a 3850 acting as a layer 2 switch with a brand new IP phone connected to it. The L2 3850 is connected via ethernet to another 3850 which is acting as our layer 3 gateway. Both of these devices can ping the phone and the DCHP server does see the pho...
Hi Guys, I am new to networking. I am studying from last two weeks about networking. I tried everywhere, but I am confused with IP addressing. Please check the below examples and suggest the correct answer. Sorry if you find this stupid:). 1) Network...
Hi community I am planning out a new network and have before just used a single router as a solution but I need some redundancy. So I'd like to setup two ASR 1001-X routers. I have an ASN and IP block assigned to me. I am peering with one ...
Good morning,I've an IE-3300 series hardened network switch we are using in an unconfigured state currently to create a temporary LAN for our controls system. After a shutdown, we powered the switch back up, and didn't have any link or connectivity ...