cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
13315
Views
24
Helpful
0
Comments
Vinay Sharma
Level 7
Level 7

 

 

Introduction

 

 

Rogue Management, Attack Detection and Threat Mitigation

 

 

WLAN Security - Vulnerabilities and Threats

 

 

 

1.jpg

 

 

 

Cisco Rogue Management Diagram - Multiple Methods

 

 

2.jpg

 

 

Listening for Rogues - Two Different AP modes for RRM Scanning

 

 

 

3.jpg

 

 

RRM Channel Scanning

 

Local Mode AP

 

 

 

4.jpg

 

 

Monitor Mode AP

 

 

5.jpg

 

 

802.11n Rogue Detection

 

 

6.jpg

 

 

Rogue Classification Rules

 

Concept

 

7.jpg

 

Examples

 

 

8.jpg

 

 

Configuration

 

 

9.jpg

 

 

WCS Security Dashboard

 

 

10.jpg

 

 

 

Rogue Detector AP Mode

 

 

Concept

 

11.jpg

 

 

 

Example Deployment Scenario

 

 

 

12.jpg

 

Operation

 

 

13.jpg

 

 

Configuraiton

 

 

14.jpg

 

 

Rogue Location Discovery Protocol

 

 

Concept

 

15.jpg

 

 

Operation

 

 

 

 

16.jpg

 

 

Automatic Operation

 

 

17.jpg

 

Switchport tracing

 

 

Concept

 

18.jpg

 

 

Operation (Cont.)

 

19.jpg

 

 

Rogue Location

 

On-Demand With WCS

 

 

20.jpg

 

 

In Real-Time with WCS and MSE Context-Aware

 

 

21.jpg

 

Rogue Containment

 

Concept

 

22.jpg

 

 

Local Mode AP's

 

 

23.jpg

 

 

Monitor Mode APs

 

 

24.jpg

 

 

Auto-Containment Configuration

 

 

25.jpg

 

More Information

 

Best Practices For Outdoor Wireless Security

 

Wireless Virtual LAN Deployment Guide

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: