cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
5446
Views
10
Helpful
3
Replies

Detect a wired rogue access point in production network

Not applicable

Has anyone successfully detected a wired rogue access point in a corporate network?  I try to prevent and locate a unauthorized wireless router, Linksys or D-Link, in production network.

Thanks,

 

3 Replies 3

David Watkins
Level 4
Level 4

It's possible and will work, but is very unlikely with the traditional D-Link/Linksys or "SOHO" type device that you will properly detect.  The reason being is that these devices typically NAT so from your corporate "wired" network, you will not be able to correlate any WLC detected rogue client MAC addresses to that of a MAC on the wire from the rogue detector AP; they're hidden behind NAT boundary.

http://www.cisco.com/c/en/us/td/docs/wireless/technology/roguedetection_deploy/Rogue_Detection.html

"A rogue detector AP aims to correlate rogue information heard over the air with ARP information obtained from the wired network. A positive match is based on the wired and wireless MAC address with difference of +1/-1. If a MAC address is heard over the air as a rogue AP or client and is also heard on the wired network, then the rogue is determined to be on the wired network. If the rogue is detected to be on the wired network, then the alarm severity for that rogue AP is raised to "Critical". It should be noted that a rogue detector AP is not successful at identifying rogue clients behind a device using NAT."

 

sobhardw
Cisco Employee
Cisco Employee

A Rogue AP is an access point that has been installed on a secure network without explicit authorization from a system administrator. Rogue access points pose a security threat because anyone with access to the premises can ignorantly or maliciously install an inexpensive wireless AP that can potentially allow unauthorized parties to access the network.

Several Rogue AP types are undetectable by wire side only
scanning, examples:
• Bridging APs on a subnet inconsistent with their wired IP
address (default configuration)
• Soft APs
• Router (NAT) APs with cloned wire side MAC address

Please check the below links for more information on Rogue AP.

http://www.cisco.com/assets/sol/sb/AP541N_Emulators/AP541N_Emulator_v1.9.2/help_Rogue_AP_Detection.htm

http://www.cisco.com/c/en/us/td/docs/wireless/technology/roguedetection_deploy/Rogue_Detection.html#wp44450

Attached is the PDF file for more information.

mohanak
Cisco Employee
Cisco Employee

Any device that shares your spectrum and is not managed by you can be considered a rogue. A rogue becomes dangerous in the following scenarios:

When the Rogue AP uses the same SSID as your network (honeypot).

When the Rougue AP device is detected on wired network also.

Ad-hoc rogues are also a big threat.

Setup by an outsider with malicious intent.

There are three main phases of rogue device management in Cisco Unified Wireless Network (UWN) solution:

Detection - Radio Resource Management (RRM) scanning is used to detect the presence of rogue devices.

Classification - Rogue Location Discovery Protocol (RLDP), Rogue Detectors and switch port tracing are used to identify if the rogue device is connected to the wired network. Rogue classification rules also assist in filtering rogues into specific categories based on their characteristics.

Mitigation - Switch port Trace and shutting down, rogue location, and rogue containment are used to track down physical location and nullify the threat of rogue devices.

http://www.cisco.com/c/en/us/td/docs/wireless/technology/roguedetection_deploy/Rogue_Detection.html

Review Cisco Networking for a $25 gift card