05-08-2013 10:33 AM - edited 07-04-2021 12:02 AM
I'm building the use case to test / detect for rogue devices on the network. I have in my enviroment
Lan controller 5500 controller with AP (aironet 3500). I want to detect for rogue devices/ap connected to my network. I know before i can see this activity on the network i have to configure the controller / ap to detect this behavior. I'm doing this step.
http://www.cisco.com/en/US/products/ps6366/products_configuration_example09186a00808c7234.shtml
https://www.cisco.com/application/pdf/paws/70987/rogue_detect.pdf
NOTE: from the forum I have seen other talks about the same issue and saying that if I have any APs in "Rogue Detection" mode sitting on the trunk port on the switch then only, this AP will detect the Rogue on Wired
I don't think i completely understand this statement, by sitting does it mean that it is passively sniffing coming in/out on trunk link?
Considering the above steps are accurate, after this will i be able to see rogue detection behavior in syslogs? What exactly would be the messages that would produce this behavior.
Solved! Go to Solution.
05-10-2013 06:45 AM
By default, in local mode, the AP provides services to wifi clients. When it's "free" it goes into rogue detection.
So unless you have APs to 'burn", I wouldn't necessarily sacrifice a few APs for dedicated rogue detection.
Now, if you have AP3602 with the Security module, that's another thing.
05-08-2013 03:12 PM
I want to detect for rogue devices/ap connected to my network.
By default, this feature is enabled.
Only WCS/NCS/CPI will have the function to inform you if the rogue devices are plugged into your network or not (Rogue on Wired).
05-10-2013 05:45 AM
I'm using WCS v 5.0 will this work?
05-10-2013 05:52 AM
This will but I wouldn't use WCS 5.0 as there alot more features in 7.0.X.
05-10-2013 06:05 AM
Thanks the steps i layout in my inital quesiton are these enough to configure / setup rogue detection. Like in most cases it would be my supported AP configured in rogue detection mode doing all the detection and containment? Right.
05-10-2013 06:45 AM
By default, in local mode, the AP provides services to wifi clients. When it's "free" it goes into rogue detection.
So unless you have APs to 'burn", I wouldn't necessarily sacrifice a few APs for dedicated rogue detection.
Now, if you have AP3602 with the Security module, that's another thing.
05-12-2013 07:33 PM
RLDP and an ap in Roge Detector mode can be turned on using just the controller. Both will tell you if a rogue is on your wired network. With RLDP you will be limited to checking rogues with open authentication. A Rogue Detector ap will also work with just the controller to identify rogue ap's based on MAC address on the wired network.
Personally, I don't like using RLDP because it wil directly affect my service areas when the AP goes offline. By contrast, the Rogue detector is easy to setup and I often use an older LAP model for this purpose. Just keep capacity limits in mind when deploying ip your MDF's.
IMHO, just like anything else with security, Rogue Detection is a multi level effort. Build a strategy and apply the technologies and features that result in what you're looking for. Often times I start with a simple question with my customers to determine as to what level to take the recommendation: "If you identify a Rogue AP, will you do something about it?" That usually sets up next steps. //art
05-18-2013 08:27 PM
Rogue Management in a Unified Wireless Network
http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080b40901.shtml
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide