
10
Rogue AP
This chapter shows you how to set up Rogue Access Point (AP) detection and containment.
10.1 Rogue AP Detection Overview
Rogue APs are wireless access points operating in a network’s coverage area that are not under the control of the network’s administrators, and can potentially open holes in the network security. Attackers can take advantage of a rogue AP’s weaker (or
Conversely, a friendly AP is one that the NXC network administrator regards as non- threatening. This does not necessarily mean the friendly AP must belong to the network managed by the NXC; rather, it is any unmanaged AP within range of the NXC’s own wireless network that is allowed to operate without being contained. This can include APs from neighboring companies, for example, or even APs maintained by your company’s employees that operate outside of the established network.
10.2 Rogue AP Detection Commands
The following table identifies the values required for many of these commands. Other input values are discussed with the corresponding commands.
Table 38 Input Values for Rogue AP Detection Commands
LABEL | DESCRIPTION |
ap_mac | Specifies the MAC address (in XX:XX:XX:XX:XX:XX format) of the AP |
| to be added to either the rogue AP or friendly AP list. The no command |
| removes the entry. |
description2 | Sets the description of the AP. You may use |
| characters, underscores (_), or dashes |
The following table describes the commands available for rogue AP detection. You must use the configure terminal command to enter the configuration mode before you can use these commands.
Table 39 Command Summary: Rogue AP Detection
COMMAND | DESCRIPTION |
Enters | |
[no] activate | Activates rogue AP detection. Use the no parameter to |
| deactivate rogue AP detection. |
| 89 |
NXC CLI Reference Guide | |
|
|