
Chapter 10 Rogue AP
Containing a rogue AP means broadcasting unviable login data at it, preventing legitimate wireless clients from connecting to it. This is a kind of Denial of Service attack.
10.4Rogue AP Containment Commands
The following table identifies the values required for many of these commands. Other input values are discussed with the corresponding commands.
Table 40 Input Values for Rogue AP Containment Commands
LABEL | DESCRIPTION |
ap_mac | Specifies the MAC address (in XX:XX:XX:XX:XX:XX format) of the AP |
| to be contained. The no command removes the entry. |
The following table describes the commands available for rogue AP containment. You must use the configure terminal command to enter the configuration mode before you can use these commands.
Table 41 Command Summary: Rogue AP Containment
COMMAND | DESCRIPTION |
Enters | |
[no] activate | Activates rogue AP containment. Use the no parameter |
| to deactivate rogue AP containment. |
[no] contain ap_mac | Isolates the device associated with the specified MAC |
| address. Use the no parameter to remove this device |
| from the containment list. |
exit | Exits configuration mode for rogue AP containment. |
show | Displays the rogue AP containment list. |
10.4.1 Rogue AP Containment Example
This example contains the device associated with MAC address 00:13:49:11:11:12 then displays the containment list for confirmation.
Router(config)#
Router(config)# show
=====================================================================
1 00:13:49:11:11:12
92 |
| |
NXC CLI Reference Guide |
| |
|
|
|