Chapter 10 Rogue AP

Containing a rogue AP means broadcasting unviable login data at it, preventing legitimate wireless clients from connecting to it. This is a kind of Denial of Service attack.

10.4Rogue AP Containment Commands

The following table identifies the values required for many of these commands. Other input values are discussed with the corresponding commands.

Table 40 Input Values for Rogue AP Containment Commands

LABEL

DESCRIPTION

ap_mac

Specifies the MAC address (in XX:XX:XX:XX:XX:XX format) of the AP

 

to be contained. The no command removes the entry.

The following table describes the commands available for rogue AP containment. You must use the configure terminal command to enter the configuration mode before you can use these commands.

Table 41 Command Summary: Rogue AP Containment

COMMAND

DESCRIPTION

rogue-ap containment

Enters sub-command mode for rogue AP containment.

[no] activate

Activates rogue AP containment. Use the no parameter

 

to deactivate rogue AP containment.

[no] contain ap_mac

Isolates the device associated with the specified MAC

 

address. Use the no parameter to remove this device

 

from the containment list.

exit

Exits configuration mode for rogue AP containment.

show rogue-ap containment list

Displays the rogue AP containment list.

10.4.1 Rogue AP Containment Example

This example contains the device associated with MAC address 00:13:49:11:11:12 then displays the containment list for confirmation.

Router(config)# rogue-ap containment Router(config-containment)# activate Router(config-containment)# contain 00:13:49:11:11:12 Router(config-containment)# exit

Router(config)# show rogue-ap containment list no. mac

=====================================================================

1 00:13:49:11:11:12

92

 

NXC CLI Reference Guide