570
C
HAPTER
26: R
OGUE
D
ETECTION
AND
C
OUNTERMEASURES
Figure 34
Rogue Detection Algorithm
MAP radio detects wireless packet.
No
Yes
Yes
Source MAC in
SSID in Permitted
Ignore List?
Device is not a threat.
SSID List?
Yes
OUI in Permitted
Vendor List?
No
Source MAC in
Attack List?
No
Generate an alarm.
Classify device as a rogue.
No
Yes
Issue countermeasures
(if enabled).
No
Rogue classification
Yes
algorithm deems the
device to be a rogue?
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...