5-93
Cisco Wireless LAN Controller Configuration Guide
OL-17037-01
Chapter 5 Configuring Security Solutions
Managing Rogue Devices
Condition 5
type......................................... Rssi
value (dBm).................................. -50
Condition 6
type......................................... Ssid
SSID Count................................... 1
SSID 1.................................... test
Viewing and Classifying Rogue Devices
Using the controller GUI or CLI, you can view rogue devices and determine the action that the controller
should take.
Caution
When you choose to contain a rogue device, the following warning appears: “There may be legal issues
following this containment. Are you sure you want to continue?” The 2.4- and 5-GHz frequencies in the
Industrial, Scientific, and Medical (ISM) band are open to the public and can be used without a license.
As such, containing devices on another party’s network could have legal consequences.
Using the GUI to View and Classify Rogue Devices
Using the controller GUI, follow these steps to view and classify rogue devices.
Step 1
Click
Monitor
>
Rogues
.
Step 2
Click the following options to view the different types of rogue access points detected by the controller:
•
Friendly APs
•
Malicious APs
•
Unclassified APs
A page similar to the following appears (see
Figure 5-47 Friendly Rogue APs Page
The Friendly Rogue APs page, Malicious Rogue APs page, and Unclassified Rogue APs page provide
the following information: the MAC address and SSID of the rogue access point, the number of clients
connected to the rogue access point, the number of radios that detected the rogue access point, and the
current status of the rogue access point.