
UAG CLI Reference Guide
71
C
H A P T E R
8
Rogue AP
This chapter shows you how to set up Rogue Access Point (AP) detection and containment.
8.1 Rogue AP Detection Overview
Rogue APs are wireless access points operating in a network’s coverage area that are not under the
control of the network’s administrators, and can potentially open holes in the network security.
Attackers can take advantage of a rogue AP’s weaker (or non-existent) security to gain illicit access
to the network, or set up their own rogue APs in order to capture information from wireless clients.
Conversely, a friendly AP is one that the UAG network administrator regards as non-threatening.
This does not necessarily mean the friendly AP must belong to the network managed by the UAG;
rather, it is any unmanaged AP within range of the UAG’s own wireless network that is allowed to
operate without being contained. This can include APs from neighboring companies, for example, or
even APs maintained by your company’s employees that operate outside of the established
network.
8.2 Rogue AP Detection Commands
The following table identifies the values required for many of these commands. Other input values
are discussed with the corresponding commands.
The following table describes the commands available for rogue AP detection. You must use the
configure terminal
command to enter the configuration mode before you can use these
commands.
Table 24
Input Values for Rogue AP Detection Commands
LABEL
DESCRIPTION
ap_mac
Specifies the MAC address (in XX:XX:XX:XX:XX:XX format) of the AP to be
added to either the rogue AP or friendly AP list. The
no
command removes the
entry.
description2
Sets the description of the AP. You may use 1-60 alphanumeric characters,
underscores (
_
), or dashes (-). This value is case-sensitive.
Table 25
Command Summary: Rogue AP Detection
COMMAND
DESCRIPTION
rogue-ap detection
Enters sub-command mode for rogue AP detection.
[no] activate
Activates rogue AP detection. Use the
no
parameter to deactivate
rogue AP detection.
Summary of Contents for UAG Series
Page 5: ...Document Conventions UAG CLI Reference Guide 5 Server Firewall Telephone Switch Router ...
Page 22: ...22 PART I Introduction ...
Page 23: ...23 ...
Page 41: ...41 PART II Reference ...
Page 42: ...42 ...