Using The Cli To Configure Aaa Override; Managing Rogue Devices; Challenges - Cisco 2100 Series Configuration Manual

Wireless lan controller
Hide thumbs Also See for 2100 Series:
Table of Contents

Advertisement

Managing Rogue Devices

Figure 5-40 WLANs > Edit (Advanced) Page
Step 4
Check the Allow AAA Override check box to enable AAA override or uncheck it to disable this feature.
The default value is disabled.
Click Apply to commit your changes.
Step 5
Step 6
Click Save Configuration to save your changes.

Using the CLI to Configure AAA Override

Use this command to enable or disable AAA override using the controller CLI:
config wlan aaa-override {enable | disable} wlan_id
For wlan_id, enter an ID from 1 to 16.
Managing Rogue Devices
This section describes security solutions for rogue devices. A rogue device is an unknown access point
or client that is detected by managed access points in your network as not belonging to your system.

Challenges

Rogue access points can disrupt wireless LAN operations by hijacking legitimate clients and using
plain-text or other denial-of-service or man-in-the-middle attacks. That is, a hacker can use a rogue
access point to capture sensitive information, such as usernames and passwords. The hacker can then
transmit a series of clear-to-send (CTS) frames. This action mimics an access point informing a
particular client to transmit and instructing all others to wait, which results in legitimate clients being
unable to access network resources. Therefore, wireless LAN service providers have a strong interest in
banning rogue access points from the air space.
Because rogue access points are inexpensive and readily available, employees sometimes plug
unauthorized rogue access points into existing LANs and build ad-hoc wireless networks without IT
department knowledge or consent. These rogue access points can be a serious breach of network security
as they can be plugged into a network port behind the corporate firewall. Because employees generally
do not enable any security settings on the rogue access point, it is easy for unauthorized users to use the
Cisco Wireless LAN Controller Configuration Guide
5-80
Chapter 5
Configuring Security Solutions
OL-17037-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

4400 series

Table of Contents