Using The Cli To Enable Rogue Access Point Detection - Cisco SD2008T-NA Configuration Manual

4400 series wireless lan controller
Hide thumbs Also See for SD2008T-NA:
Table of Contents

Advertisement

Enabling Rogue Access Point Detection
Choose AP Authentication from the Protection Type drop-down box to enable rogue access point
Step 8
detection.
Step 9
Enter a number in the Alarm Trigger Threshold edit box to specify when a rogue access point alarm is
generated. An alarm occurs when the threshold value (which specifies the number of access point frames
with an invalid authentication IE) is met or exceeded within the detection period.
Note
Click Apply to commit your changes.
Step 10
Click Save Configuration to save your changes.
Step 11
Repeat this procedure on every controller in the RF group.
Step 12
Note

Using the CLI to Enable Rogue Access Point Detection

Follow these steps to enable rogue access point detection using the CLI.
Make sure that each controller in the RF group has been configured with the same RF group name.
Step 1
Note
Enter config ap mode local Cisco_AP or config ap mode monitor Cisco_AP to configure this particular
Step 2
access point for local (normal) mode or monitor (listen-only) mode.
Step 3
Enter save config to save your settings.
Repeat
Step 4
Enter config wps ap-authentication to enable rogue access point detection.
Step 5
Enter config wps ap-authentication threshold to specify when a rogue access point alarm is generated.
Step 6
An alarm occurs when the threshold value (which specifies the number of access point frames with an
invalid authentication IE) is met or exceeded within the detection period.
Note
Cisco Wireless LAN Controller Configuration Guide
10-14
The valid threshold range is from1 to 255, and the default threshold value is 1. To avoid false
alarms, you may want to set the threshold to a higher value.
If rogue access point detection is not enabled on every controller in the RF group, the access
points on the controllers with this feature disabled are reported as rogues.
The name is used to verify the authentication IE in all beacon frames. If the controllers have
different names, false alarms will occur.
Step 2
and
Step 3
for every access point connected to the controller.
The valid threshold range is from1 to 255, and the default threshold value is 1. To avoid false
alarms, you may want to set the threshold to a higher value.
Chapter 10
Configuring Radio Resource ManagementWireless Device Access
OL-1926-06OL-9141-03

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sfe2000p440244042000 series2100 series

Table of Contents