Cisco Cisco 5508 Wireless Controller Referencia técnica
13
Rogue Management in a Unified Wireless Network using v7.4
Rogue Management Theory of Operation
The algorithm for switch port tracing is listed here:
•
The PI finds the closest AP, which detects the rogue AP over-the-air, and retrieves its CDP
neighbors.
neighbors.
•
The PI then uses SNMP to examine the CAM table within the neighboring switch, looking for a
positive match to identify the rogue location.
positive match to identify the rogue location.
•
A positive match is based on the exact rogue MAC address, +1/-1 & +2/-2 the rogue MAC address,
any rogue client MAC addresses, or an OUI match based on the vendor information inherent in a
MAC address.
any rogue client MAC addresses, or an OUI match based on the vendor information inherent in a
MAC address.
•
If a positive match is not found on the closest switch, the PI continues searching neighboring
switches up to two hops away (by default).
switches up to two hops away (by default).