Cisco Cisco 5508 Wireless Controller Referencia técnica

Descargar
Página de 42
13
Rogue Management in a Unified Wireless Network using v7.4
 
  Rogue Management Theory of Operation
The algorithm for switch port tracing is listed here:
The PI finds the closest AP, which detects the rogue AP over-the-air, and retrieves its CDP 
neighbors.
The PI then uses SNMP to examine the CAM table within the neighboring switch, looking for a 
positive match to identify the rogue location.
A positive match is based on the exact rogue MAC address, +1/-1 & +2/-2 the rogue MAC address, 
any rogue client MAC addresses, or an OUI match based on the vendor information inherent in a 
MAC address.
If a positive match is not found on the closest switch, the PI continues searching neighboring 
switches up to two hops away (by default).