Cisco Cisco 5508 Wireless Controller Referencia técnica

Descargar
Página de 42
18
Rogue Management in a Unified Wireless Network using v7.4
Switch Port Shutting
Once a switch port is traced using SPT, there is an option to disable that port in PI. Administrator has to 
do this exercise manually or automatically. An option is available to enable the switch port through PI 
if rogue is physically removed from the network.
Configure Rogue Management
Configure Rogue Detection
Rogue detection is enabled in the controller by default and turn on/off per individual AP basis. 
To find rogue details in a controller using the graphical interface:
Step 1
Go to Monitor > Rogues.
 
In this page, different classification for rogues are available:
Friendly APs – APs which are marked as friendly by administrator. Friendly AP can be classified 
by manual entry input or by creating Rogue rule that automatically classify as Friendly APs. 
Malicious APs – APs which are identified as malicious using RLDP or Rogue detector AP or 
classified as Malicious AP Rogue rule.
Custom APs – APs which are identified as custom using Custom Rogue Rule.
Unclassified APs – By default rogue APs will be shown as unclassified list in controller.
Rogue Clients – Clients connected to Rogue APs.
Adhoc Rogues – Adhoc rogue clients. This Adhoc Rogue list also can be classified by Rogue Filter 
rule and categorized to Friendly, Malicious, Custom and Unclassified adhoc.
Rogue AP ignore list – APs listed through PI.