You are here
WL0031 - WLC Rogue Detection and IDS (Part 3)
Difficulty Level:
Lab Document:
<Please login to see the content>
Category:
Wireless
The video discusses a topic of rogue device detection on Cisco Wireless LAN Controller. We will demonstrate how a rogue is detected, using Monitor Mode AP and WSM, and determined if it is connected to your corporate network. We will go through configuration of rogue classification and containment. The video closes with overview on wireless IDS. Wireshark captures are taken throughout the video to provide you with insight into protocol behavior.
Part 3 of the video covers rogue classification and containment
Topic:
- Rouge Detection
- Monitor Mode AP and Wireless Security Module (WSM)
- Rogue Location Discovery Protocol (RLDP)
- Rogue Detector AP
-
Rogue Classification
- Friendly, Malicious, Custom, Unclassified
- Manual and Auto Rogue Class Assignment
- Rogue Containment (Manual and Automatic)
- Wireless Intrusion Detection
- Wireless IDS Signature
- Wireshark Capture
3 comments
Difference between monitor mode and rogue detector mode
Hi metha, as per video, we are able to detect rogue APs and rogue clients using the monitor mode.
so why we need The rogue detector mode for the AP.
and can AP serve clients normal traffic at same time with monitor mode and rogue detector mode. ?
Difference between monitor mode and rogue detector mode
Rogue Detector Mode AP is specifcally used to monitor the wire to determine if a rogue AP is connected to your network. This is done by sniffing out ARP packets and compare learned MAC address to the rogue client list reported by Monitor Mode AP.
How can i jam any ap appear
How can i jam any ap appear in my field except my aps that connected to wlc