The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
A Rogue Access Point (AP) is an access point that is installed on a secure network without the consent of the network administrator. Rogue APs can pose a security threat because anyone who installs a wireless router within the range of your network can potentially gain access to your network. The Rogue AP Detection page in the web-based utility of the AP provides information about the wireless networks that are within range.
Having a trusted AP list can help keep track of the APs that an administrator trusts with the help of the details on the Detected Rogue AP List.
This article aims to show you how to create, import, and download an AP list on an access point.
Step 1. Log in to the web-based utility of the access point and choose Wireless > Rogue AP Detection.
Step 2. If you trust or recognize an AP that was detected, click the Trust button next to its entry in the list. This adds the corresponding AP to the Trusted AP List, and removes it from the Detected Rogue AP List.
Note: Trusting an AP only adds it to the list, and has no impact on the operation of the AP. The lists are organizational tools that can be used to take further action.
The following information about the detected access points are displayed.
Step 3. (Optional) The Trusted AP List table is populated once an AP has been trusted. To remove an AP from the list, click Untrust.
Step 4. (Optional) In the Download/Backup Trusted AP List area, click a radio button to either download a configuration file to the AP from the PC or Backup to download the list from the AP to the PC. If you chose Download, proceed to the next step. If you chose Backup, skip to Step 7.
Step 5. In the Source File Name area, click on Choose File to choose a file on your PC to download to the AP.
Note: For this example, Rogue1.cfg is chosen.
Step 6. In the File Management Destination area, click a radio button to either replace or merge the file with the existing list. The options are:
Note: For this example, Replace is chosen.
Step 7. Click Save.
You have now successfully created, backed up, and imported a Trusted AP List on a WAP.