Overview
Provides instructions for configuring and managing the Catalyst Center Rogue Management application, a tool designed to detect and contain rogue access points. It covers deployment requirements, initial setup, rogue monitoring, and policy management within the Catalyst Center environment.
New and changed information
This table summarizes the new and changed features in Catalyst Center Release 3.2.2 and tells you where they are documented.
| Feature |
Description |
|---|---|
| Outdoor area support |
If Try Outdoor Area feature is enabled in Catalyst Center, you will find the outdoor area selection option in the Site Selector window in these dashlets.
|
Catalyst Center Rogue Management and aWIPS Application
Introduces the application, its security functions, system requirements, and basic setup workflows.
Install Catalyst Center Rogue Management Application Package
Provides instructions for downloading and installing the Rogue Management and aWIPS application package.
Monitor the Rogue and aWIPS Dashboard
Explains how to access the dashboard, monitor threats, and use the Threat 360 view for analysis.
aWIPS Profiles
Covers creating, assigning, and managing aWIPS profiles to detect and mitigate DoS attacks.
Rogue AP Containment on Wired and Wireless Networks
Details procedures for containing rogue APs on both wired and wireless network infrastructures.
Custom Classification of Rogue APs
Explains how to create custom rules, manage allowed lists, and classify rogue devices based on risk.
Rogue and aWIPS Event Notifications
Describes how to configure and receive event notifications for detected rogue and aWIPS threats.