Overview
If the rogue AP is attached to non-ACCESS mode interfaces, the network admin must contain the interface either manually or through a CLI command.
Configure aWIPS profiles to select required signatures, set thresholds for detecting denial of service (DoS) attacks, and enable forensic capture at the signature level. Adjust thresholds to control the number of alarms generated for each aWIPS signature during a specific time period.
This table lists the supported devices for aWIPS profile configuration for various versions of Catalyst Center:
| Supported devices |
IOS-XE version |
Catalyst Center version |
|---|---|---|
|
17.4 to 17.13 |
2.3.7.4 |
| 17.4 to 17.14 |
2.3.7.5 |
|
| 17.4 to 17.15 |
2.3.7.6 |
|
| 17.4 to 17.15 |
2.3.7.7 |
For SD-Access use cases, for aWIPS profiles to work, you must enable the wireless module on Cisco Catalyst 9300 Series Switches, Cisco Catalyst 9400 Series Switches, and Cisco Catalyst 9500 Series Switches.