Overview
Monitor the Rogue and aWIPS Dashboard
Access the Rogue Management and aWIPS application
This guide describes how to activate the rogue and aWIPS application package on Catalyst Center. This guide also explains prerequisites and configurations, describes how to monitor the rogue and aWIPS dashboard, and offers important notes and limitations.
Monitor the Rogue Management and aWIPS dashboard
This guide describes how to activate the rogue and aWIPS application package on Catalyst Center. This guide also explains prerequisites and configurations, describes how to monitor the rogue and aWIPS dashboard, and offers important notes and limitations.
Monitor network rogue threats
About Rogue Management The NetFlow Options Template serves as a distinctive template record designed to communicate the format of data associated with the NetFlow operation. Instead of sharing details about IP flows, these options serve the purpose of providing metadata pertaining to the NetFlow process itself.
Get rogue AP and rogue client details from the Threat 360° view
About Advanced Wireless Intrusion Prevention System Short Desc With each subsequent arrival of a packet from the same flow, the cache entry is updated. Flow records persist within the line card's cache until they age out due to timer expiration.
Download aWIPS profile forensic capture from the Threat 360° view
test
Deploy your device configurations now or later
When you reach the scheduling step of a workflow that supports Visibility and Control of Configurations, use this procedure to deploy your device configurations now or later.
Preview and deploy your device configurations
When you reach the scheduling step of a workflow that supports Visibility and Control of Configurations, use this procedure to preview and deploy your device configurations.