Overview
Banner with a blue check mark indicates that the Wireless Rogue AP Containment request is in progress.
The Wired Rogue AP Containment feature allows Catalyst Center to shut down the ACCESS mode interface on the switch to which a rogue AP is physically attached. Catalyst Center performs wired rogue AP containment only on ACCESS mode interfaces, because shutting down any other mode might bring the network down.
If the rogue AP is attached to non-ACCESS mode interfaces, the network admin must contain the interface either manually or through a CLI command.
This procedure describes how to perform wired rogue AP containment on an ACCESS mode interface classified as Rogue on Wire in Catalyst Center.
Before you begin
Download and install the rogue and aWIPS application package. For more information, see Download and Install the Rogue Management and aWIPS application package.
Ensure that you have write permission from the provision API, scheduler API, and rogue side to perform this procedure.
Procedure
| 1. | From the main menu, choose . |
|
| 2. | Click the rogue AP MAC address is classified as Rogue on Wire in the Threat MAC address column. The Threat 360 window appears. |
|
| 3. | From the Action drop-down list, select Shutdown Switchport. A warning dialog box displays the list of ACCESS mode interfaces to be shut down on the corresponding device, and Configuration Preview information.
|
|
| 4. | In the Configuration Preview tab, review the configurations and click Yes.
|
|
| 5. | The Threat 360 window displays the wired rogue AP containment status:
If a rogue AP MAC address is classified as Rogue on Wire, but no ACCESS mode interfaces are up to initiate the containment, Catalyst Center disables the Shutdown Switchport option in the Action drop-down list.
|