- Preface
- Using the Command-Line Interface
- Using the Web Graphical User Interface
- Preventing Unauthorized Access
- Controlling Switch Access with Passwords and Privilege Levels
- Configuring TACACS+
- Configuring RADIUS
- Configuring Kerberos
- Configuring Local Authentication and Authorization
- Configuring Secure Shell (SSH)
- Configuring Secure Socket Layer HTTP
- Configuring IPv4 ACLs
- Configuring IPv6 ACLs
- Configuring DHCP
- Configuring IP Source Guard
- Configuring Dynamic ARP Inspection
- Configuring IEEE 802.1x Port-Based Authentication
- Configuring Web-Based Authentication
- Configuring Port-Based Traffic Control
- Configuring IPv6 First Hop Security
- Configuring Cisco TrustSec
- Configuring Wireless Guest Access
- Managing Rogue Devices
- Classifying Rogue Access Points
- Configuring wIPS
- Configuring Intrusion Detection System
- Index
- Finding Feature Information
- Information About Classifying Rogue Access Points
- Restrictions on Classifying Rogue Access Points
- How to Classify Rogue Access Points
- Viewing and Classifying Rogue Devices (GUI)
- Examples: Classifying Rogue Access Points
- Additional References for Classifying Rogue Access Points
- Feature History and Information For Classifying Rogue Access Points
Classifying Rogue Access Points
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table at the end of this module.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Information About Classifying Rogue Access Points
The controller software enables you to create rules that can organize and display rogue access points as Friendly, Malicious, or Unclassified.
By default, none of the classification rules are used. You need to enable them. Therefore, all unknown access points are categorized as Unclassified. When you create or change a rule, configure conditions and enable it, all rogue access points are then reclassified. Whenever you change a rule, it is applied to all access points (friendly, malicious, and unclassified) in the Alert state only.
If you move any rogue or ad hoc rogue manually to unclassified and Alert state, it means that the rogue is moved to the default state. Rogue rules apply to all the rogues that are manually moved to unclassified and Alert state.
![]() Note | Rule-based rogue classification does not apply to adhoc rogues and rogue clients. |
![]() Note | You can configure up to 64 rogue classification rules per controller. |
-
If the unknown access point is in the friendly MAC address list, the controller classifies the access point as Friendly.
-
If the unknown access point is not in the friendly MAC address list, the controller starts applying the rogue classification rules to the access point.
-
If the rogue is already classified as Malicious, Alert or Friendly, Internal or External, the controller does not reclassify it automatically. If the rogue is classified differently, the controller reclassifies it automatically only if the rogue is in the Alert state.
-
If the rogue access point matches the configured rules criteria, the controller classifies the rogue based on the classification type configured for that rule.
-
If the rogue access point does not match any of the configured rules, the rogue remains unclassified.
Note
The controller repeats the previous steps for all the rogue access points.
-
If the rogue access point is detected on the same wired network, the controller marks the rogue state as Threat and classifies it as Malicious automatically, even if there are no configured rules. You can then manually contain the rogue to change the rogue state to Contained. If the rogue access point is not available on the network, the controller marks the rogue state as Alert. You can then manually contain the rogue.
-
If desired, you can manually move the access point to a different classification type and rogue state.
As mentioned earlier, the controller can automatically change the classification type and rogue state of an unknown access point based on user-defined rules, or you can manually move the unknown access point to a different classification type and rogue state.
Friendly (Internal, External, Alert) | Malicious (Alert) |
Friendly (Internal, External, Alert) | Unclassified (Alert) |
Friendly (Alert) | Friendly (Internal, External) |
Malicious (Alert, Threat) | Friendly (Internal, External) |
Malicious (Contained, Contained Pending) | Malicious (Alert) |
Unclassified (Alert, Threat) | Friendly (Internal, External) |
Unclassified (Contained, Contained Pending) | Unclassified (Alert) |
Unclassified (Alert) | Malicious (Alert) |
If the rogue state is Contained, you have to uncontain the rogue access point before you can change the classification type. If you want to move a rogue access point from Malicious to Unclassified, you must delete the access point and allow the controller to reclassify it.
Restrictions on Classifying Rogue Access Points
The following rules apply to this feature:
-
Classifying Custom type rogues is tied to rogue rules. Therefore, it is not possible to manually classify a rogue as Custom. Custom class change can occur only using rogue rules.
-
There are traps that are sent for containment by rule and every 30 minutes for rogue classification change. For custom classification, the first trap does not contain the severity score because the trap has existed before the custom classification. The severity score is obtained from the subsequent trap that is generated after 30 minutes if the rogue is classified.
-
Rogue rules are applied on every incoming new rogue report in the controller in the order of their priority.
-
Once a rogue satisfies a higher priority rule and is classified, it does not move down the priority list for the same report.
-
Previously classified rogue gets re-classified on every new rogue report with the following restrictions:
-
Rogues which are classified as friendly by rule and whose state is set to ALERT, go through re-classification on receiving the new rogue report.
-
If a rogue is classified as friendly by the administrator manually, then the state is INTERNAL and it does not get re-classified on successive rogue reports.
-
If rogue is classified as malicious, irrespective of the state it does not get re-classified on subsequent rogue reports.
-
-
Transition of the rogue's state from friendly to malicious is possible by multiple rogue rules if some attribute is missing in new rogue report.
-
Transition of the rogue's state from malicious to any other classification is not possible by any rogue rule.
-
If a rogue AP is classified as friendly, it means that the rogue AP exists in the vicinity, is a known AP, and need not be tracked. Therefore, all the rogue clients are either deleted or not tracked if they are associated with the friendly rogue AP.
-
When service set identifiers (SSIDs) are defined as part of a rogue rule, and details of the rogue rule are displayed using the show wireless wps rogue rule detailed command, the output differs in Cisco IOS XE Release 3.7E and prior releases and Cisco IOS XE Denali 16.1.1 and later releases.
The following is sample output from the show wireless wps rogue rule detailed command in Cisco IOS XE Release 3.6E and prior releases: Switch# show wireless wps rogue rule detailed test Priority : 1 Rule Name : wpstest State : Disabled Type : Pending Match Operation : Any Hit Count : 0 Total Conditions : 1 Condition : type : Ssid SSID Count : 2 SSID 1 : ssid1 SSID 2 : ssid2
The following is sample output from the show wireless wps rogue rule detailed command in Cisco IOS XE Denali 16.1.1 and later releases: Switch# show wireless wps rogue rule detailed test Priority : 1 Rule Name : wpstest State : Disabled Type : Pending Match Operation : Any Hit Count : 0 Total Conditions : 1 Condition : type : Ssid SSID Count : 2 SSID : ssid1 SSID : ssid2
How to Classify Rogue Access Points
Configuring Rogue Classification Rules (CLI)
1.
configure terminal
2.
wireless wps rogue rule
rule-name
priority
priority
3.
classify {friendly | malicious}
4.
condition {client-count
condition_value|
duration
|
encryption
|
infrastructure
|
rssi
|
ssid}
6.
default
7.
exit
8.
shutdown
9.
end
10.
configure terminal
11.
wireless wps rogue rule
shutdown
12.
end
DETAILED STEPS
Configuring Rogue Classification Rules (GUI)
Step 1 | Choose
to open the Rogue Rules page.
Any rules that have already been created are listed in priority order. The name, type, and status of each rule is provided.
| ||
Step 2 | Create a new
rule as follows:
| ||
Step 3 | Edit a rule as
follows:
| ||
Step 4 | If you want to
change the priority in which rogue classification rules are applied, follow
these steps:
|
Viewing and Classifying Rogue Devices (GUI)
Step 1 | Choose Monitor > Rogues. | ||
Step 2 | Choose the following options
to view the different types of rogue access points detected by the controller:
The respective rogue APs pages provide the following information: the MAC address of the rogue access point, the number of radios that detected the rogue access point, the number of clients connected to the rogue access point, the current status of the rogue access point, and last heard. | ||
Step 3 | Get more details
about a rogue access point by clicking the MAC address of the access point. The
Rogue AP Detail page appears.
This page provides the following information: the MAC address of the rogue device, the type of rogue device (such as an access point), whether the rogue device is on the wired network, the dates and times when the rogue device was first and last reported, and the current status of the device. The Class Type text box shows the current classification for this rogue access point:
| ||
Step 4 | If you want to
change the classification of this device, choose a different classification
from the Class Type drop-down list.
| ||
Step 5 | From the Update
Status drop-down list, choose one of the following options to specify how the
controller should respond to this rogue access point:
The bottom of the page provides information on both the access points that detected this rogue access point and any clients that are associated to it. To see more details for any of the clients, click Edit to open the Rogue Client Detail page. | ||
Step 6 | Click Apply. | ||
Step 7 | Click Save Configuration. | ||
Step 8 | See any adhoc
rogues detected by the controller by choosing
Adhoc Rogues. The
Adhoc Rogues page appears.
This page shows the following information: the MAC address, BSSID, and SSID of the adhoc rogue, the number of radios that detected the adhoc rogue, and the current status of the adhoc rogue. | ||
Step 9 | Obtain more
details about an adhoc rogue by clicking the MAC address of the rogue. The
Adhoc Rogue Detail page appears.
This page provides the following information: the MAC address and BSSID of the adhoc rogue, the dates and times when the rogue was first and last reported, and the current status of the rogue. | ||
Step 10 | From the Update Status drop-down list, choose one of the following options to specify how the controller should respond to this adhoc rogue: | ||
Step 11 | From the Maximum Number of APs to Contain the Rogue drop-down list, choose one of the following options to specify the maximum number of access points used to contain this adhoc rogue: 1, 2, 3, or 4. The bottom of the page provides information on the access points that detected this adhoc rogue. | ||
Step 12 | Click Apply. | ||
Step 13 | Click Save Configuration. | ||
Step 14 | View any
access points that have been configured to be ignored by choosing
Rogue AP
Ignore-List. The Rogue AP Ignore-List page appears.
This page shows the MAC addresses of any access points that are configured to be ignored. The rogue-ignore list contains a list of any autonomous access points that have been manually added to Cisco Prime Infrastructure maps by the users. The controller regards these autonomous access points as rogues even though the Prime Infrastructure is managing them. The rogue-ignore list allows the controller to ignore these access points. The list is updated as follows:
|
Examples: Classifying Rogue Access Points
Switch# configure terminal Switch(config)# wireless wps rogue rule ap1 priority 1 Switch(config-rule)# classify friendly Switch(config-rule)# end
Switch# configure terminal Switch(config)# wireless wps rogue rule ap1 priority 1 Switch(config-rule)# condition client-count 5 Switch(config-rule)# condition duration 1000 Switch(config-rule)# end
Additional References for Classifying Rogue Access Points
Related Documents
Related Topic | Document Title |
---|---|
Security commands |
Security Command Reference Guide, Cisco IOS XE Release 3SE (Cisco WLC 5700 Series) |
Standards and RFCs
Standard/RFC | Title |
---|---|
None |
— |
MIBs
MIB | MIBs Link |
---|---|
All supported MIBs for this release. |
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: |
Technical Assistance
Description | Link |
---|---|
The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. |
Feature History and Information For Classifying Rogue Access Points
Release | Feature Information |
---|---|
Cisco IOS XE 3.3SE | This feature was introduced. |