The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
![]() Note | Manual classification and classification that is the result of auto-containment or rogue-on-wire overrides the rogue rule. If you have manually changed the class and/or the state of a rogue AP, then to apply rogue rules to the AP, you must change it to unclassified and alert condition. |
![]() Note | If you manually move any rogue device to contained state (any class) or friendly state, this information is stored in the standby Cisco WLC flash memory; however, the database is not updated. When HA switchover occurs, the rogue list from the previously standby Cisco WLC flash memory is loaded. |
By default, none of the classification rules are enabled. Therefore, all unknown access points are categorized as Unclassified. When you create a rule, configure conditions for it, and enable the rule, the unclassified access points are reclassified. Whenever you change a rule, it is applied to all access points (friendly, malicious, custom, and unclassified) in the Alert state only.
You can configure up to 64 rogue classification rules per controller.
You can also apply rogue rules to ad hoc rogues except for client count condition.
The number of rogue clients that can be stored in the database table of a rogue access point is 256.
![]() Note | For the RSSI condition of rogue rule, reclassification occurs only if the RSSI change is more than 2 dBm of the configured RSSI value. |
The rogue rule may not work properly if friendly rogue rule is configured with RSSI as a condition. Then, you need to modify the rules with the expectation that friendly rule is using maximum RSSI and modify rules accordingly.
The controller verifies that the unknown access point is in the friendly MAC address list. If it is, the controller classifies the access point as Friendly.
If the unknown access point is not in the friendly MAC address list, the controller starts applying rogue classification rules.
If the rogue is already classified as Malicious, Alert or Friendly, Internal or External, the controller does not reclassify it automatically. If the rogue is classified differently, the controller reclassifies it automatically only if the rogue is in the Alert state.
The controller applies the first rule based on priority. If the rogue access point matches the criteria specified by the rule, the controller classifies the rogue according to the classification type configured for the rule.
If the rogue access point does not match any of the configured rules, the controller classifies the rogue as Unclassified.
The controller repeats the previous steps for all rogue access points.
If RLDP determines that the rogue access point is on the network, the controller marks the rogue state as Threat and classifies it as Malicious automatically, even if no rules are configured. You can then manually contain the rogue (unless you have configured RLDP to automatically contain the rogue), which would change the rogue state to Contained. If the rogue access point is not on the network, the controller marks the rogue state as Alert, and you can manually contain the rogue.
If desired, you can manually move the access point to a different classification type and rogue state.
If the rogue state is Contained, you have to uncontain the rogue access point before you can change the classification type. If you want to move a rogue access point from Malicious to Unclassified, you must delete the access point and allow the controller to reclassify it.
Classifying Custom type rogues is tied to rogue rules. Therefore, it is not possible to manually classify a rogue as Custom. Custom class change can occur only using rogue rules.
There are traps that are sent for containment by rule and for every 30 minutes for rogue classification change. For custom classification, the first trap does not contain the severity score because the trap has existed before the custom classification. The severity score is obtained from the subsequent trap that is generated after 30 minutes if the rogue is classified.
Rogue rules are applied on every incoming new rogue report in the controller in the order of their priority.
Once a rogue satisfies a higher priority rule and classified, it does not move down the priority list for the same report.
Rogues which are classified as friendly by rule and whose state is set to ALERT, go through re-classification on receiving the new rogue report.
If a rogue is classified as friendly by the administrator manually, then the state is INTERNAL and it does not get re-classified on successive rogue reports.
If rogue is classified as malicious, irrespective of the state it does not get re-classified on subsequent rogue reports.
Transition of the rogue's state from friendly to malicious is possible by multiple rogue rules if some attribute is missing in new rogue report.
Transition of the rogue's state from malicious to any other classification is not possible by any rogue rule.
The status change of a rogue device to contain or alert does not work when you move it between different class types until you move the class type of the rogue to unclassified.
If a rogue AP is classified as friendly, it means that the rogue AP exists in the vicinity, is a known AP, and need not be tracked. Therefore, all the rogue clients are either deleted or not tracked if they are associated with the friendly rogue AP.
![]() Caution | When you choose to contain a rogue device, the following warning appears: “There may be legal issues following this containment. Are you sure you want to continue?” The 2.4- and 5-GHz frequencies in the Industrial, Scientific, and Medical (ISM) band are open to the public and can be used without a license. As such, containing devices on another party’s network could have legal consequences. |
Step 1 | Choose Monitor > Rogues. | ||||||
Step 2 | Choose the following options
to view the different types of rogue access points detected by the controller:
The respective rogue APs pages provide the following information: the MAC address and SSID of the rogue access point, channel number, the number of radios that detected the rogue access point, the number of clients connected to the rogue access point, and the current status of the rogue access point.
| ||||||
Step 3 | Get more details
about a rogue access point by clicking the MAC address of the access point. The
Rogue AP Detail page appears.
This page provides the following information: the MAC address of the rogue device, the type of rogue device (such as an access point), whether the rogue device is on the wired network, the dates and times when the rogue device was first and last reported, and the current status of the device. The Class Type text box shows the current classification for this rogue access point:
| ||||||
Step 4 | If you want to
change the classification of this device, choose a different classification
from the Class Type drop-down list.
| ||||||
Step 5 | From the Update
Status drop-down list, choose one of the following options to specify how the
controller should respond to this rogue access point:
The bottom of the page provides information on both the access points that detected this rogue access point and any clients that are associated to it. To see more details for any of the clients, click Edit to open the Rogue Client Detail page. | ||||||
Step 6 | Click Apply. | ||||||
Step 7 | Click Save Configuration. | ||||||
Step 8 | View any rogue clients that are connected to the controller by choosing Rogue Clients. The Rogue Clients page appears. This page shows the following information: the MAC address of the rogue client, the MAC address of the access point to which the rogue client is associated, the SSID of the rogue client, the number of radios that detected the rogue client, the date and time when the rogue client was last reported, and the current status of the rogue client. | ||||||
Step 9 | Obtain more details about a rogue client by clicking the MAC address of the client. The Rogue Client Detail page appears. This page provides the following information: the MAC address of the rogue client, the MAC address of the rogue access point to which this client is associated, the SSID and IP address of the rogue client, the dates and times when the rogue client was first and last reported, and the current status of the rogue client. | ||||||
Step 10 | From the Update
Status drop-down list, choose one of the following options to specify how the
controller should respond to this rogue client:
The bottom of the page provides information on the access points that detected this rogue client. | ||||||
Step 11 | Click Apply. | ||||||
Step 12 | If desired, you can test the controller’s connection to this client by clicking Ping. | ||||||
Step 13 | Click Save Configuration. | ||||||
Step 14 | See any ad-hoc
rogues detected by the controller by choosing
Adhoc Rogues. The
Adhoc Rogues page appears.
This page shows the following information: the MAC address, BSSID, and SSID of the ad-hoc rogue, the number of radios that detected the ad-hoc rogue, and the current status of the ad-hoc rogue. | ||||||
Step 15 | Obtain more
details about an ad-hoc rogue by clicking the MAC address of the rogue. The
Adhoc Rogue Detail page appears.
This page provides the following information: the MAC address and BSSID of the ad-hoc rogue, the dates and times when the rogue was first and last reported, and the current status of the rogue. | ||||||
Step 16 | From the Update Status drop-down list, choose one of the following options to specify how the controller should respond to this ad-hoc rogue: | ||||||
Step 17 | From the Maximum
number of APs to contain the rogue drop-down list, choose one of the following
options to specify the maximum number of access points used to contain this
ad-hoc rogue:
1,
2,
3, or
4.
The bottom of
the page provides information on the access points that detected this ad-hoc
rogue.
| ||||||
Step 18 | Click Apply. | ||||||
Step 19 | Click Save Configuration. | ||||||
Step 20 | View any access
points that have been configured to be ignored by choosing
Rogue AP
Ignore-List. The Rogue AP Ignore-List page appears.
This page shows the MAC addresses of any access points that are configured to be ignored. The rogue-ignore list contains a list of any autonomous access points that have been manually added to Cisco Prime Infrastructure maps by the users. The controller regards these autonomous access points as rogues even though the Prime Infrastructure is managing them. The rogue-ignore list allows the controller to ignore these access points. The list is updated as follows:
|
Step 1 | Create a rule
by entering this command:
config rogue rule add ap priority priority classify {friendly | malicious} rule-name If you later want to change the priority of this rule and shift others in the list accordingly, enter the config rogue rule priority priority rule-name command. If you later want to change the classification of this rule, enter the config rogue rule classify {friendly | malicious} rule-name command. If you ever want to delete all of the rogue classification rules or a specific rule, enter the {config rogue rule delete {all | rule-name} command. | ||||||
Step 2 | Create a rule by entering
these commands:
If you later want to change the priority of this rule and shift others in the list accordingly, enter the config rogue rule priority priority rule-name command. If you later want to change the classification of this rule, enter the config rogue rule classify {friendly | malicious | custom severity-score classification-name} rule-name command. If you ever want to delete all of the rogue classification rules or a specific rule, enter the {config rogue rule delete {all | rule-name} command. | ||||||
Step 3 | Configure the
state on the rogue AP upon rule match by entering this command:
config rogue rule state {alert | contain | internal | external} rule-name | ||||||
Step 4 | Configure the
notification upon rule match by entering this command:
config rogue rule notify {all | global | local | none} rule-name | ||||||
Step 5 | Disable all
rules or a specific rule by entering this command:
config rogue rule disable {all | rule_name}
| ||||||
Step 6 | Add conditions
to a rule that the rogue access point must meet by entering this command:
config rogue rule condition ap set condition_type condition_value rule_name The following condition types are available:
| ||||||
Step 7 | Specify whether a detected rogue access point must meet all or any of the conditions specified by the rule in order for the rule to be matched and the rogue access point to adopt the classification type of the rule by entering this command: | ||||||
Step 8 | Enable all rules
or a specific rule by entering this command:
config rogue rule
enable {all |
rule_name}
| ||||||
Step 9 | Add a new friendly access point entry to the friendly MAC address list or delete an existing friendly access point entry from the list by entering this command: | ||||||
Step 10 | Save your changes by entering this command: | ||||||
Step 11 | View the rogue classification rules that are configured on the controller by entering this command: show rogue rule summary | ||||||
Step 12 | View detailed information for a specific rogue classification rule by entering this command: |
View a list of all rogue access points detected by the controller by entering this command: show rogue ap summary
See a list of the friendly rogue access points detected by the controller by entering this command:
See a list of the malicious rogue access points detected by the controller by entering this command:
See a list of the unclassified rogue access points detected by the controller by entering this command:
See detailed information for a specific rogue access point by entering this command:
See the rogue report (which shows the number of rogue devices detected on different channel widths) for a specific 802.11a/n/ac radio by entering this command:
See a list of all rogue clients that are associated to a rogue access point by entering this command:
See a list of all rogue clients detected by the controller by entering this command:
See detailed information for a specific rogue client by entering this command:
See a list of all ad-hoc rogues detected by the controller by entering this command:
See detailed information for a specific ad-hoc rogue by entering this command:
See a summary of ad hoc rogues based on their classification by entering this command:
show rogue adhoc {friendly | malicious | unclassified} summary
See a list of rogue access points that are configured to be ignore by entering this command:
![]() Note | See the Viewing and Classifying Rogue Devices (GUI) section for more information on the rogue-ignore access point list. |
Classify a rogue access point as friendly by entering this command:
config rogue ap classify friendly state {internal | external} ap_mac_address
internal means that the controller trusts this rogue access point.
external means that the controller acknowledges the presence of this rogue access point.
![]() Note | A rogue access point cannot be moved to the Friendly class if its current state is Contain. |
Mark a rogue access point as malicious by entering this command:
config rogue ap classify malicious state {alert | contain} ap_mac_address
alert means that the controller forwards an immediate alert to the system administrator for further action.
contain means that the controller contains the offending device so that its signals no longer interfere with authorized clients.
![]() Note | A rogue access point cannot be moved to the Malicious class if its current state is Contain. |
Mark a rogue access point as unclassified by entering this command:
config rogue ap classify unclassified state {alert | contain} ap_mac_address
![]() Note | A rogue access point cannot be moved to the Unclassified class if its current state is Contain. alert means that the controller forwards an immediate alert to the system administrator for further action. contain means that the controller contains the offending device so that its signals no longer interfere with authorized clients. |
Choose the maximum number of access points used to contain the ad-hoc rogue by entering this command:
config rogue ap classify unclassified state contain rogue_ap_mac_address 1, 2, 3, or 4
1—Specifies targeted rogue access point will be contained by one access point. This is the lowest containment level.
2—Specifies targeted rogue access point will be contained by two access points.
3—Specifies targeted rogue access point will be contained by three access points.
4—Specifies targeted rogue access point will be contained by four access points. This is the highest containment level.
Specify how the controller should respond to a rogue client by entering one of these commands:
config rogue client alert client_mac_address—The controller forwards an immediate alert to the system administrator for further action.
config rogue client contain client_mac_address—The controller contains the offending device so that its signals no longer interfere with authorized clients.
Specify how the controller should respond to an ad-hoc rogue by entering one these commands:
config rogue adhoc alert rogue_mac_address—The controller forwards an immediate alert to the system administrator for further action.
config rogue adhoc contain rogue_mac_address—The controller contains the offending device so that its signals no longer interfere with authorized clients.
config rogue adhoc external rogue_mac_address—The controller acknowledges the presence of this ad-hoc rogue.
Configure the classification of ad hoc rogues by entering any one of these commands:
View a summary of custom rogue AP information by entering this command:
show rogue ap custom summary
See custom ad hoc rogue information by entering this command:
show rogue adhoc custom summary
Delete the rogue APs by entering this command:
config rogue ap delete {class | all | mac-addr}
Delete the rogue clients by entering this command:
config rogue client delete {state | all | mac-addr}
Delete the ad hoc rogues by entering this command:
config rogue adhoc delete {class | all | mac-addr}