Rogue devices and detection
A rogue device is any unauthorized network device.
A rogue device can:
-
disrupt wireless LAN operations by hijacking legitimate clients,
-
facilitate attacks such as plaintext, denial-of-service, and man-in-the-middle attacks on wireless networks, and
-
pose serious security risks by allowing unauthorized access, interception, and breaches inside the corporate firewall.
Risks and impact on network security
Rogue access points are a common form of rogue devices. Hackers can use rogue access points to capture sensitive information such as usernames and passwords. By transmitting a series of Clear to Send (CTS) frames, a rogue access point can mimic a legitimate access point. This action instructs a specific client to transmit while forcing other clients to wait, which prevents legitimate clients from accessing network resources.
Ban rogue access points from the air space to protect users and maintain network integrity.
Because rogue access points are inexpensive and available, staff may connect unauthorized access points to existing LANs. This can create ad hoc wireless networks without approval from IT departments.
These rogue access points can create serious security risks because they may connect inside the corporate firewall. If security settings are disabled on these devices, unauthorized users can intercept network traffic and hijack client sessions. When wireless users connect to rogue access points within the enterprise network, the risk of a security breach increases.
Rogue client status change
The controller marks the rogue client as a threat if a wireless client in the RUN state has the same MAC address.
Restrictions on rogue detection
-
Rogue containment is not supported on DFS channels.
Rogue AP containment and attack signatures
A rogue AP containment and attack signature is a set of wireless network security mechanisms that
-
detect and contain unauthorized rogue wireless APs,
-
use automated or manual methods to select the best access point for containment actions, and
-
define specific attack signatures, including behaviors of rogue AP impersonators and new threats based on beacon frames.
Containment operation
A rogue access point is moved to a contained state either automatically or manually. The controller selects the best available access point (AP) for containment and pushes the containment information to it. Each AP stores its list of containments per radio.
For auto-containment, you can configure the controller to use only APs in monitor mode. Containment operations occur through two primary methods:
-
The container AP periodically reviews its containment list and sends unicast containment frames. For rogue AP containment, these are sent only if a rogue client is associated.
-
When the system detects contained rogue activity, the AP immediately transmits containment frames.
Individual rogue containment involves sending a sequence of unicast disassociation and deauthentication frames.
Attack signature examples
These signatures help identify sophisticated attack methods targeting wireless networks and support more effective containment and remediation strategies.
-
Beacon DS Attack —When managed and rogue APs use the same BSSID, the rogue APs are termed as impersonators. An attacker can add the Direct-Sequence parameter set information element with any channel number. If the added channel number is different from the channel number used by the managed AP, the attack is termed as Beacon DS Attack.
-
Beacon Wrong Channel —When managed and rogue APs use the same BSSID, the rogue APs are termed as AP impersonators. If an AP impersonator uses a channel number that is different from the one used by the managed AP with the same BSSID, the attack is termed as Beacon Wrong Channel. In such a case, the Direct-Sequence Information Element might not even be present in the Beacon frame.
Cisco Prime Infrastructure interaction and rogue detection
A rogue access point classification rule is a network security mechanism that
-
applies predefined criteria to evaluate and categorize access points detected on the network,
-
determines the current state of each detected access point (such as Friendly, Malicious, Internal, or External), and
-
defines when and how the controller communicates rogue events to Cisco Prime Infrastructure.
How Cisco Prime Infrastructure interacts with the controller for rogue detection
Cisco Prime Infrastructure interacts with controllers to detect and manage rogue access points according to the classification rules set on the controllers. The rule-based classification enables Cisco Prime Infrastructure to receive detailed trap notifications when rogue access point events occur. Key interactions and behaviors include:
-
The controller uses its configured classification rules to determine the state of each rogue access point.
-
When certain rogue access point events occur (such as state changes or rogue entry removal), the controller sends traps (notifications) to Cisco Prime Infrastructure.
-
Trap notifications depend on both the rogue state and the event type, including these cases:
-
If an unknown access point moves to the Friendly state for the first time and the rogue state is Alert, a trap is sent.
-
No trap is sent if the rogue state is Internal or External.
-
If a rogue entry is removed after timeout, the controller sends a trap for entries classified as Malicious (Alert, Threat) or Unclassified (Alert).
-
The controller does not remove rogue entries with the following states: Contained, Contained Pending, Internal, and External.
-
-
When a new, unknown access point is detected and moves to the Friendly state under Alert, Cisco Prime Infrastructure receives a notification.
-
If a rogue entry with a Malicious or Unclassified (Alert) state is removed after a timeout, a trap is generated and sent to Cisco Prime Infrastructure.
-
Rogue entries in Contained, Contained Pending, Internal, and External states are retained by the controller and not removed automatically, so no removal trap is sent for them.
Rogue containment (Protected Management Frames (PMF) enabled)
Starting with Cisco IOS XE 17.3.1, the system does not contain rogue devices enabled with 802.11w Protected Management Frames (PMF). Instead, the system marks the rogue device as Contained Pending, and raises a Web Security Appliance (WSA) alarm for the Contained Pending event. Skipping device containment prevents unnecessary use of AP resources.
Run the show wireless wps rogue ap detailed command to verify device containment when PMF is enabled on a rogue device.
![]() Note |
This feature is supported only on Wave 2 APs. |
AP impersonation detection
An AP impersonation is a wireless security attack that
-
allows a rogue device to masquerade as a legitimate AP
-
enables attackers to intercept and manipulate wireless communication between client devices and the network, and
-
threatens the confidentiality, integrity, and security of wireless network traffic.
Detection methods
The various methods to detect AP impersonation are:
-
You can detect AP impersonation if a managed AP reports itself as Rogue. This method is always enabled and does not require configuration.
-
AP impersonation detection uses Management Frame Protection (MFP).
-
AP impersonation detection uses AP authentication.
Management Frame Protection (MFP)-based detection
Infrastructure MFP protects 802.11 session management by adding Message Integrity Check (MIC) elements to management frames sent by APs (not clients). Other APs in the network then validate these management frames.
-
If infrastructure MFP is enabled, managed APs check whether the MIC elements are present and valid.
-
If either condition is not met, the managed AP sends rogue AP reports with an updated AP authentication failure counter field.
AP authentication-based detection
When you enable AP authentication, the controller creates an AP domain secret and shares it with all APs in the same network. This process enables APs to authenticate each other.
-
An AP authentication information element is attached to beacon and probe response frames.
-
If the AP authentication information element has an incorrect signature, an off timestamp, or the information element is missing, the AP that detects the condition increments the AP authentication failure count field.
-
An impersonation alarm is raised after the AP authentication failure count field exceeds its threshold.
-
The rogue AP is classified as Malicious with the state Threat.
Run the show wireless wps rogue ap detail command to see when AP impersonation is detected as a result of authentication errors.
Configuration notes
-
Run the CCX Aironet-IESupport command in all WLAN procedures to prevent the BSSID from being detected as a rogue.
-
For AP impersonation detection, Network Time Protocol (NTP) must be enabled under the AP profile. CAPWAP-based time is not sufficient.
Rogue detection security level
A rogue detection security level is a configuration preset that
-
determines the sensitivity and scope of rogue wireless device detection
-
restricts or allows configuration of specific detection parameters, and
-
provides predefined or customizable options for different deployment needs.
-
Rogue detection: identifies unauthorized or unknown wireless devices in a network environment.
-
Security level: specifies a preset combination of parameters for rogue detection.
The system provides four rogue detection security levels.
-
Critical: Provides basic rogue detection for highly sensitive deployments. Fixed configuration parameters ensure maximum security and consistency.
-
High: Provides basic rogue detection suitable for medium-scale environments. Several parameters are fixed to balance protection and operational simplicity.
-
Low: Provides basic rogue detection suitable for small-scale deployments. Fixed parameters provide easy management.
-
Custom: The default security level. You can fully configure all rogue detection parameters to suit any environment.
![]() Note |
To modify all parameters, select the Custom security level. The critical, high, and low levels have fixed settings. |
|
Parameter |
Critical |
High |
Low |
|---|---|---|---|
|
Cleanup Timer |
3600 seconds (1 hour) |
1200 seconds (20 minutes) |
240 seconds (4 minutes) |
|
AAA Validate Clients |
Disabled |
Disabled |
Disabled |
|
AAA Validate AP |
Disabled |
Disabled |
Disabled |
|
Adhoc Reporting |
Enabled |
Enabled |
Enabled |
|
Monitor Mode Report Interval |
10 seconds (0:10) |
30 seconds (0:30) |
60 seconds (1:00) |
|
Minimum RSSI |
-128 dBm |
-80 dBm |
-80 dBm |
|
Transient Interval |
600 seconds (10 minutes) |
300 seconds (5 minutes) |
120 seconds (2 minutes) |
|
Auto Contain This feature works only on Monitor Mode APs. |
Disabled |
Disabled |
Disabled |
|
Auto Contain Level |
1 |
1 |
1 |
|
Auto Contain Same SSID |
Disabled |
Disabled |
Disabled |
|
Auto Contain Valid Clients on Rogue AP |
Disabled |
Disabled |
Disabled |
|
Auto Contain Adhoc |
Disabled |
Disabled |
Disabled |
|
Containment Auto Rate |
Enabled |
Enabled |
Enabled |
|
Validate Clients with Cisco Connected Mobile Experiences (CMX) |
Enabled |
Enabled |
Enabled |
|
Containment FlexConnect |
Enabled |
Enabled |
Enabled |
You can configure all these parameters in the Custom security level.
-
A hospital implements the Critical security level to maintain rigorous control over rogue detection with fixed settings.
-
A small business chooses the Low security level for straightforward rogue detection with minimal configuration.
-
An enterprise IT team uses the Custom security level to tailor all rogue detection parameters to their unique requirements.
Set rogue detection security level (CLI)
Set the wireless rogue detection security level for your network deployment.
Before you begin
Use these steps to set the rogue detection security level.
Procedure
|
Step 1 |
Enter global configuration mode. Example:
|
|
Step 2 |
Configure the rogue detection security level to custom. Example:
|
|
Step 3 |
Configure the rogue detection security level for small-scale deployments. Example:
|
|
Step 4 |
Configure the rogue detection security level for medium-scale deployments. Example:
|
|
Step 5 |
Configure the rogue detection security level for highly sensitive deployments. Example:
|
The device applies the selected rogue detection security level to enhance wireless intrusion protection for your deployment.
Configuring rogue detection (GUI)
Enable rogue access point detection and set parameters in the GUI.
Use rogue detection to identify and manage unauthorized or suspicious APs in your network. Complete this task when you establish or update your wireless security policies.
Before you begin
Use these steps to configure rogue detection using the GUI:
Procedure
|
Step 1 |
Choose Configuration, then Tags and Profiles, then AP Join. |
|
Step 2 |
Click the AP Join Profile Name to edit the access point (AP) join profile properties. |
|
Step 3 |
In the Edit AP Join Profile window, click the Rogue AP tab. |
|
Step 4 |
Check the Rogue Detection check box to enable rogue detection. |
|
Step 5 |
In the Rogue Detection Minimum RSSI field, enter the RSSI value. |
|
Step 6 |
In the Rogue Detection Transient Interval field, enter the interval in seconds (minutes). |
|
Step 7 |
In the Rogue Detection Report Interval field, enter the report interval value in seconds (minutes). |
|
Step 8 |
In the Rogue Detection Client Number Threshold field, enter the threshold for rogue client detection. |
|
Step 9 |
Check the Auto Containment on FlexConnect Standalone check box to enable auto containment. |
|
Step 10 |
Click Update and Apply to Device. |
The rogue-detection feature is activated with your configured parameters. This helps you identify and contain unauthorized access points (APs) in the network.
Configure rogue detection (CLI)
You enable and customize rogue detection on Cisco wireless access points using specific CLI commands.
Use these commands to detect and contain unauthorized access points (APs) and improve wireless network security.
Before you begin
Use these steps to configure rogue detection.
Procedure
|
Step 1 |
Enter global configuration mode. Example:
|
||
|
Step 2 |
Set the minimum RSSI value for APs to detect rogues and create entries in the system. Example:
You can enter an RSSI value from –128 to –70 dBm. The default is –128 dBm.
|
||
|
Step 3 |
Choose a rogue containment option. Example:
The auto-rate option contains rogues automatically. The flex-rate option contains standalone FlexConnect APs. |
||
|
Step 4 |
Turn on rogue detection for all APs. Example:
|
||
|
Step 5 |
Set the interval for rogue reports on monitor mode APs. Example:
The valid range for the reporting interval is 10 to 300 seconds. If the controller detects thousands of rogue APs, the PUBD (Public Utility Bulletin Daemon) process may cause sustained high CPU usage. Increase the Rogue Detection Report Interval to a value higher than the default of 10 to resolve this issue. |
Rogue detection is active using your specified parameters on the AP profile. This improves security by monitoring and containing unauthorized devices.
Configure RSSI deviation notification threshold for rogue APs (CLI)
Set the signal strength deviation threshold to trigger notifications for rogue access points on your network.
Before you begin
Use these steps to configure the RSSI deviation notification threshold for rogue APs.
Procedure
|
Step 1 |
Enter global configuration mode. Example:
|
|
Step 2 |
Configure the RSSI deviation notification threshold for rogue APs. Example:
|
|
Step 3 |
Return the system to privileged EXEC mode. Example:
You can press Ctrl and Z to exit global configuration mode. |
The system notifies you when a rogue APs RSSI deviation exceeds the set threshold.
Configure management frame protection (GUI)
Enable and configure management frame protection (MFP) to secure wireless network communications against attacks such as rogue AP impersonation.
Before you begin
Use these steps to configure management frame protection.
Procedure
|
Step 1 |
Choose Configuration, then Security, then Wireless Protection Policies. |
|
Step 2 |
In the Rogue Policy tab, under the MFP Configuration section, check the Global MFP State check box to enable the global MFP state. |
|
Step 3 |
Check the AP Impersonation Detection check box to enable AP impersonation detection. |
|
Step 4 |
In the MFP Key Refresh Interval field, specify the refresh interval in hours. |
|
Step 5 |
Click Apply. |
Management frame protection is enabled and configured, providing enhanced security for wireless management frames.
Configure Management Frame Protection (CLI)
Configure Management Frame Protection (MFP) on a device using the command-line interface (CLI).
Before you begin
Use these steps to configure management frame protection.
Procedure
|
Step 1 |
Enter global configuration mode. Example:
|
|
Step 2 |
Configure management frame protection. Example:
|
|
Step 3 |
Configure AP impersonation detection or set the MFP key refresh interval in hours. Example:
key-refresh-interval: Set sthe MFP key refresh interval in hours. The valid range is one to 24 hours. The default value is 24 hours. |
|
Step 4 |
Save the configuration, exit configuration mode, and return to privileged EXEC mode. Example:
|
The device protects wireless management traffic according to the configured settings.
Enable AP authentication
Set up AP authentication on a wireless controller. This enhances network security by authenticating APs and by configuring threshold values for authentication failures.
Before you begin
Use these steps to enable AP authentication.
Procedure
|
Step 1 |
Enter global configuration mode. Example:
|
|
Step 2 |
Configure the wireless Wi-Fi Protected Setup (WPS) AP authentication. Example:
|
|
Step 3 |
Configure AP neighbor authentication and set the threshold for AP authentication failures. Example:
|
|
Step 4 |
Configure a WLAN. Example:
|
|
Step 5 |
Enable support for Aironet information elements on this Wireless Local Area Network (WLAN). Example:
|
|
Step 6 |
Return to privileged EXEC mode. Example:
|
AP authentication is enabled on the wireless controller. Authentication thresholds and Aironet IE support are configured for the specified WLAN.
Verify management frame protection
To verify if the Management Frame Protection (MFP) feature is enabled or not, use this command:
Device# show wireless wps summary
Client Exclusion Policy
Excessive 802.11-association failures : unknown
Excessive 802.11-authentication failures: unknown
Excessive 802.1x-authentication : unknown
IP-theft : unknown
Excessive Web authentication failure : unknown
Failed Qos Policy : unknown
Management Frame Protection
Global Infrastructure MFP state : Enabled
AP Impersonation detection : Disabled
Key refresh interval : 15
To view the MFP details, use this command:
Device# show wireless wps mfp summary
Management Frame Protection
Global Infrastructure MFP state : Enabled
AP Impersonation detection : Disabled
Key refresh interval : 15
Verify rogue events
To verify the rogue event history, run the show wireless wps rogue ap detailed command:
Device# show wireless wps rogue ap detailed
Rogue Event history
Timestamp #Times Class/State Event Ctx RC
-------------------------- -------- ----------- -------------------- ------------------------- ----
05/10/2021 13:56:46.657434 2 Mal/Threat FSM_GOTO Threat 0x0
05/10/2021 13:56:46.654905 1 Unk/Init EXPIRE_TIMER_START 240s 0x0
05/10/2021 13:56:46.654879 1 Unk/Init AP_IMPERSONATION DS:1,ch:1,band_id:0 0x0
05/10/2021 13:56:46.654673 1 Unk/Init RECV_REPORT 70db.98fc.2680/0 0x0
05/10/2021 13:56:46.654663 1 Unk/Init INIT_TIMER_START 180s 0x0
05/10/2021 13:56:46.654608 1 Unk/Init CREATE 0x0
Rogue BSSID : 002c.c8c1.096d
Last heard Rogue SSID : MarvellAP0d
802.11w PMF required : No
Is Rogue an impersonator : Yes
Beacon Wrong Channel : Yes
Beacon DS Attack : Yes
Is Rogue on Wired Network : No
Classification : Malicious
Manually Contained : No
State : Threat
First Time Rogue was Reported : 05/10/2021 13:56:46
Last Time Rogue was Reported : 05/10/2021 13:56:46
Number of clients : 0
Verify rogue detection
This section describes the new command for rogue detection.
These commands can be used to verify rogue detection on the device.
|
Command |
Purpose |
| show wireless wps rogue adhoc detailed mac_address |
Displays the detailed information for an Adhoc rogue. |
|
show wireless wps rogue adhoc summary |
Displays a list of all Adhoc rogues. |
|
Command |
Purpose |
| show wireless wps rogue ap clients mac_address |
Displays the list of all rogue clients associated with a rogue. |
|
show wireless wps rogue ap custom summary |
Displays the custom rogue AP information. |
|
show wireless wps rogue ap detailed mac_address |
Displays the detailed information for a rogue AP. |
|
show wireless wps rogue ap friendly summary |
Displays the friendly rogue AP information. |
|
show wireless wps rogue ap list mac_address |
Displays the list of rogue APs detected by a given AP. |
|
show wireless wps rogue ap malicious summary |
Displays the malicious rogue AP information. |
|
show wireless wps rogue ap summary |
Displays a list of all Rogue APs. |
|
show wireless wps rogue ap unclassified summary |
Displays the unclassified rogue AP information. |
|
Command |
Purpose |
| show wireless wps rogue auto-contain |
Displays the rogue auto-containment information. |
|
Command |
Purpose |
| show wireless wps rogue rule detailed rule_name |
Displays the detailed information for a classification rule. |
|
show wireless wps rogue rule summary |
Displays the list of all rogue rules. |
|
Command |
Purpose |
| show wireless wps rogue stats |
Displays the rogue statistics. |
|
Command |
Purpose |
| show wireless wps rogue client detailed mac_address |
Displays detailed information for a Rogue client. |
| show wireless wps rogue client summary |
Displays a list of all the Rogue clients. |
|
Command |
Purpose |
| show wireless wps rogue ignore-list |
Displays the rogue ignore list. |
Examples: rogue detection onfiguration
Device# configure terminal
Device(config)# ap profile profile1
Device(config)# rogue detection min-rssi -100
Device(config)# end
Device# show wireless wps rogue client summary/show wireless wps rogue ap summary
Device# configure terminal
Device(config)# ap profile profile1
Device(config)# rogue detection min-transient-time 500
Device(config)# end
Device# show wireless wps rogue client summary/show wireless wps rogue ap summary
Configure rogue policies (GUI)
Use this task to define and customize rogue wireless protection policies. These policies help the system detect and respond to unauthorized wireless activity.
Before you begin
Perform the steps in this section to configure rogue policies.
Procedure
|
Step 1 |
Choose Configuration, then Security, then Wireless Protection Policies. |
|
Step 2 |
In the Rogue Policies tab, select the security level from the Rogue Detection Security Level drop-down. |
|
Step 3 |
In the Expiration timeout for Rogue APs field, enter the timeout value in seconds. |
|
Step 4 |
Select the Validate Rogue Clients against AAA check box to validate rogue clients using the AAA server. |
|
Step 5 |
Select the Validate Rogue APs against AAA check box to validate rogue access points using the AAA server. |
|
Step 6 |
In the Rogue Polling Interval field, enter the interval in seconds at which the system polls the AAA server for rogue information. |
|
Step 7 |
Select the Detect and Report Adhoc Networks check box to enable detection of rogue ad hoc networks. |
|
Step 8 |
In the Rogue Detection Client Number Threshold field, enter the number of clients at which the system generates an SNMP trap. |
|
Step 9 |
In the Auto Contain section, enter these details. |
|
Step 10 |
Select the containment level from the Auto Containment Level drop-down. |
|
Step 11 |
Select the Auto Containment only for Monitor Mode APs check box to limit automatic containment to monitor-mode APs. |
|
Step 12 |
Select the Using our SSID check box to limit automatic containment to rogue APs that use an SSID that is configured on the controller. |
|
Step 13 |
Select the Adhoc Rogue AP check box to enable automatic containment for ad hoc rogue APs. |
|
Step 14 |
Click Apply. |
The system updates rogue policies to enhance detection and containment of unauthorized wireless threats according to your configuration.
Configure rogue policies (CLI)
Before you begin
Ensure you have access to the device's global configuration mode.Procedure
|
Step 1 |
Enter global configuration mode. Example:
Enters global configuration mode. |
||
|
Step 2 |
Configure the rogue detection security level. Example:
You can set the security-level to be critical for highly sensitive deployments, custom for customizable security level, high for medium-scale deployments, and low for small-scale deployments. |
||
|
Step 3 |
Configure the expiration time for rogue entries. Example:
Valid range for the time in seconds is 240 seconds to 3600 seconds. |
||
|
Step 4 |
Configure the use of AAA or local database to detect valid MAC addresses. Example:
Configures the use of AAA or local database to detect valid MAC addresses. |
||
|
Step 5 |
Configure the use of MSE to detect valid MAC addresses. Example:
Configures the use of MSE to detect valid MAC addresses. |
||
|
Step 6 |
Configure the minimum RSSI notification threshold for rogue clients. Example:
Valid range for the RSSI threshold in dB is -128 dB to -70 dB. |
||
|
Step 7 |
Configure the RSSI deviation notification threshold for rogue clients. Example:
Valid range for the RSSI threshold in dB is 0 dB to 10 dB. |
||
|
Step 8 |
Configure the use of AAA or local database to classify rogue AP based on rogue AP MAC addresses. Example:
Configures the use of AAA or local database to classify rogue AP based on rogue AP MAC addresses. |
||
|
Step 9 |
Configure rogue AP AAA validation interval. Example:
The valid range for the AP AAA interval in seconds is 60 seconds to 86400 seconds. |
||
|
Step 10 |
Enable detecting and reporting adhoc rogue (IBSS). Example:
Enables detecting and reporting adhoc rogue (IBSS). |
||
|
Step 11 |
Configure the rogue client per a rogue AP SNMP trap threshold. Example:
The valid range for the threshold is 0 to 256. |
||
|
Step 12 |
Configure the init timer for rogue APs. Example:
The default timer value is set to 180 seconds.
|

Feedback