The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Description—Specifies the minimum RSSI value that rogues should have for APs to detect them and for the rogue entries to be created in the controller. Recommended value is –70 dBm. Clicking Fix it Now changes the minimum RSSI value that rogues should have to –80 dBm.
CLI Option—Set the minimum RSSI value that rogues should have by entering this command:
(Cisco Controller) >config rogue detection min-rssi rssi-in-dBm
case-check—Checks the occurrence of same character thrice consecutively
consecutive-check—Checks the default values or its variants are being used
default-check—Checks either username or its reverse is being used
all-checks—Enables/disables all the strong password checks
position-check—Checks four-character range from old password
case-digit-check—Checks all four combinations to be present: lower, upper, digits, and special characters
CLI Option—Enable all strong password policies by entering this command:
(Cisco Controller) >config switchconfig strong-pwd all-checks enable