cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1835
Views
13
Helpful
6
Replies

AP Containment

mark.cronin
Level 2
Level 2

Need Clarification

Can the AP containment feature on

CUWN 4.2 be automated to contain rogue APs that are advertising your SSID or is this a manual procedure.

Can the new Cisco mobilty service engine IDS/IPS system do this automatically?

Can Air defense / Air tight / Air Magnet do this?

Mark

1 Accepted Solution

Accepted Solutions

If this resolves your post, can you tick "resolved"? Thanks.

View solution in original post

6 Replies 6

Leo Laohoo
Hall of Fame
Hall of Fame

Containment of Rogue AP can only be done manually. Auto Containment of "Rogue on Wire" and/or "AdHoc Rogue AP", on the other hand, is turned off by default. To enable this feature, go to Security -> Wireless Protection Policies -> Rogue Policies -> General.

Does this help?

Yes this does help, but I am more concerned with our wireless clients trying to connect to

a rogue AP advertising our SSID, the rogue may or may not be wired in to our LAN. My thoughts are that to rely on manual AP containment is slightly risky as it requires a member of the support staff to look at the WCS logging.

My hopes are that the new Cisco mobility services IDS/IPS offering will automate this.

Thanks for you answers

Mark

If you are concerned about clients connecting to a Rogue AP with the same SSID (aka "Honeypot"), the WLC/WCS will flag this alarm.

One of the logic why this is not incorporated into the automation is the risk associated that "somebody" in the organization may have innocently setup their very-own AP for company use without telling everyone. There's also a risk of your organization if the WLC/WCS will attack legitimate AP it considers as "Rogue".

True, IPS/IDS will do the trick, but I've been doing this for the past 2 years and I'd rather be the one to throw the switch for the WLC/WCS to contain a possible Rogue AP than let the machine do it for you.

For instance, I saw a a firmware bug where an AP was flagged by the WLC and the WCS as a suspected Honeypot. Upon closer inspection, the so-called Honeypot is an AP register to the same WLC and therefore legitimate.

In my humble opinion ...

looks like I need to convince the support staff to look at the logs

If this resolves your post, can you tick "resolved"? Thanks.

here is some further info on rogue containment

http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a0080722d8c.shtml

"Satisfaction does not come from knowing the solution, it comes from knowing why." - Rosalind Franklin
___________________________________________________________
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card