Warning message

  • Cisco Support Forums is in Read Only mode while the site is being migrated.
  • Cisco Support Forums is in Read Only mode while the site is being migrated.

Manage the Rogue AP Detection List on the WAP125


Thu, 06/29/2017 - 19:00
Jun 28th, 2017
User Badges:

Cisco Support Community

Article ID: 5633


A Rogue Access Point (AP) is an access point that is installed on a secure network without the consent of the network administrator. Rogue APs can pose a security threat because anyone who installs a wireless router within the range of your network can potentially gain access to your network. The Rogue AP Detection page in the web-based utility of the AP provides information about the wireless networks that are within range.

This article aims to show you how to create, import, and backup or download an AP list on an access point.

Applicable Devices

  • WAP125

Software Version


Create Trusted AP List

Enable Rogue AP Detection

Step 1. Log in to the web-based utility of the access point and choose System Configuration > Security > Rogue AP Detection.

Step 2. Check the check boxes of the radio interfaces you want to enable Rogue AP detection. This is disabled by default.

Note: In this example, both radio interfaces are enabled.

Step 3. Click .

Create Trusted AP List

Step 4. Click the Rogue AP List tab.

The following information about the detected access points is displayed. The image below has been split into two.

  • MAC Address — The MAC address of the rogue AP.
  • Radio — The physical radio on the rogue AP that you can join.
  • Beacon Interval (Msec.) — The beacon interval that is used by the rogue AP. Every AP sends beacon frames at regular intervals to advertise the existence of their wireless network.
  • Type — The type of the detected device can be either AP or Ad hoc.
  • SSID — The Service Set Identifier (SSID) of the rogue AP, also known as the network name.
  • Privacy — Indicates whether or not security is enabled on the rogue AP. Off indicates that the rogue AP has no security enabled while On indicates that the rogue AP does have security measures enabled.

  • WPA — Indicates whether WPA security is enabled (On) or disabled (off) for the rogue AP.
  • Band — This is the IEEE 802.11 mode that is used on the rogue AP. It can be either 2.4 or 5.
  • Channel — Displays the channel that the detected AP is currently broadcasting on.
  • Rate — Shows the rate at which the detected AP current broadcasts in Mbps.
  • Signal — Shows the strength of the radio signal from the AP.
  • Beacons — Displays the total number of beacons received from the AP since it was first detected. Beacon frames are transmitted by an AP at a regular interval to announce the existence of the wireless network.
  • Last Beacon — Displays the date and time of the last beacon received from the AP.
  • Rates — Lists the supported and basic rates of the detected AP in megabits per second.

Step 5. If you trust or recognize an AP that was detected, check the check box of the entry. You can select more than one detected AP at a time.

Step 6. Click the Move to Trusted AP List button above the Detected Rogue AP List. This adds the corresponding AP to the Trusted AP List and removes it from the Detected Rogue AP List. Trusting an AP only adds it to the list and has no impact on the operation of the AP. The lists are an organizational tool that can be used to take further action.

View the Trusted AP List

Step 7. The Trusted AP List table is populated once an AP has been trusted. To view the entries, click the Trusted AP List button.

Step 8. (Optional) Check the check box of the applicable entry to move to the Rogue AP List. You can select more than one entry at a time.

Step 9. (Optional) Click the Move to Rogue AP List button. The entry is moved back to the Rogue AP list.

Download/Backup Trusted AP List

Step 10. In the Download/Backup Trusted AP List area, choose a radio button to either download an existing Trusted AP List configuration file to the AP from the computer or backup to download the list from the AP to the computer.

Note: In this example, Download (PC to AP) is chosen. If you chose Backup (AP to PC), skip to Step 13.

Step 11. In the Source File Name area, click on Browse… to select a file on your computer to download to the AP.

Note: For this example, Rogue2.cfg was chosen.

Step 12. In the File Management Destination area, choose a radio button to either replace or merge the file with the existing list. The options are

  • Replace — Replaces existing list of Rogue APs.
  • Merge — Merges existing list with a new list.

Note: For this example, Replace was chosen.

Step 13. Click .

You have now successfully created, backed up or downloaded, and imported a Trusted AP List on an Access Point.



This Document