×

Warning message

  • Cisco Support Forums is in Read Only mode while the site is being migrated.
  • Cisco Support Forums is in Read Only mode while the site is being migrated.

Rogue Management, Attack Detection and Threat Mitigation

Document

Wed, 10/07/2015 - 13:53
Jan 12th, 2012
User Badges:
  • Gold, 750 points or more



Introduction



Rogue Management, Attack Detection and Threat Mitigation




WLAN Security - Vulnerabilities and Threats




1.jpg




Cisco Rogue Management Diagram - Multiple Methods




2.jpg



Listening for Rogues - Two Different AP modes for RRM Scanning




3.jpg



RRM Channel Scanning


Local Mode AP




4.jpg



Monitor Mode AP



5.jpg



802.11n Rogue Detection



6.jpg



Rogue Classification Rules


Concept


7.jpg


Examples



8.jpg



Configuration



9.jpg



WCS Security Dashboard



10.jpg




Rogue Detector AP Mode



Concept


11.jpg




Example Deployment Scenario




12.jpg


Operation



13.jpg



Configuraiton



14.jpg



Rogue Location Discovery Protocol



Concept


15.jpg



Operation





16.jpg



Automatic Operation



17.jpg


Switchport tracing



Concept


18.jpg



Operation (Cont.)


19.jpg



Rogue Location


On-Demand With WCS



20.jpg



In Real-Time with WCS and MSE Context-Aware



21.jpg


Rogue Containment


Concept


22.jpg



Local Mode AP's



23.jpg



Monitor Mode APs



24.jpg



Auto-Containment Configuration



25.jpg


More Information


Best Practices For Outdoor Wireless Security


Wireless Virtual LAN Deployment Guide

Loading.

Actions

This Document

Related Content

 

 

Trending Topics - Security & Network