With this new functionality, these new rogue AP types are introduced:
Malicious AP: A detected AP that matches user-defined Malicious rules or has been manually moved from Friendly APs.
Friendly AP: Existing known, Acknowledge, and Trust Missing Rogue states are classified as Friendly. In addition, detected APs that match user-defined Friendly rules are classified as Friendly. Friendly APs cannot be contained.
Unclassified AP: A detected AP that did not match the Malicious or Friendly rules. An Unclassified AP can be contained. An Unclassified AP can be manually moved to Friendly by the user. User-defined rules to automatically move Unclassified AP to Friendly or Malicious, for example, on detection, the SSID is empty. On the next rogue report, a SSID is found, and it turns out to be a user-configured SSID.
You specify Malicious Rogue AP's as part of classifications as the others have mentioned. Rogues are any 802.11 APs that are not part of your network. You can't just block these... That is why you can create these rules to classify these rogue APs. Take a look at the link that was posted earlier.
Transferring Crash file from standby: Login to the Active WLC in HA.
From CLI: (Cisco Controller) >transfer upload datatype crash (Cisco
Controller) >transfer upload filename (Cisco
Controller) >transfer upload mode tftp (Cisco Controller) >transfer
This is the start of a display filter cross reference between Wireshark
and OmniPeek. The 1st installment is a table of advanced filters. More
filters will be added as time allows. It is a living doc, so check back
for changes every so often Please feel f...
I have created a Powershell script to automatically add a Wireless Guest
User on Cisco WLCs. (tested on 2500 Series) The script should be
completely self explanatory. Prerequisites: Powershell SNMP Module
(Install-Module -Name SNMP) SNMP Write Access to y...