Understanding Cisco Prime: Rogue Detection Explained

what constitutes a new rogue in cisco prime

Cisco Prime Infrastructure is a network management platform that offers a range of features, including rogue access point detection and mitigation. A rogue device is an unknown access point or client that is detected by managed access points in a network. These rogue access points can cause significant security concerns, including the potential for hackers to capture sensitive information. Cisco Prime allows users to receive new rogue access point notifications, monitor these points, and contain them by sending deauthentication and disassociation messages. Users can also configure rogue rules to define a set of conditions that mark a rogue as either malicious or friendly.

cycivic

Rogue device classification

Cisco Prime Infrastructure (PI) is a wireless network management solution that helps locate and classify rogue devices. A rogue device is an unknown access point or client detected by managed access points in your network. These rogue access points can disrupt wireless LAN operations and pose a security threat by hijacking legitimate clients and launching denial-of-service or man-in-the-middle attacks.

One method to classify rogue devices is through Mobility Group Updates, which help identify managed Cisco-based access points to prevent false positives. Additionally, RF neighbour packets and allowed lists of friendly access points via Prime Infrastructure aid in accurate rogue device classification.

Cisco Prime Infrastructure offers a graphical interface to navigate and view rogue details. By selecting "Monitor > Rogues", different classifications for rogues can be accessed, including "Friendly APs" and "Malicious APs". "Friendly APs" are marked as friendly by the administrator, while "Malicious APs" are identified as such via RLDP or Rogue Detector AP.

To further enhance rogue device classification, Cisco Prime Infrastructure provides the ability to monitor and contain rogue access points. This can be achieved by sending deauthenticate and disassociate messages to their clients, either individually or for all rogue access points connected to the enterprise subnet. Additionally, rogue access points can be acknowledged when they are outside the LAN and do not compromise security.

cycivic

Rogue detection

Rogue classification rules allow you to define a set of conditions that mark a rogue as either malicious or friendly. These rules are configured at the PI or the Wireless LAN Controller (WLC), but they are always performed on the controller as new rogues are discovered. If an unknown access point moves to the friendly state for the first time, the controller sends a trap to Cisco PI only if the rogue state is Alert. It does not send a trap if the rogue state is Internal or External. If a rogue entry is removed after the timeout expires, the controller sends a trap to Cisco PI for rogue access points that are categorized as Malicious (Alert, Threat) or Unclassified (Alert). The controller does not remove rogue entries with the following rogue states: Contained, Contained Pending, Internal, and External.

To find rogue details in a controller in the graphical interface, navigate to Monitor > Rogues. In this page, different classifications for rogues are available: Friendly APs – APs which are marked as friendly by the administrator; and Malicious APs – APs which are identified as malicious via RLDP or Rogue detector AP.

To access the Rogue AP Alarms page, perform a search for rogue APs or click on the Security dashboard from the Prime Infrastructure home page. This dashboard displays all the rogue access points detected in the past hour and the past 24 hours. You can also choose Monitor > Alarms and then choose New Search from the left sidebar menu. Choose Severity > All Severities and Alarm Category > Rogue AP, and click Go to access the Monitor Alarms > failure object page.

cycivic

Rogue alerts

Cisco Prime Infrastructure offers a range of tools to monitor and manage wireless networks, including rogue access point detection and alerts. A rogue device is an unknown access point or client that is detected by managed access points in your network. These rogue access points can be used by hackers to capture sensitive information, such as usernames and passwords, and can disrupt wireless LAN operations.

Cisco Prime Infrastructure provides alerts and notifications when new rogue access points are detected. These alerts can be configured and managed through the system's settings. When an unknown access point is detected for the first time, it is categorized as either malicious or friendly. If the rogue state is categorized as "Alert", a trap is sent to Cisco Prime Infrastructure. The system also provides an event history and logs rogues that are no longer detected.

To view rogue access point alerts, users can access the Rogue AP Alarms page. This page provides detailed information about the rogue access point, including its MAC address, the last time it was detected, and its status. Users can also view a list of rogue clients associated with the rogue access point. Additionally, Cisco Prime Infrastructure offers a map feature that displays a high-resolution map of the rogue access point's location.

To manage rogue alerts, users can configure rogue rules at the WLC's security tab. These rules allow users to define conditions that mark a rogue as either malicious or friendly. While disabling SNMP traps can reduce rogue warnings, it is not recommended as it may impact security. Instead, users can utilize the provided rogue rules to manage and tidy up the rogue alarms.

Cisco also offers a range of wireless LAN controllers and access points that work in conjunction with Cisco Prime Infrastructure to detect and mitigate rogue access points. These include the Cisco Unified Wireless LAN Controllers and Wave 1 and 2 APs.

cycivic

Rogue rules

Rogue classification rules enable users to define a set of conditions that categorise a rogue device as either malicious or friendly. These rules are configured at the PI (Prime Infrastructure) or the WLC (Wireless LAN Controller), and they are applied when new rogues are discovered. By customising these rules, network administrators can fine-tune their security measures to suit their specific requirements.

To prevent false positives, Cisco employs several methods to ensure that managed Cisco-based access points are not mistakenly identified as rogue devices. These methods include mobility group updates, RF neighbour packets, and allowed list friendly APs via PI. Additionally, the PI maintains an event history and logs rogues that are no longer detected, providing a comprehensive overview of network activity.

When an unknown access point transitions to the Friendly state for the first time, the controller sends a trap to Cisco Prime Infrastructure only if the rogue state is set to Alert. If the rogue entry is removed after the timeout, the controller sends a trap for rogue access points categorised as Malicious (Alert, Threat) or Unclassified (Alert). It is important to note that the controller does not remove rogue entries with certain states, including Contained, Contained Pending, Internal, and External.

Cisco Prime Infrastructure offers various features to help users monitor and manage rogue access points effectively. Users can receive real-time notifications about new rogue access points, eliminating the need for manual hallway scans. Additionally, users can contain rogue access points by sending deauthenticate and disassociate messages to their clients, preventing potential security breaches. Cisco Prime Infrastructure also provides tools to acknowledge, accept, and tag rogue access points based on their impact on LAN and WLAN security.

cycivic

Rogue access points

Cisco Prime Infrastructure (PI) is a network management platform that offers wireless network monitoring and management capabilities. One of its key features is the detection and mitigation of rogue access points (APs) to prevent security breaches and performance issues.

A rogue access point is an unknown or unauthorised device that connects to a network. In the context of Cisco Prime, a rogue AP is typically detected by managed access points within the network. These rogue devices can pose a significant security risk as they may be used to capture sensitive information, such as usernames and passwords, or to launch denial-of-service attacks.

Cisco Prime provides tools to locate and contain rogue access points. It offers the ability to receive notifications for new rogue APs, monitor them until they are eliminated or acknowledged, and identify the closest authorised access point to enhance the effectiveness of directed scans. Cisco Prime also provides a Rogue AP Alarms page, which offers various functionalities, including the ability to unacknowledge alarms, configure email notifications, view detecting access points, and access a high-resolution map of the rogue AP's location.

Rogue classification rules allow administrators to define conditions that categorise a rogue AP as either malicious or friendly. These rules are configured at the PI or the Wireless LAN Controller (WLC) and are applied when new rogues are discovered. Cisco Prime also employs Management Frame Protection (MFP) to authenticate 802.11 management frames and detect adversaries invoking attacks or attempting to interject as rogue access points.

Frequently asked questions

A rogue device is an unknown access point or client that is detected by managed access points in your network.

Cisco Prime Infrastructure uses Rogue Access Point rules to automatically classify rogue access points based on criteria such as authentication type, matching configured SSIDs, client count, and RSSI.

When a rogue device is detected, the Wireless LAN controller (WLC) gathers information about the device and sends a trap to Cisco Prime Infrastructure if the rogue state is Alert.

Written by
Reviewed by
Share this post
Print
Did this article help you?

Leave a comment