Specifications
About Rogues and RF Detection
RoamAbout Mobility System Software Configuration Guide 22-3
AnemptypermittedSSIDlistorpermittedvendorlistimplicitlyallowsallSSI Dsorvendors.
However,whenyouaddanentrytotheSSIDorvendorlist,allSSIDsorvendorsthatarenotin
thelistareimplicitlydisallowed.Anempty clientblacklistimplicitlyallowsallclients,andan
emptyignorelistimplicitlyconsidersallthird‐partywirelessdevicestobepotentialrogues.
Allthelistsexcepttheblacklistrequiremanualconfiguration.Youcanconfigureentriesinthe
blacklistandMSSalsocanplaceaclientintheblacklistduetoanassociation,reassociationor
disassociation
floodfromtheclient.
Therogueclassificationalgorithmexamineseachoftheselistswhendeterminingwhethera
deviceisarogue.Figure 22‐1onpage 22‐3showshowtheroguedetectionalgorithmusesthelists.
Figure 22-1 Rogue Detection Algorithm
AP radio detects wireless packet.
No
Yes
Yes
Source MAC in
SSID in Permitted
Ignore List?
Device is not a threat.
SSID List?
Yes
OUI in Permitted
Vendor List?
No
Source MAC in
Attack List?
No
Generate an alarm.
Classify device as a rogue.
No
Yes
Issue countermeasures
(if enabled).
No
Rogue classification
Yes
algorithm deems the
device to be a rogue?