Let’s consider a following situation – an employee brings his or her own Access Point into a well-secured environment and connects it to a wall socket. As a result anyone with a wireless-enabled device can now associate with the AP (or least a group of people that know the PSK if WEP/WPA was configured) and get access to our internal (wired) network. This is what’s known as a Rogue Access Point – in simple words we can say that Rogue AP is an AP that is not under our control. These Rogue APs can be a serious breach of network security because they can be plugged into a network port behind the corporate firewall and/or IPS.
I will now discuss one of the wireless security features available on WLC (so this will be Unified Wireless Architecture) that is used to detect and deal with Rogue devices. This is what’s collectively known as Rogue Management.
Read Full Entry »