![]() ![]() If the rogue access point is detected on the same wired network, the controller marks the rogue state as Threat and classifies ![]() The controller repeats the previous steps for all the rogue access points. If the rogue access point does not match any of the configured rules, the rogue remains unclassified. If the rogue access point matches the configured rules criteria, the controller classifies the rogue based on the classification If the rogue is classified differently, the controller reclassifies it automatically only if the rogue is If the rogue is already classified as Malicious, Alert or Friendly, Internal or External, the controller does not reclassify ![]() If the unknown access point is not in the friendly MAC address list, the controller starts applying the rogue classification If the unknown access point is in the friendly MAC address list, the controller classifies the access point as Friendly. When the controller receives a rogue report from one of its managed access points, it responds as follows: You can configure up to 64 rogue classification rules per controller. Rule-based rogue classification does not apply to ad hoc rogues and rogue clients. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |