How to configure detection and containment against rogue devices on WLAN devices

After the detection and containment function are configured on an AC and a Fat AP, the monitor AP can identify rogue APs and then use rogue APs' identity information to broadcast Deauthentication frames. After STAs associating with the rogue APs receive the Deauthentication frames, they disassociate from the rogue APs. The containment function prevents STAs from associating with the rogue APs.
- For V200R003 and V200R005, you can perform the following steps on the AC to configure detection and containment against rogue devices:
1. Run the ap ap-id radio radio-id command in the WLAN view to display the radio view for a specified AP. The variable ap-id specifies the AP ID, and radio-id specifies the radio ID.
2. Run the work-mode{ hybrid | monitor } command in the radio view to set the AP working mode to hybrid or monitor.
3. Run the device detect enable command in the radio view to enable the wireless device detection function on the AP.
4. Run the countermeasures enable command in the radio view to enable containment against rogue devices.
5. Run the countermeasures mode rogue { all | ap spoof-ssid | client [ blacklist ] | adhoc } command in the radio view to set containment against rogue
devices.
6. Run the quit command to return to the WLAN view.
7. Run the commit { all | ap ap-id } command in the WLAN view to deliver configurations to the APs.
- For V200R003 and V200R005, you can perform the following steps on Fat APs to configure detection and containment against rogue devices:
1. Run the interface wlan-radio wlan-radio-number command in the system view to display the radio interface view. The variable wlan-radio-number specifies the radio interface.
2. Run the work-mode{ hybrid | monitor } command in the radio interface view to set the AP working mode to hybrid or monitor.
3. Run the device detect enable command in the radio interface view to enable the wireless device detection function on the AP.
4. Run the countermeasures enable command in the radio interface view to enable containment against rogue devices.
5. Run the countermeasures mode rogue { all | ap spoof-ssid | client [ blacklist ] | adhoc } command in the radio interface view to set containment against rogue
devices.

Scroll to top