MicroNugget: How to Contain Rogue Access Points in a WLAN

  Рет қаралды 23,097

CBT Nuggets

CBT Nuggets

Күн бұрын

Пікірлер: 10
@KeithBarker
@KeithBarker 11 жыл бұрын
Great questions. The documentation I was just reviewing (from Cisco's site) said that the rogue containment uses between 5-10 percent of the AP's performance, with a cap of 30%, but I didn't see specifics as to how often the flood of deauth messages would be sent. If the offending AP was in the same frequency bands as our production APs, then that could hurt performance, but the APs would be told to move to a new band (by the wlc) to avoid interference. Thanks for the questions, Keith
@ChrisGagnonDIY
@ChrisGagnonDIY 8 жыл бұрын
love all your videos. thanks for the micro nugget
@IhorSirishtan
@IhorSirishtan 9 жыл бұрын
Wonderful video. Superb information presentation. Really enjoyed it!
@armyguy298
@armyguy298 11 жыл бұрын
Keith, a couple questions. 1. At what interval do the "deauth" messages broadcast? 2. Could the additional noise affect network performance? Thanks for another great video!
@adedejiemmanuel1
@adedejiemmanuel1 4 жыл бұрын
Thanks for the video. Is a "Deauthenticatication attack" the same as the "Disassociation attack"?
@dg404null
@dg404null 3 жыл бұрын
very helpful
@markustoomiste4441
@markustoomiste4441 3 жыл бұрын
What I don't understand is that if you have an access point plugged into your network that isn't managed by the WLC, then how come you need to scan for it with your APs? Wouldn't it come up over the wired traffic?
@markustoomiste4441
@markustoomiste4441 3 жыл бұрын
If you can't distinguish a rogue AP over the wired traffic then how come after scanning for them with your APs you know which ones are a part of your network which ones are just adjacent networks' traffic reaching your APs' sensors.
@cbtnuggets
@cbtnuggets 3 жыл бұрын
Hi, Markus! Most of today's access points will have a specific port or protocol it uses to communicate with a wireless LAN controller. There are also times that you may not want it to be adopted into the main network. There might be additional configurations needed. If an additional AP was wired into the network, the vendor and protocols might be different and don't come up right away. The AP's working with the WLC can scan for neighboring AP's to help identify issues. It's best practice to also lock down the ports that are not in use. So if there is a port in the office that is not used regularly, you can do a few things like isolating it into an empty VLAN, and also set up port security to be notified of the connection. Hope that helps! Thank you for learning with us.
@markustoomiste4441
@markustoomiste4441 3 жыл бұрын
@@cbtnuggets Thanks for responding to a comment of a 7 year old video. Very impressive.
Rogue Access Point and Evil Twin
5:22
Sunny Classroom
Рет қаралды 36 М.
У ГОРДЕЯ ПОЖАР в ОФИСЕ!
01:01
Дима Гордей
Рет қаралды 8 МЛН
when you have plan B 😂
00:11
Andrey Grechka
Рет қаралды 60 МЛН
Blue Food VS Red Food Emoji Mukbang
00:33
MOOMOO STUDIO [무무 스튜디오]
Рет қаралды 37 МЛН
How to protect your Cisco network from Rogue DHCP server in 2023
15:25
IT Solutions Network
Рет қаралды 1,7 М.
Hunting and Tracking Rogue Radio Frequency Devices
49:39
RSA Conference
Рет қаралды 219 М.
How to know if your PC is hacked? Suspicious Network Activity 101
10:19
The PC Security Channel
Рет қаралды 1,3 МЛН
MicroNugget: How to Use "HSRP" for High Availability
9:57
CBT Nuggets
Рет қаралды 65 М.
MicroNugget: What is Netflow?
7:46
CBT Nuggets
Рет қаралды 116 М.
Cisco Access Point (AP) Modes
7:45
GD Networking Newbie
Рет қаралды 4,5 М.
Wireless Attacks Explained
10:17
CISO Global
Рет қаралды 10 М.
MicroNugget: What is DHCP Starvation Attack?
8:35
CBT Nuggets
Рет қаралды 11 М.
Wireshark Tutorial for Beginners | Network Scanning Made Easy
20:12
Anson Alexander
Рет қаралды 261 М.
У ГОРДЕЯ ПОЖАР в ОФИСЕ!
01:01
Дима Гордей
Рет қаралды 8 МЛН