Cisco DNA Center Quick Start Guide

Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 First Published: 2021-08-04 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version. Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2021 Cisco Systems, Inc. All rights reserved. CONTENTS CHAPTER 1 Cisco DNA Center Rogue Management and aWIPS Application 1 Introduction to Rogue Management and aWIPS Application 1 About Rogue Management 2 About Advanced Wireless Intrusion Prevention System 4 Scale Information 7 Basic Setup Workflow 7 Related Documentation 8 CHAPTER 2 Install Cisco DNA Center Rogue Management Application Package 11 Application Management 11 Download and Install the Rogue and aWIPS Application Package on Cisco DNA Center 11 CHAPTER 3 Monitor the Rogue and aWIPS Dashboard 13 Access the Rogue Management and aWIPS Application 13 Monitor the Rogue Management and aWIPS Dashboard 13 Obtain Rogue AP and Rogue Client Details from the Threat 360° View 17 Download aWIPS Profile Forensic Capture from the Threat 360° View 20 CHAPTER 4 aWIPS Profiles 21 About aWIPS Profiles 21 Prerequisites 22 Create an aWIPS Profile Configuration Workflow 22 View aWIPS Profiles 24 Assign an aWIPS Profile to the Network Device 25 Edit an aWIPS Profile 26 Delete an aWIPS Profile 26 Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 iii Contents Enable or Disable aWIPS in Network Settings 27 CHAPTER 5 Rogue AP Containment on Wired and Wireless Network 29 Rogue AP Containment Overview 29 Wired Rogue AP Containment 30 Wireless Rogue AP Containment 31 Cisco Rogue AP Containment Actions Compatibility Matrix 33 View Tasks and Audit Logs of Rogue AP Containment 34 CHAPTER 6 Custom Classification of Rogue Access Points 35 About Allowed List Workflow 35 Set Up the Allowed List Workflow 36 About Custom Rogue Rule Creation 37 Edit a Rogue Rule 37 Delete a Rogue Rule 38 Create a Custom Rogue Rule 38 About Rogue Rule Profile 39 Edit a Rogue Rule Profile 40 Delete a Rogue Rule Profile 40 Create a Rogue Rule Profile 40 About Allowed Vendor List 41 View Vendor Rule List Information 42 Edit a Vendor Rule 42 Delete a Vendor Rule 42 Create a List of Allowed Vendors 43 CHAPTER 7 Rogue and aWIPS Event Notifications 45 Rogue and aWIPS Event Notifications 45 Rogue Events 45 aWIPS Events 47 Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 iv CHAPTER 1 Cisco DNA Center Rogue Management and aWIPS Application • Introduction to Rogue Management and aWIPS Application, on page 1 • About Rogue Management, on page 2 • About Advanced Wireless Intrusion Prevention System, on page 4 • Scale Information, on page 7 • Basic Setup Workflow, on page 7 • Related Documentation, on page 8 Introduction to Rogue Management and aWIPS Application Note In earlier versions of Cisco DNA Center, Rogue Management capabilities were provisioned as a part of Device Controllability. After a Cisco DNA Center upgrade, the provisioned Rogue Management subscriptions are not automatically removed from previously discovered Cisco Wireless Controller. Rogue Management detection might be reported inconsistently on newly discovered wireless controller. The Rogue Management application is an optional package that you can install on Cisco Digital Network Architecture (DNA) Center. Operating within Cisco DNA Center, the Rogue Management application helps you monitor threats from unauthorized access points (APs). You can access the Rogue Management functionality as a dashboard within Cisco DNA Assurance in the Cisco DNA Center GUI. Because the Cisco Advanced Wireless Intrusion Prevention System (aWIPS) is integrated with Cisco DNA Center, you can monitor the aWIPS signatures within the Rogue and aWIPS dashboard. This guide describes how to activate the Rogue and aWIPS application package on Cisco DNA Center. This guide also explains prerequisites and configurations, describes how to monitor the Rogue and aWIPS dashboard, and offers important notes and limitations. The Rogue Management application supports the following Cisco AireOS Controller models running Cisco AireOS Release 8.8.111.0 or later. • Cisco 3504 Wireless Controller • Cisco 5520 Wireless Controller • Cisco 8540 Wireless Controller Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 1 Cisco DNA Center Rogue Management and aWIPS Application About Rogue Management • Cisco Mobility Express The following Cisco Catalyst 9800 Series Wireless Controller models support the Rogue Management application: • Cisco Catalyst 9800 Embedded Wireless Controller for Catalyst 9300 Series Switches • Cisco Catalyst 9800-40 Wireless Controller • Cisco Catalyst 9800-80 Wireless Controller • Cisco Catalyst 9800-CL Cloud Wireless Controller • Cisco Catalyst 9800-L Wireless Controller • Cisco Embedded Wireless Controller on Catalyst Access Points The aWIPS supports Cisco Catalyst 9800 Series Wireless Controller Release 17.1.x, 17.2.x, and 17.3.x Cisco Catalyst 9100 Series Access Points, and Cisco 802.11ac Wave 2 Aironet Access Points. The following Cisco Catalyst 9800 Series Wireless Controller models support the aWIPS application: • Cisco Catalyst 9800 Embedded Wireless Controller for Catalyst 9300 Series Switches • Cisco Catalyst 9800-40 Wireless Controller • Cisco Catalyst 9800-80 Wireless Controller • Cisco Catalyst 9800-CL Cloud Wireless Controller • Cisco Catalyst 9800-L Wireless Controller • Cisco Embedded Wireless Controller on Catalyst Access Points About Rogue Management The Rogue Management application in Cisco DNA Center detects and classifies threats and enables network administrators, network operators, and security operators to monitor network threats. Cisco DNA Center helps in quickly identifying the highest-priority threats and allows you to monitor these threats in the Rogue and aWIPS dashboard within Cisco DNA Assurance. A rogue device is an unknown AP or client that is detected by the managed APs in your network. A rogue AP can disrupt wireless LAN operations by hijacking legitimate clients. A hacker can use a rogue AP to capture sensitive information, such as usernames and passwords. The hacker can then transmit a series of clear-to-send (CTS) frames. This action mimics an AP informing a particular client to transmit, while instructing all the others to wait. This results in legitimate clients not being able to access network resources. Therefore, wireless LAN service providers have a strong interest in banning rogue APs from air space. Because rogue APs are inexpensive and readily available, employees sometimes plug unauthorized rogue APs into the existing LANs and build ad hoc wireless networks without the knowledge or consent of the IT department. These rogue APs can be a serious breach of network security when they are plugged into a network port behind the corporate firewall. Because employees generally do not enable any security settings on a rogue AP, it is easy for unauthorized users to use the AP to intercept network traffic and hijack client sessions. Even more alarming is that wireless users frequently publish insecure AP locations, which increases the odds of having enterprise security breaches. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 2 Cisco DNA Center Rogue Management and aWIPS Application About Rogue Management Cisco DNA Center constantly monitors all the nearby APs and automatically discovers and collects information about rogue APs. When Cisco DNA Center receives a rogue event from a managed AP, it responds as follows: • If the unknown AP is not managed by Cisco DNA Center, Cisco DNA Center applies the rogue classification rules. • If the unknown AP is not using the same SSID as your network, Cisco DNA Center verifies whether the AP is connected to the corporate wired network and extends to the wired network. If the rogue AP is physically connected to the switch port of the corporate network, Cisco DNA Center classifies the AP as Rogue on wire. Cisco switches managed by Cisco DNA Center are required for rogue on wire to work. Note There is a scenario in which an AP that is not rogue on wire may incorrectly get classified as rogue on wire by Cisco DNA Center. This incorrect classification happens when a rogue client roams from a rogue-on-wire AP to a nonrogue-on-wire AP. A new rogue client report with the new rogue AP information is received and a host entry for the client is available on Cisco DNA Center before the deletion of the rogue client information. This happens because it takes some time for the rogue client switch port details to get deleted on the switch and synchronized with Cisco DNA Center. Therefore, the new rogue AP that the client roamed to is classified as rogue on wire before the synchronization happens. • If the AP is unknown to Cisco DNA Center, and is using the same SSID as your network, Cisco DNA Center classifies the AP as Honeypot. Note • The detected SSID that was earlier classified as Honeypot is not retained in the backup. Therefore, after a restore operation, the SSID is not classified as Honeypot. • Even if the SSID is deleted from the wireless controller, the SSID is still classified as Honeypot on Cisco DNA Center. The Honeypot classification does not happen when the detected SSID is not restored back on Cisco DNA Center when the Cisco DNA Center backup is restored. • If the unknown AP is not using the same SSID as your network and is not connected to the corporate network, Cisco DNA Center verifies whether it is causing any interference. If it is, Cisco DNA Center classifies the AP as Interferer and marks the rogue state as Potential Threat. The threshold level for classifying the interferers on the network is greater than -75 dBm. • If the unknown AP is not using the same SSID as your network, and is not connected to the corporate network, Cisco DNA Center verifies whether it is a neighbor. If it is a neighbor, Cisco DNA Center classifies the AP as Neighbor and marks the rogue state as Informational. The threshold level for classifying the rogue AP as a neighbor AP is less than or equal to -75 dBm. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 3 Cisco DNA Center Rogue Management and aWIPS Application About Advanced Wireless Intrusion Prevention System About Advanced Wireless Intrusion Prevention System The Cisco Advanced Wireless Intrusion Prevention System (aWIPS) is a wireless intrusion threat detection and mitigation mechanism. aWIPS uses an advanced approach to wireless threat detection and performance management. An AP detects threats and generates alarms. It combines network traffic analysis, network device and topology information, signature-based techniques, and anomaly detection to deliver highly accurate and complete wireless threat prevention. With a fully infrastructure-integrated solution, you can continually monitor wireless traffic on both wired and wireless networks and use that network intelligence to analyze attacks from many sources to pinpoint accurately, and proactively prevent attacks, rather than wait until damage or exposure has occurred. As the aWIPS functionality is integrated into Cisco DNA Center, the aWIPS can configure and monitor WIPS policies and alarms and report threats. aWIPS supports the following capabilities: • Static signatures • Standalone signature detection • Alarms • Static signature file packaged with controller and AP image Cisco DNA Center supports the following signatures that detect various denial of service (DoS) attacks: • Authentication flood: A form of denial of service (DoS) attack that floods an APs client-state table (association table) by imitating many client stations (MAC address spoofing), and sending authentication requests to the AP. Upon reception of each individual authentication request, the target AP creates a client entry in State 1 of the association table. If open system authentication is used for the AP, the AP returns an authentication success frame and moves the client to State 2. If Shared Key Authentication (SHA) is used for the AP, the AP sends an authentication challenge to the attacker's imitated client, which does not respond, and the AP keeps the client in State 1. In either of these scenarios, the AP contains multiple clients hanging in either State 1 or State 2, which fills up the AP association table. When the table reaches its limit, legitimate clients are not able to authenticate and associate with this AP. • Association flood: A form of DoS attack that aims to exhaust an AP's resources, particularly the client association table, by flooding the AP with many spoofed client associations. An attacker using such a vulnerability can emulate many clients to flood a target AP's client association table by creating many clients. When the client association table overflows, legitimate clients cannot get associated. • CTS Flood: A form of DoS attack when a specific device sends a bulk CTS control packet to wireless devices sharing same RF medium and it blocks wireless devices from using RF medium until CTS flood stops. • RTS Flood: A form of DoS attack when a specific device sends a bulk RTS control packet to AP for blocking wireless bandwidth that leads to performance disturbance for clients on that AP. • Broadcast Probe: A form of DoS attack when a specific device tries to flood a managed AP with broadcast probe requests. • Disassociation Flood: A form of DoS attack that aims to send an AP to the unassociated or unauthenticated State 2 by spoofing disassociation frames from the AP to a client. With client adapter implementations, this form of attack is effective and immediate for disrupting wireless services against this client. Typically, Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 4 Cisco DNA Center Rogue Management and aWIPS Application About Advanced Wireless Intrusion Prevention System client stations reassociate to regain service until the attacker sends another disassociation frame. An attacker repeatedly spoofs the disassociation frames to keep the client out of service. • Disassociation Broadcast: A form of DoS attack when a specific device triggers disassociation broadcast to disconnect all clients. This attack aims to send an AP's client to the unassociated or unauthenticated State 2 by spoofing disassociation frames from the AP to the broadcast address of all the clients. With current client adapter implementations, this form of attack immediately disrupts wireless services against multiple clients. Typically, client stations reassociate to regain service until the attacker sends another disassociation frame. An attacker repeatedly spoofs the disassociation frames to keep all the clients out of service. • Deauthentication flood: A form of DoS attack that aims to send an AP's client to the unassociated or unauthenticated State 1 by spoofing deauthentication frames from the AP to the client unicast address. With the current client-adapter implementations, this form of attack immediately disrupts wireless services against the client. Typically, client stations reassociate and reauthenticate to regain service until the attacker sends another deauthentication frame. An attacker repeatedly spoofs the deauthentication frames to keep all the clients out of service. • Deauthentication broadcast: A form of DoS attack that sends all the clients of an AP to the unassociated or unauthenticated State 1 by spoofing deauthentication frames from the AP to the broadcast address. With client adapter implementation, this form of attack immediately disrupts wireless services against multiple clients. Typically, client stations reassociate and reauthenticate to regain service until the attacker sends another deauthentication frame. • EAPOL logoff flood: A form of DoS attack when a specific device tries to send Extensible Authentication Protocol over LAN (EAPOL) logoff packets, which are used in the WPA and WPA2 authentication for (DoS). Because the EAPOL logoff frame is not authenticated, an attacker can potentially spoof this frame and log out a user from an AP, thus committing a DoS attack. The fact that the client is logged out from the AP is not obvious until the client attempts communication through the WLAN. Typically, the disruption is discovered and the client reassociates and authenticates automatically to regain the wireless connection. The attacker can continuously transmit the spoofed EAPOL-logoff frames. • Airdrop Session: Airdrop session attack happens when an AirDrop, which is an Apple feature is used to set up a peer-to-peer link for file sharing. This potentially creates a security risk due to the unauthorized peer-to-peer network being dynamically created in your WLAN environment. • Authentication Failure Flood: Authentication failure flood attack happens when a specific device tries to flood the AP with invalid authentication requests spoofed from a valid client leading to the disconnection. • Beacon Flood: A form of DoS attack that allows an attacker to inhibit wireless activity for the entire enterprise infrastructure by preventing new associations between valid APs and stations. During a beacon flood attack, stations that are actively seeking a network are bombarded with beacons from networks-generated using different MAC addresses and SSIDs. This flood can prevent a valid client from detecting the beacons sent by the corporate APs, and hence a denial of service attack is initiated. • Block Ack Flood: A form of DoS attack that allows an attacker to prevent an 802.11n AP from receiving frames from a specific valid corporate client. With the introduction of the 802.11n standard, a transaction mechanism was introduced which allows a client to transmit a large block of frames at once, rather than dividing them up into segments. In order to initiate this exchange, the client sends an Add Block Acknowledgment (ADDBA) to the AP, which contains sequence numbers to inform the AP of the size of the block being transmitted. The AP then accepts all frames that fall within the specified sequence Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 5 Cisco DNA Center Rogue Management and aWIPS Application About Advanced Wireless Intrusion Prevention System (consequently dropping any frames that fall outside of the range) and transmits a BlockACK message back to the client when the transaction has been completed. • EAPOL-Start V1 Flood: EAPOL start flood is when an attacker attempts to bring down an AP by flooding it with EAPOL-Start frames to exhaust the internal resources of an AP. • Fuzzed Beacon: Fuzzed Beacon is when an invalid, unexpected, or random data is introduced in the beacon and then replaying those modified frames into the air. This can cause unexpected behavior to the destination device including driver crashes, operating system crashes and stack based overflows which would allow execution of arbitrary code on the affected system. • Fuzzed Probe Request: Fuzzed probe request is when an invalid, unexpected, or random data is introduced in the probe request and then replaying those modified frames into the air. • Fuzzed Probe Response: Fuzzed probe response is when an invalid, unexpected, or random data is introduced in the probe response and then replaying those modified frames into the air. • Invalid MAC OUI Frame: Invalid MAC OUI is when a spoofed MAC address is used which does not have a valid OUI. • Malformed Association Request: Malformed association request is when an attacker sends a malformed association request which can trigger bug in AP leading to Denial of Service. • Malformed Authentication: Malformed authentication is when an attacker sends malformed authentication frames which can expose vulnerabilities in some drivers. • Probe Response Flood: A form of DoS that allows the attacker to prevent a station from associating to a valid corporate AP. In a typical wireless transaction, when a station wishes to associate to an AP, it transmits a probe request from to obtain information about the AP's network. The station will then wait for the resulting probe response frame from the AP. An attacker can take advantage of this process by flooding the environment with invalid probe responses, thus preventing the station from receiving the response from the valid AP. As a result, the station is rendered unable to connect to the wireless network, and a denial of service attack is initiated. • PS Poll Flood: PS-Poll flood is when a potential hacker spoofs the MAC address of the wireless client and sends out a flood of PS-Poll frames. The AP then sends out the buffered data frames to the wireless client, which leads to client missing the data frames since it could be in the power save mode. • Reassociation Request Flood: A form of DoS attack that exhausts AP's resources, particularly the client association table by flooding AP with a large number of emulated and spoofed client reassociations. Once the client association table overflows, legitimate clients are not able to get associated causing a DoS attack. • Targeted Deauthentication: There is visibility into both source and destination of attacks for enhanced context of the threat. • CTS Virtual Carrier Sense Attack: A form of DoS attack when MAC address of an 802.11n AP is modified that allows large duration values for CTS frame types by preventing channel access to legitimate users. • RTS Virtual Carrier Sense Attack: A form of DoS attack when MAC address of an 802.11n AP is modified that allows large duration values for RTS frame types by preventing channel access to legitimate users. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 6 Cisco DNA Center Rogue Management and aWIPS Application Scale Information Scale Information This table shows the number of rogue APs and rogue clients supported on different versions of Cisco DNA Center appliance. Table 1: Number of Rogue APs and Rogue Clients Supported Cisco DNA Center Appliance No. of Rogue APs Supported No. of Rogue Clients Supported 44-core Cisco DNA Center appliance 24,000 32,000 56-core Cisco DNA Center appliance 24,000 32,000 112-core Cisco DNA Center appliance 96,000 128,000 This table shows the scale information for aWIPS in Cisco DNA Center. Table 2: Scale Information for aWIPS Cisco DNA Center Appliance No. of APs Supported No. of Clients Supported No. of Devices Supported No. of Events per Day 44-core Cisco DNA 4000 Center appliance 25,000 1000 20,000 56-core Cisco DNA 6000 Center appliance 40,000 2000 30,000 112-core Cisco DNA Center appliance 100,000 6000 65,000 13,000 Basic Setup Workflow Step 1 Install Cisco DNA Center. For more information, see the Cisco Digital Network Architecture Center Installation Guide. Step 2 Download and install the Rogue and aWIPS application package. For more information, see Download and Install the Rogue and aWIPS Application Package on Cisco DNA Center, on page 11. Step 3 Verify that the Rogue and aWIPS application is in Deployed state. To verify, from the Cisco DNA Center home page, click the Gear icon Apps. , and then choose System > Setting > Installed Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 7 Cisco DNA Center Rogue Management and aWIPS Application Related Documentation Step 4 From this release onwards, you must enable Rogue and aWIPS application in the Assurance > Rogue and aWIPS window. This enables rogue detection on the Cisco Wireless Controller and Cisco Catalyst 9800 Series Wireless Controllers. To access the Rogue and aWIPS application, log in to Cisco DNA Center. In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Assurance > Rogue and aWIPS. Step 5 Discover devices such as Cisco Wireless Controller and APs using the Discovery feature. Discover Cisco Wireless Controllers using the management IP address instead of the service port IP address. Step 6 Make sure that the discovered devices are listed in the Device Inventory window. The devices should be reachable and in Managed state in the Device Inventory window. Step 7 Design your network hierarchy by adding sites, buildings, and floors so that later you can easily identify where to apply design settings or configurations later. You can either create a new network hierarchy, or, if you have an existing network hierarchy in Cisco Prime Infrastructure, import it into Cisco DNA Center. Step 8 Add the location information of APs and position the APs on the floor map to get a coverage heatmap visualization. Step 9 (Optional) If your network uses Cisco Identity Services Engine (ISE) for user authentication, you can configure Cisco DNA Assurance for Cisco Identity Services Engine integration. This enables you to see more information about wired clients, such as the username and operating system, in Cisco DNA Assurance. Step 10 (Optional) Configure syslog, SNMP traps, and NetFlow Collector servers using Telemetry. Step 11 Start using the Cisco DNA Assurance application. Step 12 (Optional) Integrate and synchronize Cisco Connected Mobile Experiences (CMX) with Cisco DNA Center. You can get the precise location details for a specific rogue AP on the floor map, depending on the detecting AP's strongest signal strength, or x and y coordinate information from Cisco CMX. Note If you do not have Cisco CMX integrated with Cisco DNA Center, the rogue AP will be displayed in the sitemap around the detecting AP with the strongest RSSI. Related Documentation Document Information Cisco DNA Center Installation Guide Installation and configuration of Cisco DNA Center, including postinstallation tasks. Cisco DNA Center Administrator Guide Configuration of user accounts, Role-Based Access Control (RBAC) scope, security certificates, authentication and password policies, and global discovery settings. Monitoring and managing Cisco DNA Center services. Backup and restore procedures. Cisco DNA Center User Guide Use of the Cisco DNA Center GUI and its applications. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 8 Cisco DNA Center Rogue Management and aWIPS Application Related Documentation Document Information Cisco DNA Assurance User Guide Use of the Cisco DNA Assurance GUI. Release Notes for Cisco DNA Center Release information, including new features and open and resolved bugs. Cisco DNA Center Platform User Guide Reports for Rogue and aWIPS. Cisco DNA Center Platform Release Notes Enablement of Rogue and aWIPS package in Cisco DNA Center platform. Note The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced third-party product. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 9 Cisco DNA Center Rogue Management and aWIPS Application Related Documentation Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 10 CHAPTER 2 Install Cisco DNA Center Rogue Management Application Package • Application Management, on page 11 • Download and Install the Rogue and aWIPS Application Package on Cisco DNA Center, on page 11 Application Management Cisco DNA Center provides many of its functions as individual applications, that are packaged separately from the Cisco DNA Center core infrastructure. You can install and run the applications that you want and uninstall those that you are not using, depending on your preferences. In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Software Updates. The number and type of application packages shown in the Software Updates window vary depending on your Cisco DNA Center version and licensing level. All available application packages are shown, whether or not they are currently installed. For a description of a package and whether it is required, hover your cursor that package's name in the Updates tab in the Software Updates window. Download and Install the Rogue and aWIPS Application Package on Cisco DNA Center Before you begin The Rogue Management and aWIPS application is not installed on Cisco DNA Center by default. You must manually download and install the Rogue and aWIPS application package separately. Rogue Management requires a Cisco DNA Essentials license and aWIPS requires a Cisco DNA Advantage license. You can perform the application management procedure from the Software Updates window. 1. Install Cisco DNA Center. For information, see the Cisco DNA Center Installation Guide. 2. Review the software requirements described in the release notes. For more information, see Related Documentation, on page 8. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 11 Install Cisco DNA Center Rogue Management Application Package Download and Install the Rogue and aWIPS Application Package on Cisco DNA Center Note Step 1 Only a user with SUPER-ADMIN-ROLE permissions can perform this procedure. In the Cisco DNA Center GUI, click the Menu icon ( ) and choose System > Software Updates. The Software Updates window consists of the following tabs: • Updates: Shows the system and application updates. System Update shows the installed system version, available system updates, and the system updates that you have downloaded from Cisco cloud. Application Update shows the available applications that can be downloaded and installed from Cisco cloud, the size of the application, and the appropriate action (Download, Install, or Update). Hover your cursor over the package to view the available version and a basic description. • Installed Apps: Shows the installed application packages. Note Step 2 After you navigate to the Software Updates window, a connectivity check is performed and the status is displayed. If there is a connectivity issue, the Software Updates window does not show new updates. To download the Rogue and aWIPS application, click Install next to the application name in Software Updates > Updates > Application Updates. To update the Rogue and aWIPS application, click Update next to the application name in Software Updates > Updates > Application Updates. Note Step 3 Ensure that the application is updated by reviewing the version in the Installed Apps window. After installing the package, you must enable the Rogue Management application. a) In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Assurance > Rogue and aWIPS to enable the Rogue and aWIPS application. b) From the Rogue drop-down list that is located at the top-right corner of the Rogue Management window, choose Enable. This enables rogue detection on the Cisco Wireless Controller and Cisco Catalyst 9800 Series Wireless Controllers. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 12 CHAPTER 3 Monitor the Rogue and aWIPS Dashboard • Access the Rogue Management and aWIPS Application, on page 13 • Monitor the Rogue Management and aWIPS Dashboard, on page 13 • Obtain Rogue AP and Rogue Client Details from the Threat 360° View, on page 17 • Download aWIPS Profile Forensic Capture from the Threat 360° View, on page 20 Access the Rogue Management and aWIPS Application Step 1 To access the Rogue Management and aWIPS application, log in to Cisco DNA Center. Step 2 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Assurance > Rogue and aWIPS. The Rogue and aWIPS dashboard is displayed. Note Before using the Cisco DNA Assurance application, you must configure it. For more information, see Basic Setup Workflow, on page 7. Monitor the Rogue Management and aWIPS Dashboard Use the Rogue and aWIPS dashboard to get a detailed threat analysis and a global view of all the rogue APs and aWIPS signatures detected in the network. The Rogue and aWIPS dashboard also provides insight into the highest-priority threats so that you can quickly identify them. The Rogue Management application uses streaming telemetry to retrieve data on rogue APs. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Assurance > Rogue and aWIPS. The Rogue and aWIPS window is displayed. By default, Cisco DNA Center displays the Overview tab. Note Step 2 If a Cisco AireOS Controller does not meet the minimum software version, a notification appears at the top of the dashboard. Click Go To Devices in the notification to upgrade to the supported version. From the Actions drop-down list, you can perform the following functions: Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 13 Monitor the Rogue and aWIPS Dashboard Monitor the Rogue Management and aWIPS Dashboard Choose Rogue > Enable to enable rogue detection on the Cisco Wireless Controller and Cisco Catalyst 9800 Series Wireless Controller. The rogue management functionality is enabled by default if it is already enabled while migrating from Cisco DNA Center Release 1.3.3.x to Cisco DNA Center Release 2.2.1.0 or later. Step 3 Choose Rogue > Disable to disable the rogue actions temporarily. Step 4 Click Yes in the Warning dialog box that appears. After disabling the rogue management functionality, data from the wireless controller will not be pushed to Cisco DNA Center until the rogue management functionality is enabled. Step 5 Choose Status to view the rogue configuration job status. Step 6 Filter the rogue configuration status by All, Failure, Success, or In Progress by clicking the respective tabs. The Operation column shows Enable if the rogue-detection operation is enabled successfully on the wireless controller. The Status column shows Success if the configuration changes are successfully pushed to the wireless controller. Step 7 Choose aWIPS > Enable to enable aWIPS data collection on Cisco DNA Center. If you are migrating from Cisco DNA Center Release 1.3.3.x to Cisco DNA Center Release 2.2.1.0 or later, you must enable the aWIPS functionality in Cisco DNA Center Release 2.2.1.0 or later. Step 8 Choose aWIPS > Disable to disable aWIPS actions temporarily. Step 9 Click Yes in the Warning dialog box that appears. Step 10 Choose aWIPS > Status to view the aWIPS subscription status. Step 11 Filter the aWIPS configuration status by All, Failure, Success, or In Progress by clicking the respective tabs. The Operation column shows Enable if the aWIPS detection operation is enabled successfully on the wireless controller. The Status column shows Success if the configuration changes are successfully pushed to the wireless controller. Step 12 Move the timeline slider to view data about a threat that occurred at a specific time. The Active High Threats and High Threats Over Time graphs below the timeline slider display the threat details accordingly. Step 13 Click the Show Map icon to get a global map view of sites in your network. • The Active High Threats and High Threats Over Time graphs display information about rogue APs detected in the last 3 hours by default. The graph information is based on the time interval that you choose from the hours drop-down list. The options are Last 3 hours, Last 24 hours, and Last 7 days. • The Active High Threats widget presents information about threat levels in the form of a donut graph. Hover your cursor over the graph to see the number of rogue APs found in each threat level. • The High Threats Over Time graph presents information about high threats over, time based on the time interval that you choose from the time interval drop-down list. Hover your cursor over the graph to view the number of high threats that occurred at a particular time. • The Threats table displays a list of rogue APs found on the network. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 14 Monitor the Rogue and aWIPS Dashboard Monitor the Rogue Management and aWIPS Dashboard Step 14 Some columns are hidden in the default column view setting. To customize the columns, click the three dots right-end of the column heading. Step 15 Click Step 16 Click the Filter icon at the left end of the Threats table to narrow down the rogue AP list based on the following criteria: ID, Threat Level, Threat MAC Address, Type, State, Connection, Detecting AP, Detecting AP Site, RSSI (dBM), SSID, Clients, Containment Status, Last Reported, and Vendor. at the and choose a layout preset: Basic or All. RSSI, SSID, and Clients are not displayed for aWIPS. The following information is displayed for each rogue AP found on the network: • ID: Rogue AP identifier. • Threat Level: Color-coded classified threat level. Cisco DNA Center classifies threats into these categories: • High Threat • Potential Threat • Informational • Threat Mac Address: MAC address of the rogue AP. • Type: Threat types for rogue AP and aWIPS. The available classification types for Rogue AP are: • Beacon Wrong Channel • Beacon DS Attack • AP Impersonation • Allowed List • Rogue on wire • Honeypot • Interferer • Allowed Vendor • Friendly • Neighbor • Custom Rule Name • The available signature types for aWIPS are: • EAPOL logoff flood • Deauthentication broadcast • CTS Flood • RTS Flood • Deauthentication flood Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 15 Monitor the Rogue and aWIPS Dashboard Monitor the Rogue Management and aWIPS Dashboard • Disassociation broadcast • Disassociation flood • Broadcast probe • Association flood • Authentication flood • Deauthenticatioon Flood • Fuzzed Beacon • Fuzzed Probe Request • Fuzzed Probe Response • PS Poll Flood • EAPOL Start V1 Flood • Reassociation Request Flood • Beacon Flood • Probe Response Flood • Block Ack Flood • Airdrop Session • Malformed Association Request • Authentication Failure Flood • Invalid MAC OUI Frame • Malformed Authentication • CTS Virtual Carrier Sense Attack • RTS Virtual Carrier Sense Attack • State: Shows the state of the rogue AP/aWIPS attacks. • Source/Target: Shows whether the displayed MAC address is the source of an aWIPS attack or target of an aWIPS attack. This column is not applicable for rogue data. • Connection: Whether the rogue AP is located on the wired network or wireless network. This column shows the aWIPS attacks always on the wireless network. • Detecting AP: Name of the AP that is currently detecting the rogue AP. If multiple APs detect the rogue, the detecting AP with the highest signal strength is displayed. This column is applicable for rogue AP and aWIPS attacks. • Detecting AP Site: Site location of the detecting AP. This column is applicable for rogue AP and aWIPS attacks. • RSSI (dBm): RSSI value reported by the detecting AP. RSSI (dBm) is only applicable for rogue AP. • SSID: Service Set Identifier that the rogue AP is broadcasting. SSID is only applicable for rogue AP. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 16 Monitor the Rogue and aWIPS Dashboard Obtain Rogue AP and Rogue Client Details from the Threat 360° View • Clients: Number of rogue clients associated to this access point. This column is only applicable for rogue AP. • Wireless Containment Status: Show the possible values (Contained, Pending, Open, & Partial) of a rogue AP. Wireless containment status is only applicable for rogue AP. • Last Reported: Date, month, year, and time when the rogue AP/aWIPS attack was last reported. • Vendor: Rogue AP vendor information. This column is not applicable for aWIPS attacks. Obtain Rogue AP and Rogue Client Details from the Threat 360° View You can quickly view the location details of a specific rogue AP or rogue client on a floor map within the Threat 360° view. You can get precise location details for a specific rogue AP or rogue client on the floor map depending on the detecting AP's strongest signal strength, or x and y coordinate information from Cisco Connected Mobile Experiences (CMX), when x and y coordinates are available. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 To launch the Threat 360° view for a particular rogue AP or rogue client, click the corresponding row in the Threats table. ) and choose Assurance > Rogue and aWIPS. The Threat 360° pane appears. The upper part of the pane displays the following information: • MAC address of the rogue AP • Threat level • Threat type • Status • Vendor • Containment • Count • Last reported The middle part of the pane shows the estimated location of a rogue AP or a threat on the floor map: • Site details and floor number. • Floor map shows the names of the managed APs. Step 3 Perform the following tasks, as required: Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 17 Monitor the Rogue and aWIPS Dashboard Obtain Rogue AP and Rogue Client Details from the Threat 360° View • Click the icon at the right-hand corner of the floor map to see the IP address of the wireless controller that manages APs along with the reachability status. • Click the icon at the right-hand corner of the floor map to zoom in on a location. The zoom levels depend on the resolution of an image. A high-resolution image provides more zoom levels. Each zoom level comprises a different style map that is shown at different scales, each one showing the corresponding details. Some maps are of the same style, but at a smaller or larger scale. • Click the icon to see a map with fewer details. • Click the icon to view the map icon legend. The following table provides descriptions of the floor map icons. Table 3: Map Icons and Descriptions Floor Map Icon Description Devices Access Point Sensor Rogue AP Marker Planned AP Switch Interferer Client Rogue Client Reporting AP Detecting AP Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 18 Monitor the Rogue and aWIPS Dashboard Obtain Rogue AP and Rogue Client Details from the Threat 360° View Floor Map Icon Description Average Health Score Health score: 8-10 Health score: 4-7 Health score:1-3 Health score: Unknown AP Status Covered by sensor Not covered by sensor Step 4 The bottom area of the pane enables you to perform these tasks: • Click the Switch Port Detail tab to get details about rogue on wire, including information such as Host Mac, Device Name, Device IP, Interface Name, Last Updated, Port Mode, and Admin Status. Note • Admin Status column shows interface status either as UP or as DOWN. • Port Mode column shows the interface mode either as ACCESS or as TRUNK. Note Cisco switches are required for rogue-on-wire detections. • Click the Detections tab to view information such as Detecting AP, Detecting AP Site, Adhoc, Rogue SSID, RSSI (dBM), Channels, Radio Type, SNR, State, and Last Updated. • Click the Filter ( ) icon at the left end of the table to narrow down the search results based on Rogue SSID, RSSI, Radio Type, Security, and SNR. • Click the Export icon and save it to your system. • Click the Clients tab to view details such as MAC Address, Gateway Mac, Rogue AP Mac, IP Address, and Last Heardabout the clients that are associated with the rogue AP. • Click the Filter ( ) icon at the left end of the table to narrow down the results based on your search criteria. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 19 Monitor the Rogue and aWIPS Dashboard Download aWIPS Profile Forensic Capture from the Threat 360° View Download aWIPS Profile Forensic Capture from the Threat 360° View This procedure describes how to download the forensic capture of various denial of service (DoS) attacks from the Threat 360 view. Note Cisco DNA Center enables or disables forensic capture only on default-ap profile. You must enable or disable forensic capture in case of brownfield deployments where you have created Custom AP Join Profiles. Before you begin You must verify the network connectivity between the access points and Cisco DNA Center. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 In the Rogue and aWIPS dashboard, scroll down to view the Threat table. Step 3 In the Threat MAC address column, click the aWIPS attack link. ) and choose Workflows > Rogue and aWIPS. Threat 360 window appears. Step 4 Click Forensic Capture tab to view the information such as Detecting AP, Alarm ID, CaptureFilename, and Last Updated. Step 5 In the Capture Filename column, click the pcap file to download the aWIPS profile forensic capture. Step 6 Click Download All to download all the pcap files. Step 7 Click the Filter icon to narrow down the search results based on Detecting AP. Step 8 Click the Export icon to save the CSV file it to your workspace. Note Cisco DNA Center shows a maximum of 50 forensic captures at a time. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 20 CHAPTER 4 aWIPS Profiles • About aWIPS Profiles, on page 21 • Create an aWIPS Profile Configuration Workflow, on page 22 • View aWIPS Profiles, on page 24 • Assign an aWIPS Profile to the Network Device, on page 25 • Edit an aWIPS Profile, on page 26 • Delete an aWIPS Profile, on page 26 • Enable or Disable aWIPS in Network Settings, on page 27 About aWIPS Profiles The aWIPS profile configuration allows you to select required signatures, configure threshold values used in detection of a WIPS denial of service (DoS) attacks, and enable forensic capture at signature level. Threshold configuration helps to adjust the number of alarms which are generated for a specific duration for each aWIPS signature. The aWIPS profile configuration support is available for the following devices with software version 17.4 and later: • Cisco Catalyst 9800 Series Wireless Controller • Cisco Catalyst 9800-CL Cloud Wireless Controller • Cisco Embedded Wireless Controller on Catalyst Access Points • Cisco Catalyst 9800 Embedded Wireless Controller for Catalyst 9300 Series Switches • Cisco Catalyst 9400 Series Switches • Cisco Catalyst 9500 Series Switches Note You must enable wireless module on Cisco Catalyst 9300 Series Switches, Cisco Catalyst 9400 Series Switches, and Cisco Catalyst 9500 Series Switches for aWIPS profiles to work. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 21 aWIPS Profiles Prerequisites Prerequisites • Verify the network connectivity between the Cisco Wireless Controller and Cisco DNA Center. • Make sure that the network device is reachable from Cisco DNA Center and has downloaded the aWIPS profile configuration from Cisco DNA Center. • For forensic capture, make sure that there is network connectivity between APs and Cisco DNA Center. • For forensic capture, make sure that the Google Protocol RPC (gRPC) tunnel interface has been established between APs and Cisco DNA Center. Use the show ap icap connection command to make sure that the status is READY. • For forensic capture, the required ports must be opened between Cisco DNA Center and network device links. • For forensic capture, there should not be a time lag between Cisco DNA Center and access points. • If you have upgraded Cisco DNA Center from an earlier release, you must disable and enable aWIPS from the Rogue and aWIPS dashboard to subscribe an additional subscription. For more information, see Monitor the Rogue Management and aWIPS Dashboard. Note For a new installation of Cisco DNA Center, you do not have to disable and enable aWIPS from the Rogue and aWIPS dashboard to subscribe an additional subscription. Create an aWIPS Profile Configuration Workflow This section provides information about how to create an aWIPS profile. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Workflows > Create an aWIPS Profile. You can also create an aWIPS profile by navigating to Assurance > Rogue and aWIPS > aWIPS Profile > Add Profile. The Create an aWIPS Profile window appears. Step 2 Click Let's Do it. The aWIPS Profile Creation window appears. Step 3 In the Profile Name field, enter a name for the aWIPS profile. Step 4 The Signatures table lists the following aWIPS profile parameters: • Signature: Shows the standard aWIPS signatures that detect the various denial of service (DoS) attacks. • Default Threshold: Shows the predefined threshold value for the respective aWIPS signature. • Configure Threshold: Shows the manually configured threshold value for the respective aWIPS signature. • Time Interval (In Seconds): Shows the time interval of packets. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 22 aWIPS Profiles Create an aWIPS Profile Configuration Workflow • Forensic Capture: Captures the aWIPS DoS attack packets in real time for the given signature. Step 5 In the Signature column, check the check box next to the aWIPS signature that you want to select or deselect for an aWIPS profile. If an aWIPS signature is not selected for an aWIPS profile, Cisco DNA Center does not detect the DoS attack for that particular aWIPS signature. Step 6 In the Configure Threshold column, for the chosen aWIPS signature, enter the threshold value within the specified range that is displayed on top of the respective Configure Threshold field. For some signatures, the configuration threshold is not applicable. The threshold configuration value for those signatures is displayed as NA on top of the respective Configure Threshold field. The Configure Threshold value cannot contain alphanumeric characters. Step 7 In the Forensic Capture column, click the toggle button to enable or disable the forensic capture for a particular aWIPS signature. • Cisco DNA Center does not allow you to edit the Default Threshold value and Time Interval (In Seconds) value for the aWIPS profile. Note • If you enable forensic capture for an aWIPS signature, Cisco DNA Center allows you to download packets from the Threat 360 window. • If you disable forensic capture for an aWIPS signature, Cisco DNA Center does not capture the aWIPS DoS attack for the given signature. • Enabling Forensic Capture for RTS Flood and CTS Flood signatures might impact the performance of Cisco DNA Center. Step 8 (Optional) Click Reset to Default to get the default aWIPS profile configuration. Step 9 Click Next. Note In the Configure Threshold column, for the chosen aWIPS signature, if you enter the threshold value out of the specified range, an error message appears on top of the Create an aWIPS Profile window to enter the correct value within the specified range. Step 10 In the Profile Summary window, the Profile Summary table displays the summary of the profile that was configured in the previous window. Step 11 Click Next. Step 12 In the Profile Creation Done page, click Assign Profile to Device(s) to assign this aWIPS profile to a device. The Assign aWIPS Profile window appears. You can also assign an aWIPS profile to a device on the Assurance > Rogue and aWIPS > aWIPS Profile page by checking the check box next to the aWIPS profile name and choosing More Actions > Assign. Note Step 13 You cannot assign more than one aWIPS profile to the device at a time. In the Assigned WLCs column, click the number link to view the number of wireless controllers assigned to an aWIPS profile. The Profile Assigned to WLC window shows the following attributes of the network device: • Device Name: Shows the name of the network device. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 23 aWIPS Profiles View aWIPS Profiles • IP Address: Shows the IP address of the network device. • Profile Config URL Push Status: Shows the status of profile configuration URL push to the network device. The possible values are Success, Failure, and In Progress. In case of Failure status, hover your mouse over the i icon next to the Failure to see the failure reason. • Profile Config Download Status (On Device): Shows the profile configuration download status on the device. The possible values are Success, Failure, and In Progress. In case of Failure status, hover your mouse over the i icon next to the Failure to see the failure reason. Note • If the aWIPS subscription is disabled on Cisco DNA Center, an error message appears on the top of the aWIPS Profile dashboard. You must have an aWIPS subscription to see the value of Profile Config Download Status (On Device). To subscribe the aWIPS data collection, enable aWIPS from the Rogue and aWIPS overview dashboard. See Monitor the Rogue Management and aWIPS Dashboard. • The HTTP protocol reachability must be present between the device and Cisco DNA Center for the device to download the profile configuration from the profile config URL. • Forensic capture config Status: Shows the forensic capture config status on the default-ap-profile AP Join Profile on the device. The possible values are Success, Failure, and In Progress. In case of Failure status, hover your mouse over the i icon next to the Failure to see the failure reason. • Forensic Capture: Shows whether the forensic capture is enabled/disabled on the default-ap-join AP Join Profile on the device. Forensic capture on custom AP join profile is not supported. Hover your mouse over the i icon next to the Forensic capture. A tooltip saying Shows the current Forensic Capture status on default-ap-profile AP Join Profile on the device appears. Note • In the Profile Assigned to WLC window, you cannot enable or disable the Forensic Capture. • Assigned On: Shows the date and time the aWIPS profile is assigned to the wireless controller. Step 14 Click Next. The Profile Creation Done window appears. View aWIPS Profiles In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Assurance > Rogue and aWIPS > aWIPS Profile. The aWIPS Profile(s) dashboard appears. Note When you navigate to the aWIPS Profile tab for the first time, an error message appears on top of the aWIPS Profile dashboard to subscribe the upgraded subscription even if aWIPS is enabled in Cisco DNA Center. To subscribe the upgraded subscription, you must disable and enable aWIPS from the Rogue and aWIPS overview dashboard. See Monitor the Rogue Management and aWIPS Dashboard. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 24 aWIPS Profiles Assign an aWIPS Profile to the Network Device The aWIPS Profile dashboard displays the following information: • Profile Name: Shows the list of aWIPS profiles names. • Assigned WLCs: Shows the number of assigned wireless controllers to an aWIPS profile. • Last Changed: Shows the last created or updated date and time of an aWIPS profile. Assign an aWIPS Profile to the Network Device Before you begin If you upgrade Cisco DNA Center from an earlier release, you must disable and enable aWIPS from the Rogue and aWIPS overview dashboard to subscribe the additional subscription. See Monitor the Rogue Management and aWIPS Dashboard. Note Step 1 For a new installation of Cisco DNA Center, you do not need to disable and enable aWIPS from the Rogue and aWIPS overview dashboard to subscribe the additional subscription. In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Workflows > Assign an aWIPS Profile. The Assign an aWIPS Profile window appears. To skip this screen in the future, check the Don't show this to me again check box. Step 2 Click Let's Do it. The Assign aWIPS Profile window appears. Step 3 From the Profile Name drop-down list, choose the aWIPS profile name that you want to assign to a device. Step 4 In the left pane, you can either search for a site by entering its name in the Find Hierarchy field, or expand Global to choose the sites. You can also search for a network device by entering its name in the Search Table field. The Network Devices table shows the Device Name, IP Address, Software Version, Reachability, and Forensic Capture of the device and lists the network devices in the following sections: • Reachable & Supported: Shows the list of reachable and supported network devices with software version 17.4, and reachability status with a green check mark. • Not Reachable/Not Supported: Shows the list of unreachable or unsupported network devices with software version 17.4. You cannot assign an aWIPS profile to unreachable or unsupported network devices. Step 5 In the Reachable & Supported tab, check the check box next to the device that you want to assign to the selected aWIPS profile. You can either select all devices or an individual device. You can assign an aWIPS profile to a maximum of 100 devices at a time. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 25 aWIPS Profiles Edit an aWIPS Profile Step 6 In the Forensic Capture column, click the toggle button to enable or disable the forensic capture for the chosen network device at the device level. This configures forensic capture at the default-ap-profile AP join profile. Forensic capture configuration at the custom AP join profile is not supported. Step 7 Click Next. Step 8 In the Profile and devices Mapped Summary window, expand aWIPS Profile Details to view the configuration summary of the selected aWIPS profile, and Device Map to view the configuration summary of assigned devices. Step 9 Click Next. The Profile Assignment to Devices initiated successfully window appears. Note Step 10 The profile assignment to the devices takes some time to complete. You must wait before retrying the assignment process. To view the status of the assigned aWIPS profile to the device, click the Go to Rogue and aWIPS Home Page link. For more information, see View aWIPS Profiles. Edit an aWIPS Profile This procedure describes how to edit an aWIPS profile. Before you begin To subscribe the additional subscription, you must disable and enable aWIPS from the Rogue and aWIPS overview dashboard. See Monitor the Rogue Management and aWIPS Dashboard. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 In the aWIPS Profile(s) table, click the profile name that you want to edit. Step 3 In the Edit aWIPS Profile window that appears, make the necessary changes and click Save. ) and choose Assurance > Rogue and aWIPS > aWIPS Profile. You cannot edit the default aWIPS profile. The profile is saved and pushed to all the devices that are assigned to the given aWIPS profile. Note In the Configure Threshold column, for the chosen aWIPS signature, if you enter a threshold value that is out of the specified range, an error message appears on the top of the Edit aWIPs Profile window to enter the correct value within the specified range. Delete an aWIPS Profile This procedure describes how to delete an aWIPS profile from Cisco DNA Center. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 26 aWIPS Profiles Enable or Disable aWIPS in Network Settings Before you begin To subscribe the additional subscription, you must disable and enable aWIPS from the Rogue and aWIPS overview dashboard. See Monitor the Rogue Management and aWIPS Dashboard. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Assurance > Rogue and aWIPS > aWIPS Profile. The aWIPS Profile dashboard appears. Step 2 In the aWIPS Profile(s) table, check the check box next to the aWIPS profile name that you want to delete. • You cannot delete a default aWIPS profile. Note • You cannot delete an aWIPS profile that is assigned to the network device. Instead, you must reassign the device to the default aWIPS profile and then delete it. Step 3 From the More Actions drop-down list, choose Delete. Step 4 In the warning window, click Delete. Enable or Disable aWIPS in Network Settings Cisco DNA Center allows you to enable or disable aWIPS settings for all signatures. You can enable or disable aWIPS for all Cisco Catalyst 9800 Wireless Controllers in a network. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the Wireless tab. Step 3 In the left pane, ensure that Global is selected. Note ) and choose Design > Network Settings. The sites, buildings, and floors inherit settings from the global level. The settings saved at the site, building, or floor level overrides the global network settings. Step 4 Scroll down to the aWIPS and Forensic Capture Enablement area. Step 5 To enable aWIPS for all signatures, check the Enable aWIPS check box. By default, aWIPS is enabled at the global level. Step 6 To disable aWIPS, uncheck the Enable aWIPS check box. Step 7 To enable forensic capture, check the Enable Forensic Capture check box. Note To enable forensic capture, aWIPS must be enabled. If you disable aWIPS when forensic capture is enabled, forensic capture will also be disabled. Step 8 Click Save. Step 9 To reset the aWIPS and Forensic Capture Enablement settings, click Reset. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 27 aWIPS Profiles Enable or Disable aWIPS in Network Settings Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 28 CHAPTER 5 Rogue AP Containment on Wired and Wireless Network • Rogue AP Containment Overview, on page 29 • Wired Rogue AP Containment, on page 30 • Wireless Rogue AP Containment, on page 31 • Cisco Rogue AP Containment Actions Compatibility Matrix, on page 33 • View Tasks and Audit Logs of Rogue AP Containment, on page 34 Rogue AP Containment Overview The Cisco DNA Center Rogue AP Containment feature contains the wired and wireless Rogue AP. In case of Wired Rogue AP Containment, Cisco DNA Center brings the ACCESS mode switchport interface to the DOWN state on which the rogue AP is attached. In case of Wireless Rogue AP Containment, Cisco DNA Center instructs the strongest detecting wireless controller to initiate the containment on wireless rogue BSSIDs. The wireless controller in turn instructs the strongest detecting AP for those BSSIDs to stream the deauthentication packets to disrupt the communication between the rogue AP and the wireless clients of the corresponding rogue AP. Rogue AP containment is classified as: • Wired Rogue AP Containment: The rogue AP MAC addresses classified as Rogue on Wire on the Cisco DNA Center rogue threat dashboard. • Wireless Rogue AP Containment: The rogue AP MAC addresses classified as Honeypot, Interferer, or Neighbor on the Cisco DNA Center rogue threat dashboard. Rogue AP Containment is supported on Cisco AireOS Controllers and Cisco Catalyst 9800 Series Wireless Controllers. Note Containment is not supported on aWIPS threats. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 29 Rogue AP Containment on Wired and Wireless Network Wired Rogue AP Containment Wired Rogue AP Containment The Wired Rogue AP Containment feature allows Cisco DNA Center to shut down the ACCESS mode interface on the switch to which the Rogue AP is physically attached. Cisco DNA Center performs wired rogue AP containment only on ACCESS mode interfaces, because shutting down any other mode might bring the network down. If the rogue AP is attached to non-ACCESS mode interfaces, the network admin must contain the interface either manually or through a CLI command. This procedure describes how to perform wired rogue AP containment on an ACCESS mode interface classified as Rogue on Wire in Cisco DNA Center. Before you begin Download and install the Rogue and aWIPS application package. For more information, see Download and Install the Rogue and aWIPS Application Package on Cisco DNA Center. Ensure that you have G write permission from the provision API, scheduler API, and rogue side to perform this procedure. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 In the Rogue and aWIPS dashboard, scroll down to view the Threat table. Step 3 Click the rogue AP MAC address in the Threat MAC address column, classified as Rogue on Wire. ) and choose Assurance > Rogue and aWIPS. The Threat 360 window appears. Step 4 Click the Action drop-down list and choose Shutdown Switchport. A warning pop-up window shows the list of ACCESS mode interfaces to be shut down on the corresponding device. Note The Shutdown Switchport option appears in the Action drop-down list only when the rogue AP MAC address is marked as Rogue on Wire. For more information, see the Cisco Rogue AP Containment Actions Compatibility Matrix, on page 33. The Shutdown Switchport action is irreversible. You must manually bring the switchport back up. Step 5 In the warning pop-up window, click Yes. The Threat 360 window shows the wired rogue AP containment status: • A banner with a blue check mark indicates that the wired rogue AP containment request is in progress. • A banner with a green check mark indicates that the wired rogue AP containment is initiated successfully on the corresponding interface. • A banner with a red check mark indicates that the wired rogue AP containment request failed. Note • After containment is initiated, it takes some time for the interface state to update from Rogue on Wire to another threat classification type. • The Rogue on Wire classification type changes to another classification type upon the arrival of the next wireless rogue message for the same rogue AP. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 30 Rogue AP Containment on Wired and Wireless Network Wireless Rogue AP Containment If a rogue AP MAC address is classified as Rogue on Wire, but there are no ACCESS mode interfaces up to initiate the containment, Cisco DNA Center disables the Shutdown Switchport option in the Action drop-down list. Note You cannot initiate Wireless Rogue AP Containment unless the rogue AP to which it corresponds is as long as in the Rogue on Wire classification type. For more information, see Wireless Rogue AP Containment. Wireless Rogue AP Containment The Wireless Rogue AP Containment feature allows Cisco DNA Center to contain the wireless clients connected to a rogue AP. Containment is illegal in some countries because it disrupts the communication between the clients attached to a rogue AP. Cisco DNA Center warns you about the legal consequences while initiating wireless rogue AP containment. This procedure describes how to start and stop wireless rogue AP containment on wireless clients connected to a rogue AP. Before you begin Download and install the Rogue and aWIPS application package. For more information, see Download and Install the Rogue and aWIPS Application Package on Cisco DNA Center. Ensure that you have G write permission from the provision API and scheduler API to perform this procedure. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 In the Rogue and aWIPS dashboard, scroll down to view the Threat table. Step 3 To perform wireless rogue AP containment, click the rogue AP MAC address listed under the Threat MAC address column, marked as either Honeypot, Interferer, or Neighbor classification types. ) and choose Assurance > Rogue and aWIPS. Threat 360 window appears. Note Step 4 A rogue AP MAC address comprises multiple rogue BSSIDs. Click the Action drop-down list and choose Start Containment. A Warning pop-up window appears that shows the warning of legal consequences and a list of rogue BSSIDs to be contained on wireless controller. Note Step 5 The Start Containment option appears in the Action drop-down list only when the rogues AP MAC address is marked as either Honeypot, Interferer, or Neighbor classification type. For more information, see the Cisco Rogue AP Containment Actions Compatibility Matrix. Click Yes in the warning pop-up window. The Threat 360 window shows the wired rogue AP containment status as follows: • Banner with a blue check mark indicates that the wireless rogue AP containment request is in progress. • Banner with a green check mark indicates that the wireless rogue AP containment request is submitted successfully to the strongest detecting AP. A red vertical line appears next to the strongest detecting AP based on the RSSI value. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 31 Rogue AP Containment on Wired and Wireless Network Wireless Rogue AP Containment • Banner with a red check mark indicates that the wireless rogue AP containment request has failed. Once containment is initiated, it takes some time for the Containment Status column to update with another wireless containment status Note In the Threat 360 window, hover your curser over the i icon next to the Containment column. A tooltip saying This always shows current Wireless Containment Status appears. Step 6 Cisco DNA Center allows you to monitor the Containment Status of a wireless rogue AP in the Rogue and aWIPS dashboard threat table within Cisco DNA Assurance. Hover your curser over the i icon adjacent to Containment Status column to view the following possible values. Table 4: Wireless Containment Status Possible Values Wireless Containment Status Meaning Contained Rogue AP actively contained by Wireless Controller Pending Wireless Controller has kept this Rogue in Containment Pending state Open Rogue AP is not contained Partial Some of the Rogue BSSID's are Open and rest of them are either in Contained/Containment Pending state. Note For a rogue AP with the wireless containment status as Partial, an i icon appears adjacent to Partial state under the Containment column in the Threat 360 window. Hover your curser over the i icon to view the current wireless containment status of Rogue SSIDs. The wireless controller can keep the wireless rogue AP containment in pending state because of the following reasons: • Resource outage: Once the rogue BSSID containment request is submitted, wireless controller puts the rogue BSSID containment either in Containment or Containment Pending state because of 3 rogue BSSIDs per radio limitation for client serving radios and 6 rogue BSSIDs per radio limitation for monitor mode. Once the radio exceeds specified limitation, next submitted rogue BSSID for containment goes to the pending state by the wireless controller until one of the rogue BSSIDs goes out of containment state. • Protected Management Frames (PMF): The wireless controller does not initiate the containment as long as the Protected Management Frames (PMF) is enabled on rogue BSSID and keeps the containment status in pending state. Once the PMF is disabled, wireless controller initiates the containment. • Dynamic Frequency Selection (DFS): The wireless controller keeps the containment status in pending state and does not attempt to contain the rogue BSSID if it broadcasts on the Dynamic Frequency Selection (DFS) channels. Once the rogue BSSID moves out of the DFS channel, wireless controller initiates the containment. Step 7 To bring back all the rogue BSSIDs of wireless rogue AP marked as either Contained, Pending or Partial state to Open state, click the rogue AP MAC address listed under the Threat MAC address column. The Threat 360 window appears. Step 8 Click the Action dropdown and choose Stop Containment. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 32 Rogue AP Containment on Wired and Wireless Network Cisco Rogue AP Containment Actions Compatibility Matrix Note The Stop Containment option appears in the Action dropdown menu only when wireless rogue AP is either in Contained, Pending or Partial state. For more information, see the Cisco Rogue AP Containment Actions Compatibility Matrix. • A blue check mark notification is displayed as a banner on the Threat 360 window, that shows the Stop Containment process is in progress on wireless rogue AP. • A green check mark notification is displayed as a banner on the Threat 360 window, that shows the Stop Containment process is initiated successfully on wireless rogue AP. Cisco Rogue AP Containment Actions Compatibility Matrix This table shows the behavior of rogue AP containment actions for the current state of rogue APs on the Threat 360 window. Table 5: Rogue AP Containment Actions Compatibility Matrix Rogue AP Threat Type Wireless Rogue AP Current Containment State Start Containment option Stop Containment option in "Actions" Drop-Down in "Actions" Drop-Down List List Beacon Wrong Channel Open Disabled Disabled Contained/Pending/Partial Disabled Enabled Open Disabled Disabled Contained/Pending/Partial Disabled Enabled Open Disabled Disabled Contained/Pending/Partial Disabled Enabled Beacon DS Attack AP Impersonation Rogue on Wire Allowed List Honeypot Interferer Open/Contained/Pending/Partial Not Visible Not Visible Shutdown Switchport is shown Shutdown Switchport is shown Open Disabled Disabled Contained/Pending/Partial Disabled Enabled Open Enabled Disabled Contained/Pending/Partial Disabled Enabled Open Enabled Disabled Contained/Pending/Partial Disabled Enabled Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 33 Rogue AP Containment on Wired and Wireless Network View Tasks and Audit Logs of Rogue AP Containment Friendly Neighbor Open Disabled Disabled Contained/Pending/Partial Disabled Enabled Open Enabled Disabled Contained/Pending/Partial Disabled Enabled View Tasks and Audit Logs of Rogue AP Containment In case of containment failure, Cisco DNA Center allows you to view the tasks and audit logs of submitted requests of wired and wireless rogue AP containment. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 In the Activity window, click the Tasks tab. Step 3 In the FILTERS drop-down list, enter ROGUE in the Search field, or choose ROGUE. ) and choose Activity. A list of submitted requests of wired and wireless rogue AP containment appears. Step 4 Click the containment request. The ROGUE window appears, showing the rogue AP containment operation details, status, date, and time. Step 5 Click the Audit Logs tab to view the rogue AP containment type and corresponding device IP address. Note • For Cisco AireOS, the containment request audit logs show the CLI commands. • For Cisco Catalyst 9800 Series Wireless Controllers, the containment request audit logs show the NETCONF requests. • For Wired Rogue AP containment, the audit logs show the CLI commands executed on the switch to bring the switchport down. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 34 CHAPTER 6 Custom Classification of Rogue Access Points • About Allowed List Workflow, on page 35 • Set Up the Allowed List Workflow, on page 36 • About Custom Rogue Rule Creation, on page 37 • Edit a Rogue Rule, on page 37 • Delete a Rogue Rule, on page 38 • Create a Custom Rogue Rule, on page 38 • About Rogue Rule Profile, on page 39 • Edit a Rogue Rule Profile, on page 40 • Delete a Rogue Rule Profile, on page 40 • Create a Rogue Rule Profile, on page 40 • About Allowed Vendor List, on page 41 • View Vendor Rule List Information, on page 42 • Edit a Vendor Rule, on page 42 • Delete a Vendor Rule, on page 42 • Create a List of Allowed Vendors, on page 43 About Allowed List Workflow The Cisco DNA Center Rogue Management and aWIPS workflow allows you to review and mark the MAC Address of rogue access points, that you want to move to the allowed list in a bulk, and process bulk allowed list of selected Access Point MAC addresses. Rogue Management and aWIPS workflow supports APs that are associated with Cisco AireOS Controllers and Cisco Catalyst 9800 Series Wireless Controllers. You can move the following rogue AP types to the allowed list using this workflow: • Rogue on Wire • Honeypot • Interferer • Neighbor You cannot move the following rogue AP types to the allowed list using this workflow: • Beacon Wrong Channel Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 35 Custom Classification of Rogue Access Points Set Up the Allowed List Workflow • Beacon DS Attack • AP Impersonation • Friendly Set Up the Allowed List Workflow This procedure shows how to move rogue AP MAC addresses to the allowed list in bulk. These addresses are ones that you do not want to report as high threat in Cisco DNA Center. Before you begin To perform the following task, you must have SUPER-ADMIN-ROLE or NETWORK-ADMIN-ROLE permissions. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( aWIPS. ) and choose Workflows > Set up Rogue Management and The Set up Rogue Management and aWIPS window appears. Step 2 Click Let's Do it. To skip this screen in the future, check the Don't show this to me again check box. The Bulk upload allowed access points window appears. Step 3 In the Search field, you can search for the MAC addresses that were already added in the previous workflow. Click Export to export the allowed list. Step 4 You can download the sample CSV template file and manually add the MAC address, operation, and category to create the bulk allowed list template. Click the Download the sample CSV template from here link. You can hover your cursor over the notification symbol to view the format of allowed MAC addresses, operations, and categories. Step 5 You can either drag and drop the CSV file into the boxed area or click Choose a file and browse to the CSV file on your system. The maximum size of the CSV file is 1.2 MB. Note Cisco DNA Center performs a validation check. An error message appears if the uploaded CSV file does not meet the following requirements: • The MAC address is not a valid rogue point MAC address. • All the rogue access point MAC addresses exist in the system already, or no rogue access point MAC addresses are eligible for the delete operation. A green check mark indicates that the uploaded CSV file content is valid. Step 6 Click Next. Step 7 In the Summary window, the Uploaded bulk allowed list MAC addresses table displays the list of allowed MAC addresses in bulk, and the respective operation and action. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 36 Custom Classification of Rogue Access Points About Custom Rogue Rule Creation • All: Shows the list of all the MAC addresses in bulk, and their respective operation and action. • Create: Shows the list of created MAC addresses in bulk, and their respective operation and action. • Delete: Shows the list of deleted MAC addresses in bulk, and their respective operation and action. • No Action: Shows the list of MAC addresses that are already deleted, and their respective operation and action. Step 8 Click Continue to allowed list, and in the warning pop-up window, click Yes. The Done! Allowed List Updated window appears. Step 9 Click the Go to Rogue and aWIPS Home Page link. The Rogue and aWIPS dashboard appears. In the Threat table, Cisco DNA Center now categorizes the specified rogue AP MAC addresses as Allowed List under the Type column. Step 10 To add or delete a rogue AP MAC address individually, click the rogue MAC address listed under the Threat MAC address column. The Threat 360 window appears. Step 11 Click the Action drop-down list and choose Add to Allowed list. To remove the rogue AP MAC address from the allowed list individually, in the Action drop-down list, choose Remove from Allowed list. About Custom Rogue Rule Creation Rogue rules are an easy way to segregate and manage rogues with different risk profiles. Rogue rules are easy to configure and they are applied in order of priority. They reduce false positives, noise for sites with interferers, number of alerts, and provide the ability to adjust organizational risk profiles on global and site basis. You can move the following rogue AP types to the custom classification type: • Interferer • Neighbor Edit a Rogue Rule Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 In the Rogue Rules table, click the rule name that you want to edit. Step 3 In the Edit Rogue Rule window that appears, make the necessary changes and click Save. ) and choose Assurance > Rogue and aWIPS > Rules tab. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 37 Custom Classification of Rogue Access Points Delete a Rogue Rule The previous classification based on old rules is not modified even if the rule condions are modified. The change affects only the new data classification. Delete a Rogue Rule Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Assurance > Rogue and aWIPS > Rules tab. By default, the Rogue Rules tab is opened. Step 2 In the Rogue Rules table, click the Rule Name that you want to delete and click Delete. Note If the rogue rule which you are deleting is the only rule available in a rule profile, then the rule profile is also deleted. Step 3 Click Delete in the confirmation dialog box that appears. Step 4 To view the deleted rules, click the Inactive tab in the Rogue Rules table. Create a Custom Rogue Rule You can create a rule with specific conditions and then associate the rule to a rule profile. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 In the Create a Rogue Rule screen, click Get Started. Step 3 In the Rule Name field, enter a unique name for the rule. ) and choose Workflows > Create a Rogue Rule. While creating new rogue rules, you cannot enter those rogue rule names that were deleted before. Step 4 In the Description field, enter a description for the rule. Step 5 Click Next. Step 6 In the Create Rogue Rule screen, choose the threat level and add conditions for your rule. Step 7 Select one of the Threat Level radio buttons to add a threat level to the rule. The available threat levels are: High, Potential, or Informational. Step 8 From the Match drop-down list, you can either choose All to match all the conditions or Any to match any of the conditions. Step 9 From the Add Condition drop-down list, choose the rule conditions. You can add multiple conditions to a rule. The various rule conditions available are: SSID, RSSI, Encryption Condition, and Minimum Rogue Client Count. Step 10 Click Next. Step 11 To assign this rule to an existing rule profile, click Yes in the Do you want to assign this rule to a rule profile? screen. Creating only rogue rules will not work as an entity. Rogue rules should always be assigned to a rule profile. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 38 Custom Classification of Rogue Access Points About Rogue Rule Profile Step 12 In the Available rule profiles table, check the check box next to the profile name, and click Next. You can select one or more rule profiles. You cannot assign more than five rules to a rule profile. Step 13 In the confirmation dialog box that appears, click Proceed. The created new rule is set to the lowest priority. You can edit the rule profile to change the priority. Note Step 14 Once the rogue rule is created, you cannot use the same rogue rule name to create another rogue rule. Review the rogue rule configuration in the Summary page. Note Previous classification based on old rules is not modified even if the new rule conditions match. The change affects only the new data classification. Step 15 To create another rogue rule, click the Create Another Rogue Rule button and follow Step 3 through Step 13 in this procedure. Step 16 To view the created rogue rules, click the View all Rogue Rules and Profiles button. The Rogue Rules tab lists all the rogue rules created. You can also view the created rogue rules by navigating to this path: In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Assurance > Rogue and aWIPS > Rules > Rogue Rules. About Rogue Rule Profile You can create a rogue rule with specific conditions and then associate it to a rule profile. You can prioritize rogue rules after associating them to a rogue rule profile. When a rogue rule profile is assigned to a site, the rogues which are being reported from that site will be verified against the rules which are defined in the rule profile. You can assign only one rogue rule profile to a site. Because of the site inheritance, all floors under a particular site inherit the rogue rule profile that is mapped at the area, site, or building level. For example as shown in the below image, Floor1 and Floor2 will inherit the rogue rule profile which is mapped at the SanJose level. A rogue rule profile mapped to a floor gets precedence over a rogue rule inherited from a parent site. For example as shown in the below image, if the Rogue Rule Profile A is directly mapped to Floor1, then the Rogue Rule Profile A takes precedence over the Rule Profile B which is assigned to the parent site which is SJC2. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 39 Custom Classification of Rogue Access Points Edit a Rogue Rule Profile Edit a Rogue Rule Profile Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the Rogue Rule Profiles tab. Step 3 In the Rogue Rule Profiles table, click the profile name that you want to edit. Step 4 In the Edit Rule Profile window that appears, make the necessary changes and click Save. ) and choose Assurance > Rogue and aWIPS > Rules tab. Edited rule profiles will not modify any previously classified data. It is applied only on the new data which is processed after changes are made. Delete a Rogue Rule Profile Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 Click the Rogue Rule Profiles tab. Step 3 In the Rogue Rules table, click the profile name that you want to delete and click Delete. Step 4 Click Delete in the confirmation dialog box that appears. ) and choose Assurance > Rogue and aWIPS > Rules tab. Create a Rogue Rule Profile You can create a rule with specific conditions and then associate it to a rule profile. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 40 Custom Classification of Rogue Access Points About Allowed Vendor List Step 1 In the Cisco DNA Center GUI, click the Menu icon ( Step 2 In the Create Rogue Rule Profile screen, click Get Started. Step 3 In the Profile Name field, enter a unique name for the rule profile. Step 4 Click Next. Step 5 In the Rule List table, check the check box next to the rule name, and click Next. ) and choose Workflows > Create a Rogue Rule Profile. You can add up to five rogue rules in a profile. Step 6 In the Sort rules in order of priority screen, drag and drop a rule into the desired priority with the highest priority on top to reorder rules based on your priority. Step 7 Click Next to associate a rogue rule profile to a desired location. Step 8 Check the check box next to the site to associate this rule profile, and click Next. Rule profile can exist without being assigned to any site. Rules are not checked unless the rule profile is assigned to a site. Note If a vendor rule and rule profile are mapped to a same site, then the vendor rule takes precedence. Step 9 Review the rogue rule profile configuration in the Summary screen. Step 10 In the Summary screen, click the Back button to make any changes to the values entered in the previous screens. Step 11 Click Create Rule Profile. A message appears, stating that the rule profile is created successfully. Step 12 To view all rogues and profiles, click the View all Rogue Rules and Profiles button. The Rogue Rule Profiles tab lists all the rogue rules and rule profiles created. You can also view the created rule profiles by navigating to this path: In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Assurance > Rogue and aWIPS > Rules > Rogue Rule Profiles. About Allowed Vendor List With the allowed vendor list feature, you can define whether APs from specific vendors will trigger a specific threat level. You can create a list of allowed vendors, so that threats from these vendors are not marked as High Threats. You can decide whether they need to be marked as Potential or Informational threats. In a given workflow, you can add upto five vendors to the allowed list. Allowed vendor rule which is mapped at any level takes precedence over the inherited rule. For example, if the allowed vendor rule A is mapped to a floor level, then the vendor rule A takes precedence over the allowed vendor rule B which is present at the site, area, or building level. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 41 Custom Classification of Rogue Access Points View Vendor Rule List Information View Vendor Rule List Information Step 1 In the Cisco DNA Center GUI, click the Menu icon ( tab. Step 2 The Allowed Vendor List table shows the list of allowed vendors with the following details. Each vendor rule is displayed as an entity. ) and choose Assurance > Rogue and aWIPS.Allowed List • Vendor Name • Match Criteria • Threat Level • Associated Site(s) • Last Changed Edit a Vendor Rule This procedure shows how to edit a vendor list. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( tab. Step 2 In the Allowed Vendor List table, click the Vendor Name that you want to edit. Step 3 In the Edit Allowed Vendor List window that appears which allows you to edit the following parameters: ) and choose Assurance > Rogue and aWIPS.Allowed List • Threat Level • Match Criteria • Vendor Name • Associated Sites Step 4 After making the necessary changes, click Save. Delete a Vendor Rule This procedure shows how to delete a vendor. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( tab. ) and choose Assurance > Rogue and aWIPS.Allowed List Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 42 Custom Classification of Rogue Access Points Create a List of Allowed Vendors Step 2 In the Allowed Vendor List table, check the check box of the Vendor Name which you want to delete, and click Delete. A message saying Deleting the selected allowed vendor(s) will impact all sites associated with it.There is 1 site associated with this allowed vendor(s) is displayed. Step 3 Click Delete. A message saying Selected Allowed vendor(s) deleted successfully is displayed. Create a List of Allowed Vendors Use this procedure to create a list of vendors to be on the allowed list, so that threats from these vendors are not marked as high threats. You can add five vendors in a single workflow for a set of sites. Step 1 In the Cisco DNA Center GUI, click the Menu icon ( ) and choose Workflows > Create Allowed Vendor List. You can also create a list of allowed vendors by clicking the Menu icon and choose Assurance > Rogue and aWIPS > Allowed List tab. Step 2 In the Create Allowed Vendor List screen, click Let's Do it. To skip this screen in the future, check the Don't show this to me again check box. The Create Allowed Vendor List screen appears. Step 3 Select a threat level to apply when the Vendor name with threat matches with the Vendor rule name from the Threat Level radio button. The available threat levels are: Potential or Informational. Step 4 From the Selection Criteria drop-down list, choose a selection criteria for the vendor name. The available selection criterias are: Exactly Matches or Contains. Step 5 In the Vendor Name field, enter the vendor name. The Vendor Name match is case-sensitive. Step 6 Click to add more vendor to the allowed. In a given workflow, you can add a maximum of five vendors to allowed list. Step 7 In the Site Selection screen, check the check box next to the site where you want to apply your allowed vendor list. Because of the site inheritance, all floors under a particular site inherit the vendor rule that is mapped at the area, site, or building level. Step 8 Click Next. Step 9 In the Summary page, you can view details about the allowed vendor and site selection details. Step 10 Click Done. The Allowed Vendor List Created window appears. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 43 Custom Classification of Rogue Access Points Create a List of Allowed Vendors Step 11 To create another allowed vendor list, click the Create New Allowed Vendor Listbutton and follow Step 3 through Step 8 in this procedure. Step 12 To view the created vendor list, click View all allowed Lists. Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 44 CHAPTER 7 Rogue and aWIPS Event Notifications • Rogue and aWIPS Event Notifications, on page 45 Rogue and aWIPS Event Notifications You can configure Cisco DNA Center to send a notification whenever a rogue or aWIPS attack takes place. These events will not be logged in Cisco DNA Center Notification Center. If an event occurs after you have subscribed to “Rogue Threats” or “aWIPS threats”, you can receive notifications by REST APIs (Webhook, PagerDuty, and Webex) or syslog server. • See the “Work with Events” topic in Cisco DNA Center Platform User Guide to configure the Webhook and syslog destinations. • See the “Cisco DNA Center to PagerDuty Integration” topic in Cisco DNA Center ITSM Integration Guide to configure the PagerDuty destination. • See the “Cisco DNA Center to Cisco WebEx Integration” topic in Cisco DNA Center ITSM Integration Guide to configure the Webex destination. When completing this procedure, ensure that you select and subscribe to a rogue or aWIPS event. To subscribe to a rogue or aWIPS event in the Cisco DNA Center GUI, click the Menu icon ( ) and choose Platform > Developer Toolkit > Events. Note You will receive event notifications only after subscription. For threats that occurred before subscription, in the Cisco DNA Center GUI, click the Menu icon ( ) and choose Reports > Report Templates > Rogue and aWIPS. Webex and PagerDuty destinations have limits of 100 event notifications per 5 minutes. If you will receive more than 100 events in 5 minutes, configure Webhook or syslog destination. Rogue Events Rogue events are triggered only for the following “High” threat level rogues: • Beacon Wrong Channel Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 45 Rogue and aWIPS Event Notifications Rogue Events • Beacon DS Attack • AP Impersonation • Rogue on Wire • Honeypot • Custom Rules created with Threat Level as High Rogue events are triggered when: • High threat level rogue is discovered in network for the first time (ROGUE_NEW_THREAT_DETECTED) • High threat level rogue is deleted in network (ROGUE_THREAT_DELETED) • Threat level is changed from High to Potential or Informational (ROGUE_THREAT_LEVEL_CHANGED) • Threat level is changed from Potential or Informational to High (ROGUE_THREAT_LEVEL_CHANGED) • Threat level remains High but threat type changes (ROGUE_THREAT_TYPE_CHANGED) Rogue Events Payload Details: { "detectingApLocation": "string", "rssi": "int", "threatMacAddress": "string", "threatType": "string", "detectingApMacAddress": "string", "threatState": "string", "wlcIp": "string", "detectingApName": "string", "containmentState": "string", "vendorName": "string", "ssid": "string", "threatLevel": "string" } Commands in Payload: • threatMacAddress - Mac Address of the Rogue Ap • threatType - Type of Rogue threat (Beacon DS Attack, AP Impersonation, Rogue on Wire, Honeypot, or Custom Rules created with Threat Level as High) • threatState - State of the Rogue threat (ROGUE_NEW_THREAT_DETECTED, ROGUE_THREAT_DELETED, ROGUE_THREAT_LEVEL_CHANGED), ROGUE_THREAT_LEVEL_CHANGED, or ROGUE_THREAT_TYPE_CHANGED • threatLevel - State of the rogue (High, Potential, or Informational) • detectingApName - Name of the strongest detecting AP • detectingApMacAddress - MAC Address of the strongest detecting AP • detectingApLocation - Location of strongest detecting AP • rssi - RSSI value of the detecting AP that detects the Rogue AP • containmentState - Containment state of the Rogue AP (PENDING, NOTCONTAINED, or CONTAINED) Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 46 Rogue and aWIPS Event Notifications aWIPS Events • threatVendorName - Vendor Name of the Rogue AP • ssid - Latest SSID or Honeypot SSID • wlcIp - IP Address of the Wireless Controller aWIPS Events aWIPS events are triggered for all aWIPS threats in network. Notification is sent for each Detecting AP. If multiple APs detect the same threat, you will receive multiple event notifications. For source based aWIPS threats, source information will be sent. Destination information will be sent as “Not Applicable”. For destination based aWIPS threats, destination information will be sent. Source information will be sent as “Not Applicable”. For pair based aWIPS threats, both source and destination information will be sent. aWIPS Events Payload Details: { "sourceVendorName": "string", "detectingApLocation": "string", "attackType": "string", "sourceMacAddress": "string", "detectingApMacAddress": "string", "wlcIp": "string", "detectingApName": "string", "targetMacAddress": "string" } Commands in Payload: • attackType - Type of the aWIPS attack • sourceMacAddress - MAC Address of the attacker • sourceVendorName - Vendor name of the attacker • targetMacAddress - MAC Address of the target • detectingApLocation - Location of the detecting AP detecting • detectingApMacAddress - MAC Address of the detecting AP • detectingApName - Name of the detecting AP • wlcIp - IP Address of the Wireless Controller Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 47 Rogue and aWIPS Event Notifications aWIPS Events Cisco DNA Center Rogue Management and aWIPS Application Quick Start Guide, Release 2.2.3 48
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
Download PDF
advertisement