Rogue AP detection
First Claim
1. A method comprising:
- initiating, at one or more processors of a wireless controller, a rogue access point detection process for a wireless network;
transmitting, from the one or more processors, a signature frame to a mobility agent in a wireless switch;
constructing the signature frame, by the mobility agent in the wireless switch, to include a switch identifier, a port identifier and a VLAN identifier in the signature frame;
transmitting, by the mobility agent in the wireless switch, the signature frame, to one or more access points in the wireless network;
receiving, at an authorized access point, the signature frame transmitted via a wireless signal from a rogue access point;
reporting reception of the signature frame to the wireless controller; and
generating, at the one or more processors, a signal to shut down a port associated with the rogue access point.
14 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems and computer readable media for rogue access point detection are disclosed. In some implementations, the method can include initiating, at one or more processors of a wireless controller, a rogue access point detection process for a wireless network, and transmitting, from the one or more processors, a signature frame to a mobility agent in a wireless switch. The method can also include receiving, at an authorized access point, the signature frame transmitted via a wireless signal from a rogue access point. The method can further include reporting reception of the signature frame to the wireless controller, and generating, at the one or more processors, a signal to shut down a port associated with the rogue access point.
11 Citations
20 Claims
-
1. A method comprising:
-
initiating, at one or more processors of a wireless controller, a rogue access point detection process for a wireless network; transmitting, from the one or more processors, a signature frame to a mobility agent in a wireless switch; constructing the signature frame, by the mobility agent in the wireless switch, to include a switch identifier, a port identifier and a VLAN identifier in the signature frame; transmitting, by the mobility agent in the wireless switch, the signature frame, to one or more access points in the wireless network; receiving, at an authorized access point, the signature frame transmitted via a wireless signal from a rogue access point; reporting reception of the signature frame to the wireless controller; and generating, at the one or more processors, a signal to shut down a port associated with the rogue access point. - View Dependent Claims (2, 3, 4, 17, 18)
-
-
5. A system comprising one or more processors configured to perform operations including:
-
initiating, at a wireless controller, a rogue access point detection process for a network; transmitting a signature frame to a mobility agent in a wireless switch via a wired portion of the network; constructing the signature frame, by the mobility agent in the wireless switch, to include a switch identifier, a port identifier and a VLAN identifier in the signature frame; transmitting, by the mobility agent in the wireless switch, the signature frame, to one or more access points in the wireless network; receiving, at an authorized access point, the signature frame transmitted via a wireless signal from a rogue access point; reporting reception of the signature frame to the wireless controller; and generating a signal to shut down a port associated with the rogue access point. - View Dependent Claims (6, 7, 8, 9, 10, 19, 20)
-
-
11. A nontransitory computer readable medium having stored thereon software instructions that, when executed by a processor of a wireless controller, cause the processor to perform operations including:
-
initiating a rogue access point detection process for a network; transmitting a signature frame to a mobility agent in a wireless switch via a wired portion of the network; constructing the signature frame, by the mobility agent in the wireless switch, to include a switch identifier, a port identifier and a VLAN identifier in the signature frame; transmitting, by the mobility agent in the wireless switch, the signature frame, to one or more access points in the wireless network; receiving, at an authorized access point, the signature frame transmitted via a wireless signal from a rogue access point; reporting reception of the signature frame to the wireless controller; and generating a signal to shut down a port associated with the rogue access point. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification