< Home

WLAN/5/WLAN_DETECT_ROUGE_DEVICE

Message

WLAN/5/WLAN_DETECT_ROUGE_DEVICE: Detected rogue device. (Device MAC=[OPAQUE], Device type=[INTEGER], Device channel=[INTEGER], Device RSSI =[LONG], Device SSID=[OCTET], Monitor AP name=[OCTET], Monitor AP MAC=[OPAQUE], Monitor AP radio =[INTEGER], Monitor AP IP=[OCTET], Monitor AP channel=[INTEGER], Monitor AP ID =[INTEGER])

By default, this log is not recorded. If it needs to be recorded, run the rogue-device log enable command in the WLAN view.

Description

An AP detects a rogue device.

Parameters

Parameter Name Parameter Meaning
Device MAC Indicates the MAC address of a rogue device.
Device type Indicates the type of a rogue device.
  • 1: rogue AP
  • 2: rogue Ad-hoc
  • 3: rogue bridge
  • 4: rogue STA
Device channel Indicates the channel of a rogue device.
Device RSSI Indicates the RSSI of a rogue device.
Device SSID Indicates the SSID of a rogue device.
Monitor AP name Indicates the name of the monitoring AP.
Monitor AP MAC Indicates the MAC address of the monitoring AP.
Monitor AP radio Indicates the radio of the monitoring AP.
Monitor AP IP Indicates the IP address of the monitoring AP.
Monitor AP channel Indicates the channel of the monitoring AP.
Monitor AP ID Indicates the ID of the monitoring AP.

Possible Causes

An AP detects a rogue device.

Procedure

  1. Check parameters in the hwWlanWidsRogueDeviceTrap alarm to figure out the number of rogue devices and impacts on services.

    • If only a few rogue devices exist and services are not affected, no action is required.
    • If services are affected, go to step 2.

  2. Run the display wlan ids device-detected all command to check the detected rogue devices.
  3. Contain the detected rogue devices and configure WIDS rogue device containment.
    1. Run the wids contain enable command in the AP group radio view or AP radio view to enable rogue device containment.
    2. Run the contain-mode command in the WIDS profile view to configure the rogue device containment mode for APs.
  4. Check whether the log persists.

    • If so, go to step 6.
    • If not, go to step 7.

  5. Collect alarm, log, and configuration information, and contact technical support personnel.
  6. End.
Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >