Rogue Detection and Classification
Aruba Central supports rogue detection and classification feature that enables your Aruba Central administrators to detect intrusion events and classify rogue devices. Rogue devices refer to the unauthorized devices in your WLANWireless Local Area Network. WLAN is a 802.11 standards-based LAN that the users access through a wireless connection. network. With Aruba Central, you can create a detailed definition of what constitutes a rogue device, and quickly act on a rogue AP for investigation, restrictive action, or both. Once rogue devices are discovered, Aruba Central sends alerts to your network administrators about the possible threat and provides essential information needed to locate and manage the threat.
Aruba Central discovers unauthorized devices in your WLAN network using APs. It uses polling routers and switches to locate, identify, and classify unknown APs.
The Rogue AP detection module referred to as RAPIDSRogue Access Point identification and Detection System. An AMP module that is designed to identify and locate wireless threats by making use of all of the information available from your existing infrastructure. in previous releases of Aruba Central supports the following features:
- Automatic detection of unauthorized wireless devices.
- Wireless detection, using authorized wireless APs to report other devices within range to calculate and display rogue location on a VisualRF map.
- Wired network detection of rogue APs located beyond the range of authorized APs and sensors, routers, and switches. It also identifies the switch port to which a rogue device is connected.
Important Considerations
Note the following important points:
- Users with the admin role of can see all rogue AP devices.
- Each rogue device frequently has multiple discovery methods, all of which are listed.

In the current release, Aruba Central supports rogue detection and classification based on the default rules pre-defined on the device. However, the administrators can set IDSIntrusion Detection System. IDS monitors a network or systems for malicious activity or policy violations and reports its findings to the management system deployed in the network. parameters only for the APs.

The
tab provides a summary of the rogue APs, interfering APs, and the total number of wireless attacks detected for a given duration.The following menu options in
tab provide information on the potential threats discovered in the network:
The
> page displays the following details:Rogues doughnut chart—shows the percentage of rogues and suspected rogue devices detected in the network.
Rogue table—shows the total number of devices classified as rogues and potential rogues.

The
> page displays the following information:- Top 5 detectors of Infrastructure attacks—Displays the number of infrastructure attacks detected in the network.
- Top 5 detectors of Client attacks—Displays the number of client attacks detected in the network.
- IDS attacks detected—Displays the number of IDS Attacks detected in the network.

The
> page provides the following information:
Page/Tab |
Description |
|
Displays the following information:
|
Rogue Details |
To view the details of a rogue, click the link to the rogue device in the column under the tab.The page displays a summary of the rogue device details. If the device is seen on the wire, the Rogue Details page shows the switch port for easy isolation.The table on the Rogue Details page displays the following information:
|
Infrastructure Attacks Client Attacks |
The and sections display the following information:
|

To generate reports for rogue devices, complete the following steps:
- In the Configure Reports section, click .
- In the Report(s) page, under the
- In the text box, enter a report title.
- From the drop-down list, select .
- From the drop-down list, select a timeline for which the report is to be generated .
section, perform the following steps:
The following options are available in the list: Last day, Last week, Last month, and Custom range. If you selected Custom range, you need to select the Start Date and End Date from the respective calendars to specify the custom timeline of the report.
-
For
, select the option or the option.If you selected
, you need to select a date and time from the calendar and time drop-down list, respectively, to set a schedule for the report. -
In the
drop-down list, select the frequency at which you want to run the RAPIDS report.You can select one of the following options: One Time, Daily Interval, Weekly Interval, and Monthly Interval.
-
In the
box, enter the email account(s) to which the report is to be sent. -
Click
.