Chapter 15 Rogue Ap Detection; Overview - ZyXEL Communications NWA-3160 User Manual

Nwa-3160 series
Hide thumbs Also See for NWA-3160:
Table of Contents

Advertisement

C
H A P T E R

15.1 Overview

Rogue APs are wireless access points operating in a network's coverage area that
are not under the control of the network's administrators, and can open up holes
in a network's security. Attackers can take advantage of a rogue AP's weaker (or
non-existent) security to gain access to the network, or set up their own rogue
APs in order to capture information from wireless clients. If a scan reveals a rogue
AP, you can use commercially-available software to physically locate it.
Note that it is not necessary for a network to have a legitimate wireless LAN
component for rogue APs to open the network to an attacker. In this case, any AP
detected can be classified as rogue.
Figure 109 Rogue AP Example
In the example above, a corporate network's security is compromised by a rogue
AP (R) set up by an employee at his workstation in order to allow him to connect
NWA-3160 Series User's Guide
Rogue AP Detection
15
175

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nwa-3163

Table of Contents