Chapter 4 Tutorials
In this example, an employee illicitly connects his own AP (RG) to the network that the device
manages. While not necessarily a malicious act, it can nonetheless have severe security
consequences on the network.
Figure 15 Rogue AP Example A
58
NWA3000-N Series User's Guide