Chapter 4 Tutorials
Here, an attacker sets up a rogue AP (RG) outside the network, which he uses in an attempt to
mimic an device-controlled SSID in order to capture passwords and other information when
authorized wireless clients mistakenly connect to it.
Figure 16 Rogue AP Example B
This tutorial shows you how to detect rogue APs on your network:
Click Configuration > Object > MON Profile to open the MON Profile screen and click the Add
1
button.
59
NWA3000-N Series User's Guide