ZyXEL Communications NXC5200 User Manual page 93

Hide thumbs Also See for NXC5200:
Table of Contents

Advertisement

Chapter 5 Tutorials
Here, an attacker sets up a rogue AP (RG) outside the network, which he uses in
an attempt to mimic an NXC-controlled SSID in order to capture passwords and
other information when authorized wireless clients mistakenly connect to it.
Figure 23 Rogue AP Example B
This tutorial shows you how to detect rogue APs on your network:
Click Configuration > Object > MON Profile.
1
93
NXC5200 User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nxc5200 - v2.20

Table of Contents