ZyXEL Communications NWA5120 Series User Manual page 94

802.11 a/b/g/n unified access point
Hide thumbs Also See for NWA5120 Series:
Table of Contents

Advertisement

Chapter 9 MON Profile
or set up their own rogue APs in order to capture information from wireless clients. If a scan reveals
a rogue AP, you can use commercially-available software to physically locate it.
Figure 53 Rogue AP Example
X
C
In the example above, a corporate network's security is compromised by a rogue AP (RG) set up by
an employee at his workstation in order to allow him to connect his notebook computer wirelessly
(A). The company's legitimate wireless network (the dashed ellipse B) is well-secured, but the
rogue AP uses inferior security that is easily broken by an attacker (X) running readily available
encryption-cracking software. In this example, the attacker now has access to the company
network, including sensitive data stored on the file server (C).
Friendly APs
If you have more than one AP in your wireless network, you should also configure a list of "friendly"
APs. Friendly APs are other wireless access points that are detected in your network, as well as any
others that you know are not a threat (those from recognized networks, for example). It is
recommended that you export (save) your list of friendly APs often, especially if you have a
network with a large number of access points.
94
A
RG
B
NWA5120 Series User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nwa5121-nNwa5121-niNwa5123-ni

Table of Contents