Chapter 4 Tutorials
NWA3000-N Series User’s Guide
58
In this example, an employee illicitly connects his own AP (RG) to the network that the device
manages. While not necessarily a malicious act, it can nonetheless have severe security
consequences on the network.
Figure 15 Rogue AP Example A