![ZyXEL Communications NWA1123-ACv2 User Manual Download Page 94](http://html1.mh-extra.com/html/zyxel-communications/nwa1123-acv2/nwa1123-acv2_user-manual_945928094.webp)
Chapter 9 MON Profile
NWA1123-ACv2 User’s Guide
94
Figure 58
Rogue AP Example
In the example above, a corporate network’s security is compromised by a rogue AP (
RG
) set up by
an employee at his workstation in order to allow him to connect his notebook computer wirelessly
(
A
). The company’s legitimate wireless network (the dashed ellipse
B
) is well-secured, but the
rogue AP uses inferior security that is easily broken by an attacker (
X
) running readily available
encryption-cracking software. In this example, the attacker now has access to the company
network, including sensitive data stored on the file server (
C
).
Friendly APs
If you have more than one AP in your wireless network, you should also configure a list of “friendly”
APs. Friendly APs are other wireless access points that are detected in your network, as well as any
others that you know are not a threat (those from recognized networks, for example). It is
recommended that you export (save) your list of friendly APs often, especially if you have a
network with a large number of access points.
RG
A
X
B
C
Summary of Contents for NWA1123-ACv2
Page 10: ...10 PART I User s Guide...
Page 29: ...29 PART II Technical Reference...
Page 55: ...Chapter 6 Wireless NWA1123 ACv2 User s Guide 55 Figure 31 Configuration Wireless AP Management...
Page 210: ...Appendix D Legal Information NWA1123 ACv2 User s Guide 210 Environmental Product Declaration...