Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.01.03 or greater

6-18
Wireless Network Management
AP Detection
Figure 6-10. Device Information > Radio Port/LAN Statistics > Unadopted RP
Screen
AP Detection
People may introduce unauthorized APs into your network for several
reasons.
Sometimes attackers set up rogue APs in your environment, hoping to lure
wireless users to authenticate to them, instead of to your network’s RPs. In
this way, attackers can collect sensitive information, including passwords
with which they can then target your private network.
More commonly, users introduce APs for their own convenience, not meaning
any particular harm. However—because users often take inadequate mea-
sures to secure these APs—the unauthorized APs open vulnerabilities for
others to exploit.