![]() Prerequisites RequirementsĬisco recommends that you have knowledge of these topics: Cisco Unified Network Architecture provides methods for rogue detection that enable a complete rogue identification and containment solution without the need for expensive and hard-to-justify overlay networks and tools. ![]() Rogue detection allows the network administrator to monitor and eliminate this security concern. Therefore, an employee who brings his or her own Access Point (Cisco or Non Cisco) into a well-secured wireless or wired infrastructure and allows unauthorized users access to this otherwise secured network, can easily compromise a secure network. Less thought is put into port security on wired networks, and wireless networks are an easy extension to wired networks. However, an unauthorized wireless network presents an additional layer of security concern. Wireless networks extend wired networks and increase worker productivity and access to information. This document describes Rogue Detection and Mitigation on Cisco Wireless Networks. ![]()
0 Comments
Leave a Reply. |