I tested the capability of containing rogue AP over the air in a lab environment. It works great, but I have the following questions/concerns:
1. How could I detect if others/hackers do this to our wireless network?
2. Will the WLCs be able to detect this kind of stuff?
3. Any links or documents on this topic would be greatly appreciated.
Thanks
Binh