Hi Community
After some research and documentation I didn't get any further.
I am looking for best practice or instructions on how to proceed with rogue access points.
- How do i get the wired mac address of the rogue access point
- How to proceed with suspected rogues
- When does it make sense to access the point to contain
The only information I found is in the User Guide 8.3.0.0 on page 483 and following.
Greetings
Marc