Today, wireless networking is a reality from which IT managers cannot escape. Regardless of the size of an organization, where it is located, or what vertical market it serves, network users want it. No longer is wireless networking a fringe technology – it’s mainstream and it continues to expand at stellar growth rates within the enterprise marketplace. | Written and provided by Global Knowledge CICWl TICMNOLOOIIt a division or tsssco hcmmxooics Expert Reference Series ofWhite Papers The Life and Death of a Rogue AP Using Cisco s WCS To Manage Potential Rogue APs 1-800-COURSES GigaWave Technologies White Paper The Life and Death of a Rogue AP Using Cisco s WCS to Manage Potential Rogue APs Author Bill Daniel Wireless Training Specialist CCSI CCNA MCSE I Windows NT MCSE Windows 2000 111 111 CISCO PARTNER All content is the property of GigaWave Technologies a division of TESSCO Technologies. 2007 All rights reserved. GigaWave Technologies White Paper Introduction Today wireless networking is a reality from which IT managers cannot escape. Regardless of the size of an organization where it is located or what vertical market it serves network users want it. No longer is wireless networking a fringe technology - it s mainstream and it continues to expand at stellar growth rates within the enterprise marketplace. As with most progressive organizations and corporations network users understand the value of wireless networking. Maybe they ve surfed the Internet wearing PJs on their bed downloaded files on their back porch or played games with wireless remotes. Obviously a large percentage enjoy sitting in a local coffee shop sipping java and responding to email. Regardless most have heard wireless networking s siren song offering them the freedom and flexibility they crave. Why Wireless can make them more productive. It might even make them more comfortable. Whatever the reason they want it and as Meatloaf sang in a recent song If it s something I want then it s something I need Basic end-user wireless can be very inexpensive and easy to set up. In fact chances are if users have not been given access to an authorized wireless solution they have already set up an unauthorized network of their own. If they haven t done that it s only a matter of time. This grassroots effort to set up personal wireless