Wireless network intrusion prevention
An important part of security monitoring for a wireless network implementation is a wireless intrusion prevention system. A wireless network should be treated as any other network type, each susceptible to attack and intrusion. What makes wireless networks unique is their boundaries are not limited by a physical boundary and the wireless specific protocols that must be used. Attacks to a wireless infrastructure are unique to the implemented protocols and require a system that can detect and mitigate these unique attacks. Wireless authentication and encryption are the primary attack vectors, but the wireless network infrastructure is a target as well.
It is common to have rogue access points in the airspace of the enterprise wireless deployment, but being able to determine the intent of the rogue access point is the purpose of a wireless intrusion prevention system. To be clear, a rogue access point generically is an access point in the same airspace...