3.3 Rogue Access Point Countermeasure
Based on the rogue access point localization, we
know exactly to which port of the switch that the rogue
access point is connecting. Then, the central system
will issue the SNMP command to block that switch
port. In case of the rogue access point location is
unavailable, the walk-through audit is required. The
countermeasure algorithm is shown in Figure 4.