Video: Securing Wireless with Air Marshal

Chris_Skees
Meraki Employee

When a rogue access point is detected, Air Marshal uses three primary techniques to impersonate, or spoof, the rogue access point to contain and render it useless.

 

 

This video is part of the Using Air Marshal to Secure Your Network module in the MR Advanced Operations course. If you want to learn more, you can complete the module in about 30 minutes or less!