Introduction

This is an approach to detect (rogue) access points from the wired side. All nodes are compared against a list of MAC address samples from access points. If they match and multiple nodes reside on an interface you get an entry here.

Usage