Table of Contents

 1     Scope        
 2     Rogue condition causes and prevention       
        2.1     Unauthorized transmission errors      
        2.2     Software errors         
        2.3     Media access control errors  
        2.4     Transceiver error      
 
3     Rogue detection, isolation, and mitigation   
        3.1     General        
        3.2     Detection     
        3.3     Isolation       
 4     Abbreviations and acronyms