User's Guide
Table Of Contents
- Table of Contents
- Preface
- Introduction
- Extreme AirDefense New User Experience
- Dashboard
- View Dashboard
- Create a Dashboard
- Manage Your Dashboard
- Delete the Dashboard
- Dashboard Widgets
- WIPS Widgets
- Widget - Top Criticalities
- Widget - Top Security Alarms
- Widget - Top Wireless Exploits
- Widget - Top Wireless Extrusions
- Widget - Top Vulnerabilities
- Widget - Severity by Device
- Widget - Severity by Tree Level
- Widget - Rogue Access Points
- Widget - Recent Rogue Events
- Widget - Anomalies
- Widget - Top BT Security Alarms
- Widget - BT Security Threat By Category
- Widget - BT Security Threat by Tree Level
- STATs Widgets
- COMPLIANCE Widgets
- WIPS Widgets
- Network View
- Alarm View
- Configuration
- Appliance Management
- Appliance Settings
- Backup / Restore Status
- Certificate / Key Validation
- Certificate Manager
- Configuration Backup
- Configuration Clear
- Configuration Restore
- Download Logs
- Language
- Login / SSH Banners
- Redundant Appliance Sync
- Structure Configuration
- Auto-Placement Rules
- Discovery Profile and Polling Configuration
- Communication Profile
- Security Profile
- Alarm Action Manager
- Device Action Manager
- Sensor Manager
- Alarm Configuration
- Wired Network Monitoring
- Performance Profile
- Environment Monitoring
- Client Types
- Appliance Settings
- Device Age Out
- Configuration Backup
- Forensic and Log Backup
- Configuration Restore
- Download Logs
- Redundant Appliance Synchronization
- Configuration Clear
- Language Settings
- License Management
- User Management
- Relay Server
- System Settings
- Appliance Management
- System Overview
- AirDefense in Standalone Mode
- System Components
- System Requirements
- Version Compatibility for Upgrade
- Connecting to Hardware Appliance
- Configuring the Appliance
- System Configuration
- Selecting and Deploying APs and Sensors
- Connecting to the Network
- Assigning User Interfaces
- Basic Navigation
- Alarm Time Reporting
- Extreme AirDefense on Virtual Platform
- Menu
- AirDefense Dashboard
- Network Tab
- Capabilities with a Central Management License
- Select-Network View
- Network Devices
- Association Tree
- Network Graph
- Network Filters
- Actions Menu
- Actions Descriptions
- Advanced Search
- Alarms
- Configuration Tab
- Search
- Appliance Platform
- Security & Compliance
- Network Assurance
- Infrastructure Management
- Operational Management
- Alarm Action Manager
- Alarm Configuration
- Client Types
- Device Action Manager
- Device Age Out
- Job Status
- Location Based Services
- Location Subscriber Profiles
- Pending State - Audit
- Sensor Only Settings
- Sensor Operation
- Appliance Management
- Appliance Settings
- Backup / Restore Status
- Certificate / Key Validation
- Certificate Manager
- Configuration Backup
- Configuration Clear
- Configuration Restore
- Download Logs
- Language
- Login / SSH Banners
- Redundant Appliance Sync
- Account Management
- Drop-down Menu Access
- DevicesDrop-down Menu
- Device Functions Requiring More Explanation
- Network Level Drop-down Menus
- Global Tools
- Floor Plan Actions
- Floor Manipulation Tools
- Unplaced Devices Level Drop-down Menu
- Security
- WLAN Management
- Central Management Console
- ADSPAdmin
- Accessing the ADSPadmin Console
- Manage System
- Manage the Database
- Software
- Configure AirDefense
- Configure IDS
- IP Address Configuration
- IPv6
- NETPORT
- DNS Configuration
- Bonding Configuration
- hname Configuration
- dname Configuration
- Time Configuration
- Time Zone Configuration
- NTP Configuration
- PING Config
- SNMP Agent Configuration
- SNMP Community String Configuration
- SNMP Trap Configuration
- HTTP Configuration
- PANIC Configuration
- UIPORT Configuration
- Troubleshooting
- AirDefense Icons
- Legacy Content
- Menu
- AirDefense Dashboard
- Network Tab
- Capabilities with a Central Management License
- Select-Network View
- Network Devices
- Association Tree
- Network Graph
- Network Filters
- Actions Menu
- Actions Descriptions
- Advanced Search
- Alarms
- Configuration Tab
- Search
- Appliance Platform
- Security & Compliance
- Network Assurance
- Infrastructure Management
- Operational Management
- Alarm Action Manager
- Alarm Configuration
- Client Types
- Device Action Manager
- Device Age Out
- Job Status
- Location Based Services
- Location Subscriber Profiles
- Pending State - Audit
- Sensor Only Settings
- Sensor Operation
- Appliance Management
- Appliance Settings
- Backup / Restore Status
- Certificate / Key Validation
- Certificate Manager
- Configuration Backup
- Configuration Clear
- Configuration Restore
- Download Logs
- Language
- Login / SSH Banners
- Redundant Appliance Sync
- Account Management
- Drop-down Menu Access
- DevicesDrop-down Menu
- Device Functions Requiring More Explanation
- Network Level Drop-down Menus
- Global Tools
- Floor Plan Actions
- Floor Manipulation Tools
- Unplaced Devices Level Drop-down Menu
- Security
- WLAN Management
- Central Management Console
- ADSPAdmin
- Accessing the ADSPadmin Console
- Manage System
- Manage the Database
- Software
- Configure AirDefense
- Configure IDS
- IP Address Configuration
- IPv6
- NETPORT
- DNS Configuration
- Bonding Configuration
- hname Configuration
- dname Configuration
- Time Configuration
- Time Zone Configuration
- NTP Configuration
- PING Config
- SNMP Agent Configuration
- SNMP Community String Configuration
- SNMP Trap Configuration
- HTTP Configuration
- PANIC Configuration
- UIPORT Configuration
- Troubleshooting
- AirDefense Icons
- Glossary
You must check the Monitor Privacy Settings checkbox to activate the functions. The functions are:
Function Description
Base 802.11 Authentication Open - When this checkbox is selected, open system authentication
does not actually provide authentication; it only performs identity
verification through the exchange of two messages between the
initiator (Wireless Client) and the receiver (wireless ).
Shared - When selected, shared key authentication provides
authentication by verifying that an initiator has knowledge of a
shared secret. Under the 802.11 standard, it is assumed that the
shared secret is sent to the wireless over a secure channel that is
independent of 802.11. In practice, the shared key authentication
secret is manually distributed and typed.
Extended 802.11 Authentication WPA - Select to activate Wi-Fi Protected Access, which uses
improved data encryption through the temporal key integrity
protocol (TKIP). TKIP scrambles the keys using a hashing algorithm
and, by adding an integrity-checking feature, ensures that the keys
haven't been tampered with.
WPA2 - Short for Wi-Fi Protected Access 2, this checkbox enables
the follow on security method to WPA for wireless networks that
provide stronger data protection and network access control. It
provides enterprise and consumer Wi-Fi users with a high level of
assurance that only authorized users can access their wireless
networks. Based on the IEEE 802.11i standard, WPA2 provides
government grade security by implementing the National Institute
of Standards and Technology (NIST) FIPS 140-2 compliant AES
encryption algorithm and 802.1x-based authentication.
Symbol KeyGuard - When this checkbox is selected, it activates
Symbol KeyGuard authentication protocols, which is provided by
Symbol.
Advanced Key Generation PSK (preshared key) - When selected, it activates the Pre-
shared Key authentication.
802.1x EAP-FAST - When selected, it keys 802.1X EAP Flexible
Authentication via Secure Tunneling.
802.1x EAP-TLS - When selected, it keys EAP Transport Level
Security.
802.1x EAP-TTLS - When selected, it keys EAP Tunneled
Transport Layer Security.
802.1x EAP-GTC - When selected, it keys EAP Generic Token
Card.
802.1x RSA/PKA - When selected, it keys EAP RSA Public Key
Authentication Protocol.
802.1x RSA/SID - When selected, it keys EAP RSA SecurID.
802.1x PEAP - When selected, it keys any 802.1X Protected
Extensible Authentication Protocol (PEAP).
802.1x LEAP - When selected, it keys EAP Lightweight
Extensible Authentication Protocol.
802.1x Other EAP - Keys any 802.1x EAP authentication/key
distribution mechanism other than the types previously mentioned.
Legacy Content Appliance Platform
Extreme AirDefense User Guide for version 10.5. 1051