Extreme AirDefense User Guide Version 10.5.
>
Preface
> Conventions
Published May 2021
Search this document
Print this page
Email this page
View PDF
Previous
Next
Preface
Conventions
Text Conventions
Terminology
Providing Feedback
Getting Help
Documentation and Training
Introduction
Scope of Documentation
Extreme AirDefense New User Experience
Login to ADSP
Logout of AirDefense
Download ADSP Toolkit
Download Toolkit from New User Interface
Launch the Old User Interface
Dashboard
View Dashboard
Set a Favorite Dashboard
Create a Dashboard
Manage Your Dashboard
Delete the Dashboard
Dashboard Widgets
WIPS Widgets
Widget - Top Criticalities
Widget - Top Security Alarms
Widget - Top Wireless Exploits
Widget - Top Wireless Extrusions
Widget - Top Vulnerabilities
Widget - Severity by Device
Widget - Severity by Tree Level
Widget - Rogue Access Points
Widget - Recent Rogue Events
Widget - Anomalies
Widget - Top BT Security Alarms
Widget - BT Security Threat By Category
Widget - BT Security Threat by Tree Level
STATs Widgets
Widget - Device Statistics Table
Widget - BSS by Configuration
Widget - Sanctioned BSS Seen In Last 5 Days
Widget - Wireless Client by Configuration
Widget - Top Talkers
Widget - BT/BLE Seen In Last 5 Days
Widget - BT By Configuration
Widget - BT Protocol Stack Count Comparison
COMPLIANCE Widgets
Widget - Policy Compliance
Widget - PCI Status
Widget - PCI 11.1 Compliance Status
Network View
Network View - Network Snapshot
Top 5 Security Threats
Alarms and Actions
Polled Devices
Sensed Devices
Network Pane - Details View
Network Pane - Device Details
Device Details - Toolbar
Device Type Details
Polled Devices Tab
Polled Devices - Widgets
BSS Tab
BSS Tab - Widgets
Wireless Clients
Wireless Clients - Widgets
Unknown Devices
Unknown Devices - Widgets
Bluetooth and Bluetooth Low Energy Devices
BT, BLE Devices - Widgets
Alarm View
Object Missing
Alarms - Details View
Alarms Widget View
Category/Sub-category Widget
Device Classification
Rogue Activity
Alarm Severity
Alarm Details List
Configuration
Appliance Management
Appliance Settings
Backup / Restore Status
Certificate / Key Validation
Certificate Validation
Key Validation
Certificate Manager
View Certificate Details
Certificate Types
View Certificates
Sharing Certificates
Sharing Certificates not in Default State
Add Certificates
Appliance Certificates
Generate Certificate Signing Request
Send CSR to a CA and Get Certificate Files
Importing Certificate Files from CA
Import New Certificate
Update Certificate Information
Changing Default Information
Change Certificate Password
Export Certificates
GUID-6D433813-3C5C-4112-8E5D-7B3D4AC2641A.xml
GUID-9C6352B9-4C7D-4559-B626-554413358D4B.xml
Configuration Backup
How Backups Work
Backup Recommendations
Manual Backups
Automatic Backups
Configuration Clear
Configuration Restore
Download Logs
Forensic and Log Backup
Language
Login / SSH Banners
Pre-Login Banner
Login Banner
SSH Banner
Redundant Appliance Sync
How Synchronization Works
Synchronization Rules
Manual Synchronization
Automatic Synchronization
Appliance Replacement Considerations
Structure Configuration
View And Manage Your Network Tree
Generate a Network Tree
Import the Network Tree
Floor Plans
Auto-Placement Rules
View Auto-Placement Rules
Add an Auto-Placement Rule
Edit an Auto-Placement Rule
Discovery Profile and Polling Configuration
Discovery Profile
View Discovery Profiles
Add a Discovery Profile
Edit a Discovery Profile
add-rule-icon
Polling Configuration
Edit Polling Preferences
Communication Profile
View Communication Profiles
Add a Communication Profile
Edit the Communication Profile
Delete Communication Profiles
Security Profile
View Security Profile
Add a Security Profile
Edit a Security Profile
Delete a Security Profile
Alarm Action Manager
View Alarm Action Manager Rule Set
Add Alarm Action Manager Rule Set
Select Alarms
Configuring Filters
Selecting Filters
Add Actions
Notification Actions
WIPS Mitigation
Info Gathering
Edit Alarm Action Manager Rule Set
Delete Alarm Action Manager Rule Set
Device Action Manager
View Device Action Manager Rule Set
Add a Device Action Manager Rule Set
Add a New Wireless Client/BSS Rule Set
Configuring Filters
Selecting Filters
Add Actions
Add a New Infrastructure Device Rule Set
Configuring Filters
Add Actions
Add a New BT/BLE Rule Set
Configuring Filters
Add Actions
Apply or Run the Device Action Manager Rule Sets
Apply Device Action Manager Rule Sets
Run Device Action Manager Rule Sets Manually
Sensor Manager
Operation Tab
Scan Mode Settings
Scan Settings
Spectrum Settings
Settings Tab
View Sensor Profile
Add a Sensor Profile
Edit a Sensor Profile
Delete a Sensor Profile
Alarm Configuration
Wired Network Monitoring
Performance Profile
View Performance Profile
Add Performance Profile
General Tab
Cumulative Tab
Wireless Clients
BSS Tab
Apply Performance Profile
Environment Monitoring
Client Types
Manage Client Types
Appliance Settings
Device Age Out
Configuration Backup
How Backups Work
View Backup Schedules
Scheduling Configuration Backup
Forensic and Log Backup
Forensic Backup Configuration
Log Backup Configuration
Configuration Restore
Download Logs
Forensic and Log Backup
Redundant Appliance Synchronization
How Synchronization Works
Synchronization Rules
Automatic Synchronization
Appliance Replacement Considerations
Configuration Clear
Language Settings
Change the Language
License Management
Auto License Management
Add Licenses
Manage License Manually
User Management
Manage User Accounts
Add User
Edit User Information
Delete User Account
Local User Settings
User Group Management
Add User Group
Edit User Group Information
Delete User Group
User Profile Management
Add User Profile
Edit User Profile
Delete User Profile
Relay Server
Configure External Relay Server
Import Relay Servers
Internal Relay Server
System Settings
Add System Log Server IP Address
System Overview
AirDefense in Standalone Mode
System Components
System Requirements
Supported Hardware Appliances
Supported Browsers
Supported Operating Systems
Version Compatibility for Upgrade
Version 9.5
WiNG Version Compatibility
Extreme Wireless Version Compatibility
Extreme Cloud Appliance Compatibility
Connecting to Hardware Appliance
Connect a Laptop
Connect a Monitor and Keyboard
Access Appliance Remotely
Configuring the Appliance
Add-On Modules
Hardware Dependencies
System Configuration
Selecting and Deploying APs and Sensors
Supported WiNG APs
Supported Extreme Wireless APs
Off-Channel Scanning (OCS)
Setting Up APs and Sensors
Modifying Resources
Connecting to the Network
Assigning User Interfaces
Default Login
User Accounts
User Types
System Access Limitations
Basic Navigation
Tree Structure
Device Search
Filters
Dashboard Drill Down
Alarm Time Reporting
Extreme AirDefense on Virtual Platform
Prerequisites
Required Files
Required License
Required System Configuration
Installing Extreme AirDefense 10.0 on VMware
Install Extreme AirDefense on Xen Hypervisor
Menu
Installing the Toolkit
Open
Frame Capture Analysis
Spectrum Analysis
Forensic Analysis-Basic
Accessing Forensic Analysis
Method 1
Method 2
Setting Time
Forensic Data
Advanced Forensic Analysis
Advanced vs. Basic Forensic Analysis
Scope Based Forensic Analysis
Device Based Forensic Analysis
Action Control
Action Control Table
Action Control Commands
Reports
Web Reporting Interface
Report Builder
Adding a Report
Adding Report Components
Available Report Components
Configuring Report Components
Configuring Report Filters
Deleting a Report
Importing a Report
Exporting a Report
Connection Troubleshooting
Getting Started
MAC Address Hints
Find MAC Address-Windows
Find MAC Address-MAC OSx
Linux Variants
Device Selection Wizard
Troubleshoot Another Wireless Client
Wireless Client Status
Results Summary
Observed Network
Export Captured Frames
Scheduled AP Tests
Scheduled AP Test
On-demand AP Tests
AP Test License
Scheduled Vulnerability Assessment
Scheduled Vulnerability Assessment
Vulnerability Assessment License
Scheduled Events
Monitoring Scheduled Events
Altering Event Schedules
Add Devices
BSS Fields
Wireless Client Fields
Other Device Fields
Appliance Fields
Import and Discovery
SNMP Discovery
Import Local File
Import Remote File
Import from Wireless Manager or Switch
Import File Formats
Devices
Profiles and Configurations
Scheduling AP Test or Vulnerability Assessment
Bluetooth Monitoring
Installing the Bluetooth Sensor
Importing Bluetooth Devices
Bluetooth License
AirDefense Dashboard
The Dashboard
Selecting Dashboard Scope
Customizing Dashboard Views
View Customization
Draggable Components
Dashboard Components
Network Tab
Capabilities with a Central Management License
Select-Network View
Show Menu
Viewing the Network
Types of Devices
Actions Menu
Network Devices
BSS
Wireless Client
Unknown Devices
Bluetooth Devices
Menu Network Support
Association Tree
Network Graph
Network Filters
Grouping Filter
Network Scope Filter
First Last Seen Filter
Flag Filter
Alarm Severity Filter
Alarm Type Filter
Classification Filter
On Network Filter
Device Filter
Network Devices
Wireless Clients
BSSs and Unknown Devices
Bluetooth Devices
Compliance Filter
Status Filter
Signal Strength Filter
Security-Sensed Filter
Security-Polled Filter
Actions Menu
Actions Descriptions
Audit Devices
Retrieve Diagnostic Logs
Remove Devices
Move Devices
Upgrade Devices
Import CLI Variables
Verify Import of CLI Variables
Export Devices
Command Run and Log
Search Device Configuration
Advanced Search
Alarms
AirDefense Alarm Model
Capabilities with a Central Management License
Alarm Table
Alarm Filters
Grouping Filter
Network Scope Filter
Alarm Severity Filter
Alarm Type Filter
View Filter
Device Filter
Alarm Lifecycle Filter
Alarm ID Filter
Alarm Categories and Criticality
Alarm Categories
Alarm Criticality
Alarm Details
Alarm Actions
Configuration Tab
Search
Appliance Platform
Appliance Licensing
View Current License Information
License Status
Add Licenses
Using a License File
Using an Authorization Code
Requesting a License
Copy Appliance ID
Download Appliance Keys
License Assignments
View License Assignments
Assigning a License to a Device
Tree Setup
Planning Your Network Tree
Triangulation Considerations
Policy Considerations
UI Scope Considerations
Combining Considerations
Building your Network Tree
Create Network Levels
Add Floors
Importing Your Network Tree
Security Profiles
View Security Profiles
Modify Security Profiles
Add a New Security Profile
General Tab
Privacy Tab
Rates Tab
Apply a Security Profile
Auto-Placement Rules
Auto-Placement Rules for Devices
Sensors
APs and Switches
Add Auto-Placement Rules
Import Auto-Placement Rules
Auto-Licensing
Communication Settings Profile
View Communication Settings Profile
Modify Communication Settings Profile
Add a New Communications Settings Profile
SNMP Tab
Console Tab
HTTP Tab
Apply a Communication Settings Profile
Import Communications Settings
Polling
Relay Server
Configure Relay Server
External Relay Server
Import Relay Server Information
Things to Remember
Internal Relay Server
Import/Discover Devices
Available Fields for Importing Switches Using a Remote File
Available Fields for SNMP Discovery
Setting the Schedule
Import Device File Format
BSS
Wireless Client
Switch
Device on Wire
Security & Compliance
Security Profiles
Wired Network Monitoring
Generate Alarm Policy for New Devices
Network Assurance
Live RF Settings
Capabilities with a Central Engagement License
Visualizations
Applications
Performance Profiles
View Performance Profiles
Edit Performance Profiles
Add a New Performance Profile
General Tab
Cumulative Tab
Wireless Clients Tab
BSS Tab
Apply a Performance Profile
Environment Monitoring
Anomaly Baseline View
Infrastructure Management
Device Access
Passwords Tab
Interfaces Tab
Device Firmware
Upload Device Firmware Image
RF-Domain
Channel Settings
Radio Settings
WLAN Profiles
Add a WLAN Profile
General Tab
Security Tab
Apply a WLAN Profile
CLI Configuration
Add a New CLI Profile
Apply a CLI Profile
CLI Commands
CLI Variables
Command Run and Log
Operational Management
Alarm Action Manager
Add an Action Rule
Alarms Tab
Actions Tab
WIPS Mitigation
ACL
Port Suppression
Termination
SNMP Trap
Info Gathering
AP Test
Frame Capture
Vulnerability Assessment
Data Collection
Live RF / Floor Plan
Spectrum Analysis
Sys Log
Advanced Filter Tab
Filter List
Expression Editor
Description Tab
Apply an Alarm Action Manager Template
Alarm Configuration
Configuring Alarms
Anomalous Behavior Alarms
Alarm Library
Bluetooth Alarms
Alarm Library
Exploits Alarms
Alarm Library
Infrastructure Alarms
Alarm Library
LBS Alarms
Alarm Library
Performance Alarms
Alarm Library
Platform Health Alarms
Alarm Library
Policy Compliance Alarms
Alarm Library
Proximity
Alarm Library
Reconnaissance Alarms
Alarm Library
Rogue Activity Alarms
Alarm Library
Vulnerabilities Alarms
Alarm Library
Client Types
Manage Client Types
Device Action Manager
Add a New Wireless Client/BSS/Unknown Devices Rule Set
Configuring Filters
Selecting Filters
Actions
Add an Infrastructure Device Rule Set
Filters
Actions
Applying a Device Action Manager Template
Sequence of Rules in Rule Sets
Device Age Out
Job Status
Location Based Services
Location Based Services Profiles
Add a New LBS Profile
Client Based Settings
Copy Settings
Set Client Type Priorities
Presence Settings
Location Tracking Settings
Global LBS Settings
Apply LBS Profile
Edit LBS Profiles
Copy Settings to all Appliances
Set Different Profile
Location Subscriber Profiles
Add a New Location Subscriber Profile
Connection Settings
Location and Region Events
Presence Events
RSSI Data
Apply an Existing Location Subscriber Profile
Reference Material for Location Based Services
Pending State - Audit
Sensor Only Settings
Add a New Sensor Settings Profile
Apply a Sensor Settings Profile
Sensor Operation
Scan Settings
ASA In-Line Settings
Appliance Management
Appliance Settings
Backup / Restore Status
Certificate / Key Validation
Certificate Validation
Key Validation
Certificate Manager
View Certificate Details
Certificate Types
View Certificates
Sharing Certificates
Sharing Certificates not in Default State
Add Certificates
Appliance Certificates
Generate Certificate Signing Request
Send CSR to a CA and Get Certificate Files
Importing Certificate Files from CA
Import New Certificate
Update Certificate Information
Changing Default Information
Change Certificate Password
Export Certificates
GUID-6D433813-3C5C-4112-8E5D-7B3D4AC2641A.xml
GUID-9C6352B9-4C7D-4559-B626-554413358D4B.xml
Configuration Backup
How Backups Work
Backup Recommendations
Manual Backups
Automatic Backups
Configuration Clear
Configuration Restore
Download Logs
Forensic and Log Backup
Language
Login / SSH Banners
Pre-Login Banner
Login Banner
SSH Banner
Redundant Appliance Sync
How Synchronization Works
Synchronization Rules
Manual Synchronization
Automatic Synchronization
Appliance Replacement Considerations
Account Management
Account Access
New User Account
View User Information
Add or Edit User Accounts
User Roles
Scope Permissions
Add/Edit Group Accounts
Local Authentication
Password Reset
Remote Authentication
User Preferences
Default View
Auto Refresh
Log Level
Device Inactivity
Copy MAC Formats
Use Proxy to Access Appliance
Network New Column Preferences
Show Job Initiation Message Dialogs
Automatic Configuration of WLAN Infrastructure Devices
Auto-Connect Feature
Zero Touch WLAN Infrastructure Deployment
Deployment Requirements
Setup Prerequisites
Configuration Examples
AP-7131 Example
CISCO Device Example
CLI Variable Scenarios
Scenario A
Scenario B
Scenario C
Custom CLI Example
Configuration Notes
Drop-down Menu Access
DevicesDrop-down Menu
APs Drop-down Menu
APs - Properties
BSS Drop-down Menu
BSS Properties
Wireless Clients Drop-down Menu
Wireless Clients - Properties
Sensors Menu
Sensor - Properties
Sensor Network Configuration
IPv4
IPv6
DNS
Wireless Switch Drop-down Menu
Wireless Switch - Properties
Wired Switch Drop-down Menu
Wired Switch - Properties
Unknown Devices Drop-down Menu
Unknown Devices - Properties
WLSE Drop-down Menu
WLSE - Properties
AirWave Switch Drop Down Menu
AirWave Switch - Properties
Device Functions Requiring More Explanation
Live View
Common Area
Menus
Buttons
Drop-down Menus
Live View Settings
Live View Filters
Data Tab
Connections Tab
Devices Tab
Frames Tab
Frame Capture
Location Tracking
Port Lookup
Readiness Test
Spectrum Analysis
Advanced Spectrum Analysis
Network Level Drop-down Menus
Appliance Level Drop-down Menu
Country Level Drop-down Menu
Region Level Drop-down Menu
City Level Drop-down Menu
Campus Level Drop-down Menu
Area (Building) Level Drop-down Menu
Live RF/Floor Plan Level Drop-down Menu
Creating Floor Plans
Maximum Size Allowed for a Scaled Floor Plan
Uploading Background Image
Add Additional Floors
Edit Floor Plans
Global Tools
Context Label
Floor Plan Actions
Auto Refresh
Generate Bill of Materials
Import ZIP / SPZ
LAN Planner
Import PDF
Export Floor Plan to ZIP File
Floor Manipulation Tools
Live Tab
Predictive RF
Live Comparison Tab
Forensic Comparison Tab
Tracking Rogue Devices
AP Assisted Tracking
BSS Tracking
Verify Location Tracking
Client Tracking
Unplaced Devices Level Drop-down Menu
Network Level Drop-down Menus
Appliance Level
All Other Levels
Security
WIPS
Planning Your Sensor Deployment
Deployment Considerations
Physical and Electromagnetic Interference
Device Placement Considerations
Device Density
Device Requirements per Area
Desired Monitoring and Intrusion Protection Functionality
Assets to be Protected
Sensor Quantity and Placement
Power and Data Cabling
Planning Your Sensor Placement
Prerequisites for Sensor Placement
Procedure
Sensor Placement with WEP Cloaking
Considerations for Sensor Placement with WEP Cloaking
For Adequate Protection
Sensor Placement with Location Tracking
Considerations for Sensor Placement with Location Tracking
IDS versus Location Tracking
Sensor Monitoring
Vulnerability Assessment
On-Demand Vulnerability Assessment
Scheduled Vulnerability Assessment
WEP Cloaking
WEP Cloaking Overview
Ongoing Cloaking Ability
Recommendations
Configure WEP Cloaking
WLAN Management
Infrastructure Management
Device Firmware
Channel Settings
Radio Settings
WLAN Profiles
General Tab
Security Tab
CLI Configuration
Add a CLI Profile
Apply a CLI Profile
CLI Variables
Operational Management
Pending State Audit
Appliance Platform
Relay Server
Import Relay Server Information
Central Management Console
Configuring Master/Slave Servers
Things to Remember
Sharing Certificates
Adding a Slave Server
ADSPAdmin
Accessing the ADSPadmin Console
Manage System
Manage the Database
Software
Configure AirDefense
Configure IDS
IP Address Configuration
IPv6
NETPORT
DNS Configuration
Bonding Configuration
hname Configuration
dname Configuration
Time Configuration
Time Zone Configuration
NTP Configuration
PING Config
SNMP Agent Configuration
SNMP Community String Configuration
SNMP Trap Configuration
HTTP Configuration
PANIC Configuration
UIPORT Configuration
Troubleshooting
AP Testing
Connection Troubleshooting
Live RF
Forensic RF
Spectrum Analysis
Advanced Spectrum Analysis
Advanced Troubleshooting
Assurance Suite (Network Assurance)
Radio Share Network Assurance
Customer Support
AirDefense Icons
AirDefense Application Icons
Overlay Icons
Dashboard Icons
Tree Icons
Alarm Icons
Appliance Icons
Switch Icons
Sensor Icons
Icons
BSS Icons
Unknown Device Icons
Manager Icons
SSID Icon
Wireless Client Icons
Default or Uncategorized Devices
MCDs
VoIP Phones
Laptops
Employee Laptops
Employee Phones
Employee Devices
High Priority Visitor Devices
Visitor Devices
Low Priority Visitor Devices
Legacy Content
Menu
Installing the Toolkit
Open
Frame Capture Analysis
Spectrum Analysis
Forensic Analysis-Basic
Accessing Forensic Analysis
Method 1
Method 2
Setting Time
Forensic Data
Advanced Forensic Analysis
Advanced vs. Basic Forensic Analysis
Scope Based Forensic Analysis
Device Based Forensic Analysis
Action Control
Action Control Table
Action Control Commands
Reports
Web Reporting Interface
Report Builder
Adding a Report
Adding Report Components
Available Report Components
Configuring Report Components
Configuring Report Filters
Deleting a Report
Importing a Report
Exporting a Report
Connection Troubleshooting
Getting Started
MAC Address Hints
Find MAC Address-Windows
Find MAC Address-MAC OSx
Linux Variants
Device Selection Wizard
Troubleshoot Another Wireless Client
Wireless Client Status
Results Summary
Observed Network
Export Captured Frames
Scheduled AP Tests
Scheduled AP Test
On-demand AP Tests
AP Test License
Scheduled Vulnerability Assessment
Scheduled Vulnerability Assessment
Vulnerability Assessment License
Scheduled Events
Monitoring Scheduled Events
Altering Event Schedules
Add Devices
BSS Fields
Wireless Client Fields
Other Device Fields
Appliance Fields
Import and Discovery
SNMP Discovery
Import Local File
Import Remote File
Import from Wireless Manager or Switch
Import File Formats
Devices
Profiles and Configurations
Scheduling AP Test or Vulnerability Assessment
Bluetooth Monitoring
Installing the Bluetooth Sensor
Importing Bluetooth Devices
Bluetooth License
AirDefense Dashboard
The Dashboard
Selecting Dashboard Scope
Customizing Dashboard Views
View Customization
Draggable Components
Dashboard Components
Network Tab
Capabilities with a Central Management License
Select-Network View
Show Menu
Viewing the Network
Types of Devices
Actions Menu
Network Devices
BSS
Wireless Client
Unknown Devices
Bluetooth Devices
Menu Network Support
Association Tree
Network Graph
Network Filters
Grouping Filter
Network Scope Filter
First Last Seen Filter
Flag Filter
Alarm Severity Filter
Alarm Type Filter
Classification Filter
On Network Filter
Device Filter
Network Devices
Wireless Clients
BSSs and Unknown Devices
Bluetooth Devices
Compliance Filter
Status Filter
Signal Strength Filter
Security-Sensed Filter
Security-Polled Filter
Actions Menu
Actions Descriptions
Audit Devices
Retrieve Diagnostic Logs
Remove Devices
Move Devices
Upgrade Devices
Import CLI Variables
Verify Import of CLI Variables
Export Devices
Command Run and Log
Search Device Configuration
Advanced Search
Alarms
AirDefense Alarm Model
Capabilities with a Central Management License
Alarm Table
Alarm Filters
Grouping Filter
Network Scope Filter
Alarm Severity Filter
Alarm Type Filter
View Filter
Device Filter
Alarm Lifecycle Filter
Alarm ID Filter
Alarm Categories and Criticality
Alarm Categories
Alarm Criticality
Alarm Details
Alarm Actions
Configuration Tab
Search
Appliance Platform
Appliance Licensing
View Current License Information
License Status
Add Licenses
Copy Appliance ID
Download Appliance Keys
License Assignments
Tree Setup
Planning Your Network Tree
Building your Network Tree
Importing Your Network Tree
Security Profiles
View Security Profiles
Modify Security Profiles
Add a New Security Profile
Apply a Security Profile
Auto-Placement Rules
Auto-Placement Rules for Devices
Sensors
APs and Switches
Add Auto-Placement Rules
Import Auto-Placement Rules
Auto-Licensing
Communication Settings Profile
View Communication Settings Profile
Modify Communication Settings Profile
Add a New Communications Settings Profile
Apply a Communication Settings Profile
Import Communications Settings
Polling
Relay Server
Configure Relay Server
External Relay Server
Things to Remember
Internal Relay Server
Import/Discover Devices
Available Fields for Importing Switches Using a Remote File
Available Fields for SNMP Discovery
Setting the Schedule
Import Device File Format
Security & Compliance
Security Profiles
Wired Network Monitoring
Generate Alarm Policy for New Devices
Network Assurance
Live RF Settings
Capabilities with a Central Engagement License
Visualizations
Applications
Performance Profiles
View Performance Profiles
Edit Performance Profiles
Add a New Performance Profile
Apply a Performance Profile
Environment Monitoring
Anomaly Baseline View
Infrastructure Management
Device Access
Passwords Tab
Interfaces Tab
Device Firmware
Upload Device Firmware Image
RF-Domain
Channel Settings
Radio Settings
WLAN Profiles
Add a WLAN Profile
Apply a WLAN Profile
CLI Configuration
Add a New CLI Profile
Apply a CLI Profile
CLI Commands
CLI Variables
Command Run and Log
Operational Management
Alarm Action Manager
Add an Action Rule
WIPS Mitigation
Info Gathering
Advanced Filter Tab
Alarm Configuration
Configuring Alarms
Anomalous Behavior Alarms
Bluetooth Alarms
Exploits Alarms
Infrastructure Alarms
LBS Alarms
Performance Alarms
Platform Health Alarms
Policy Compliance Alarms
Proximity
Reconnaissance Alarms
Rogue Activity Alarms
Vulnerabilities Alarms
Client Types
Manage Client Types
Device Action Manager
Add a New Wireless Client/BSS/Unknown Devices Rule Set
Add an Infrastructure Device Rule Set
Applying a Device Action Manager Template
Device Age Out
Job Status
Location Based Services
Location Based Services Profiles
Add a New LBS Profile
Client Based Settings
Global LBS Settings
Apply LBS Profile
Location Subscriber Profiles
Add a New Location Subscriber Profile
Apply an Existing Location Subscriber Profile
Reference Material for Location Based Services
Pending State - Audit
Sensor Only Settings
Add a New Sensor Settings Profile
Apply a Sensor Settings Profile
Sensor Operation
Scan Settings
ASA In-Line Settings
Appliance Management
Appliance Settings
Backup / Restore Status
Certificate / Key Validation
Certificate Validation
Key Validation
Certificate Manager
View Certificate Details
Certificate Types
View Certificates
Add Certificates
Update Certificate Information
Export Certificates
Configuration Backup
How Backups Work
Backup Recommendations
Manual Backups
Automatic Backups
Configuration Clear
Configuration Restore
Download Logs
Forensic and Log Backup
Language
Login / SSH Banners
Pre-Login Banner
Login Banner
SSH Banner
Redundant Appliance Sync
How Synchronization Works
Synchronization Rules
Manual Synchronization
Automatic Synchronization
Appliance Replacement Considerations
Account Management
Account Access
New User Account
Local Authentication
Password Reset
Remote Authentication
User Preferences
Default View
Auto Refresh
Log Level
Device Inactivity
Copy MAC Formats
Use Proxy to Access Appliance
Network New Column Preferences
Show Job Initiation Message Dialogs
Automatic Configuration of WLAN Infrastructure Devices
Auto-Connect Feature
Zero Touch WLAN Infrastructure Deployment
Configuration Examples
AP-7131 Example
CISCO Device Example
CLI Variable Scenarios
Custom CLI Example
Drop-down Menu Access
DevicesDrop-down Menu
APs Drop-down Menu
BSS Drop-down Menu
Wireless Clients Drop-down Menu
Sensors Menu
Sensor Network Configuration
Wireless Switch Drop-down Menu
Wired Switch Drop-down Menu
Unknown Devices Drop-down Menu
WLSE Drop-down Menu
AirWave Switch Drop Down Menu
Device Functions Requiring More Explanation
Live View
Common Area
Menus
Buttons
Drop-down Menus
Live View Settings
Live View Filters
Network Level Drop-down Menus
Appliance Level Drop-down Menu
Country Level Drop-down Menu
Region Level Drop-down Menu
City Level Drop-down Menu
Campus Level Drop-down Menu
Area (Building) Level Drop-down Menu
Live RF/Floor Plan Level Drop-down Menu
Creating Floor Plans
Edit Floor Plans
Global Tools
Context Label
Floor Plan Actions
Auto Refresh
Generate Bill of Materials
Import ZIP / SPZ
Floor Manipulation Tools
Live Tab
Predictive RF
Live Comparison Tab
Forensic Comparison Tab
Tracking Rogue Devices
AP Assisted Tracking
Unplaced Devices Level Drop-down Menu
Network Level Drop-down Menus
Security
WIPS
Planning Your Sensor Deployment
Deployment Considerations
Physical and Electromagnetic Interference
Device Placement Considerations
Device Density
Device Requirements per Area
Desired Monitoring and Intrusion Protection Functionality
Assets to be Protected
Sensor Quantity and Placement
Power and Data Cabling
Planning Your Sensor Placement
Prerequisites for Sensor Placement
Procedure
Sensor Placement with WEP Cloaking
Considerations for Sensor Placement with WEP Cloaking
For Adequate Protection
Sensor Placement with Location Tracking
Considerations for Sensor Placement with Location Tracking
IDS versus Location Tracking
Sensor Monitoring
Vulnerability Assessment
On-Demand Vulnerability Assessment
Scheduled Vulnerability Assessment
WEP Cloaking
WEP Cloaking Overview
Ongoing Cloaking Ability
Recommendations
Configure WEP Cloaking
WLAN Management
Infrastructure Management
Device Firmware
Channel Settings
Radio Settings
WLAN Profiles
General Tab
Security Tab
CLI Configuration
Add a CLI Profile
Apply a CLI Profile
CLI Variables
Operational Management
Pending State Audit
Appliance Platform
Relay Server
Import Relay Server Information
Central Management Console
Configuring Master/Slave Servers
Things to Remember
Sharing Certificates
Adding a Slave Server
ADSPAdmin
Accessing the ADSPadmin Console
Manage System
Manage the Database
Software
Configure AirDefense
Configure IDS
IP Address Configuration
IPv6
NETPORT
DNS Configuration
Bonding Configuration
hname Configuration
dname Configuration
Time Configuration
Time Zone Configuration
NTP Configuration
PING Config
SNMP Agent Configuration
SNMP Community String Configuration
SNMP Trap Configuration
HTTP Configuration
PANIC Configuration
UIPORT Configuration
Troubleshooting
AP Testing
Connection Troubleshooting
Live RF
Forensic RF
Spectrum Analysis
Advanced Spectrum Analysis
Advanced Troubleshooting
Assurance Suite (Network Assurance)
Radio Share Network Assurance
Customer Support
AirDefense Icons
AirDefense Application Icons
Overlay Icons
Dashboard Icons
Tree Icons
Alarm Icons
Appliance Icons
Switch Icons
Sensor Icons
Icons
BSS Icons
Unknown Device Icons
Manager Icons
SSID Icon
Wireless Client Icons
Default or Uncategorized Devices
MCDs
VoIP Phones
Laptops
Employee Laptops
Employee Phones
Employee Devices
High Priority Visitor Devices
Visitor Devices
Low Priority Visitor Devices
Conventions
This section discusses the conventions used in this guide.