Mojo Networks SS300ATC60 SpectraGuard Access Point / Sensor User Manual SS 300AT C 60 UserMan Part6

AirTight Networks, Inc. SpectraGuard Access Point / Sensor SS 300AT C 60 UserMan Part6

(SS-300AT-C-60) UserMan-Part6

Administration Tab SpectraGuard®  Enterprise User Guide 271  Creating a Configuration Template for an Authorized SSID             Create SSID Template allows you to specify the details for creating a new SSID as follows:        Authorized SSID: Displays the name of the SSID that you have added earlier        This is a Guest SSID: Select this option if this SSID is a Guest SSID used to provide Wi-Fi connectivity to visitors and guests. Though APs with Guest SSID are Authorized, they may be treated differently than APs that are used by employees for corporate access. Making an SSID as Guest allows you to specify additional classification and prevention policies related to Guest SSIDs. Refer to the sections Client Auto-Classification and Intrusion Prevention Policy for more details on classifying Guest SSIDs        Template Name: Name of the SSID template        Apply this SSID template at current location: Select this option to apply this SSID template to the current location. The WLAN policy at a location consists of SSID templates applied at that location. If the template is not applied at this location, it will not be a part of the WLAN policy
Administration Tab SpectraGuard®  Enterprise User Guide 272        Description: Write a short description to help identify the SSID template           Network Protocol allows you to select the allowed 802.11 protocols for the SSID:        Any: Allow APs with any network protocol for this SSID        Select: Specify the 802.11 protocol on which the system allows the APs connected to the network to operate–802.11 a, 802.11 b/g, and 802.11b only           AP Capabilities allows you to select the additional capabilities that Authorized APs may have. If you select any of these advanced capabilities, the classification logic allows APs with and without these capabilities. Select one of the following:        Any: Allow APs with any special capability for this SSID        Select: Specify if the AP uses any Turbo/Super techniques used by Atheros to get higher throughputs–Turbo, 802.11n, and SuperAG           Cisco MFP (802.11w) allows you to make classification decisions on Cisco Management Frame Protection(MFP) capability if 802.11w checkbox is selected under Security Settings:        Any: Policy does not check for MFP; both Cisco MFP enabled and disabled APs are classified as Authorized        Select: Policy checks for MFP        Cisco MFP Enabled: Select to classify only Cisco MFP supporting APs as Authorized APs        Cisco MFP Disabled: Select to classify non-Cisco MFP supporting APs as Authorized APs           Security Settings allows you to select the security protocol(s) for the SSID:        Any: Allow any security protocol for this SSID.        Select: Specify the exact security protocol(s) for this SSID from the list: 802.11i, WPA, Open, and WEP.           Encryption Protocols allows you to select encryption protocol(s) for the SSID:        Any: Allow any encryption protocol (including no encryption) for this SSID.        Select: Specify the exact encryption protocol(s) for this SSID from the list: WEP40, WEP104, TKIP, and CCMP. Note that encryption protocols selection panel gets enabled only when WPA or 802.11i is selected.           Authentication Framework allows you to select authentication protocol(s) for the SSID:        Any: Allow any authentication protocol (including no authentication) for this SSID.        Select: Specify the exact authentication protocol(s) for this SSID from PSK and 802.1x (EAP). Note that authentication protocols selection panel gets enabled only when WPA or 802.11i is selected.           Authentication Types allows you to select the allowed higher layer authentication types that Clients can use while connecting to the SSID. Authentication types do not determine the classification of APs, but are used to raise an event if a Client uses non-allowed authentication type. The system raises this event only if the system sees authentication protocol handshake frames.        Any: Allow any higher layer authentication type for Clients connecting to this SSID.        Select: Specify the exact authentication type(s) that Clients can use (only if 802.1x is selected) from the list: PEAP, EAP-TLS, LEAP, EAP-TTLS, EAP-FAST, and EAP-SIM.           Allowed Networks allows you to select the network(s) where wireless traffic on the SSID is to be mapped through Authorized APs:        Any: Allow wireless traffic on this SSID to be mapped to any network.        Select Networks: Specify the exact networks where wireless traffic on this SSID is to be mapped through Authorized APs. You can either choose from networks that are discovered automatically by the system or add new networks that are not yet discovered by the system.        Click <Select Networks> to open Allowed Networks for SSID dialog where you can move a network from Networks Monitored by the System to Allowed Networks for this SSID and add or delete networks.           Under Allowed AP Vendors, select one of the following:        Any: Allow APs manufactured by any vendor to connect to the system.        Select Vendors: Select the manufacturer of the AP for the specified SSID. SSID Templates
Administration Tab SpectraGuard®  Enterprise User Guide 273 A policy is collection of SSID templates attached to that location. You can apply an SSID template from the parent or create it locally; if you wish to customize the WLAN policy for that location. Other templates may be available to be attached but are not part of the WLAN policy and will not be used for AP classification. The SSID Templates section lists the SSID templates that are available at a particular location. You must apply the templates from the available list to create the WLAN policy at that location. A new AP or an existing Authorized AP is compared against the applied SSID templates to determine if it is a Rogue or Mis-configured AP. The SSID templates created at other locations can be applied to a selected location but cannot be edited or deleted. The edit and delete operations are possible only at the location where the template is created. The table shows the following details:        SSID: Name of the SSID        Guest SSID?: Indicates if it is a Guest SSID        Template Name: Name of the SSID template        Apply Here?: Enables you to apply the SSID template to the selected location. New and existing Authorized APs are evaluated against all applied SSID templates to determine if they are Rogue or Mis-configured.              : Click these icons to perform the following:        Copy the selected SSID template to another location.        Edit the SSID template. This option is enabled only at the location where the template was created.        View the SSID template.        Delete the template. This option is enabled only at the location where the template was created and only if the template is not applied at any other child locations of the location where it was created. Determining Policy Compliance An AP is considered as being compliant to the Authorized WLAN Policy if:           It is not connected to a No Wi-Fi network for its location           Its SSID matches with one of the templates attached at that location           Is connected to one of the networks specified in that template           Conforms to the other settings in that template (except the Authentication Framework, as this setting is not a property of the AP itself but of the backend authentication system) Note: If the template specifies certain allowed AP capabilities (such as Turbo, 802.11n, and so on.), the AP may or may not have those capabilities. However, if a capability is not selected, the AP must not have that capability to be considered as compliant. With location-based policies, you can specify (or attach) different sets of SSID templates for different locations. However, you cannot attach more than one template with the same SSID at any one location.
Administration Tab SpectraGuard®  Enterprise User Guide 274  Determining Policy Compliance Select No Wi-Fi Networks This section allows you to specify the list of networks at the selected location where no Wi-Fi APs are allowed to be connected. The No Wi-Fi Networks list at a location takes precedence over the list of networks in SSID templates applied at that location. In other words, if a network is included in a location’s no Wi-Fi list and happens to be in the list of networks in one or more applied SSIDs at that location, the network will be still treated as a no Wi-Fi network.
Administration Tab SpectraGuard®  Enterprise User Guide 275  No Wi-Fi Network      Networks Monitored by the System: Specifies the networks monitored by the system.         No Wi-Fi Networks at this Location: Specifies the networks to which no Wi-Fi AP should be connected at the selected location. You can move a network from Networks Monitored by the System to No Wi-Fi Networks at this Location. Click Add to enter a new network address to add a No Wi-Fi network at the selected location. RSSI based Classification APs are further classified based on the RSSI value that the sensors receive. If the signal strength exceeds a maximum threshold, the sensor appropriately classifies the AP. Airtight higly recommends that you turn on network connectivity based classification as it is the most reliable mechanism to classify wireless devices when most of your network is monitored using sensors and NDs. Under RSSI Threshold, select one or both (recommend) of the following checkboxes:           Pre-classify APs with signal strength stronger than threshold as Rogue or Authorized APs to specify the threshold RSSI value based on which the system further classifies APs.           Pre-classify APs connected to monitored subnet as Rogue or Authorized APs to classify APs based on their network connectivity.
Administration Tab SpectraGuard®  Enterprise User Guide 276   RSSI based Classification Operating Policies Select the Operating Policies screen to set the operating policies in the system. You can set the location-wise AP auto-classification policy, client auto-classification policy, intrusion prevention levels and policy. AP auto-classification The AP Auto-Classification policy function enables you to specify the AP classification policy for different AP categories.
Administration Tab SpectraGuard®  Enterprise User Guide 277    AP Auto-Classification Policy   Under External APs, AirTight recommends that you select Automatically move Potentially External APs in the Uncategorized list to the External Folder. The system automatically removes an AP from the External folder and moves it to an appropriate AP folder if it later detects that the AP is wired to the enterprise network. Under Rogue APs, AirTight recommends that you select Automatically move Potentially External APs in the Uncategorized list to the Rogue Folder. Note: Once you move an AP to the Rogue folder, the system never automatically removes it from the Rogue folder, even if it later detects that the AP is unwired from the enterprise network or its security settings have changed. Client auto-classification The Client Classification policy determines how Clients are classified upon initial discovery and subsequent associations with APs.
Administration Tab SpectraGuard®  Enterprise User Guide 278    Client Auto-Classification Policy   Under Initial Client Classification, specify if newly discovered Clients at a particular location, which are Uncategorized by default should be classified as External, Authorized or Guest. Under Automatic Client Classification, select one or more options to enable the system automatically re-classify Uncategorized and Unauthorized Clients based on their associations with APs. You can categorize the following types of Clients.           Clients running SAFE        All External Clients running SpectraGuard SAFE are classified as Authorized        All Uncategorized Clients running SpectraGuard SAFE are classified as Authorized        All Rogue Clients running SpectraGuard SAFE are classified as Authorized        All Guest Clients running SpectraGuard SAFE are classified as Authorized           Clients connecting to Authorized APs        All External Clients that connect to an Authorized AP are re-classified as Authorized        All Uncategorized Clients that connect to an Authorized AP are reclassified as Authorized        All Guest Clients that connect to an Authorized AP are reclassified as Authorized You can select the following Exceptions        Do not re-classify a Client connecting to a Mis-configured AP as Authorized        Do not re-classify a Client if its wireless data packets are not detected on the wired network (except if the connection is reported by WLAN controller)           Clients connecting to Guest APs        All External Clients that connect to a Guest AP are reclassified as Guest        All Uncategorized Clients that connect to a Guest AP are reclassified as Guest You can select the following Exceptions        Do not re-classify a Client connecting to a Mis-configured AP as Guest
Administration Tab SpectraGuard®  Enterprise User Guide 279        Do not re-classify a Client as Guest if its wireless data packets are not detected on the wired network (except if the connection is reported by WLAN controller)           Clients connecting to External APs        All Uncategorized Clients that connect to an External AP are reclassified as External        All Uncategorized Clients that connect to a Potentially External AP are classified as External        All Guest Clients that connect to an External AP are re-classified as External        All Guest Clients that connect to a Potentially External AP are re-classified as External           Clients connecting to Rogue APs        All Clients other than Authorized Clients that connect to a Rogue AP are (re)classified as Rogue        All Clients other than Authorized Clients that connect to a Potentially Rogue AP are classified as Rogue           RSSI Based Classification        Enable RSSI based Client Classification        Uncategorized Clients        External Clients        RSSI threshold -60 dBm        Destination folder Authorized           Bridging to the Corporate Network        Classify any non-authorized Client as Rogue if it is detected as bridging wi-fi to the corporate network Intrusion Prevention Policy The Intrusion Prevention Policy determines the wireless threats against which the system protects the network automatically. The system automatically moves such threat-posing APs and Clients to quarantine. The system can protect against multiple threats simultaneously based on the selected Intrusion Prevention level. If the server quarantines an AP or Client based on the Intrusion Prevention policy, the Disable Auto-quarantine option ensures that the system will not automatically quarantine this AP or Client (regardless of the specified Intrusion Prevention policies).
Administration Tab SpectraGuard®  Enterprise User Guide 280   Intrusion Prevention Policy   You can enable intrusion prevention against the following threats:   Rogue APs: APs connected to your network but not authorized by the administrator; an attacker can gain access to your network through the Rogue APs. You can also automatically quarantine Uncategorized Indeterminate and Banned APs connected to the network.   Mis-configured APs: APs authorized by the administrator but do not conform to the security policy; an attacker can gain access to your network through misconfigured APs. This could happen if the APs are reset, tampered with, or if there is a change in the security policy.   Client Mis-associations: Authorized Clients that connect to Rogue or External (neighboring) APs; corporate data on the Authorized Client is under threat due to such connections. AirTight recommends that you provide automatic intrusion prevention against Authorized Clients that connect to Rogue or External APs.   There is a special intrusion prevention policy for the smart devices that are not approved. Even if a current client policy restricts authorized clients from connecting to a guest AP, an unapproved smart device can still be allowed to do so. One needs to explicitly allow or restrict unapproved smart devices from connecting to a guest AP. Refer to the section Smart Device Detection in the Devices Tab chapter for more information.   Click Special Handling for Smart Devices  to enable special handling for unapproved smart devices. You can allow the unapproved smart device to connect to a guest AP only. To do this, 1. Select Enable Special Handling for Unapproved Smart Devices. 2. Select Allow connection to Guest AP, but not Authorized AP.   To disallow the unapproved smart device from connecting to both a guest AP as well as an authorized AP, select Do not allow connection to Guest AP and Authorized AP.
Administration Tab SpectraGuard®  Enterprise User Guide 281 Special Handling for Smart Devices     Non-authorized Associations: Non-authorized and Banned Clients that connect to Authorized APs; an attacker can gain access to your network through Authorized APs if the security mechanisms are weak. Non-authorized or Uncategorized Client connections to an Authorized AP using a Guest SSID are not treated as unauthorized associations.   Associations to Guest APs: External and Uncategorized Clients that connect to Guest APs are classified as Guest Clients. The Clients connected to a wired network or a MisConfigured AP can be specified as exceptions to this policy.   Ad hoc Connections: Peer-to-peer connections between Clients; corporate data on the Authorized Client is under threat if it is involved in an ad hoc connection.   MAC Spoofing: An AP that spoofs the wireless MAC address of an Authorized AP; an attacker can launch an attack through a MAC spoofing AP.   Honeypot/Evil Twin APs: Neighboring APs that have the same SSID as an Authorized AP; Authorized Clients can connect to Honeypot/Evil Twin APs. Corporate data on these Authorized Clients is under threat due to such connections.   Denial of Service (DoS) Attacks: DoS attacks degrade the performance of an official WLAN.   WEPGuard TM: Active WEP cracking tools allow attackers to crack the WEP key and gain access to confidential data in a matter of minutes or even seconds. Compromised WEP keys are used to gain entry into the authorized WLAN by spoofing the MAC address of an inactive Authorized Client.   Client Bridging/ICS: A Client with packet forwarding enabled between wired and wireless interfaces. An authorized Client bridging and unauthorized/uncategorized bridging Client connected to enterprise subnet is a serious security threat. Intrusion Prevention Level The system can prevent any unwanted communication in your 802.11 network. It provides you various levels of prevention-blocking mechanisms of varying effectiveness. Intrusion Prevention Level enables you to specify a trade-off between the desired level of prevention and the desired number of multiple simultaneous preventions across radio channels. The greater the number of channels across which simultaneous prevention is desired, the lesser is the effectiveness of prevention in inhibiting unwanted communication. Scanning for new devices continues regardless of the chosen prevention level.
Administration Tab SpectraGuard®  Enterprise User Guide 282    Intrusion Prevention Level   You can select the following prevention levels:           Block: A single sensor can block unwanted communication on any one channel in the 802.11b/g band and any one channel in the 802.11a band.           Disrupt: A single sensor can disrupt unwanted communication on any two channels in the 802.11b/g band and any two channels in the 802.11a band.           Interrupt: A single sensor can interrupt unwanted communication on any three channels in the 802.11b/g band and any three channels in the 802.11a band.           Degrade: A single sensor can degrade the performance of unwanted communication on any four channels in 802.11b/g band and any four channels in the 802.11a band. Block is the most powerful prevention level, that is, it can severely block almost all popular Internet applications including ping, SSH, Telnet, FTP, HTTP, and the like. However, at this level, a single sensor can simultaneously prevent unwanted communication on only one channel in the 802.11b/g band and one channel in the 802.11a band. If you want the sensor to prevent unwanted communication on multiple channels simultaneously in the 802.11 b/g and/or the 802.11a band, you must select other prevention levels. Note: Prevention Type determines the blocking strength to prevent communication from unwanted APs and Clients. The system can prevent multiple APs and Clients on each channel. Prevention Type is not applicable for Denial of Service (DoS) attacks or ad hoc networks. You must select a lower blocking level to prevent devices on more channels. Choosing a lower blocking level means that some packets from the blocked device may go through. Event Settings Configuration
Administration Tab SpectraGuard®  Enterprise User Guide 283 Event Configuration comprises of the following main tabs:  Security  System  Performance Security Security enables you to view events that indicate security vulnerability or breach in your network. Security events are further divided into the following sub-categories:         Rogue AP    Mis-Configured AP        Misbehaving Clients         Prevention         DOS         Ad hoc Network         Man-in-the-Middle         MAC Spoofing  Reconnaissance           Cracking Note: Prevention tab is not available with WIDS. System System enables you to view events that indicate system health. System events are further divided into the following sub-categories:  Troubleshooting  Sensor  Server Performance Performance enables you to view events that indicate wireless network performance problems. Performance events are further divided into the following sub-categories:           Bandwidth           Configuration           Coverage           Interference Once you select an event type and then a sub-category, a list of events under that sub-category appears.
Administration Tab SpectraGuard®  Enterprise User Guide 284    Event Configuration   The events list displays the following columns:           Activity Status Icon: Specifies the activity status of the event – Live or Instantaneous.           Display: Select the checkboxes that correspond to the types of events that you want to appear in the main Events screen.           E-mail: Select the checkboxes that correspond to the types of events for which you want email notifications sent to all users whose email addresses you have configured in the AdministrationEvent SettingsEmail Notification.           Notify: Select the checkboxes that correspond to the types of events for which you want notifications sent to external agents such as SNMP, Syslog, ArcSight, and OPSEC.  Vulnerability: Select checkboxes to indicate which types of events make the system Vulnerable. The Security Scorecard shows Vulnerable status if any events of the selected type occur.           Severity: Select the severity of each event as High, Medium, or Low. This function helps you to organize events in the most useful way.           Event: Provides a short description of each event.           Click for Details: Click   to view a detailed description of the corresponding event category.           Advanced Settings: Click <Edit> to open the Event Advanced Settings dialog and change the configuration parameters of the corresponding event category. <Edit> is disabled when the event has no configuration parameters. Note: The parameters in the Event Advanced Settings dialog changes according to the settings for the selected event.
Administration Tab SpectraGuard®  Enterprise User Guide 285  Event Advanced Settings Email Notification The Email Notification screen enables you to select the email addresses that should be notified when an event occurs at a particular location. You can select from the email addresses of system users or add a new email address.
Administration Tab SpectraGuard®  Enterprise User Guide 286    Email Notification   Click Add to open Custom Email Address for Notification dialog where you can add a new email address.  Custom Email Addresses for Notification Dialog   Click OK to add the new email address. Select an email address and click Delete to delete an existing email address. You can delete multiple email addresses using click-and-drag or using the <Shift> + <Down Arrow> keys and then clicking Delete. Device Settings You can define the device templates and SSID profiles through Administration->Local->Local Policies->Device Settings. Device templates can be applied to AirTight devices that function as WIPS sensors or as sensor/AP combos. To define and manage SSID profiles, use the Administration->Local->Device Settings->SSID profiles. To define and manage device templates, use Administration->Local->Device Settings->Device Template.
Administration Tab SpectraGuard®  Enterprise User Guide 287 SSID Profile Configure SSID Profiles using the SSID Profile.  SSID Profile   To add a wireless SSID profile, click Add New Profile. You can add multiple SSID profiles for the Sensor/AP combo operating in the AP mode. When in AP mode, a single physical AP device can be logically split up into multiple virtual AP's. Each wireless profile represents the configuration settings of a virtual AP.  Multiple virtual APs can be configured on a single radio. Up to 8 such virtual AP's can be configured using the Add New Profile dialog box. To delete a profile from the list, select the respective row, and click Delete.   A virtual AP has the following features:  Each virtual AP supports Open, WPA (TKIP), WPA2 (CCMP) or WPA/WPA2 (TKIP+CCMP) security. Distinct virtual AP's can have different security modes.  Each virtual AP can be used to provide distinct services that are independent of each other.  Data from the individual virtual AP’s can be assigned to a VLAN, so that data transmitted and received over one virtual AP is not mixed with that over any other virtual AP. Thus, data from a virtual AP is not visible outside that virtual AP.   The security settings for a virtual AP could be either of the following:  Open: Open means no security settings are to be applied. This is the default security setting.  WEP: WEP stands for Wireless Equivalent Privacy. WEP is a deprecated security algorithm for IEEE 802.11 networks. This has been provided for backward compatibility purpose only.
Administration Tab SpectraGuard®  Enterprise User Guide 288  WPA: WPA stands for Wi-Fi Protected Access. It is the security protocol that eliminates the shortcomings of WEP.  WPA2: WPA2  is the latest and more robust security protocol. It fully implements the IEEE 802.11i standard.  WPA and WPA2 mixed mode: This stands for a mix of the  WPA and WPA2 protocols. PSK or Personal Shared key is generally used for small office networks. In case of bigger enterprise networks, RADIUS authentication is used. Basic Settings The following dialog box appears on clicking Add New Profile.
Administration Tab SpectraGuard®  Enterprise User Guide 289  Basic Settings   The following table explains the fields present on the Basic Settings tab.   Field Description Default value Profile Name    This field specifies the name of the profile.
Administration Tab SpectraGuard®  Enterprise User Guide 290 SSID This field specifies the SSID of the wireless profile. This is a mandatory field. blank Broadcast SSID  This check box indicates whether the SSID is to be broadcast or not for this Virtual AP, in the beacon frames. If selected, the beacon for this Virtual AP carries the SSID. The check box is selected, indicating that the SSID is  broadcast. Client Isolation This check box indicates whether communication between 2 wireless clients of this virtual AP is enabled or disabled. If selected, wireless client communication  is enabled for the virtual AP. The check box is clear, indicating that wireless client communication for the virtual AP is disabled. Limit number of associations This field specifies the maximum number of clients that can associate with the AP. You can select the check box and then specify the number of clients.   Security Mode This specifies the security mode applied to the virtual AP.  The possible values are Open, WEP, WPA, WPA2, WPA and WPA2 mixed mode.      Fields related to security mode WEP Authentication Type Select Open if the type of authentication is open. In case of open authentication, the key is used for encryption only.  Select Shared if the authentication type is shared key. In case of shared key authentication, the same key is used for both encryption and authentication. Open WEP Type Select WEP40 if 40-bit WEP security is used. Select WEP104 if 104-bit WEP security is used. WEP104 Key Type Select ASCII option if you are comfortable with ASCII format and want to enter WEP key in that format. The Sensor/AP combo converts it to hexadecimal internally. Select HEX option if you are comfortable with hexadecimal format and want to enter WEP key in that format. ASCII Key WEP key is a sequence of hexadecimal digits. If WEP Type is WEP40, enter the key as a 5 character ASCII key or a 10 digit hexadecimal key, depending on the Key Type selected by you. If WEP Type is WEP104, enter the key as a 13 character ASCII key or a 26 digit hexadecimal key, depending on the Key Type selected by you. blank Show Key Select this check box to see the actual key on the screen. If this check box is cleared, the key is masked. clear Fields related to security mode WPA/WPA2/WPA and WPA2 Mixed Mode
Administration Tab SpectraGuard®  Enterprise User Guide 291 PSK Select the  PSK option if you want to use a personal shared key. The Pass phrase field is enabled when this option is selected. PSK Pass Phrase Specify the shared key of length 8-63 ASCII characters for PSK authentication blank Show Key Select this check box to see the actual pass phrase on the screen. If this check box is cleared, the key is masked. clear 802.1x Select 802.1x option if you want to use a RADIUS server for authentication. The fields on the Authentication and Accounting tabs are enabled on selecting this option. clear Opportunistic Key Caching Select the check box to enable client fast handoffs using opportunistic key caching method. Note that the key caching works within the same subnet only and not across subnets. selected Pre-authentication Select the Pre-Authentication check box to enable client fast handoffs using the Pre-Authentication method. clear Fields in the Authentication Tab-Primary RADIUS Server area  Server IP Enter the IP Address of the primary RADIUS server here. blank  Port Number Enter the port number at which primary RADIUS server listens for client requests. 1813 Shared Secret Enter the secret shared between the primary RADIUS server and the AP. blank Show Select this check box to see the actual text of the RADIUS Secret on the screen. If this check box is cleared, the key is masked. clear Fields in the Authentication Tab- Secondary RADIUS Server area  Server IP Enter the IP Address of the secondary RADIUS server here. blank  Port Number Enter the port number at which secondary RADIUS server listens for client requests. 1813 Shared Secret Enter the secret shared between the secondary RADIUS server and the AP. blank Show Select this check box to see the actual text of the shared secret on the screen. If this check box is cleared, the key is masked. clear Field in the Accounting Tab Enable RADIUS Accounting Select this check box to enable RADIUS Accounting. The other fields on the Accounting tab are enabled on selecting this check box. Define the primary RADIUS Server, and optionally secondary RADIUS Accounting server in the Accounting tab. clear Fields in the Accounting Tab- Primary Accounting Server area
Administration Tab SpectraGuard®  Enterprise User Guide 292  Server IP Enter the IP Address of the primary accounting server here. blank  Port Number Enter the port number at which primary accounting server listens for client requests. 1813 Shared Secret Enter the secret shared between the primary accounting server and the AP. blank Show Select this check box to see the actual text of the shared secret on the screen. If this check box is cleared, the key is masked. clear Fields in the Accounting Tab- Secondary Accounting Server area    Server IP Enter the IP Address of the secondary accounting server here. blank  Port Number Enter the port number at which secondary accounting server listens for client requests. 1813 Shared Secret Enter the secret shared between the secondary accounting server and the AP. blank Show Select this check box to see the actual text of the shared secret on the screen. If this check box is cleared, the key is masked. clear Network Settings The following figure shows the fields on the Network Settings tab.
Administration Tab SpectraGuard®  Enterprise User Guide 293  Network Settings   Configure the VLAN and DHCP settings to be used be the NAT device using the Network Settings tab. VLAN ID: Specify the VLAN ID. Start IP address: Specify the starting IP address of the DHCP address pool in the selected network ID. End IP address: Specify the end IP address of the DHCP address pool in the selected network ID. Local IP address: Specify an IP address in selected network ID outside of the DHCP address pool. This address is used as the gateway address for the guest wireless network. Subnet Mask: Specify the netmask for the selected network ID. Lease Time: Specify the DHCP lease time.
Administration Tab SpectraGuard®  Enterprise User Guide 294   Guest clients will be allowed to make DNS queries to specific servers only. Specify at least one DNS server by clicking Add..  under DNS Servers. The following screen appears on clicking Add..  Add DNS Server   You can specify up to three DNS server IP addresses. Requests to a DNS server,  not specified under DNS Servers, are dropped.  Guest users cannot configure DNS servers of their choice.  Using an external service like OpenDNS allows control over what types of site are resolved and hence allowed for guests.   To delete a DNS server, select the entry and click Delete. Guest Portal Settings The following figure shows the fields on the Guest Portal tab.
Administration Tab SpectraGuard®  Enterprise User Guide 295  Guest Portal   A guest network is used to provide restricted wireless connectivity (e.g., Internet only) to guests. Currently ONLY one wireless profile can be configured as a guest network. Select Enable Splash Page  to enable the splash page display. The portal consists of a web page with a submit button.  The portal supports only ‘click-through’; authentication is not supported. The portal page can be used to display the terms and conditions of accessing the guest network as well as any other information as needed. Create a .zip file of the portal page along with any other files like images, style sheets etc. The zip file must satisfy the following requirements for the portal to work correctly:
Administration Tab SpectraGuard®  Enterprise User Guide 296  The zip file should have a file with the name “index.html” at the root level (i.e., outside of any other folder). This is the main portal page. It can have other files and folders, (and folder within folders) at the root level that are referenced by the index.html file. The total unzipped size of the files in the bundle should be less than 100 KB.  In case, large images or other content is to be displayed on the page, this content can be placed on an external web server with references from the index.html file.  In this case, the IP address of the external web server must be included in the list of exempt hosts (see below). The index.html file must contain the following HTML tags for the portal to work correctly: A form element with the exact starting tag: <form method="POST" action="$action"> A submit button inside the above form element with the name “mode_login”. For example: <input type=”image” name=”mode_login” src=”images/login.gif”>The exact tag: <input type="hidden" name="redirect" value="$redirect"> inside the above form element. To upload the portal page, Click     following Upload Bundle. The following dialog appears on clicking    Upload zip   To download the factory default portal bundle file, click Download Sample. This file can be used as a template for creating a custom portal bundle file. To restore the portal bundle to factory default file, click Restore Default. Specify Login Timeout, in minutes, for which a wireless user can access the guest network after submitting the portal page. After the timeout, access to guest network is stopped and the portal page is displayed again. The user has to submit the portal page to regain access to the guest network. Specify Blackout Time. This is the time for which a user is not allowed to login after his previous successful session was timed out. For example,  if the session time-out is 1 hour and the blackout time is 30mins, a user will be timed out one hour after a successful login. Now after this point, the user will not be able to login again for 30 minutes. At the end of  30 minutes, the user can login again.
Administration Tab SpectraGuard®  Enterprise User Guide 297 Specify the Redirect URL.  The browser is redirected to this URL after the user clicks the submit button on the portal page. If left empty, the browser is redirected to the original URL accessed from the browser for which the portal page was displayed.   Walled Garden Settings: Configure a list of exempted IP address ranges. (E.g. 192.168.1.0/24) . HTTP and HTTPS services on these IP addresses can be accessed without redirection to the portal page.  If some part of the portal page (e.g., images) is placed on a web server, the web server’s IP address must be included in this list for the content to be successfully displayed. Click Add...   under  Walled Garden Settings to add the network/IP address of the exempted host. The following screen appears.  Add Network Address    Enter the host or network address To delete an exempted host IP address, select the entry and click Delete. Firewall Settings You can control the incoming and outgoing traffic for specific URLs by configuring firewall settings.
Administration Tab SpectraGuard®  Enterprise User Guide 298  Firewall Settings   To enable firewall, select Enable Firewall. Click Append New Rule to add the first rule or a new rule at the end of the existing rules. If you want to add a new rule between 2 rules, click  Add New Rule between the 2 rules. Specify the name of the rule in Rule Name, and the host name or IP address to which the rule applies in IP Address/Host Name. Specify the port number in Port. Specify the action Allow or Block. Specify the Protocol in Protocol. If you select Protocol as Other, the field Protocol No appears, where you need to specify the protocol number. Specify whether the action is to be applied to the incoming or outgoing request by selecting Incoming or Outgoing in Direction.  For example, if you want to block all outgoing TCP requests to the IP address 192.168.8.7 port 81, you will specify the rule details as follows. Click Append New Rule or Add New Rule  depending on where to want to add the rule. Specify an appropriate name for the rule in Rule Name. Specify IP address/Host Name as 192.168.8.7, Port as 81, Action as Block, Protocol as TCP, Direction as Outgoing.
Administration Tab SpectraGuard®  Enterprise User Guide 299   Define the default rule by selecting Allow or Block to allow or block any type of requests from IP addresses or host names for which rules have not been defined. Click Delete in the rule to delete the rule. Traffic Shaping & QOS The values of the QoS parameters will depend on the type of applications that are used over the network. You can specify the QoS parameters using the Traffic Shaping & QOS tab.  Traffic Shaping & QOS
Administration Tab SpectraGuard®  Enterprise User Guide 300   You can restrict the upload and download traffic on the SSID to a specific limit. Select Restrict upload traffic on this SSID to and enter a value to restrict the upload traffic for the SSID. Select Restrict download traffic on this SSID to and enter a value to restrict the download traffic for the SSID.   If you configure the radio in 11N mode, WMM (Wi-Fi multimedia) will always be enabled, irrespective of whether or not you select the WMM check box, in the SSID profile.  The reason for this behavior is that WMM is mandatory in 11N mode. In 11N mode, if the WMM check box is not selected,the system uses the default QoS parameters. The system uses the user-configured QoS settings if the WMM check box  is selected.   Select the WMM check box and define your own QoS settings for Wi-Fi multimedia on the SSID profile. Specify  voice, video, best effort or background as the SSID Priority depending on your requirement. Select Priority Type as Fixed if all traffic of this SSID has to be transmitted at the selected priority irrespective of the priority indicated in the 802.1p or IP header. Select Priority Type as Ceiling if traffic of this SSID can be transmitted at priorities equal to or lower than the selected priority.   Select the Downstream mapping option if Priority Type is selected as Ceiling. The priority is extracted from the selected field (802.1p, DSCP or TOS) and mapped to the wireless access category for the downstream traffic subject to a maximum of the selected  SSID Priority. For the downstream mappings, the mapping depends on the first 3 bits (Class selector) of the DSCP value, TOS value or 802.1p access category. The only exception will be DSCP value 46 which will be mapped to WMM access category 'Voice'.   Select the Upstream marking option as per the requirement. The incoming wireless access category is mapped to a priority subject to a maximum of the selected SSID priority and set in the 802.1p header and the IP header as selected.   Refer to the following table for the priority, 802.11e access category and the corresponding 802.1p access category and DSCP value, used for upstream marking. If 802.1p marking is enabled, the 802.11e access category maps to the corresponding 802.1p access category. If DSCP/TOS marking is enabled, the 802.11e access category maps to the corresponding DSCP value.   Priority                    802.11e access category 802.1p access category  DSCP 0 AC_BE (Best Effort) BK (Background) 0 1 AC_BK (Background) BE(Best Effort) 10 2 AC_BK (Background) EE (Excellent Effort) 18 3 AC_BE (Best Effort) CA (Critical Apps) 0 4 AC_VI (Video) VI(Video) 26 5 AC_VI (Video) VO(Voice) 34 6 AC_VO(Voice) IC(Internetwork Control) 46 7 AC_VO(Voice) NC(Network Control) 48 BYOD- Device Onboarding Device onboarding is a technique in which unapproved clients that are quarantined by the system are redirected to a configured splash page URL upon making any web access while all other communication is blocked. This technique can be enabled for all clients or selectively for smart clients only.
Administration Tab SpectraGuard®  Enterprise User Guide 301    BYOD - Device Onboarding   Select the Enable Device Onboarding check box to enable this technique. Select Smart Clients Only if you want this technique to be enabled for unapproved smart client but not for other wireless clients (like laptops etc.) Select All Clients if you want to enable this technique for all types of unapproved wireless clients. Specify the URL of the splash page in Redirect to URL. Wireless clients will be redirected to this URL upon making any web request.
Administration Tab SpectraGuard®  Enterprise User Guide 302 The IP address or hostname of the splash page host must be added to the walled garden settings for the redirection to work. Any other hostname or IP address that needs to be exempted from redirection can also be added here. Use Add and Delete to modify the list of exempted hostnames or IP addresses. Device Template You can create different templates to be applied to AirTight devices through this screen.  A device template is a combination of settings for radio, channels to monitor, VLANs to monitor, sensor configuration, antenna selection and port assignment. This combination can be applied to an AirTight device such as a SS-300-AT-C-50, SS-30-AT-C-60, SS-200-AT, SS-300-AT-C-10, SS-200-AT-01, or SS-300-AT. The SS-300-AT-C-50 and SS-300-AT-C-60 sensor models can serve as a sensor/AP combo. This means that the SS-300-AT-C-50 and SS-300-AT-C-60 sensor model can function as a WIPS sensor as well as an AP; all other sensor models can function as WIPS sensors only.    Device Template   You can choose a template as a default template, for a  location. This template will be applied to any new sensor tagged to that location. Note: Sensors prior to Version 5.2 do not support additional channels (802.11j & Turbo channels), Sensor Password Configuration, Offline Sensor Configuration, and Antenna Port Assignment features. If you apply templates containing these settings to older sensors, older sensors will ignore the additional settings.  Click Add New Device Template to add a new device template. Under Create Device Template, specify the following:  Name: Unique name of the device template (less than 40 characters)  Description: Brief description of the device template (less than 500 characters)
Administration Tab SpectraGuard®  Enterprise User Guide 303 Note: The system stores the default device configuration in a predefined template System Template. You cannot delete the System Template nor edit its name; it is unique. When a device is added or discovered, it is automatically assigned the configuration settings in this template. You are allowed to edit the configuration settings in the System Template to effect default configuration of your choice. Whenever you delete a user-defined device template, all the sensors associated with that template are assigned the System Template. You can override the template applied to a sensor manually from the Devices Sensors tab. If you modify the settings in a template, the new settings are applied to the sensors to which this template is applied.   On every tab in Device Template, you will find the Save, Restore Defaults and Cancel buttons.   You can navigate from one tab to another without saving the changes and save the changes made on all tabs by clicking Save on any one tab. Radio Settings You can define radio settings for SS-300-AT-C-60 and SS-300-AT-C-50 if you want to configure them as access points. The other devices function as WIPS sensors only.  Radio Settings-SS-300-AT-C-60
Administration Tab SpectraGuard®  Enterprise User Guide 304 When you select operation mode as Access Point, the other fields on the SS-300-AT-C-60 tab get enabled. In case the operation mode is WIPS sensor, these fields remain disabled. SS-300-AT-C-60 has 2 radios. You can separately configure the 2 radios, Radio 1 and Radio 2. You can add multiple SSID profiles to be monitored by the SS-300-AT-C-60 devices operating in AP mode.  The following table describes the fields related to Radio Settings.   Field Description Applicable to frequency band Operation Mode This field specifies whether the device functions as an access point or a WIPS sensor. Select access point if you want the device to function as an access point. Select WIPS sensor if you want the device to function as a sensor. This field is enabled only for SS-300-AT-C-60 and SS-300-AT-C-50 devices. The other 2 devices can function as WIPS sensors only. NA Frequency Band This field specifies the radio frequency band.  The possible values are 2.4 GHz, 5GHz. default value is 2.4 GHz - Channel Width This field specifies radio channel width. Possible values are 20 MHz or 20 Mhz/40Mhz.    For 2.4 GHz  and 5GHz  modes, the channel width defaults to 20MHz.   Operating Channel This field specifies the operating channel for the radio. By default, the AP selects the operating channel automatically. (Auto is selected, by default.) User can manually set the channel if desired. Select Manual, to set the operating channel manually. The channel list presented for manual channel selection, is populated based on the location selected in the left pane. If  the manually selected channel is not present in the country of operation selected for the device in the applied AP template, the AP falls back to auto mode and selects a channel automatically. All Selection Interval This field is visible and available when the Operating Channel is Auto. This field specifies the time interval,  in hours, at which the channel selection happens. You may enter any value between 1 and 48, both inclusive. All Channel Number This field is visible and available when the Operating Channel is Manual. This field specifies the operating channel number.   Fragmentation Threshold This field specifies the Fragmentation Threshold, in bytes. Permissible value for this field is between 256 and 2346 bytes (both inclusive). This field is applicable to 5GHz  and 2.4 GHz modes. RTS Threshold This field specifies the threshold for Request to Send (RTS) in bytes. Permissible value for this field is between 256 and 2347 bytes (both inclusive).  Default value is 2347 bytes. This field is applicable to 5 GHz and 2.4 GHz modes. Beacon Interval This field specifies the time interval between AP beacon transmissions. The value is set to 100. It is not editable.   DTIM Period The DTIM period specifies the period after which clients connected to the AP should check for buffered data waiting on the AP.  The value is set to 1. It is not editable.   Custom Transmit Power     This field enables you to control the transmission power of the AP. Select the custom transmit power check box and specify the transmission power of the AP in dBM.   Enable Background Scanning  Select this check box to enable background scanning by the device.   802.11n Guard Interval A period at the end of each OFDM symbol allocated to letting the signal dissipate prior to transmitting the next signal. This prevents overlaps between two consecutive symbols. Legacy 802.11a/b/g devices use 800ns GI. GI of 400ns is optional for 802.11n This field is 802.11n specific.
Administration Tab SpectraGuard®  Enterprise User Guide 305 Frame Aggregation This field specifies the enabling or disabling of MPDU aggregation This field is 802.11n specific.   When in AP mode, a single physical AP device can be logically split up into multiple virtual AP's. Each wireless profile represents the configuration settings of a virtual AP.  Click Add New Profile to select the SSID profiles for the AP. Each SSID profile corresponds to a virtual AP.  Upto 8 virtual APs can be configured on one radio.   Similar settings apply to SS-300-AT-C-50. SS-300-AT-C-50 has a single radio. It can be configured to work as an AP or as a WIPS sensor.   SS-300-AT-C-10 and SS-200-AT-01 can function as WIPS sensors only. Hence fields related to radio settings are disabled on these tabs. Channel Settings Channel Settings displays the 802.11a/802.11b/g and Turbo channels on which scanning and defending is enabled/disabled. Sensors scan WLAN traffic on channels specified under Channels to Monitor and defend the network against various WLAN threats on channels specified under Channels to Defend.   Under Channel Settings tab, specify the following:     Select Operating Region: Specifies the region / country of operation. Each region has its own laws governing the use of the unlicensed frequency spectrum for 802.11 communications and Turbo mode. The system automatically selects the channels that are allowed by the regulatory domain in selected region. (Default Operating Region: United States)        Click the link Channel Frequency Table to view a list of channels, protocols, frequencies, and capabilities.
Administration Tab SpectraGuard®  Enterprise User Guide 306    Channel Frequency Table       Channels to Monitor: Specifies the 802.11a and b/g channels to be used by sensors to monitor WLAN traffic.        Select the check box Select All Standard Channels to select a superset of all the channels. For 802.11a, the standard sets of channels are 184 – 216 and 34 - 165. By default, this check box is selected.        Select the check box Select All Allowed Channels to select all the allowed channels in the selected operating region. By default, this checkbox is selected.        Select the check box Additionally, select intermediate channels (works only with 802.11 a/b/g sensor platforms) to select the channels between the allowed channels that are non-allowed in the selected operating region. Selecting the option helps the system detect devices operating on illegal channels. By default, this checkbox is deselected.     Turbo Mode: Certain Atheros Chipset based devices use wider frequency bands on certain channels in 802.11 b/g and 802.11a band of channels. The system is capable of monitoring channels that support Turbo Mode of operation and detecting any unauthorized communication on these channels. You can select specific or all channels to monitor wireless activity on Turbo channels. There are ten Turbo channels in a-mode. These channels are 40, 42, 48, 50, 56, 58, 152, 153, 160, and 161. There is only one Turbo channel in b/g-mode that is,6.      Channels to Defend: Specifies the channels to be used by sensors to defend WLAN traffic to protect your network against various WLAN threats. Note: It is mandatory that channels selected for defending be selected for scanning. If a channel is selected for defending and is not already selected for scanning, the system automatically selects that channel for scanning as
Administration Tab SpectraGuard®  Enterprise User Guide 307 well. If you deselect a channel from Channels to Monitor, then this channel is also deselected from Channels to Defend section.     For operating region US, if you select channel 184, 188, 192, or 196 under Channels to Monitor or Channels to Defend, and click Save, the following message box appears.    Warning while turning on channel in US safety band   If you click Yes, the channel is selected. If you click No, the channel is not selected. Note: Channels 184,188, 192, 196 fall under the public safety band in the US. They are turned off, by default, under Channels to Monitor and Channels to Defend. VLAN Settings The VLAN Settings tab facilitates the management of VLANs to be monitored by a sensor device in sensor mode. These settings are applicable to sensor devices in sensor mode of operation only; and not to sensor devices in ND or AP mode of operation. In the earlier versions of the system, specifying the VLAN to be monitored, or deleting the VLANs that were being monitored could be done using the sensor command line interface only. From this version, the addition and deletion of VLANs to be monitored can be done from the user interface as well, using the VLAN Settings tab.
Administration Tab SpectraGuard®  Enterprise User Guide 308  VLAN Settings   To add VLANs to be monitored, select the Enable VLAN Monitoring check box. Click Add  to add a VLAN.  Add VLAN    Enter the VLAN ID and click OK, to add the VLAN to the list of monitored VLANs.   When you save changes to the VLAN Settings tab by clicking Save, an additional confirmation message appears, after clicking OK on the Confirmation-Save message.
Administration Tab SpectraGuard®  Enterprise User Guide 309  Confirmation-Save VLAN Settings   The VLAN Settings are saved only when Yes is clicked on this message. If you click No, the  Confirmation-Save message will re-appear.   The VLANs created should not exceed the “MAX allowed VLAN to monitor” for the sensor mode. If the number of VLANs specified by user exceeds this maximum count,  the maximum VLANs (created &) monitored should be the first maximum VLAN entered by user in sensor template.   To delete a VLAN, select the VLAN from the Additional VLANs to be Monitored area, and click Delete.   The changes in the sensor template will affect the working of the sensor operating in sensor mode in the following way- If the sensor template for a sensor has “Enable VLAN Monitoring” checkbox not selected, then all the existing VLANs remain as is, there would be no change to existing VLANs. If the sensor template for this sensor has “Enable VLAN Monitoring” checkbox selected, then (a) All the VLANs which were previously configured on sensor which are also in sensor template’s VLAN list of 'VLANs to be monitored' would not have any effect on their configuration. (b) If communication VLAN currently configured on the sensor  is not in sensor template’s VLAN list of 'VLAN to be monitored', then the communication VLAN’s configuration wouldn’t change. (c) All the VLANs which were previously configured on sensor but are not present in sensor template’s VLAN list of 'VLANs to be monitored' would have their VLAN configuration deleted from that sensor (Except if the VLAN is communication VLAN as clause 'b' states). (d) All the VLANs which were previously NOT  configured on sensor but are present in sensor template’s VLAN list of 'VLANs to be monitored' would be created on the sensor and by default DHCP settings would apply for these VLANs being created. when the sensor is in offline mode, the communication VLAN is monitored. Sensor Password Configuration Sensor Password setting allows you to manage the password for user config on the sensor Command Line Interface (CLI). By defining a password in the sensor template, you can manage the password for a group of sensors without having to change it on each sensor separately. Type a new password or click Restore Default to change the current password settings. If you choose Restore Default, then the password setting will be the same as that in the System Template. Note: If a sensor template contains a blank password, then the sensors, to which this template is assigned, retain their existing password. Factory setting of the System Template contains a blank password.
Administration Tab SpectraGuard®  Enterprise User Guide 310  Sensor Password Configuration   Under Sensor Password Configuration tab specify the following:      Current Password state: Specifies that the new password must be the same as the one specified in the System Template.        New Password: Enter the new password to be assigned as user ‘config’ password for all sensors associated with the sensor template being edited.      Confirm Password: Reenter the password to help confirm the new password before saving. Offline Sensor Configuration This feature provides some security coverage even when there is no connectivity between a sensor and the server. The sensor provides some classification and prevention capabilities when it is disconnected from the server. The sensor also raises events, stores them, and pushes them back to the server on reconnection.
Administration Tab SpectraGuard®  Enterprise User Guide 311  Offline Sensor Configuration-Offline Sensor Parameters       Enable offline Sensor mode: Select this checkbox to enable the offline sensor mode. When the offline sensor mode is enabled, the sensor continues to detect and classify devices, raise event alerts, and prevent ongoing threats. (Default: Selected)     Time to switch to offline mode after Sensor detects loss of connectivity: Specify the time after which, if the sensor does not receive any communication from the Server and Enable offline Sensor mode is enabled, the sensor switches to the offline mode. (Minimum: 5 minutes; Maximum: 60 minutes; Default: 15 minutes)   Under Offline Sensor Parameters tab, you can view the following:        Number of APs to be stored: Number of APs that the sensor will continue to detect in Offline mode (Default: 128)        Number of Clients to be stored: Number of Clients that the sensor will continue to detect in Offline mode (Default: 256)        Number of events to be stored: Number of events that the sensor will continue to raise in Offline mode (Default: 256)        Number of prevention records to be stored: Number of prevention records that the sensor will continue to store in Offline mode to prevent ongoing threats (Default: 256)
Administration Tab SpectraGuard®  Enterprise User Guide 312  Offline Sensor Configuration-Device Classification Policy      Under Device Classification Policy tab specify the desired classification policies to move APs and Clients from the Uncategorized list to the Categorized list:      Under AP Classification Policy, select one or more options to enable the system automatically move APs from the Uncategorized AP list to the Categorized AP list:        Move networked APs to the Rogue or Authorized AP folder in the Categorized AP List        Move non-networked APs to the External AP folder in the Categorized AP List      Under Client Classification Policy, select one or more options to enable the system automatically classify Clients based on their associations with APs:       On association with an Authorized AP, classify an Uncategorized Client as Authorized        On association with a Rogue AP, classify an Uncategorized Client as Unauthorized        On association with an External AP, classify an Uncategorized Client as Unauthorized
Administration Tab SpectraGuard®  Enterprise User Guide 313  Offline Sensor Configuration-Intrusion Prevention Policy    Under Intrusion Prevention Policy tab enable intrusion prevention against the following threats:        Rogue APs        APs categorized as Rogue        Uncategorized APs that are connected to the network        Misconfigured APs        APs categorized as Authorized but using no security mechanism (Open)        APs categorized as Authorized but using weak security mechanism (WEP)        Client Mis-associations        Authorized Client connections to APs categorized as External        Unauthorized Associations        Unauthorized Client connections to APs categorized as Authorized        Adhoc Connections        Authorized Clients participating in any adhoc network        Honeypot/Evil Twin APs        Authorized Client connection to Honeypot/Evil Twin APs
Administration Tab SpectraGuard®  Enterprise User Guide 314 Additionally, specify the intrusion prevention level that allows you to choose a trade-off between the desired level of prevention and the desired number of multiple simultaneous preventions across radio channels. You can choose either of the following prevention levels:           Block           Disrupt           Interrupt           Degrade Antenna Selection and Port Assignment Antenna connectivity setting is an advanced setting and should be used with utmost care. This setting allows you to provide additional information about the type of antennas connected to the sensor. You need to change this setting only if you use sensors that allow you to connect antennas. Note: Antenna Selection feature is available for SS-300 Sensor and Port Assignment feature is available for SS-200 Sensor.  Applying a template with a particular antenna setting to a sensor with incompatible antenna connection can result in a loss of system functionality leading to higher security risks. The default setting being “Diversity On”. It is recommended that you avoid changing the Antenna Port Setting in the default sensor template. If you use sensors with 2 single band antennas, create a separate template with “Diversity Off” setting and manually apply it to a group of sensors which use single band antennas. Note: The default setting is “Diversity On” which means both the antennas are dual band.
Administration Tab SpectraGuard®  Enterprise User Guide 315  Antenna Selection and Port Assignment   Under Antenna Selection and Port Assignment tab 1         For Port Assignment for SS-200 Sensor           Select Diversity On or Diversity Off        Diversity On: This is the default setting, which means both the antennas are dual band. Select this option if you have a dual band (2.4 GHz and 5 GHz) antenna connected to both the ports on the sensor. Assigning this setting to a sensor which does not have a dual band antenna connected to both ports, can result in unpredictable sensor behavior leading to loss of system functionality. Make sure that the template with “Diversity On” setting is indeed applied to sensor(s), which have dual band antenna connected to them.           Diversity Off: Select this option if and only if your sensors have a 5 GHz antenna connected to Port 1 and a 2.4 GHz antenna connected to Port 2. The figure in the Antenna Port Assignment tab shows how to locate the ports to ensure that the single band antennas are correctly connected. Assigning this setting to a sensor that does not have single band antennas connected as mentioned above can result in unpredictable sensor behavior leading to loss of system functionality. Make sure that the template with Diversity Off setting is indeed applied to sensor(s) that have two different single band antennas supporting 2.4 GHz and 5 GHz frequency bands and connected as mentioned above.
Administration Tab SpectraGuard®  Enterprise User Guide 316  Antenna Selection and Port Assignment-SS-300-AT   2         For Antenna Selection for SS-300-AT Sensor           Select Internal or External in Antenna Selection. The default configuration for SS-300-AT sensors is to use internal antennas. If you want to connect external antennas to SS-300-AT sensors, select External radio button. This enables:        Antenna Ports Used: Six external antenna ports are available in every SS-300-AT type sensors. Out of these six ports, three ports are for 5 GHz and three for 2.4 GHz. Depending upon number of external antennas connected; click the checkboxes corresponding to the antenna ports in the sensor template. Indentation marks are provided on the sensor enclosure describing the radio and antenna port, like 5G Ant1, 2.4G Ant2, and so on.      Antenna Model: Select the appropriate antenna model for 2.4 GHz and 5GHz antennas from the drop down list. The antenna models available are SS-300-AT-AN-10 is recommended for Indoor use, SS-300-AT-AN-20 is recommended for Outdoor use, SS-300-AT-AN-40 is recommended for Outdoor use. Select Other and enter the antenna model of your choice in the Enter Antenna Model field. Recommendation: It is recommended that you should use AirTight™ certified antennas for better coverage and performance. If you are using Other Antenna Model, please make sure that they comply with the SS-300-AT sensor’s electrical characteristics.
Administration Tab SpectraGuard®  Enterprise User Guide 317 Points to note for SS-300 Sensor – Antenna Selection 1       Antenna selection feature is not available in SS-300-AT-C-01 model type. For this model, internal antennas will be selected irrespective of the “Antenna Selection” settings. 2       There is no need to perform any special configuration for connecting external antenna for SS-200-AT type of sensors. You can simply connect external antenna for SS-200-AT sensors. 3        In case of external antenna use with SS-300-AT-C-05 and SS-300-AT-C-10 sensor models, three antenna pairs are recommended. If you choose to use only two antenna pairs, the two antennas pairs must be connected to ports marked as Ant1 and Ant2 (ports at the two ends of the edge with the connectors) for proper operation. 4        In case of external antenna use, it is required that a minimum of two antenna pars are connected to the SS-300-AT-C-05 and SS-300-AT-C-10 sensors. If you connect only one antenna pair to these models, some threats that operate in high bit rates available with the 802.11n protocol will not be visible to the system and consequently, the system will be unable to report and protect the network against such threats.  Antenna Selection and Port Assignment-SS-300-AT-C-50   i.            For Antenna Selection for SS-300-AT-C-50           Select Internal or External in Antenna Selection. The default configuration for SS-300-AT-C-50 sensors is to use internal antennas. If you want to connect external antennas to SS-300-AT-C-50 sensors, select External radio button. This enables:
Administration Tab SpectraGuard®  Enterprise User Guide 318        Antenna Ports Used: Three external antenna ports are available in every SS-300-AT-C-50 type sensors. Depending upon number of external antennas connected; click the checkboxes corresponding to the antenna ports in the sensor template. Indentation marks are provided on the sensor enclosure describing the radio and antenna port, like 2.4G/5G Ant 1, 2.4G/5G Ant 2, and 2.4G/5G Ant 3. Note: To derive the full benefit of 802.11n range and to be able to capture all 802.11n traffic all three antennas must be connected.  Antenna Model: Select the appropriate antenna model for 2.4GHz/5GHz antennas from the drop down list. The antenna models available are SS-300-AT-AND-12-3 and SS-300-AT-AND-14-3 recommended for Indoor use and select Other and enter the antenna model of your choice in the Enter Antenna Model field. Note: It is recommended that if you select external antennas, you must connect dual band antennas to the antenna ports. Click Save to save all settings. Click the   icon to edit an existing sensor template. When an existing sensor template is edited a Confirmation – Save dialog appears indicating the modifications, by selecting the tabs that were modified. You are allowed to uncheck a tab if you wish to cancel those modifications. Click OK to save the changes for the selected tab. Note: Name and Description of the sensor template are automatically saved. Click Save As to save the sensor template with a different name without modifying the original template. Click Restore Default to revert to the System Template. The system enables you to select tabs to control the settings that will be restored to the default values. If you click Restore Default on the System Template, parameters under the selected tabs are restored to their factory default settings. A Confirmation – Restore Default dialog appears with a list of tabs selected, for which default settings will be applied. Important: The system has the ability to scan and defend on 4.920-4.980 GHz and 5.470-5.725 GHz channels in US/Canada and IEEE 802.11j channels 4.920-4.980 GHz and 5.040-5.080GHz channels in Japan. Click the   icon to view an existing sensor template. Click the   icon to delete an existing sensor template.
Administration Tab SpectraGuard®  Enterprise User Guide 319  Antenna Selection and Port Assignment-SS-300-AT-C-60   ii.            For Antenna Selection for SS-300-AT-C-60           Select Internal or External in Antenna Selection. The default configuration for SS-300-AT-C-60 is to use internal antennas. Sensor Access Log The System provides you with a provision to send the sensor access logs to the Syslog server.  Following logs could be sent to a Syslog server of user's choice:                 1. Login attempts to the sensor from the console or secure shell (ssh) along with the result, i.e. Success or Failures                 2. Configuration changes done on the sensor through the command line interface (CLI)                 3. Attempts and outcome of set, reboot, reset factory commands executed on the sensor. This facility could be enabled or disabled on a per Sensor Configuration Template basis. This facility is useful for audit purposes. This facility could be turned on or off from Sensor Configuration Template for
Administration Tab SpectraGuard®  Enterprise User Guide 320 that particular sensor. The configuration of Syslog server IP to which the sensor access logs are to be sent, is done through the Sensor Access Log tab.  The following screen shows the Sensor Access Log tab.  Sensor Access Logs   The following fields are present in the Sensor Access Logs tab: Enable Sensor Access Logging: Select the Enable Sensor Access Logging check box, to enable sending of sensor access logs to a Syslog server. This checkbox is deselected, by default. Syslog Server IP address/DNS name: Specify the IP address or DNS name of the Syslog server to which the sensor access logs are to be sent in this field.  IPv4 addresses are allowed in this field. This field is blank and disabled, by default. It is enabled when you select the Enable Sensor Access Logging check box. Click Save, to save the Sensor Access log settings. Click Cancel, to cancel any changes made to this tab. Click Restore Defaults, to restore default values of the fields in the Sensor Access Log tab. Once sensor access logging is enabled, the sensor reboots and starts sending information to the Syslog server at the IP address specified through this tab.
Administration Tab SpectraGuard®  Enterprise User Guide 321 Note: Check the firewall settings of the Syslog server and modify them, if needed, so that the System is able to send the logs to the Syslog server. Location Properties The Location Properties option enables you to define high-level administrative settings for a selected location. These settings take precedence over any conflicting policies. Event Activation AirTight recommends that you select the check box Activate Event Generation for location ‘<selected location>’ only after the deployment is stable and fully configured. If you are modifying a deployment, deselect the check box to avoid spurious activity during the transient phase.    Event Activation Intrusion Prevention Activation AirTight recommends that you select the check box Activate Intrusion Prevention for location ‘<selected location>’ only after the deployment is stable and fully configured. If you are modifying a deployment, deselect the checkbox to avoid spurious activity during the transient phase.   Note: Intrusion Prevention Activation section is not visible if WIDS license is applied.   Authorized APs should be in the Authorized folder before activating intrusion prevention. Their network connectivity icon may show the status as Wired, Unwired, or Indeterminate.
Administration Tab SpectraGuard®  Enterprise User Guide 322   Note: If you deploy new Authorized APs later, you do not have to deactivate intrusion prevention. However, you need to ensure that the newly deployed APs are moved to the Authorized  folder.      Intrusion Prevention Activation Device List Locking You can lock the list of Authorized APs and Clients for a selected location by checking the two check boxes Lock AP List for location ‘<selected location’> and Lock Client List for location ‘<selected location’>. If you lock a particular device list, no more devices of that type can be subsequently automatically Authorized for that location. As APs are not automatically moved to Authorized folder, locking the Authorized AP list means that no wired APs will be tagged as Potentially Authorized at this location; they will become Potentially Rogue and may be automatically moved to the Rogue folder based on the AP Auto-Classification policy. You should use this feature only after you have identified and categorized all authorized devices. Any new devices added after the list is locked has to be manually moved to the Authorized category.
Administration Tab SpectraGuard®  Enterprise User Guide 323    Device List Locking
Appendix A1:SNMP Interface SpectraGuard®  Enterprise User Guide 324 Appendix A1:SNMP Interface The system sends traps to an SNMP management station when a Sensor generates an event. You can view a trap sent from the system using SNMP manager software such as HP Open View or MG Soft MIB (Management Information Base) browser. The SNMP manager software allows you to view a detailed description of the trap and thereby the functioning of your wireless network. Perform the following steps from the SNMP management station to receive traps from the system and to dig deeper into the Sensors. 1. Configure the system to specify the IP address, community string, and the SNMP version of the SNMP management station. This can be done from the Administration->Local tab->ESM Integration->SNMP screen of the Console. 2.  Compile the MIB file and enable the SNMP management station to receive traps. The system currently generates traps for all the events. The format of the trap is: SpectraGuard Event.   The Internet Assigned Numbers Authority (IANA) assigned Private Enterprise Number for AirTight®  Networks, Inc. is 16901.   SNMP trap contains following variable bindings: 1. eventShortText is the short text identifying the type of an event. For example, “Rogue AP active” 2. deviceMAC*, deviceType* - Information of the device(s) participating in the corresponding SpectraGuard event  deviceMAC* object is the MAC address of participating device(s). For example, 00:11:95:1E:A7:56  deviceType* object is the type of participating device. For example, Access Point, Client, Sensor. If a SpectraGuard event contains more than three participating devices, then deviceType and deviceMAC of only first three devices is sent out in the SpectraGuardEvent notification. 3. eventID is the unique sequence number which identifies specific instance of an event. This sequence number is always auto-incremented by one for every newly event raised. 4. eventMajorType represents the top level category of an event. For example, security, system, performance 5. eventIntermediateType is the sub-category within eventMajorType 6. eventMinorType is the actual identifier of the event type 7. eventSeverityLevel is the configured Severity level of the SpectraGuard event. For example: high, medium, and low.
Appendix A2:Syslog Interface SpectraGuard®  Enterprise User Guide 325 Appendix A2:Syslog Interface SGE also sends events as Syslog messages. Any standard Syslog receiver (e.g. Syslog watcher from snmpsoft) can be used to monitor the Syslog messages sent by SGE. SGE can send Syslog messages either 'Plain Text' or 'IDMEF' format based on the 'Message Format' selected while configuring Syslog receivers on Syslog configuration screen. The format of 'Plain Text' Syslog message is shown below. <<HW Address of Primary Interface of SGE>><Product Name> v<SGEVersion>: <Event Summary Description>: <IP Address>//<Location> : <Event Date-Time>: <Event Severity Level>:<Event ID>:<Event Major Type>:<Event Intermediate Type>:<Event Minor Type>                      Product Name: SpectraGuard Enterprise           SGE Version: SpectraGuard Enterprise Release           Event Summary Description: Summary description for the event           IP Address:  IP Address of the SpectraGuard Enterprise Server           Location: Location in SGE console at which this event is generated.           Event Date-Time: Date-Time at which event was generated in SGE           Event Severity Level: Configured severity level of the SpectraGuard Enterprise Event e.g High, Medium or Low  Event ID:  Unique sequence number which identifies specific instance of an event. This sequence number is always auto-incremented by 1 for every new event raised.               Event Major Type: It represents the top level category of an event.           Event Intermediate Type: It represents the sub-category within Event Major Type           Event Minor Type: It is the actual identifier of the event type Example:   "<xx:yy:zz:aa:bb:cc>SpectraGuard Enterprise v6.5 : Start: Rogue AP [Symbol_CC:31:B0] is active. : 192.168.8.134://Locations/Unknown : 2010-06-10T05:16:28+00:00 : High : 21218 : 5 : 59 : 779" The IDMEF message contains some additional information which is not available with 'Plain Text' format    Product Vendor: AirTight SGE Operating System: Linux SGE Operating System Version: Operating system version of SGE appliance Event Short Name: Short text identifying the type of an event The format of 'IDMEF' Syslog message is shown below. "<HW Address of Primary Interface of SGE><?xml version=""1.0""?>         <!DOCTYPE IDMEF-Message PUBLIC ""-//IETF//DTD RFC XXXX IDMEF v1.0//EN"" ""/var/tmp/libidmef-1.0.2-beta1-buildroot/usr/share/idmef-message.dtd"">         <IDMEF-Message version=""1.0"">             <Alert messageid="<EventID>">                 <Analyzer analyzerid="<IP Address>" name="<Product Name>" manufacturer="<Product Vendor>" model="""" version="<SGE Version>" class="""" ostype="<SGE Operating System>" osversion="<SGE Operating System Version>">                     <Node>                         <location><IP Address>//<Location></location>                      </Node>                        </Analyzer>                        <CreateTime ntpstamp="<Event Date-Time in NTP format>">Event Date Time</CreateTime>                   <Classification ident="<Event Major Type><.Event Intermediate Type>.<Event Minor Type>" text="<Event Short Description>"/>                 <Assessment>                         <Impact severity="<Event Severity>"></Impact>                 </Assessment>
Appendix A2:Syslog Interface SpectraGuard®  Enterprise User Guide 326                 <AdditionalData type=""string"" meaning=""EventShortName""> <Event Short Name> </AdditionalData>         </Alert></IDMEF-Message>" All Syslog messages are sent with Syslog facility as 'System' and Syslog severity as 'Critical', 'Info' or 'Warning' based of SpectraGuard Enterprise event severity.                    SGE Severity            Syslog Severity                    High                           Critical                    Medium                     Warning                      Low                            Info
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 327 Glossary of Terms and Icons This section provides a quick reference to wireless networking terms and acronyms used in the guide. Acronyms Abbreviation Description AP Access Point DNS Domain Name System (or Service or Server) DoS Denial of Service ESM Enterprise Security Management IEEE Institute of Electrical and Electronics Engineers LAN Local Area Network LDAP Light-Weight Directory Access Protocol LWAPP Light-Weight Access Point Protocol MAC Media Access Control MIB Management Information Base NAV Network Allocation Vector NOC Network Operations Center OPSEC Operations Security RF Radio Frequency SMTP Simple Mail Transfer Protocol SNMP Simple Network Management Protocol SSID Service Set Identifier
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 328 SSL Secure Socket Layer UDP User Datagram Protocol VPN Virtual Private Network WEP Wired Equivalent Privacy WLAN Wireless Local Area Network WLSE Wireless LAN Solution Engine   Glossary of Terms Term Description .SPM file Planner File, a proprietary AirTight®  Networks file format that holds information about RF signal values, placement of devices, and device settings 802.11 An IEEE wireless LAN specification for over-the-air interface between a wireless Client and a base station or between two wireless Clients Access Point Access Point also referred to, as an AP is a station* that provides distribution services. It is the hub used by wireless Clients for communicating with each other and connecting to the WLAN * A station is the component that connects to the wireless medium Ad hoc Network A network formed by peer-to-peer connections between wireless Clients. It is difficult to enforce tight security policy controls on ad hoc connections. Therefore, ad hoc connections create a security vulnerability Authorized client An Authorized Client is one that has successfully connected to an Authorized AP at least once. Once identified as Authorized, a Client remains Authorized until it is deleted by the administrator and is re-classified as Unauthorized Auto Location Tagging A feature provided by the system that automatically tags devices and events based on the Sensors that see the event and the location of the devices that participate in the event Categorized Devices – APs This section of the Dashboard screen displays a list of all the APs automatically and manually categorized Classification Policy Classification Policy allows you to define AP and Client classification policies to control automatic movement of APs and Clients to the appropriate folders Client A laptop, a handheld device, or any other system that uses the wireless medium (802.11 standard) for communication Community String Community string is a key used to authenticate a message sent by the SNMP agent to the SNMP manager DNS Domain Name Service, an Internet service that translates domain names into IP addresses DoS Denial of Service, an attack that degrades the performance of an official WLAN
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 329 Dual Radio AP An AP with two radios to support Clients on multiple bands Hostname A unique name by which a computer is identified on the network Indeterminate AP An AP for which the system cannot determine whether it is plugged into your wired network. This AP should be inspected and manually moved to one of the AP folders Intrusion Prevention (Quarantine) Policy The Intrusion Prevention Policy allows the system proactively block an AP or a Client to automatically protect the network against various wireless security threats IP Address Internet Protocol Address, a 32-bit numeric identifier for a computer or a device on the network Location Tracking A distinguishing feature of the system that allows you to automatically locate a device placed on a floor map MAC Address Media Access Control Address, a unique 6-byte (48 bit) address assigned to the network adapter by the manufacturer and is often transparent to a user; a networked device has a MAC address corresponding to each network interface MAC Spoofed AP An attacker AP masquerades the Authorized AP by advertising the same MAC address and other features set as the authorized/other AP in its Beacon/Probe Response frames. The system generates an alert on detection of AP MAC spoofing Mis-configured AP An AP in the Authorized list, that is plugged into your wired network but does not conform to the Network Policy settings (SSID, Vendor, Encryption, and Protocol) for its network segment Network Detector A device that can co-exist on a Trunking switch; the ND can detect as many LAN segments as you configure on the switch Network Interface card An expansion board or a card that is inserted into a computer so that the computer can be connected to a network Network Status Network status specifies if the network is locked or unlocked. Once a protected network segment is locked, all new APs connected to it are pre-classified as Rogue and have to be approved manually. If a protected network segment is unlocked, any new APs connected to this network will be automatically classified based on the Security, Protocol, SSID, and Vendor Settings Potentially Authorized AP A new AP plugged into your wired network and conforming to the Network Policy settings (SSID, Vendor, Encryption, and Protocol) for its network segment; this AP must be inspected before manually moving it to the Authorized AP folder Potentially External AP A new AP not plugged into your wired network. This is an AP usually belonging to a neighbor. It does not pose a threat to your wired network Potentially Rogue AP A new AP plugged into your wired network but not conforming to the Network Policy settings (SSID, Vendor, Encryption, and Protocol) for its network segment. This AP is never authorized and can be automatically moved to the Rogue AP folder based on the Classification Policy Security Settings An IEEE 802.11 defined MAC–level privacy mechanism that protects the contents of data frames from eavesdropping using encryption SMTP Simple Mail Transfer Protocol, A protocol for sending e-mail messages between Servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one Server to another SNMP Simple Network Management Protocol, a set of protocols for managing complex networks
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 330 Software AP Software implementation of AP functionalities that permits a WLAN enabled device to act as an AP SSID A unique token identifying an 802.11 WLAN; all wireless devices on a WLAN must employ the same SSID to communicate with each other Unauthorized Client A Client that is not authorized; an Unauthorized Client has never connected successfully to an Authorized AP Uncategorized Devices – APs This section of the Dashboard screen displays a list of all the newly discovered APs VPN Virtual Private Network, a network constructed using public wires to connect nodes. For example, there are a number of systems that enable you to create networks using the Internet as the medium for transporting data; these systems use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted WEP Wired Equivalent Privacy, an IEEE 802.11 defined MAC–level privacy mechanism that protects the contents of data frames from eavesdropping using encryption WLAN Wireless Local Area Network that uses high frequency radio waves, rather than wires to communicate between nodes WLSE Wireless LAN Solution Engine, a centralized, systems-level application for managing and controlling an entire Cisco AirTight WLAN infrastructure   Glossary of Icons This section provides a quick reference to the various icons used in the system. Navigation Bar Icons Icon Name: Description  Dashboard: The tab with this icon signifies the Dashboard screen that displays a consolidated view of the WLAN environment.  Events: The tab with this icon signifies the Events screen that displays various event categories in the network.  Devices: The tab with this icon signifies the Devices screen that provides information on the wireless devices in the network.  Locations: The tab with this icon signifies the Locations screen that displays live RF maps of the network.  Reports: The tab with this icon signifies the Reports screen that allows you to create, generate, schedule, and archive various reports.  Forensics: The tab with this icon signifies the Forensics screen that displays details about the detected threats for further analysis of the causes and actions taken  Administration: The tab with this icon signifies the Administration screen that allows you to perform various administrative activities.  Upgrade Required: This blinking icon indicates that the system needs to be upgraded to a newer version.  Troubleshooting In Progress: This blinking icon indicates that troubleshooting is in progress on an AP, Client, or Sensor.
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 331  Refresh: The button with this icon refreshes the current screen.  Help: The button with this icon displays the Product Help.  Legends: The button with this icon displays the list of icons used on the product screens and their description.  About SpectraGuard Enterprise: The button with this icon displays the product version, patent number, and license information of the system.  Log Off: The button with this icon allows you to logout from the Console.   General Icons Icon Name: Description  Error!: This icon indicates an application level event that needs immediate remedial action.  Information: This icon indicates an informational level event that does not need immediate action.  Warning: This icon indicates an application level event that needs attention.  Confirmation: This icon indicates an application level event that needs immediate user input.  Progress Bar: This icon indicates an operation is in progress/loading data.   Dashboard Icons Icon Name: Description  Secure Network: This icon shows that the network is secure as the events that cause the network to be vulnerable have not been detected or have been acknowledged.  Vulnerable Network: This icon shows that the network is vulnerable as the events that cause the network to be vulnerable have been detected or not all of them have been acknowledged.  Location Node Secure: This icon indicates that the location node is not all vulnerable and is totally secure.  Location Node Vulnerable: This icon indicates that the location node is vulnerable.  Location Folder Secure: This icon indicates that the location folder is not all vulnerable and is totally secure  Location Folder Vulnerable: This icon indicates that the location folder is vulnerable.
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 332  Edit Policy: The button with this icon enables you to edit policies.  More Information: The button with this icon enables you to view more information in a graphics–text format on a particular section.  Bar Chart: This button with this icon enables you to view a bar graph of data.  Pie Chart: This button with this icon enables you to view a pie graph of data.  Table View: This button with this icon enables you to view the table view of data.  Filter: The button with this icon lets you filter the dataset/result to be displayed, based on a specific criteria.   Events Icons Icon Name: Description  Printable view: The button with this icon enables you to view printable reports of the data displayed on the Events and Devices screens.  Security Event: This icon indicates an event that indicates impending or actual breach of network security and must be addressed immediately.  System Event: This icon indicates an event that indicates system health.  Performance Event: This icon indicates an event that indicates wireless network performance problems.  High: This icon indicates an event with high severity.  Medium: This icon indicates an event with medium severity.  Low: This icon indicates an event with low severity.  New: This icon indicates an event that is neither read nor acknowledged.  Read: This icon indicates that the event has been read.  Acknowledged: This icon indicates that the event has been read and acknowledged.  Calendar Control: The button with this icon allows you to select the date and the time.  Live: This icon indicates a live event in which the triggers that raised the event are operational or continue to exist; this event has a valid start time stamp.  Live and Updated: This icon indicates a live event that has been updated, that is, some activity has occurred since the event was last read.
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 333  Instantaneous: This icon indicates an instantaneous event that are triggered based on a trigger that do not have continuity.  Expired: This icon indicates an expired event in which the triggers that raised the event are not operational or have ceased to exist; this event has a valid start and stop time stamp.  Secure: This icon indicates an event that does not contribute to the vulnerability status of the system.  Vulnerable: This icon indicates an event that contributes to the vulnerability status of the system.    Interference device/jammer icon: This icon shows the device which is RF Jammer or source of non-Wi Fi interference   Devices Icons Icon Name: Description  Rogue AP-Active: This icon shows that a Rogue AP is active and visible to Sensor(s).  Rogue AP-Inactive: This icon shows that a Rogue AP that was earlier visible to Sensor(s) is inactive.  Mis-configured AP-Active: This icon shows that a Mis-configured AP is active and visible to Sensor(s).  Mis-configured AP-Inactive: This icon shows that a Mis-configured AP that was earlier visible to Sensor(s) is inactive.  Authorized AP-Active: This icon shows that an Authorized AP is active and visible to Sensor(s).  Authorized AP-Inactive: This icon shows that an Authorized AP that was earlier visible to Sensor(s) is inactive.  External AP-Active: This icon shows that an External AP is active and visible to Sensor(s).  External AP-Inactive: This icon shows that an External AP that was earlier visible to Sensor(s) is inactive.  Known External AP-Active: A Known External AP-Active is a recognizable external device. For example an AP belonging to the neighboring organization could be marked as a Known External AP.  Known External AP-Inactive: A known external AP-Inactive is a recognizable external device. For example an AP belonging to the neighboring organization could be marked as a Known External AP.  Indeterminate AP-Active: This icon shows that an Indeterminate AP is active and visible to Sensor(s).  Indeterminate AP-Inactive: This icon shows that an Indeterminate AP that was earlier visible to Sensor(s) is inactive.  Merged AP-Active: This icon indicates a merged AP is active and visible to Sensor(s).
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 334  Merged AP-Inactive: This icon shows that a merged AP that was earlier visible to Sensor(s) is inactive.  Misconfigured Merged AP-Active: This icon shows that at least one BSSID in an active merged AP is misconfigured  Misconfigured Merged AP-Inactive: This icon shows that at least one BSSID in an inactive merged AP is misconfigured.  Single AP: This icon shows a radio for an AP.  Authorized Merge AP: This icon shows a merged AP (AP with mutliple BSSIDs).  Not plugged into your wired network: This icon shows that an AP is not connected to your wired network.  Plugged into your wired network: This icon shows that an AP is connected to your wired network.  Not sure if it is plugged into your wired network: This icon shows that an AP may be connected to your wired network.  Not in Quarantine: This icon shows that the AP/Client is not in quarantine.  Quarantine Pending: This icon shows that the AP/Client needs to be quarantined, but quarantine is pending.  Quarantined: This icon shows that the AP/Client has been quarantined. It can also show that the AP is in port blocking.  Quarantine Error: This icon shows that some error has occurred while quarantining a device.  DoS Quarantine: This icon shows that the quarantine against DoS attack on this device is in progress.  DoS Quarantine Pending: This icon shows that the quarantine against DoS attack on this device is pending.  Add to Banned List: This icon shows that the AP/Client has been added to the Banned List.  Remove from to Banned List: This icon shows that the AP/Client has been removed from the Banned List.  Troubleshooting: This icon shows that troubleshooting is in progress on a device.  Troubleshooting + Banned List: This icon indicates that the device is busy in troubleshooting and is in Banned List.  Event Level Mode: This icon indicates that a troubleshooting session in event level mode is in progress.  Packet Level Mode: This icon indicates that a troubleshooting session in packet level mode is in progress.
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 335  Authorized Client-Active: This icon shows that an Authorized Client is active and visible to Sensor(s).  Authorized Client-Inactive: This icon shows that an Authorized Client that was earlier visible to Sensor(s) is inactive.  Rogue Client-Active: This icon shows that a Rogue Client is active and visible to Sensor(s).  Rogue Client-Inactive: This icon shows that a Rogue Client that was earlier visible to Sensor(s) is inactive.  External Client-Active: This icon shows that an External Client is active and visible to Sensor(s).  External Client-Inactive: This icon shows that an External Client that was earlier visible to Sensor(s) is inactive.  Guest Client-Active: This icon shows that a Guest Client is active and visible to Sensor(s).  Guest Client-Inactive: This icon shows that a Guest Client that was earlier visible to Sensor(s) is inactive.  Uncategorized Client-Active: This icon shows that an Uncategorized Client is active and visible to Sensor(s).  Uncategorized Client-Inactive: This icon shows that an Uncategorized Client that was earlier visible to Sensor(s) is inactive.  DoS Attacker: This icon shows the device from which the DoS attack is being launched.  Client in Adhoc Mode-Active: This icon shows that a Client in adhoc mode is active and visible to Sensor(s).  Client in Adhoc Mode-Inactive: This icon shows that a Client that was earlier in adhoc mode and visible to Sensor(s) is inactive.  SAFE Installed-Active: This icon shows that SAFE is installed and active on the Client.  SAFE Installed-Inactive: This icon shows that SAFE is installed but is inactive on the Client.  SAFE Not Installed: This icon shows that SAFE is not installed on the Client.  SAFE Risk Level-High: This icon shows that SAFE is installed on the Client and the risk level on that Client is high.  SAFE Risk Level-Medium: This icon shows that SAFE is installed on the Client and the risk level on that Client is medium.  SAFE Risk Level-Low: This icon shows that SAFE is installed on the Client and the risk level on that Client is low.  SAFE Risk Level-Not Known: This icon shows that SAFE is not installed on the Client and hence the risk level is not known.
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 336  SAFE Client-With Only Wired Interface: This icon shows a SAFE Client that has only a wired interface.  SAFE Report Available: This icon indicates that a SAFE report generated earlier is available for the selected Client.  SAFE Report Not Available: This icon indicates that a SAFE report is never generated for the selected Client.  SAFE Report Scheduled: This icon indicates that a SAFE report will be generated for the selected Client when it become active.  Authorized SAFE Client: This icon shows an Active Authorized SAFE Client.  Unauthorized SAFE Client: This icon shows an Active Unauthorized SAFE Client.  Uncategorized SAFE Client: This icon shows either an Active Uncategorized SAFE Client or the absence of a Wireless Client.  This icon shows that a Client is connected to another Client.  Infrastructure Association: This icon shows that a Client is connected to an AP.  Sensor-Active: This icon shows that the Sensor is connected to the Server and is actively monitoring the network. This Sensor has the latest software version and does not need to be upgraded.  Sensor-Inactive: This icon shows that the Sensor is not connected to the Server and is currently not monitoring the network. This Sensor has the latest software version and does not need to be upgraded.  Sensor Repair In Progress: This icon shows that Sensor Repair is in progress.  Sensor Upgrade In Progress: This icon shows that Sensor Upgrade is in progress.  Sensor Upgrade Required: This icon shows that the Sensor needs to be upgraded to a new version.  Sensor Upgrade Pending: This icon shows that the Sensor needs to be upgraded to a new version and that the upgrade is pending.  Sensor Upgrade Failed: This icon shows that the Sensor upgrade to a new version has failed.  Sensor Repair Required: This icon shows that the Sensor needs to be repaired as the Sensor binaries are not updated.  Sensor Repair Pending: This icon shows that the Sensor needs to be repaired as the Sensor binaries are not updated and that the repair is pending.  Sensor Repair Failed: This icon shows that the Sensor repair to a new binary version has failed.  Sensor Indeterminate: This icon shows that the Sensor is in an indeterminate or irrecoverable state.
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 337  Sensor Version Mismatch: This icon shows that the Sensor software version is higher than that of the Server.  Network Detector-Active: This icon shows that the ND is connected to the Server and is currently contributing into wired detection of APs.  Network Detector-Inactive: This icon shows that the ND is not connected to the Server and is currently not contributing into wired detection of APs.  Sensor/AP Combo-Active: This icon indicates that the sensor/AP combo device is connected to the Server and is monitoring the network.  Sensor/AP Combo-Inactive: This icon indicates that the sensor/AP combo device is connected to the Server and is inactive.  RSSI: This icon shows signal strength observed by reporting device for AP or Client.  RSSI Level 0: This icon shows very low signal available.  RSSI Level 1: This icon shows low signal strength.  RSSI Level 2: This icon shows medium signal strength.  RSSI level 3: This icon shows strong signal strength  RSSI Level 4: This icon shows very strong signal strength.  Display Columns: Most fields in the table can be selected for display or optionally hidden. This button allows selection and configuration of parameters to show and hide in the table.  Monitored Network: This icon indicates that the network is being monitored by a sensor.  Unmonitored Network: This icon indicates that the network is not being monitored by a sensor.  Approved Smart Device: This icon indicates that the authorized client is an approved smart device.  Unapproved Smart Device: This icon indicates that the authorized client is an unapproved smart device.  Change Device Type: This icon indicates a change in the smart device type.  Not a Smart device: This icon indicates that the client is not a smart device.  Smart Device: This icon indicates that the guest client is a smart device.   Locations Icons Icon Name: Description
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 338  Add Location: The button with this icon allows you to create a new location folder or node.  Edit Properties: The button with this icon allows you to edit the properties of the existing location folder or node.  Import Location: The button with this icon allows you to import a file in .SPM format for a specific location from a specified path.  Delete: The button with this icon allows you to delete selected item/entity.  Attach Image on floor: The button with this icon allows you to attach an image to location folder or node.  Detach Image: The button with this icon allows you to detach an image from location folder or node.  Save: The button with this icon allows you to save the changes made to the current Locations screen.                   Best Fit: The button with this icon allows you to fit the layout image to the window/page.  Zoom Out: The button with this icon allows you to zoom out of a layout image.  Zoom In: The button with this icon allows you to zoom into a layout image for an enlarged view  Unknown: This icon signifies the default location folder of the root location. When the system detects a new untagged device, the device is tagged to the Unknown location folder.  Move: This icon in the context-sensitive menu on the Locations screen indicates that you can move a location folder or node to another location in the Location tree.  Rename: The button with this icon allows you to rename the selected location node/folder.  Reset Canvas: The button with this icon allows you to revert to a blank canvas.  Printable View: The button displays the currently active information of selected location information/RF view   Reports Icons Icon Name: Description  My Reports: This icon indicates a report that only a single user, the one who created the report, can view it.  Shared Reports – Custom Reports: This icon indicates a Shared report that all users can view.  Shared Reports – Pre-defined Reports: This icon indicates reports that are pre-defined and can be viewed by all users.   Administration Icons
Appendix B:Glossary of Terms and Icons SpectraGuard®  Enterprise User Guide 339 Icon Name: Description  Global Policies: The button with this icon indicates policies that are applicable to all the locations defined in the system.  Local Policies: The button with this icon indicates policies that are specific to a particular location defined in the system.  Custom Defined Policy: This icon signifies a policy group whose policies are custom defined.  Inherited Policy: This icon signifies a policy group whose policies are inherited.  Expand All: The button with this icon enables you to expand all the nodes, there allowing you to view all the nodes in the Administration tree.  Collapse All: The button with this icon enables you to collapse all the nodes, there preventing you to view all the nodes in the Administration tree.  Local User: This icon indicates a system user.  LDAP User: This icon indicates an LDAP user.  Server Error or Integration Failure: This icon shows that an error has occurred in the Server or ESM/WLAN Integrations.  Server or Integration Running: This icon shows that the Server or ESM/WLAN Integration is functioning normally.    Server or Integration Stopped: This icon shows that the Server or ESM/WLAN Integration has stopped functioning.      Hard disk redundancy on SA-350 appliance is supported by RAID-1 Array with two Hard disks. Data is mirrored on both Hard disks simultaneously. RAID Normal: Indicates that RAID Array is in normal operating state.    RAID Rebuilding: This is a transient state. It indicates that data is being synchronized from one Hard disk to the other. System services operate in normal state when RAID Array is rebuilding.  RAID Failed: Indicates that RAID Array has failed and can not be recovered automatically. Please contact Technical Support. System services may not operate in normal state when RAID Array has failed.  RAID Degraded: Indicates that RAID Array has degraded and is not able to synchronize data from one Hard disk to the other. System services operate in normal state, but Hard disk redundancy is not available in this state.

Navigation menu