Mojo Networks SS300ATC60 SpectraGuard Access Point / Sensor User Manual 6

AirTight Networks, Inc. SpectraGuard Access Point / Sensor Users Manual 6

Users Manual-6

Download: Mojo Networks SS300ATC60 SpectraGuard  Access Point / Sensor User Manual 6
Mirror Download [FCC.gov]Mojo Networks SS300ATC60 SpectraGuard  Access Point / Sensor User Manual 6
Document ID2074666
Application IDVbwSvAM6zwL7tj01Sk/sRA==
Document DescriptionUsers Manual-6
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize253.71kB (3171396 bits)
Date Submitted2013-09-17 00:00:00
Date Available2013-09-18 00:00:00
Creation Date2013-09-06 13:18:17
Producing SoftwareMicrosoft® Word 2010
Document Lastmod2013-09-06 14:19:03
Document TitleUsers Manual-6
Document CreatorMicrosoft® Word 2010
Document Author: tejas

Administration Tab
Creating a Configuration Template for an Authorized SSID

Create SSID Template allows you to specify the details for creating a new SSID as follows:
 Authorized SSID: Displays the name of the SSID that you have added earlier
 This is a Guest SSID: Select this option if this SSID is a Guest SSID used to provide Wi-Fi connectivity to
visitors and guests. Though APs with Guest SSID are Authorized, they may be treated differently than APs
that are used by employees for corporate access. Making an SSID as Guest allows you to specify additional
classification and prevention policies related to Guest SSIDs. Refer to the sections Client Auto-Classification
and Intrusion Prevention Policy for more details on classifying Guest SSIDs
 Template Name: Name of the SSID template
 Apply this SSID template at current location: Select this option to apply this SSID template to the
current location. The WLAN policy at a location consists of SSID templates applied at that location. If the
template is not applied at this location, it will not be a part of the WLAN policy
SpectraGuard® Enterprise User Guide
271
Administration Tab
 Description: Write a short description to help identify the SSID template
Network Protocol allows you to select the allowed 802.11 protocols for the SSID:
 Any: Allow APs with any network protocol for this SSID
 Select: Specify the 802.11 protocol on which the system allows the APs connected to the network to
operate–802.11 a, 802.11 b/g, and 802.11b only

AP Capabilities allows you to select the additional capabilities that Authorized APs may have. If you select any
of these advanced capabilities, the classification logic allows APs with and without these capabilities. Select one of
the following:
 Any: Allow APs with any special capability for this SSID
 Select: Specify if the AP uses any Turbo/Super techniques used by Atheros to get higher throughputs–
Turbo, 802.11n, and SuperAG

Cisco MFP (802.11w) allows you to make classification decisions on Cisco Management Frame Protection(MFP)
capability if 802.11w checkbox is selected under Security Settings:
 Any: Policy does not check for MFP; both Cisco MFP enabled and disabled APs are classified as
Authorized
 Select: Policy checks for MFP
 Cisco MFP Enabled: Select to classify only Cisco MFP supporting APs as Authorized APs
 Cisco MFP Disabled: Select to classify non-Cisco MFP supporting APs as Authorized APs

Security Settings allows you to select the security protocol(s) for the SSID:
 Any: Allow any security protocol for this SSID.
 Select: Specify the exact security protocol(s) for this SSID from the list: 802.11i, WPA, Open, and WEP.

Encryption Protocols allows you to select encryption protocol(s) for the SSID:
 Any: Allow any encryption protocol (including no encryption) for this SSID.
 Select: Specify the exact encryption protocol(s) for this SSID from the list: WEP40, WEP104, TKIP, and
CCMP. Note that encryption protocols selection panel gets enabled only when WPA or 802.11i is selected.

Authentication Framework allows you to select authentication protocol(s) for the SSID:
 Any: Allow any authentication protocol (including no authentication) for this SSID.
 Select: Specify the exact authentication protocol(s) for this SSID from PSK and 802.1x (EAP). Note that
authentication protocols selection panel gets enabled only when WPA or 802.11i is selected.

Authentication Types allows you to select the allowed higher layer authentication types that Clients can use
while connecting to the SSID. Authentication types do not determine the classification of APs, but are used to raise an
event if a Client uses non-allowed authentication type. The system raises this event only if the system sees
authentication protocol handshake frames.
 Any: Allow any higher layer authentication type for Clients connecting to this SSID.
 Select: Specify the exact authentication type(s) that Clients can use (only if 802.1x is selected) from the
list: PEAP, EAP-TLS, LEAP, EAP-TTLS, EAP-FAST, and EAP-SIM.

Allowed Networks allows you to select the network(s) where wireless traffic on the SSID is to be mapped
through Authorized APs:
 Any: Allow wireless traffic on this SSID to be mapped to any network.
 Select Networks: Specify the exact networks where wireless traffic on this SSID is to be mapped through
Authorized APs. You can either choose from networks that are discovered automatically by the system or add
new networks that are not yet discovered by the system.
 Click The exact tag: 
inside the above form element.
To upload the portal page, Click
following Upload Bundle. The following dialog appears on clicking
Upload zip
To download the factory default portal bundle file, click Download Sample. This file can be used as a template for
creating a custom portal bundle file.
To restore the portal bundle to factory default file, click Restore Default.
Specify Login Timeout, in minutes, for which a wireless user can access the guest network after submitting the portal
page. After the timeout, access to guest network is stopped and the portal page is displayed again. The user has to
submit the portal page to regain access to the guest network.
Specify Blackout Time. This is the time for which a user is not allowed to login after his previous successful session
was timed out.
For example, if the session time-out is 1 hour and the blackout time is 30mins, a user will be timed out one hour after
a successful login. Now after this point, the user will not be able to login again for 30 minutes. At the end of 30
minutes, the user can login again.
SpectraGuard® Enterprise User Guide
296
Administration Tab
Specify the Redirect URL. The browser is redirected to this URL after the user clicks the submit button on the portal
page. If left empty, the browser is redirected to the original URL accessed from the browser for which the portal page
was displayed.
Walled Garden Settings: Configure a list of exempted IP address ranges. (E.g. 192.168.1.0/24) . HTTP and HTTPS
services on these IP addresses can be accessed without redirection to the portal page. If some part of the portal page
(e.g., images) is placed on a web server, the web server’s IP address must be included in this list for the content to be
successfully displayed.
Click Add... under Walled Garden Settings to add the network/IP address of the exempted host. The following
screen appears.
Add Network Address
Enter the host or network address
To delete an exempted host IP address, select the entry and click Delete.
Firewall Settings
You can control the incoming and outgoing traffic for specific URLs by configuring firewall settings.
SpectraGuard® Enterprise User Guide
297
Administration Tab
Firewall Settings
To enable firewall, select Enable Firewall. Click Append New Rule to add the first rule or a new rule at the end of
the existing rules. If you want to add a new rule between 2 rules, click Add New Rule between the 2 rules.
Specify the name of the rule in Rule Name, and the host name or IP address to which the rule applies in IP
Address/Host Name.
Specify the port number in Port. Specify the action Allow or Block. Specify the Protocol in Protocol. If you select
Protocol as Other, the field Protocol No appears, where you need to specify the protocol number. Specify whether
the action is to be applied to the incoming or outgoing request by selecting Incoming or Outgoing in Direction.
For example, if you want to block all outgoing TCP requests to the IP address 192.168.8.7 port 81, you will specify the
rule details as follows. Click Append New Rule or Add New Rule depending on where to want to add the rule.
Specify an appropriate name for the rule in Rule Name. Specify IP address/Host Name as 192.168.8.7, Port as 81,
Action as Block, Protocol as TCP, Direction as Outgoing.
SpectraGuard® Enterprise User Guide
298
Administration Tab
Define the default rule by selecting Allow or Block to allow or block any type of requests from IP addresses or host
names for which rules have not been defined.
Click Delete in the rule to delete the rule.
Traffic Shaping & QOS
The values of the QoS parameters will depend on the type of applications that are used over the network. You can
specify the QoS parameters using the Traffic Shaping & QOS tab.
Traffic Shaping & QOS
SpectraGuard® Enterprise User Guide
299
Administration Tab
You can restrict the upload and download traffic on the SSID to a specific limit. Select Restrict upload traffic on this
SSID to and enter a value to restrict the upload traffic for the SSID.
Select Restrict download traffic on this SSID to and enter a value to restrict the download traffic for the SSID.
If you configure the radio in 11N mode, WMM (Wi-Fi multimedia) will always be enabled, irrespective of whether or
not you select the WMM check box, in the SSID profile. The reason for this behavior is that WMM is mandatory in
11N mode.
In 11N mode, if the WMM check box is not selected,the system uses the default QoS parameters. The system uses the
user-configured QoS settings if the WMM check box is selected.
Select the WMM check box and define your own QoS settings for Wi-Fi multimedia on the SSID profile.
Specify voice, video, best effort or background as the SSID Priority depending on your requirement.
Select Priority Type as Fixed if all traffic of this SSID has to be transmitted at the selected priority irrespective of the
priority indicated in the 802.1p or IP header.
Select Priority Type as Ceiling if traffic of this SSID can be transmitted at priorities equal to or lower than the
selected priority.
Select the Downstream mapping option if Priority Type is selected as Ceiling. The priority is extracted from the
selected field (802.1p, DSCP or TOS) and mapped to the wireless access category for the downstream traffic subject to
a maximum of the selected SSID Priority. For the downstream mappings, the mapping depends on the first 3 bits
(Class selector) of the DSCP value, TOS value or 802.1p access category. The only exception will be DSCP value 46
which will be mapped to WMM access category 'Voice'.
Select the Upstream marking option as per the requirement. The incoming wireless access category is mapped to a
priority subject to a maximum of the selected SSID priority and set in the 802.1p header and the IP header as selected.
Refer to the following table for the priority, 802.11e access category and the corresponding 802.1p access category and
DSCP value, used for upstream marking. If 802.1p marking is enabled, the 802.11e access category maps to the
corresponding 802.1p access category. If DSCP/TOS marking is enabled, the 802.11e access category maps to the
corresponding DSCP value.
Priority
802.11e access 802.1p access
category
category
DSCP
AC_BE (Best
Effort)
BK
(Background)
AC_BK
(Background)
BE(Best Effort) 10
AC_BK
(Background)
EE (Excellent
Effort)
18
AC_BE (Best
Effort)
CA (Critical
Apps)
AC_VI (Video) VI(Video)
26
AC_VI (Video) VO(Voice)
34
IC(Internetwork
AC_VO(Voice)
46
Control)
AC_VO(Voice)
NC(Network
Control)
48
BYOD- Device Onboarding
Device onboarding is a technique in which unapproved clients that are quarantined by the system are redirected to a
configured splash page URL upon making any web access while all other communication is blocked. This technique
can be enabled for all clients or selectively for smart clients only.
SpectraGuard® Enterprise User Guide
300
Administration Tab
BYOD - Device Onboarding
Select the Enable Device Onboarding check box to enable this technique.
Select Smart Clients Only if you want this technique to be enabled for unapproved smart client but not for other
wireless clients (like laptops etc.)
Select All Clients if you want to enable this technique for all types of unapproved wireless clients.
Specify the URL of the splash page in Redirect to URL. Wireless clients will be redirected to this URL upon making
any web request.
SpectraGuard® Enterprise User Guide
301
Administration Tab
The IP address or hostname of the splash page host must be added to the walled garden settings for the redirection to
work. Any other hostname or IP address that needs to be exempted from redirection can also be added here.
Use Add and Delete to modify the list of exempted hostnames or IP addresses.
Device Template
You can create different templates to be applied to AirTight devices through this screen. A device template is a
combination of settings for radio, channels to monitor, VLANs to monitor, sensor configuration, antenna selection
and port assignment. This combination can be applied to an AirTight device such as a SS-300-AT-C-50, SS-30-AT-C60, SS-200-AT, SS-300-AT-C-10, SS-200-AT-01, or SS-300-AT.
The SS-300-AT-C-50 and SS-300-AT-C-60 sensor models can serve as a sensor/AP combo. This means that the SS-300AT-C-50 and SS-300-AT-C-60 sensor model can function as a WIPS sensor as well as an AP; all other sensor models
can function as WIPS sensors only.
Device Template
You can choose a template as a default template, for a location. This template will be applied to any new sensor tagged
to that location.
Note: Sensors prior to Version 5.2 do not support additional channels (802.11j & Turbo channels), Sensor
Password Configuration, Offline Sensor Configuration, and Antenna Port Assignment features. If you apply
templates containing these settings to older sensors, older sensors will ignore the additional settings.
Click Add New Device Template to add a new device template.
Under Create Device Template, specify the following:
 Name: Unique name of the device template (less than 40 characters)
 Description: Brief description of the device template (less than 500 characters)
SpectraGuard® Enterprise User Guide
302
Administration Tab
Note: The system stores the default device configuration in a predefined template System Template. You cannot
delete the System Template nor edit its name; it is unique. When a device is added or discovered, it is automatically
assigned the configuration settings in this template. You are allowed to edit the configuration settings in the System
Template to effect default configuration of your choice.
Whenever you delete a user-defined device template, all the sensors associated with that template are assigned the
System Template. You can override the template applied to a sensor manually from the Devices Sensors tab. If you
modify the settings in a template, the new settings are applied to the sensors to which this template is applied.
On every tab in Device Template, you will find the Save, Restore Defaults and Cancel buttons.
You can navigate from one tab to another without saving the changes and save the changes made on all tabs by
clicking Save on any one tab.
Radio Settings
You can define radio settings for SS-300-AT-C-60 and SS-300-AT-C-50 if you want to configure them as access points.
The other devices function as WIPS sensors only.
Radio Settings-SS-300-AT-C-60
SpectraGuard® Enterprise User Guide
303
Administration Tab
When you select operation mode as Access Point, the other fields on the SS-300-AT-C-60 tab get enabled. In case the
operation mode is WIPS sensor, these fields remain disabled.
SS-300-AT-C-60 has 2 radios. You can separately configure the 2 radios, Radio 1 and Radio 2. You can add multiple
SSID profiles to be monitored by the SS-300-AT-C-60 devices operating in AP mode.
The following table describes the fields related to Radio Settings.
Field
Applicable to frequency
band
Description
This field specifies whether the device functions as an
access point or a WIPS sensor. Select access point if you
want the device to function as an access point. Select
NA
Operation Mode WIPS sensor if you want the device to function as a
sensor. This field is enabled only for SS-300-AT-C-60
and SS-300-AT-C-50 devices. The other 2 devices can
function as WIPS sensors only.
This field specifies the radio frequency band. The
Frequency Band possible values are 2.4 GHz, 5GHz. default value is 2.4
GHz
For 2.4 GHz and 5GHz modes,
the channel width defaults to
20MHz.
Channel Width
This field specifies radio channel width. Possible values
are 20 MHz or 20 Mhz/40Mhz.
Operating
Channel
This field specifies the operating channel for the radio.
By default, the AP selects the operating channel
automatically. (Auto is selected, by default.) User can
manually set the channel if desired. Select Manual, to
set the operating channel manually. The channel list
presented for manual channel selection, is populated
All
based on the location selected in the left pane. If the
manually selected channel is not present in the country of
operation selected for the device in the applied AP
template, the AP falls back to auto mode and selects a
channel automatically.
This field is visible and available when the Operating
Channel is Auto. This field specifies the time interval, in
All
Selection Interval
hours, at which the channel selection happens. You may
enter any value between 1 and 48, both inclusive.
This field is visible and available when the Operating
Channel Number Channel is Manual. This field specifies the operating
channel number.
Fragmentation
Threshold
This field specifies the Fragmentation Threshold, in
This field is applicable to
bytes. Permissible value for this field is between 256 and
5GHz and 2.4 GHz modes.
2346 bytes (both inclusive).
RTS Threshold
This field specifies the threshold for Request to Send
(RTS) in bytes. Permissible value for this field is between This field is applicable to 5 GHz
256 and 2347 bytes (both inclusive). Default value is
and 2.4 GHz modes.
2347 bytes.
Beacon Interval
This field specifies the time interval between AP beacon
transmissions. The value is set to 100. It is not editable.
DTIM Period
The DTIM period specifies the period after which clients
connected to the AP should check for buffered data
waiting on the AP. The value is set to 1. It is not editable.
Custom Transmit This field enables you to control the transmission power
Power
of the AP. Select the custom transmit power check box
and specify the transmission power of the AP in dBM.
Enable
Background
Scanning
Select this check box to enable background scanning by
the device.
802.11n Guard
Interval
A period at the end of each OFDM symbol allocated to
letting the signal dissipate prior to transmitting the next
signal. This prevents overlaps between two consecutive This field is 802.11n specific.
symbols. Legacy 802.11a/b/g devices use 800ns GI. GI of
400ns is optional for 802.11n
SpectraGuard® Enterprise User Guide
304
Administration Tab
Frame
Aggregation
This field specifies the enabling or disabling of MPDU
aggregation
This field is 802.11n specific.
When in AP mode, a single physical AP device can be logically split up into multiple virtual AP's. Each wireless
profile represents the configuration settings of a virtual AP. Click Add New Profile to select the SSID profiles for the
AP. Each SSID profile corresponds to a virtual AP. Upto 8 virtual APs can be configured on one radio.
Similar settings apply to SS-300-AT-C-50. SS-300-AT-C-50 has a single radio. It can be configured to work as an AP or
as a WIPS sensor.
SS-300-AT-C-10 and SS-200-AT-01 can function as WIPS sensors only. Hence fields related to radio settings are
disabled on these tabs.
Channel Settings
Channel Settings displays the 802.11a/802.11b/g and Turbo channels on which scanning and defending is
enabled/disabled. Sensors scan WLAN traffic on channels specified under Channels to Monitor and defend the
network against various WLAN threats on channels specified under Channels to Defend.
 Under Channel Settings tab, specify the following:
 Select Operating Region: Specifies the region / country of operation. Each region has its own laws governing the
use of the unlicensed frequency spectrum for 802.11 communications and Turbo mode. The system automatically
selects the channels that are allowed by the regulatory domain in selected region.
(Default Operating Region: United States)
 Click the link Channel Frequency Table to view a list of channels, protocols, frequencies, and capabilities.
SpectraGuard® Enterprise User Guide
305
Administration Tab
Channel Frequency Table
 Channels to Monitor: Specifies the 802.11a and b/g channels to be used by sensors to monitor WLAN traffic.
 Select the check box Select All Standard Channels to select a superset of all the channels. For 802.11a, the
standard sets of channels are 184 – 216 and 34 - 165. By default, this check box is selected.
 Select the check box Select All Allowed Channels to select all the allowed channels in the selected operating
region. By default, this checkbox is selected.
 Select the check box Additionally, select intermediate channels (works only with 802.11 a/b/g sensor platforms)
to select the channels between the allowed channels that are non-allowed in the selected operating region. Selecting
the option helps the system detect devices operating on illegal channels. By default, this checkbox is deselected.
 Turbo Mode: Certain Atheros Chipset based devices use wider frequency bands on certain channels in 802.11 b/g
and 802.11a band of channels. The system is capable of monitoring channels that support Turbo Mode of operation
and detecting any unauthorized communication on these channels. You can select specific or all channels to monitor
wireless activity on Turbo channels. There are ten Turbo channels in a-mode. These channels are 40, 42, 48, 50, 56, 58,
152, 153, 160, and 161. There is only one Turbo channel in b/g-mode that is,6.
 Channels to Defend: Specifies the channels to be used by sensors to defend WLAN traffic to protect your
network against various WLAN threats.
Note: It is mandatory that channels selected for defending be selected for scanning. If a channel is selected for
defending and is not already selected for scanning, the system automatically selects that channel for scanning as
SpectraGuard® Enterprise User Guide
306
Administration Tab
well. If you deselect a channel from Channels to Monitor, then this channel is also deselected from Channels to
Defend section.
For operating region US, if you select channel 184, 188, 192, or 196 under Channels to Monitor or Channels to
Defend, and click Save, the following message box appears.
Warning while turning on channel in US safety band
If you click Yes, the channel is selected. If you click No, the channel is not selected.
Note: Channels 184,188, 192, 196 fall under the public safety band in the US. They are turned off, by default,
under Channels to Monitor and Channels to Defend.
VLAN Settings
The VLAN Settings tab facilitates the management of VLANs to be monitored by a sensor device in sensor mode.
These settings are applicable to sensor devices in sensor mode of operation only; and not to sensor devices in ND or
AP mode of operation. In the earlier versions of the system, specifying the VLAN to be monitored, or deleting the
VLANs that were being monitored could be done using the sensor command line interface only. From this version,
the addition and deletion of VLANs to be monitored can be done from the user interface as well, using the VLAN
Settings tab.
SpectraGuard® Enterprise User Guide
307
Administration Tab
VLAN Settings
To add VLANs to be monitored, select the Enable VLAN Monitoring check box. Click Add to add a VLAN.
Add VLAN
Enter the VLAN ID and click OK, to add the VLAN to the list of monitored VLANs.
When you save changes to the VLAN Settings tab by clicking Save, an additional confirmation message appears,
after clicking OK on the Confirmation-Save message.
SpectraGuard® Enterprise User Guide
308
Administration Tab
Confirmation-Save VLAN Settings
The VLAN Settings are saved only when Yes is clicked on this message.
If you click No, the Confirmation-Save message will re-appear.
The VLANs created should not exceed the “MAX allowed VLAN to monitor” for the sensor mode. If the number of
VLANs specified by user exceeds this maximum count, the maximum VLANs (created &) monitored should be the
first maximum VLAN entered by user in sensor template.
To delete a VLAN, select the VLAN from the Additional VLANs to be Monitored area, and click Delete.
The changes in the sensor template will affect the working of the sensor operating in sensor mode in the following
wayIf the sensor template for a sensor has “Enable VLAN Monitoring” checkbox not selected, then all the existing
VLANs remain as is, there would be no change to existing VLANs.
If the sensor template for this sensor has “Enable VLAN Monitoring” checkbox selected, then
(a) All the VLANs which were previously configured on sensor which are also in sensor template’s VLAN list of
'VLANs to be monitored' would not have any effect on their configuration.
(b) If communication VLAN currently configured on the sensor is not in sensor template’s VLAN list of 'VLAN to be
monitored', then the communication VLAN’s configuration wouldn’t change.
(c) All the VLANs which were previously configured on sensor but are not present in sensor template’s VLAN list of
'VLANs to be monitored' would have their VLAN configuration deleted from that sensor (Except if the VLAN is
communication VLAN as clause 'b' states).
(d) All the VLANs which were previously NOT configured on sensor but are present in sensor template’s VLAN list
of 'VLANs to be monitored' would be created on the sensor and by default DHCP settings would apply for these
VLANs being created.
when the sensor is in offline mode, the communication VLAN is monitored.
Sensor Password Configuration
Sensor Password setting allows you to manage the password for user config on the sensor Command Line Interface
(CLI). By defining a password in the sensor template, you can manage the password for a group of sensors without
having to change it on each sensor separately. Type a new password or click Restore Default to change the current
password settings. If you choose Restore Default, then the password setting will be the same as that in the System
Template.
Note: If a sensor template contains a blank password, then the sensors, to which this template is assigned, retain
their existing password. Factory setting of the System Template contains a blank password.
SpectraGuard® Enterprise User Guide
309
Administration Tab
Sensor Password Configuration
Under Sensor Password Configuration tab specify the following:
 Current Password state: Specifies that the new password must be the same as the one specified in the System
Template.
 New Password: Enter the new password to be assigned as user ‘config’ password for all sensors associated with
the sensor template being edited.
 Confirm Password: Reenter the password to help confirm the new password before saving.
Offline Sensor Configuration
This feature provides some security coverage even when there is no connectivity between a sensor and the server.
The sensor provides some classification and prevention capabilities when it is disconnected from the server. The
sensor also raises events, stores them, and pushes them back to the server on reconnection.
SpectraGuard® Enterprise User Guide
310
Administration Tab
Offline Sensor Configuration-Offline Sensor Parameters
 Enable offline Sensor mode: Select this checkbox to enable the offline sensor mode. When the offline sensor mode
is enabled, the sensor continues to detect and classify devices, raise event alerts, and prevent ongoing threats. (Default:
Selected)
 Time to switch to offline mode after Sensor detects loss of connectivity: Specify the time after which, if the
sensor does not receive any communication from the Server and Enable offline Sensor mode is enabled, the sensor
switches to the offline mode.
(Minimum: 5 minutes; Maximum: 60 minutes; Default: 15 minutes)
 Under Offline Sensor Parameters tab, you can view the following:
 Number of APs to be stored: Number of APs that the sensor will continue to detect in Offline mode (Default:
128)
 Number of Clients to be stored: Number of Clients that the sensor will continue to detect in Offline mode
(Default: 256)
 Number of events to be stored: Number of events that the sensor will continue to raise in Offline mode (Default:
256)
 Number of prevention records to be stored: Number of prevention records that the sensor will continue to store
in Offline mode to prevent ongoing threats (Default: 256)
SpectraGuard® Enterprise User Guide
311
Administration Tab
Offline Sensor Configuration-Device Classification Policy
 Under Device Classification Policy tab specify the desired classification policies to move APs and Clients from the
Uncategorized list to the Categorized list:
 Under AP Classification Policy, select one or more options to enable the system automatically move APs from
the Uncategorized AP list to the Categorized AP list:
 Move networked APs to the Rogue or Authorized AP folder in the Categorized AP List
 Move non-networked APs to the External AP folder in the Categorized AP List
 Under Client Classification Policy, select one or more options to enable the system automatically classify Clients
based on their associations with APs:
 On association with an Authorized AP, classify an Uncategorized Client as Authorized
 On association with a Rogue AP, classify an Uncategorized Client as Unauthorized
 On association with an External AP, classify an Uncategorized Client as Unauthorized
SpectraGuard® Enterprise User Guide
312
Administration Tab
Offline Sensor Configuration-Intrusion Prevention Policy
Under Intrusion Prevention Policy tab enable intrusion prevention against the following threats:
 Rogue APs
 APs categorized as Rogue
 Uncategorized APs that are connected to the network
 Misconfigured APs
 APs categorized as Authorized but using no security mechanism (Open)
 APs categorized as Authorized but using weak security mechanism (WEP)
 Client Mis-associations
 Authorized Client connections to APs categorized as External
 Unauthorized Associations
 Unauthorized Client connections to APs categorized as Authorized
 Adhoc Connections
 Authorized Clients participating in any adhoc network
 Honeypot/Evil Twin APs
 Authorized Client connection to Honeypot/Evil Twin APs
SpectraGuard® Enterprise User Guide
313
Administration Tab
Additionally, specify the intrusion prevention level that allows you to choose a trade-off between the desired level of
prevention and the desired number of multiple simultaneous preventions across radio channels. You can choose
either of the following prevention levels:

Block

Disrupt

Interrupt

Degrade
Antenna Selection and Port Assignment
Antenna connectivity setting is an advanced setting and should be used with utmost care. This setting allows you to
provide additional information about the type of antennas connected to the sensor. You need to change this setting
only if you use sensors that allow you to connect antennas.
Note: Antenna Selection feature is available for SS-300 Sensor and Port Assignment feature is available for SS200 Sensor.
Applying a template with a particular antenna setting to a sensor with incompatible antenna connection can result in
a loss of system functionality leading to higher security risks. The default setting being “Diversity On”. It is
recommended that you avoid changing the Antenna Port Setting in the default sensor template. If you use sensors
with 2 single band antennas, create a separate template with “Diversity Off” setting and manually apply it to a group
of sensors which use single band antennas.
Note: The default setting is “Diversity On” which means both the antennas are dual band.
SpectraGuard® Enterprise User Guide
314
Administration Tab
Antenna Selection and Port Assignment
Under Antenna Selection and Port Assignment tab
For Port Assignment for SS-200 Sensor

Select Diversity On or Diversity Off
 Diversity On: This is the default setting, which means both the antennas are dual band. Select this option if you
have a dual band (2.4 GHz and 5 GHz) antenna connected to both the ports on the sensor. Assigning this setting to a
sensor which does not have a dual band antenna connected to both ports, can result in unpredictable sensor behavior
leading to loss of system functionality. Make sure that the template with “Diversity On” setting is indeed applied to
sensor(s), which have dual band antenna connected to them.

Diversity Off: Select this option if and only if your sensors have a 5 GHz antenna connected to Port 1 and a 2.4
GHz antenna connected to Port 2. The figure in the Antenna Port Assignment tab shows how to locate the ports to
ensure that the single band antennas are correctly connected. Assigning this setting to a sensor that does not have
single band antennas connected as mentioned above can result in unpredictable sensor behavior leading to loss of
system functionality. Make sure that the template with Diversity Off setting is indeed applied to sensor(s) that have
two different single band antennas supporting 2.4 GHz and 5 GHz frequency bands and connected as mentioned
above.
SpectraGuard® Enterprise User Guide
315
Administration Tab
Antenna Selection and Port Assignment-SS-300-AT
For Antenna Selection for SS-300-AT Sensor

Select Internal or External in Antenna Selection.
The default configuration for SS-300-AT sensors is to use internal antennas. If you want to connect external antennas
to SS-300-AT sensors, select External radio button. This enables:
 Antenna Ports Used: Six external antenna ports are available in every SS-300-AT type sensors. Out of these six
ports, three ports are for 5 GHz and three for 2.4 GHz. Depending upon number of external antennas connected; click
the checkboxes corresponding to the antenna ports in the sensor template. Indentation marks are provided on the
sensor enclosure describing the radio and antenna port, like 5G Ant1, 2.4G Ant2, and so on.
 Antenna Model: Select the appropriate antenna model for 2.4 GHz and 5GHz antennas from the drop down list.
The antenna models available are SS-300-AT-AN-10 is recommended for Indoor use, SS-300-AT-AN-20 is
recommended for Outdoor use, SS-300-AT-AN-40 is recommended for Outdoor use. Select Other and enter the
antenna model of your choice in the Enter Antenna Model field.
Recommendation: It is recommended that you should use AirTight™ certified antennas for better coverage and
performance. If you are using Other Antenna Model, please make sure that they comply with the SS-300-AT
sensor’s electrical characteristics.
SpectraGuard® Enterprise User Guide
316
Administration Tab
Points to note for SS-300 Sensor – Antenna Selection
1 Antenna selection feature is not available in SS-300-AT-C-01 model type. For this model, internal antennas will
be selected irrespective of the “Antenna Selection” settings.
2 There is no need to perform any special configuration for connecting external antenna for SS-200-AT type of
sensors. You can simply connect external antenna for SS-200-AT sensors.
In case of external antenna use with SS-300-AT-C-05 and SS-300-AT-C-10 sensor models, three antenna pairs are
recommended. If you choose to use only two antenna pairs, the two antennas pairs must be connected to ports
marked as Ant1 and Ant2 (ports at the two ends of the edge with the connectors) for proper operation.
In case of external antenna use, it is required that a minimum of two antenna pars are connected to the SS-300AT-C-05 and SS-300-AT-C-10 sensors. If you connect only one antenna pair to these models, some threats that operate
in high bit rates available with the 802.11n protocol will not be visible to the system and consequently, the system
will be unable to report and protect the network against such threats.
Antenna Selection and Port Assignment-SS-300-AT-C-50
i.
For Antenna Selection for SS-300-AT-C-50

Select Internal or External in Antenna Selection.
The default configuration for SS-300-AT-C-50 sensors is to use internal antennas. If you want to connect external
antennas to SS-300-AT-C-50 sensors, select External radio button. This enables:
SpectraGuard® Enterprise User Guide
317
Administration Tab
 Antenna Ports Used: Three external antenna ports are available in every SS-300-AT-C-50 type sensors.
Depending upon number of external antennas connected; click the checkboxes corresponding to the antenna ports in
the sensor template. Indentation marks are provided on the sensor enclosure describing the radio and antenna port,
like 2.4G/5G Ant 1, 2.4G/5G Ant 2, and 2.4G/5G Ant 3.
Note: To derive the full benefit of 802.11n range and to be able to capture all 802.11n traffic all three antennas must
be connected.
 Antenna Model: Select the appropriate antenna model for 2.4GHz/5GHz antennas from the drop down list. The
antenna models available are SS-300-AT-AND-12-3 and SS-300-AT-AND-14-3 recommended for Indoor use and
select Other and enter the antenna model of your choice in the Enter Antenna Model field.
Note: It is recommended that if you select external antennas, you must connect dual band antennas to the antenna
ports.
Click Save to save all settings.
Click the
icon to edit an existing sensor template. When an existing sensor template is edited a Confirmation –
Save dialog appears indicating the modifications, by selecting the tabs that were modified. You are allowed to
uncheck a tab if you wish to cancel those modifications. Click OK to save the changes for the selected tab.
Note: Name and Description of the sensor template are automatically saved.
Click Save As to save the sensor template with a different name without modifying the original template.
Click Restore Default to revert to the System Template. The system enables you to select tabs to control the settings
that will be restored to the default values. If you click Restore Default on the System Template, parameters under the
selected tabs are restored to their factory default settings. A Confirmation – Restore Default dialog appears with a
list of tabs selected, for which default settings will be applied.
Important: The system has the ability to scan and defend on 4.920-4.980 GHz and 5.470-5.725 GHz channels in
US/Canada and IEEE 802.11j channels 4.920-4.980 GHz and 5.040-5.080GHz channels in Japan.
Click the
icon to view an existing sensor template. Click the
icon to delete an existing sensor template.
SpectraGuard® Enterprise User Guide
318
Administration Tab
Antenna Selection and Port Assignment-SS-300-AT-C-60
ii.
For Antenna Selection for SS-300-AT-C-60

Select Internal or External in Antenna Selection.
The default configuration for SS-300-AT-C-60 is to use internal antennas.
Sensor Access Log
The System provides you with a provision to send the sensor access logs to the Syslog server. Following logs could
be sent
to a Syslog server of user's choice:
1. Login attempts to the sensor from the console or secure shell (ssh) along with the result, i.e. Success or
Failures
2. Configuration changes done on the sensor through the command line interface (CLI)
3. Attempts and outcome of set, reboot, reset factory commands executed on the sensor.
This facility could be enabled or disabled on a per Sensor Configuration Template basis.
This facility is useful for audit purposes. This facility could be turned on or off from Sensor Configuration Template
for
SpectraGuard® Enterprise User Guide
319
Administration Tab
that particular sensor. The configuration of Syslog server IP to which the sensor access logs are to be sent, is done
through
the Sensor Access Log tab.
The following screen shows the Sensor Access Log tab.
Sensor Access Logs
The following fields are present in the Sensor Access Logs tab:
Enable Sensor Access Logging: Select the Enable Sensor Access Logging check box, to enable sending of sensor
access logs to a Syslog server. This checkbox is deselected, by default.
Syslog Server IP address/DNS name: Specify the IP address or DNS name of the Syslog server to which the sensor
access logs are to be sent in this field. IPv4 addresses are allowed in this field. This field is blank and disabled, by
default. It is enabled when you select the Enable Sensor Access Logging check box.
Click Save, to save the Sensor Access log settings.
Click Cancel, to cancel any changes made to this tab.
Click Restore Defaults, to restore default values of the fields in the Sensor Access Log tab.
Once sensor access logging is enabled, the sensor reboots and starts sending information to the Syslog server at the IP
address specified through this tab.
SpectraGuard® Enterprise User Guide
320
Administration Tab
Note: Check the firewall settings of the Syslog server and modify them, if needed, so that the System is able to send
the logs to the Syslog server.
Location Properties
The Location Properties option enables you to define high-level administrative settings for a selected location. These
settings take precedence over any conflicting policies.
Event Activation
AirTight recommends that you select the check box Activate Event Generation for location ‘’ only
after the deployment is stable and fully configured. If you are modifying a deployment, deselect the check box to
avoid spurious activity during the transient phase.
Event Activation
Intrusion Prevention Activation
AirTight recommends that you select the check box Activate Intrusion Prevention for location ‘’
only after the deployment is stable and fully configured. If you are modifying a deployment, deselect the checkbox to
avoid spurious activity during the transient phase.
Note: Intrusion Prevention Activation section is not visible if WIDS license is applied.
Authorized APs should be in the Authorized folder before activating intrusion prevention. Their network
connectivity icon may show the status as Wired, Unwired, or Indeterminate.
SpectraGuard® Enterprise User Guide
321
Administration Tab
Note: If you deploy new Authorized APs later, you do not have to deactivate intrusion prevention.
However, you need to ensure that the newly deployed APs are moved to the Authorized folder.
Intrusion Prevention Activation
Device List Locking
You can lock the list of Authorized APs and Clients for a selected location by checking the two check boxes Lock AP
List for location ‘ and Lock Client List for location ‘. If you lock a particular
device list, no more devices of that type can be subsequently automatically Authorized for that location. As APs are
not automatically moved to Authorized folder, locking the Authorized AP list means that no wired APs will be
tagged as Potentially Authorized at this location; they will become Potentially Rogue and may be automatically
moved to the Rogue folder based on the AP Auto-Classification policy. You should use this feature only after you
have identified and categorized all authorized devices. Any new devices added after the list is locked has to be
manually moved to the Authorized category.
SpectraGuard® Enterprise User Guide
322
Administration Tab
Device List Locking
SpectraGuard® Enterprise User Guide
323
Appendix A1:SNMP Interface
Appendix A1:SNMP Interface
The system sends traps to an SNMP management station when a Sensor generates an event. You can view a trap sent
from the system using SNMP manager software such as HP Open View or MG Soft MIB (Management Information
Base) browser. The SNMP manager software allows you to view a detailed description of the trap and thereby the
functioning of your wireless network. Perform the following steps from the SNMP management station to receive
traps from the system and to dig deeper into the Sensors.
1. Configure the system to specify the IP address, community string, and the SNMP version of the SNMP
management station. This can be done from the Administration->Local tab->ESM Integration->SNMP screen
of the Console.
2. Compile the MIB file and enable the SNMP management station to receive traps. The system currently
generates traps for all the events. The format of the trap is: SpectraGuard Event.
The Internet Assigned Numbers Authority (IANA) assigned Private Enterprise Number for AirTight® Networks, Inc.
is 16901.
SNMP trap contains following variable bindings:
1. eventShortText is the short text identifying the type of an event. For example, “Rogue AP active”
2. deviceMAC*, deviceType* - Information of the device(s) participating in the corresponding SpectraGuard
event
 deviceMAC* object is the MAC address of participating device(s). For example, 00:11:95:1E:A7:56
 deviceType* object is the type of participating device. For example, Access Point, Client, Sensor. If a
SpectraGuard event contains more than three participating devices, then deviceType and
deviceMAC of only first three devices is sent out in the SpectraGuardEvent notification.
3. eventID is the unique sequence number which identifies specific instance of an event. This sequence number
is always auto-incremented by one for every newly event raised.
4. eventMajorType represents the top level category of an event. For example, security, system, performance
5. eventIntermediateType is the sub-category within eventMajorType
6. eventMinorType is the actual identifier of the event type
7. eventSeverityLevel is the configured Severity level of the SpectraGuard event. For example: high, medium,
and low.
SpectraGuard® Enterprise User Guide
324
Appendix A2:Syslog Interface
Appendix A2:Syslog Interface
SGE also sends events as Syslog messages. Any standard Syslog receiver (e.g. Syslog watcher from snmpsoft) can be
used to monitor the Syslog messages sent by SGE.
SGE can send Syslog messages either 'Plain Text' or 'IDMEF' format based on the 'Message Format' selected while
configuring Syslog receivers on Syslog configuration screen.
The format of 'Plain Text' Syslog message is shown below.
<> v: : // : : ::::
Product Name: SpectraGuard Enterprise
SGE Version: SpectraGuard Enterprise Release
Event Summary Description: Summary description for the event
IP Address: IP Address of the SpectraGuard Enterprise Server
Location: Location in SGE console at which this event is generated.
Event Date-Time: Date-Time at which event was generated in SGE
Event Severity Level: Configured severity level of the SpectraGuard Enterprise Event e.g High, Medium or
Low
Event ID: Unique sequence number which identifies specific instance of an event. This sequence number is
always auto-incremented by 1 for every new event raised.
Event Major Type: It represents the top level category of an event.
Event Intermediate Type: It represents the sub-category within Event Major Type
Event Minor Type: It is the actual identifier of the event type
Example:
"SpectraGuard Enterprise v6.5 : Start: Rogue AP [Symbol_CC:31:B0] is active. :
192.168.8.134://Locations/Unknown : 2010-06-10T05:16:28+00:00 : High : 21218 : 5 : 59 : 779"
The IDMEF message contains some additional information which is not available with 'Plain Text' format
Product Vendor: AirTight
SGE Operating System: Linux
SGE Operating System Version: Operating system version of SGE appliance
Event Short Name: Short text identifying the type of an event
The format of 'IDMEF' Syslog message is shown below.
"





//


Event Date Time




SpectraGuard® Enterprise User Guide
325
Appendix A2:Syslog Interface
  
"
All Syslog messages are sent with Syslog facility as 'System' and Syslog severity as 'Critical', 'Info' or 'Warning' based
of SpectraGuard Enterprise event severity.
SGE Severity
Syslog Severity
High
Critical
Medium
Warning
Low
Info
SpectraGuard® Enterprise User Guide
326
Appendix B:Glossary of Terms and Icons
Glossary of Terms and Icons
This section provides a quick reference to wireless networking terms and acronyms used in the guide.
Acronyms
Abbreviation
AP
Description
Access Point
DNS
Domain Name System (or Service or Server)
DoS
Denial of Service
ESM
Enterprise Security Management
IEEE
Institute of Electrical and Electronics Engineers
LAN
Local Area Network
LDAP
LWAPP
Light-Weight Directory Access Protocol
Light-Weight Access Point Protocol
MAC
Media Access Control
MIB
Management Information Base
NAV
Network Allocation Vector
NOC
Network Operations Center
OPSEC
RF
Operations Security
Radio Frequency
SMTP
Simple Mail Transfer Protocol
SNMP
Simple Network Management Protocol
SSID
Service Set Identifier
SpectraGuard® Enterprise User Guide
327
Appendix B:Glossary of Terms and Icons
SSL
Secure Socket Layer
UDP
User Datagram Protocol
VPN
Virtual Private Network
WEP
Wired Equivalent Privacy
WLAN
Wireless Local Area Network
WLSE
Wireless LAN Solution Engine
Glossary of Terms
Term
Description
.SPM file
Planner File, a proprietary AirTight® Networks file format that holds information
about RF signal values, placement of devices, and device settings
802.11
An IEEE wireless LAN specification for over-the-air interface between a wireless
Client and a base station or between two wireless Clients
Access Point also referred to, as an AP is a station* that provides distribution
services. It is the hub used by wireless Clients for communicating with each other
and connecting to the WLAN
* A station is the component that connects to the wireless medium
A network formed by peer-to-peer connections between wireless Clients. It is difficult
Ad hoc Network
to enforce tight security policy controls on ad hoc connections. Therefore, ad hoc
connections create a security vulnerability
An Authorized Client is one that has successfully connected to an Authorized AP at
Authorized client
least once. Once identified as Authorized, a Client remains Authorized until it is
deleted by the administrator and is re-classified as Unauthorized
A feature provided by the system that automatically tags devices and events based
Auto Location Tagging on the Sensors that see the event and the location of the devices that participate in
the event
Access Point
Categorized Devices – This section of the Dashboard screen displays a list of all the APs automatically and
manually categorized
APs
Classification Policy
Classification Policy allows you to define AP and Client classification policies to control
automatic movement of APs and Clients to the appropriate folders
Client
A laptop, a handheld device, or any other system that uses the wireless medium
(802.11 standard) for communication
Community String
Community string is a key used to authenticate a message sent by the SNMP agent
to the SNMP manager
DNS
Domain Name Service, an Internet service that translates domain names into IP
addresses
DoS
Denial of Service, an attack that degrades the performance of an official WLAN
SpectraGuard® Enterprise User Guide
328
Appendix B:Glossary of Terms and Icons
Dual Radio AP
An AP with two radios to support Clients on multiple bands
Hostname
A unique name by which a computer is identified on the network
Indeterminate AP
An AP for which the system cannot determine whether it is plugged into your wired
network. This AP should be inspected and manually moved to one of the AP folders
Intrusion Prevention
(Quarantine) Policy
The Intrusion Prevention Policy allows the system proactively block an AP or a Client
to automatically protect the network against various wireless security threats
IP Address
Internet Protocol Address, a 32-bit numeric identifier for a computer or a device on
the network
Location Tracking
A distinguishing feature of the system that allows you to automatically locate a
device placed on a floor map
MAC Address
MAC Spoofed AP
Mis-configured AP
Media Access Control Address, a unique 6-byte (48 bit) address assigned to the
network adapter by the manufacturer and is often transparent to a user; a
networked device has a MAC address corresponding to each network interface
An attacker AP masquerades the Authorized AP by advertising the same MAC address
and other features set as the authorized/other AP in its Beacon/Probe Response
frames. The system generates an alert on detection of AP MAC spoofing
An AP in the Authorized list, that is plugged into your wired network but does not
conform to the Network Policy settings (SSID, Vendor, Encryption, and Protocol) for
its network segment
Network Detector
A device that can co-exist on a Trunking switch; the ND can detect as many LAN
segments as you configure on the switch
Network Interface card
An expansion board or a card that is inserted into a computer so that the computer
can be connected to a network
Network Status
Network status specifies if the network is locked or unlocked. Once a protected
network segment is locked, all new APs connected to it are pre-classified as Rogue and
have to be approved manually. If a protected network segment is unlocked, any new
APs connected to this network will be automatically classified based on the Security,
Protocol, SSID, and Vendor Settings
Potentially Authorized A new AP plugged into your wired network and conforming to the Network Policy
settings (SSID, Vendor, Encryption, and Protocol) for its network segment; this AP
AP
must be inspected before manually moving it to the Authorized AP folder
Potentially External AP
A new AP not plugged into your wired network. This is an AP usually belonging to a
neighbor. It does not pose a threat to your wired network
Potentially Rogue AP
A new AP plugged into your wired network but not conforming to the Network Policy
settings (SSID, Vendor, Encryption, and Protocol) for its network segment. This AP is never
authorized and can be
automatically moved to the Rogue AP folder based on the
Classification Policy
Security Settings
An IEEE 802.11 defined MAC–level privacy mechanism that protects the contents of
data frames from eavesdropping using encryption
SMTP
Simple Mail Transfer Protocol, A protocol for sending e-mail messages between
Servers. Most e-mail systems that send mail over the Internet use SMTP to send
messages from one Server to another
SNMP
Simple Network Management Protocol, a set of protocols for managing complex
networks
SpectraGuard® Enterprise User Guide
329
Appendix B:Glossary of Terms and Icons
Software AP
Software implementation of AP functionalities that permits a WLAN enabled device to
act as an AP
SSID
A unique token identifying an 802.11 WLAN; all wireless devices on a WLAN must
employ the same SSID to communicate with each other
Unauthorized Client
A Client that is not authorized; an Unauthorized Client has never connected
successfully to an Authorized AP
Uncategorized
Devices – APs
This section of the Dashboard screen displays a list of all the newly discovered APs
VPN
Virtual Private Network, a network constructed using public wires to connect nodes.
For example, there are a number of systems that enable you to create networks
using the Internet as the medium for transporting data; these systems use
encryption and other security mechanisms to ensure that only authorized users can
access the network and that the data cannot be intercepted
WEP
Wired Equivalent Privacy, an IEEE 802.11 defined MAC–level privacy mechanism that
protects the contents of data frames from eavesdropping using encryption
WLAN
Wireless Local Area Network that uses high frequency radio waves, rather than wires
to communicate between nodes
WLSE
Wireless LAN Solution Engine, a centralized, systems-level application for managing
and controlling an entire Cisco AirTight WLAN infrastructure
Glossary of Icons
This section provides a quick reference to the various icons used in the system.
Navigation Bar Icons
Icon
Name: Description
Dashboard: The tab with this icon signifies the Dashboard screen that displays a
consolidated view of the WLAN environment.
Events: The tab with this icon signifies the Events screen that displays various
event categories in the network.
Devices: The tab with this icon signifies the Devices screen that provides
information on the wireless devices in the network.
Locations: The tab with this icon signifies the Locations screen that displays live
RF maps of the network.
Reports: The tab with this icon signifies the Reports screen that allows you to
create, generate, schedule, and archive various reports.
Forensics: The tab with this icon signifies the Forensics screen that displays details
about the detected threats for further analysis of the causes and actions taken
Administration: The tab with this icon signifies the Administration screen that
allows you to perform various administrative activities.
Upgrade Required: This blinking icon indicates that the system needs to be
upgraded to a newer version.
Troubleshooting In Progress: This blinking icon indicates that troubleshooting is in
progress on an AP, Client, or Sensor.
SpectraGuard® Enterprise User Guide
330
Appendix B:Glossary of Terms and Icons
Refresh: The button with this icon refreshes the current screen.
Help: The button with this icon displays the Product Help.
Legends: The button with this icon displays the list of icons used on the product
screens and their description.
About SpectraGuard Enterprise: The button with this icon displays the product
version, patent number, and license information of the system.
Log Off: The button with this icon allows you to logout from the Console.
General Icons
Icon
Name: Description
Error!: This icon indicates an application level event that needs immediate
remedial action.
Information: This icon indicates an informational level event that does not need
immediate action.
Warning: This icon indicates an application level event that needs attention.
Confirmation: This icon indicates an application level event that needs
immediate user input.
Progress Bar: This icon indicates an operation is in progress/loading data.
Dashboard Icons
Icon
Name: Description
Secure Network: This icon shows that the network is secure as the events that
cause the network to be vulnerable have not been detected or have been
acknowledged.
Vulnerable Network: This icon shows that the network is vulnerable as the events
that cause the network to be vulnerable have been detected or not all of them have
been acknowledged.
Location Node Secure: This icon indicates that the location node is not all vulnerable
and is totally secure.
Location Node Vulnerable: This icon indicates that the location node is vulnerable.
Location Folder Secure: This icon indicates that the location folder is not all
vulnerable and is totally secure
Location Folder Vulnerable: This icon indicates that the location folder is vulnerable.
SpectraGuard® Enterprise User Guide
331
Appendix B:Glossary of Terms and Icons
Edit Policy: The button with this icon enables you to edit policies.
More Information: The button with this icon enables you to view more information in
a graphics–text format on a particular section.
Bar Chart: This button with this icon enables you to view a bar graph of data.
Pie Chart: This button with this icon enables you to view a pie graph of data.
Table View: This button with this icon enables you to view the table view of data.
Filter: The button with this icon lets you filter the dataset/result to be displayed,
based on a specific criteria.
Events Icons
Icon
Name: Description
Printable view: The button with this icon enables you to view printable reports of the
data displayed on the Events and Devices screens.
Security Event: This icon indicates an event that indicates impending or actual
breach of network security and must be addressed immediately.
System Event: This icon indicates an event that indicates system health.
Performance Event: This icon indicates an event that indicates wireless network
performance problems.
High: This icon indicates an event with high severity.
Medium: This icon indicates an event with medium severity.
Low: This icon indicates an event with low severity.
New: This icon indicates an event that is neither read nor acknowledged.
Read: This icon indicates that the event has been read.
Acknowledged: This icon indicates that the event has been read and acknowledged.
Calendar Control: The button with this icon allows you to select the date and the
time.
Live: This icon indicates a live event in which the triggers that raised the event are
operational or continue to exist; this event has a valid start time stamp.
Live and Updated: This icon indicates a live event that has been updated, that is,
some activity has occurred since the event was last read.
SpectraGuard® Enterprise User Guide
332
Appendix B:Glossary of Terms and Icons
Instantaneous: This icon indicates an instantaneous event that are triggered based
on a trigger that do not have continuity.
Expired: This icon indicates an expired event in which the triggers that raised the
event are not operational or have ceased to exist; this event has a valid start and
stop time stamp.
Secure: This icon indicates an event that does not contribute to the vulnerability
status of the system.
Vulnerable: This icon indicates an event that contributes to the vulnerability status of
the system.
Interference device/jammer icon: This icon shows the device which is RF Jammer or
source of non-Wi Fi interference
Devices Icons
Icon
Name: Description
Rogue AP-Active: This icon shows that a Rogue AP is active and visible to
Sensor(s).
Rogue AP-Inactive: This icon shows that a Rogue AP that was earlier visible to
Sensor(s) is inactive.
Mis-configured AP-Active: This icon shows that a Mis-configured AP is active and
visible to Sensor(s).
Mis-configured AP-Inactive: This icon shows that a Mis-configured AP that was
earlier visible to Sensor(s) is inactive.
Authorized AP-Active: This icon shows that an Authorized AP is active and visible to
Sensor(s).
Authorized AP-Inactive: This icon shows that an Authorized AP that was earlier
visible to Sensor(s) is inactive.
External AP-Active: This icon shows that an External AP is active and visible to
Sensor(s).
External AP-Inactive: This icon shows that an External AP that was earlier visible to
Sensor(s) is inactive.
Known External AP-Active: A Known External AP-Active is a recognizable external
device. For example an AP belonging to the neighboring organization could be
marked as a Known External AP.
Known External AP-Inactive: A known external AP-Inactive is a recognizable
external device. For example an AP belonging to the neighboring organization could
be marked as a Known External AP.
Indeterminate AP-Active: This icon shows that an Indeterminate AP is active and
visible to Sensor(s).
Indeterminate AP-Inactive: This icon shows that an Indeterminate AP that was
earlier visible to Sensor(s) is inactive.
Merged AP-Active: This icon indicates a merged AP is active and visible to
Sensor(s).
SpectraGuard® Enterprise User Guide
333
Appendix B:Glossary of Terms and Icons
Merged AP-Inactive: This icon shows that a merged AP that was earlier visible to
Sensor(s) is inactive.
Misconfigured Merged AP-Active: This icon shows that at least one BSSID in an
active merged AP is misconfigured
Misconfigured Merged AP-Inactive: This icon shows that at least one BSSID in an
inactive merged AP is misconfigured.
Single AP: This icon shows a radio for an AP.
Authorized Merge AP: This icon shows a merged AP (AP with mutliple BSSIDs).
Not plugged into your wired network: This icon shows that an AP is not connected
to your wired network.
Plugged into your wired network: This icon shows that an AP is connected to your
wired network.
Not sure if it is plugged into your wired network: This icon shows that an AP may
be connected to your wired network.
Not in Quarantine: This icon shows that the AP/Client is not in quarantine.
Quarantine Pending: This icon shows that the AP/Client needs to be quarantined,
but quarantine is pending.
Quarantined: This icon shows that the AP/Client has been quarantined. It can also
show that the AP is in port blocking.
Quarantine Error: This icon shows that some error has occurred while quarantining
a device.
DoS Quarantine: This icon shows that the quarantine against DoS attack on this
device is in progress.
DoS Quarantine Pending: This icon shows that the quarantine against DoS attack
on this device is pending.
Add to Banned List: This icon shows that the AP/Client has been added to the
Banned List.
Remove from to Banned List: This icon shows that the AP/Client has been removed
from the Banned List.
Troubleshooting: This icon shows that troubleshooting is in progress on a device.
Troubleshooting + Banned List: This icon indicates that the device is busy in
troubleshooting and is in Banned List.
Event Level Mode: This icon indicates that a troubleshooting session in event level
mode is in progress.
Packet Level Mode: This icon indicates that a troubleshooting session in packet
level mode is in progress.
SpectraGuard® Enterprise User Guide
334
Appendix B:Glossary of Terms and Icons
Authorized Client-Active: This icon shows that an Authorized Client is active and
visible to Sensor(s).
Authorized Client-Inactive: This icon shows that an Authorized Client that was
earlier visible to Sensor(s) is inactive.
Rogue Client-Active: This icon shows that a Rogue Client is active and visible to
Sensor(s).
Rogue Client-Inactive: This icon shows that a Rogue Client that was earlier visible
to Sensor(s) is inactive.
External Client-Active: This icon shows that an External Client is active and visible
to Sensor(s).
External Client-Inactive: This icon shows that an External Client that was earlier
visible to Sensor(s) is inactive.
Guest Client-Active: This icon shows that a Guest Client is active and visible to
Sensor(s).
Guest Client-Inactive: This icon shows that a Guest Client that was earlier visible to
Sensor(s) is inactive.
Uncategorized Client-Active: This icon shows that an Uncategorized Client is active
and visible to Sensor(s).
Uncategorized Client-Inactive: This icon shows that an Uncategorized Client that
was earlier visible to Sensor(s) is inactive.
DoS Attacker: This icon shows the device from which the DoS attack is being
launched.
Client in Adhoc Mode-Active: This icon shows that a Client in adhoc mode is active
and visible to Sensor(s).
Client in Adhoc Mode-Inactive: This icon shows that a Client that was earlier in
adhoc mode and visible to Sensor(s) is inactive.
SAFE Installed-Active: This icon shows that SAFE is installed and active on the
Client.
SAFE Installed-Inactive: This icon shows that SAFE is installed but is inactive on the
Client.
SAFE Not Installed: This icon shows that SAFE is not installed on the Client.
SAFE Risk Level-High: This icon shows that SAFE is installed on the Client and the
risk level on that Client is high.
SAFE Risk Level-Medium: This icon shows that SAFE is installed on the Client and
the risk level on that Client is medium.
SAFE Risk Level-Low: This icon shows that SAFE is installed on the Client and the
risk level on that Client is low.
SAFE Risk Level-Not Known: This icon shows that SAFE is not installed on the Client
and hence the risk level is not known.
SpectraGuard® Enterprise User Guide
335
Appendix B:Glossary of Terms and Icons
SAFE Client-With Only Wired Interface: This icon shows a SAFE Client that has only
a wired interface.
SAFE Report Available: This icon indicates that a SAFE report generated earlier is
available for the selected Client.
SAFE Report Not Available: This icon indicates that a SAFE report is never
generated for the selected Client.
SAFE Report Scheduled: This icon indicates that a SAFE report will be generated for
the selected Client when it become active.
Authorized SAFE Client: This icon shows an Active Authorized SAFE Client.
Unauthorized SAFE Client: This icon shows an Active Unauthorized SAFE Client.
Uncategorized SAFE Client: This icon shows either an Active Uncategorized SAFE
Client or the absence of a Wireless Client.
This icon shows that a Client is connected to another Client.
Infrastructure Association: This icon shows that a Client is connected to an AP.
Sensor-Active: This icon shows that the Sensor is connected to the Server and is
actively monitoring the network. This Sensor has the latest software version and
does not need to be upgraded.
Sensor-Inactive: This icon shows that the Sensor is not connected to the Server
and is currently not monitoring the network. This Sensor has the latest software
version and does not need to be upgraded.
Sensor Repair In Progress: This icon shows that Sensor Repair is in progress.
Sensor Upgrade In Progress: This icon shows that Sensor Upgrade is in progress.
Sensor Upgrade Required: This icon shows that the Sensor needs to be upgraded
to a new version.
Sensor Upgrade Pending: This icon shows that the Sensor needs to be upgraded to
a new version and that the upgrade is pending.
Sensor Upgrade Failed: This icon shows that the Sensor upgrade to a new version
has failed.
Sensor Repair Required: This icon shows that the Sensor needs to be repaired as
the Sensor binaries are not updated.
Sensor Repair Pending: This icon shows that the Sensor needs to be repaired as
the Sensor binaries are not updated and that the repair is pending.
Sensor Repair Failed: This icon shows that the Sensor repair to a new binary
version has failed.
Sensor Indeterminate: This icon shows that the Sensor is in an indeterminate or
irrecoverable state.
SpectraGuard® Enterprise User Guide
336
Appendix B:Glossary of Terms and Icons
Sensor Version Mismatch: This icon shows that the Sensor software version is
higher than that of the Server.
Network Detector-Active: This icon shows that the ND is connected to the Server
and is currently contributing into wired detection of APs.
Network Detector-Inactive: This icon shows that the ND is not connected to the
Server and is currently not contributing into wired detection of APs.
Sensor/AP Combo-Active: This icon indicates that the sensor/AP combo device is
connected to the Server and is monitoring the network.
Sensor/AP Combo-Inactive: This icon indicates that the sensor/AP combo device is
connected to the Server and is inactive.
RSSI: This icon shows signal strength observed by reporting device for AP or
Client.
RSSI Level 0: This icon shows very low signal available.
RSSI Level 1: This icon shows low signal strength.
RSSI Level 2: This icon shows medium signal strength.
RSSI level 3: This icon shows strong signal strength
RSSI Level 4: This icon shows very strong signal strength.
Display Columns: Most fields in the table can be selected for display or optionally
hidden. This button allows selection and configuration of parameters to show and
hide in the table.
Monitored Network: This icon indicates that the network is being monitored by a
sensor.
Unmonitored Network: This icon indicates that the network is not being monitored
by a sensor.
Approved Smart Device: This icon indicates that the authorized client is an
approved smart device.
Unapproved Smart Device: This icon indicates that the authorized client is an
unapproved smart device.
Change Device Type: This icon indicates a change in the smart device type.
Not a Smart device: This icon indicates that the client is not a smart device.
Smart Device: This icon indicates that the guest client is a smart device.
Locations Icons
Icon
Name: Description
SpectraGuard® Enterprise User Guide
337
Appendix B:Glossary of Terms and Icons
Add Location: The button with this icon allows you to create a new location folder or
node.
Edit Properties: The button with this icon allows you to edit the properties of the
existing location folder or node.
Import Location: The button with this icon allows you to import a file in .SPM format
for a specific location from a specified path.
Delete: The button with this icon allows you to delete selected item/entity.
Attach Image on floor: The button with this icon allows you to attach an image to
location folder or node.
Detach Image: The button with this icon allows you to detach an image from
location folder or node.
Save: The button with this icon allows you to save the changes made to the current
Locations screen.
Best Fit: The button with this icon allows you to fit the layout image to the
window/page.
Zoom Out: The button with this icon allows you to zoom out of a layout image.
Zoom In: The button with this icon allows you to zoom into a layout image for an
enlarged view
Unknown: This icon signifies the default location folder of the root location. When
the system detects a new untagged device, the device is tagged to the Unknown
location folder.
Move: This icon in the context-sensitive menu on the Locations screen indicates that
you can move a location folder or node to another location in the Location tree.
Rename: The button with this icon allows you to rename the selected location
node/folder.
Reset Canvas: The button with this icon allows you to revert to a blank canvas.
Printable View: The button displays the currently active information of selected
location information/RF view
Reports Icons
Icon
Name: Description
My Reports: This icon indicates a report that only a single user, the one who created
the report, can view it.
Shared Reports – Custom Reports: This icon indicates a Shared report that all users
can view.
Shared Reports – Pre-defined Reports: This icon indicates reports that are predefined and can be viewed by all users.
Administration Icons
SpectraGuard® Enterprise User Guide
338
Appendix B:Glossary of Terms and Icons
Icon
Name: Description
Global Policies: The button with this icon indicates policies that are applicable to all
the locations defined in the system.
Local Policies: The button with this icon indicates policies that are specific to a
particular location defined in the system.
Custom Defined Policy: This icon signifies a policy group whose policies are custom
defined.
Inherited Policy: This icon signifies a policy group whose policies are inherited.
Expand All: The button with this icon enables you to expand all the nodes, there
allowing you to view all the nodes in the Administration tree.
Collapse All: The button with this icon enables you to collapse all the nodes, there
preventing you to view all the nodes in the Administration tree.
Local User: This icon indicates a system user.
LDAP User: This icon indicates an LDAP user.
Server Error or Integration Failure: This icon shows that an error has occurred in
the Server or ESM/WLAN Integrations.
Server or Integration Running: This icon shows that the Server or ESM/WLAN
Integration is functioning normally.
Server or Integration Stopped: This icon shows that the Server or ESM/WLAN
Integration has stopped functioning.
Hard disk redundancy on SA-350 appliance is supported by RAID-1 Array with two
Hard disks. Data is mirrored on both Hard disks simultaneously.
RAID Normal: Indicates that RAID Array is in normal operating state.
RAID Rebuilding: This is a transient state. It indicates that data is being
synchronized from one Hard disk to the other. System services operate in normal
state when RAID Array is rebuilding.
RAID Failed: Indicates that RAID Array has failed and can not be recovered
automatically. Please contact Technical Support. System services may not operate
in normal state when RAID Array has failed.
RAID Degraded: Indicates that RAID Array has degraded and is not able to
synchronize data from one Hard disk to the other. System services operate in
normal state, but Hard disk redundancy is not available in this state.
SpectraGuard® Enterprise User Guide
339

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Author                          : tejas
Create Date                     : 2013:09:06 13:18:17+08:00
Modify Date                     : 2013:09:06 14:19:03+08:00
Has XFA                         : No
Language                        : zh-TW
Tagged PDF                      : Yes
XMP Toolkit                     : Adobe XMP Core 4.2.1-c041 52.342996, 2008/05/07-20:48:00
Format                          : application/pdf
Creator                         : tejas
Creator Tool                    : Microsoft® Word 2010
Metadata Date                   : 2013:09:06 14:19:03+08:00
Producer                        : Microsoft® Word 2010
Document ID                     : uuid:11b70501-1c95-4db0-9555-46229a4fd8d0
Instance ID                     : uuid:17c57c35-d5de-4910-a5eb-8a8f6bf737dc
Page Count                      : 69
EXIF Metadata provided by EXIF.tools
FCC ID Filing: TOR-SS300ATC60

Navigation menu