User's Guide
Table Of Contents
- Table of Contents
- Preface
- Introduction
- Extreme AirDefense New User Experience
- Dashboard
- View Dashboard
- Create a Dashboard
- Manage Your Dashboard
- Delete the Dashboard
- Dashboard Widgets
- WIPS Widgets
- Widget - Top Criticalities
- Widget - Top Security Alarms
- Widget - Top Wireless Exploits
- Widget - Top Wireless Extrusions
- Widget - Top Vulnerabilities
- Widget - Severity by Device
- Widget - Severity by Tree Level
- Widget - Rogue Access Points
- Widget - Recent Rogue Events
- Widget - Anomalies
- Widget - Top BT Security Alarms
- Widget - BT Security Threat By Category
- Widget - BT Security Threat by Tree Level
- STATs Widgets
- COMPLIANCE Widgets
- WIPS Widgets
- Network View
- Alarm View
- Configuration
- Appliance Management
- Appliance Settings
- Backup / Restore Status
- Certificate / Key Validation
- Certificate Manager
- Configuration Backup
- Configuration Clear
- Configuration Restore
- Download Logs
- Language
- Login / SSH Banners
- Redundant Appliance Sync
- Structure Configuration
- Auto-Placement Rules
- Discovery Profile and Polling Configuration
- Communication Profile
- Security Profile
- Alarm Action Manager
- Device Action Manager
- Sensor Manager
- Alarm Configuration
- Wired Network Monitoring
- Performance Profile
- Environment Monitoring
- Client Types
- Appliance Settings
- Device Age Out
- Configuration Backup
- Forensic and Log Backup
- Configuration Restore
- Download Logs
- Redundant Appliance Synchronization
- Configuration Clear
- Language Settings
- License Management
- User Management
- Relay Server
- System Settings
- Appliance Management
- System Overview
- AirDefense in Standalone Mode
- System Components
- System Requirements
- Version Compatibility for Upgrade
- Connecting to Hardware Appliance
- Configuring the Appliance
- System Configuration
- Selecting and Deploying APs and Sensors
- Connecting to the Network
- Assigning User Interfaces
- Basic Navigation
- Alarm Time Reporting
- Extreme AirDefense on Virtual Platform
- Menu
- AirDefense Dashboard
- Network Tab
- Capabilities with a Central Management License
- Select-Network View
- Network Devices
- Association Tree
- Network Graph
- Network Filters
- Actions Menu
- Actions Descriptions
- Advanced Search
- Alarms
- Configuration Tab
- Search
- Appliance Platform
- Security & Compliance
- Network Assurance
- Infrastructure Management
- Operational Management
- Alarm Action Manager
- Alarm Configuration
- Client Types
- Device Action Manager
- Device Age Out
- Job Status
- Location Based Services
- Location Subscriber Profiles
- Pending State - Audit
- Sensor Only Settings
- Sensor Operation
- Appliance Management
- Appliance Settings
- Backup / Restore Status
- Certificate / Key Validation
- Certificate Manager
- Configuration Backup
- Configuration Clear
- Configuration Restore
- Download Logs
- Language
- Login / SSH Banners
- Redundant Appliance Sync
- Account Management
- Drop-down Menu Access
- DevicesDrop-down Menu
- Device Functions Requiring More Explanation
- Network Level Drop-down Menus
- Global Tools
- Floor Plan Actions
- Floor Manipulation Tools
- Unplaced Devices Level Drop-down Menu
- Security
- WLAN Management
- Central Management Console
- ADSPAdmin
- Accessing the ADSPadmin Console
- Manage System
- Manage the Database
- Software
- Configure AirDefense
- Configure IDS
- IP Address Configuration
- IPv6
- NETPORT
- DNS Configuration
- Bonding Configuration
- hname Configuration
- dname Configuration
- Time Configuration
- Time Zone Configuration
- NTP Configuration
- PING Config
- SNMP Agent Configuration
- SNMP Community String Configuration
- SNMP Trap Configuration
- HTTP Configuration
- PANIC Configuration
- UIPORT Configuration
- Troubleshooting
- AirDefense Icons
- Legacy Content
- Menu
- AirDefense Dashboard
- Network Tab
- Capabilities with a Central Management License
- Select-Network View
- Network Devices
- Association Tree
- Network Graph
- Network Filters
- Actions Menu
- Actions Descriptions
- Advanced Search
- Alarms
- Configuration Tab
- Search
- Appliance Platform
- Security & Compliance
- Network Assurance
- Infrastructure Management
- Operational Management
- Alarm Action Manager
- Alarm Configuration
- Client Types
- Device Action Manager
- Device Age Out
- Job Status
- Location Based Services
- Location Subscriber Profiles
- Pending State - Audit
- Sensor Only Settings
- Sensor Operation
- Appliance Management
- Appliance Settings
- Backup / Restore Status
- Certificate / Key Validation
- Certificate Manager
- Configuration Backup
- Configuration Clear
- Configuration Restore
- Download Logs
- Language
- Login / SSH Banners
- Redundant Appliance Sync
- Account Management
- Drop-down Menu Access
- DevicesDrop-down Menu
- Device Functions Requiring More Explanation
- Network Level Drop-down Menus
- Global Tools
- Floor Plan Actions
- Floor Manipulation Tools
- Unplaced Devices Level Drop-down Menu
- Security
- WLAN Management
- Central Management Console
- ADSPAdmin
- Accessing the ADSPadmin Console
- Manage System
- Manage the Database
- Software
- Configure AirDefense
- Configure IDS
- IP Address Configuration
- IPv6
- NETPORT
- DNS Configuration
- Bonding Configuration
- hname Configuration
- dname Configuration
- Time Configuration
- Time Zone Configuration
- NTP Configuration
- PING Config
- SNMP Agent Configuration
- SNMP Community String Configuration
- SNMP Trap Configuration
- HTTP Configuration
- PANIC Configuration
- UIPORT Configuration
- Troubleshooting
- AirDefense Icons
- Glossary
These connectivity tests can be run automatically or manually. The AP test uses the deployed
sensors as a wireless station to connect to an AP and validate the available resources. The test
validates wireless authentication, encryption, DHCP, ACL, firewall testing, general network
connectivity and application availability testing.
• Configuration/Compatibility - 802.11 Wireless networks operate in unlicensed frequency ranges
capable of operating in numerous dierent configurations. Monitoring the wireless devices operating
configuration will ensure maximum compatibility and network performance.
• Congestion - 802.11 Wireless network operate in a shared and uncontrolled medium; congestion is
inevitable as the number of wireless devices and bandwidth demands increase. AirDefense
Enterprise proactively monitors for congestion problems to ensure maximum performance on the
wireless network.
• Coverage - 802.11 Wireless networks operate in unlicensed frequencies; however the allowable power
output by any single device has been regulated. This limits range and coverage capable by any
single 802.11 capable wireless device. The main causes of coverage problems are related to
deployments. AirDefense Enterprise provides detections of coverage problems to assist in
troubleshooting specific areas of the wireless networks.
• LiveRF - LiveRF is a tool to that uses live data from sensors and WLAN infrastructure to provide real-
time visualizations of the environment. The use of live data feeds ensures the visualizations
accurately represent environmental changes and transient issues which may not have been captured
in the plan or site survey. Visualizations provided allow administrators to troubleshoot wireless
connectivity, throughput issues, capacity problems and identify RF interference sources for a floor or
entire building. All of this is performed from a central console, so troubleshooting can be performed
without having to send administrators out to remote locations. LiveRF also allows runs in the
background to automatically detect network problems based on thresholds defined by the
administrator. The alarms in this category are a result of these proactive network problem detection
capabilities.
• Potential Interference Sources - 802.11 devices operate in unlicensed frequency ranges, 2.4GHz for
b/g and 5GHz for a-channels and are subject to interference from other devices utilizing the same
frequency. Common examples of these devices are: microwave ovens, Bluetooth devices, baby
monitors, cordless telephones, Zigbee devices, non 802.11 wireless security cameras and wireless
USB devices (wireless keyboard and mouse).
• RF Spectrum Analysis - 802.11 Wireless networks operate in unlicensed frequencies. This includes
any non 892.11 transmitters such as cordless phones, and Bluetooth share frequency spectrum with
802.11 wireless networks. A non 802.11 transmitter can impact the network by causing interference.
Identifying the source is dicult with standard 802.11 hardware as these simply appear as noise.
Spectrum Analysis can be used to identify the source of the interference and judge the impact the
interferer will have on the wireless network.
• Utilization - 802.11 Wireless networks operate in a medium where all devices share the available
bandwidth. Any single device is capable of impacting performance by using all available wireless
resources. AirDefense Enterprise monitors over 50 performance related utilization statistics for the
authorized wireless devices, to ensure that utilization related performance problems are discovered
before causing significant wireless network performance degradation.
Alarm Library
To view a list of Performance Alarms for each alarm sub-type, go to Configuration > Operational
Management > Alarm Configuration, open Performance, and then open the alarm sub-type to see all
the alarms associated with the sub-type.
Operational Management
Legacy Content
1160 Extreme AirDefense User Guide for version 10.5.