User's Guide

Table Of Contents
Ongoing Cloaking Ability
In the event of a wired network outage, even if sensors lose connection with the centralized server, they
will continue to cloak. In addition, WEP Cloaking is optimized to not disturb the wireless environment or
impact Wireless LAN performance. The sensors use countermeasures, correlation through the server,
and mutual coordination over the air to maximize the eectiveness of cloaking with nominal wired and
wireless bandwidth consumption.
Recommendations
You should use a layered security approach to fortify your wireless network. AirDefense
recommends that you follow these guidelines to secure a wireless network utilizing WEP wireless
devices:
Use WEP Cloaking to protect the wireless network using WEP Encryption.
Enable policy-based termination on a Rogue Wireless Client and Replay Injection Attack alarms.
If the devices support PSPF (Public Secure Packet Forwarding) mode, also referred to as AP
isolation, you must enable it. PSPF mode prevents wireless client to wireless client communication
and will limit the eectiveness of typical replay attack.
When choosing your WEP key, it is best to use a randomly chosen hexadecimal key.
Analyze the power output of APs to ensure that the AP is not transmitting any further than is
necessary.
Authorize only specific data rates:
Check the allowed data rates for each AP to ensure that unnecessary distant wireless
associations do not provide wireless client access to the network through the AP. This would
result in a low negotiated data rate.
If the AP is 802.11b/g and the WEP wireless clients require 802.11b devices and not 802.11g,
disable the AP from supporting data rates higher than 11 Mbps.
Legacy Content
WEP Cloaking
Extreme AirDefense User Guide for version 10.5. 1389