User's Guide

Table Of Contents
For each report, provide the following information:
Field Description
Report Type Use the drop-down to select from one of the pre-created reports.
Scope Increase Factor Use the drop-down to select the scope of your report. The value in
this field specifies the number of levels to expand the scope of the
report. A value of 1 means only use the floor level. A value of 2
indicates that the floor and its parent level is to be included in this
report's scope.
Run immediate for previous Runs the report immediately for the period selected in the two
drop-down lists located within this field.
Run on alarm clear / expire Runs the report when the alarm is either cleared manually or
expires automatically. To select a duration of time for this report,
use the two drop -down list located within this field.
Publish Indicates how this report is published. A report can be one of
SHARED or PRIVATE. A shared report can be viewed by other users
of the AirDefense system. A private report can only be viewed by
you. When creating a report, provide a distinct name for it.
E-mail Indicates if the report is emailed to specific users. Provide a list of
recipients for this email, separated by semi-colon (;) in the field
provided for the purpose.
WIPS Mitigation
WIPS Mitigation actions are a set of specific actions that you can take at the device level to mitigate
issues with wireless intrusion from devices that do not belong to your AirDefense system. You can also
configure and send SNMP trap messages to multiple SNMP services within your network.
Use the General tab of the WIPS Mitigation control to configure the various settings.
Similarly, use the SNMP Trap tab of this screen to configure SNMP servers to send SNMP traps to the
remote SNMP servers.
General Actions
The General tab of the WIPS Mitigation field provides you with the following WIPS mitigation tools.
ACL - When devices meet the criteria specified in the Alarms and the Filters tabs, these devices are
automatically added to a switch's access control list.
Port Suppression - This action is used to suppress communication between unauthorized devices
and switches on your network.
Termination - This action is used to terminate devices that generate specific alarms as selected in the
Filters tab. An option to also terminate the device that a rogue device is paired to is also available.
ACL
The ACL action enables the Access Control List on switches that meet the conditions specified in the
filters.
Use the Scope Increase Factor drop-down to select the scope of this action. The value in this field
specifies the number of levels to expand the scope of the addition. A value of one (1) means only use
Configuration
Add Alarm Action Manager Rule Set
Extreme AirDefense User Guide for version 10.5. 201