User's Guide

Table Of Contents
Example:
An AP that provides client access on channel six will monitor other channels as well. The AP will stay on
channel six for 10 seconds. During the 10-second interval, the AP is capable of communication with
associated clients. After the 10-second interval, the AP will listen o-channel on channel seven for 110
ms. This round-robin method of o-channel scanning is used by the APs to listen for transmissions of
other APs and to monitor any o-channel RF transmissions.
Note
When utilizing OCS, the APs/sensors take more time to detect threats than when utilizing a
dedicated sensor. The amount of time required to detect threats depend on several factors,
such as, data load, timing, and the channel where the threat is active. OCS is a part of Part-
time WIPS and requires that license for this feature.
Setting Up APs and Sensors
In order to implement WLAN monitoring, you must set up APs and sensors in the vicinity of the
airwaves carrying the WLAN trac. The AirDefense Smart Sensors passively observe all wireless LAN
trac within 40,000 to 60,000 square feet of typical oce space. These sensors collect and analyze
data on the wireless network by monitoring the following factors:
Wireless devices present on the network, along with their associations
Devices using encryption and authentication
Device vendor information
Total data transferred.
Modifying Resources
In the standalone mode, you can modify AirDefense resources by using the CLI interface.
Connecting to the Network
There are various methods of connecting to the network. You should always use the most secure
connection possible. When connecting via browser, use SSL (https:443) when possible.
Sensor-to-Server: you may use unencrypted (port 80) or encrypted (port 443) communication.
Via Sensor UI: new releases only allow encrypted access to the sensor UI (https:443).
Console-to-Server: you must use encrypted (port 8543) communication.
System Overview
Setting Up APs and Sensors
Extreme AirDefense User Guide for version 10.5. 349