User's Guide

Table Of Contents
security concern entails the broadcast or multi-cast wired trac which the AP bridges into the air in
clear text. All devices within range of the AP can passively listen to this trac and gain information
about network configuration, routing, and the devices on the wired network. This is problem is
compounded when the AP is placed on a VLAN which has user systems NetBios trac that can
reveal a great deal about the networked devices. It is best practice to place the APs on a dedicated
subnet which will limit the broadcast domain of the network to minimize wired side leakage.
Alarm Library
To view a list of Vulnerability Alarms for each alarm sub-type, go to Configuration > Operational
Management > Alarm Configuration, open Vulnerabilities, and then open the alarm sub-type to see all
the alarms associated with the sub-type.
Client Types
Client Types gives you the ability to:
Add new client types to your system.
Edit existing client types to change the icon or name.
Remove existing client types from your system.
Client Types Configuration Tab
630 Extreme AirDefense User Guide for version 10.5.