User's Guide

Table Of Contents
Masquerade
MAC spoofing
Evil twin attacks/Wi-Phishing attacks
Insertion
Man-in-the-middle attack
Multicast/broadcast injection
Denial-of-service attacks
Disassociation
Duration field spoofing
RF jamming
AirDefense WIPS can mitigate wireless threats via the air by disabling wireless connections between
intruders and authorized devices. A WIPS license enables the Air Termination feature which is extremely
precise at ensuring that only the oending device is prohibited from operating.
Port suppression is also enable to identify switch ports that have oending devices connected to them.
Once detected, the port is turned o to prevent the rogue device from accessing the network.
A WIPS license also enables Sensor Monitoring which is added to the i tab. Sensors are used to monitor
your network for threats.
Planning Your Sensor Deployment
When adding a WIPS license, you should plan where you will be placing your sensors. AirDefense uses
remote sensors to collect data transmitted by 802.11a-, b-, g-, and n-compliant devices and to send that
data to a your central AirDefense appliance for analysis and correlation. Because the sensors are passive
devices that function primarily in listen-only mode, a single sensor can monitor multiple APs.
You should leverage any site surveys you conduct for placement of s as aids to sensor placement
decisions.
Keep the following considerations in mind when deploying your sensors.
Deployment Considerations
Building Structure
Many materials used in building construction may significantly impact the propagation of signals in the
2.4 GHz spectrum or the 5 GHz spectrum.
Concrete reinforcement bars
Elevator shafts
Electric motors (for example, blowers and generators)
Lighting fixtures.
Security
Planning Your Sensor Deployment
Extreme AirDefense User Guide for version 10.5. 845