User's Guide

Table Of Contents
Navigation: Configuration > Operational Management > Sensor Operation
Environment Monitoring is used to configure the thresholds for monitoring. If a threshold value is
exceeded, an alarm is generated. You can also elect to monitor your system for unobserved devices
and generate alarms for missing devices.
Navigation: Configuration > Network Assurance > Environment Monitoring
Performance Profiles is used to create and edit network performance threshold policies for BSSs and
wireless clients on your wireless LAN.
Navigation: Configuration > Network Assurance > Performance Profiles
Security Profile is used to define the security configurations of sanctioned wireless clients on your
wireless LAN.
Navigation: Configuration > Appliance Platform > Security Profiles Configuration > Security &
Compliance > Security Profiles
Wired Network Monitoring is used to monitor the wired network devices in your system and
generate an alarm under certain conditions.
Navigation: Configuration > Security & Compliance > Wired Network Monitoring
Vulnerability Assessment
Using your existing sensor deployment, Vulnerability Assessment scans your wireless network for
vulnerabilities utilizing a hacker's point-of-view. This allows you to:
Identify network security issues before a hacker does
Remotely scan for and discover wireless network vulnerabilities
Generate alarms to bring attention to vulnerabilities.
The assessment is accomplished by using deployed sensors as a wireless client to connect to an AP and
scan network resources. Vulnerability Assessment can be run automatically or manually, providing
proactive notification that network resources may be compromised.
Note
Vulnerability Assessment is only supported on the legacy sensors M510 and M520 with
firmware version 5.3 or later installed. Vulnerability Assessment is also supported on the
AP650 and AP7131 sensors with WiNG 5.1 or later installed.
On-Demand Vulnerability Assessment
You can conduct an Vulnerability Assessment anytime you need by using an on-demand assessment. To
initiate an on-demand assessment, click on the drop-down menu button
for a BSS or network level,
and select Wireless Vulnerability Assessment.
Note
When the scope is network level, all APs in the scope are assessed.
Vulnerability Assessment Security
852 Extreme AirDefense User Guide for version 10.5.