User's Guide

Table Of Contents
The Scheduled Vulnerability Assessment window displays a list of all scheduled assessments. From this
window you can:
Add, edit, delete, and cancel assessments
View detail assessment results
Manage the profiles that are used to run assessments on similar scopes.
For details on how to schedule Vulnerability Assessments and use the Schedule Vulnerability
Assessment window, see the section Scheduling AP Test or Vulnerability Assessment on page 421.
WEP Cloaking
In order to extend the life of some older legacy equipment that only supports WEP encryption,
AirDefense has implemented a feature known as WEP Cloaking. This technology injects noise into a
WEP-protected environment by transmitting frames that appear to be sourced from valid devices but
are encrypted with an invalid WEP key. This has very little impact on the devices that know the correct
WEP key and serves to confuse any attackers which might be attempting to crack the WEP key.
Note
By default, the sensor is a passive wireless monitoring device and does not transmit (provided
termination has not been enabled). Enabling the sensors for WEP Cloaking will cause the
sensors to actively transmit on the channels of the devices it is protecting.
WEP Cloaking Overview
AirDefense sensors communicate with the AirDefense appliance to coordinate cloaking operation. The
server can be configured to instruct a group of sensors to cloak sanctioned devices in a given location.
Sensors are designed to intelligently adjust their frequency scanning patterns to maximize cloaking
eectiveness while performing regular Wireless IPS scanning on other channels. More than one sensor
can cloak a single wireless device depending on spatial coverage.
Once configured for cloaking, sensors intelligently analyze local trac and insert carefully timed
cloaking frames as shown in the figure below. To attackers, who do not have the secret WEP key, these
cloaking frames appear as legitimate WEP trac between sanctioned devices. Sanctioned devices,
configured with the production WEP key, automatically ignore the cloaking frames as their integrity test
fails.
WEP Cloaking
Security
854 Extreme AirDefense User Guide for version 10.5.