User's Guide

Table Of Contents
SCHEDULED_IMPORT
SECURITY_PROFILE
SENSOR_SETTINGS
SYSTEM_SETTINGS
USER_INFO
WLAN_PROFILE
Import Rules:
The last field NUM_KEYS_RADIUS_SERVERS is zero by default.
For protocol EAP,WPA and WPA2, RADIUS server information is expected.
RADIUS Server information is preceded by record name radius_info and followed by RADIUS
server name.
For WPA_PSK and WPA2_PSK, the primary shared key and ascii value need to be made
available.
If the protocol is Shared or Open, then Key information needs to be provided. The key
information is specified as follows: KEY_PROFILE,<Index 1,2..>, <transmit key/
default TRUE>, <ascii/default TRUE>,<The WEP Key>
If the number of keys/radius servers are greater than 0, no further WLAN profiles will be
accepted until all keys or RADIUS server information is provided. Information can be sent in any
sequence except for WLAN profiles and LBS profiles which require information in that order.
WVA_PROFILE
Scheduling AP Test or Vulnerability Assessment
Once you have created a profile (by importing or through the GUI), you can schedule an AP Test or a
Vulnerability Assessment to run. This is done with a record named scheduled_test.
The scheduled_test record can part of an import file that creates a profile or it can be its own separated
import file. If it is part of an import file that creates a profile, all scheduled_test records must be entered
at the end of the file.
The fields for a scheduled_test record are:
Note
All fields have an equivalent field in the GUI.
Is this a scheduled AP Test (versus Vulnerability Assessment)-enter true for AP Test; false for
Vulnerability Assessment.
Profile name
Scope [BSS MAC address or path to folder separated by a slash (/)]
Number of retries
Switch Sensors on retry (true or false)
Signal threshold
Last seen time in minutes
Skip test on sensor busy (true or false)
Filter on SSID (true or false)
Legacy Content
Import and Discovery
Extreme AirDefense User Guide for version 10.5. 963