User Guide Part 2

Wi-Fi Array
406 Appendix C: Technical Support
Array Monitor and Radio Assurance Capabilities
All models of the Wi-Fi Array have a monitor radio, abg(n)2, that checks that the
Array’s radios are functioning correctly, and acts as a dedicated threat sensor to
detect and prevent intrusion from rogue access points.
Enabling Monitoring on the Array
IAP abg(n)2 may be set to monitor the Array or to be a normal IAP radio. In order
to enable the functions required for intrusion detection and for monitoring the
other Array radios, you must configure abg(n)2 on the IAP Settings window as
follows:
z
Check the Enabled checkbox.
z
Set Mode to Monitor.
z
Set Channel to Monitor.
The settings above will automatically set the Antenna selection to
Internal-Omni., also required for monitoring. See the “IAP Settings” on page 255
for more details. The values above are the factory default settings for the Array.
How Monitoring Works
When the monitor radio abg(n)2 has been configured as just described, it
performs these steps continuously (24/7) to check the other radios on the Array
and detect possible intrusions:
1. The monitor radio scans all channels with a 200ms dwell time, hitting all
channels about once every 10 seconds.
2. Each time it tunes to a new channel it sends out a probe request in an
attempt to smoke out rogues.
3. It then listens for all probe responses and beacons to detect any rogues
within earshot.
4. Array radios respond to that probe request with a probe response.
Intrusion Detection is enabled or disabled separately from monitoring. See Step 1
in “Advanced RF Settings” on page 275. Note that the Advanced setting is only
used with the optional Xirrus Defense Module (XDM) software package.