NETSCOUT Systems Inc. A5020 User Manual
Table of Contents
Table of Contents ............................................................................................................................ 2
Definitions and Terminology .......................................................................................................... 3
References....................................................................................................................................... 5
Introduction..................................................................................................................................... 6
Expert Analysis Functions Enabled by Sensor ............................................................................... 8
Definitions and Terminology .......................................................................................................... 3
References....................................................................................................................................... 5
Introduction..................................................................................................................................... 6
Expert Analysis Functions Enabled by Sensor ............................................................................... 8
Enforce Security Policy ............................................................................................................ 8
Detect Wireless Intruders and Attacks ...................................................................................... 8
Lock In Network Performance.................................................................................................. 9
Ensure Network Reliability....................................................................................................... 9
Centralizing System Management ............................................................................................ 9
Enable Flexible Configuration and User Access ...................................................................... 9
Enable Graphics User Interface from Anywhere in the Network ............................................. 9
Enable Remote Troubleshooting and Active Tools................................................................. 10
Low Overhead On Operational Network................................................................................ 10
Detect Wireless Intruders and Attacks ...................................................................................... 8
Lock In Network Performance.................................................................................................. 9
Ensure Network Reliability....................................................................................................... 9
Centralizing System Management ............................................................................................ 9
Enable Flexible Configuration and User Access ...................................................................... 9
Enable Graphics User Interface from Anywhere in the Network ............................................. 9
Enable Remote Troubleshooting and Active Tools................................................................. 10
Low Overhead On Operational Network................................................................................ 10
Configuration Mode................................................................................................................ 11
Analysis Mode ........................................................................................................................ 11
Active Control Mode .............................................................................................................. 12
Analysis Mode ........................................................................................................................ 11
Active Control Mode .............................................................................................................. 12
Mechanical.............................................................................................................................. 13
Environmental......................................................................................................................... 13
Power ...................................................................................................................................... 13
Radio Frequency ..................................................................................................................... 14
Effective Data Rates ............................................................................................................... 15
Physical Interfaces .................................................................................................................. 15
Internal .................................................................................................................................... 15
Compliance ............................................................................................................................. 15
Environmental......................................................................................................................... 13
Power ...................................................................................................................................... 13
Radio Frequency ..................................................................................................................... 14
Effective Data Rates ............................................................................................................... 15
Physical Interfaces .................................................................................................................. 15
Internal .................................................................................................................................... 15
Compliance ............................................................................................................................. 15
Use of TLS Protocol for Secure Communication ................................................................... 17
Limited Logon Attempts ......................................................................................................... 17
Length of Password Word....................................................................................................... 17
Automatic Self Checking and Module Integrity Checking..................................................... 17
Change of Shared Secret Key via Secure Communication..................................................... 18
Password Encrypted in FIPS-Approved Algorithms .............................................................. 18
Securing the Sensor with the Tampering-Proof Tape ............................................................. 18
Periodical Inspection of the Module for Evidence of Tampering........................................... 18
Limited Logon Attempts ......................................................................................................... 17
Length of Password Word....................................................................................................... 17
Automatic Self Checking and Module Integrity Checking..................................................... 17
Change of Shared Secret Key via Secure Communication..................................................... 18
Password Encrypted in FIPS-Approved Algorithms .............................................................. 18
Securing the Sensor with the Tampering-Proof Tape ............................................................. 18
Periodical Inspection of the Module for Evidence of Tampering........................................... 18
© 2004 AirMagnet
®
, Inc. All rights reserved.
2