NETSCOUT Systems Inc. A5020 User Manual

Page of 20
Table of Contents 
 
Enforce Security Policy ............................................................................................................ 8 
Detect Wireless Intruders and Attacks ...................................................................................... 8 
Lock In Network Performance.................................................................................................. 9 
Ensure Network Reliability....................................................................................................... 9 
Centralizing System Management ............................................................................................ 9 
Enable Flexible Configuration and User Access ...................................................................... 9 
Enable Graphics User Interface from Anywhere in the Network ............................................. 9 
Enable Remote Troubleshooting and Active Tools................................................................. 10 
Low Overhead On Operational Network................................................................................ 10 
Mechanical.............................................................................................................................. 13 
Environmental......................................................................................................................... 13 
Power ...................................................................................................................................... 13 
Radio Frequency ..................................................................................................................... 14 
Effective Data Rates ............................................................................................................... 15 
Physical Interfaces .................................................................................................................. 15 
Internal .................................................................................................................................... 15 
Compliance ............................................................................................................................. 15 
Use of TLS Protocol for Secure Communication ................................................................... 17 
Limited Logon Attempts ......................................................................................................... 17 
Length of Password Word....................................................................................................... 17 
Automatic Self Checking and Module Integrity Checking..................................................... 17 
Change of Shared Secret Key via Secure Communication..................................................... 18 
Password Encrypted in FIPS-Approved Algorithms .............................................................. 18 
Securing the Sensor with the Tampering-Proof Tape ............................................................. 18 
Periodical Inspection of the Module for Evidence of Tampering........................................... 18 
© 2004 AirMagnet
®
, Inc. All rights reserved. 
2