NETSCOUT Systems Inc. AM5012-001 用户手册
© 2004 AirMagnet
®
, Inc. All rights reserved.
8
Expert Analysis Functions Enabled by Sensor
The intelligent sensor provides around-the-clock coverage of the entire wireless environment
including all 802.11a, 802.11b, and 802.11g channels and infrastructure. Each individual sensor
is armed with the patent-pending AirWISE Analytical Engine that, in real time, monitors and
analyzes the security, performance, and reliability of the wireless network. The sensor enables
the following categories of expert analysis functions. See ANNEX B for a detailed and full
listing of expert analysis functions.
including all 802.11a, 802.11b, and 802.11g channels and infrastructure. Each individual sensor
is armed with the patent-pending AirWISE Analytical Engine that, in real time, monitors and
analyzes the security, performance, and reliability of the wireless network. The sensor enables
the following categories of expert analysis functions. See ANNEX B for a detailed and full
listing of expert analysis functions.
Enforce Security Policy
New security protocols are continually appearing that close the security gap between WLANs
and their wired counterparts. Nevertheless ensuring that all users and stations comply with these
security measures continues to grow as the major issue for wireless networks. AirMagnet Sensors
address this gap by auditing and validating the security of every Wi-Fi device in the network,
providing managers with an easy process to insure all users employ the appropriate level of
security. Supported protocols include:
•
wep
•
leap
•
peap
•
tkip
•
mic
•
802.1x
•
ttls
•
tls
•
wpa
•
pptp vpn
•
l2tp vpn
•
ssh vpn
•
ipsec vpn
Detect Wireless Intruders and Attacks
As Wi-Fi has grown, so have the number and sophistication of wireless attacks. AirMagnet
Sensors are engineered specifically to counter these threats - scanning the environment for
Rogue APs and War-Drivers, Spoofed MAC Addresses, and a host of Denial of Service Attacks
unique to Wi-Fi. Sensors send encrypted real-time alarms in response to an attack, allowing staff
to respond before network operations is negatively impacted.