10.03.2013 Views

Sniffer® Portable Professional User's Guide - NetScout

Sniffer® Portable Professional User's Guide - NetScout

Sniffer® Portable Professional User's Guide - NetScout

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 7<br />

140 Sniffer <strong>Portable</strong> <strong>Professional</strong><br />

and above to be interpreted, at least the connection layer must be<br />

selected.<br />

Expert 802.11 Options<br />

The options in the 802.11 Options tab let you specify how the Expert<br />

identifies rogue entities on the wireless network, as follows:<br />

If the Enable Rogue AP Lookup option (beneath the Known<br />

Address Points in the Network table) is enabled during capture, the<br />

Expert compares the MAC address (not the IP address) of each<br />

detected access point to those in the Known Access Points in the<br />

Network list. If the access point’s MAC address is not in the list,<br />

the Expert labels the address as a “rogue” and generates the<br />

Rogue Access Point alarm.<br />

If the Enable Rogue Mobile Unit option is enabled during<br />

capture, the Expert compares the MAC address (not the IP address)<br />

of each detected mobile unit to those in the Known Mobile Units in<br />

the Network list. the Expert flag mobile units whose MAC addresses<br />

are not in the Known Mobile Units list as “rogues” and generates<br />

the Rogue Mobile Unit alarm.<br />

Additional Rogue Identification<br />

In addition, Sniffer <strong>Portable</strong> <strong>Professional</strong> identifies rogues (access points<br />

and workstations) as follows:<br />

The word (Rogue) is included in parentheses following the<br />

offending stations’ entries in Expert Summary and Detail displays.<br />

This provides you with a handy means of identifying units on the<br />

wireless network of which you were not aware, some of which may<br />

be unauthorized intruders.<br />

When Rogue Lookup is enabled, the Host Table includes a Status<br />

column in tabular 802.11 displays listing the current<br />

Rogue/Known/Neighbor identification of each listed entity. You<br />

can check an entry’s selection box in the Host Table (in the #<br />

column) and right-click to identify it as either Known or Neighbor,<br />

or to remove it from the Known/Neighbor list entirely.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!