Sniffer® Portable Professional User's Guide - NetScout
Sniffer® Portable Professional User's Guide - NetScout Sniffer® Portable Professional User's Guide - NetScout
Chapter 4 60 Sniffer Portable Professional Thirteen ASCII characters or 0x followed by 26 hex characters is interpreted as a 128-bit key. NOTE: The four encryption keys in use on a WEP-encrypted network are all typically the same length — either 40-bit or 128-bit. NOTE: Key entries appear as asterisks to preserve their security. Notes on Hex/ASCII Conversion If you have previously entered encryption keys in one mode and then switch to the other (Hex to ASCII or vice-versa), Sniffer Portable Professional automatically converts your entries as follows: When converting from ASCII to hex, key entries of five ASCII characters appear as 40-bit keys in Hex mode. Similarly, key entries of 13 ASCII characters appear as 128-bit keys in Hex mode. When converting from hex to ASCII, key entries are converted differently depending on the length specification in the Hex entry mode: If None was selected, the entry fields appear empty. If 40-bit was selected, Sniffer Portable Professional attempts to convert the hex key into ASCII. If conversion is possible, 5 ASCII characters appear. If conversion is not possible, 0x followed by 10 hex characters appears. If 128-bit was selected, Sniffer Portable Professional attempts to convert the hex key into ASCII. If conversion is possible, 13 ASCII characters appear. If conversion is not possible, 0x followed by 26 hex characters appears.
Setting Options in the Sniffer Window Configuring Rogue Identification for Wireless Networks When the Lookup options here are enabled, Sniffer Portable Professional flags wireless entities not found in the corresponding lists as rogues in both Expert and Host Table displays. Use the Tools > Wireless > Rogue options (Figure 4-5) to enable and configure Sniffer Portable Professional’s identification of rogue entities on the wireless network. Figure 4-5. Tools > Wireless > Rogue Dialog Box If the Enable Rogue AP Lookup option (beneath the Known Access Points in the Network table) is enabled, Sniffer Portable Professional compares the MAC address (not the IP address) of each detected access point to those in the Known Access Points in the Network list. If an access point’s MAC address is not in the list, Sniffer Portable Professional labels the access point as a rogue. If the Enable Rogue Mobile Unit Lookup option is enabled, the Expert compares the MAC address (not the IP address) of each detected mobile unit to those in the Known Mobile Units in the Network list. If a mobile unit’s MAC address is not in the list, Sniffer Portable Professional labels it as a rogue. User’s Guide 61
- Page 10 and 11: 10 Sniffer Portable Professional
- Page 12 and 13: Chapter 1 Product Comparison Table
- Page 14 and 15: Chapter 1 Major Components of Sniff
- Page 16 and 17: Chapter 1 Table 1-2. Features for W
- Page 18 and 19: Chapter 2 System Requirements 18 Sn
- Page 20 and 21: Chapter 2 20 Sniffer Portable Profe
- Page 22 and 23: Chapter 2 Installing the Sniffer Po
- Page 24 and 25: Chapter 2 24 Sniffer Portable Profe
- Page 26 and 27: Chapter 2 Native Atheros Driver Upd
- Page 28 and 29: Chapter 2 28 Sniffer Portable Profe
- Page 30 and 31: Chapter 2 Authorizing Sniffer Porta
- Page 32 and 33: Chapter 2 Entering Licensing Inform
- Page 34 and 35: Chapter 2 Starting Sniffer Portable
- Page 36 and 37: Chapter 2 Tuning Settings for Sniff
- Page 38 and 39: Chapter 2 38 Sniffer Portable Profe
- Page 40 and 41: Chapter 2 40 Sniffer Portable Profe
- Page 42 and 43: Chapter 3 a b c 42 Sniffer Portable
- Page 44 and 45: Chapter 3 Sniffer Window Menus 44 S
- Page 46 and 47: Chapter 3 46 Sniffer Portable Profe
- Page 48 and 49: Chapter 4 Setting the General Tab O
- Page 50 and 51: Chapter 4 50 Sniffer Portable Profe
- Page 52 and 53: Chapter 4 Setting the App Threshold
- Page 54 and 55: Chapter 4 Setting Tools > Wireless
- Page 56 and 57: Chapter 4 Configuring Wireless Encr
- Page 58 and 59: Chapter 4 58 Sniffer Portable Profe
- Page 62 and 63: Chapter 4 62 Sniffer Portable Profe
- Page 64 and 65: Chapter 4 Adding Tools to the Tools
- Page 66 and 67: Chapter 4 66 Sniffer Portable Profe
- Page 68 and 69: Chapter 5 Monitoring Wireless Netwo
- Page 70 and 71: Chapter 5 Applying Monitor Filters
- Page 72 and 73: Chapter 5 Dashboard 72 Sniffer Port
- Page 74 and 75: Chapter 5 74 Sniffer Portable Profe
- Page 76 and 77: Chapter 5 The Dashboard Gauge Tab 7
- Page 78 and 79: Chapter 5 78 Sniffer Portable Profe
- Page 80 and 81: Chapter 5 80 Sniffer Portable Profe
- Page 82 and 83: Chapter 5 Host Table 82 Sniffer Por
- Page 84 and 85: Chapter 5 84 Sniffer Portable Profe
- Page 86 and 87: Chapter 5 86 Sniffer Portable Profe
- Page 88 and 89: Chapter 5 Viewing Access Points Onl
- Page 90 and 91: Chapter 5 90 Sniffer Portable Profe
- Page 92 and 93: Chapter 5 Selecting Wireless Host T
- Page 94 and 95: Chapter 5 94 Sniffer Portable Profe
- Page 96 and 97: Chapter 5 Setting Capture Filters f
- Page 98 and 99: Chapter 5 98 Sniffer Portable Profe
- Page 100 and 101: Chapter 5 ART - The Server-Client R
- Page 102 and 103: Chapter 5 Show Options 102 Sniffer
- Page 104 and 105: Chapter 5 ART Options - Servers Onl
- Page 106 and 107: Chapter 5 106 Sniffer Portable Prof
- Page 108 and 109: Chapter 5 Adding Custom Protocols t
Chapter 4<br />
60 Sniffer <strong>Portable</strong> <strong>Professional</strong><br />
Thirteen ASCII characters or 0x followed by 26 hex characters<br />
is interpreted as a 128-bit key.<br />
NOTE: The four encryption keys in use on a WEP-encrypted<br />
network are all typically the same length — either 40-bit or<br />
128-bit.<br />
NOTE: Key entries appear as asterisks to preserve their<br />
security.<br />
Notes on Hex/ASCII Conversion<br />
If you have previously entered encryption keys in one mode and<br />
then switch to the other (Hex to ASCII or vice-versa), Sniffer<br />
<strong>Portable</strong> <strong>Professional</strong> automatically converts your entries as<br />
follows:<br />
When converting from ASCII to hex, key entries of five ASCII<br />
characters appear as 40-bit keys in Hex mode. Similarly, key<br />
entries of 13 ASCII characters appear as 128-bit keys in Hex<br />
mode.<br />
When converting from hex to ASCII, key entries are converted<br />
differently depending on the length specification in the Hex entry<br />
mode:<br />
If None was selected, the entry fields appear empty.<br />
If 40-bit was selected, Sniffer <strong>Portable</strong> <strong>Professional</strong> attempts<br />
to convert the hex key into ASCII. If conversion is possible, 5<br />
ASCII characters appear. If conversion is not possible, 0x<br />
followed by 10 hex characters appears.<br />
If 128-bit was selected, Sniffer <strong>Portable</strong> <strong>Professional</strong><br />
attempts to convert the hex key into ASCII. If conversion is<br />
possible, 13 ASCII characters appear. If conversion is not<br />
possible, 0x followed by 26 hex characters appears.