Remotely Monitoring Traffic; How Remote Traffic Monitoring Works - 3Com WX1200 3CRWX120695A Configuration Manual

Wireless lan mobility system wireless lan switch and controller
Hide thumbs Also See for WX1200 3CRWX120695A:
Table of Contents

Advertisement

638
C
A: T
HAPTER
ROUBLESHOOTING A
Remotely
Monitoring Traffic
How Remote Traffic
Monitoring Works
WX S
WITCH
Remote traffic monitoring enables you to snoop wireless traffic, by using
a MAP as a sniffing device. The MAP copies the sniffed 802.11 packets
and sends the copies to an observer, which is typically a protocol analyzer
such as Ethereal or Tethereal.
To monitor wireless traffic, a MAP radio compares traffic sent or received
on the radio to snoop filters applied to the radio by the network
administrator. When an 802.11 packet matches all conditions in a filter,
the MAP encapsulates the packet in a Tazmen Sniffer Protocol (TZSP)
packet and sends the packet to the observer host IP addresses specified
by the filter. TZSP uses UDP port 37008 for its transport. (TZSP was
created by Chris Waters of Network Chemistry.)
You can map up to eight snoop filters to a radio. A filter does not become
active until you enable it. Filters and their mappings are persistent and
remain in the configuration following a restart. The filter state is also
persistent across restarts. Once a filter is enabled, if the switch or the
MAP is subsequently restarted, the filter remains enabled after the restart.
To stop using the filter, you must manually disable it.
Using Snoop Filters on Radios That Use Active Scan
When active scan is enabled in a radio profile, the radios that use the
profile actively scan other channels in addition to the data channel that is
currently in use. Active scan operates on enabled radios and disabled
radios. In fact, using a disabled radio as a dedicated scanner provides
better rogue detection because the radio can spend more time scanning
on each channel.
When a radio is scanning other channels, snoop filters that are active on
the radio also snoop traffic on the other channels. To prevent monitoring
of data from other channels, use the channel option when you configure
the filter, to specify the channel on which you want to scan.
All Snooped Traffic Is Sent in the Clear
Traffic that matches a snoop filter is copied after it is decrypted. The
decrypted (clear) version is sent to the observer.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents