Analysis Engine Overview - Extreme Networks Summit WM User Manual

Table of Contents

Advertisement

Passive - The Wireless AP listens for 802.11 beacons.
8 In the Channel Dwell Time box, type the time (in milliseconds) for the scanner to wait for a
response from either 802.11 beacons in passive scanning, or ProbeResponse in active scanning.
9 In the Scan Time Interval box, type the time (in minutes) to define the frequency at which a Wireless
AP within the Scan Group will initiate a scan of the RF space. The range is from one minute to 120
minutes.
10 To initiate a scan using the periodic scanning parameters defined above, click Start Scan.
11 To initiate an immediate scan that will run only once, click Run Now.
NOTE
If necessary, you can stop a scan by clicking Stop Scan.
A scan must be stopped before modifying any parameters of the Scan Group, or before adding or removing a
Wireless AP from a Scan Group.
12 The Scan Activity box displays the current state of the scan engine.
13 To view a pop-up report showing the timeline of scan activity and scan results, click Show Details.
14 To save your changes, click Save.

Analysis engine overview

The Analysis engine relies on a database of known devices on the Controller, Access Points and
Convergence Software system. The Analysis engine compares the data from the RF Data Collector with
the database of known devices.
This database includes the following:
Altitude APs - Registered with any Summit WM Controller with its RF Data Collector enabled and
associated with the Analysis Engine on this Summit WM Controller.
Third-party APs - Defined and assigned to a WM-AD.
Friendly APs - A list created in the Summit WM series Spy user interface as potential rogue access
points are designated by the administrator as Friendly.
Wireless devices - Registered with any Summit WM Controller that has its RF Data Collector
enabled and has been associated with the Analysis Engine on this Summit WM Controller.
The Analysis Engine looks for access points with one or more of the following conditions:
Unknown MAC address and unknown SSID (critical alarm)
Unknown MAC, with a valid SSID - a known SSID is being broadcast by the unknown access point
(critical alarm)
Known MAC, with an unknown SSID - a rogue may be spoofing a MAC address (critical alarm)
Inactive Wireless AP with valid SSID (critical alarm)
Inactive Wireless AP with unknown SSID (critical alarm)
Known Wireless AP with an unknown SSID (major alarm)
In ad-hoc mode (major alarm)
Summit WM User Guide, Software Version 5.3
267

Advertisement

Table of Contents
loading

Table of Contents