Extreme Networks WM20 Controller Guide de l'utilisateur Page 173

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 270
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 172
Summit WM20 User Guide, Software Release 4.2 173
8 Working With the Summit WM Series Spy
This chapter describes Summit WM series Spy concepts, including:
“Summit WM Series Spy Overview” on page 173
“Enabling the Analysis and Data Collector Engines” on page 174
“Running Summit WM Series Spy Scans” on page 175
“Analysis Engine Overview” on page 176
“Working With Summit WM Series Spy Scan Results” on page 177
“Working With Friendly APs” on page 179
“Viewing the Summit WM Series Spy List of Third-Party APs” on page 180
Maintaining the Summit WM Series Spy List of APs on page 181
“Viewing the Scanner Status Report” on page 182
Summit WM Series Spy Overview
The Summit WM series Spy is a mechanism that assists in the detection of rogue APs. Summit WM
series Spy functionality does the following:
Wireless AP:
Runs a radio frequency (RF) scanning task.
Alternating between scan functions, providing its regular service to the wireless devices on the
network.
Summit WM Controller:
Runs a data collector application that receives and manages the RF scan messages sent by the
Wireless AP. RF data collector data includes lists of all connected Wireless APs, third-party APs, and
the RF scan information that has been collected from the Wireless APs selected to perform the scan.
Runs an Analysis Engine that processes the scan data from the data collector through algorithms that
make decisions about whether any of the detected APs or clients are rogue APs or are running in an
unsecure environment (for example, ad-hoc mode).
Vue de la page 172
1 2 ... 168 169 170 171 172 173 174 175 176 177 178 ... 269 270

Commentaires sur ces manuels

Pas de commentaire