638
C
HAPTER
A: T
ROUBLESHOOTING
A
WX S
WITCH
Remotely
Monitoring Traffic
Remote traffic monitoring enables you to snoop wireless traffic, by using
a MAP as a sniffing device. The MAP copies the sniffed 802.11 packets
and sends the copies to an observer, which is typically a protocol analyzer
such as Ethereal or Tethereal.
How Remote Traffic
Monitoring Works
To monitor wireless traffic, a MAP radio compares traffic sent or received
on the radio to snoop filters applied to the radio by the network
administrator. When an 802.11 packet matches all conditions in a filter,
the MAP encapsulates the packet in a Tazmen Sniffer Protocol (TZSP)
packet and sends the packet to the observer host IP addresses specified
by the filter. TZSP uses UDP port 37008 for its transport. (TZSP was
created by Chris Waters of Network Chemistry.)
You can map up to eight snoop filters to a radio. A filter does not become
active until you enable it. Filters and their mappings are persistent and
remain in the configuration following a restart. The filter state is also
persistent across restarts. Once a filter is enabled, if the switch or the
MAP is subsequently restarted, the filter remains enabled after the restart.
To stop using the filter, you must manually disable it.
Using Snoop Filters on Radios That Use Active Scan
When active scan is enabled in a radio profile, the radios that use the
profile actively scan other channels in addition to the data channel that is
currently in use. Active scan operates on enabled radios and disabled
radios. In fact, using a disabled radio as a dedicated scanner provides
better rogue detection because the radio can spend more time scanning
on each channel.
When a radio is scanning other channels, snoop filters that are active on
the radio also snoop traffic on the other channels. To prevent monitoring
of data from other channels, use the
channel
option when you configure
the filter, to specify the channel on which you want to scan.
All Snooped Traffic Is Sent in the Clear
Traffic that matches a snoop filter is copied after it is decrypted. The
decrypted (clear) version is sent to the observer.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...