
10
Chapter 1: Configuration Vulnerabilities
AirMagnet Laptop Wireless LAN Policy Reference Guide
AirMagnet
Mobile
will alert the administrator when it detects a
wireless bridge. Once a Rogue AP running in the bridged mode is
identified and reported by AirMagnet
Mobile
, the WLAN
administrator may use the FIND tool to locate the rogue device.
Figure 1-8: Locating a device with AirMagnet Mobile’s FIND tool
AP Using Default Configuration
Access Points shipped by wireless equipment vendors usually come
with a set of default configuration parameters. Until these
configuration parameters are set based on your corporate security
policy, new Access Points should not be connected to the corporate
wired network. Depending on the manufacturer, unconfigured APs
have a default administrator password, SSIDs, channels,
Laptop Wireless LAN Policy Reference Guide.book Page 10 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...