Installation guide
D-2 Motorola RF Switch System Reference Guide
• Administrators can launch the AirDefense UI from within RFMS
• The AirDefense Enterprise server can forward SMNP traps to RFMS to provide centralized alarm
reporting and correlation
D.1.1 About the Motorola AirDefense System
The Motorola AirDefense System is intended for customer environments with Motorola or third-party WLAN
infrastructure to provide dedicated threat and performance monitoring and compliance. The Motorola
AirDefense System provides the following advanced services:
• 24x7 Dedicated Sensors - Real-time identification of hackers, attacks and system weak spots.
• Historical Database - By storing and managing more than 270 data points per connection per wireless
device per minute, the product provides a highly accurate assessment of wireless threats including
anomalies and zero-day attacks.
• Forensic Support - Pertinent historical data supports advanced forensics, such as time of attack/breach,
entry point used, length of exposure, systems compromised, device activity logs and transfers of data.
• Multiple Detection Technologies - Provides accurate and comprehensive detection by applying multiple
detection technologies including signature analysis, protocol abuse and anomalous behavior in
conjunction with correlation across multiple sensors.
• Location Based Security - Provides location of unauthorized devices and activities using Motorola WLAN
infrastructure.
• Reports - Provides built-in reports for PCI, HIPAA, Sarbanes-Oxley, GLBA, FDIC and DOD, as well as
forensic support to determine compliance level after the fact, should a security event occur.
• Plug-and-Play Operation - Auto-classification allows for a quick policy-based authorization of APs and
devices. Network traffic can be monitored within minutes of installation, complete with the tools to
quickly interpret information for fast response to Wireless LAN threats.
• Centralized Detection Engine - Eliminates the need to upgrade sensors individually - a single server
upgrade provides new functionality and protection against the latest attacks and new threats.
• Report Builder - Allows customized reports to suit specific needs.
• Advanced Forensics - Adds a new level of depth and flexibility to forensic investigations, allowing the
user to increase/decrease the analysis interval, graph data for easier analysis and conduct historical
location tracking.
D.1.2 Defining an AP300 Sensor Conversion Configuration
The following outlines the requirements, components and steps required to configure a RF Switch to convert
AP300 Access Ports into sensors and revert AP300 sensors back to Access Ports.
To view the running configuration on the RFS6000 switch used to create this MU to MU disallow tutorial,
refer to RF Switch Running Configuration on page D-8.
D.1.2.1 Requirements
The following requirements must be met prior to attempting this configuration:
• One (or more) RF Switches are installed and operational on the network
• One (or more) AirDefense Enterprise servers is installed and operational on the network
• One (or more) Access Ports configured and adopted by the RF Switch