Installation guide

Chapter 10
136 Sniffer Technologies
a Specify the length of the key by selecting the appropriate option.
Keys can be either None, 40-bit, or 128-bit. Use the None option
if no encryption is used on the network.
Depending on the length of the key specified, some or all of the
adjacent fields become active, enabling you to specify the keys in
use.
b Specify the exact value for each key in the adjoining spaces
provided.
NOTE: The four encryption keys in use on a WEP-encrypted network
are all typically the same length — either 40-bit or 128-bit.
7
Click OK on the Select WEP Keys dialog box.
The Sniffer software attempts to use the specified WEP keys to decrypt
the data in the selected buffer or trace file and opens a new window
with the results. If you specified the correct WEP keys, the new window
displays the newly-decrypted data. You can save the decrypted data to
a new trace file using the usual File > Save command.
NOTE: An easy way to determine whether you have entered the correct WEP
keys is to check for the presence of a large number of WEP-ICV Error Expert
alarms. If there are an abnormally large number of these alarms, you
probably have not entered the correct WEP keys for the encrypted data in
the selected buffer or trace file.
Expert Objects and Alarms for Wireless
Networks
The Sniffer software provides several additions to the Expert analyzer for
wireless networks, including:
Information for DLC layer network objects receiving or sending
information over a wireless LAN.
During Expert analysis, the Sniffer software constructs a database of
network objects from the traffic it sees. The Expert protocol interpreters
learn all about the network stations, routing nodes, subnetworks, and
connections related to the frames in the capture buffer. This information
is presented in the Expert display.