3

 
 
By Andrew Garcia  |  Posted 2004-01-05 Print this article Print
 
 
 
 
 
 
 


Once ACS identifies a valid threat, administrators can use the softwares containment feature to lock down the airwaves. Airespace access points identify the clients involved and bombard them with signals to drop the radio connection, making it quite difficult to maintain state.

We found this feature to be very effective in tests, depending on the client hardware and drivers. Airespace constantly updates the containment feature to deal with new products and driver revisions, company officials said.

The handy Client Watch List feature allowed us to track and monitor specific users or hardware devices over time, sending alerts or traps if the client performance fell below a configurable threshold.

By default, ACS tracks clients and rogues by identifying the closest access point. Companies that need more accurate measurements can purchase the optional $4,000 advanced tracking module with RF fingerprinting. (We did not test this module.)



 
 
 
 
Andrew cut his teeth as a systems administrator at the University of California, learning the ins and outs of server migration, Windows desktop management, Unix and Novell administration. After a tour of duty as a team leader for PC Magazine's Labs, Andrew turned to system integration - providing network, server, and desktop consulting services for small businesses throughout the Bay Area. With eWEEK Labs since 2003, Andrew concentrates on wireless networking technologies while moonlighting with Microsoft Windows, mobile devices and management, and unified communications. He produces product reviews, technology analysis and opinion pieces for eWEEK.com, eWEEK magazine, and the Labs' Release Notes blog. Follow Andrew on Twitter at andrewrgarcia, or reach him by email at agarcia@eweek.com.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Rocket Fuel