home *** CD-ROM | disk | FTP | other *** search
/ PC Professionell 2007 April / PCpro_2007_04.ISO / files / dsl / ManageEngineWiFiManager.exe / Disk1 / data1.cab / SourceFiles / WiFiManager.exe / TemplateExpert.xml < prev    next >
Encoding:
Extensible Markup Language  |  2007-01-17  |  47.1 KB  |  889 lines

  1. <?xml version="1.0"?>
  2. <!-- $Id: TemplateExpert.xml,v 1.55 2006/04/13 04:50:58 vasanthan Exp $ -->
  3. <expert-list>
  4.     <!-- Network Chemistry - Exported 04/22/04 -->
  5.  
  6.     
  7.     <expert>
  8.         <id>1000</id>
  9.         <enabled>1</enabled>
  10.         <name>Client BSSID Changed</name>
  11.         <severity>1</severity>
  12.         <class>Operational</class>
  13.         <frequency>1</frequency>
  14.         <summary>Mobile user has moved from one AccessPoint to another.</summary>
  15.         <alerttemplate>Mobile user has moved from AccessPoint %m to %m</alerttemplate>
  16.         <detailsurl> <![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/operation-client-bssid-changed.html]]> </detailsurl>
  17.         <description><![CDATA[<p>A client has moved from one AccessPoint to another. If the client has not changed its SSID then a BSSID change indicates that the client has roamed from one AccessPoint to another. This is normal behavior for mobile clients, however excessive BSSID changes can indicate that AccessPoint's signal strength is fluctuating.</p>]]></description>
  18.         <action><![CDATA[<p>
  19.                 If the number of events is reasonable no action is necessary. If a high number of
  20.                 events occur for the same client, consider the following actions:
  21.                 <ul>
  22.                     <li>Verify that the signal strengh of the AccessPoints the client is closest to are not fluctuating excessively.</li>
  23.                     <li>See if a firmware upgrade for the client card is available from the manufacturer.</li>
  24.                 </ul> 
  25.         </p>]]></action>
  26.     </expert>
  27.  
  28.     
  29.     <expert>
  30.         <id>1001</id>
  31.         <enabled>1</enabled>
  32.         <name>Default SSID in Use</name>
  33.         <severity>1</severity>
  34.         <class>Vulnerability</class>
  35.         <frequency>1</frequency>
  36.         <summary>AccessPoint is using the manufacturer's default SSID setting.</summary>
  37.         <alerttemplate>AccessPoint is using a default SSID of '%s'</alerttemplate>
  38.         <description><![CDATA[<p>AccessPoint has not been configured yet. Still uses the factory default SSID settings assigned by the AccessPoint manufacturer. If you have just installed this accesspoint follow the actions below to secure it from hackers. </p>]]></description>
  39.         <detailsurl> <![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/vulnerability-default-ssid-in-use.html]]> </detailsurl>
  40.         <action><![CDATA[<p>Configure all AccessPoints to use SSIDs which are different from the default. Also, confirm that each AccessPoint is not using other default security settings such as administrator password, SNMP settings etc.
  41.         </p>]]></action>
  42.         <clearmsg>AccessPoint's factory default SSID changed.</clearmsg>
  43.     </expert>
  44.  
  45.     
  46.     <expert>
  47.         <id>1002</id>
  48.         <enabled>1</enabled>
  49.         <name>AirJack Detected</name>
  50.         <severity>2</severity>
  51.         <class>Intrusion</class>
  52.         <frequency>1</frequency>
  53.         <summary>An attacker is running the AirJack tools.</summary>
  54.         <alerttemplate></alerttemplate>
  55.         <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/intrusion-airjack.html]]> </detailsurl>
  56.         <description><![CDATA[<p>AirJack is running in one of your user machines. AirJack is a free linux-based device driver API for 802.11 cards that enables raw frame injection (fake packets) into WLANs.  These fake packets can be used for number of intrusion and denial-of-service attacks. Presence of AirJack in your network indicates that a serious attack on your Wireless network is underway. </p>]]></description>
  57.         <action><![CDATA[<p>Locate the computer running AirJack and disable AirJack tool.
  58.         </p>]]></action>
  59.     </expert>
  60.  
  61.     
  62.     <expert>
  63.         <id>1003</id>
  64.         <enabled>1</enabled>
  65.         <name>Wellenreiter Detected</name>
  66.         <severity>1</severity>
  67.         <class>Reconnaissance</class>
  68.         <frequency>1</frequency>
  69.         <summary>Wellenreiter tool is running in the network.</summary>
  70.         <alerttemplate></alerttemplate>
  71.         <description><![CDATA[<p>
  72.                 <a href="http://www.wellenreiter.net/" target="_blank">Wellenreiter</a> is a 802.11 
  73.                 network discovery tool (like NetStumbler). In general, such WLAN discovery tools are used by attackers to identify potential targets for attack.</p>]]></description>
  74.         <action><![CDATA[<p>
  75.                 Locate the computer running Wellenreiter.
  76.         </p>]]></action>
  77.     </expert>
  78.  
  79.     
  80.     <expert>
  81.         <id>1005</id>
  82.         <enabled>1</enabled>
  83.         <name>AccessPoint Channel Changed</name>
  84.         <severity>1</severity>
  85.         <class>Intrusion</class>
  86.         <frequency>1</frequency>
  87.         <summary>The channel used by an AccessPoint has been changed.</summary>
  88.         <alerttemplate>AccessPoint's channel changed from %d to %d</alerttemplate>
  89.         <description><![CDATA[<p>In normal operation AccessPoints should not change their channel. This alert indicates that either the AccessPoint was reconfigured to use a different channel or an attacker is using MAC address spoofing to masquerade as a legitimate AccessPoint. </p>]]></description>
  90.         <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/intrusion-ap-channel-changed.html]]> </detailsurl>
  91.  
  92.         <action><![CDATA[<p>Determine if the channel change is legitimate. If not, check the configuration of the AccessPoint to see if an attacker has changed the AccessPoint configuration.
  93.         </p>]]></action>
  94.     </expert>
  95.  
  96.     
  97.     <expert>
  98.         <id>1008</id>
  99.         <enabled>1</enabled>
  100.         <name>Rogue Ad-hoc Client Detected</name>
  101.         <severity>2</severity>
  102.         <class>Intrusion</class>
  103.         <frequency>1</frequency>
  104.         <summary>An unauthorized ad-hoc client has been discovered in the network.</summary>
  105.         <alerttemplate></alerttemplate>
  106.         <description><![CDATA[<p>A rogue ad-hoc client is one which is not listed in the authorized mobile clients list. This could be an attacker trying to access your network or a legitimate adhoc client whose MAC is not updated in the authorized MAC list.
  107.         </p>]]></description>
  108.         <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/intrusion-rogue-adhoc-client.html ]]> </detailsurl>
  109.  
  110.         <action><![CDATA[<p>If the client is legitimate, add it to the authorized MAC list.
  111.         </p>]]></action>
  112.     </expert>
  113.  
  114.     
  115.     <expert>
  116.         <id>1010</id>
  117.         <enabled>1</enabled>
  118.         <name>AccessPoint Broadcasting SSID</name>
  119.         <severity>1</severity>
  120.         <class>Vulnerability</class>
  121.         <frequency>1</frequency>
  122.         <summary>AccessPoint is broadcasting its SSID in beacon packets.</summary>
  123.         <alerttemplate>AccessPoint is broadcasting its SSID of '%s'</alerttemplate>
  124.         <description><![CDATA[<p>Broadcasting the SSID makes it possible for network discovery tools such as NetStumbler to scan the wireless network and gain knowledge on your SSIDs. Attackers can then set the SSIDs on their clients and connect to your AccessPoints. 
  125.         </p>]]></description>
  126.         <action><![CDATA[<p>Reconfigure the AccessPoint not to broadcast the SSID. Also configure the AccessPoint not to 
  127.                 respond to the "any" SSID.
  128.         </p>]]></action>
  129.         <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/vulnerability-ap-broadcasting-ssid.html]]></detailsurl>
  130.         <clearmsg>AccessPoint configured not to broadcast SSID.</clearmsg>
  131.     </expert>
  132.  
  133.     
  134.     <expert>
  135.         <id>1011</id>
  136.         <enabled>1</enabled>
  137.         <name>AccessPoint Reported a Problem to a Client</name>
  138.         <severity>2</severity>
  139.         <class>Operational</class>
  140.         <frequency>0</frequency>
  141.         <summary>An AccessPoint notified a client that there was a problem with something the client tried to do.</summary>
  142.         <alerttemplate>AccessPoint %m notified the client that %s</alerttemplate>
  143.         <description><![CDATA[<p>This alert can indicate a wide range of operational issues. Look at the message which accompanied the alert to see what the particular problem was.
  144.         </p>]]></description>
  145.  
  146.     </expert>
  147.  
  148.     
  149.     <expert>
  150.         <id>1012</id>
  151.         <enabled>1</enabled>
  152.         <name>Ad-hoc Network Operating</name>
  153.         <severity>2</severity>
  154.         <class>Vulnerability</class>
  155.         <frequency>1</frequency>
  156.         <summary>An ad-hoc network is operating.</summary>
  157.         <alerttemplate></alerttemplate>
  158.         <description><![CDATA[<p>Wireless enabled client devices can share data amongst themselves, without requiring an AccessPoint. These isolated networks are called ad-hoc networks. Ad-hoc networks cannot use enterprise security solutions such as authentication and data encryption, and are difficult to secure.</p>]]></description>
  159.         <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/vulnerability-adhoc-network-operating.html]]></detailsurl>
  160.         <action><![CDATA[<p>Locate the PC involved or change your SSID so that it does not conflict with an already running ad-hoc network.
  161.         </p>]]></action>
  162.     </expert>
  163.  
  164.     
  165.     <expert>
  166.         <id>1013</id>
  167.         <enabled>1</enabled>
  168.         <name>AccessPoint With WEP Disabled</name>
  169.         <severity>2</severity>
  170.         <class>Vulnerability</class>
  171.         <frequency>1</frequency>
  172.         <summary>AccessPoint is not using WEP encryption.</summary>
  173.         <alerttemplate></alerttemplate>
  174.         <description><![CDATA[<p>When an AccessPoint does not use WEP (or other WLAN layer 2 encryption methods) a client can sniff unencrypted traffic (a.k.a. "packet capture") with special software known as "sniffers".  These packets can then be reassembled to produce the original message. </p>]]></description>
  175.         <action><![CDATA[<p>Reconfigure the AccessPoint to use WEP or other method of encryption.  To provide maximum security for your clients use a Layer-7 application based encryption method such as a VPN.
  176.         </p>]]></action>
  177.         <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/vulnerability-ap-with-wep-disabled.html]]></detailsurl>
  178.         <clearmsg>AccessPoint WEP Enabled.</clearmsg>
  179.     </expert>
  180.  
  181.     
  182.     <expert>
  183.         <id>1014</id>
  184.         <enabled>1</enabled>
  185.         <name>Weak WEP IV used</name>
  186.         <severity>2</severity>
  187.         <class>Vulnerability</class>
  188.         <frequency>1</frequency>
  189.         <summary>Usage of weak WEP IV detected in your WLAN.</summary>
  190.         <alerttemplate></alerttemplate>
  191.         <description><![CDATA[<p>Weak IVs reveal more information about the WEP keys than the strong ones. If an attacker gathers thousands of weak IVs he would be able to crack the WEP key easily within minutes and will be able to launch multiple attacks using the cracked WEP key. </p>]]></description>
  192.         <action><![CDATA[<p>Many manufacturers provide firmware upgrades which can reduce the number of weak IVs generated. Check that your AccessPoints and clients are using the latest firmware. Alternatively, you can try using the TKIP (Temporal Key Integrity Protocol) encryption mechanism, which is now supported by most enterprise level wireless equipments. TKIP enabled devices are not subject to any such WEP related vulnerabilities.
  193.         </p>]]></action>
  194.         <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/vulnerability-weak-wep-iv-used.html]]></detailsurl>
  195.     </expert>
  196.  
  197.     
  198.     <expert>
  199.         <id>1015</id>
  200.         <enabled>0</enabled>
  201.         <name>Station with Excess Retransmissions.</name>
  202.         <severity>1</severity>
  203.         <class>Operational</class>
  204.         <frequency>1</frequency>
  205.         <summary>A station is retransmitting too many packets.</summary>
  206.         <alerttemplate>Station is generating too many retry packets (%f%% of packets)</alerttemplate>
  207.         <description><![CDATA[<p>
  208.                 Retransmissions are caused when the packet is not received due to errors. Errors can be caused by:
  209.                 <ul>
  210.                     <li>Client is too far from AccessPoint.</li>
  211.                     <li>Excessive RF noise.</li>
  212.                     <li>Active RF jamming.</li>
  213.                 </ul>
  214.         </p>]]></description>
  215.         <action><![CDATA[<p>
  216.                 Ensure that AP coverage is adequate.
  217.         </p>]]></action>
  218.     </expert>
  219.  
  220.     
  221.     <expert>
  222.         <id>1017</id>
  223.         <enabled>1</enabled>
  224.         <name>Random MAC Address Detected</name>
  225.         <severity>2</severity>
  226.         <class>Intrusion</class>
  227.         <frequency>1</frequency>
  228.         <summary>A station is using a random address.</summary>
  229.         <alerttemplate></alerttemplate>
  230.         <description><![CDATA[<p>The MAC address being used by a station does not belong to a known vendor. This is good indication that the MAC address has been randomly generated. Randomly generated addresses are used by some hacking tools such as Wellenreiter.</p>]]></description>
  231.         <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/intrusion-random-mac-address.html]]> </detailsurl>
  232.         <action><![CDATA[<p>Locate and remove the client from the network if it is found to be launching attacks.
  233.         </p>]]></action>
  234.     </expert>
  235.  
  236.     
  237.     <expert>
  238.         <id>1018</id>
  239.         <enabled>1</enabled>
  240.         <name>Authentication Failure Attack</name>
  241.         <severity>2</severity>
  242.         <class>Denial of Service</class>
  243.         <frequency>1</frequency>
  244.         <summary>Authentication Failure Attack Detected.</summary>
  245.         <alerttemplate></alerttemplate>
  246.         <description><![CDATA[<p>Using fata-jack tool someone is trying to launch an authentication-failure attack on your WLAN. Your authorized mobile users would get disconnected automatically if this attack were successful.]]></description>
  247.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-auth-failure.html]]> </detailsurl>
  248.             <action><![CDATA[<p>Locate the client running Fata-Jack tool.
  249.             </p>]]></action>
  250.     </expert>
  251.  
  252.     
  253.     <expert>
  254.             <id>1019</id>
  255.             <enabled>1</enabled>
  256.             <name>Spoofed MAC Address</name>
  257.             <severity>2</severity>
  258.             <class>Intrusion</class>
  259.             <frequency>1</frequency>
  260.             <summary>A spoofed MAC address has been detected using sequence number tracking.</summary>
  261.             <alerttemplate>A station MAC address has been spoofed (sequence number jump to %d detected).</alerttemplate>
  262.             <description><![CDATA[<p>A station or AccessPoint should never have a need to change their MAC address, therefore a spoofed MAC address is good evidence that there is suspicious activity on the wireless LAN.
  263.                 </p>
  264.                 <p>By analyzing the sequence number in 802.11 management frames we can collaborate on when an anamoly had been detected and MAC address spoofing has occured within the perimeter. </p>]]></description>
  265.             <action><![CDATA[<p>If you are using MAC-based authentication for your AccessPoint you should consider another method.  A MAC address can easily be spoofed using ifconfig (Linux) or registry settings (Windows).  Other types of detectable attacks such as ARP cache poisoning are possible with MAC address spoofing.
  266.             </p>]]></action>
  267.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/intrusion-spoofed-mac-address.html]]></detailsurl>
  268.         </expert>
  269.  
  270.         
  271.         <expert>
  272.             <id>1020</id>
  273.             <enabled>1</enabled>
  274.             <name>Deauthentication Flood Attack</name>
  275.             <severity>2</severity>
  276.             <class>Denial of Service</class>
  277.             <frequency>1</frequency>
  278.             <summary>A station is sending too many deauthentication packets.</summary>
  279.             <alerttemplate>Excessive deauthentication packets are being sent by %m (%d packets).</alerttemplate>
  280.             <description><![CDATA[<p>Using WLAN jack, void11 tools someone is trying to launch a de-authentication flood attack on your WLAN. Your authenticated mobile clients would get disconnected automatically if this attack were successful.</p>]]></description>
  281.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-deauth-flood.html]]> </detailsurl>
  282.             <action><![CDATA[<p>
  283.                     Locate the client running the void11 tool.
  284.             </p>]]></action>
  285.         </expert>
  286.  
  287.         
  288.         <expert>
  289.             <id>1021</id>
  290.             <enabled>1</enabled>
  291.             <name>New AccessPoint Discovered</name>
  292.             <severity>0</severity>
  293.             <class>Informational</class>
  294.             <frequency>1</frequency>
  295.             <summary>A new AccessPoint is discovered.</summary>
  296.             <alerttemplate></alerttemplate>
  297.             <description><![CDATA[<p>A new AccessPoint is discovered. It could be an authorized AccessPoint that you have just installed, or it could be an AccessPoint from neighboring premises beaming its signals into your WLAN, or it could be a rogue AccessPoint.
  298.             </p>]]></description>
  299.             <action><![CDATA[<p>If this AccessPoint is legitimate, mark it as trusted. If this is a neighboring AccessPoint, mark it as friendly. If this is a rogue AccessPoint mark it as rogue and block it from the network using the 'Block Switch Port' option.
  300.             </p>]]></action>
  301.         </expert>
  302.  
  303.         
  304.         <expert>
  305.             <id>1022</id>
  306.             <enabled>1</enabled>
  307.             <name>New Client Discovered</name>
  308.             <severity>0</severity>
  309.             <class>Informational</class>
  310.             <frequency>1</frequency>
  311.             <summary>A new client is discovered.</summary>
  312.             <alerttemplate></alerttemplate>
  313.             <description><![CDATA[<p>A new client is discovered. It could be one of your authorized mobile users, or it could be an attacker trying to associate with your WLAN.
  314.             </p>]]></description>
  315.             <action><![CDATA[<p>If this client is legitimate, mark it as 'trusted'. If it is a rogue client, mark it as 'rogue'.
  316.             </p>]]></action>
  317.         </expert>
  318.  
  319.         
  320.         <expert>
  321.             <id>1023</id>
  322.             <enabled>1</enabled>
  323.             <name>New Adhoc Client Discovered.</name>
  324.             <severity>0</severity>
  325.             <class>Informational</class>
  326.             <frequency>1</frequency>
  327.             <summary>A new adhoc client is discovered.</summary>
  328.             <alerttemplate></alerttemplate>
  329.             <description><![CDATA[<p>A new client operating in adhoc mode is discovered. Clients operating in adhoc mode are vulnerable to attacks as they don't use encryption and authentication. If these clients are also connected to the wired network they can open up the entire wired network to an attacker.
  330.             </p>]]></description>
  331.             <action><![CDATA[<p>If your organization doesnot encourage adhoc clients, locate the client and shut it down.
  332.             </p>]]></action>
  333.         </expert>
  334.  
  335.         
  336.         <expert>
  337.             <id>1024</id>
  338.             <enabled>1</enabled>
  339.             <name>AccessPoint Restarted</name>
  340.             <severity>1</severity>
  341.             <class>Operational</class>
  342.             <frequency>1</frequency>
  343.             <summary>An AccessPoint was restarted (or crashed).</summary>
  344.             <alerttemplate></alerttemplate>
  345.             <description><![CDATA[<p>This alert may mean one of several things:</p>
  346.                 <ul>
  347.                     <li>The AccessPoint has malfunctioned and reset itself.</li>
  348.                     <li>An attacker has caused the AccessPoint to crash in anticipation of staging an attack.</li>
  349.                     <li>Some AccessPoints periodically change mode and this alert may be a consequence of the AccessPoint switching from one mode to another. </li>
  350.             </ul>]]></description>
  351.             <action><![CDATA[<p>Update the status of the AccessPoint (or ping) to check that the AccessPoint is running normally.
  352.             </p>]]></action>
  353.         </expert>
  354.  
  355.         
  356.         <expert>
  357.             <id>1025</id>
  358.             <enabled>1</enabled>
  359.             <name>ASLEAP Attack Detected</name>
  360.             <severity>2</severity>
  361.             <class>Intrusion</class>
  362.             <frequency>1</frequency>
  363.             <summary>An ASLEAP attack was detected.</summary>
  364.             <alerttemplate></alerttemplate>
  365.             <description><![CDATA[<p>This is more likely to be a real attack if the MAC address spoofing alert has also been recently raised for the same AccessPoint.
  366.                 </p>
  367.                 <p>
  368.                     <a href="http://asleap.sourceforge.net/" target="_blank">ASLEAP</a> is a tool written by Joshua Wright to exploit a weekness in the Cisco proprietary LEAP protocol.  LEAP uses a modified MS-CHAPv2 exchange to authenticate users which is vulnerable to dictionary and brute force attacks.</p>]]></description>
  369.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/intrusion-asleap.html]]></detailsurl>
  370.             <action><![CDATA[<p>This exploit is dangerous if you are running a Cisco AccessPoint.  A security advisory from Cisco is <a href="http://www.cisco.com/warp/public/707/cisco-sn-20030802-leap.shtml" target="_blank">available</a>.
  371.                 </p>
  372.                 <p>
  373.                     According to Cisco, admins should migrate to another EAP type like EAP-FAST (Fast Authentication via Secure Tunneling), PEAP (Protected Extensible Authentication Protocol) or EAP-TLS (Transport Layer Security) whose authentication methods are not susceptible to dictionary attacks.
  374.             </p>]]></action>
  375.         </expert>
  376.  
  377.         
  378.         <expert>
  379.             <id>1026</id>
  380.             <enabled>1</enabled>
  381.             <name>AccessPoint Overloaded</name>
  382.             <severity>2</severity>
  383.             <class>Denial of Service</class>
  384.             <frequency>1</frequency>
  385.             <summary>AccessPoint is overloaded and unable to accept new clients.</summary>
  386.             <alerttemplate></alerttemplate>
  387.             <description><![CDATA[<p>AccessPoint has refused a new client which attempted to associate with it.
  388.                     This could be due to heavy load from legitimate clients, or it could be due to denial of service attack. Some forms of denial of service attacks will create many fake associations so that legitimate clients can no longer use the AccessPoint. </p>]]></description>
  389.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-ap-overloaded.html]]></detailsurl>
  390.             <action><![CDATA[<p>If this alert is raised during normal operation, confirm that the AccessPoint is configured to accept more than the number of clients trying to use it, or consider deploying more AccessPoints.
  391.             </p>]]></action>
  392.         </expert>
  393.  
  394.         
  395.         <expert>
  396.             <id>1027</id>
  397.             <enabled>1</enabled>
  398.             <name>Client Rate Support Mismatch</name>
  399.             <severity>1</severity>
  400.             <class>Operational</class>
  401.             <frequency>1</frequency>
  402.             <summary>There is a mistmatch in the rates supported by the client and the AccessPoint.</summary>
  403.             <alerttemplate></alerttemplate>
  404.             <description><![CDATA[<p>The AccessPoint configuration does not match with what the client station can handle. Either the AccessPoint configuration is incorrect or it is a rogue AccessPoint.
  405.             </p>]]></description>
  406.             <action><![CDATA[<p>Configure the AccessPoint if it is a legitimate one or locate the rogue AccessPoint.
  407.             </p>]]></action>
  408.         </expert>
  409.  
  410.         
  411.         <expert>
  412.             <id>1028</id>
  413.             <enabled>1</enabled>
  414.             <name>Client is Sending Spurious Traffic</name>
  415.             <severity>1</severity>
  416.             <class>Intrusion</class>
  417.             <frequency>1</frequency>
  418.             <summary>The client is sending traffic without having an association with an AccessPoint.</summary>
  419.             <alerttemplate></alerttemplate>
  420.             <description><![CDATA[<p>Someone may be injecting forged 802.11 packets if they have not attempted an association with the AccessPoint.  This anomaly would show that a client station has not acted in accordance with normal authentication procedures and is most likely a rogue client.
  421.             </p>]]></description>
  422.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/intrusion-client-sending-spurious-traffic.html]]></detailsurl>
  423.             <action><![CDATA[<p>
  424.                     Check your clients and upgrade to the latest firmware if possible.  Otherwise locate the rogue client.
  425.             </p>]]></action>
  426.         </expert>
  427.  
  428.         
  429.         <expert>
  430.             <id>1029</id>
  431.             <enabled>1</enabled>
  432.             <name>Disassociation Flood Attack</name>
  433.             <severity>2</severity>
  434.             <class>Denial of Service</class>
  435.             <frequency>1</frequency>
  436.             <summary>Device is sending too many disassociation packets.</summary>
  437.             <alerttemplate>Excessive disassociation packets are being sent by %m (%d packets).</alerttemplate>
  438.             <description><![CDATA[<p>Someone is sending a number of disassociation management frame packets. This could force all your associated clients to be disassociated from the AccessPoint. </p>]]></description>
  439.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-disassociation-flood.html]]></detailsurl>
  440.             <action><![CDATA[<p>Locate the client.</p>]]></action>
  441.         </expert>
  442.  
  443.         
  444.         <expert>
  445.             <id>1030</id>
  446.             <enabled>1</enabled>
  447.             <name>Association Flood Attack</name>
  448.             <severity>2</severity>
  449.             <class>Denial of Service</class>
  450.             <frequency>1</frequency>
  451.             <summary>Device is sending too many association packets.</summary>
  452.             <alerttemplate>Excessive association packets are being sent by %m (%d packets).</alerttemplate>
  453.             <description><![CDATA[<p>Someone is sending a number of association packets. This might be an attempt to fill up the AccessPoint client association table and thus make the AccessPoint deny association for new legitimate clients. </p>]]></description>
  454.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-association-flood.html]]></detailsurl>
  455.             <action><![CDATA[<p>
  456.                     Locate the client.
  457.             </p>]]></action>
  458.         </expert>
  459.  
  460.         
  461.         <expert>
  462.             <id>1031</id>
  463.             <enabled>1</enabled>
  464.             <name>Authentication Flood Attack</name>
  465.             <severity>2</severity>
  466.             <class>Denial of Service</class>
  467.             <frequency>1</frequency>
  468.             <summary>Device is sending too many authentication packets.</summary>
  469.             <alerttemplate>Excessive authentication packets are being sent by %m (%d packets).</alerttemplate>
  470.             <description><![CDATA[<p>Someone is sending number of authentication packets to the AccessPoint. This could be an attack using the void11 tool. If successful, this attack would fill the association table of the AccessPoint with fake clients. This would result in the AccessPoint denying connection to legitimate mobile clients.</p>]]></description>
  471.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-auth-flood.html]]></detailsurl>
  472.             <action><![CDATA[<p>Locate the client.</p>]]></action>
  473.         </expert>
  474.  
  475.         
  476.         <expert>
  477.             <id>1032</id>
  478.             <enabled>1</enabled>
  479.             <name>RF Jamming Attack</name>
  480.             <severity>2</severity>
  481.             <class>Denial of Service</class>
  482.             <frequency>1</frequency>
  483.             <summary>Excessive RF noise level detected.</summary>
  484.             <alerttemplate></alerttemplate>
  485.             <description><![CDATA[<p>A significant abnormal noise level is a good indication that there is a device jamming your legitimate signal. </p>]]></description>
  486.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-rf-jamming.html]]></detailsurl>
  487.             <action><![CDATA[<p>
  488.                     If this event occurs under normal situations you may want to attempt one of the following.
  489.                     <ul>
  490.                         <li>Re-adjusting the position of your AccessPoint.</li>
  491.                         <li>Perform a signal audit for possible interference from other devices.</li>
  492.                         <li>Recycle your AccessPoint or upgrade your firmware to the latest version.</li>
  493.                     </ul>
  494.             </p>]]></action>
  495.             <expressiontype>1</expressiontype>
  496.             <expression><![CDATA[InfoStation.AverageNoise != 0 && InfoStation.AverageNoise > -50]]></expression>
  497.         </expert>
  498.  
  499.         
  500.         <expert>
  501.             <id>1033</id>
  502.             <enabled>1</enabled>
  503.             <name>EAPoL Start Storm</name>
  504.             <severity>2</severity>
  505.             <class>Denial of Service</class>
  506.             <frequency>1</frequency>
  507.             <summary>Device is sending too many EAPoL start packets.</summary>
  508.             <alerttemplate>Excessive EAPoL Start packets are being sent by %m (%d packets).</alerttemplate>
  509.             <description><![CDATA[<p>Someone is sending number of EAPOL-Start packets. EAPOL-Start is the first step in EAP based authentication process. Normally AccessPoint would respond to EAPOL-start requests with EAP-Identity-Request and some internal resource allocation. When the number of requests increase, the AccessPoint resources exhaust resulting in denial of service to real mobile clients. </p>]]></description>
  510.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-eapol-start.html]]></detailsurl>
  511.             <action><![CDATA[<p>If you are using EAPoL for authentication, check to make sure all your clients are up to date with the latest client software. Locate the PC which is causing this alert as excessive EAPoL Start commands can deny other clients service.
  512.             </p>]]></action>
  513.         </expert>
  514.  
  515.         
  516.         <expert>
  517.             <id>1034</id>
  518.             <enabled>1</enabled>
  519.             <name>EAPoL Logoff Storm</name>
  520.             <severity>2</severity>
  521.             <class>Denial of Service</class>
  522.             <frequency>1</frequency>
  523.             <summary>Device is sending too many EAPoL logoff packets.</summary>
  524.             <alerttemplate>Excessive EAPoL Logoff packets are being sent by %m (%d packets).</alerttemplate>
  525.             <description><![CDATA[<p>Someone is sending numerous EAPOL-Logoff packets. EAPOL-Logoff is the last step in (EAP authentication process) disconnecting client from an AccessPoint. This would force AccessPoint to logoff authenticated users. </p>]]></description>
  526.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-eapol-logoff.html]]></detailsurl>
  527.             <action><![CDATA[<p>If you are using EAPoL for authentication, check to make sure all your clients are up to date with the latest client software. Locate the PC which is causing this alert as excessive EAPoL Logoff commands can deny other clients service.
  528.             </p>]]></action>
  529.         </expert>
  530.  
  531.         
  532.         <expert>
  533.             <id>1035</id>
  534.             <enabled>1</enabled>
  535.             <name>Adhoc node using AccessPoint SSID</name>
  536.             <severity>2</severity>
  537.             <class>Intrusion</class>
  538.             <frequency>1</frequency>
  539.             <summary>Adhoc client is using the same SSID as an AccessPoint.</summary>
  540.             <alerttemplate>Adhoc client is using the same SSID (%s) as an AccessPoint %m.</alerttemplate>
  541.             <description><![CDATA[<p>Malicious users could create bad associations by using the same SSID as an AccessPoint, fooling the client into thinking the connection is made with the legitimate AccessPoint. It is also common for inexperienced users to accidentally create their connections as "Ad-hoc" instead of "Managed".</p>]]></description>
  542.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/intrusion-adhoc-node-using-ap-ssid.html]]></detailsurl>
  543.             <action><![CDATA[<p>Locate the Adhoc client with the AccessPoint SSID.
  544.             </p>]]></action>
  545.         </expert>
  546.  
  547.         
  548.         <expert>
  549.             <id>1036</id>
  550.             <enabled>1</enabled>
  551.             <name>Channel With Too Many AccessPoints</name>
  552.             <severity>1</severity>
  553.             <class>Operational</class>
  554.             <frequency>1</frequency>
  555.             <summary>There are too many AccessPoints operating on the same channel.</summary>
  556.             <alerttemplate>There are %d AccessPoints operating on channel %d within proximity of each other.</alerttemplate>
  557.             <description><![CDATA[<p>Many AccessPoints operating on the same channel within proximity of each other. This may lead to degraded performance due to bandwidth sharing and increased packet corruption. </p>]]></description>
  558.             <action><![CDATA[<p>Adjacent AccessPoints should use different channels.  If these are legitimate AccessPoints, place them on seperate channels for maximum efficiency.  If they are unauthorized AccessPoints, locate them (or their owner) and notify them of the problem.
  559.             </p>]]></action>
  560.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/operation-channel-with-too-many-aps.html]]></detailsurl>
  561.         </expert>
  562.  
  563.         
  564.         <expert>
  565.             <id>1037</id>
  566.             <enabled>1</enabled>
  567.             <name>Authorized Client Connected to Rogue AccessPoint</name>
  568.             <severity>2</severity>
  569.             <class>Vulnerability</class>
  570.             <frequency>1</frequency>
  571.             <summary>An authorized client has associated with an unauthorized AccessPoint or ad-hoc network.</summary>
  572.             <alerttemplate>An authorized client has associated with an unauthorized AccessPoint or ad-hoc network (%m).</alerttemplate>
  573.             <description><![CDATA[<p>Authorized clients should never associate with unauthorized AccessPoints. This alert may be caused by a client associating with a neighbors AccessPoint.</p>]]></description>
  574.             <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/vulnerability-client-associated-to-rogueap.html]]></detailsurl>
  575.             <action><![CDATA[<p>Check to make sure the unauthorized AccessPoint is not legitimate.  Then locate the authorized client station and recheck the configurations.  Locate the unauthorized AccessPoint on the network.
  576.             </p>]]></action>
  577.         </expert>
  578.  
  579.         
  580.         <expert>
  581.             <id>1038</id>
  582.             <enabled>1</enabled>
  583.             <name>Netstumbler Detected</name>
  584.             <severity>1</severity>
  585.             <class>Reconnaissance</class>
  586.             <frequency>1</frequency>
  587.             <summary>Netstumbler detected in the network.</summary>
  588.             <alerttemplate>Netstumbler (version %s) detected running on a client.</alerttemplate>
  589.             <description><![CDATA[<p>
  590.                     <a href="http://www.netstumbler.com" target="_blank">Netstumbler</a> is a popular free tool for discovering open AccessPoints. It is used by wardrivers or hackers to discover wireless networks.
  591.                     <p>]]></description>
  592.                     <action><![CDATA[<p>Netstumbler is normally not an issue if you have turned off SSID broadcasting.  This prevents your AccessPoint from responding to Netstumbler's probe requests. Check to make sure you have SSID broadcasting turned off on your AccessPoint to prevent it from showing up in Netstumbler and other applications.
  593.                     </p>]]></action>
  594.                 </expert>
  595.  
  596.                 
  597.                 <expert>
  598.                     <id>1039</id>
  599.                     <enabled>1</enabled>
  600.                     <name>Duration Attack Detected</name>
  601.                     <severity>2</severity>
  602.                     <class>Denial of Service</class>
  603.                     <frequency>1</frequency>
  604.                     <summary>Device uses an excessive value in the duration field.</summary>
  605.                     <alerttemplate>A wireless device uses an excessive value of %d in the duration field.</alerttemplate>
  606.                     <description><![CDATA[<p>
  607.                             The duration field in an 802.11 packet tells the other stations on the network
  608.                             how long they must wait before transmitting again. If one station uses values which are too large this is a denial of service because it prevents other stations from operating.</p>]]></description>
  609.  
  610.                     <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-duration-attack.html]]></detailsurl>
  611.                     <action><![CDATA[<p>Find the station causing the alert. This alert could also be generated by faulty firmware in the station (though this still means that the station is preventing other stations from using the network).
  612.                     </p>]]></action>
  613.                 </expert>
  614.  
  615.                 
  616.                 <expert>
  617.                     <id>1040</id>
  618.                     <enabled>1</enabled>
  619.                     <name>WDS In Operation/Bridging</name>
  620.                     <severity>0</severity>
  621.                     <class>Informational</class>
  622.                     <frequency>1</frequency>
  623.                     <summary>WDS mode is being used to bridge packets between AccessPoints.</summary>
  624.                     <alerttemplate></alerttemplate>
  625.                     <description><![CDATA[<p>Wireless Distribution System (WDS) is a feature of 802.11 that allows packets to be sent directly between AccessPoints. WDS mode is sometimes called bridging. Under normal situations your AccessPoint may be using WDS if it is acting as a bridge.  However if you are not using bridging and this alert is raised it could be used as a possible "man-in-the-middle" attack on unsuspecting clients.  This may be the case if a previous alert was raised pertaining to other rogue AccessPoints or SSIDs. Beware, this is a typical setup of a laptop using two(2) wireless NICs instead of one(1). One to create the "bridge" to the legitimate AccessPoint and the other to create a rogue AccessPoint for the client.
  626.                     </p>]]></description>
  627.                     <action><![CDATA[<p>Ignore if you are using AccessPoints acting as bridges. If not, check whether any client is operating with two NICs as explained above. If yes, locate and shutdown the client.
  628.                     </p>]]></action>
  629.                 </expert>
  630.  
  631.                 
  632.                 <expert>
  633.                     <id>1041</id>
  634.                     <enabled>1</enabled>
  635.                     <name>AccessPoint Supports Multiple SSIDs</name>
  636.                     <severity>0</severity>
  637.                     <class>Informational</class>
  638.                     <frequency>1</frequency>
  639.                     <summary>The AccessPoint supports more than one SSID.</summary>
  640.                     <alerttemplate>The AccessPoint supports more than one SSID.</alerttemplate>
  641.                     <description><![CDATA[<p>Some AccessPoints can support more than one SSID so that different classes of service
  642.                             can be offered to clients based on the SSID they use.  (also known as "Virtual AccessPoints")
  643.                     </p>]]></description>
  644.                     <action><![CDATA[<p>No action is needed if this is an authorized AccessPoint and all of your SSIDs are accounted for in the alert.  Otherwise you have to locate the rogue AccessPoint.</p>]]></action>
  645.                 </expert>
  646.  
  647.                 
  648.                 <expert>
  649.                     <id>1042</id>
  650.                     <enabled>1</enabled>
  651.                     <name>RF Sensor Down</name>
  652.                     <severity>1</severity>
  653.                     <class>Operational</class>
  654.                     <frequency>1</frequency>
  655.                     <summary>Sensor did not respond to keep-alive request.</summary>
  656.                     <alerttemplate>The Sensor '%s' did not respond to a keep-alive request.</alerttemplate>
  657.                     <description><![CDATA[<p>The server sends keep-alive requests every 30 seconds to verify whether the Sensor is still running. This alert indicates that the Sensor did not respond to a keep-alive request but had been previous operating. This could be due to loss of power to the Sensor, loss of network connectivity or a malfunction on the Sensor. It may also be caused if the Sensor is using DHCP and the address allocated by the DHCP server changes. 
  658.                     </p>]]></description>
  659.                     <action><![CDATA[Check the current status of the Sensor to see if it has resumed operating. If the 
  660.                         Sensor has power and network connectivity verify that the IP address is still valid. The last resort should be to power cycle the Sensor.]]></action>
  661.                 </expert>
  662.  
  663.                 
  664.                 <expert>
  665.                     <id>1043</id>
  666.                     <enabled>1</enabled>
  667.                     <name>Sensor Failed to Start</name>
  668.                     <severity>1</severity>
  669.                     <class>Operational</class>
  670.                     <frequency>1</frequency>
  671.                     <summary>Sensor failed to start.</summary>
  672.                     <alerttemplate>The Sensor '%s' failed to start.</alerttemplate>
  673.                     <description><![CDATA[The Sensor could not be started.]]></description>
  674.                     <action><![CDATA[Verify that the Sensor information, especially the IP address and community string, is correct. If the Sensor has power and network connectivity verify that the IP address is still valid. The last resort should be to power cycle the Sensor.]]></action>
  675.                 </expert>
  676.  
  677.                 
  678.                 <expert>
  679.                     <id>1044</id>
  680.                     <enabled>1</enabled>
  681.                     <name>AccessPoint is Using Hotspot SSID</name>
  682.                     <severity>1</severity>
  683.                     <class>Vulnerability</class>
  684.                     <frequency>1</frequency>
  685.                     <summary>AccessPoint is using an SSID commonly used by hotspots.</summary>
  686.                     <alerttemplate>AccessPoint is using an SSID of '%s' which is commonly used by hotspots.</alerttemplate>
  687.                     <description><![CDATA[<p>Having an SSID that is commonly used in hotspots makes your WLAN more vulnerable to attack. Basic attack on Wireless networks is to try connecting to the WLAN using various default/common SSIDs. </p>]]></description>
  688.                     <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/vulnerability-ap-using-hotspot-ssid.html]]></detailsurl>
  689.                     <action><![CDATA[<p>Reconfigure the AccessPoint to use enterprise specific SSIDs.
  690.                     </p>]]></action>
  691.                 </expert>
  692.  
  693.                 
  694.                 <expert>
  695.                     <id>1045</id>
  696.                     <enabled>1</enabled>
  697.                     <name>Hotspotter Attack Detected</name>
  698.                     <severity>2</severity>
  699.                     <class>Intrusion</class>
  700.                     <frequency>1</frequency>
  701.                     <summary>A Hotspotter attack has been detected.</summary>
  702.                     <alerttemplate>A Hotspotter attack has been detected using the SSID of '%s'.</alerttemplate>
  703.                     <description><![CDATA[<p>Hotspotter is a free open source tool that will passively monitor probe requests from Windows XP clients and compares them to common "hotspot" SSID names. If there is a match with the clients request, the rogue client running the hotspotter tool will act as an AccessPoint with the same SSID. </p>]]></description>
  704.                     <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/intrusion-hotspotter-attack.html]]></detailsurl>
  705.                     <action><![CDATA[<p>Check your client so that they are not listing sensitive SSID information in their Windows XP client profile as Windows will probe all preferred SSID AccessPoints.
  706.                     </p>]]></action>
  707.                 </expert>
  708.  
  709.                 
  710.                 <expert>
  711.                     <id>1046</id>
  712.                     <enabled>1</enabled>
  713.                     <name>Airsnarf Attack Detected</name>
  714.                     <severity>2</severity>
  715.                     <class>Intrusion</class>
  716.                     <frequency>1</frequency>
  717.                     <summary>An Airsnarf attack has been detected.</summary>
  718.                     <alerttemplate></alerttemplate>
  719.                     <description><![CDATA[<p>Airsnarf is a rogue AccessPoint that tries to get username/ passwords by using a fake hotspot portal. 
  720.                     </p>]]></description>
  721.                     <detailsurl><![CDATA[fault/ShowAlarmDetails.do?uri=/webclient/fault/html/intrusion-airsnarf-attack.html]]></detailsurl>
  722.                     <action><![CDATA[<p>Locate the client running AirSnarf.
  723.                     </p>]]></action>
  724.                 </expert>
  725.  
  726.                 
  727.                 <expert>
  728.                     <id>1047</id>
  729.                     <enabled>1</enabled>
  730.                     <name>WEPWedgie Attack Detected</name>
  731.                     <severity>2</severity>
  732.                     <class>Intrusion</class>
  733.                     <frequency>1</frequency>
  734.                     <summary>An WEPWedgie attack has been detected.</summary>
  735.                     <alerttemplate>An WEPWedgie attack has been detected from client %m to AccessPoint %m.</alerttemplate>
  736.                     <description><![CDATA[<p><a href="http://sourceforge.net/projects/wepwedgie/" target="_blank">WEPWedgie</a> is a toolkit for determining 802.11 WEP keystreams and injecting traffic with known keystreams. 
  737.                     </p>]]></description>
  738.                     <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/intrusion-wep-wedgie-attack.html]]></detailsurl>
  739.                     <action><![CDATA[<p>Better encryption techniques, such as WPA or 802.11i, are not vulnerable to WEPWedgie.
  740.                     </p>]]></action>
  741.                 </expert>
  742.  
  743.                 
  744.                 <expert>
  745.                     <id>1048</id>
  746.                     <enabled>0</enabled>
  747.                     <name>Channel with Excessive Errors</name>
  748.                     <severity>1</severity>
  749.                     <class>Operational</class>
  750.                     <frequency>1</frequency>
  751.                     <summary>A channel has too many corrupted packets.</summary>
  752.                     <alerttemplate></alerttemplate>
  753.                     <description><![CDATA[<p>The sensor has detected too many corrupted or illegitimate packets in a channel. This could be due to poor signal and coverage, rogue 802.11 injection, or bad software/firmware</p>]]></description>
  754.                     <action><![CDATA[<p>Check other alerts to see channel related problems getting reported.  
  755.                     </p>]]></action>
  756.                 </expert>
  757.  
  758.                 
  759.                 <expert>
  760.                     <id>1049</id>
  761.                     <enabled>1</enabled>
  762.                     <name>Constant Traffic</name>
  763.                     <severity>1</severity>
  764.                     <class>Intrusion</class>
  765.                     <frequency>1</frequency>
  766.                     <summary>The station is generating constant traffic.</summary>
  767.                     <alerttemplate>The station is generating constant traffic of about %d bytes per second.</alerttemplate>
  768.                     <description><![CDATA[<p>The station is generating a large amount of constant 802.11 data frames.  This could be a problem for other users on the network if there is no load balancing.</p>]]></description>
  769.                     <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/intrusion-constant-traffic.html]]></detailsurl>
  770.                     <action><![CDATA[<p>If this alert occurs under normal circumstances you should consider load balancing with multiple AccessPoints.  Otherwise, this could be a sign of malicious activity. 
  771.                     </p>]]></action>
  772.                 </expert>
  773.  
  774.                 
  775.                 <expert>
  776.                     <id>3001</id>
  777.                     <enabled>1</enabled>
  778.                     <name>AccessPoint Low Signal Strength</name>
  779.                     <severity>1</severity>
  780.                     <class>Operational</class>
  781.                     <frequency>1</frequency>
  782.                     <summary>The AccessPoint has a low signal strength, as measured by the nearest Sensor.</summary>
  783.                     <alerttemplate></alerttemplate>
  784.                     <description><![CDATA[<p>
  785.                             A sensor has reported a low signal coming from an authorized AccessPoint.  This is a good indication of interference on the AccessPoints channel either legitimately (microwave, cordless phone, etc) or illegitimately (RF jamming).
  786.                     </p>]]></description>
  787.                     <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/operation-ap-low-signal-strength.html]]></detailsurl>
  788.                     <action><![CDATA[<p>Review the location of your AccessPoint or sensor to make sure it is situated in an area giving you maximum coverage.  Perform a quick site survey to determine what may or may not be causing the low signal.  
  789.                     </p>]]></action>
  790.                     <expressiontype>1</expressiontype>
  791.                     <expression><![CDATA[Station.Type == TYPE_AP && Station.Rogue == ROGUE_AUTHORIZED && InfoStation.AverageSignal < -70]]></expression>
  792.                 </expert>
  793.  
  794.                 
  795.                 <expert>
  796.                     <id>3002</id>
  797.                     <enabled>1</enabled>
  798.                     <name>Broadcast Disassociation Packet</name>
  799.                     <severity>1</severity>
  800.                     <class>Denial of Service</class>
  801.                     <frequency>1</frequency>
  802.                     <summary>Device sent a broadcast disassociation packet.</summary>
  803.                     <alerttemplate></alerttemplate>
  804.                     <description><![CDATA[<p>Someone is sending disassociation packet to the broadcast address (all clients). This would force all associated clients to disassociate. </p>]]></description>
  805.                     <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-disassociation-broadcast.html]]></detailsurl>
  806.                     <action><![CDATA[<p>Locate the client sending the broadcast packet.
  807.                     </p>]]></action>
  808.                     <expressiontype>2</expressiontype>
  809.                     <expression><![CDATA[InfoWireless.RxAddress == FF:FF:FF:FF:FF:FF && InfoWireless.FrameType == FRAME_DISSOC]]></expression>
  810.                 </expert>
  811.  
  812.                 
  813.                 <expert>
  814.                     <id>3003</id>
  815.                     <enabled>1</enabled>
  816.                     <name>Broadcast Deauthentication Packet</name>
  817.                     <severity>1</severity>
  818.                     <class>Denial of Service</class>
  819.                     <frequency>1</frequency>
  820.                     <summary>A client transmitted a deauthentication packet to the broadcast address.</summary>
  821.                     <alerttemplate></alerttemplate>
  822.                     <description><![CDATA[<p>Someone is sending deauthentication packets to the broadcast address (all clients). This would force all authenticated users to get deauthenticated. </p>]]></description>
  823.                     <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-deauth-broadcast.html]]></detailsurl>
  824.                     <action><![CDATA[<p>Locate the client sending the broadcast packet.</p>]]></action>
  825.                     <expressiontype>2</expressiontype>
  826.                     <expression><![CDATA[InfoWireless.RxAddress == FF:FF:FF:FF:FF:FF && InfoWireless.FrameType == FRAME_DEAUTH]]></expression>
  827.                 </expert>
  828.  
  829.                 
  830.                 <expert>
  831.                     <id>3004</id>
  832.                     <enabled>1</enabled>
  833.                     <name>Improper Broadcast Packet</name>
  834.                     <severity>1</severity>
  835.                     <class>Denial of Service</class>
  836.                     <frequency>1</frequency>
  837.                     <summary>A client transmitted a non-broadcast packet to the broadcast address.</summary>
  838.                     <alerttemplate></alerttemplate>
  839.                     <description><![CDATA[<p>Someone could be injecting malicious packets onto the network (either actively or passively).</p>]]></description>
  840.                     <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/denial-improper-broadcast.html]]></detailsurl>
  841.                     <action><![CDATA[<p>
  842.                             Locate the client sending the broadcast packets.
  843.                     </p>]]></action>
  844.                     <expressiontype>2</expressiontype>
  845.                     <expression><![CDATA[InfoWireless.RxAddress == FF:FF:FF:FF:FF:FF && (InfoWireless.FrameType == FRAME_RTS ||InfoWireless.FrameType == FRAME_CTS || InfoWireless.FrameType == FRAME_PROBERESP || InfoWireless.FrameType == FRAME_ASSOCREQ || InfoWireless.FrameType == FRAME_ASSOCRESP || InfoWireless.FrameType == FRAME_REASSOCREQ || InfoWireless.FrameType == FRAME_REASSOCRESP || InfoWireless.FrameType == FRAME_AUTH)]]></expression>
  846.                 </expert>
  847.  
  848.                 
  849.                 <expert>
  850.                     <id>3005</id>
  851.                     <enabled>1</enabled>
  852.                     <name>Turbocell In Use</name>
  853.                     <severity>0</severity>
  854.                     <class>Informational</class>
  855.                     <frequency>1</frequency>
  856.                     <summary>Karlnet Turbocell is in use on the network.</summary>
  857.                     <alerttemplate></alerttemplate>
  858.                     <description><![CDATA[<p><a href="http://www.karlnet.com/products/software/wl_TurboCell.html" target="_blank">TurboCell</a> is a proprietary broadband wireless protocol used in Point-To-Multi-Point environments that makes use of existing 802.11 radio technology.
  859.                     </p>]]></description>
  860.                     <action><![CDATA[<p>
  861.                             No action is needed if you are using a Karlnet AccessPoint.  Otherwise locate the client.
  862.                     </p>]]></action>
  863.                     <expressiontype>2</expressiontype>
  864.                     <expression><![CDATA[InfoWireless.RxAddress == 01:00:00:00:20:F6]]></expression>
  865.                 </expert>
  866.  
  867.                 
  868.                 <expert>
  869.                     <id>3007</id>
  870.                     <enabled>1</enabled>
  871.                     <name>Unencrypted NetBIOS Traffic Detected</name>
  872.                     <severity>1</severity>
  873.                     <class>Vulnerability</class>
  874.                     <frequency>1</frequency>
  875.                     <summary>Unencrypted NetBIOS traffic was detected.</summary>
  876.                     <alerttemplate></alerttemplate>
  877.                     <description><![CDATA[<p>Unencrypted NetBIOS (Network Basic Input/Output System) traffic was detected.  Some common and popular applications of this include Microsoft File and Printer sharing and Samba. </p>]]></description>
  878.                     <action><![CDATA[<p>
  879.                             Turn off File and Printer sharing or use encryption (WEP or VPN) on the network to protect data.
  880.                     </p>]]></action>
  881.                     <detailsurl><![CDATA[/fault/ShowAlarmDetails.do?uri=/webclient/fault/html/vulnerability-netbios-traffic-detected.html]]></detailsurl>
  882.                     <expressiontype>3</expressiontype>
  883.                     <expression><![CDATA[(InfoNetwork.Protocol == PROTO_UDP && (InfoNetwork.DestPort == 137 || InfoNetwork.DestPort == 138)) || (InfoNetwork.Protocol == PROTO_TCP && InfoNetwork.DestPort == 139)]]></expression>
  884.                 </expert>
  885.  
  886.  
  887.             </expert-list>
  888.  
  889.