Department of Defense Directive 8100.2 Compliance

advertisement
Department of Defense Directive 8100.2 Compliance Report
Designated Official:
Time Period: 17:39:09 Monday, July 30, 2007
What is the DoD Directive Number 8100.2?
The Department of Defense (DoD) Directive Number 8100.2 (the Directive hereafter) stipulates the key policy
sections regarding the use of commercial wireless devices, services, and technologies in the DoD. Its purpose is
to safeguard the DoD networks from the security vulnerabilities inherent with wireless networks, making
security a prerequisite for the deployment and use of commercial wireless technologies in the DoD.
Why is the Directive so important?
Wireless networks are more vulnerable to external attacks than wired ones. This is especially true for the 802.11
network. Radio signals extend beyond the boundaries of buildings, leaving the network wide open to hackers; as
a shared network, a loophole in any part of the network can expose the entire WLAN to external attacks; and
with the rapid adoption of the 802.11 network comes an ever-increasing number of sophisticated tools that
hackers use to break the encryption and authentication techniques used for network access. Therefore, the DoD
Directive Number 8100.2 is a step in the right direction for safeguarding DoD wireless networks.
What is the scope of the Directive?
The Directive is geared towards securing all commercial wireless devices, services, and technologies for
non-classified information, be it data or voice. It explicitly prohibits the use of wireless devices for transmission,
storage, or processing of classified information. The commercial wireless devices include wireless-enabled
computer systems, PDAs, mobile phones, handheld scanners, 802.11 wireless networks, etc.
To whom does the Directive apply?
The Directive applies to personnel in all DoD organizations, including DoD contractors, visitors of DoD
facilities, and anyone who has access to DoD information.
How will the Directive affect 802.11 networks?
Many of the policies spelled out in the Directive are applicable to the 802.11 wireless technologies used in DoD
entities. The key policy sections that are relevant to the 802.11 networks include the implementation and
enforcement of no 802.11 use in designated areas deemed too risky for the use of wireless technologies;
requirement of strong authentication and encryption for network access; mitigation of denial of service and other
disruptive attacks; implementation of mechanisms to assess the risks and vulnerabilities associated with 802.11
networks and devices; development of defensive measures to detect, deter, and defeat unauthorized 802.11
activities; integration of intrusion detection methodologies with 802.11 wireless network systems; sharing of
802.11 knowledge, such as historical forensics, to improve overall security processes, etc..
AirMagnet DoD Compliance Reports
Policies will be useless without an effective mechanism to monitor and enforce their compliance. AirMagnet
automates the monitoring of your wireless networks and devices in compliance with the Directive. The
compliance reports integrate the Directive with AirMagnet’s advanced IDS/IPS system to provide superior
protection for all wireless networks and devices. The reports refer to specific policy sections of the Directive
and show the status of compliance of your WLAN. The integrated AirMagnet IDS/IPS algorithms pinpoint the
exact cause of violations and provide expert advice as well as automated actions to mitigate and/or resolve the
problems behind policy violations.
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
AirMagnet Disclaimer
AirMagnet System Level and Device Level Compliance Reports provide information to assist its customers in
determining whether they are in compliance with various standards, laws and regulations applicable to wireless
networks and devices operating in the unregulated radio frequencies (2.4 - 5 GHz). It is intended to assist
customers in identifying wireless networks and devices not in compliance with security frameworks such as
FISMA (Federal Information Security Management Act) and US federal regulations implementing laws such as
GLBA (Gramm, Leach, Bliley Act), HIPAA (Health Information Portability and Accountability Act), Sarbanes
Oxley Act 2002, and more.
AirMagnet is not responsible for an organization's compliance with industry standards or legal regulations.
AirMagnet should be used by organizations as an aid in satisfying the organization's compliance requirements for
standards, laws, and regulations.
AirMagnet operation is limited to wireless networks and devices operating in the unregulated radio frequencies
(2.4 - 5 GHz). It operates and reports on networks and devices that use wireless technologies. It does not apply to
wire-line networks and devices not operating in the wireless spectrum.
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
1/ System Level Compliance Report
This report summarizes your network’s overall compliance with the DoD Directive on a per-policy basis.
DoD Directive 8100.2 Policy Sections
Compliance
4.10 Establish a DoD wireless KM process to include
information on vulnerability assessments, best practices,
and procedures for wireless device configurations and
connections.
AirMagnet Reports and Solutions will facilitate
a KM process and ensure compliance.
5.1.1. Monitor and provide oversight and policy
development of all DoD wireless activities.
Develop policy through monitoring and
reporting.
5.1.4. Minimize costs of wireless development, services
and systems and promote interoperability and security.
Supplies information on wireless assets to keep
costs down, promote interoperability, and
enhance security.
5.1.5. Direct the development and implementation of a
DoD wireless KM process to promote increased sharing
of DoD wireless information.
Reports and Solutions facilitate the
development of a wireless KM process.
5.2.3.1. Assess the risks and vulnerabilities associated
with wireless technologies that are responsive to DoD
requirements.
AirMagnet alarms will assess the risks and
vulnerabilities responsive to DoD requirements.
5.6.3. Ensure use of the wireless KM process when
evaluating potential wireless solutions .
AirMagnet ensures use of the wireless KM
process when evaluating potential wireless
solutions.
5.6.4. Ensure that activities evaluating wireless technology
provide feedback to the wireless KM process concerning
strengths, weaknesses, vulnerabilities, mitigation
techniques, and related security procedures.
Provide feedback to wireless KM process.
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
2/ Policy Level Compliance Report
This report summarizes your network’s compliance on a per-policy basis, showing you the total number of devices
that are in compliance or violation of each and every policy in the DoD Directive. By default, your network fails
the compliance if one of the devices is in violation of the policy.
DoD Directive 8100.2 Violations Per Section
4.1.1
15
9.4%
4.1.2 & 4.4 19 11.9%
4.1.3
19 11.9%
4.1.4
4
2.5%
4.1.5
6
3.8%
4.2
2
1.3%
4.3
7
4.4%
4.5
6
3.8%
5.1.7.1
62 38.8%
5.1.7.3
11
6.9%
5.6.5.1
7
4.4%
5.6.5.2
2
1.3%
Total:
160 100.0%
4.1.1
5.6.5.2
5.6.5.1
5.1.7.3
4.1.2 & 4.4
4.1.3
5.1.7.1
4.1.4
4.1.5
4.2
4.3
4.5
DoD Directive 8100.2 Violating/Compliant Devices Per Section
140
Violating Devices
Compliant Devices
120
# of Devices
100
80
60
40
20
5.
1.
7.
1
5.
1.
7.
3
5.
6.
5.
1
5.
6.
5.
2
4.
5
4.
3
4.
2
4.
1.
5
4.
1.
4
4.
1.
3
4.
1.
4.
1
1.
2
&
4.
4
0
Directive Section
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
Policy
Violation
# Violating
Devices
# Compliance
Devices
4.1.1: For data, strong authentication, non-repudiation, and personal
identification are required for access to a DoD IS in accordance with
published DoD policy and procedures. Identification and Authentication
(I&A) measures shall be implemented at both the device and network level.
I&A of unclassified voice is desirable; voice packets across an Internet
protocol (e.g., Voice over Internet Protocol (VoIP)) shall implement I&A
in accordance with published DoD policy and procedures.
15
14
112
88.89%
4.1.2: The encryption algorithm must be valid under the Cryptographic
Module Validation Program per the Federal Information Processing
Standards (FIPS) Publication (PUB) 140-2, Overall Level 1 or Level 2, as
dictated by the sensitivity of the data.
4.4: Ensure that Wireless Personal Area Network (WPAN) capability is
removed or physically disabled from a device unless FIPS PUB
140-2-validated cryptographic modules are implemented.
19
18
108
85.71%
4.1.3: Only assured channels employing NSA (National Security Agency)
-approved encryption shall be used to transmit classified information.
19
18
108
85.71%
4.1.4: Measures shall be taken to mitigate denial of service attacks. These
measures shall address not only external threats, but potential interference
from friendly sources.
4
3
123
97.62%
4.1.5: Identify new wireless technologies in DoD information systems,
including those creating an external interface to non-DoD systems (or
allowing use of DoD wireless devices on non-DoD wireless networks).
6
5
121
96.03%
4.2 : Unapproved Cellular/PCS and/or other RF or Infrared (IR) wireless
devices shall not be allowed into an area where classified information is
discussed or processed.
2
2
124
98.41%
4.3 : Unapproved wireless technologies/devices used for transmitting
information shall not be operated in areas where classified information is
electronically stored, processed, or transmitted.
7
6
120
95.24%
4.5: The DoD Components shall actively screen for wireless devices.
Active electromagnetic sensing at the DoD or contractor premises to
detect/prevent unauthorized access of DoD ISs shall be periodically
performed by the cognizant DAA or Defense Security Service office to
ensure compliance with the DoD Information Technology Security
Certification and Accreditation Process (DITSCAP) ongoing accreditation
agreement (reference (f)).
6
5
121
96.03%
5.1.7.1: Incorporate wireless considerations in its DoD-wide Information
Assurance (IA) initiatives such as computer emergency response,
vulnerability alerting, and enterprise anti-virus and file/data store
encryption software.
62
57
69
54.76%
5.1.7.3: Provide interoperability testing for wireless devices and
operational support for spectrum deconfliction and interference resolution.
11
8
118
93.65%
5.6.5.1: Control Wireless access and prevent vulnerabilities.
7
6
120
95.24%
5.6.5.2: Include intrusion detection methodologies for the wireless systems.
2
1
125
99.21%
DoD Directive 8100.2 Policy Sections
Live Capture
Location:
P o we r e d
Compliance
%
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
DoD Directive 8100.2 Policies
AirMagnet Alarms
# Violating
Devices
# Compliance
Devices
Compliance
%
4.1.1: For data, strong authentication, non-repudiation, and personal identification are required for access to a
DoD IS in accordance with published DoD policy and procedures. Identification and Authentication (I&A)
measures shall be implemented at both the device and network level. I&A of unclassified voice is desirable;
voice packets across an Internet protocol (e.g., Voice over Internet Protocol (VoIP)) shall implement I&A in
accordance with published DoD policy and procedures.
LEAP vulnerability detected
1
125
99.21%
Device unprotected by TKIP
14
112
88.89%
4.1.2: The encryption algorithm must be valid under the Cryptographic Module Validation Program per the
Federal Information Processing Standards (FIPS) Publication (PUB) 140-2, Overall Level 1 or Level 2, as
dictated by the sensitivity of the data.
4.4: Ensure that Wireless Personal Area Network (WPAN) capability is removed or physically disabled from a
device unless FIPS PUB 140-2-validated cryptographic modules are implemented.
Client with encryption disabled
1
125
99.21%
AP with encryption disabled
1
125
99.21%
Crackable WEP IV key used
2
124
98.41%
Device unprotected by TKIP
14
112
88.89%
LEAP vulnerability detected
1
125
99.21%
4.1.3: Only assured channels employing NSA (National Security Agency)-approved encryption shall be used to
transmit classified information.
Crackable WEP IV key used
2
124
98.41%
Device unprotected by TKIP
14
112
88.89%
AP with encryption disabled
1
125
99.21%
Client with encryption disabled
1
125
99.21%
LEAP vulnerability detected
1
125
99.21%
4.1.4: Measures shall be taken to mitigate denial of service attacks. These measures shall address not only
external threats, but potential interference from friendly sources.
Excessive frame retries
2
124
98.41%
DoS: De-Auth flood attack
1
125
99.21%
DoS: De-Auth broadcast attack
1
125
99.21%
4.1.5: Identify new wireless technologies in DoD information systems, including those creating an external
interface to non-DoD systems (or allowing use of DoD wireless devices on non-DoD wireless networks).
Device Probing for APs
2
124
98.41%
Unassociated station detected
2
124
98.41%
Potential Pre-802.11n device detected
2
124
98.41%
4.2 : Unapproved Cellular/PCS and/or other RF or Infrared (IR) wireless devices shall not be allowed into an
area where classified information is discussed or processed.
Potential Pre-802.11n device detected
124
98.41%
Live Capture
Location:
P o we r e d
2
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
4.3 : Unapproved wireless technologies/devices used for transmitting information shall not be operated in areas
where classified information is electronically stored, processed, or transmitted.
AP operating in bridged mode detected
3
123
97.62%
Unassociated station detected
2
124
98.41%
Device Probing for APs
2
124
98.41%
4.5: The DoD Components shall actively screen for wireless devices. Active electromagnetic sensing at the DoD
or contractor premises to detect/prevent unauthorized access of DoD ISs shall be periodically performed by the
cognizant DAA or Defense Security Service office to ensure compliance with the DoD Information Technology
Security Certification and Accreditation Process (DITSCAP) ongoing accreditation agreement (reference (f)).
Device Probing for APs
2
124
98.41%
Unassociated station detected
2
124
98.41%
Potential Pre-802.11n device detected
2
124
98.41%
5.1.7.1: Incorporate wireless considerations in its DoD-wide Information Assurance (IA) initiatives such as
computer emergency response, vulnerability alerting, and enterprise anti-virus and file/data store encryption
software.
AP configuration changed
1
125
99.21%
AP operating in bridged mode detected
3
123
97.62%
Exposed Wireless Station detected
2
124
98.41%
52
74
58.73%
Crackable WEP IV key used
2
124
98.41%
AP with encryption disabled
1
125
99.21%
Client with encryption disabled
1
125
99.21%
AP broadcasting SSID
5.1.7.3: Provide interoperability testing for wireless devices and operational support for spectrum deconfliction
and interference resolution.
Excessive low speed transmission
3
123
97.62%
Excessive frame retries
2
124
98.41%
Unassociated station detected
2
124
98.41%
Potential Pre-802.11n device detected
2
124
98.41%
Excessive missed AP beacons
2
124
98.41%
Unassociated station detected
2
124
98.41%
Exposed Wireless Station detected
2
124
98.41%
AP operating in bridged mode detected
3
123
97.62%
5.6.5.1: Control Wireless access and prevent vulnerabilities.
5.6.5.2: Include intrusion detection methodologies for the wireless systems.
DoS: De-Auth broadcast attack
1
125
99.21%
DoS: De-Auth flood attack
1
125
99.21%
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
Notes:
1) By default, your network fails to comply with the Department of Defense (DoD) Directive 8100.2 if one of
the devices violates any of its policy sections.
2) Channel specific policy violations will not be included in the Device-Specific Compliance Report.
3) A wireless network fails to comply with the Department of Defense (DoD) Directive 8100.2 if one of the
devices violates any of its policy sections.
4) For further information on the Directive please visit
http://www.dtic.mil/whs/directives/corres/html2/d81002x.htm
5) AirMagnet has enabled alarms relevant to the Dod 8100.2 Directive in its Policy Compliance Reports.
Disabling any alarms tied to the Reports will degrade their effectiveness and result in a wireless network that
does not comply with the respective industry regulations.
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
3/ Device-Specific Compliance Report
Device Information
4.1.3
4.1.4
4.1.5
4.2
4.3
4.5
5.1.7.1
5.1.7.3
5.6.5.1
5.6.5.2
00:16:B6:F9:2E:CC-g
Channel: ?
Cisco-linksys
QA_linksys2
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:90:7A:05:12:AC-g
Channel: 2
SpectraLink
QASpectralink
P
F
F
P
P
P
P
P
F
F
P
P
66.67%
00:90:7A:05:2F:CF-g
Channel: 7
SpectraLink
QASpectralink
P
F
F
P
P
P
P
P
F
P
P
P
75.00%
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:90:4B:28:62:AC-g
Channel: ?
GemTek
Air2
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:12:17:B5:AA:45-g
Channel: 7
Cisco
QA_linksys2
F
F
F
P
P
P
F
P
F
F
F
P
41.67%
00:16:01:84:C4:F0-g
Channel: 9
Buffalo
QABuf
F
F
F
P
P
P
P
P
F
P
P
P
66.67%
00:0F:34:A7:78:14-g
Channel: 2
Cisco
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:90:4B:CC:73:00-g
Channel: ?
GemTek
QA_linksys2
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:1B:77:68:0C:16-g
Channel: ?
4.1.1
4.1.2 &
4,4
MAC Address-Media
CHANNEL
VENDOR
SSID
DoD Directive 8100.2 Policy Sections
Compliance
%
This report contains detailed information about devices in compliance or violation of the DoD Directive. It checks
the devices against each and every provision in the Directive to show what policy sections are violated or upheld
to. It lists all wireless devices deployed on your WLAN. The devices can be sort by MAC address, media type,
SSID, or vendor.
A&K
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
00:14:69:F3:16:31-g
Channel: ?
Cisco
QA_linksys2
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:16:6F:54:3F:7D-g
Channel: 6
Intel
BuffaloWing_AME
P
F
F
P
P
P
P
P
F
P
P
P
75.00%
00:1B:53:00:0C:7F-g
Channel: 5
Cisco
QACiscoVoice1
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:02:6F:22:36:6E-g
Channel: ?
Senao
compa
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:11:50:2E:D7:C0-g
Channel: 5
Belkin
belkinAP
P
P
P
F
F
F
P
F
F
F
P
P
50.00%
00:20:A6:52:8F:65-g
Channel: 8
Proxim
tv-Wireless Network B
F
F
F
F
P
P
P
P
F
P
P
F
50.00%
00:11:5C:4D:E8:41-g
Channel: 4
Cisco
AirMagnetGuest
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:0F:34:A7:78:13-g
Channel: 2
Cisco
QAVocera
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:0E:35:C0:35:7D-g
Channel: 1
Intel
QA-1200-7
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:14:69:F3:16:30-g
Channel: ?
Cisco
QA_linksys2
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0F:B5:35:09:16-g
Channel: ?
QA-1200-32
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
00:1B:53:00:0C:7E-g
Channel: 5
Cisco
QACiscoVoice1
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:13:02:77:2E:0D-g
Channel: ?
Intel
BuffaloWing_AME
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:14:A5:54:8A:1A-g
Channel: ?
GemTek
BuffaloWing_AME
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
F
F
F
P
P
P
P
P
F
P
P
P
66.67%
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:11:5C:4D:E8:40-g
Channel: 4
Cisco
Air2
F
F
F
P
P
P
P
P
F
P
P
P
66.67%
00:12:44:B8:9C:34-g
Channel: 5
Cisco
QA-aruba3
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0F:34:A7:78:12-g
Channel: 2
Cisco
QA-aruba3
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0B:86:AD:F0:92-g
Channel: 10
Aruba
QA-aruba3
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0C:41:A8:7A:C2-g
Channel: 11
ENG-linksys_rtf
00:14:A8:44:13:20-g
Channel: 9
AMS-1200-5
00:02:6F:20:C9:01-g
Channel: 14
Senao
QATest3
00:1B:11:62:A6:F0-g
Channel: 1
QA-dlinkdraft2-jav
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
00:0B:85:79:03:C0-g
Channel: ?
Airespace
belkinAP
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:15:2B:AC:CB:CF-g
Channel: 7
Cisco
QACiscoVoice
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:02:6F:21:26:7D-g
Channel: ?
Senao
QASpectralink
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:90:7A:05:2E:AA-g
Channel: 2
SpectraLink
QASpectralink
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:12:F0:1A:6C:5D-g
Channel: 9
Intel
QABuf
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0F:34:A7:78:11-g
Channel: 2
Cisco
QASpectralink
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:12:44:B8:9C:33-g
Channel: 5
Cisco
QAVocera1
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:0D:0B:4F:5E:00-g
Channel: 6
Buffalo
BuffaloWing_AME
P
F
F
F
F
F
P
F
F
F
P
P
33.33%
00:14:F1:AF:1B:94-g
Channel: 7
Cisco
QA-4402-1
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0B:85:79:03:CF-g
Channel: 11
Airespace
QA-4402-1
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:12:44:B8:9C:32-g
Channel: 5
Cisco
QA-linksysN-jav
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
00:1A:70:40:B3:C4-g
Channel: 5
Cisco-linksys
QA-linksysN-jav
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:0F:34:A7:78:10-g
Channel: 2
Cisco
QACiscoVoice
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:14:F1:AF:1B:93-g
Channel: 7
Cisco
QAVocera
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:0B:86:8C:E3:05-g
Channel: 10
Aruba
QA-aruba6
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:12:44:B8:9C:31-g
Channel: 5
Cisco
QASpectralink1
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:0B:46:91:EA:72-g
Channel: ?
Cisco
BuffaloWing_AME
P
P
P
P
F
P
F
F
P
F
F
P
58.33%
00:19:E3:FB:59:75-g
Channel: 6
Apple
ENG-AirPort-rm-1
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:14:F1:AF:1B:92-g
Channel: 7
Cisco
QAVOFI
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0B:86:8C:FE:05-g
Channel: 10
Aruba
QA-aruba6
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:0B:86:8C:E3:04-g
Channel: 10
Aruba
QA-aruba5
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:12:44:B8:9C:30-g
Channel: 5
Cisco
QACiscoVoice1
F
F
F
P
P
P
P
P
F
F
P
P
58.33%
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
00:40:96:A1:96:4E-g
Channel: ?
Cisco
BuffaloWing_AME
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:02:6F:20:32:6A-g
Channel: ?
Senao
compa
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0E:35:7F:4E:29-g
Channel: ?
Intel
compa
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:13:80:43:15:23-g
Channel: ?
Cisco
AirMagnetGuest
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:40:96:59:A9:39-g
Channel: 6
Cisco
QA-350-2
F
F
F
P
P
P
F
P
F
P
F
P
50.00%
00:14:F1:AF:1B:91-g
Channel: 7
Cisco
QASpectralink
P
P
P
P
P
P
P
P
F
F
P
P
83.33%
00:0B:86:8C:FE:04-g
Channel: 10
Aruba
QA-aruba5
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:0B:86:8C:E3:03-g
Channel: 10
Aruba
QA-aruba4
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:13:80:43:15:22-g
Channel: ?
Cisco
compa
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:90:7A:04:F0:C4-g
Channel: ?
SpectraLink
compa
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:14:F1:AF:1B:90-g
Channel: 7
Cisco
QACiscoVoice
F
F
F
P
P
P
P
P
F
P
P
P
66.67%
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
00:0B:86:8C:FE:03-g
Channel: 10
Aruba
QA-aruba4
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:0B:86:8C:E3:02-g
Channel: 10
Aruba
QA-aruba3
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:13:80:43:11:55-g
Channel: 1
Cisco
QA-1200-7
F
F
F
P
P
P
P
P
F
P
P
P
66.67%
00:19:5B:59:64:A6-g
Channel: ?
D-Link
QA_linksys2
P
P
P
P
F
P
F
F
P
P
P
P
75.00%
00:13:80:43:15:21-g
Channel: ?
Cisco
QA_linksys2
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:14:A5:01:94:CD-g
Channel: ?
GemTek
QA_linksys2
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:12:F0:AC:44:21-g
Channel: 7
Intel
QAVOFI
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:12:F0:95:67:4B-g
Channel: ?
Intel
A&K
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:13:02:E0:A9:47-g
Channel: ?
Intel
Air2
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:A0:C5:B7:78:71-g
Channel: ?
Zyxel
Air2
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0F:B5:9B:77:D9-g
Channel: ?
A&K
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
00:0B:86:8C:FE:02-g
Channel: 10
Aruba
QA-aruba3
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:0B:86:8C:E3:01-g
Channel: 10
Aruba
QA-aruba2
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:13:80:43:11:54-g
Channel: 1
Cisco
QA-1200-32
F
F
F
P
P
P
P
P
F
P
P
P
66.67%
00:18:4D:9E:85:48-g
Channel: 1
Netgear
NETGEAR108
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:13:80:43:15:20-g
Channel: ?
Cisco
QA_linksys2
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:09:E8:B4:DB:76-g
Channel: ?
Cisco
QACiscoVoice1
P
P
P
P
P
P
P
P
F
P
F
P
83.33%
00:90:4B:C1:9E:6A-g
Channel: ?
GemTek
QA_Lab_1200
P
P
P
P
F
P
F
F
F
F
F
P
50.00%
00:0B:86:8C:FE:01-g
Channel: 10
Aruba
QA-aruba2
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:13:5F:F9:7F:00-g
Channel: 10
Cisco
compg
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:0B:86:8C:E3:00-g
Channel: 10
Aruba
QA-aruba1
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:13:80:43:11:53-g
Channel: 1
Cisco
QA-1200-31
F
F
F
P
P
P
P
P
F
P
P
P
66.67%
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
00:02:6F:20:19:DB-g
Channel: ?
Senao
QACiscoVoice
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:90:7A:04:3E:71-g
Channel: 7
SpectraLink
QASpectralink
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0E:35:4C:9F:08-g
Channel: ?
Intel
QA_linksys2
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:16:6F:54:3C:95-g
Channel: 7
Intel
QAVOFI
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:90:4B:72:B8:6D-g
Channel: ?
GemTek
QA-1200-7
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0B:86:8C:FE:00-g
Channel: 10
Aruba
QA-aruba1
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:13:80:43:11:52-g
Channel: 1
Cisco
QA-1200-30
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:02:6F:20:18:85-g
Channel: ?
Senao
QACiscoVoice
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0A:8A:47:DA:AD-g
Channel: ?
Cisco
QACiscoVoice
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:A0:C5:B7:70:19-g
Channel: 2
Zyxel
QABuf
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:14:A8:53:4C:60-g
Channel: 3
tech-1200
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
00:11:5C:4D:E8:F1-g
Channel: 8
Cisco
AirMagnetGuest
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:02:8A:A8:9A:15-g
Channel: 11
Ambit
QA-1200-26
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:13:80:43:11:51-g
Channel: 1
Cisco
QA-1200-26
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:16:6F:54:3C:A4-g
Channel: ?
Intel
QACiscoVoice
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:40:96:A3:BF:59-g
Channel: ?
Cisco
QASpectralink
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:13:5F:A1:D2:06-g
Channel: ?
Cisco
QASpectralink
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:11:5C:4D:E8:F0-g
Channel: 8
Cisco
Air2
F
F
F
P
P
P
P
P
F
P
P
P
66.67%
00:0B:86:8A:B1:40-g
Channel: 1
Aruba
aruba-ap
F
F
F
P
P
P
P
P
F
P
P
P
66.67%
00:13:80:43:11:50-g
Channel: 1
Cisco
QA-1200-25
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:14:A5:01:95:84-g
Channel: ?
GemTek
BuffaloWing_AME
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:14:A5:54:85:52-g
Channel: ?
GemTek
QACiscoVoice
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
00:40:96:AB:51:C1-g
Channel: ?
Cisco
QA-linksysN-jav
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:90:4B:BD:FC:D6-g
Channel: ?
GemTek
QA-linksysN-jav
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:14:A5:35:30:F4-g
Channel: 3
GemTek
AirLinkMIMO
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:40:96:59:B9:44-g
Channel: 6
Cisco
QA-350-2
P
P
P
P
P
P
F
P
F
P
F
P
75.00%
00:02:8A:A3:09:20-g
Channel: 3
Ambit
Air2
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:02:6F:22:00:5D-g
Channel: ?
Senao
QACiscoVoice
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:0E:35:67:D7:DB-g
Channel: ?
Intel
QACiscoVoice
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:15:F9:41:C4:46-g
Channel: 7
Cisco
QACiscoVoice
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:16:6F:C5:E3:78-g
Channel: ?
Intel
AirMagnetGuest
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
P
P
P
P
P
P
P
P
F
P
P
P
91.67%
00:13:CE:C8:54:ED-g
Channel: 4
AirMagnetGuest
00:11:5C:4D:E9:11-g
Channel: 1
Cisco
AirMagnetGuest
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
00:14:A5:01:95:C6-g
Channel: ?
GemTek
dd-wrt
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:12:F0:41:FF:ED-g
Channel: ?
Intel
dd-wrt
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:14:A5:3C:C1:9F-g
Channel: ?
GemTek
dd-wrt
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:40:96:AF:31:64-g
Channel: ?
Cisco
compa
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:90:4B:BD:FD:2A-g
Channel: ?
GemTek
compa
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
00:11:5C:4D:E9:10-g
Channel: 1
Cisco
Air2
F
F
F
P
P
P
P
P
F
P
P
P
66.67%
00:0B:86:AD:F0:95-g
Channel: 10
Aruba
QA-aruba6
P
P
P
P
P
P
P
P
P
P
P
P
100.00%
Notes:
1) Channel specific policy violations will not be included in the Device-Specific Compliance Report.
2) For further information on the Directive please visit
http://www.dtic.mil/whs/directives/corres/html2/d81002x.htm
Live Capture
Location:
P o we r e d
by
Ai r Ma g n e t
Monday, July 30, 2007
5:39:09PM
Download