Department of Defense Directive 8100.2 Compliance Report Designated Official: Time Period: 17:39:09 Monday, July 30, 2007 What is the DoD Directive Number 8100.2? The Department of Defense (DoD) Directive Number 8100.2 (the Directive hereafter) stipulates the key policy sections regarding the use of commercial wireless devices, services, and technologies in the DoD. Its purpose is to safeguard the DoD networks from the security vulnerabilities inherent with wireless networks, making security a prerequisite for the deployment and use of commercial wireless technologies in the DoD. Why is the Directive so important? Wireless networks are more vulnerable to external attacks than wired ones. This is especially true for the 802.11 network. Radio signals extend beyond the boundaries of buildings, leaving the network wide open to hackers; as a shared network, a loophole in any part of the network can expose the entire WLAN to external attacks; and with the rapid adoption of the 802.11 network comes an ever-increasing number of sophisticated tools that hackers use to break the encryption and authentication techniques used for network access. Therefore, the DoD Directive Number 8100.2 is a step in the right direction for safeguarding DoD wireless networks. What is the scope of the Directive? The Directive is geared towards securing all commercial wireless devices, services, and technologies for non-classified information, be it data or voice. It explicitly prohibits the use of wireless devices for transmission, storage, or processing of classified information. The commercial wireless devices include wireless-enabled computer systems, PDAs, mobile phones, handheld scanners, 802.11 wireless networks, etc. To whom does the Directive apply? The Directive applies to personnel in all DoD organizations, including DoD contractors, visitors of DoD facilities, and anyone who has access to DoD information. How will the Directive affect 802.11 networks? Many of the policies spelled out in the Directive are applicable to the 802.11 wireless technologies used in DoD entities. The key policy sections that are relevant to the 802.11 networks include the implementation and enforcement of no 802.11 use in designated areas deemed too risky for the use of wireless technologies; requirement of strong authentication and encryption for network access; mitigation of denial of service and other disruptive attacks; implementation of mechanisms to assess the risks and vulnerabilities associated with 802.11 networks and devices; development of defensive measures to detect, deter, and defeat unauthorized 802.11 activities; integration of intrusion detection methodologies with 802.11 wireless network systems; sharing of 802.11 knowledge, such as historical forensics, to improve overall security processes, etc.. AirMagnet DoD Compliance Reports Policies will be useless without an effective mechanism to monitor and enforce their compliance. AirMagnet automates the monitoring of your wireless networks and devices in compliance with the Directive. The compliance reports integrate the Directive with AirMagnet’s advanced IDS/IPS system to provide superior protection for all wireless networks and devices. The reports refer to specific policy sections of the Directive and show the status of compliance of your WLAN. The integrated AirMagnet IDS/IPS algorithms pinpoint the exact cause of violations and provide expert advice as well as automated actions to mitigate and/or resolve the problems behind policy violations. Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM AirMagnet Disclaimer AirMagnet System Level and Device Level Compliance Reports provide information to assist its customers in determining whether they are in compliance with various standards, laws and regulations applicable to wireless networks and devices operating in the unregulated radio frequencies (2.4 - 5 GHz). It is intended to assist customers in identifying wireless networks and devices not in compliance with security frameworks such as FISMA (Federal Information Security Management Act) and US federal regulations implementing laws such as GLBA (Gramm, Leach, Bliley Act), HIPAA (Health Information Portability and Accountability Act), Sarbanes Oxley Act 2002, and more. AirMagnet is not responsible for an organization's compliance with industry standards or legal regulations. AirMagnet should be used by organizations as an aid in satisfying the organization's compliance requirements for standards, laws, and regulations. AirMagnet operation is limited to wireless networks and devices operating in the unregulated radio frequencies (2.4 - 5 GHz). It operates and reports on networks and devices that use wireless technologies. It does not apply to wire-line networks and devices not operating in the wireless spectrum. Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 1/ System Level Compliance Report This report summarizes your network’s overall compliance with the DoD Directive on a per-policy basis. DoD Directive 8100.2 Policy Sections Compliance 4.10 Establish a DoD wireless KM process to include information on vulnerability assessments, best practices, and procedures for wireless device configurations and connections. AirMagnet Reports and Solutions will facilitate a KM process and ensure compliance. 5.1.1. Monitor and provide oversight and policy development of all DoD wireless activities. Develop policy through monitoring and reporting. 5.1.4. Minimize costs of wireless development, services and systems and promote interoperability and security. Supplies information on wireless assets to keep costs down, promote interoperability, and enhance security. 5.1.5. Direct the development and implementation of a DoD wireless KM process to promote increased sharing of DoD wireless information. Reports and Solutions facilitate the development of a wireless KM process. 5.2.3.1. Assess the risks and vulnerabilities associated with wireless technologies that are responsive to DoD requirements. AirMagnet alarms will assess the risks and vulnerabilities responsive to DoD requirements. 5.6.3. Ensure use of the wireless KM process when evaluating potential wireless solutions . AirMagnet ensures use of the wireless KM process when evaluating potential wireless solutions. 5.6.4. Ensure that activities evaluating wireless technology provide feedback to the wireless KM process concerning strengths, weaknesses, vulnerabilities, mitigation techniques, and related security procedures. Provide feedback to wireless KM process. Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 2/ Policy Level Compliance Report This report summarizes your network’s compliance on a per-policy basis, showing you the total number of devices that are in compliance or violation of each and every policy in the DoD Directive. By default, your network fails the compliance if one of the devices is in violation of the policy. DoD Directive 8100.2 Violations Per Section 4.1.1 15 9.4% 4.1.2 & 4.4 19 11.9% 4.1.3 19 11.9% 4.1.4 4 2.5% 4.1.5 6 3.8% 4.2 2 1.3% 4.3 7 4.4% 4.5 6 3.8% 5.1.7.1 62 38.8% 5.1.7.3 11 6.9% 5.6.5.1 7 4.4% 5.6.5.2 2 1.3% Total: 160 100.0% 4.1.1 5.6.5.2 5.6.5.1 5.1.7.3 4.1.2 & 4.4 4.1.3 5.1.7.1 4.1.4 4.1.5 4.2 4.3 4.5 DoD Directive 8100.2 Violating/Compliant Devices Per Section 140 Violating Devices Compliant Devices 120 # of Devices 100 80 60 40 20 5. 1. 7. 1 5. 1. 7. 3 5. 6. 5. 1 5. 6. 5. 2 4. 5 4. 3 4. 2 4. 1. 5 4. 1. 4 4. 1. 3 4. 1. 4. 1 1. 2 & 4. 4 0 Directive Section Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM Policy Violation # Violating Devices # Compliance Devices 4.1.1: For data, strong authentication, non-repudiation, and personal identification are required for access to a DoD IS in accordance with published DoD policy and procedures. Identification and Authentication (I&A) measures shall be implemented at both the device and network level. I&A of unclassified voice is desirable; voice packets across an Internet protocol (e.g., Voice over Internet Protocol (VoIP)) shall implement I&A in accordance with published DoD policy and procedures. 15 14 112 88.89% 4.1.2: The encryption algorithm must be valid under the Cryptographic Module Validation Program per the Federal Information Processing Standards (FIPS) Publication (PUB) 140-2, Overall Level 1 or Level 2, as dictated by the sensitivity of the data. 4.4: Ensure that Wireless Personal Area Network (WPAN) capability is removed or physically disabled from a device unless FIPS PUB 140-2-validated cryptographic modules are implemented. 19 18 108 85.71% 4.1.3: Only assured channels employing NSA (National Security Agency) -approved encryption shall be used to transmit classified information. 19 18 108 85.71% 4.1.4: Measures shall be taken to mitigate denial of service attacks. These measures shall address not only external threats, but potential interference from friendly sources. 4 3 123 97.62% 4.1.5: Identify new wireless technologies in DoD information systems, including those creating an external interface to non-DoD systems (or allowing use of DoD wireless devices on non-DoD wireless networks). 6 5 121 96.03% 4.2 : Unapproved Cellular/PCS and/or other RF or Infrared (IR) wireless devices shall not be allowed into an area where classified information is discussed or processed. 2 2 124 98.41% 4.3 : Unapproved wireless technologies/devices used for transmitting information shall not be operated in areas where classified information is electronically stored, processed, or transmitted. 7 6 120 95.24% 4.5: The DoD Components shall actively screen for wireless devices. Active electromagnetic sensing at the DoD or contractor premises to detect/prevent unauthorized access of DoD ISs shall be periodically performed by the cognizant DAA or Defense Security Service office to ensure compliance with the DoD Information Technology Security Certification and Accreditation Process (DITSCAP) ongoing accreditation agreement (reference (f)). 6 5 121 96.03% 5.1.7.1: Incorporate wireless considerations in its DoD-wide Information Assurance (IA) initiatives such as computer emergency response, vulnerability alerting, and enterprise anti-virus and file/data store encryption software. 62 57 69 54.76% 5.1.7.3: Provide interoperability testing for wireless devices and operational support for spectrum deconfliction and interference resolution. 11 8 118 93.65% 5.6.5.1: Control Wireless access and prevent vulnerabilities. 7 6 120 95.24% 5.6.5.2: Include intrusion detection methodologies for the wireless systems. 2 1 125 99.21% DoD Directive 8100.2 Policy Sections Live Capture Location: P o we r e d Compliance % by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM DoD Directive 8100.2 Policies AirMagnet Alarms # Violating Devices # Compliance Devices Compliance % 4.1.1: For data, strong authentication, non-repudiation, and personal identification are required for access to a DoD IS in accordance with published DoD policy and procedures. Identification and Authentication (I&A) measures shall be implemented at both the device and network level. I&A of unclassified voice is desirable; voice packets across an Internet protocol (e.g., Voice over Internet Protocol (VoIP)) shall implement I&A in accordance with published DoD policy and procedures. LEAP vulnerability detected 1 125 99.21% Device unprotected by TKIP 14 112 88.89% 4.1.2: The encryption algorithm must be valid under the Cryptographic Module Validation Program per the Federal Information Processing Standards (FIPS) Publication (PUB) 140-2, Overall Level 1 or Level 2, as dictated by the sensitivity of the data. 4.4: Ensure that Wireless Personal Area Network (WPAN) capability is removed or physically disabled from a device unless FIPS PUB 140-2-validated cryptographic modules are implemented. Client with encryption disabled 1 125 99.21% AP with encryption disabled 1 125 99.21% Crackable WEP IV key used 2 124 98.41% Device unprotected by TKIP 14 112 88.89% LEAP vulnerability detected 1 125 99.21% 4.1.3: Only assured channels employing NSA (National Security Agency)-approved encryption shall be used to transmit classified information. Crackable WEP IV key used 2 124 98.41% Device unprotected by TKIP 14 112 88.89% AP with encryption disabled 1 125 99.21% Client with encryption disabled 1 125 99.21% LEAP vulnerability detected 1 125 99.21% 4.1.4: Measures shall be taken to mitigate denial of service attacks. These measures shall address not only external threats, but potential interference from friendly sources. Excessive frame retries 2 124 98.41% DoS: De-Auth flood attack 1 125 99.21% DoS: De-Auth broadcast attack 1 125 99.21% 4.1.5: Identify new wireless technologies in DoD information systems, including those creating an external interface to non-DoD systems (or allowing use of DoD wireless devices on non-DoD wireless networks). Device Probing for APs 2 124 98.41% Unassociated station detected 2 124 98.41% Potential Pre-802.11n device detected 2 124 98.41% 4.2 : Unapproved Cellular/PCS and/or other RF or Infrared (IR) wireless devices shall not be allowed into an area where classified information is discussed or processed. Potential Pre-802.11n device detected 124 98.41% Live Capture Location: P o we r e d 2 by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 4.3 : Unapproved wireless technologies/devices used for transmitting information shall not be operated in areas where classified information is electronically stored, processed, or transmitted. AP operating in bridged mode detected 3 123 97.62% Unassociated station detected 2 124 98.41% Device Probing for APs 2 124 98.41% 4.5: The DoD Components shall actively screen for wireless devices. Active electromagnetic sensing at the DoD or contractor premises to detect/prevent unauthorized access of DoD ISs shall be periodically performed by the cognizant DAA or Defense Security Service office to ensure compliance with the DoD Information Technology Security Certification and Accreditation Process (DITSCAP) ongoing accreditation agreement (reference (f)). Device Probing for APs 2 124 98.41% Unassociated station detected 2 124 98.41% Potential Pre-802.11n device detected 2 124 98.41% 5.1.7.1: Incorporate wireless considerations in its DoD-wide Information Assurance (IA) initiatives such as computer emergency response, vulnerability alerting, and enterprise anti-virus and file/data store encryption software. AP configuration changed 1 125 99.21% AP operating in bridged mode detected 3 123 97.62% Exposed Wireless Station detected 2 124 98.41% 52 74 58.73% Crackable WEP IV key used 2 124 98.41% AP with encryption disabled 1 125 99.21% Client with encryption disabled 1 125 99.21% AP broadcasting SSID 5.1.7.3: Provide interoperability testing for wireless devices and operational support for spectrum deconfliction and interference resolution. Excessive low speed transmission 3 123 97.62% Excessive frame retries 2 124 98.41% Unassociated station detected 2 124 98.41% Potential Pre-802.11n device detected 2 124 98.41% Excessive missed AP beacons 2 124 98.41% Unassociated station detected 2 124 98.41% Exposed Wireless Station detected 2 124 98.41% AP operating in bridged mode detected 3 123 97.62% 5.6.5.1: Control Wireless access and prevent vulnerabilities. 5.6.5.2: Include intrusion detection methodologies for the wireless systems. DoS: De-Auth broadcast attack 1 125 99.21% DoS: De-Auth flood attack 1 125 99.21% Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM Notes: 1) By default, your network fails to comply with the Department of Defense (DoD) Directive 8100.2 if one of the devices violates any of its policy sections. 2) Channel specific policy violations will not be included in the Device-Specific Compliance Report. 3) A wireless network fails to comply with the Department of Defense (DoD) Directive 8100.2 if one of the devices violates any of its policy sections. 4) For further information on the Directive please visit http://www.dtic.mil/whs/directives/corres/html2/d81002x.htm 5) AirMagnet has enabled alarms relevant to the Dod 8100.2 Directive in its Policy Compliance Reports. Disabling any alarms tied to the Reports will degrade their effectiveness and result in a wireless network that does not comply with the respective industry regulations. Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 3/ Device-Specific Compliance Report Device Information 4.1.3 4.1.4 4.1.5 4.2 4.3 4.5 5.1.7.1 5.1.7.3 5.6.5.1 5.6.5.2 00:16:B6:F9:2E:CC-g Channel: ? Cisco-linksys QA_linksys2 P P P P P P P P P P P P 100.00% 00:90:7A:05:12:AC-g Channel: 2 SpectraLink QASpectralink P F F P P P P P F F P P 66.67% 00:90:7A:05:2F:CF-g Channel: 7 SpectraLink QASpectralink P F F P P P P P F P P P 75.00% P P P P P P P P P P P P 100.00% 00:90:4B:28:62:AC-g Channel: ? GemTek Air2 P P P P P P P P P P P P 100.00% 00:12:17:B5:AA:45-g Channel: 7 Cisco QA_linksys2 F F F P P P F P F F F P 41.67% 00:16:01:84:C4:F0-g Channel: 9 Buffalo QABuf F F F P P P P P F P P P 66.67% 00:0F:34:A7:78:14-g Channel: 2 Cisco P P P P P P P P P P P P 100.00% 00:90:4B:CC:73:00-g Channel: ? GemTek QA_linksys2 P P P P P P P P P P P P 100.00% 00:1B:77:68:0C:16-g Channel: ? 4.1.1 4.1.2 & 4,4 MAC Address-Media CHANNEL VENDOR SSID DoD Directive 8100.2 Policy Sections Compliance % This report contains detailed information about devices in compliance or violation of the DoD Directive. It checks the devices against each and every provision in the Directive to show what policy sections are violated or upheld to. It lists all wireless devices deployed on your WLAN. The devices can be sort by MAC address, media type, SSID, or vendor. A&K Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 00:14:69:F3:16:31-g Channel: ? Cisco QA_linksys2 P P P P P P P P P P P P 100.00% 00:16:6F:54:3F:7D-g Channel: 6 Intel BuffaloWing_AME P F F P P P P P F P P P 75.00% 00:1B:53:00:0C:7F-g Channel: 5 Cisco QACiscoVoice1 P P P P P P P P P P P P 100.00% P P P P P P P P P P P P 100.00% 00:02:6F:22:36:6E-g Channel: ? Senao compa P P P P P P P P P P P P 100.00% 00:11:50:2E:D7:C0-g Channel: 5 Belkin belkinAP P P P F F F P F F F P P 50.00% 00:20:A6:52:8F:65-g Channel: 8 Proxim tv-Wireless Network B F F F F P P P P F P P F 50.00% 00:11:5C:4D:E8:41-g Channel: 4 Cisco AirMagnetGuest P P P P P P P P F P P P 91.67% 00:0F:34:A7:78:13-g Channel: 2 Cisco QAVocera P P P P P P P P F P P P 91.67% 00:0E:35:C0:35:7D-g Channel: 1 Intel QA-1200-7 P P P P P P P P P P P P 100.00% 00:14:69:F3:16:30-g Channel: ? Cisco QA_linksys2 P P P P P P P P P P P P 100.00% 00:0F:B5:35:09:16-g Channel: ? QA-1200-32 Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 00:1B:53:00:0C:7E-g Channel: 5 Cisco QACiscoVoice1 P P P P P P P P P P P P 100.00% 00:13:02:77:2E:0D-g Channel: ? Intel BuffaloWing_AME P P P P P P P P P P P P 100.00% 00:14:A5:54:8A:1A-g Channel: ? GemTek BuffaloWing_AME P P P P P P P P P P P P 100.00% P P P P P P P P F P P P 91.67% F F F P P P P P F P P P 66.67% P P P P P P P P F P P P 91.67% P P P P P P P P F P P P 91.67% 00:11:5C:4D:E8:40-g Channel: 4 Cisco Air2 F F F P P P P P F P P P 66.67% 00:12:44:B8:9C:34-g Channel: 5 Cisco QA-aruba3 P P P P P P P P P P P P 100.00% 00:0F:34:A7:78:12-g Channel: 2 Cisco QA-aruba3 P P P P P P P P P P P P 100.00% 00:0B:86:AD:F0:92-g Channel: 10 Aruba QA-aruba3 P P P P P P P P P P P P 100.00% 00:0C:41:A8:7A:C2-g Channel: 11 ENG-linksys_rtf 00:14:A8:44:13:20-g Channel: 9 AMS-1200-5 00:02:6F:20:C9:01-g Channel: 14 Senao QATest3 00:1B:11:62:A6:F0-g Channel: 1 QA-dlinkdraft2-jav Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 00:0B:85:79:03:C0-g Channel: ? Airespace belkinAP P P P P P P P P P P P P 100.00% 00:15:2B:AC:CB:CF-g Channel: 7 Cisco QACiscoVoice P P P P P P P P P P P P 100.00% 00:02:6F:21:26:7D-g Channel: ? Senao QASpectralink P P P P P P P P P P P P 100.00% 00:90:7A:05:2E:AA-g Channel: 2 SpectraLink QASpectralink P P P P P P P P P P P P 100.00% 00:12:F0:1A:6C:5D-g Channel: 9 Intel QABuf P P P P P P P P P P P P 100.00% 00:0F:34:A7:78:11-g Channel: 2 Cisco QASpectralink P P P P P P P P F P P P 91.67% 00:12:44:B8:9C:33-g Channel: 5 Cisco QAVocera1 P P P P P P P P F P P P 91.67% 00:0D:0B:4F:5E:00-g Channel: 6 Buffalo BuffaloWing_AME P F F F F F P F F F P P 33.33% 00:14:F1:AF:1B:94-g Channel: 7 Cisco QA-4402-1 P P P P P P P P P P P P 100.00% 00:0B:85:79:03:CF-g Channel: 11 Airespace QA-4402-1 P P P P P P P P F P P P 91.67% 00:12:44:B8:9C:32-g Channel: 5 Cisco QA-linksysN-jav P P P P P P P P P P P P 100.00% Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 00:1A:70:40:B3:C4-g Channel: 5 Cisco-linksys QA-linksysN-jav P P P P P P P P F P P P 91.67% 00:0F:34:A7:78:10-g Channel: 2 Cisco QACiscoVoice P P P P P P P P F P P P 91.67% 00:14:F1:AF:1B:93-g Channel: 7 Cisco QAVocera P P P P P P P P F P P P 91.67% 00:0B:86:8C:E3:05-g Channel: 10 Aruba QA-aruba6 P P P P P P P P F P P P 91.67% 00:12:44:B8:9C:31-g Channel: 5 Cisco QASpectralink1 P P P P P P P P F P P P 91.67% 00:0B:46:91:EA:72-g Channel: ? Cisco BuffaloWing_AME P P P P F P F F P F F P 58.33% 00:19:E3:FB:59:75-g Channel: 6 Apple ENG-AirPort-rm-1 P P P P P P P P F P P P 91.67% 00:14:F1:AF:1B:92-g Channel: 7 Cisco QAVOFI P P P P P P P P P P P P 100.00% 00:0B:86:8C:FE:05-g Channel: 10 Aruba QA-aruba6 P P P P P P P P F P P P 91.67% 00:0B:86:8C:E3:04-g Channel: 10 Aruba QA-aruba5 P P P P P P P P F P P P 91.67% 00:12:44:B8:9C:30-g Channel: 5 Cisco QACiscoVoice1 F F F P P P P P F F P P 58.33% Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 00:40:96:A1:96:4E-g Channel: ? Cisco BuffaloWing_AME P P P P P P P P P P P P 100.00% 00:02:6F:20:32:6A-g Channel: ? Senao compa P P P P P P P P P P P P 100.00% 00:0E:35:7F:4E:29-g Channel: ? Intel compa P P P P P P P P P P P P 100.00% 00:13:80:43:15:23-g Channel: ? Cisco AirMagnetGuest P P P P P P P P P P P P 100.00% 00:40:96:59:A9:39-g Channel: 6 Cisco QA-350-2 F F F P P P F P F P F P 50.00% 00:14:F1:AF:1B:91-g Channel: 7 Cisco QASpectralink P P P P P P P P F F P P 83.33% 00:0B:86:8C:FE:04-g Channel: 10 Aruba QA-aruba5 P P P P P P P P F P P P 91.67% 00:0B:86:8C:E3:03-g Channel: 10 Aruba QA-aruba4 P P P P P P P P F P P P 91.67% 00:13:80:43:15:22-g Channel: ? Cisco compa P P P P P P P P P P P P 100.00% 00:90:7A:04:F0:C4-g Channel: ? SpectraLink compa P P P P P P P P P P P P 100.00% 00:14:F1:AF:1B:90-g Channel: 7 Cisco QACiscoVoice F F F P P P P P F P P P 66.67% Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 00:0B:86:8C:FE:03-g Channel: 10 Aruba QA-aruba4 P P P P P P P P F P P P 91.67% 00:0B:86:8C:E3:02-g Channel: 10 Aruba QA-aruba3 P P P P P P P P F P P P 91.67% 00:13:80:43:11:55-g Channel: 1 Cisco QA-1200-7 F F F P P P P P F P P P 66.67% 00:19:5B:59:64:A6-g Channel: ? D-Link QA_linksys2 P P P P F P F F P P P P 75.00% 00:13:80:43:15:21-g Channel: ? Cisco QA_linksys2 P P P P P P P P P P P P 100.00% 00:14:A5:01:94:CD-g Channel: ? GemTek QA_linksys2 P P P P P P P P P P P P 100.00% 00:12:F0:AC:44:21-g Channel: 7 Intel QAVOFI P P P P P P P P P P P P 100.00% P P P P P P P P P P P P 100.00% 00:12:F0:95:67:4B-g Channel: ? Intel A&K P P P P P P P P P P P P 100.00% 00:13:02:E0:A9:47-g Channel: ? Intel Air2 P P P P P P P P P P P P 100.00% 00:A0:C5:B7:78:71-g Channel: ? Zyxel Air2 P P P P P P P P P P P P 100.00% 00:0F:B5:9B:77:D9-g Channel: ? A&K Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 00:0B:86:8C:FE:02-g Channel: 10 Aruba QA-aruba3 P P P P P P P P F P P P 91.67% 00:0B:86:8C:E3:01-g Channel: 10 Aruba QA-aruba2 P P P P P P P P F P P P 91.67% 00:13:80:43:11:54-g Channel: 1 Cisco QA-1200-32 F F F P P P P P F P P P 66.67% 00:18:4D:9E:85:48-g Channel: 1 Netgear NETGEAR108 P P P P P P P P F P P P 91.67% 00:13:80:43:15:20-g Channel: ? Cisco QA_linksys2 P P P P P P P P P P P P 100.00% 00:09:E8:B4:DB:76-g Channel: ? Cisco QACiscoVoice1 P P P P P P P P F P F P 83.33% 00:90:4B:C1:9E:6A-g Channel: ? GemTek QA_Lab_1200 P P P P F P F F F F F P 50.00% 00:0B:86:8C:FE:01-g Channel: 10 Aruba QA-aruba2 P P P P P P P P F P P P 91.67% 00:13:5F:F9:7F:00-g Channel: 10 Cisco compg P P P P P P P P F P P P 91.67% 00:0B:86:8C:E3:00-g Channel: 10 Aruba QA-aruba1 P P P P P P P P F P P P 91.67% 00:13:80:43:11:53-g Channel: 1 Cisco QA-1200-31 F F F P P P P P F P P P 66.67% Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 00:02:6F:20:19:DB-g Channel: ? Senao QACiscoVoice P P P P P P P P P P P P 100.00% 00:90:7A:04:3E:71-g Channel: 7 SpectraLink QASpectralink P P P P P P P P P P P P 100.00% 00:0E:35:4C:9F:08-g Channel: ? Intel QA_linksys2 P P P P P P P P P P P P 100.00% 00:16:6F:54:3C:95-g Channel: 7 Intel QAVOFI P P P P P P P P P P P P 100.00% 00:90:4B:72:B8:6D-g Channel: ? GemTek QA-1200-7 P P P P P P P P P P P P 100.00% 00:0B:86:8C:FE:00-g Channel: 10 Aruba QA-aruba1 P P P P P P P P F P P P 91.67% 00:13:80:43:11:52-g Channel: 1 Cisco QA-1200-30 P P P P P P P P F P P P 91.67% P P P P P P P P F P P P 91.67% 00:02:6F:20:18:85-g Channel: ? Senao QACiscoVoice P P P P P P P P P P P P 100.00% 00:0A:8A:47:DA:AD-g Channel: ? Cisco QACiscoVoice P P P P P P P P P P P P 100.00% 00:A0:C5:B7:70:19-g Channel: 2 Zyxel QABuf P P P P P P P P P P P P 100.00% 00:14:A8:53:4C:60-g Channel: 3 tech-1200 Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 00:11:5C:4D:E8:F1-g Channel: 8 Cisco AirMagnetGuest P P P P P P P P F P P P 91.67% 00:02:8A:A8:9A:15-g Channel: 11 Ambit QA-1200-26 P P P P P P P P P P P P 100.00% 00:13:80:43:11:51-g Channel: 1 Cisco QA-1200-26 P P P P P P P P F P P P 91.67% 00:16:6F:54:3C:A4-g Channel: ? Intel QACiscoVoice P P P P P P P P P P P P 100.00% 00:40:96:A3:BF:59-g Channel: ? Cisco QASpectralink P P P P P P P P P P P P 100.00% 00:13:5F:A1:D2:06-g Channel: ? Cisco QASpectralink P P P P P P P P P P P P 100.00% 00:11:5C:4D:E8:F0-g Channel: 8 Cisco Air2 F F F P P P P P F P P P 66.67% 00:0B:86:8A:B1:40-g Channel: 1 Aruba aruba-ap F F F P P P P P F P P P 66.67% 00:13:80:43:11:50-g Channel: 1 Cisco QA-1200-25 P P P P P P P P F P P P 91.67% 00:14:A5:01:95:84-g Channel: ? GemTek BuffaloWing_AME P P P P P P P P P P P P 100.00% 00:14:A5:54:85:52-g Channel: ? GemTek QACiscoVoice P P P P P P P P P P P P 100.00% Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 00:40:96:AB:51:C1-g Channel: ? Cisco QA-linksysN-jav P P P P P P P P P P P P 100.00% 00:90:4B:BD:FC:D6-g Channel: ? GemTek QA-linksysN-jav P P P P P P P P P P P P 100.00% 00:14:A5:35:30:F4-g Channel: 3 GemTek AirLinkMIMO P P P P P P P P F P P P 91.67% 00:40:96:59:B9:44-g Channel: 6 Cisco QA-350-2 P P P P P P F P F P F P 75.00% 00:02:8A:A3:09:20-g Channel: 3 Ambit Air2 P P P P P P P P P P P P 100.00% 00:02:6F:22:00:5D-g Channel: ? Senao QACiscoVoice P P P P P P P P P P P P 100.00% 00:0E:35:67:D7:DB-g Channel: ? Intel QACiscoVoice P P P P P P P P P P P P 100.00% 00:15:F9:41:C4:46-g Channel: 7 Cisco QACiscoVoice P P P P P P P P P P P P 100.00% 00:16:6F:C5:E3:78-g Channel: ? Intel AirMagnetGuest P P P P P P P P P P P P 100.00% P P P P P P P P P P P P 100.00% P P P P P P P P F P P P 91.67% 00:13:CE:C8:54:ED-g Channel: 4 AirMagnetGuest 00:11:5C:4D:E9:11-g Channel: 1 Cisco AirMagnetGuest Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM 00:14:A5:01:95:C6-g Channel: ? GemTek dd-wrt P P P P P P P P P P P P 100.00% 00:12:F0:41:FF:ED-g Channel: ? Intel dd-wrt P P P P P P P P P P P P 100.00% 00:14:A5:3C:C1:9F-g Channel: ? GemTek dd-wrt P P P P P P P P P P P P 100.00% 00:40:96:AF:31:64-g Channel: ? Cisco compa P P P P P P P P P P P P 100.00% 00:90:4B:BD:FD:2A-g Channel: ? GemTek compa P P P P P P P P P P P P 100.00% 00:11:5C:4D:E9:10-g Channel: 1 Cisco Air2 F F F P P P P P F P P P 66.67% 00:0B:86:AD:F0:95-g Channel: 10 Aruba QA-aruba6 P P P P P P P P P P P P 100.00% Notes: 1) Channel specific policy violations will not be included in the Device-Specific Compliance Report. 2) For further information on the Directive please visit http://www.dtic.mil/whs/directives/corres/html2/d81002x.htm Live Capture Location: P o we r e d by Ai r Ma g n e t Monday, July 30, 2007 5:39:09PM