| | connection loss |  | excessive collisions |  | |
| common RF issues | | | near/far problem |  | | |
| | hidden node |  | interference |  | |
| | interference type | | | narrowband |  | |
| | wideband |  | channel overlapping |  | |
| | interference source | ______________________________ | |
| | abnormal frames | ______________________________ | |
| excessive number of management / control frames |  | |
| | excessive frame type | ___ | excessive frame structure | ___ | |
| rogue APs | | AP1______________________ | | |
| AP3_______________________ | | AP2______________________ | | |
| rogue APs MACs | | AP1______________________ | | |
| AP3_______________________ | | AP2______________________ | | |
| rogue APs IPs | | AP1______________________ | | |
| AP3_______________________ | | AP2______________________ | | |
| rogue APs channels | | AP1______________________ | | |
| AP3_______________________ | | AP2______________________ | | |
| rogue APs ESSIDs | | AP1______________________ | | |
| AP3_______________________ | | AP2______________________ | | |
| rogue APs location | | AP1______________________ | | |
| AP3_______________________ | | AP2______________________ | | |
| rogue AP signal strength | | AP1______________________ | | |
| AP3_______________________ | | AP2______________________ | | |
| rogue APs use WEP | | AP1______________________ | | |
| AP3_______________________ | | AP2______________________ | | |
| rogue APs WEP keys | | AP1______________________ | | |
| AP3_______________________ | | AP2______________________ | | |
| rogue APs origin | | intentional |  | | |
| | unknown |  | unintentional |  | | |
| rogue access points have associated hosts |  |
| hosts associated (IP/MAC) | _____________________________________ |
| | _____________________________________ |
| | _____________________________________ |
| other rogue wireless hosts detected |  | | | | | |
| number of hosts | ___ | | | | | | | | | |
| MAC1 | _________________ | IP1 | __________________ |
| MAC2 | _________________ | IP2 | __________________ |
| MAC3 | _________________ | IP3 | __________________ |
| physically discovered rogue wireless devices | PCMCIA client card |  |
| USB wireless client |  | CF client card |  |
| | other | ______________________________ |
| Known signatures of wireless attack tools (version) | | | |
| | | Netstumbler | ___ | Dstumbler | ___ |
| | | Windows XP scan | ___ | Wellenreiter | ___ |
| | | Airjack | ___ | Fata_jack | ___ |
| | | FakeAP | ___ | Other | ___ |
| Man-in-the-middle attacks signs (Double MAC / IP addresses) |
| MiM1 | _______________________ | MiM2 | _______________________ |
| MiM3 | _______________________ | MiM4 | _______________________ |
| Out of sequence frames present (amount/time) | _____/_____ |
| Excessive deassociate frames |  | deauthenticate frames |  |
| | | time | ___ | amount | ___ |
| | | | | channel | ___ |
| Exsessive RF noise |  | strength | ___ |
| | | | | | | channel | ___ |
| Rogue DHCP servers present |  |
| | IP | ___________________ | MAC ____________________ |
| Atypical route advertisement (type/comments) |  | | | |
| Type ____________________ | Comments _______________ |
| Type __________________ | Comments _______________ | | | |
| Wireless DoS attack signs |  | | | | |
| Management/control frames flood |  | | | |
| frame types _______________ | origin MAC ________________ | | | |
| frame types _______________ | origin MAC ________________ | | | |
| frame types _______________ | origin MAC ________________ | | | |
| Out-of-sequence frames |  | | | |
| | origin MAC __________________________ | | | |
| Excessive RF noise |  | channel | ___ | | | |
| | jamming device discovered | ___ | strength | ___ | | | |
| | comments ____________________________________ | | | |
| High-layer DoS attack __________________________________ | | | |
| Comments ____________________________________________ | | | |
| High-layer DoS attack __________________________________ | | | |
| Comments ____________________________________________ | | | |
| Attacks against the access point detected _______________________________________ | | | |
| Comments ____________________________________________ | | | |
| brute-forcing attacks |  | via SNMP | ___ | | | |
| via SSH | | ___ | via telnet | ___ | | | |
| via other means | | ___ | via Web interface | ___ | | | |
| Attacks against wireless hosts detected |  | | | |
| Comments ____________________________________________ | | | |
| Attacks directed at the wired hosts from the WLAN _____________________________ | | | |
| Comments ____________________________________________ | | | |
Attacks directed at the hosts on the Internet  | | | |
| Comments ____________________________________________ | | | |
Attempts to send SPAM  | | | |
| Comments ____________________________________________ | | | |