Using the Client Monitor Window
423
Table 33
Client Activity Columns When Scope Is a Mobility Domain
Column
Description
Scope
Scope of the data displayed in the row. The scope for each
row in the Client Activity tab is always a WX switch.
The down arrow in front of the WX switch name indicates
that you can double-click on the arrow to change the
scope in the Status Summary and Explore windows, to
display information specifically for this switch in those
windows.
Authentication Failures Number of times authentication for a client failed.
Common causes of authentication failures include the
following:
■
User glob or MAC address glob mismatch or Unknown
user
■
Invalid password
■
RADIUS server timeout
Authorization Failures
Number of times authorization for a client who has been
authenticated failed. Common causes of authorization
failures include the following:
■
Time-of-day, start-date, or end-date attributes do not
allow access on the date and time the client is
requesting it.
■
The VLAN the client is assigned to cannot be found.
Association Failures
Number of times a 3Com radio refused a client’s
association request. Common causes of association
failures include the following:
■
The encryption cipher requested by the client is not
enabled or not supported on the radio.
■
A static WEP key is required but the client did not
present the correct key.
■
Session load balancing is enabled on the MAP and the
MAP’s maximum session count has already been
reached.
■
The client is requesting a different SSID than the one
for which they have been authenticated and are
authorized.
■
The client is already associated with the radio.
Summary of Contents for 3CRWX120695A
Page 14: ......
Page 18: ...18 ABOUT THIS GUIDE...
Page 33: ...Uninstalling 3WXM 33...
Page 34: ...34 CHAPTER 1 INSTALLING 3WXM...
Page 243: ...Configuring IP Services 243 2 Click New IP Alias The Create IP Alias dialog box appears...
Page 290: ...290 CHAPTER 6 CONFIGURING WIRELESS PARAMETERS...
Page 410: ...410 CHAPTER 9 MANAGING CERTIFICATES...
Page 468: ...468 CHAPTER 10 MONITORING THE NETWORK...
Page 482: ...482 CHAPTER 11 DETECTING AND COMBATTING ROGUE DEVICES...
Page 498: ...498 CHAPTER 12 GENERATING REPORTS...
Page 500: ...500 APPENDIX A USING 3WXM WITH HP OPENVIEW...
Page 516: ...516 APPENDIX B CHANGING 3WXM PREFERENCES...
Page 534: ...534 APPENDIX C 3WXM VERIFICATION RULES...
Page 560: ...560 APPENDIX D CHANGING MONITORING SERVICE PREFERENCES...