474
C
HAPTER
11: D
ETECTING
AND
C
OMBATTING
R
OGUE
D
EVICES
The rogue details section contains the following tabs:
■
Activity Log
— Lists activity (appearance or disappearance) of the
rogue selected in the rogue list
The entries in the Activity Log tab come from either of the following
sources:
■
Trap data received from the seed WX switch of the Mobility
Domain where the rogue was detected or from which it
subsequently disappeared
■
The monitoring service itself, if the service detects the appearance
or disappearance of the rogue when compared to the previous set
of rogue data received from the seed WX switch.
■
Current, Current Hour, Current Day, and History
— List rogues
detected during the most-recent polling interval, the most-recent
hour, the most-recent day, or detected farther back in the past.
The monitoring service keeps events in a circular log. Once the log
becomes full, the monitoring service purges old entries to make room for
new ones. However, the service never purges the entries for the first
appearance and first disappearance of a rogue.
3WXM client receives rogue information from the 3WXM monitoring
service. For the client to receive the information, the Enable Rogue
Detection option must be enabled on the Monitoring Settings tab of the
monitoring service, and SNMP traps for the monitored WX switches must
be enabled. In addition, the seed WX switch of each Mobility Domain you
want to monitor in the network plan must be in the Monitored WXs list
of the monitoring service. (See “Changing Monitoring Service
Preferences” on page 535.)
Summary of Contents for 3CRWX120695A
Page 14: ......
Page 18: ...18 ABOUT THIS GUIDE...
Page 33: ...Uninstalling 3WXM 33...
Page 34: ...34 CHAPTER 1 INSTALLING 3WXM...
Page 243: ...Configuring IP Services 243 2 Click New IP Alias The Create IP Alias dialog box appears...
Page 290: ...290 CHAPTER 6 CONFIGURING WIRELESS PARAMETERS...
Page 410: ...410 CHAPTER 9 MANAGING CERTIFICATES...
Page 468: ...468 CHAPTER 10 MONITORING THE NETWORK...
Page 482: ...482 CHAPTER 11 DETECTING AND COMBATTING ROGUE DEVICES...
Page 498: ...498 CHAPTER 12 GENERATING REPORTS...
Page 500: ...500 APPENDIX A USING 3WXM WITH HP OPENVIEW...
Page 516: ...516 APPENDIX B CHANGING 3WXM PREFERENCES...
Page 534: ...534 APPENDIX C 3WXM VERIFICATION RULES...
Page 560: ...560 APPENDIX D CHANGING MONITORING SERVICE PREFERENCES...