Using the Rogue Detection Screen
467
Ad-hoc clients
—Wireless clients who are configured to communicate
wirelessly outside of the network infrastructure. Ad-hoc clients are not
necessarily malicious, but they do steal bandwidth from your
infrastructure users.
Ad-hoc clients are further categorized into rogues and interfering
devices. The word
Rogue
or
Interfering
appears in parentheses next to
the word
Ad-hoc
.
By default, all these entry types are displayed.
3
Select the period by which you want to filter the list from the Filter By listbox:
Current—Lists the rogues detected during the most-recent polling
interval. Go to step 5.
Current Hour—Lists the rogues detected during the most-recent hour.
Go to step 5.
Current Day—Lists the rogues detected during the most-recent day.
Go to step 5.
History—Lists the rogues detected during a specific date range. Go to
step 4.
4
To change the start and end dates for the History interval, edit the values
in the boxes or click on the down arrows next to From and To to display
calendars and select the dates.
5
Click
Apply
. 3WXM replaces the rogue list with the set of rogues
detected during the period you selected.
Displaying Rogue
Details
To display details for a rogue, select the rogue in the rogue list. Details
are displayed in the tabs in the right portion of the Rogue Detection tab.
Current, Current Hour, Current Day, and History Tabs
The Current, Current Hour, Current Day, and History tabs show rogues
detected in the past.
Current
— Lists the rogues observed during the most-recent polling
intervals.
Current Hour
— Lists the rogues observed during the most-recent
hour.
Current Day
— Lists the rogues observed during the most-recent day.
History
— Lists the rogues observed during the most-recent 30-day
period.
Summary of Contents for OfficeConnect WX1200
Page 16: ......
Page 48: ...48 CHAPTER 2 WORKING WITH THE 3WXM USER INTERFACE ...
Page 236: ...236 CHAPTER 6 CONFIGURING WX SYSTEM PARAMETERS ...
Page 288: ...288 CHAPTER 7 CONFIGURING WIRELESS PARAMETERS ...
Page 332: ...332 CHAPTER 8 CONFIGURING AUTHENTICATION AUTHORIZATION AND ACCOUNTING PARAMETERS ...
Page 364: ...364 CHAPTER 10 MANAGING WX SYSTEM IMAGES AND CONFIGURATIONS ...
Page 476: ...476 CHAPTER 17 DETECTING AND COMBATTING ROGUE DEVICES ...
Page 492: ...492 CHAPTER A CHANGING 3WXM PREFERENCES ...
Page 514: ...514 APPENDIX C OBTAINING SUPPORT FOR YOUR 3COM PRODUCTS ...
Page 520: ...520 INDEX ...