H3c-technologies H3C Intelligent Management Center User Manual Page 430

  • Download
  • Add to my manuals
  • Print
  • Page
    / 751
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 429
408
{ Channel with Max Signal Strength—Channel in which the rogue AP was last detected with
the maximum signal strength.
{ Attacked Status—Whether the rogue AP has been attacked by the AC. If yes, the value is
Attacked. If not, the value is Not Attacked.
{ Crypto—Whether the rogue AP is providing encrypted wireless network service. If yes, the
value is Yes. If not, the value is No.
Information of Detected AP
{ Detected by—Detector AP that detected the rogue AP. To view detailed information about the
detector AP, click the detector AP link. For field descriptions of the AP's detailed information,
see "6 Managing Comware-based access controllers."
{ First Discovered at—First time the detector AP detected the rogue AP.
{ Last Discovered at—Last time the detector AP detected the rogue AP.
{ Signal Strength—Signal strength of the rogue AP.
{ Channel— Channel in which the rogue AP provides wireless network service.
{ Attacked Status—Whether the detector AP has attacked the rogue AP. If yes, the value is
Attacked. If not, the value is Not Attacked.
{ Radio ID—Radio that detected the rogue AP.
Location
{ Location—Location view that the rogue AP is on. To view the devices on a location view,
click the location link.
{ Open Topology—Open the topology to which the rogue AP belongs. To view the location of
the rogue AP on the topology, click the icon.
NOTE:
The Location area is displayed only when the detector AP is added to a location view. For
information about how to add an AP to a location view, see "Adding APs to a location view or
sub-l
ocation view."
Action
{ Refresh—Refresh the rogue AP and detector AP information.
{ Add to Attack List—Add the rogue AP to the MAC-to-attack list. For more information on
using this action, see "Adding Comware-based rogue APs to the MAC-to-attack list."
{ Remove from Attack List—From the MAC-to-attack list, remove the rogue AP. For more
information on using this action, see "Removing Comware-based rogue APs from the MAC-
to
-attack list."
{ Add to Permit List—Add the rogue AP to the permitted-MAC address list. For more
information on using this action, see "Adding Comware-based rogue APs to the permitted-
MA
C address list."
Adding Comware-based rogue APs to the MAC-to-attack list
You can have a Comware-based rogue AP attacked by the AC by adding the MAC address of the
rogue AP to the MAC-to-attack list.
Page view 429
1 2 ... 425 426 427 428 429 430 431 432 433 434 435 ... 750 751

Comments to this Manuals

No comments