Under Manage > Security > Rogue Clients, a table displays details for devices that are enabled with a wireless intrusion prevention system (WIPS) configuration that includes ad hoc network settings. These devices detect wireless clients participating in an ad hoc network.
Note
An ad hoc network (also referred to as an IBSS, or independent basis service set) consists of two or more wireless clients that communicate with each other directly instead of through an access point.Devices can only detect rogue clients in an ad hoc network if the client uses the same channel as the device access radio, and if the device has background scanning enabled on that radio. View the table as follows:
A graph displays a colored timeline representing data captured for rogue clients within the specified time frame. You can change the time frame using the Time Range controls. For more information, see Set the Time Frame for Captured Data Displays and Reports. Details about the data captured within this time frame are listed in the table below the graph.
The Rogue Clients table displays all of the rogue clients that have been detected in your network. Select the Rogue check box to list in-net rogues. Select the Unauthorized check box to list unauthorized rogues, or the rogues that have been removed from your network.
To classify rogue clients, select the check box for the client and then select Classify. From the drop-down list, select Neighbor, Removed, or Auto-classify.