Rogue Clients

Under Manage > Security > Rogue Clients, a table displays details for devices that are enabled with a wireless intrusion prevention system (WIPS) configuration that includes ad hoc network settings. These devices detect wireless clients participating in an ad hoc network.

Note

Note

An ad hoc network (also referred to as an IBSS, or independent basis service set) consists of two or more wireless clients that communicate with each other directly instead of through an access point.

Devices can only detect rogue clients in an ad hoc network if the client uses the same channel as the device access radio, and if the device has background scanning enabled on that radio. View the table as follows:

A graph displays a colored timeline representing data captured for rogue clients within the specified time frame. You can change the time frame using the Time Range controls. For more information, see Set the Time Frame for Captured Data Displays and Reports. Details about the data captured within this time frame are listed in the table below the graph.

The Rogue Clients table displays all of the rogue clients that have been detected in your network. Select the Rogue checkbox to list in-net rogues. Select the Unauthorized checkbox to list unauthorized rogues, or the rogues that have been removed from your network.

The table has variable-width columns to display longer entries. Select and drag the right edge of any column left or right to change the column width. Some columns are sortable; select the column heading to sort column entries. By default, this table displays the following information:

Classify Rogue Clients

To classify rogue clients, select the check box for the client and then select Classify. From the drop-down list, select Neighbor, Removed, or Auto-classify.