Rogue Clients

Under Manage > Security > Rogue Clients, details are displayed for devices that are enabled with a wireless intrusion prevention system (WIPS) configuration that includes ad hoc network settings, and these devices detect wireless clients participating in an ad hoc network.

Note

Note

An ad hoc network (also referred to as an IBSS, or independent basis service set) consists of two or more wireless clients that communicate with each other directly instead of through an access point.

Devices can only detect rogue clients in an ad hoc network if the client is using the same channel as the device access radio, and if the device has background scanning enabled on that radio. View the table as follows:

A graph displays a colored timeline representing data captured for rogue clients within the specified time frame. You can change the time frame using the Time Range controls. Details about the data captured within this time frame are listed in the table below the graph.

Classify Rogue Clients

To classify rogue clients, select the check box for the client and then select Classify. From the drop-down list, select Neighbor, Removed, or Auto-classify.