The BSS tab displays a list of all Basic Service Sets (BSSs), sanctioned or otherwise, that were discovered by Extreme AirDefense in your network during regular scans.
The BSS table displays the following information:
Field |
Description |
---|---|
Flag |
Select the |
Device |
This column displays the device type icon and its name. Hover on the name to display more details about the device in a pop-up. The following image is a pop up that displays on hover. ![]() ![]() Select the MAC address of the device to view its details in a separate window. |
Severity |
This column displays the device's threat level to your network. Hover on this value to display a threat score for this device.
![]() ![]() |
Last Seen |
This column displays the date and time this device was last seen on the network. |
Channel |
This column displays the channel and the frequency on which this device was identified. |
Signal Strength |
This column displays the signal strength for this device. |
SSID |
This column displays the SSID of the network to which this device is adopted to. |
Rogue |
This column indicates if a device has been
flagged as a Rogue
device. All rogue devices are flagged with
this |
Select a device in the table to display a right-panel details window that includes the following columns:
Parameter | Value |
---|---|
Device Name | Displays the name of the device. |
Description | Displays a description of the device. |
Annotations | |
MAC | Displays the MAC Address for the device. |
Random MAC | Indicates whether the device is using Random MAC (yes) or not (no). |
Observed | |
First Seen | Displays date device was first seen on the network. |
Last Seen | Displays date device was last seen on the network. |
Supported b/g Channels | |
Available Rates | |
Associated AP | |
Capabilities | |
Noise | |
Channel | |
Associated Wireless Clients | |
Polled First Seen | |
Polled Last Seen | |
Sensed Authentication | |
Sensed Encryption | |
Reported SSID(s) | Displays the SSID for the device. |
Reported IP | Displays the device's IP Address |
Primary Sensor | Displays the name of the primary sensor. |
Signal Strength | Displays the signal strength of the device. |
Protocols | |
Terminating | Indicates whether the device is terminating (yes) or not (no). |
Vendor | Displays name of the device's vendor. |
By default, only few columns are displayed in the table. Depending on the context, additional fields can be manually added to the table.
To add/remove table columns,
select the icon to
the left of any column header. The following drop-down list
displays.
Select the Filter item to filter your data. This option might not be available for all screens. When this option is available, use the available filter criteria to filter the data displayed in the screen.
Select the Columns item to view a list of columns that can be added to the table.
The following table lists the additional columns that can be added to the table.
Field |
Description |
---|---|
Name |
This column displays the name of the device if configured. |
IP |
This column displays the IP address assigned to this device. |
MAC |
This column displays the MAC address of the device. |
First Seen |
This column displays the date and time this device was first seen on the network. |
Scope |
This column displays the name of the site/location where this device is located as identified by Extreme AirDefense. |
Floor |
This column displays the floor number (in the site/location) where this device is located as identified Extreme AirDefense. |
Manufacturer |
This column displays the name of the manufacturer of the device. |
Classification |
This column displays the device's classification as classified by Extreme AirDefense. A device can be classified as Sanctioned (Inherit Profile), Unsanctioned, Neighboring, or Sanctioned (Assigned Profile). You can manually set a
device's classification from the |
Sensed Authentication |
This column displays the authentication scheme the device uses to authenticate. |
Sensed Encryption |
This column displays the encryption scheme used by the device if any. |
Protocols |
This column displays the various wireless protocols supported by the device. |
Device Actions |
This column indicates if any of the following actions have taken place:
|
Associated Clients |
This column displays the number of clients that are associated with the device. |
Access Points |
This column displays the name of the access point that sees this device. |
Sensor |
This column displays the name of the sensor that sees this device. |
Security Policy |
This column displays the security policy, if any, applied to this device. |
The following actions can be performed on a each device listed in
the table. Select the icon to display the list
of actions that can be performed. The actions that can be
performed are different for the different device types.
Action |
Description |
---|---|
Alarms |
Displays the Alarms for the device. When selected, the alarms for this device are displayed in the Alarms screen |
Rename |
Select this menu item to rename this device. Use this menu item to configure a meaningful name for this device. A small window displays. Use this Rename window to provide a name for this device. ![]() ![]() |
Remove |
Select this menu item to remove the device. A small confirmation window displays. Select Yes to remove the device. Select No to exit without removing the device. ![]() ![]() |
Classification |
Use this menu item to classify the device into one of Sanctioned (Inherit profiles), Unsanctioned, Neighboring, and Sanctioned (Assigned Profiles). ![]() ![]() The Sanctioned (Assigned Profiles) menu item expands to show a list of available profiles that can be assigned to this device. |
Action Details |
Select the Action Details menu item to view a table listing specific actions occurring on the device. |
Forensic Analysis |
Use the Forensic Analysis menu item to analyze the device and provide detailed information on the device. Forensic Analysis returns the threat level of the device, device alarms, and device association details about the device. |
Generate Tracker File |
Allows you to generate tracker files and save the files to a directory on your computer. |
Locate |
Use the Locate menu item to locate this device on your network. This opens the Location Tracking window from where you can track the device. |
Live View |
The Live View menu item displays the Live View window for the device where you can view the device's live status and other parameters. ![]() ![]() |
Port Lookup (Find this Device) |
Use the Port Lookup menu item to scan for and locate this device, in your network, using its MAC address. |
Terminate |
Use the Terminate menu item to open the Termination options window from where you can terminate this device. |
AP Test |
Use the AP Test action to track network failures from an automated or manual AP connectivity test. |
Wireless Vulnerability Assessment |
Use the Wireless Vulnerability Assessment window to scan your wireless network for vulnerabilities. |
Copy MAC |
The Copy MAC menu item is an ease of use feature and enables you to copy the MAC address of the device in hexadecimal or colon hexadecimal notation. Click this menu item to expand it and view MAC formats that can be copied. ![]() ![]() Select the MAC format to copy to your PC's clipboard. |