Wireless Clients

The Wireless Client tab displays a list of wireless clients, sanctioned or otherwise, that were discovered by Extreme AirDefense in your network during regular scans.

Click to expand in new window
The Wireless Clients tab displays a set of widgets on top of the display area. These widgets are:

The Wireless Clients table displays the following information:

Field

Description

Flag

Select the icon to indicate that this device is considered to be of interest. The flag changes to .

Device

This column displays the device type icon and its name. Hover on the name to display more details about the device in a pop-up. The following image is a pop up that displays on hover.

Click to expand in new window

Select the MAC address of the device to view its details in a separate window.

Severity

This column displays the device's threat level to your network. Hover on this value to display a threat score for this device.

  • indicates a severity level of Severe which is higher than the level Critical.

  • indicates a severity level of Critical.

  • indicates a severity level of Major.

  • indicates a severity level of Minor.

  • indicates the site/location is Safe.

Click to expand in new window

Last Seen

This column displays the date and time this device was last seen on the network.

Channel

This column displays the channel and the frequency on which this device was identified.

Signal Strength

This column displays the signal strength for this device.

SSID

This column displays the SSID of the network to which this device is adopted to.

Client Type

This column displays the device's client type as classified by Extreme AirDefense. Client Type can be one of the following types:
  • Categorized Device

  • Scanner

  • Employee Personal Device

  • Guest WiFi User

  • Laptop

  • Phone

  • Tablet

  • Loyalty Customer

  • In Store Customer

  • Potential Customer

Rogue

This column indicates if a device has been flagged as a Rogue device. All rogue devices are flagged with this icon.

Associated BSS

This column displays the BSS this wireless client is associated with.

Select a device in the table to display a right-panel details window that includes the following columns:

Table 1.

Parameter

Value

Device Name

Displays the name of the device.

Description

Displays a description of the device.

Annotations

MAC

Displays the MAC Address for the device.

Random MAC

Indicates whether the device is using random MAC (yes) or not (no).

Observed

Ad-Hoc

First Seen

Displays the date the device was first seen on the network

Last Seen

Displays the date the device was last seen on the network.

Polled Authentication

Polled Encryption

Sensed Authentication

Sensed Encryption

Reported SSID

Displays the SSID for the device.

Reported IP

Displays the device's IP Address

Protocols

Noise

Signal Strength

Displays the signal strength of the device.

Channel

Terminating

Indicates whether the device is terminating (yes) or not (no).

VLAN

Vendor

Displays the name of the vendor of the device.

By default, only few columns are displayed in the table. Depending on the context, additional fields can be manually added to the table.

To add/remove table columns, select the icon to the left of any column header. The following drop-down list displays.

Click to expand in new window

Select the Filter item to filter your data. This option might not be available for all screens. When this option is available, use the available filter criteria to filter the data displayed in the screen.

Select the Columns item to view a list of columns that can be added to the table.

The following table lists the additional columns that can be added to the table.

Field

Description

Name

This column displays the name of the device if configured.

MAC

This column displays the MAC address of the device.

IP

This column displays the IP address assigned to this device.

First Seen

This column displays the date and time this device was first seen on the network.

Scope

This column displays the name of the site/location where this device is located as identified by Extreme AirDefense.

Floor

This column displays the floor number (in the site/location) where this device is located as identified Extreme AirDefense.

802.1x Name

Displays the 802.1x name of the device.

Manufacturer

This column displays the name of the manufacturer of the device.

Classification

This column displays the device's classification as classified by Extreme AirDefense. A device can be classified as Sanctioned (Inherit Profile), Unsanctioned, Neighboring, or Sanctioned (Assigned Profile).

You can manually set a device's classification from the > Classification menu item from within the table.

Sensed Authentication

This column displays the authentication scheme the device uses to authenticate.

Sensed Encryption

This column displays the encryption scheme used by the device if any.

Polled Authentication

This column displays the polled authentication for this device.

Polled Encryption

This column displays the polled encryption scheme for this device.

Protocols

This column displays the various wireless protocols supported by the device.

Device Actions

This column indicates if any of the following actions have taken place:

  • AP Test

  • Wireless Vulnerability Assessment

  • Termination

  • Dedicated Spectrum Analysis

  • Inline Spectrum Analysis

Access Points

This column displays the name of the access point that sees this device.

Sensor

This column displays the name of the sensor that sees this device.

Security Policy

This column displays the security policy, if any, applied to this device.

Device Actions

The following actions can be performed on a each device listed in the table. Select the icon to display the list of actions that can be performed. The actions that can be performed are different for the different device types.

Action

Description

Alarms

Displays the Alarms for the device. When selected, the alarms for this device are displayed in the Alarms screen

Rename

Select this menu item to rename this device. Use this menu item to configure a meaningful name for this device. A small window displays. Use this Rename window to provide a name for this device.

Click to expand in new window

Remove

Select this menu item to remove the device. A small confirmation window displays. Select Yes to remove the device. Select No to exit without removing the device.

Click to expand in new window

Classification

Use this menu item to classify the device into one of Sanctioned (Inherit profiles), Unsanctioned, Neighboring, and Sanctioned (Assigned Profiles).

Click to expand in new window

The Sanctioned (Assigned Profiles) menu item expands to show a list of available profiles that can be assigned to this device.

Client Type

Use this menu item to select the device's correct client type when the device has not been automatically classified by Extreme AirDefense. Client Type can be one of the following types:
  • Categorized Device

  • Scanner

  • Employee Personal Device

  • Guest WiFi User

  • Laptop

  • Phone

  • Tablet

  • Loyalty Customer

  • In Store Customer

  • Potential Customer

Action Details

Select the Action Details menu item to view a table listing specific actions occurring on the device.

Add to ACL

Use this menu item to add this device to the Access Control List.

Connection Troubleshooting

Use this menu to troubleshoot this device's ability to connect to your network. This opens the Troubleshoot Device screen in a new browser tab.

Forensic Analysis

Use the Forensic Analysis menu item to analyze the device and provide detailed information on the device. Forensic Analysis returns the threat level of the device, device alarms, and device association details about the device.

Locate

Use the Locate menu item to locate this device on your network. This opens the Location Tracking window from where you can track the device.

Live View

The Live View menu item displays the Live View window for the device where you can view the device's live status and other parameters.

Click to expand in new window

Port Lookup (Find this Device)

Use the Port Lookup menu item to scan for and locate this device, in your network, using its MAC address.

Terminate

Use the Terminate menu item to open the Termination options window from where you can terminate this device.

Copy MAC

The Copy MAC menu item is an ease of use feature and enables you to copy the MAC address of the device in hexadecimal or colon hexadecimal notation. Click this menu item to expand it and view MAC formats that can be copied.

Click to expand in new window

Select the MAC format to copy to your PC's clipboard.