BSS Drop-down Menu

The BSS drop-down menu contains functions that you can apply to the selected BSS. Click the drop-down menu button next to the BSS name to display the drop-down menu.
Click to expand in new window

The drop-down menu for BSSs contains the following functions:

Function Description

Alarms

Accesses the Alarms tab where you can view the alarms for the selected BSS. See WLAN Profiles

Properties

Opens the Properties overlay for the selected BSS.

Rename

Opens a dialog window to rename the selected BSS.

Remove

Removes the selected BSS from your network. (See WLAN Profiles for more information.)

Classification

Classifies the BSS using one of the following classifications:

  • Sanctioned (inherit)—Classify the selected BSS as a sanctioned device that inherits its traits from wherever its location in the network tree.
  • Sanctioned (override)—Classify the selected BSS as a sanctioned device using traits that override the inherited traits. For example, a security profile can be applied to a BSS that overrides the inherited traits. When using this classification, select the profile and click the Apply link.
  • Unsanctioned— Classify the selected BSS as unsanctioned.
  • Neighboring—Classify the selected BSS as a neighboring device.

Action Details

Displays a table listing specific actions that are occurring to devices seen on your WLAN.

Forensic Analysis

Opens the Forensic Analysis-Basic window for the specified BSS.

Locate

Opens the device Location tracking window so that you can quickly locate the selected BSS.

Live View

Opens the Live View window for the selected BSS; allows you to analyze current WLAN activity on the device.

Port Lookup

Opens the Port Lookup window where you can locate the physical port where the BSS is accessing your network.

Terminate

Opens the Termination options so that you can terminate the connection of the BSS to your network.

AP Test

Tracks network failures from an automated or manual AP connectivity test. (See Scheduled AP Tests for more information.)

Wireless Vulnerability Assessment

Opens the Vulnerability Assessment window so that you can scan your wireless network for vulnerabilities. (See On-Demand Vulnerability Assessment for more information.)

Copy MAC

Copies the MAC address of the selected BSS for later use.