This feature is available only for ExtremeWireless WiNG access points (APs) that have WIDS enabled.
Unsanctioned (rogue) access points are devices that are detected in a sanctioned radio coverage area but have not been deployed by the network administrator as a known device. Authorized access points and clients are generally known to the administrators and conform with the organization‘s security policies. Unsanctioned access points should be filtered to avoid jeopardizing the data within a managed network.
To monitor unsanctioned ExtremeWireless WiNG APs:
Threat Type | The classification of the AP as an unsanctioned device. |
BSSID | The Basic Service Set (BSS) that the unsanctioned access point belongs to. (A BSS is a set of stations that can communicate with one another.) Select the link to view further details for this unsanctioned access point. |
Security Type | The security type in use on the unsanctioned access point. |
SSID | The Service Set ID (SSID) of the network to which the detected unsanctioned access point belongs. |
Vendor | The manufacturer name for the unsanctioned access point. |
Last Seen Channel | The last channel on which the unsanctioned access point was detected. |
rss (dBm) | The signal strength of the detected unsanctioned access point. |
First Seen | The timestamp when this unsanctioned access point was first detected. |
Site | The tenant-managed site where this unsanctioned access point was discovered. |
Top Reporter | The user assigned name of the access point that reported this unsanctioned access point. |