Active Threats

The Active Threats report lists all currently detected threats. Active threats are devices that are being detected performing attacks on the authorized network. Threat APs are identified as APs that have been detected to be performing one or more types of attacks on the authorized network. The report only lists currently active threats, not historic threats. For more information, see Threat History.

Viewing Active Threats Scan Results

  1. From the top menu, click Reports.
  2. In the left pane, click Radar.
  3. Click Active Threats.
    Click to expand in new window
    Active Threats Report
    Graphics/active_threats.png
Click to expand in new window

Active Threats Report - Fields and Buttons

Field/Button Description
Detected Active At Date and time that the threat was identified.
Threat MAC Address MAC address of the device.
Threat Type of threat.
Threat Category For more information, see Security Threats.
Countermeasures Applied Indicates if a countermeasure has been applied.
Location - AP Name Name of the threat AP.
Location - RSS Threat AP Received Signal Strength (displayed in dBm).
Additional Details Details of the threat including frequency, SSID, and Rogue Threats.

Rogue threats details are accessed by clicking 3 dots “...” that display in the column. The following parameters display in the Rogue Details dialog:

Sent MAC address: Sent wireless test packet source MAC address.

Received MAC address: Received wired test packet source MAC address.

Sent IP address: Wireless test packet source IP address. This IP address is automatically assigned via DHCP (Dynamic Host Configuration Protocol) (DHCP is through the Rogue AP).

Received IP address: Wired test packet source IP address.

TTL difference: TTL (Time-To-Live or hop limit) difference between sent wireless test packet TTL and received wireless test packet TTL. For example, if the TTL of the sent wireless test packet is 64 and the TTL of the received wireless test packet is 62, then the TTL difference is 2 indicating the packet went through 2 hops.

Learned gateway: Wireless gateway IP address as specified from the DHCP server (DHCP is through the Rogue AP).

Modifying the Page's Refresh Rate:

  1. Type a time (in seconds) in the Refresh every __ seconds box at the top of the screen and click Apply. The new refresh rate is applied.
  2. To add a specific threat to the list of Friendly APs, select the threat and click Add to Friendly List.
  3. To refresh the page, click Refresh.
  4. To export a copy of the report in XML format, click Export.
  5. To close the report window, click Close.