
The detected device information is displayed in Device Detection Information. Table 2 describes the parameters.

Parameter |
Description |
|---|---|
MAC Address |
MAC address of the device. |
Device Model |
- |
SSID |
SSID of the device. |
Channel |
Channel used by the device. |
Number of Detected APs |
Number of APs that detect the device. |
Discovered At |
Time when the device is detected. |
| Containment Status | Whether the rogue device is contained. |
| Containment Reason | Reason for the device to be contained. |
| Operation | Manual containment. |

Parameter |
Description |
|---|---|
AP ID |
ID of the AP that detects the device. |
AP Name |
Name of the AP that detects the device. |
| MAC Address |
MAC address of the AP that detects the device. |
AP Group |
AP group to which the AP that detects the device belongs. |
IP Address |
IP address of the AP that detects the device. |
RSSI of Detected Device |
RSSI of the detected device. |

Parameter |
Description |
|---|---|
Flood attack |
Number of flood attacks, including the following types of attacks:
|
Weak IV attack |
Number of weak IV attacks. |
Spoofing attack |
Number of spoofing attacks, including the following types of attacks:
|
Brute force cracking |
Number of brute force cracking attacks, including the following types of attacks:
|

Parameter |
Description |
|---|---|
MAC Address |
MAC address of the attacking device. |
Channel |
Channel used by the attacking device. |
RSSI |
RSSI of the attacking device. |
Monitor AP |
Name of the AP that detects attacks. |
First DetectionTime |
Time when attacks are detected. |
By default, information about the active attacks is displayed. You can click Historical Attack to check historical attack detection records.
