The detected device information is displayed in Device Detection Information. Table 2 describes the parameters.
Parameter |
Description |
---|---|
MAC Address |
MAC address of the device. |
Device Model |
- |
SSID |
SSID of the device. |
Channel |
Channel used by the device. |
Number of Detected APs |
Number of APs that detect the device. |
Discovered At |
Time when the device is detected. |
Containment Status | Whether the rogue device is contained. |
Containment Reason | Reason for the device to be contained. |
Operation | Manual containment. |
Parameter |
Description |
---|---|
AP ID |
ID of the AP that detects the device. |
AP Name |
Name of the AP that detects the device. |
MAC Address |
MAC address of the AP that detects the device. |
AP Group |
AP group to which the AP that detects the device belongs. |
IP Address |
IP address of the AP that detects the device. |
RSSI of Detected Device |
RSSI of the detected device. |
Parameter |
Description |
---|---|
Flood attack |
Number of flood attacks, including the following types of attacks:
|
Weak IV attack |
Number of weak IV attacks. |
Spoofing attack |
Number of spoofing attacks, including the following types of attacks:
|
Brute force cracking |
Number of brute force cracking attacks, including the following types of attacks:
|
Parameter |
Description |
---|---|
MAC Address |
MAC address of the attacking device. |
Channel |
Channel used by the attacking device. |
RSSI |
RSSI of the attacking device. |
Monitor AP |
Name of the AP that detects attacks. |
First DetectionTime |
Time when attacks are detected. |
By default, information about the active attacks is displayed. You can click Historical Attack to check historical attack detection records.