User's Manual Part 4

Access / One
®
Network
Managing the Network 123
5
Rogue Monitor
The Rogue Monitor provides a snapshot in table form of all rogue devices detected
on a selected subnet.
Figure 99. Rogue Monitor
Although the displayed data is different, the organization of tables in all monitors is
the same. For information about how to define the sort criteria within the Rogue
Monitor table, see Figure 94. And similar to the Network Connect Monitor and the
Wireless Client Query Monitor, the Rogue Monitor also includes the information
button (i ) in the top right corner of the window. Clicking on this button generates
the RSSI Legend pop-up window (see Figure 96).
Scan
Use this command if you want to initiate an active scan for rogue devices. Active
scans can take up to one minute to complete and network traffic will be disrupted
during the scanning process. Results from the scan are reported in the Rogue
Monitor table (see Figure 99).
Ignore All
Use this command to refresh the Rogue Monitor table with all detected rogue
devices ignored. All ignored devices are grayed out.
Include All
Use this command to refresh the Rogue Monitor table with all detected rogue
devices included.

Summary of content (50 pages)