User's Guide

Wireless Array
152 Viewing Status on the Wireless Array
These tables provide detailed information about how your wireless bandwidth is
being used. There are tables for Station Traffic and/or Array Management
Tr aff i c, depending on which checkboxes you selected. Similarly, there are tables
for By Application and/or By Category, depending on your selections.
In addition to showing traffic statistics, there are two unique and highly useful
columns. Risk estimates the likelihood of an application causing problems for
your business, such as a file-sharing utility introducing viruses or exposing you to
legal problems. Risk is rated from 1 (low risk, e.g., Google) to 5 (high risk, e.g.,
BitTorrent). Risky applications (rated at 4 or 5) are flagged for your attention by
highlighting the entry in pale red. Productivity estimates the value of an activity
to your business, from 1 (unproductive, e.g., Y8 gaming site) to 5 (productive, e.g.,
WebEx).
You may click the heading of any column to sort based on that column. Click
again to sort in the reverse order. For instance, sort on Risk to find problem
applications, or sort on Productivity to find applications that should be given
increased or decreased handling priority.
When you find risky or unproductive applications taking up bandwidth on the
network, you can easily create Filters to control them. See “Filter Management”
on page 354. You may use filters to:
z
Block problematic traffic, such as BitTorrent or Y8.
z
Prioritize mission critical traffic—by increasing the QoS assigned to the
traffic. See “Understanding QoS Priority on the Wireless Array” on
page 247.
z
Lower the priority of less productive traffic—use filters to decrease the
QoS assigned to traffic for applications like YouTube and Facebook.