Alerts and ActionsThresholds LibraryRogue Access Point MAC Address Threshold
Track devices using banned MAC addresses that behave like access points and broadcast SSIDs to wireless clients.
See access point masquerading and SSID collisions between new and obsoleted access points, IoT devices using private networks, and more.
Managing Rogue Access Point MAC Address Thresholds:
From the Thresholds Library in the WhatsUp Gold Alert Center Libraries view, you can perform the following Rogue Access Point MAC Address Threshold operations.
Add. Create a new Rogue Access Point MAC Address Threshold.
The threshold will alert when any MAC addresses listed here broadcast SSID's in the given time interval.
Track devices using banned MAC addresses that behave like access points and broadcast SSIDs to wireless clients. See access point masquerading and SSID collisions between new and obsoleted access points, IoT devices using private networks, and more.
Configure a Wireless Rogue Access Point MAC Addresses threshold:
Automatically resolve items no longer out of threshold. Select this option if you want Alert Center to automatically resolve items when they return to the value within the threshold limit.
Note: Notification policies are optional for most thresholds. If you do not select a notification policy, no notifications are generated for the threshold, but a dashboard report listing the out of threshold items still appears on the Alert Center Home page.
Add Condition Rules:
Exclude Devices. Select to build or apply an exclusion list.
Note: Configure the threshold check interval for a longer time than the sampling interval for thresholds relating to trends, such as percent utilization. Configure it for a time the same as (or similar to) the sampling interval when configuring a threshold for a health check.
Tip: Avoid setting the threshold check interval to a very short time. Aggressive intervals can degrade system performance. In general, setting the threshold check interval to less than five minutes is not advised.
Edit. Adjust, tune, and configure an existing Rogue Access Point MAC Address Threshold.
The threshold will alert when any MAC addresses listed here broadcast SSID's in the given time interval.
Track devices using banned MAC addresses that behave like access points and broadcast SSIDs to wireless clients. See access point masquerading and SSID collisions between new and obsoleted access points, IoT devices using private networks, and more.
Configure a Wireless Rogue Access Point MAC Addresses threshold:
Automatically resolve items no longer out of threshold. Select this option if you want Alert Center to automatically resolve items when they return to the value within the threshold limit.
Note: Notification policies are optional for most thresholds. If you do not select a notification policy, no notifications are generated for the threshold, but a dashboard report listing the out of threshold items still appears on the Alert Center Home page.
Add Condition Rules:
Exclude Devices. Select to build or apply an exclusion list.
Note: Configure the threshold check interval for a longer time than the sampling interval for thresholds relating to trends, such as percent utilization. Configure it for a time the same as (or similar to) the sampling interval when configuring a threshold for a health check.
Tip: Avoid setting the threshold check interval to a very short time. Aggressive intervals can degrade system performance. In general, setting the threshold check interval to less than five minutes is not advised.
Copy. Clone a new Rogue Access Point MAC Address Threshold based on an existing Rogue Access Point MAC Address Threshold's configuration.
Clone a threshold based on a custom or built-in configuration:
The Edit Rogue Access Point MAC Address Threshold dialog displays.
Delete. Remove Rogue Access Point MAC Address Threshold from library.
Delete an existing Rogue Access Point MAC Address Threshold:
The Rogue Access Point MAC Address Threshold configuration is deleted.
See Also Interface Errors and Discard Threshold Conversation Partners Threshold Network Traffic Analysis Custom Threshold Suspicious Connections Threshold Device Over Subscription Threshold |