EasyManua.ls Logo

Motorola WiNG 5.5 - Page 754

Motorola WiNG 5.5
954 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
13 - 16 WiNG 5.5 Access Point System Reference Guide
8. Refer to the Client Quality table for RF Domain connected clients requiring administration to improve performance:
9. Refer to the WLAN Utilization field to assess the following:
10.The Radio Traffic Utilization area displays the following:
11.Refer to the Client Traffic Utilization table:
12.The Wireless Security area indicates the security of the transmission between WLANs and the wireless clients they
support. This value indicates the vulnerability of the WLANs.
Radio ID Lists each radio’s administrator defined hostname and its radio designation (radio 1, radio
2 or radio 3).
Radio Type Displays the radio type as either 5 GHz or 2.4 GHz.
Worst 5 Clients Displays the five clients having the lowest average quality indices.
Client MAC Displays the hard coded radio MAC of the wireless client.
Vendor Displays the vendor name of the wireless client.
Total WLANs Displays the total number of WLANs managed by RF Domain member access points.
Top 5 Displays the five RF Domain utilized WLANs with the highest average quality indices.
WLAN Name Displays the WLAN Name for each of the Top 5 WLANs in the access point RF Domain.
Radio Type Displays the radio type as either 5 GHz or 2.4 GHz.
Max. User Rate Displays the maximum recorded user rate in kbps.
Top 5 Radios Displays five radios with the best average quality in the RF Domain.
Radio ID Lists each radio’s administrator defined hostname and its radio designation (radio 1, radio
2 or radio 3).
Radio Type Displays the radio type as either 5 GHz or 2.4 GHz.
Top 5 Clients Displays the five clients having the highest average quality indices.
Client MAC Displays the client’s hard coded MAC address used a hardware identifier.
Vendor Lists each client’s manufacturer.
RF Domain Threat Level Indicates the threat from the wireless clients trying to find network vulnerabilities within
the access point RF Domain. The threat level is represented by an integer.
Rogue APs Lists the number of unauthorized access points detected by RF domain member devices.
WIPS Events Lists the number of WIPS events generated by RF Domain member devices.

Table of Contents

Related product manuals