Chapter 8 Monitor
NWA50AX User’s Guide
66
8.8 Vie w Lo g
Log messages are stored in two separate logs, one for regular log messages and one for debugging
messages. In the regular log, you can look at all the log messages by selecting All Lo g s, or you can
select a specific category of log messages (for example, user). You can also look at the debugging log
by selecting De bug Lo g . All debugging messages have the same priority.
To access this screen, click Mo nito r > Lo g . The log is displayed in the following screen.
Note: When a log reaches the maximum number of log messages, new log messages
automatically overwrite existing log messages, starting with the oldest existing log
message first.
Events that generate an alert (as well as a log message) display in red. Regular logs display in black.
Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell
again to reverse the sort order.
The Web Configurator saves the filter settings once you click Se a rc h. If you leave the Vie w Lo g screen
and return to it later, the last filter settings would still apply.
Mark as Rogue
AP
Click this button to mark the selected AP as a rogue AP. For more on managing rogue APs, see
the Co nfig ura tion > Wire le ss > Rog ue AP screen (
Section 10.3 on page 79).
Mark as Friendly
AP
Click this button to mark the selected AP as a friendly AP. For more on managing friendly APs,
see the C o nfig ura tio n > Wire le ss > Rog ue AP screen (
Section 10.3 on page 79).
# This is the detected device’s index number in this list.
Status This indicates the detected device’s status.
Device This indicates the type of device detected.
Role This indicates the detected device’s role (such as friendly or rogue).
Classified by This indicates the detected device’s classification rule.
MAC Address This indicates the detected device’s MAC address.
SSID Name This indicates the detected device’s SSID.
Channel ID This indicates the detected device’s channel ID.
802.11 Mode This indicates the 802.11 mode (a/b/g/n/ac/ax) transmitted by the detected device.
Security This indicates the encryption method (if any) used by the detected device.
Description This displays the detected device’s description. For more on managing friendly and rogue APs,
see the C o nfig ura tio n > Wire le ss > Rog ue AP screen (
Section 10.3 on page 79).
Last Seen This indicates the last time the device was detected by the Zyxel Device.
Refresh Click this to refresh the items displayed on this page.
Table 23 Monitor > Wireless > Detected Device (continued)
LABEL DESCRIPTIO N