SonicOS 7.0 Access Points
- SonicOS7.0
- About Access Points
- Settings
- Synchronize Access Points
- Provisioning Overview
- Creating/Modifying Provisioning Profiles
- Adding/Editing a Provisioning Profile - Getting Started
- General Settings for Provisioning Profiles
- 5GHz/2.4GHz Radio Basic Settings for Provisioning Profiles
- 5GHz/2.4GHz Radio Advanced Settings for Provisioning Profiles
- Sensor Settings for WIDP in Provisioning Profiles
- Mesh Network Settings for Provisioning Profiles
- 3G/4G/LTE WWAN Settings for Provisioning Profiles
- Bluetooth LE Settings for Provisioning Profiles
- Deleting Access Point Profiles
- Product Specific Configuration Notes
- Managing Access Point Objects
- Firmware Management
- Floor Plan View
- Station Status
- Intrusion Detection Services
- Advanced IDP
- Packet Capture
- Virtual Access Points
- RF Monitoring
- RF Analysis
- RF Spectrum
- FairNet
- Wi-Fi Multimedia
- 3G/4G/LTE WWAN
- Bluetooth LE Devices
- Radio Management
- SonicWall Support
Discovered RF Threat Stations
The Discovered RF threat stations tab displays information about discovered RF threat stations. It can either show all discovered threat stations or only those on the Watch List Group, depending on what you select from the View Style: Station drop-down menu.
The following table describes the data displayed in the Threat Stations table.
Name | Description |
---|---|
Items | Displays the total number of logged threats. Use the arrow buttons to navigate through pages if applicable. |
View Style: Station |
Selects the type of stations displayed in the list of entries:
|
# | Reference number for the entry. |
MAC Address | Sorts the entries by MAC Address. This is the physical address of the RF threat station. |
Type | Sorts the entries by the type of wireless signal received from the threat station. |
Vendor | Sorts the entries by vendor. This is the manufacturer of the threat station (determined by MAC address). |
RSSI | Sorts the entries by the received signal strength as reported by the SonicPoint. This entry, along with the Sensor entry, can be helpful in triangulating the actual physical position of the RF threat device. |
Rate | Sorts the entries by transfer rate (Mbps) of the threat station. |
Encrypt | Sorts the entries by wireless signal encryption on the threat station, None, or Encrypted. |
RF Threat | Sorts the entries by RF threat (occurs in the latest time). |
Update Time | Sorts the entries by the time this log record was created/updated. |
Sensor | Sorts the entries by the ID of the SonicPoint that recorded this threat. This entry, along with the RSSI entry, can be helpful in triangulating the actual physical position of the RF threat device. |
Comment | Displays a text box to add comments about the threat. |
Configure | Configures a watch list for discovered stations. |
It is possible to find approximate locations of RF Threat devices by using logged threat statistics. For more practical tips and information on using the RF Management threat statistics, see Practical RF Monitoring Field Applications.
Was This Article Helpful?
Help us to improve our support portal