SonicOS 7.0 Access Points
- SonicOS7.0
- About Access Points
- Settings
- Synchronize Access Points
- Provisioning Overview
- Creating/Modifying Provisioning Profiles
- Adding/Editing a Provisioning Profile - Getting Started
- General Settings for Provisioning Profiles
- 5GHz/2.4GHz Radio Basic Settings for Provisioning Profiles
- 5GHz/2.4GHz Radio Advanced Settings for Provisioning Profiles
- Sensor Settings for WIDP in Provisioning Profiles
- Mesh Network Settings for Provisioning Profiles
- 3G/4G/LTE WWAN Settings for Provisioning Profiles
- Bluetooth LE Settings for Provisioning Profiles
- Deleting Access Point Profiles
- Product Specific Configuration Notes
- Managing Access Point Objects
- Firmware Management
- Floor Plan View
- Station Status
- Intrusion Detection Services
- Advanced IDP
- Packet Capture
- Virtual Access Points
- RF Monitoring
- RF Analysis
- RF Spectrum
- FairNet
- Wi-Fi Multimedia
- 3G/4G/LTE WWAN
- Bluetooth LE Devices
- Radio Management
- SonicWall Support
RF Monitoring
Radio Frequency (RF) technology used in today’s 802.11-based wireless networking devices poses an attractive target for intruders. If left unmanaged, RF devices can leave your wireless (and wired) network open to a variety of outside threats, from Denial of Service (DoS) to network security breaches. To help secure your SonicWall wireless access points, SonicWall helps detect threats without interrupting the current operation of your wireless or wired network.
SonicOS RF Monitoring provides real-time threat monitoring and management of SonicPoint radio frequency traffic. In addition to its real-time threat monitoring capabilities, SonicOS RF monitoring provides a system for centralized collection of RF threats and traffic statistics that offer a way to easily manage RF capabilities directly from the SonicWall security appliance gateway.
The DEVICE | Access Points > RF Monitoring page provides a central location for selecting RF signature types, viewing discovered RF threat stations, and adding discovered threat stations to a watch list.
- Prerequisites
- RF Monitoring Summary
- 802.11 General Frame Setting
- 802.11 Management Frame Setting
- 802.11 Data Frame Setting
- Discovered RF Threat Stations
- Adding a Threat Station to the Watch List
- Practical RF Monitoring Field Applications
Was This Article Helpful?
Help us to improve our support portal