The Reports List
View and sort report objects. (ExtremeCloud IQ only.)
The Reports window displays information about your generated reports. From this window you can create new reports, edit the settings for an existing report, share report data with others, and delete reports.
Reports provide a great deal of information that can help you manage and plan your networks, adhere to security assessments and record keeping requirements of Payment Card Industry Data Security Standard (PCI DSS).
You can filter the reports displayed in this window using the Filter tool.
There are three ways to view reports. These options are available from the drop-down list in the table head:
Reports: Displays all of the reports you have generated.
Configurations: Select any report from this view to see or edit the report settings.
Generated: Select any generated report from this view to see or edit report settings. One-time reports will not appear in this view. If you have not created any recurring reports, this view will not be available.
Network Summary Report
This report gathers statistics and provides visibility into how the network is used. For example, the top applications and wireless clients in a given time period, the top 20 access points by usage, and the radio protocol used by connecting clients. This information can help you plan and scale your network as your organization grows.
PCI DSS 3.2 Compliance Report
This report identifies which device configurations are in compliance with PCI DSS. This is important because network infrastructures that support customer payment card transactions are required by law to adhere to PCI DSS whenever cardholder data is stored, processed, or transmitted.
A PCI DSS report helps you meet PCI DSS 3.2 compliance requirements by showing you how secure your network based on the PCI DSS specification. The report is divided into three sections:
Overview: Describes PCI DSS compliance and provides an overview of the report contents.
Summary: Shows the number of transactions, and identifies the sections of the PCI DSS specification for which your network device configurations are either compliant or non-compliant.
Compliance: Provides detailed descriptions of the items listed in the summary. For non-compliant items, this section also provides information about non-compliance issues, and describes steps you must take to resolve them.
WIPS History Report
This report provides information that can help network administrators physically locate and remove rogue and unauthorized APs. The WIPS History Report also provides an intruder detection history list that can help you perform regular security assessments. The following information is displayed:
Rogue APs: Detected APs that do not comply with your network configuration.
Unauthorized APs: Unauthorized APs that have been detected in your network.
Neighbor APs: The reporting AP.
Clients: The number of clients associated with the SSID.
BSSID: The MAC address of the wireless access interface of the detected AP.
SSID: The name of the SSID that the access point is advertising in its beacons.
Vendor: The vendor of the detected AP, based on the MAC OUI.
Approximate Location: The approximate location of your device. If you entered a location for the device when it was onboarded, that location appears here.
Reporting AP: The host name of the AP that reported the problem AP. Host name is the same as device_name.
Reason: The reason why the device has been classified either as rogue or unauthorized.
First Time Detected: The first time that the AP was detected.
Last Time Detected: The last time that the AP was detected.
Based on a WIPS policy, ExtremeCloud IQ can classify a device by its OUI (organizationally unique identifier), its SSID, or other characteristics. You can also manually classify a device as rogue.
WiFI Statistics Summary
The WiFi Statistics Summary provides information about your wireless clients and their connections, availability through your APs, and other wireless details.
Client Tracking Report
The Client Tracking report gives you information about a client connected to your network for a time range that you specify. You can identify the client by MAC address, user name, or host name.