View report objects. (ExtremeCloud IQ only.)
Select a report name in the My Reports window to view details for Network Summary, PCI DSS 3.2, or WIPS History reports. For more information about how to create these reports, see "Report Settings". You can schedule up to 500 combined weekly and daily reports.
The Network Summary Report
The Network Summary report displays the following information:
My Reports: This heading is followed by a description of the report, including the time frame, recurrence, and the name of the person who created the report.
Filtered by: In the left navigation bar, you can see the filters that were applied to this report.
Report Components: In the main window you can see the data for the components included in this report.
You can view a list of the default widgets for a network summary report, and you can add or remove widgets to customize your reports.
View The Default Widgets List
Top Application Groups: This chart shows you which application groups are seeing the highest levels of use. Hover over any segment of the data in this widget to see more information.
Top Applications: The top 20 or top 100 applications in use on your network for the timeline covered in the report.
Top Wireless Clients/Users: The top 20 or top 100 wireless clients or wireless users on your network for the designated time period.
Unique Clients: The number of unique clients on your network for both wireless bands (2.4 GHz or 5 GHz), wired connections, or all connections. Hover over any segment of the chart to see more information. If there is a number greater than zero in the Clients with Poor Health section, select the number to see more information about poor connections.
Top Access Points by Usage/Client: The top 20 access points, either by usage or connected client, for the 2.4 GHz band, the 5 GHz band, or both. Hover over a bubble in the timeline, or any segment in the circular data for more details.
Maximum Number of Simultaneous Connections: The maximum simultaneous connections in 10-minute segments for the time frame specified for the report. You can see data for the 2.4 GHz or 5 GHz band, or both, for wired connections, or for all connections. Hover over any bar in the graph to see more details.
The Payment Card Industry Data Security Standard (PCI DSS) Report
Businesses that handle payment card transactions are regulated by law to adhere to PCI DSS when cardholder data is stored, processed, or transmitted.
The PCI DSS report feature helps you adhere to PCI DSS 3.2 compliance requirements. This report quickly shows you how secure your network is based on the PCI DSS specification, providing you with a security assessment of your network. The report is divided into Overview, Summary, and Compliance sections, which contain the following information:
Overview: TDescribes PCI DSS compliance and provides an overview of the report contents.
Summary: Shows the number, and which sections of the PCI DSS specification for which your network device configurations are either compliant or non-compliant.
Compliance: Provides detailed descriptions of the items listed in the summary. For non-compliant items, this section also provides information about non-compliance issues, and steps to take to resolve them. To see even more details, select to expand the section. To collapse the section, select .
The WIPS History Report
The WIPS History report shows you the details of rogue, unauthorized, and neighbor APs during a past time period. This report can help you improve network security and comply with PCI DSS intrusion detection and record keeping requirements. This report is presented in three sections:
Rogue APs: If you enable a WIPS configuration on APs and they detect other APs that do not comply with the configuration, the rogue APs are listed here. The following information in table format appears for each AP:
Unauthorized APs: The unauthorized APs that have been detected in your network.
Neighbor APs: The AP that reported the rogue or unauthorized AP.
The WIPS History Report Table
Clients: The number of clients associated with the SSID.
BSSID: The MAC address of the wireless access interface of the detected AP.
SSID: The name of the SSID that the access point is advertising in its beacons.
Vendor: The vendor of the detected AP, based on the MAC OUI.
Approximate Location: The approximate location of your device. If you entered a location for the device when it was onboarded, that location appears here.
Reporting AP: The host name of the AP that reported the problem AP. Host name is the same as device_name.
Reason: The reason why the device has been classified either as rogue or unauthorized.
First Time Detected: The first time that the AP was detected.
Last Time Detected: The last time that the AP was detected.
Based on a WIPS policy, ExtremeCloud IQ can classify a device by its OUI (organizationally unique identifier, described in "MAC Objects and MAC OUIs"), its SSID, or other characteristics. You can also manually classify a device as rogue. For more information on how to configure a WIPS policy, see "WIPS".