Dell W-Series 207 Instant 6.5.1.0-4.3.1.0 User Guide - Page 46

Graph Name, W-IAP Description, Monitoring Procedure, Table 14

Page 46 highlights

The following table describes the graphs displayed in the Access Point view: Table 14: Access Point View-Usage Trends and Monitoring Procedures Graph Name W-IAP Description Monitoring Procedure Neighboring W-IAPs The Neighboring W-IAPs graph shows the number of W-IAPs detected by the selected W-IAP: l Valid W-IAPs: A W-IAP that is part of the enterprise providing WLAN service. l Interfering W-IAPs: A W-IAP that is seen in the RF environment but is not connected to the network. l Rogue W-IAPs: An unauthorized W-IAP that is plugged into the wired side of the network. To see the number of different types of neighboring W-IAPs for the last 15 minutes, move the cursor over the respective graph lines. To check the neighboring W-IAPs detected by the WIAP for the last 15 minutes: 1. Log in to the Instant UI. The Virtual Controller view is displayed. This is the default view. 2. On the Access Points tab, click the W-IAP for which you want to monitor the client association. 3. Study the Neighboring W-IAPs graph in the Overview section. For example, the graph shows that 148 interfering W-IAPs are detected by the W-IAP at 12:04 hours. CPU Utilization The CPU Utilization graph displays the utilization of CPU for the selected W-IAP. To see the CPU utilization of the W-IAP, move the cursor over the graph line. To check the CPU utilization of the W-IAP for the last 15 minutes: 1. Log in to the Instant UI. The Virtual Controller view is displayed. This is the default view. 2. On the Access Points tab, click the W-IAP for which you want to monitor the client association. 3. Study the CPU Utilization graph in the Overview pane. For example, the graph shows that the CPU utilization of the W-IAP is 30% at 12:09 hours. Neighboring Clients The Neighboring Clients graph shows the number of clients not connected to the selected W-IAP, but heard by it. l Any client that successfully authenticates with a valid W-IAP and passes encrypted traffic is classified as a valid client. l Interfering: A client associated to any W-IAP and is not valid is classified as an interfering client. To see the number of different types of neighboring clients for the last 15 minutes, move the cursor over the respective graph lines. To check the neighboring clients detected by the WIAP for the last 15 minutes, 1. Log in to the Instant UI. The Virtual Controller view is displayed. This is the default view. 2. On the Access Points tab, click the W-IAP for which you want to monitor the client association. 3. Study the Neighboring Clients graph in the Overview pane. For example, the graph shows that 20 interfering clients were detected by the W-IAP at 12:15 hours. Memory free (MB) The Memory free graph displays the memory availability of the W-IAP in MB. To check the free memory of the W-IAP for the last 15 minutes: 1. Log in to the Instant UI. The Virtual Controller Dell Networking W-Series Instant 6.5.1.0-4.3.1.0 | User Guide Instant User Interface | 46

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435

The following table describes the graphs displayed in the Access Point view:
Graph Name
W-IAP Description
Monitoring Procedure
Neighboring
W-IAPs
The Neighboring W-IAPs graph shows the
number of W-IAPs detected by the
selected W-IAP:
l
Valid W-IAPs: A W-IAP that is part of
the enterprise providing WLAN
service.
l
Interfering W-IAPs: A W-IAP that is
seen in the RF environment but is not
connected to the network.
l
Rogue W-IAPs: An unauthorized W-IAP
that is plugged into the wired side of
the network.
To see the number of different types of
neighboring W-IAPs for the last 15
minutes, move the cursor over the
respective graph lines.
To check the neighboring W-IAPs detected by the W-
IAP for the last 15 minutes:
1.
Log in to the Instant UI. The Virtual Controller
view is displayed. This is the default view.
2.
On the
Access Points
tab, click the W-IAP for
which you want to monitor the client association.
3.
Study the Neighboring W-IAPs graph in the
Overview
section. For example, the graph shows
that 148 interfering W-IAPs are detected by the
W-IAP at 12:04 hours.
CPU Utilization
The CPU Utilization graph displays the
utilization of CPU for the selected W-IAP.
To see the CPU utilization of the W-IAP,
move the cursor over the graph line.
To check the CPU utilization of the W-IAP for the last
15 minutes:
1.
Log in to the Instant UI. The Virtual Controller
view is displayed. This is the default view.
2.
On the
Access Points
tab, click the W-IAP for
which you want to monitor the client association.
3.
Study the CPU Utilization graph in the
Overview
pane. For example, the graph shows that the CPU
utilization of the W-IAP is 30% at 12:09 hours.
Neighboring
Clients
The Neighboring Clients graph shows the
number of clients not connected to the
selected W-IAP, but heard by it.
l
Any client that successfully
authenticates with a valid W-IAP and
passes encrypted traffic is classified
as a valid client.
l
Interfering: A client associated to any
W-IAP and is not valid is classified as
an interfering client.
To see the number of different types of
neighboring clients for the last 15
minutes, move the cursor over the
respective graph lines.
To check the neighboring clients detected by the W-
IAP for the last 15 minutes,
1.
Log in to the Instant UI. The Virtual Controller
view is displayed. This is the default view.
2.
On the
Access Points
tab, click the W-IAP for
which you want to monitor the client association.
3.
Study the Neighboring Clients graph in the
Overview
pane. For example, the graph shows
that 20 interfering clients were detected by the
W-IAP at 12:15 hours.
Memory free
(MB)
The Memory free graph displays the
memory availability of the W-IAP in MB.
To check the free memory of the W-IAP for the last
15 minutes:
1.
Log in to the Instant UI. The Virtual Controller
Table 14:
Access Point View—Usage Trends and Monitoring Procedures
Dell Networking W-Series Instant 6.5.1.0-4.3.1.0 | User Guide
Instant User Interface |
46