Dell W-Series 228 Instant 6.5.1.0-4.3.1.0 User Guide - Page 46
Graph Name, W-IAP Description, Monitoring Procedure, Table 14
View all Dell W-Series 228 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 46 highlights
The following table describes the graphs displayed in the Access Point view: Table 14: Access Point View-Usage Trends and Monitoring Procedures Graph Name W-IAP Description Monitoring Procedure Neighboring W-IAPs The Neighboring W-IAPs graph shows the number of W-IAPs detected by the selected W-IAP: l Valid W-IAPs: A W-IAP that is part of the enterprise providing WLAN service. l Interfering W-IAPs: A W-IAP that is seen in the RF environment but is not connected to the network. l Rogue W-IAPs: An unauthorized W-IAP that is plugged into the wired side of the network. To see the number of different types of neighboring W-IAPs for the last 15 minutes, move the cursor over the respective graph lines. To check the neighboring W-IAPs detected by the WIAP for the last 15 minutes: 1. Log in to the Instant UI. The Virtual Controller view is displayed. This is the default view. 2. On the Access Points tab, click the W-IAP for which you want to monitor the client association. 3. Study the Neighboring W-IAPs graph in the Overview section. For example, the graph shows that 148 interfering W-IAPs are detected by the W-IAP at 12:04 hours. CPU Utilization The CPU Utilization graph displays the utilization of CPU for the selected W-IAP. To see the CPU utilization of the W-IAP, move the cursor over the graph line. To check the CPU utilization of the W-IAP for the last 15 minutes: 1. Log in to the Instant UI. The Virtual Controller view is displayed. This is the default view. 2. On the Access Points tab, click the W-IAP for which you want to monitor the client association. 3. Study the CPU Utilization graph in the Overview pane. For example, the graph shows that the CPU utilization of the W-IAP is 30% at 12:09 hours. Neighboring Clients The Neighboring Clients graph shows the number of clients not connected to the selected W-IAP, but heard by it. l Any client that successfully authenticates with a valid W-IAP and passes encrypted traffic is classified as a valid client. l Interfering: A client associated to any W-IAP and is not valid is classified as an interfering client. To see the number of different types of neighboring clients for the last 15 minutes, move the cursor over the respective graph lines. To check the neighboring clients detected by the WIAP for the last 15 minutes, 1. Log in to the Instant UI. The Virtual Controller view is displayed. This is the default view. 2. On the Access Points tab, click the W-IAP for which you want to monitor the client association. 3. Study the Neighboring Clients graph in the Overview pane. For example, the graph shows that 20 interfering clients were detected by the W-IAP at 12:15 hours. Memory free (MB) The Memory free graph displays the memory availability of the W-IAP in MB. To check the free memory of the W-IAP for the last 15 minutes: 1. Log in to the Instant UI. The Virtual Controller Dell Networking W-Series Instant 6.5.1.0-4.3.1.0 | User Guide Instant User Interface | 46