Security Monitor; Figure 6-10: Allowed Channel Configuration; Figure 6-11: Security Monitor - Channel Usage - Linksys WUSB200 User Manual

Business series wireless-g business usb network adapter with rangebooster
Hide thumbs Also See for WUSB200:
Table of Contents

Advertisement

Wireless-G Business USB Network Adapter with RangeBooster
Allowed Channel Configuration
The Allowed Channel Configuration screen shows the channels that are allowed to be used in your wireless
networks. You may select individual channels or click Check All to check all of the channels. Unclassified access
points on unchecked channels will be automatically classified as untrusted.

Security Monitor

IMPORTANT: You must use a WAP200 Access Point with your USB Network Adapter to use the Security
Monitor.
The Security Monitor helps to make your network more secure. It monitors the airspace through the WAP200
Access Point and USB Network Adapter for security related issues like vulnerabilities in the network
configuration, which allows you to act quickly to solve issues and secure your network. The Monitor runs on the
client PC, which allows the administrator to perform initial setup of security profiles and classification of the
wireless network devices and later view assorted security alerts.
The Security Monitor tab displays the statistics of your wireless network and alerts you of network activity by
Channel Usage, AP Inventory, Client Inventory, or Alerts.
Click Channel Usage, AP Inventory to view the statistics of the distribution on your AP's classifications, Client
Inventory to view the distribution of the client's classifications on your wireless networks, or Alert to monitor
that function.
Channel Usage
The Channel Usage screen provides statistics of the distribution on your channel's usages. The histogram shows
the number of access points in each channel, so unclassified access points can be detected. Select the specified
period of time you want for the data calculations. You may select Real Time for current data, 24 hours for data
within the last 24 hours, 7 days for data within the last 7 days or select days for a range of days.
Chapter 6: The Administrative Functions in the Wireless Network Monitor
Security Monitor

Figure 6-10: Allowed Channel Configuration

Figure 6-11: Security Monitor - Channel Usage

49

Advertisement

Table of Contents
loading

Table of Contents