Measures reported by RZDRogueInfoTest
A rogue device is an unauthorized device that is connected to an organization's network but does not have permission to access and operate in the network. The rogue devices can be broken down into two categories:
Access point (AP)-based rogue devices - Wireless access points (WAP) installed in the network without authorization
Computer-based rogue threats, or rogue peers - end user computers that are connected to the network without permission
The rogue device can impose significant threats to the network and is able to create a conduit for theft of confidential system information. The rogue device potentially allows unchallenged access to the network by any wireless user or client in the physical vicinity and also floods the network with useless data. This way, the rogue devices undermine the security of the network, create a denial of service to the authorized users and potentially damage the organization. It is, therefore, vital for administrator to detect and control the rogue devices connected to the network before they cause serious damage to the network. This is where the RZDRogueInfoTest test helps administrator!
For each rogue device connected to the network, this test reveals the radio type, the number of channels associated with it, the type of device, the encryption mode and strength of the signals.
Outputs of the test : One set of results for each rogue device that is connected to the target Ruckus ZoneDirector being monitored.
The measures made by this test are as follows:
| Measurement |
Description |
Measurement Unit |
Interpretation |
| Radio_type |
Indicates the radio type of this rogue device. |
|
The values reported by this measure and its numeric equivalents are mentioned in the table below:
| Measure Value |
Numeric Value |
| Radio11bg |
0 |
| Radio11a |
1 |
| Radio11ng |
2 |
| Radio11na |
3 |
Note:
By default, this measure reports the Measure Values listed in the table above to indicate the Radio type of this rogue device. The graph of this measure however, represents the type of a rogue device using the numeric equivalents only - 0 and 3.
|
| Channel |
Indicates the number of channels associated with this rogue device. |
Number |
|
| Rogue_type |
Indicates the type of this rogue device. |
|
The values reported by this measure and its numeric equivalents are mentioned in the table below:
| Measure Value |
Numeric Value |
| AP |
1 |
| Ad-hoc |
2 |
Note:
By default, this measure reports the Measure Values listed in the table above to indicate the type of this rogue device. The graph of this measure however, represents the type of a rogue device using the numeric equivalents only - 1 and 2. |
| Encryption_mode |
Indicates the encryption mode of this rogue device. |
|
The values reported by this measure and its numeric equivalents are mentioned in the table below:
| Measure Value |
Numeric Value |
| Open |
0 |
| Encrypted |
1 |
Note:
By default, this measure reports the Measure Values listed in the table above to indicate the encryption mode of this rogue device. The graph of this measure however, represents the encryption mode of a rogue device using the numeric equivalents only - 0 and 1. |
| Signal_strength |
Indicates the signal strength of this rogue device. |
dBm_negative |
Ideally, the value of this measure should be low. |
|