![]() ![]() This enables them to act quickly in blocking the access. The switch port can be blocked or unblocked from within OpUtils. ![]() When combined with Switch Port Mapping, the rogue device detection network also provides the details of the switch and port through which the rogue system is accessing the network. In rogue wireless device detection, the administrators are notified about unauthorized access as soon as it is detected. The administrators will also be notified when the allowed period expires by the rogue detection system. Devices that are allowed guest access by the rogue detection system can any time be moved into allowed or rogue list. In such cases, the administrators can specify a period till which a particular system need to be considered as valid. For example, a personnel from a different branch visits your office for a month or a student enrolled for a semester need to be given access till he/she completes the semester. In rogue wirelesss device detection, there might be situations where there is a need to allow certain systems to access the network resources for a temporary period. In this rogue device detection tool, when an unauthorized rogue system is found in the network, the administrator can mark them as a Rogue Device and take appropriate action. The systems/devices that are marked as trusted will not be shown as rogue again. The administrator has to verify and mark all the valid network systems/devices as Trusted. Initially, OpUtils will list all the discovered systems by scanning your network with advanced IP scanner and port scanner functionalities. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |