Users Guide

265 | Creating, Running, and Sending Reports Dell Networking W-AirWave 8.2.4 | User Guide
Monitor Clients and Devices
l Client Inventory. Use this report to view information about clients that connected to your network. You can
use filters and match criteria to customize your report. Information reported includes include manufacturer
make and model, OSsummary, asset category and group, and authentication type. For information, see
"Using the Client Inventory Report" on page 275.
l Client Session. Use this report to view information for each time a user connects to your network. You can
use filters and match criteria to customize your report. Information reported includes MAC address, user
name, role, and SSID. For information, see "Using the Client Session Report" on page 277.
l Configuration Audit. Use this report to see a network snapshot of your device configurations. You can get an
inventory one device at a time, one folder at a time, or one device group at a time. The report includes
hypertext links to device configuration pages. For information, see "Using the Configuration Audit Report" on
page 279.
l Device Summary. Use this report to see which devices are used the most or least, as well as get an inventory
of all devices. You can also use this report to establish more equal bandwidth distribution across multiple
devices. For information, see "Using the Device Summary Report" on page 280.
l Device Uptime. Use this report to monitor device performance and availability. This report covers average
uptimes by SNMP and ICMP protocols, device groups and folders, or SSID information. You can add time
restrictions so W-AirWave only generates the report during a planned maintenance period or business days.
For information, see "Using the Device Uptime Report" on page 282.
l Inventory. Use this report to track all devices in your network. For example, you could use the report to find
Cisco devices and break down the list by model and device type. For information, see "Using the Inventory
Report" on page 283.
l Rogue Containment Audit. Use this report to see whether your rogue containments are failing. For
information, see "Using the Rogue Containment Audit Report" on page 285.
Show Compliance
l PCICompliance. Use this report to view PCI configurations and show compliance during an audit. For
information, see "Using the PCI Compliance Report" on page 286.
Troubleshoot Device and Network Issues
l IDS Events. Use this report to respond to IDS events on the network involving APs or controller devices. W-
AirWave reports on devices that have had the most events in the prior 24 hours. The report includes
hypertext links to device configuration pages. You can use filters to show IDSevents for specific devices, such
as controllers and APs. For information, see "Using the IDS Events Report" on page 286.
l Match Event. Use this report to track matching events that occurred on devices. For example, you could use
the report to find sticky client problems and break down the information by folder, AP, and client. For
information, see "Using the Match Event Report" on page 288.
l New Clients. Use this report to see new clients that W-AirWave discovered on the network during the time
duration of the report. Information reported includes user identifier, associated role when known, and device
information. You can use filters to find specific devices and users, matching criteria, or view all information.
For information, see "Using the New Clients Report" on page 289.
l New Rogue Devices. Use this report to find rogues device on your network. Before W-AirWave can run the
report, you must define the restrictions. For information, see "Using the New Rogue Devices Report" on page
290.
l RADIUS Authentication Issues. Use this report to find the top 10 issues with controllers, RADIUS servers, and
users. The report includes the number of total failures and the first and most recent event times. For
information, see "Using the RADIUS Reports" on page 292.