User's Manual
Table Of Contents
- Table of Contents
- List of Figures
- Introduction
- Installing the Wireless Array
- Installation Prerequisites
- Planning Your Installation
- Installation Workflow
- Installing Your Wireless Array
- Powering Up the Wireless Array
- Establishing Communication with the Array
- Entering the License
- Performing the Express Setup Procedure
- The Web Management Interface
- Viewing Status on the Wireless Array
- Configuring the Wireless Array
- Express Setup
- Network
- Services
- VLANs
- Tunnels
- Security
- SSIDs
- Groups
- IAPs
- WDS
- Filters
- Clusters
- Using Tools on the Wireless Array
Wireless Array
154 Viewing Status on the Wireless Array
Traffic Tables
Figure 92. Application Control (Station Traffic)
These tables provide detailed information about how your wireless bandwidth is
being used. There are tables for Station Traffic and/or Array Management
Tr aff i c, depending on which checkboxes you selected. Similarly, there are tables
for By Application and/or By Category, depending on your selections.
In addition to showing traffic statistics, there are two unique and highly useful
columns. Risk estimates the likelihood of an application causing problems for
your business, such as a file-sharing utility introducing viruses or exposing you to
legal problems. Risk is rated from 1 (low risk, e.g., Google) to 5 (high risk, e.g.,
BitTorrent). Risky applications (rated at 4 or 5) are flagged for your attention by
highlighting the entry in pale red. Productivity estimates the value of an activity
to your business, from 1 (unproductive, e.g., Y8 gaming site) to 5 (productive, e.g.,
WebEx).
You may click the heading of any column to sort based on that column. Click
again to sort in the reverse order. For instance, sort on Risk to find problem
applications, or sort on Productivity to find applications that should be given
increased or decreased handling priority.