Choose
to view information about the clients connected to the device. Click the client in the table to view properties and statistics for each client.The Clients tab lists the clients that use the protocol or authentication method.
Parameter | Description |
Client MAC Address | The MAC address of the client. |
IPv4 Address | The IPv4 address of the client. |
IPv6 Address | The IPv6 address of the client. |
AP Name | The name of the access point to which the client is connected. |
SSID | The service set identifier of the client. |
WLAN ID | The WLAN associated with the client. |
State | The client authentication. |
Protocol | The protocol used. |
User Name | The user name associated with the connected client. |
Device Type | The device type associated with the connected client. |
Role | The client-role. |
Click the Client MAC address in the table to view statistical data of the client in the following sections:
Click icon to export to excel.
In the Export to Excel window, select one of the following options, and click :
To get a 360 view of the client, click
.Parameter | Description |
MAC Address | The MAC address of the client. |
Uptime | The uptime of a client in seconds. |
WLAN Name | The name of the WLAN. |
AP Name | The name of the AP. |
Client Performance | The performance of the client. |
Capabilities | The capabilities of the client. |
Fabric Status | The status of fabric profile. |
To view the client properties, AP properties, security information, client statistics, QOS properties, and EoGRE, click
.To view the service policy input and output, click
.To view the airtime fairness statistics, click
.To view the recent association history, such as, AP Name, BSSID, AP slot, Assoc Time, Mobility Role, Run Latency, and Roam Type, click
.To view the call statistics, click
.The Sleeping Clients tab helps you to configure the duration for which the sleeping clients are to be remembered before re-authentication becomes necessary.
Parameter | Description |
Client MAC Address | The MAC address of the client. |
Remaining Time | The time that remains before the sleeping client must be authenticated again. |
The Excluded Clients page allows you to configure the clients that need to be excluded, giving a reason for exclusion and the time remaining before re-authentication becomes necessary.
Parameter | Appendix 1: | Description |
Client MAC Address | Appendix 2: | The MAC address of the workgroup bridge client. |
IP Address | Appendix 3: | The IP address of the client. |
AP Name | Appendix 4: | The name of the access point to which the workgroup bridge client is connected. |
WLAN ID | Appendix 5: | The WLAN associated with the client. |
Authenticaton Method |
Appendix 6: | The authentication method for the client. |
Client | Appendix 7: | The workgroup bridge client address. |
Protocol |
Appendix 8: | |
Exclusion Reason | Appendix 9: | The reason as to why the client was excluded. |
Time Remaining | Appendix 10: | The time that remains before the excluded client must be authenticated again. |