•
|
Signal strength is not always a good indicator of distance - Obstructions such as walls, wireless interference, device power output, and even ambient humidity and temperature can affect the signal strength of a wireless device.
|
•
|
A MAC Address is not always permanent - While a MAC address is generally a good indicator of device type and manufacturer, this address is susceptible to change and can be spoofed. Also, originators of RF threats may have more than one hardware device at their disposal.
|
In the Discovered RF Threat Stations table, the Sensor field indicates which Sonic Point is detecting the particular threat. Using the sensor ID and MAC address of the SonicPoint allows you to easily determine the location of the SonicPoint that is detecting the threat.
1
|
Navigate to the SonicPoint > RF Monitoring page.
|
2
|
In the Discovered RF Threat Stations table, locate the Sensor for the SonicPoint that is detecting the targeted RF threat and record the number.
|
3
|
Navigate to SonicPoint > SonicPoints.
|
4
|
5
|
Record the MAC address for this SonicPoint.
|
The RF threat is likely to be in the location that is served by this SonicPoint.
Figure 28. Using sensor ID to determine RF threat location
This section builds on what was learned in the Using Sensor ID to Determine RF Threat Location . In the Discovered RF Threat Stations list, the Rssi field indicates the signal strength at which particular Sonic Point is detecting an RF threat.
1
|
Navigate to the SonicPoint > RF Monitoring page.
|
2
|
In the Discovered RF Threat Stations table, locate the Sensor and Rssi for the SonicPoint that is detecting the targeted RF threat and record these numbers.
|
3
|
Navigate to the SonicPoint > SonicPoints page.
|
4
|
5
|
Record the MAC address for this SonicPoint.
|
Figure 29. Using RSSI to determine RF threat proximity