Identification
Identification groups together methods of detecting and identifying rogue hosts. Options include:
Option |
Definition |
---|---|
Device Types |
Displays icons representing each device type in the system, and allows you to add, modify, and delete custom device type icons. |
Vendor OUIs |
Allows you to modify the vendor OUI database, which is used to determine whether or not a MAC address is valid or by device profiler to profile devices by OUI. The database is updated periodically through the Auto Definition update process. See Vendor OUIs. |