I have several clients with MX64 firewalls and MR33 access points. In all but one of my clients, the Security Center can identify the end user devices that trigger Snort rules. But at one of my clients, only the MR33 is showing up as triggering the rules. Currently, the Security Center indicates that the MR33 has 245 events.
I am assuming that this is because the end user devices actually triggering the rules cannot be resolved, so the Security Center is pinning all the issues on the access point. If this is true, how do I go about resolving the end user devices.
If the MR33 is the device causing all the problems do I have a problematic access point?
Any insights anyone can give me would be appreciated.
Thanks,
Dave Anderson
Dave Anderson