GET /api/v1/sites/{site_id}/rogues/events/count

mist.com

Summary: countSiteRogueEvents
Operation ID: countSiteRogueEvents
Auth: unknown
Description

Count Rogue Events

Parameters (13)

ap_mac (string, query, optional)

mac of the device that had strongest signal strength for ssid/bssid pair

bssid (string, query, optional)

bssid of the network detected as threat

channel (string, query, optional)

channel over which ap_mac heard ssid/bssid pair

distinct (string, query, optional, default: bssid)

Constraints: {'enum': ['bssid', 'ssid', 'ap', 'type']}

duration (string, query, optional, default: 1d)

For historical stats and/or logs where time range is needed, you can specify the time range in a few different ways: * ?start=1430000000&end=1430864000 specify the start / end * ?end=1430864000&duration=1d specify end time and duration * ?duration=1d specify duration, end will be now() in seconds

end (integer, query, optional, default: 0)

Constraints: {'minimum': 0}

limit (integer, query, optional, default: 100)

Constraints: {'minimum': 0}

page (integer, query, optional, default: 1)

Constraints: {'minimum': 1}

seen_on_lan (boolean, query, optional)

whether the reporting AP see a wireless client (on LAN) connecting to it

site_id (string, path, required)
ssid (string, query, optional)

ssid of the network detected as threat

start (integer, query, optional, default: 0)

Constraints: {'minimum': 0}

type (string, query, optional)

Constraints: {'enum': ['honeypot', 'lan', 'others', 'spoof']}

No probe data for this endpoint yet.