This script I wrote that downloads the results of a "get detected" command from a ZD controller. (and processes the downloaded data a bit)
Now I can do this:
fgrep 10:68:3f:ef:15:da getdetected | ./apnames.sed
be-7982-3-n 10:68:3f:ef:15:da 128
be-7982-325 10:68:3f:ef:15:da 250
be-7372-229 10:68:3f:ef:15:da 341
be-7982-1-s 10:68:3f:ef:15:da 184
be-7982-3-s 10:68:3f:ef:15:da 360
To find all the APs that can see the mac address of a particular client, along w/ the Signal-To-Noise ratio (in dBx10) seen by each AP.
Now I can (mentally) triangulate the position of the client based on signal reports from each AP.
Let me know if anyone (else) wants this feature.
"Where's that so-and-so client with peer2peer malware sharing turned on!"
"Why am I associated to *that* AP and not the one I'm standing next to?"
Somehow I missed last month's SPoT product announcement.
...that requires 9.8 firmware to be installed.
Did that really come out 4 days ago?
I guess I missed that too.
Oh, yes.. and like SPoT, my script provides data that allows me to Trilaterate. (not triangulate)
Do you have any idea if 9.8 provides more SNMP data to make this process quicker?
It takes me almost a full minute to download all the "get detected" info from the controller.
9.8 was not announced because it's not yet GA - so it's in controlled release (LCS) phase. It's a little more public than usual because the new R700 802.11AC AP requires 9.8.
I wrote a script called "ruckusconf" that I used to automate ruckus commandline stuff.
That can be found here:
The command I used to download the "get detected" output was:
./ruckusconf --debug --outfile getdetected --timeout 300 --command 'rksap_cli -A "get detected"' $CONTROLLER
(Where $CONTROLLER is the IP of your active ZD controller)
In order to get things going quickly (in case you have trouble getting the ruckusconf script working) I'd suggest invoking the linux "script" command, ssh-ing into your ZD, getting into debug mode and then typing:
rksap_cli -A "get detected"
I don't know if the output of "get detected" has changed since the last few firmware updates...
The apnames.sed command was autogenerated by another set of scripts called makeapnames.sed and getruckusapnames.
That can be found here:
Again, this depends on certain behavior of the ZD which may have changed.
(in this case, responses to SNMP queries)
The "showdetected" script cleans-up the "get detected" output a bit and puts it in the file called "getdetected".
I guess I didn't consider that script to be "clean" enough 'cause I didn't post it online anywhere.
See if you can download the output of "get detected" to a file.
If you can, you should be able to get some level of function just by grepping for the mac address of a client.
Let me know if that worked for you (or how far you got) and I'll see if I can clean-up the rest of the scripts.
I'm loving the scripts ;-) Thanks very much indeed.
I've got the output from "get detected", so if you can shed any light on the format of that data I'd be even more grateful!
All the best,
I'll get it working w/ 9.9 soon.
What version are you running?
Many thanks for helping with this.
We're currently on 9.7 but we'll look at upgrading.
I might have just made this script work w/ 9.9 instead of 9.7
Give this one a shot.
if your initial downloaded "getdetected...txt" file contains ony 12 columns and not 15, you might need the old version.
If so, find a way to get a message to me and I'll send you the old one directly.