Client History

Client History

Viewing Client History and Playback

The Client Playback feature enables you to locate and track the movement of clients in a venue. You can track the activity of only one client at a time.


Note

Tracking information of a client is restricted to 30 days.


Procedure


Step 1

Log in to the Cisco Spaces dashboard and click Cisco Spaces: Detect and Locate.

Figure 1. Cisco Spaces: Detect and Locate
Step 2

From the Cisco Spaces: Detect and Locate dashboard, use the drop-down list to navigate to the desired campus, building, and floor.

Figure 2. Cisco Spaces: Detect and Locate Dashboard
Step 3

Ensure that all the tracked clients (connected and detected) are visible on the dashboard by using the Show/Hide button, which is represented by the eye icon of Clients on the top pane.

Figure 3. Eye Icon
Step 4

Click a green dot icon on the map to select a client, and view Details.

Figure 4. Cisco Spaces: Detect and Locate Dashboard
Step 5

Click History to see the client locations plotted over the past 24 hours (default setting).

Figure 5. Cisco Spaces: Detect and Locate Client History
Step 6

Observe the Client History represented in two forms:

  • Linear Time Frame: Client history is represented as dots on a linear time frame, with two blue lines representing the start and end time. Location information is represented as dots, and you can hover your cursor to see the location for a given time.

  • Map: Client location is plotted on a map as green and red dots. Red indicates that the device is still probing, and is not associated to the network. A client could be probing either because it is manually disconnected from the network or because of network issues. Green indicates that the device is connected. You can also observe that the dots plotted on the map in the form of green and red dots and connected with a blue line.

Step 7

Observe the client history which is represented as a heat map. A heat map is the plotting of the location chirps of a device, and indicates the locations travelled by the device. It helps identify suspicious device behavior and can also be used for tracking missing equipment.