Enabling countermeasures and configuring, Aging time for detected rogue devices – H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 492

Advertising
background image

476

Figure 509 MAC address list configuration page

5.

Configure the MAC address list as described in

Table 154

.

6.

Click Apply.

Table 154 Configuration items

Item Description

MAC

Enter the permitted MAC address in the box.

Select the existent devices

If you select this option, the MAC address table displays MAC addresses of the
current devices. Select the MAC addresses to be permitted.

The operation to add other types of lists is similar to the add operation of a MAC address list, and thus

the description is omitted.

Enabling countermeasures and configuring aging time for

detected rogue devices

1.

Select Security > Rogue Detection from the navigation tree.

2.

On the AP Monitor tab, click Common Set.

Advertising