Configuring detection rule lists – H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 640

Advertising
background image

619

Configuring detection rule lists

1.

Select Security > Rogue Detection from the navigation tree.

2.

Click the Rule List tab.

Figure 654 Configuring a rule list

3.

Configure the rule list as described in

Table 195

.

Table 195 Configuration items

Item Description

List Type

MAC—Add MAC addresses to be permitted after selecting this option.

Wireless Service—Add SSIDs to be permitted after selecting this option.

Vendor—Specify vendors to be permitted after selecting this option.

Attacker—Add the MAC address of a device to configure the device as a rogue.

4.

Select MAC from the list and click Add.

Figure 655 Configuring a MAC address list

Advertising