Set rfdetect log – 3Com WXR100 3CRWXR10095A User Manual

Page 705

Advertising
background image

set rfdetect log

705

Usage — Use this command to identify third-party APs and other devices
you are already aware of and do not want MSS to report following RF
scans.

If you try to initiate countermeasures against a device on the ignore list,
the ignore list takes precedence and MSS does not issue the
countermeasures. Countermeasures apply only to rogue devices.

If you add a device that MSS has classified as a rogue to the permitted
vendor list or permitted SSID list, but not to the ignore list, MSS can still
classify the device as a rogue. Adding an entry to the permitted vendor
list or permitted SSID list merely indicates that the device is from an
allowed manufacturer or is using an allowed SSID. However, to cause
MSS to stop classifying the device as a rogue, you must add the device’s
MAC address to the ignore list.

After you add a device that has been classified as a rogue to the ignore
list, the device remains classified as a rogue for at least 10 minutes. After
10 minutes, MSS reclassifies the device as an interfering device.

Examples — The following command configures MSS to ignore BSSID
aa:bb:cc:11:22:33 during RF scans:

WX1200# set rfdetect ignore aa:bb:cc:11:22:33

success: MAC aa:bb:cc:11:22:33 is now ignored.

See Also

„

clear rfdetect ignore on page 679

„

display rfdetect ignore on page 692

set rfdetect log

Disables or reenables generation of log messages when rogues are
detected or when they disappear.

Syntax

set rfdetect log {enable | disable}

„

enable

Enables logging of rogues.

„

disable

Disables logging of rogues.

Defaults — RF detection logging is enabled by default.

Access — Enabled.

Advertising
This manual is related to the following products: