Set rfdetect black-list – 3Com Wireless LAN WX1200 User Manual

Page 555

Advertising
background image

set rfdetect black-list

555

When on-demand countermeasures are enabled (with the set
radio-profile countermeasures configured
command) only those
devices configured in the attack list are subject to countermeasures. In
this case, devices found to be rogues by other means, such as policy
violations or by determining that the device is providing connectivity to
the wired network, are not attacked.

Examples — The following command adds MAC address
aa:bb:cc:44:55:66 to the attack list:

WX4400# set rfdetect attack-list 11:22:33:44:55:66
success: MAC 11:22:33:44:55:66 is now in attacklist.

See Also

„

clear rfdetect attack-list on page 534

„

display rfdetect attack-list on page 537

„

set radio-profile countermeasures on page 355

set rfdetect
black-list

Adds an entry to the client black list. The client black list specifies clients
that are not allowed on the network. MSS drops all packets from the
clients on the black list.

Syntax

set rfdetect black-list mac-addr

„

mac-addr

— MAC address you want to place on the black list.

Defaults — The client black list is empty by default.

Access — Enabled.

History —Introduced in MSS Version 4.0.

Usage — In addition to manually configured entries, the list can contain
entries added by MSS. MSS can place a client in the black list due to an
association, reassociation or disassociation flood from the client.

The client black list applies only to the WX switch on which the list is
configured. WX switches do not share client black lists.

Advertising