Configuring detection rule lists – H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 497

Advertising
background image

42-9

Configuring Detection Rule Lists

Select Security > Rogue Detection from the navigation tree, and then select the Rule List tab to enter

detection rule list configuration page, as shown in

Figure 42-10

.

Figure 42-10 Rule list configuration

Table 42-3

describes the rule list configuration items.

Table 42-3 Rule list configuration items

Item

Description

List Type

MAC: You can add MAC addresses to be permitted after selecting this option.

Wireless Service: You can add SSIDs to be permitted after selecting this option.

Vendor: You can specify vendors to be permitted after selecting this option.

Attacker: You can add the MAC address of a device to configure the device as a rogue.

Select MAC from the drop-down list and click Add to enter the MAC address configuration page, as

shown in

Figure 42-11

.

Figure 42-11 MAC address list configuration page

Table 42-4

describes configuration items for configuring MAC address list.

Advertising