Set Rfdetect Black-List - 3Com Wireless LAN Switch WX1200 Command Reference Manual

Wireless lan mobility system; wireless lan switch and controller
Hide thumbs Also See for Wireless LAN Switch WX1200:
Table of Contents

Advertisement

set rfdetect
black-list
When on-demand countermeasures are enabled (with the set
radio-profile countermeasures configured command) only those
devices configured in the attack list are subject to countermeasures. In
this case, devices found to be rogues by other means, such as policy
violations or by determining that the device is providing connectivity to
the wired network, are not attacked.
Examples — The following command adds MAC address
aa:bb:cc:44:55:66 to the attack list:
WX4400# set rfdetect attack-list 11:22:33:44:55:66
success:
MAC 11:22:33:44:55:66 is now in attacklist.
See Also
clear rfdetect attack-list on page 534
display rfdetect attack-list on page 537
set radio-profile countermeasures on page 355
Adds an entry to the client black list. The client black list specifies clients
that are not allowed on the network. MSS drops all packets from the
clients on the black list.
Syntax —
set rfdetect black-list mac-addr
mac-addr
— MAC address you want to place on the black list.
Defaults — The client black list is empty by default.
Access — Enabled.
History —Introduced in MSS Version 4.0.
Usage — In addition to manually configured entries, the list can contain
entries added by MSS. MSS can place a client in the black list due to an
association, reassociation or disassociation flood from the client.
The client black list applies only to the WX switch on which the list is
configured. WX switches do not share client black lists.

set rfdetect black-list

555

Advertisement

Table of Contents
loading

This manual is also suitable for:

Wx4400Wxr1003crwx440095a3crwx120695a3crwxr10095a

Table of Contents