Set Radio-Profile Countermeasures - 3Com WX4400 Command Reference Manual

Wireless lan switch and controller
Hide thumbs Also See for WX4400:
Table of Contents

Advertisement

374
C
11: M
HAPTER
set radio-profile
countermeasures
A
P
C
ANAGED
CCESS
OINT
OMMANDS
Enables or disables countermeasures on the MAP radios managed by a
radio profile. Countermeasures are packets sent by a radio to prevent
clients from being able to use rogue access points.
CAUTION: Countermeasures affect wireless service on a radio. When a
MAP radio is sending countermeasures, the radio is disabled for use by
network traffic, until the radio finishes sending the countermeasures.
MAP radios can also issue countermeasures against interfering devices.
An interfering device is not part of the 3Com network but also is not a
rogue. No client connected to the device has been detected
communicating with any network entity listed in the forwarding database
(FDD) of any WX switch in the Mobility Domain. Although the interfering
device is not connected to your network, the device might be causing RF
interference with MAP radios.
Syntax —
set radio-profile name countermeasures {all | rogue
| configured | none}
name
— Radio profile name.
all
— Configures radios to attack rogues and interfering devices.
rogue
— Configures radios to attack rogues only.
configured
list on the WX switch (on-demand countermeasures). When this
option is specified, devices found to be rogues by other means, such
as policy violations or by determining that the device is providing
connectivity to the wired network, are not attacked.
none
— Disables countermeasures for this radio profile.
Defaults — Countermeasures are disabled by default.
Access — Enabled.
History — Command introduced in MSS Version 4.0. New option
configured added to support on-demand countermeasures in MSS
Version 4.1.
Examples — The following command enables countermeasures in radio
profile radprof3 for rogues only:
WX1200# set radio-profile radprof3 countermeasures rogue
success: change accepted.
— Configures radios to attack only devices in the attack

Advertisement

Table of Contents
loading

Table of Contents