Configuring Rogue Detection Lists
575
If you add a device that MSS has classified as a rogue to the permitted
vendor list, but not to the ignore list, MSS can still classify the device as a
rogue. Adding an entry to the permitted vendor list merely indicates that
the device is from an allowed vendor. However, to cause MSS to stop
classifying the device as a rogue, you must add the device’s MAC address
to the ignore list.
To add an entry to the permitted vendor list, use the following command:
set
rfdetect
vendor-list
{
client
|
ap
}
mac-addr
The following command adds an entry for clients whose MAC addresses
start with aa:bb:cc:
WX1200#
set rfdetect vendor-list client aa:bb:cc:00:00:00
success: MAC aa:bb:cc:00:00:00 is now in client vendor-list.
The trailing 00:00:00 value is required.
To display the permitted vendor list, use the following command:
display rfdetect vendor-list
The following example shows the permitted vendor list on a switch:
WX1200#
display rfdetect vendor-list
Total number of entries: 1
OUI Type
----------------- ------
aa:bb:cc:00:00:00 client
11:22:33:00:00:00 ap
To remove an entry from the permitted vendor list, use the following
command:
clear
rfdetect
vendor-list
{
client
|
ap
} {
mac-addr
|
all
}
The following command removes client OUI aa:bb:cc:00:00:00 from the
permitted vendor list:
WX1200#
clear rfdetect vendor-list client aa:bb:cc:00:00:00
success: aa:bb:cc:00:00:00 is no longer in client
vendor-list.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...