Configuring Rogue Detection Lists
577
The following command clears SSID
mycorp
from the permitted SSID list:
WX1200#
clear rfdetect ssid-list mycorp
success: mycorp is no longer in ssid-list.
Configuring a Client
Black List
The client black list specifies clients that are not allowed on the network.
MSS drops all packets from the clients on the black list.
By default, the client black list is empty. In addition to manually
configured entries, the list can contain entries added by MSS. MSS can
place a client in the black list due to an association, reassociation or
disassociation flood from the client.
The client black list applies only to the WX switch on which the list is
configured. WX switches do not share client black lists.
To add an entry to the list, use the following command:
set
rfdetect
black-list
mac-addr
The following command adds client MAC address 11:22:33:44:55:66 to
the black list:
WX1200#
set rfdetect black-list 11:22:33:44:55:66
success: MAC 11:22:33:44:55:66 is now blacklisted.
To display the client black list, use the following command:
display rfdetect black-list
The following example shows the client black list on WX switch:
WX1200#
display rfdetect black-list
Total number of entries: 1
Blacklist MAC Type Port TTL
----------------- ----------------- ------- ---
11:22:33:44:55:66 configured - -
11:23:34:45:56:67 assoc req flood 3 25
To remove a MAC address from the client black list, use the following command:
clear
rfdetect
black-list
mac-addr
The following command removes MAC address 11:22:33:44:55:66 from
the black list:
WX1200#
clear rfdetect black-list 11:22:33:44:55:66
success: 11:22:33:44:55:66 is no longer blacklisted.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...