590
C
HAPTER
26: R
OGUE
D
ETECTION
AND
C
OUNTERMEASURES
Displaying RF
Detection
Information
You can use the CLI commands listed in Table 50 to display rogue
detection information.
Spoofed AP
AP Mac aa:bb:cc:dd:ee:ff(ssid myssid) is being spoofed.
Received fingerprint 1122343 does not match our
fingerprint 123344.
Detected by listener aa:bb:cc:dd:ee:fd(port 2, radio 1),
channel 11 with RSSI -53.
Disallowed SSID
detected
AP Mac aa:bb:cc:dd:ee:ff(ssid myssid) is not part of
ssid-list.
Detected by listener aa:bb:cc:dd:ee:fd(port 2, radio 1),
channel 11 with RSSI -53.
AP from disallowed
vendor detected
AP Mac aa:bb:cc:dd:ee:ff(ssid myssid) is not part of
vendor-list.
Detected by listener aa:bb:cc:dd:ee:fd(port 2, radio 1),
channel 11 with RSSI -53.
Client from
disallowed vendor
detected
Client Mac aa:bb:cc:dd:ee:ff is not part of vendor-list.
Detected by listener aa:bb:cc:dd:ee:fd(port 2, radio 1),
channel 11 with RSSI -53.
Interfering client seen
on wired network
Client Mac aa:bb:cc:dd:ee:ff is seen on the wired network
by WX 10.1.1.1 on port 3 vlan 2 tag 1. Detected by
listener aa:bb:cc:dd:ee:fd(port 2, radio 1), channel 11 with
RSSI -53.
Table 49
IDS and DoS Log Messages (continued)
Message Type
Example Log Message
Table 50
Rogue Detection Display Commands
Command
Description
display rfdetect clients
[
mac
mac-addr
]
Displays all wireless clients detected on the
air.
display rfdetect counters
Displays statistics for rogue and Intrusion
Detection System (IDS) activity detected by
the MAPs managed by a WX switch.
display rfdetect mobility-domain
[
ssid
ssid-name
|
bssid
mac-addr
]
Displays information about rogues detected
in a Mobility Domain.
This command is valid only on the Mobility
Domain’s seed switch.
Summary of Contents for 3CRWX120695A
Page 138: ...138 CHAPTER 6 CONFIGURING AND MANAGING IP INTERFACES AND SERVICES ...
Page 272: ...272 CHAPTER 11 CONFIGURING RF LOAD BALANCING FOR MAPS ...
Page 310: ...310 CHAPTER 13 CONFIGURING USER ENCRYPTION ...
Page 322: ...322 CHAPTER 14 CONFIGURING RF AUTO TUNING ...
Page 350: ...350 CHAPTER 16 CONFIGURING QUALITY OF SERVICE ...
Page 368: ...368 CHAPTER 17 CONFIGURING AND MANAGING SPANNING TREE PROTOCOL ...
Page 412: ...412 CHAPTER 19 CONFIGURING AND MANAGING SECURITY ACLS ...
Page 518: ...518 CHAPTER 21 CONFIGURING AAA FOR NETWORK USERS ...
Page 530: ...530 CHAPTER 22 CONFIGURING COMMUNICATION WITH RADIUS ...
Page 542: ...542 CHAPTER 23 MANAGING 802 1X ON THE WX SWITCH ...
Page 598: ...598 CHAPTER 26 ROGUE DETECTION AND COUNTERMEASURES ...
Page 706: ...706 GLOSSARY ...