![3Com OfficeConnect WX1200 Command Reference Manual Download Page 548](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270548.webp)
548
C
HAPTER
19: RF D
ETECTION
C
OMMANDS
BSSID: 00:0b:0e:00:7a:8a Vendor: 3Com SSID: 3com-webaaa
Type: intfr Adhoc: no Crypto-types: clear
WX-IPaddress: 10.8.121.102 Port/Radio/Ch: 3/1/1 Mac:
00:0b:0e:00:0a:6a
Device-type: interfering Adhoc: no Crypto-types: clear
RSSI: -75 SSID: 3Com-webaaa
WX-IPaddress: 10.3.8.103 Port/Radio/Ch: dap 1/1/1 Mac:
00:0b:0e:76:56:82
Device-type: interfering Adhoc: no Crypto-types: clear
RSSI: -76 SSID: 3Com-webaaa
Two types of information are shown. The lines that are not indented
show the BSSID, vendor, and information about the SSID. The indented
lines that follow this information indicate the listeners (MAP radios) that
detected the SSID. Each set of indented lines is for a separate MAP
listener.
In this example, two BSSIDs are mapped to the SSID. Separate sets of
information is shown for each of the BSSIDs, and information about the
listeners for each BSSID are shown.
The following command displays detailed information for a BSSID.
WX1200#
display rfdetect mobility-domain bssid
00:0b:0e:00:04:d1
BSSID: 00:0b:0e:00:04:d1 Vendor: Cisco SSID: notmycorp
Type: rogue Adhoc: no Crypto-types: clear
WX-IPaddress: 10.8.121.102 Port/Radio/Ch: 3/2/56 Mac:
00:0b:0e:00:0a:6b
Device-type: rogue Adhoc: no Crypto-types: clear
RSSI: -72 SSID: notmycorp
WX-IPaddress: 10.3.8.103 Port/Radio/Ch: dap 1/1/157 Mac:
00:0b:0e:76:56:82
Device-type: rogue Adhoc: no Crypto-types: clear
RSSI: -72 SSID: notmycorp
Table 99 and Table 100 describe the fields in these displays.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...