set rfdetect black-list
555
When on-demand countermeasures are enabled (with the
set
radio-profile countermeasures configured
command) only those
devices configured in the attack list are subject to countermeasures. In
this case, devices found to be rogues by other means, such as policy
violations or by determining that the device is providing connectivity to
the wired network, are not attacked.
Examples
— The following command adds MAC address
aa:bb:cc:44:55:66 to the attack list:
WX4400#
set rfdetect attack-list 11:22:33:44:55:66
success: MAC 11:22:33:44:55:66 is now in attacklist.
See Also
clear rfdetect attack-list
on page 534
display rfdetect attack-list
on page 537
set radio-profile countermeasures
on page 355
set rfdetect
black-list
Adds an entry to the client black list. The client black list specifies clients
that are not allowed on the network. MSS drops all packets from the
clients on the black list.
Syntax
—
set rfdetect black-list
mac-addr
mac-addr
— MAC address you want to place on the black list.
Defaults
— The client black list is empty by default.
Access
— Enabled.
History
—Introduced in MSS Version 4.0.
Usage
— In addition to manually configured entries, the list can contain
entries added by MSS. MSS can place a client in the black list due to an
association, reassociation or disassociation flood from the client.
The client black list applies only to the WX switch on which the list is
configured. WX switches do not share client black lists.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...