![3Com OfficeConnect WX1200 Command Reference Manual Download Page 556](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270556.webp)
556
C
HAPTER
19: RF D
ETECTION
C
OMMANDS
Examples
— The following command adds client MAC address
11:22:33:44:55:66 to the black list:
WX1200#
set rfdetect black-list 11:22:33:44:55:66
success: MAC 11:22:33:44:55:66 is now blacklisted.
See Also
set rfdetect black-list
on page 555
display rfdetect black-list
on page 538
set rf detect
countermeasures
Enables or disables countermeasures for the Mobility Domain.
Countermeasures are packets sent by a radio to prevent clients from
being able to use a rogue access point.
CAUTION:
Countermeasures affect wireless service on a radio. When a
MAP radio is sending countermeasures, the radio is disabled for use by
network traffic, until the radio finishes sending the countermeasures.
Syntax
—
set rfdetect countermeasures
{
enable
|
disable
}
enable
— Enables countermeasures.
disable
— Disables countermeasures.
Defaults
— Countermeasures are disabled by default.
Access
— Enabled.
History
—Introduced in MSS Version 3.0.
Usage
— This command is valid only on the seed switch of the Mobility
Domain.
Examples
— The following command enables countermeasures for the
Mobility Domain managed by this seed switch:
WX1200#
set rfdetect countermeasures enable
success: countermeasures are now enabled.
See Also
clear rfdetect attack-list
on page 534
display rfdetect ignore
on page 546
set rfdetect countermeasures mac
on page 557
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...