![3Com OfficeConnect WX1200 Command Reference Manual Download Page 558](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270558.webp)
558
C
HAPTER
19: RF D
ETECTION
C
OMMANDS
See Also
clear rfdetect attack-list
on page 534
display rfdetect ignore
on page 546
set rf detect countermeasures
on page 556
set rfdetect ignore
Configures a list of known devices to ignore during an RF scan. MSS does
not generate log messages or traps for the devices in the ignore list.
Syntax
—
set rfdetect ignore
mac-addr
mac-addr
— BSSID (MAC address) of the device to ignore.
Defaults
— MSS reports all unknown BSSIDs detected during an RF scan.
Access
— Enabled.
History
—Introduced in MSS Version 3.0.
Usage
— Use this command to identify third-party APs and other devices
you are already aware of and do not want MSS to report following RF
scans.
If you try to initiate countermeasures against a device on the ignore list,
the ignore list takes precedence and MSS does not issue the
countermeasures. Countermeasures apply only to rogue devices.
If you add a device that MSS has classified as a rogue to the permitted
vendor list or permitted SSID list, but not to the ignore list, MSS can still
classify the device as a rogue. Adding an entry to the permitted vendor
list or permitted SSID list merely indicates that the device is from an
allowed manufacturer or is using an allowed SSID. However, to cause
MSS to stop classifying the device as a rogue, you must add the device’s
MAC address to the ignore list.
After you add a device that has been classified as a rogue to the ignore
list, the device remains classified as a rogue for at least 10 minutes. After
10 minutes, MSS reclassifies the device as an interfering device.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...