![3Com OfficeConnect WX1200 Command Reference Manual Download Page 560](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270560.webp)
560
C
HAPTER
19: RF D
ETECTION
C
OMMANDS
set rfdetect
signature
Enables MAP signatures. A MAP signature is a set of bits in a
management frame sent by a MAP that identifies that MAP to MSS. If
someone attempts to spoof management packets from a 3Com MAP,
MSS can detect the spoof attempt.
Syntax
—
set rfdetect signature {enable | disable}
enable
— Enables MAP signatures.
disable
— Disables MAP signatures.
Defaults
— MAP signatures are disabled by default.
Access
— Enabled.
History
—Introduced in MSS Version 4.0.
Usage
— The command applies only to MAPs managed by the WX
switch on which you enter the command. To enable signatures on all
MAPs in a Mobility Domain, enter the command on each WX switch in
the Mobility Domain.
You must use the same MAP signature setting (enabled or disabled) on all
WX switches in a Mobility Domain.
Examples
— The following command enables MAP signatures on a WX
switch:
WX1200#
set rfdetect signature enable
success: signature is now enabled.
set rfdetect ssid-list
Adds an SSID to the permitted SSID list.The permitted SSID list specifies
the SSIDs that are allowed on the network. If MSS detects packets for an
SSID that is not on the list, the AP that sent the packets is classified as a
rogue. MSS issues countermeasures against the rogue if they are
enabled.
Syntax
—
set rfdetect ssid-list
ssid-name
ssid-name
— SSID name you want to add to the permitted SSID list.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...