![3Com OfficeConnect WX1200 Command Reference Manual Download Page 561](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270561.webp)
set rfdetect vendor-list
561
Defaults
— The permitted SSID list is empty by default and all SSIDs are
allowed. However, after you add an entry to the list, MSS allows traffic
only for the SSIDs that are on the list.
Access
— Enabled.
History
—Introduced in MSS Version 4.0.
Usage
— The permitted SSID list applies only to the WX switch on which
the list is configured. WX switches do not share permitted SSID lists.
If you add a device that MSS has classified as a rogue to the permitted
SSID list, but not to the ignore list, MSS can still classify the device as a
rogue. Adding an entry to the permitted SSID list merely indicates that
the device is using an allowed SSID. However, to cause MSS to stop
classifying the device as a rogue, you must add the device’s MAC address
to the ignore list.
Examples
— The following command adds SSID
mycorp
to the list of
permitted SSIDs:
WX1200#
set rfdetect ssid-list mycorp
success: ssid mycorp is now in ssid-list.
See Also
clear rfdetect ssid-list
on page 536
display rfdetect ssid-list
on page 550
set rfdetect
vendor-list
Adds an entry to the permitted vendor list. The permitted vendor list
specifies the third-party AP or client vendors that are allowed on the
network. MSS does not list a device as a rogue or interfering device if the
device’s OUI is in the permitted vendor list.
Syntax
—
set rfdetect vendor-list {client | ap}
mac-addr
client | ap
— Specifies whether the entry is for an AP brand or a
client brand.
mac-addr
— Organizationally Unique Identifier (OUI) to remove.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...