D-Link DWS-1008 CLI Manual
8
The table below describes the fields in this display.
Field
Description
Transmit MAC
MAC address the rogue device that sent the 802.11 packet detected by the AP radio
Vendor
Company that manufactures or sells the rogue device.
Type
Classification of the rogue device:
• rogue—Wireless device that is on the network but is not supposed to be on the
network.
• intfr—Wireless device that is not part of your network and is not a rogue, but might be
causing RF interference with AP radios.
• known—Device that is a legitimate member of the network.
Ch
Channel number on which the radio detected the rogue.
RSSI
Received signal strength indication (RSSI)—the strength of the RF signal detected by the
AP radio, in decibels referred to 1 milliwatt (dBm).
Flags
Classification and encryption information for the rogue:
• The i, a, or u flag indicates the classification.
• The other flags indicate the encryption used by the rogue.
For flag definitions, see the key in the command output.
SSID
SSID used by the detected device.
See Also:
• show rfdetect data
test rflink
Provides information about the RF link between the switch and the client based on sending test
packets to the client.
Syntax: test rflink {mac
mac-addr
| session-id
session-id
}
mac-addr
Tests the RF link between the switch and the client with the specified
MAC address.
session-id
Tests the RF link between the switch and the client with the specified
local session ID.
Defaults: None.
Access: Enabled.
Usage: Use this command to send test packets to a specified client. The output of the command
indicates the number of test packets received and acknowledged by the client, as well as the
client’s signal strength and signal-to-noise ratio.
Summary of Contents for DWS-1008
Page 1: ......
Page 27: ...D Link DWS 1008 CLI Manual 24 ...