
Sample Output:
WCP8180#show wireless security wids-wips rogue-ap-classification
Domain Role :Active MDC
Total Rogue APs :6
Total Unknown APs :93
AP Rogue Classification Description
Test ID 1 Administrator configured rogue AP
Test ID 2 Managed SSID received from an unknown AP
Test ID 3 Managed SSID received from a fake managed AP
Test ID 4 Beacon received from an AP without SSID
Test ID 5 Beacon received from a fake managed AP on an invalid channel
Test ID 6 Managed SSID detected with incorrect security configuration
Test ID 7 Invalid SSID received from a managed AP
Test ID 8 AP is operating on an illegal channel
Test ID 9 Known Standalone AP is incorrectly configured
Test ID 10 AP is operating as a WDS device
Test ID 11 Unmanaged AP detected on wired network
-------------------------------------------------------------------------
---
AP MAC: 00:1B:4F:6A:59:B0
Test Cond Test Test Time Since Time Since
ID Reporting AP MAC Radio Detect Config Result 1st Report Last Report
---- ----------------- ----- ------ ------- ------ ------------
------------
1 00:00:00:00:00:00 0 False Disable 0d:00:00:00 0d:00:00:00
2 5C:E2:86:0F:51:40 2 True Enable Rogue 1:02:56:12 0d:00:00:08
3 00:00:00:00:00:00 0 False Enable 0d:00:00:00 0d:00:00:00
4 00:00:00:00:00:00 0 False Enable 0d:00:00:00 0d:00:00:00
5 00:00:00:00:00:00 0 False Enable 0d:00:00:00 0d:00:00:00
6 00:00:00:00:00:00 0 False Enable 0d:00:00:00 0d:00:00:00
7 00:00:00:00:00:00 0 False Enable 0d:00:00:00 0d:00:00:00
8 00:00:00:00:00:00 0 False Enable 0d:00:00:00 0d:00:00:00
9 00:00:00:00:00:00 0 False Disable 0d:00:00:00 0d:00:00:00
10 00:00:00:00:00:00 0 False Enable 0d:00:00:00 0d:00:00:00
11 00:00:00:00:00:00 0 False Enable 0d:00:00:00 0d:00:00:00
-------------------------------------------------------------------------
---
Show wireless security wids-wips rogue-client-control
Sample Output:
WCP8180#show wireless security wids-wips rogue-client-controls
Rogue detected trap interval: 300
Known client database radius profile:
Threshold Threshold
Rogue State Interval Value
---------------------------------------- ---------- ---------- ----------
Client is not in known DB Disabled
Authenication request exceeded Enabled 60 10
Probe request exceeded Enabled 60 120
DeAuthenication request exceeded Enabled 60 10
Authenication failure exceeded Enabled 5
Client is authenicated with unknown AP Disabled
Show wireless security wids-wips rogue-client-classification
ACLI reference for the Wireless LAN (WLAN) 8100
Avaya WLAN 8100 CLI Reference
August 2013 109
Содержание WLAN 8100 Series
Страница 1: ...Avaya WLAN 8100 CLI Reference Release 2 1 0 NN47251 107 Issue 05 02 August 2013 ...
Страница 4: ...4 Avaya WLAN 8100 CLI Reference August 2013 Comments infodev avaya com ...
Страница 6: ...6 Avaya WLAN 8100 CLI Reference August 2013 ...
Страница 12: ...Overview of WLAN deployment solutions 12 Avaya WLAN 8100 CLI Reference August 2013 Comments infodev avaya com ...
Страница 144: ...ACLI reference for Wireless LAN WLAN 8100 144 Avaya WLAN 8100 CLI Reference August 2013 Comments infodev avaya com ...
Страница 376: ...ACLI Reference for wired networks 376 Avaya WLAN 8100 CLI Reference August 2013 Comments infodev avaya com ...
Страница 382: ...Supported Country Codes 382 Avaya WLAN 8100 CLI Reference August 2013 Comments infodev avaya com ...