System information
339
DWS-1008 CLI Reference Guide
D-Link Systems, Inc.
RF Detection Commands
set rfdetect ignore
Configures a list of known devices to ignore during an RF scan. MSS does not generate log
messages or traps for the devices in the ignore list.
Syntax: set rfdetect ignore mac-addr
mac-addr BSSID (MAC address) of the device to ignore.
Defaults: MSS reports all non-D-Link BSSIDs detected during an RF scan.
Access: Enabled.
Usage: Use this command to identify third-party APs and other devices you are
already aware of and do not want MSS to report following RF scans.
If you try to initiate countermeasures against a device on the ignore list, the ignore list takes
precedence and MSS does not issue the countermeasures. Countermeasures apply only to
rogue devices.
Examples: The following command configures MSS to ignore BSSID aa:bb:cc:11:22:33
during RF scans:
DWS-1008# set rfdetect ignore aa:bb:cc:11:22:33
success: MAC aa:bb:cc:11:22:33 is now ignored.
set rfdetect log
Disables or reenables generation of log messages when rogues are detected or when they
disappear.
Syntax: set rfdetect log {enable | disable}
enable
Enables logging of rogues.
disable
Disables logging of rogues.
Defaults: RF detection logging is enabled by default.
Access: Enabled.
Usage: The log messages for rogues are generated only on the seed and appear only
in the seed’s log message buffer. Use the show log buffer command to display
the messages in the seed switch’s log message buffer.
Examples: The following command enables RF detection logging:
DWS-1008# set rfdetect log enable
success: rfdetect logging is enabled.










