System information

341
DWS-1008 CLI Reference Guide
D-Link Systems, Inc.
RF Detection Commands
AP or client vendors that are allowed on the network. MSS does not list a device as a rogue
or interfering device if the device’s OUI is in the permitted vendor list.
Syntax: set rfdetect vendor-list {client | ap} mac-addr
client | ap Specifies whether the entry is for an AP brand or
a client brand.
mac-addr | all Organizationally Unique Identifier (OUI) to
remove.
Defaults: The permitted vendor list is empty by default and all vendors are allowed.
However, after you add an entry to the list, MSS allows only the devices whose
OUIs are on the list.
Access: Enabled.
Usage: The permitted vendor list applies only to the switch on which the list is
configured. Switches do not share permitted vendor lists.
Examples: The following command adds an entry for clients whose MAC addresses start
with aa:bb:cc:
DWS-1008# set rfdetect vendor-list client aa:bb:cc:00:00:00
success: MAC aa:bb:cc:00:00:00 is now in client vendor-list.
The trailing 00:00:00 value is required.
show rfdetect attack-list
Displays information about the MAC addresses in the attack list.
Syntax: show rfdetect attack-list
Defaults: None.
Access: Enabled.
Examples: The following example shows the attack list on switch:
DWS-1008# show rfdetect attack-list
Total number of entries: 1
Attacklist MAC Port/Radio/Chan RSSI SSID
------------------------ ----------------------- ------- ---------------
11:22:33:44:55:66 dap 2/1/11 -53 rogue-ssid
show rfdetect black-list
Displays information abut the clients in the client black list.
Syntax: show rfdetect black-list
Defaults: None.
Access: Enabled.
Examples: The following example shows the client black list on switch:
DWS-1008# show rfdetect black-list