Specifications
19-22 RF Detection Commands
RBT-8100# show rfdetect countermeasures
Total number of entries: 8
Rogue MAC Countermeasures RBT-IPaddr Port/Radio
Radio Mac /Channel
----------------- ------------------ --------------- -------------
00:00:00:01:7a:80 00:0b:0e:00:0a:a3 10.8.121.101 5/2/60
00:0b:0e:08:1a:01 Not Started
00:0b:0e:01:00:00 Not Started
00:0b:0e:00:03:80 00:0b:0e:00:0a:6a 10.8.121.102 3/1/1
00:0b:0e:00:d1:00 00:0b:0e:00:0a:6a 10.8.121.102 3/1/11
00:0b:0e:00:7a:80 00:0b:0e:00:0a:6b 10.8.121.102 3/2/60
00:06:25:51:e9:ff Not Started
00:0b:0e:01:08:40 00:0b:0e:00:0a:6a 10.8.121.102 3/1/1
Related Commands
• setradio‐profilecountermeasuresonpage 11‐57
• clearrfdetectcountermeasuresmaconpage 19‐5
• setrfdetectignoreonpage 19‐11
Port/Radio/Channel Port number, radio number, and channel number of the countermeasures
radio. For a Distributed access point, the connection number is labeled dap.
(This stands for distributed ap.)
Table 19-3 show rfdetect countermeasures Output (continued)
Output What it displays...
Rogue MAC BSSID of the rogue.
Type Classification of the rogue device:
• rogue—Wireless device that is on the network but is not supposed to be
on the network.
• intfr—Wireless device that is not part of your network and is not a rogue,
but might be causing RF interference with access point radios.
• known—Device that is a legitimate member of the network.