Specifications
19-28 RF Detection Commands
Table 19‐5andTable 19‐6describethefieldsinthesedisplays.
Table 19-5 show rfdetect mobility-domain Output
Output What it displays...
BSSID MAC address of the SSID used by the detected device.
Vendor Company that manufactures or sells the rogue device.
Type Classification of the rogue device:
• rogue—Wireless device that is not supposed to be on the network. The
device has an entry in a RoamAbout switch’s FDB and is therefore on the
network.
• intfr—Wireless device that is not part of your network but is not a rogue.
The device does not have an entry in a RoamAbout switch’s FDB and is
not actually on the network, but might be causing RF interference with
access point radios.
• known—Device that is a legitimate member of the network.
Flags Classification and encryption information for the rogue:
• The i, a, or u flag indicates the classification.
• The other flags indicate the encryption used by the rogue.
For flag definitions, see the key in the command output.
SSID SSID used by the detected device.
Table 19-6 show rfdetect mobility-domain ssid or bssid Output
Field Description
BSSID MAC address of the SSID used by the detected device.
Vendor Company that manufactures or sells the rogue device.
SSID SSID used by the detected device.
Type Classification of the rogue device:
• rogue—Wireless device that is on the network but is not supposed to be
on the network.
• intfr—Wireless device that is not part of your network and is not a rogue,
but might be causing RF interference with access point radios.
• known—Device that is a legitimate member of the network.
Adhoc Indicates whether the rogue is an infrastructure rogue (is using an AP) or is
operating in ad-hoc mode.
Crypto-Types Encryption type:
• clear (no encryption)
• ccmp
• tkip
• wep104 (WPA 104-bit WEP)
• wep40 (WPA 40-bit WEP)
• wep (non-WPA WEP)
RAS-IPaddress System IP address of the RoamAbout switch that detected the rogue.