Specifications

RoamAbout Mobility System Software Command Line Reference 19-33
00:0a:5e:4b:4a:c4 3Com intfr 11 -85 ic---- ets-ccmp
00:0a:5e:4b:4a:c6 3Com intfr 11 -85 i-t--- ets-tkip
00:0a:5e:4b:4a:c8 3Com intfr 11 -83 i----w ets-voip
00:0a:5e:4b:4a:ca 3Com intfr 11 -85 i----- ets-webaaa
...
Table 197describesthefieldsinthisdisplay.
Examples
Thefollowingcommanddisplaysthedevicesdetectedby Enterasys Networksradio
00:0b:0e:00:0a:6a:
RBT-8100# show rfdetect visible 00:0b:0e:00:0a:6a
Total number of entries: 4
Transmit MAC Chan RSS
----------------- -------- -------
00:0b:0e:00:02:01 56 -74
00:0b:0e:00:03:41 36 -44
00:0b:0e:00:0b:01 52 -79
00:0b:0e:ff:00:01 36 -84
Table 19-7 show rfdetect visible Output
Output What it displays...
Transmit MAC MAC address the rogue device that sent the 802.11 packet detected by the
access point radio.
Vendor Company that manufactures or sells the rogue device.
Type Classification of the rogue device:
rogue—Wireless device that is on the network but is not supposed to be
on the network.
intfr—Wireless device that is not part of your network and is not a rogue,
but might be causing RF interference with access point radios.
known—Device that is a legitimate member of the network.
Ch Channel number on which the radio detected the rogue.
RSSI Received signal strength indication (RSSI)—the strength of the RF signal
detected by the AP radio, in decibels referred to 1 milliwatt (dBm).
Flags Classification and encryption information for the rogue:
The i, a, or u flag indicates the classification.
The other flags indicate the encryption used by the rogue.
For flag definitions, see the key in the command output.
SSID SSID used by the detected device.