Specifications

xxviii
Specifying an Alternate SODA Agent Directory for a Service Profile....................................................20-10
Example..........................................................................................................................................20-10
Uninstalling the SODA Agent Files from the RoamAbout Switch..........................................................20-11
Example..........................................................................................................................................20-11
Displaying SODA Configuration Information .........................................................................................20-12
Example..........................................................................................................................................20-12
Chapter 21: Managing Sessions
About the Session Manager ..........................................................................................................................21-1
Displaying and Clearing Administrative Sessions .........................................................................................21-1
Displaying and Clearing All Administrative Sessions ..............................................................................21-2
Displaying and Clearing an Administrative Console Session..................................................................21-2
Displaying and Clearing Administrative Telnet Sessions ........................................................................21-2
Displaying and Clearing Client Telnet Sessions .....................................................................................21-3
Example............................................................................................................................................ 21-3
Displaying and Clearing Network Sessions...................................................................................................21-3
Example ..................................................................................................................................................21-3
Displaying Verbose Network Session Information ..................................................................................21-4
Example............................................................................................................................................ 21-4
Displaying and Clearing Network Sessions by Username ......................................................................21-5
Examples..........................................................................................................................................21-5
Displaying and Clearing Network Sessions by MAC Address ................................................................21-6
Examples..........................................................................................................................................21-6
Displaying and Clearing Network Sessions by VLAN Name...................................................................21-6
Examples..........................................................................................................................................21-6
Displaying and Clearing Network Sessions by Session ID .....................................................................21-7
Examples..........................................................................................................................................21-7
Displaying and Changing Network Session Timers.......................................................................................21-8
Disabling Keepalive Probes ....................................................................................................................21-8
Changing or Disabling the User Idle Timeout .........................................................................................21-8
Examples..........................................................................................................................................21-8
Chapter 22: Rogue Detection and Countermeasures
About Rogues and RF Detection................................................................................................................... 22-2
Rogue Access Points and Clients ...........................................................................................................22-2
Rogue Classification.........................................................................................................................22-2
Rogue Detection Lists ......................................................................................................................22-2
RF Detection Scans ................................................................................................................................22-4
Dynamic Frequency Selection (DFS) ...............................................................................................22-4
Countermeasures....................................................................................................................................22-5
Mobility Domain Requirement .................................................................................................................22-5
Summary of Rogue Detection Features ........................................................................................................22-5
Configuring Rogue Detection Lists ................................................................................................................ 22-6
Configuring a Permitted Vendor List .......................................................................................................22-6
Examples..........................................................................................................................................22-6
Configuring a Permitted SSID List ..........................................................................................................22-7
Examples..........................................................................................................................................22-7
Configuring a Client Black List ................................................................................................................22-8
Examples..........................................................................................................................................22-8
Configuring an Attack List .......................................................................................................................22-9
Examples..........................................................................................................................................22-9