Specifications

Configuring Rogue Detection Lists
22-6 Rogue Detection and Countermeasures
Configuring Rogue Detection Lists
Thefollowingsectionsdescribehowtoconfigureliststospecifythedevicesthatareallowedon
thenetworkandthedevicesthatMSSshouldattackwithcountermeasures.
(ForinformationabouthowMSSusesthelists,seeRogueDetectionListsonpage 222.)
Configuring a Permitted Vendor List
Thepermittedvendorlistspecif iesthethirdpartyAPorclientvendorsthatareallowedonthe
network.MSSdoesnotlistadeviceasarogueorinterferingdeviceifthedevice’sOUIisinthe
permittedvendorlist.
Bydefault,thepermittedvendorlistisemptyandallvendors
areallowed.Ifyouconfigurea
permittedvendorlist,MSSallowsonlythedeviceswhoseOUIsareonthelist.Thepermitted
vendorlistappliesonlytotheRASonwhichthelistisconfigured.RoamAboutswitchesdonot
sharepermittedvendorlists.
Toaddanentrytothepermittedvendor
list,usethefollowingcommand:
set rfdetect vendor-list {client | ap} mac-addr
Examples
ThefollowingcommandaddsanentryforclientswhoseMACaddressesstartwithaa:bb:cc:
RBT-8100# set rfdetect vendor-list client aa:bb:cc:00:00:00
success: MAC aa:bb:cc:00:00:00 is now in client vendor-list.
The trailing 00:00:00 value is required.
Ignore list List of MAC addresses to ignore during RF
detection. MSS does not classify devices on
this list as rogues or interfering devices, and
does not issue countermeasures against them.
Yes Yes
Countermeasures Packets sent by Enterasys APs to interfere with
the operation of a rogue.
Countermeasures are configurable a radio-
profile basis.
Yes Yes
Active scan Active scan sends probe any requests (probes
with a null SSID name) to look for rogue APs.
Active scan is configurable on a radio-profile
basis.
Yes No
Enterasys AP signature Value in an AP’s management frames that
identifies the AP to MSS. AP signatures help
prevent spoofing of the AP MAC address.
No No
Log messages and traps Messages and traps for rogue activity.
Messages are described in “IDS and DoS
Alerts” on page 22-12.
Yes Yes
Table 22-1 Rogue Detection Features (continued)
Rogue Detection Feature Description
Applies To
Third-Party APs Clients