Specifications
Configuring Rogue Detection Lists
22-10 Rogue Detection and Countermeasures
Configuring an Ignore List
Bydefault,whencountermeasuresareenabled,MSSconsidersanynon‐Enterasystransmitterto
bearoguedeviceandcansendcountermeasurestopreventclientsfromusingthatdevice.To
preventMSSfromsendingcountermeasuresagainstafriendlydevice,addthedevicetothe
knowndeviceslist.
Ifyouaddadevice
thatMSShasclassifiedasaroguetothepermittedvendorlistorpermitted
SSIDlist,butnottotheignorelist,MSScanstillclassifythedeviceasarogue.Adding anentryto
thepermittedvendorlistorpermittedSS IDlistmerelyindicatesthatthedeviceisfroman
allowed
manufacturerorisusinganallowedSSID.However,tocauseMSStostop classifyingthedeviceas
arogue,youmustaddthedevice’sMACaddresstotheignorelist.
Toaddadevicetotheignorelist,usethefollowingcommand:
set rfdetect ignore mac-addr
Themac‐addristheBSSIDofthedeviceyouwanttoignore.
Examples
ToignoreBSSIDaa:bb:cc:11:22:33duringallRFscans,typethefollowingcommand:
RBT-8100#set rfdetect ignore aa:bb:cc:11:22:33
success: MAC aa:bb:cc:11:22:33 is now ignored.
ToremoveaBSSIDfromtheignore list,usethefollowingcommand:
clear rfdetect ignore mac-addr
Todisplaytheignorelist,usethefollowingcommand:
show rfdetect ignore
ThefollowingcommanddisplaysanignorelistcontainingtwoBSSIDs:
RBT-8100# show rfdetect ignore
Total number of entries: 2
Ignore MAC
-----------------
aa:bb:cc:11:22:33
aa:bb:cc:44:55:66
Note: If you try to initiate countermeasures against a device on the ignore list, the ignore list takes
precedence and MSS does not issue the countermeasures. Countermeasures apply only to rogue
devices.