Command Reference Guide
528 CHAPTER 17: RF DETECTION COMMANDS
See Also
display rfdetect data on page 518
display rfdetect mobility-domain on page 521
set rfdetect
active-scan
Deprecated in MSS Version 4.0. You now can disable or reenable active
scan in individual radio profiles. See set radio-profile active-scan on
page 330.
set rfdetect
attack-list
Adds an entry to the attack list. The attack list specifies the MAC address
of devices that MSS should issue countermeasures against whenever the
devices are detected on the network. The attack list can contain the MAC
addresses of APs and clients.
Syntax —
set rfdetect attack-list mac-addr
mac-addr — MAC address you want to attack.
Defaults — The attack list is empty by default.
Type Classification of the rogue device:
rogue—Wireless device that is on the network but is not
supposed to be on the network.
intfr—Wireless device that is not part of your network
and is not a rogue, but might be causing RF interference
with MAP radios.
known—Device that is a legitimate member of the
network.
Ch Channel number on which the radio detected the rogue.
RSSI Received signal strength indication (RSSI)—the strength of
the RF signal detected by the MAP radio, in decibels referred
to 1 milliwatt (dBm).
Flags Classification and encryption information for the rogue:
The i, a, or u flag indicates the classification.
The other flags indicate the encryption used by the rogue.
For flag definitions, see the key in the command output.
SSID SSID used by the detected device.
Table 99 display rfdetect visible Output (continued)
Field Description