Hub/Switch Reference Guide
524 RF Detection Commands
NN47250-100 (Version 02.51)
clear rfdetect vendor-list
Removes an entry from the permitted vendor list.
Syntax
clear rfdetect vendor-list {client | ap} mac-addr | all
Defaults
None.
Access
Enabled.
History
Introduced in WSS Software Version 4.0.
Examples
The following command removes client OUI aa:bb:cc:00:00:00 from the permitted
vendor list:
WSS# clear rfdetect vendor-list client aa:bb:cc:00:00:00
success: aa:bb:cc:00:00:00 is no longer in client vendor-list.
See Also
• set rfdetect vendor-list on page 518
• show rfdetect vendor-list on page 531
set rfdetect attack-list
Adds an entry to the attack list. The attack list specifies the MAC addresses of devices that WSS Software
should issue countermeasures against whenever the devices are detected on the network. The attack list can
contain the MAC addresses of APs and clients.
Syntax
set rfdetect attack-list mac-addr
Defaults
The attack list is empty by default.
Access
Enabled.
History
Introduced in WSS Software Version 4.0.
Usage
The attack list applies only to the WSS on which the list is configured. WSSs do not share
attack lists.
When on-demand countermeasures are enabled (with the set radio-profile countermeasures configured
command) only those devices configured in the attack list are subject to countermeasures. In this case, devices
found to be rogues by other means, such as policy violations or by determining that the device is providing
connectivity to the wired network, are not attacked.
client | ap Specifies whether the entry is for an AP brand or a client brand.
mac-addr | all Organizationally Unique Identifier (OUI) to remove.
mac-addr MAC address you want to attack.










