Hub/Switch Reference Guide

532 RF Detection Commands
NN47250-100 (Version 02.51)
show rfdetect countermeasures
Displays the current status of countermeasures against rogues in the Mobility Domain.
Syntax
show rfdetect countermeasures
Defaults
None.
Access
Enabled.
History
Usage
This command is valid only on the seed switch of the Mobility Domain.
Examples
The following example displays countermeasures status for the Mobility Domain:
WSS# show rfdetect countermeasures
Total number of entries: 190
Rogue MAC Type Countermeasures WSS-IPaddr Port/Radio
Radio Mac /Channel
----------------------------------------------------------------------------------------------------
00:0b:0e:00:71:c0 intfr 00:0b:0e:44:55:66 10.1.1.23 ap 4/1/6
00:0b:0e:03:00:80 rogue 00:0b:0e:11:22:33 10.1.1.23 ap 2/1/11
Table 79 describes the fields in this display.
Typ Classification of the rogue device:
rogue—Wireless device that is on the network but
is not supposed to be on the network.
intfr—Wireless device that is not part of your
network and is not a rogue, but might be causing
RF interference with AP radios.
known—Device that is a legitimate member of the
network.
Dst MAC addressed to which the last 802.11 packet detected from the
client was addressed.
Last Rogue Status Check Number of seconds since the WSS looked on the air for the AP
with which the rogue client is associated. The switch looks for the
client’s AP by sending a packet from the wired side of the
network addressed to the client, and watching the air for a
wireless packet containing the client’s MAC address.
Version 4.0 Output no longer lists rogues for which countermeasures have
not been started.
Table 2: show rfdetect clients mac Output (continued)
Field Description