Hub/Switch Reference Guide
RF Detection Commands 543
Nortel WLAN—Security Switch 2300 Series Command Line Reference
Table 83 describes the fields in this display.
See Also
• show rfdetect data on page 524
• show rfdetect mobility-domain on page 526
rfping
Provides information about the RF link between the WSS and the client based on sending test packets to the client.
Syntax
rfping {mac mac-addr | session-id session-id}
Table 7: show rfdetect visible Output
Field Description
Transmit MAC MAC address the rogue device that sent the 802.11 packet
detected by the AP radio.
Vendor Company that manufactures or sells the rogue device.
Type Classification of the rogue device:
• rogue—Wireless device that is on the network but
is not supposed to be on the network.
• intfr—Wireless device that is not part of your
network and is not a rogue, but might be causing
RF interference with AP radios.
• known—Device that is a legitimate member of the
network.
Ch Channel number on which the radio detected the rogue.
RSSI Received signal strength indication (RSSI)—the strength of the
RF signal detected by the AP radio, in decibels referred to
1 milliwatt (dBm).
Flags Classification and encryption information for the rogue:
• The i, a, or u flag indicates the classification.
• The other flags indicate the encryption used by the
rogue.
For flag definitions, see the key in the command output.
SSID SSID used by the detected device.
mac-addr Tests the RF link between the WSS and the client with the specified MAC
address.
session-id Tests the RF link between the WSS and the client with the specified local
session ID.










