Specifications
set rfdetect black-list
Chapter 19
RF Detection Commands
553
Syntax
set rfdetect attack-list mac-addr
Defaults
The attack list is empty by default.
Access
Enabled.
Usage
The attack list applies only to the UNIVERGE WL Controller on which
the list is configured. UNIVERGE WL Controllers do not share attack lists.
When on-demand countermeasures are enabled (with the set radio-profile
countermeasures configured command) only those devices configured in the
attack list are subject to countermeasures. In this case, devices found to be rogues
by other means, such as policy violations or by determining that the device is
providing connectivity to the wired network, are not attacked.
Examples
The following command adds MAC address aa:bb:cc:44:55:66 to the
attack list:
PROPMT# set rfdetect attack-list 11:22:33:44:55:66
success: MAC 11:22:33:44:55:66 is now in attacklist.
See Also
l clear rfdetect attack-list on page 548
l show rfdetect attack-list on page 559
l set radio-profile countermeasures on page 307
set rfdetect black-list
Adds an entry to the client black list. The client black list specifies clients that are
not allowed on the network. UNIVERGE WL Control System drops all packets
from the clients on the black list.
Syntax
set rfdetect black-list mac-addr
mac-addr MAC address you want to attack.
mac-addr MAC address you want to place on the black list.