Specifications

set rfdetect log
Chapter 19
RF Detection Commands
555
Usage
Use this command to identify third-party APs and other devices you are
already aware of and do not want UNIVERGE WL Control System to report
following RF scans.
If you try to initiate countermeasures against a device on the ignore list, the ignore
list takes precedence and UNIVERGE WL Control System does not issue the
countermeasures. Countermeasures apply only to rogue devices.
If you add a device that UNIVERGE WL Control System has classified as a rogue
to the permitted vendor list or permitted SSID list, but not to the ignore list,
UNIVERGE WL Control System can still classify the device as a rogue. Adding
an entry to the permitted vendor list or permitted SSID list merely indicates that
the device is from an allowed manufacturer or is using an allowed SSID.
However, to cause UNIVERGE WL Control System to stop classifying the device
as a rogue, you must add the devices MAC address to the ignore list.
Examples
The following command configures UNIVERGE WL Control System
to ignore BSSID aa:bb:cc:11:22:33 during RF scans:
Controller# set rfdetect ignore aa:bb:cc:11:22:33
success: MAC aa:bb:cc:11:22:33 is now ignored.
See Also
l clear rfdetect ignore on page 549
l show rfdetect ignore on page 568
set rfdetect log
Disables or reenables generation of log messages when rogues are detected or
when they disappear.
Syntax
set rfdetect log {enable | disable}
Defaults
RF detection logging is enabled by default.
Access
Enabled.
enable Enables logging of rogues.
disable Disables logging of rogues.