Operation Manual
RF Detection Commands
Mobility System Software Command Reference Guide
Version 7.3
20 – 466
History
Introduced in MSS Version 4.0.
Usage
In addition to manually configured entries, the list can contain entries added by MSS.
MSS can place a client in the blacklist due to an association, reassociation or disassociation flood
from the client.
The client black list applies only to the MX with the configured list. MX switches do not share
client blacklists.
MSS supports up to 1024 clients in the black list.
Examples
The following command adds client MAC address 11:22:33:44:55:66 to the black list:
MX# set rfdetect black-list 11:22:33:44:55:66
success: MAC 11:22:33:44:55:66 is now blacklisted.
See Also
● set rfdetect black-list on page 20-465
● show rfdetect black-list on page 20-471
set rfdetect black-list dynamic
Adds the ability to create a dynamic black list of rogue signals.
Syntax
set rfdetect black-list dynamic {enable | disable} [duration seconds]
Defaults
None
Access
Enabled
History
Introduced in MSS Version 7.1.
Examples
To allow an entry to stay on the black-list for 60 seconds, you must first enable the
feature and then configure the duration:
MX# set rdetect black-list dynamic enable
success: change accepted.
MX# set rfdetect black-list dynamic duration 60
success: change accepted.
set rfdetect classification ad-hoc
Used to classify devices as ad-hoc devices on the network.
Syntax
set rfdetect classification ad-hoc [rogue | skip-test]
Defaults
None
Access
Enabled
enable | disable Enables or disables the dynamic black-list feature.
duration seconds Length of time that an entry should stay on the black list
in seconds. The range is 1 to 2147483647 seconds.
rogue
Detects ad-hoc networks and classifies them as rogues
skip-test
Omit looking for ad-hoc networks and go to the next classification
step.