display rfdetect visible 553
----------------- ------- ----- --- ---- ------ --------------------------------
00:07:50:d5:cc:91 Cisco intfr 6 -60 i----w r27-cisco1200-2
00:07:50:d5:dc:78 Cisco intfr 6 -82 i----w r116-cisco1200-2
00:09:b7:7b:8a:54 Cisco intfr 2 -54 i-----
00:0a:5e:4b:4a:c0 3Com intfr 11 -57 i----- public
00:0a:5e:4b:4a:c2 3Com intfr 11 -86 i-t1-- 3Comwlan
00:0a:5e:4b:4a:c4 3Com intfr 11 -85 ic---- 3com-ccmp
00:0a:5e:4b:4a:c6 3Com intfr 11 -85 i-t--- 3com-tkip
00:0a:5e:4b:4a:c8 3Com intfr 11 -83 i----w 3com-voip
00:0a:5e:4b:4a:ca 3Com intfr 11 -85 i----- 3com-webaaa
...
Table101 describes the fields in this display.
See Also
display rfdetect data on page 544
display rfdetect mobility-domain on page 546

Table101 display rfdetect visible Output

Field Description
Transmit MAC MAC address the rogue device that sent the 802.11 packet
detected by the MAP radio.
Vendor Company that manufactures or sells the rogue device.
Type Classification of the rogue device:
rogue—Wireless device that is on the network but is not
supposed to be on the network.
intfr—Wireless device that is not part of your network and
is not a rogue, but might be causing RF interference with
MAP radios.
known—Device that is a legitimate member of the
network.
Ch Channel number on which the radio detected the rogue.
RSSI Received signal strength indication (RSSI)—the strength of the
RF signal detected by the MAP radio, in decibels referred to
1milliwatt (dB m).
Flags Classification and encryption information for the rogue:
The i, a, or u flag indicates the classification.
The other flags indicate the encryption used by the rogue.
For flag definitions, see the key in the command output.
SSID SSID used by the detected device.