set rfdetect black-list 555
When on-demand countermeasures are enabled (with the set
radio-profile countermeasures configured command) only those
devices configured in the attack list are subject to countermeasures. In
this case, devices found to be rogues by other means, such as policy
violations or by determining that the device is providing connectivity to
the wired network, are not attacked.
Examples — The following command adds MAC address
aa:bb:cc:44:55:66 to the attack list:
WX4400# set rfdetect attack-list 11:22:33:44:55:66
success: MAC 11:22:33:44:55:66 is now in attacklist.
See Also
clear rfdetect attack-list on page 534
display rfdetect attack-list on page 537
set radio-profile countermeasures on page35 5
set rfdetect
black-list
Adds an entry to the client black list. The client black list specifies clients
that are not allowed on the network. MSS drops all packets from the
clients on the black list.
Syntaxset rfdetect black-list mac-addr
mac-addr — MAC address you want to place on the black list.
Defaults — The client black list is empty by default.
Access — Enabled.
History —Introduced in MSS Version 4.0.
Usage — In addition to manually configured entries, the list can contain
entries added by MSS. MSS can place a client in the black list due to an
association, reassociation or disassociation flood from the client.
The client black list applies only to the WX switch on which the list is
configured. WX switches do not share client black lists.