Adding a Device to the Attack List 471
Adding a Device to the Attack List
An attack list is a switch’s list of AP MAC addresses to attack whenever
they are present on the network.
1In the Filtered List of rogues on the Rogue Detection screen, select the
devices you want to attack.
2Click on the toolbar. The Select Devices dialog is displayed.
3If the switch(es) on which you are configuring the attack list are in a
Mobility Domain, select the Mobility Domain. Otherwise, select None.
4Click Next to select all the switches that are listed, or click Next to
individual switches to select them.
5Click OK. The devices are added to the attack list. If countermeasures are
enabled, MSS uses them to attack the devices on the list.
Converting a Rogue into a Third Party AP
If a device in the rogue list belongs to a third-party AP in your network,
you can convert the rogue into a third-party AP. When you convert a
rogue into a third-party AP, the rogue disappears from the rogue list.
Converting a rogue into a third-party AP applies only to the network plan,
in 3WXM. 3WXM does not send this information in any form to the WX
switches in the network. To prevent MSS from issuing countermeasures
against a third-party AP, you must also add the AP to the ignore list.
3WXM does send the ignore list to the WX switches in the network.
To convert a rogue
into a third-party AP
To convert a rogue into a third-party AP, use the following procedure.
1Select the rogue in the rogue list.
2Click on the toolbar. The Third Party AP Properties dialog is
displayed.