Adding a Device to the Attack List 471

Adding a Device to

An attack list is a switch’s list of AP MAC addresses to attack whenever

the Attack List

they are present on the network.

1In the Filtered List of rogues on the Rogue Detection screen, select the devices you want to attack.

2Click on the toolbar. The Select Devices dialog is displayed.

3If the switch(es) on which you are configuring the attack list are in a Mobility Domain, select the Mobility Domain. Otherwise, select None.

4Click Next to select all the switches that are listed, or click Next to individual switches to select them.

5Click OK. The devices are added to the attack list. If countermeasures are enabled, MSS uses them to attack the devices on the list.

Converting a Rogue

If a device in the rogue list belongs to a third-party AP in your network,

into a Third Party

you can convert the rogue into a third-party AP. When you convert a

AP

rogue into a third-party AP, the rogue disappears from the rogue list.

 

Converting a rogue into a third-party AP applies only to the network plan,

 

in 3WXM. 3WXM does not send this information in any form to the WX

 

switches in the network. To prevent MSS from issuing countermeasures

 

against a third-party AP, you must also add the AP to the ignore list.

 

3WXM does send the ignore list to the WX switches in the network.

To convert a rogue To convert a rogue into a third-party AP, use the following procedure. into a third-party AP

1Select the rogue in the rogue list.

2 Click

on the toolbar. The Third Party AP Properties dialog is

displayed.

 

Page 471
Image 471
3Com 3CRWXR10095A Adding a Device to, Attack List, Converting a Rogue, Into a Third Party, They are present on the network