set rfdetect attack-list

Adds an entry to the attack list. The attack list specifies the MAC addresses of devices that MSS should issue countermeasures against whenever the devices are detected on the network. The attack list can contain the MAC addresses of APs and clients.

Syntax: set rfdetect attack-list mac-addr

mac-addr

MAC address you want to attack.

Defaults: The attack list is empty by default.

Access: Enabled.

Usage: The attack list applies only to the switch on which the list is configured. Switches do not share attack lists.

When on-demand countermeasures are enabled (with the set radio-profile countermeasures configured command) only those devices configured in the attack list are subject to countermeasures. In this case, devices found to be rogues by other means, such as policy violations or by determining that the device is providing connectivity to the wired network, are not attacked.

Examples: The following command adds MAC address aa:bb:cc:44:55:66 to the attack list:

DWS-1008# set rfdetect attack-list 11:22:33:44:55:66 success: MAC 11:22:33:44:55:66 is now in attacklist.

See Also:

clear rfdetect attack-list

show rfdetect attack-list

set radio-profile countermeasures

set rfdetect black-list

Adds an entry to the client black list. The client black list specifies clients that are not allowed on the network. MSS drops all packets from the clients on the black list.

Syntax: set rfdetect black-list mac-addr

mac-addr

MAC address you want to place on the black list.

Defaults: The client black list is empty by default.

Access: Enabled.

Usage: In addition to manually configured entries, the list can contain entries added by MSS.

D-Link DWS-1008 CLI Manual

270

Page 273
Image 273
D-Link dws-1008 manual Set rfdetect attack-list, Set rfdetect black-list, Syntax set rfdetect attack-list mac-addr