MSS can place a client in the black list due to an association, reassociation or disassociation flood from the client.

The client black list applies only to the switch on which the list is configured. Switches do not share client black lists.

Examples: The following command adds client MAC address 11:22:33:44:55:66 to the black list:

DWS-1008# set rfdetect black-list 11:22:33:44:55:66 success: MAC 11:22:33:44:55:66 is now blacklisted.

See Also:

set rfdetect black-list

show rfdetect black-list

set rfdetect ignore

Configures a list of known devices to ignore during an RF scan. MSS does not generate log messages or traps for the devices in the ignore list.

Syntax: set rfdetect ignore mac-addr

mac-addr

BSSID (MAC address) of the device to ignore.

Defaults: MSS reports all non-D-Link BSSIDs detected during an RF scan.

Access: Enabled.

Usage: Use this command to identify third-party APs and other devices you are already aware of and do not want MSS to report following RF scans.

If you try to initiate countermeasures against a device on the ignore list, the ignore list takes precedence and MSS does not issue the countermeasures. Countermeasures apply only to rogue devices.

If you add a device that MSS has classified as a rogue to the permitted vendor list or permitted SSID list, but not to the ignore list, MSS can still classify the device as a rogue. Adding an entry to the permitted vendor list or permitted SSID list merely indicates that the device is from an allowed manufacturer or is using an allowed SSID. However, to cause MSS to stop classifying the device as a rogue, you must add the device’s MAC address to the ignore list.

Examples: The following command configures MSS to ignore BSSID aa:bb:cc:11:22:33 during RF scans:

DWS-1008# set rfdetect ignore aa:bb:cc:11:22:33 success: MAC aa:bb:cc:11:22:33 is now ignored.

D-Link DWS-1008 CLI Manual

271

Page 274
Image 274
D-Link dws-1008 Set rfdetect ignore, Set rfdetect black-list Show rfdetect black-list, Syntax set rfdetect ignore mac-addr