The table below describes the fields in this display.

Field

Description

 

 

Transmit MAC

MAC address the rogue device that sent the 802.11 packet detected by the AP radio

 

 

Vendor

Company that manufactures or sells the rogue device.

 

 

 

Classification of the rogue device:

 

rogue—Wireless device that is on the network but is not supposed to be on the

Type

network.

intfr—Wireless device that is not part of your network and is not a rogue, but might be

 

 

causing RF interference with AP radios.

 

known—Device that is a legitimate member of the network.

 

 

Ch

Channel number on which the radio detected the rogue.

 

 

RSSI

Received signal strength indication (RSSI)—the strength of the RF signal detected by the

AP radio, in decibels referred to 1 milliwatt (dBm).

 

 

 

 

Classification and encryption information for the rogue:

Flags

• The i, a, or u flag indicates the classification.

• The other flags indicate the encryption used by the rogue.

 

 

For flag definitions, see the key in the command output.

 

 

SSID

SSID used by the detected device.

 

 

See Also:

• show rfdetect data

test rflink

Provides information about the RF link between the switch and the client based on sending test packets to the client.

Syntax: test rflink {mac mac-addr session-id session-id}

mac-addr

Tests the RF link between the switch and the client with the specified

 

MAC address.

session-id

Tests the RF link between the switch and the client with the specified

 

local session ID.

Defaults: None.

 

Access: Enabled.

 

Usage: Use this command to send test packets to a specified client. The output of the command indicates the number of test packets received and acknowledged by the client, as well as the client’s signal strength and signal-to-noise ratio.

D-Link DWS-1008 CLI Manual

284

Page 287
Image 287
D-Link dws-1008 manual Test rflink, Show rfdetect data, Syntax test rflink mac mac-addr session-id session-id