Nortel Networks 2300 Series manual Clear rfdetect vendor-list, Set rfdetect attack-list

Models: 2300 Series

1 622
Download 622 pages 48.74 Kb
Page 524
Image 524

524RF Detection Commands

clear rfdetect vendor-list

Removes an entry from the permitted vendor list.

Syntax clear rfdetect vendor-list {client ap} mac-addrall

client ap

 

Specifies whether the entry is for an AP brand or a client brand.

mac-addr all

Organizationally Unique Identifier (OUI) to remove.

Defaults

None.

 

Access

Enabled.

 

History Introduced in WSS Software Version 4.0.

Examples The following command removes client OUI aa:bb:cc:00:00:00 from the permitted vendor list:

WSS# clear rfdetect vendor-list client aa:bb:cc:00:00:00

success: aa:bb:cc:00:00:00 is no longer in client vendor-list.

See Also

set rfdetect vendor-list on page 518

show rfdetect vendor-list on page 531

set rfdetect attack-list

Adds an entry to the attack list. The attack list specifies the MAC addresses of devices that WSS Software should issue countermeasures against whenever the devices are detected on the network. The attack list can contain the MAC addresses of APs and clients.

Syntax set rfdetect attack-list mac-addr

mac-addr

MAC address you want to attack.

Defaults The attack list is empty by default. Access Enabled.

History Introduced in WSS Software Version 4.0.

Usage The attack list applies only to the WSS on which the list is configured. WSSs do not share attack lists.

When on-demand countermeasures are enabled (with the set radio-profile countermeasures configured command) only those devices configured in the attack list are subject to countermeasures. In this case, devices found to be rogues by other means, such as policy violations or by determining that the device is providing connectivity to the wired network, are not attacked.

NN47250-100 (Version 02.51)

Page 524
Image 524
Nortel Networks 2300 Series Clear rfdetect vendor-list, Set rfdetect attack-list, Syntax set rfdetect attack-list mac-addr