532RF Detection Commands

Table 2: show rfdetect clients mac Output (continued)

Field

Description

 

 

Typ

Classification of the rogue device:

 

rogue—Wireless device that is on the network but

 

is not supposed to be on the network.

 

intfr—Wireless device that is not part of your

 

network and is not a rogue, but might be causing

 

RF interference with AP radios.

 

known—Device that is a legitimate member of the

 

network.

Dst

MAC addressed to which the last 802.11 packet detected from the

 

client was addressed.

 

 

Last Rogue Status Check

Number of seconds since the WSS looked on the air for the AP

 

with which the rogue client is associated. The switch looks for the

 

client’s AP by sending a packet from the wired side of the

 

network addressed to the client, and watching the air for a

 

wireless packet containing the client’s MAC address.

 

 

show rfdetect countermeasures

Displays the current status of countermeasures against rogues in the Mobility Domain.

Syntax show rfdetect countermeasures

Defaults None.

Access Enabled.

History

Version 4.0

Output no longer lists rogues for which countermeasures have

 

not been started.

Usage This command is valid only on the seed switch of the Mobility Domain. Examples The following example displays countermeasures status for the Mobility Domain:

WSS# show rfdetect countermeasures

Total number of entries: 190

Countermeasures WSS-IPaddr

Port/Radio

Rogue MAC

Type

 

 

Radio Mac

/Channel

----------------------------------------------------------------------------------------------------

00:0b:0e:00:71:c0

intfr

00:0b:0e:44:55:66

10.1.1.23

ap 4/1/6

00:0b:0e:03:00:80

rogue

00:0b:0e:11:22:33

10.1.1.23

ap 2/1/11

Table 79 describes the fields in this display.

NN47250-100 (Version 02.51)

Page 532
Image 532
Nortel Networks 2300 Series manual Show rfdetect countermeasures, Syntax show rfdetect countermeasures