RF Detection Commands 543

Table 83 describes the fields in this display.

 

Table 7: show rfdetect visible Output

 

 

Field

Description

 

 

Transmit MAC

MAC address the rogue device that sent the 802.11 packet

 

detected by the AP radio.

 

 

Vendor

Company that manufactures or sells the rogue device.

 

 

Type

Classification of the rogue device:

 

rogue—Wireless device that is on the network but

 

is not supposed to be on the network.

 

intfr—Wireless device that is not part of your

 

network and is not a rogue, but might be causing

 

RF interference with AP radios.

 

known—Device that is a legitimate member of the

 

network.

Ch

Channel number on which the radio detected the rogue.

 

 

RSSI

Received signal strength indication (RSSI)—the strength of the

 

RF signal detected by the AP radio, in decibels referred to

 

1 milliwatt (dBm).

 

 

Flags

Classification and encryption information for the rogue:

 

• The i, a, or u flag indicates the classification.

 

• The other flags indicate the encryption used by the

 

rogue.

 

For flag definitions, see the key in the command output.

 

 

SSID

SSID used by the detected device.

 

 

See Also

show rfdetect data on page 524

show rfdetect mobility-domain on page 526

rfping

Provides information about the RF link between the WSS and the client based on sending test packets to the client.

Syntax rfping {mac mac-addrsession-id session-id}

mac-addr

Tests the RF link between the WSS and the client with the specified MAC

 

address.

session-id

Tests the RF link between the WSS and the client with the specified local

 

session ID.

Nortel WLAN—Security Switch 2300 Series Command Line Reference

Page 543
Image 543
Nortel Networks 2300 Series manual Rfping, Show rfdetect visible Output, Syntax rfping mac mac-addrsession-id session-id