Rogue detection and counter measures 711
Nortel WLAN—Security Switch 2300 Series Configuration Guide

Configuring a permitted SSID list

The permitted SSID list specifies the SSIDs that are allowed on the network. If WSS Software detects packets
for an SSID that is not on the list, the AP that sent the packets is classified as a rogue. WSS Software issues
countermeasures against the rogue if they are enabled.
By default, the permitted SSID list is empty and all SSIDs are allowed. If you configure a permitted SSID list,
WSS Software allows traffic only for the SSIDs that are on the list. The permitted SSID list applies only to the
WSS on which the list is configured. WSSs do not share permitted SSID lists.
If you add a device that WSS Software has classified as a rogue to the permitted SSID list, but not to the ignore
list, WSS Software can still classify the device as a rogue. Adding an entry to the permitted SSID list merely
indicates that the device is using an allowed SSID. However, to cause WSS Software to stop classifying the
device as a rogue, you must add the device’s MAC address to the ignore list.
To add an SSID to the list, use the following command:
set rfdetect ssid-list ssid-name
The following command adds SSID mycorp to the list of permitted SSIDs:
WSS# set rfdetect ssid-list mycorp
success: ssid mycorp is now in ssid-list.
To display the permitted SSID list, use the following command:
show rfdetect ssid-list
The following example shows the permitted SSID list on WSS:
WSS# show rfdetect ssid-list
Total number of entries: 3
SSID
-----------------
mycorp
corporate
guest
To remove an SSID from the permitted SSID list, use the following command:
clear rfdetect ssid-list ssid-name
The following command clears SSID mycorp from the permitted SSID list:
WSS# clear rfdetect ssid-list mycorp
success: mycorp is no longer in ssid-list.