3com WXR100 3CRWXR10095A User Manual

Page of 750
set rfdetect log
657
Usage — Use this command to identify third-party APs and other devices 
you are already aware of and do not want MSS to report following RF 
scans. 
If you try to initiate countermeasures against a device on the ignore list, 
the ignore list takes precedence and MSS does not issue the 
countermeasures. Countermeasures apply only to rogue devices.
If you add a device that MSS has classified as a rogue to the permitted 
vendor list or permitted SSID list, but not to the ignore list, MSS can still 
classify the device as a rogue. Adding an entry to the permitted vendor 
list or permitted SSID list merely indicates that the device is from an 
allowed manufacturer or is using an allowed SSID. However, to cause 
MSS to stop classifying the device as a rogue, you must add the device’s 
MAC address to the ignore list.
After you add a device that has been classified as a rogue to the ignore 
list, the device remains classified as a rogue for at least 10 minutes. After 
10 minutes, MSS reclassifies the device as an interfering device.
Examples — The following command configures MSS to ignore BSSID 
aa:bb:cc:11:22:33 during RF scans:
WX1200# set rfdetect ignore aa:bb:cc:11:22:33
success:  MAC aa:bb:cc:11:22:33 is now ignored.
See Also
„
„
set rfdetect log
Disables or reenables generation of log messages when rogues are 
detected or when they disappear. 
Syntax —
 set rfdetect log {enable | disable}
„
enable
 — Enables logging of rogues.
„
disable
 — Disables logging of rogues.
Defaults — RF detection logging is enabled by default. 
Access — Enabled.