3com 3CRWXR10095A Manual De Usuario

Descargar
Página de 516
Adding a Device to the Attack List
471
Adding a Device to 
the Attack List
An attack list is a switch’s list of AP MAC addresses to attack whenever 
they are present on the network. 
In the Filtered List of rogues on the Rogue Detection screen, select the 
devices you want to attack.
Click 
 on the toolbar. The Select Devices dialog is displayed.
If the switch(es) on which you are configuring the attack list are in a 
Mobility Domain, select the Mobility Domain. Otherwise, select None.
Click Next to select all the switches that are listed, or click Next to 
individual switches to select them.
Click OK. The devices are added to the attack list. If countermeasures are 
enabled, MSS uses them to attack the devices on the list.
Converting a Rogue 
into a Third Party 
AP
If a device in the rogue list belongs to a third-party AP in your network, 
you can convert the rogue into a third-party AP. When you convert a 
rogue into a third-party AP, the rogue disappears from the rogue list. 
Converting a rogue into a third-party AP applies only to the network plan, 
in 3WXM. 3WXM does not send this information in any form to the WX 
switches in the network. To prevent MSS from issuing countermeasures 
against a third-party AP, you must also add the AP to the ignore list. 
3WXM does send the ignore list to the WX switches in the network.
To convert a rogue
into a third-party AP
To convert a rogue into a third-party AP, use the following procedure.
Select the rogue in the rogue list.
Click 
 on the toolbar. The Third Party AP Properties dialog is 
displayed.