3Com 3CRWX120695A WXR100 Switch User Manual


 
Adding a Device to the Attack List 471
Adding a Device to
the Attack List
An attack list is a switch’s list of AP MAC addresses to attack whenever
they are present on the network.
1 In the Filtered List of rogues on the Rogue Detection screen, select the
devices you want to attack.
2 Click on the toolbar. The Select Devices dialog is displayed.
3 If the switch(es) on which you are configuring the attack list are in a
Mobility Domain, select the Mobility Domain. Otherwise, select None.
4 Click Next to select all the switches that are listed, or click Next to
individual switches to select them.
5 Click OK. The devices are added to the attack list. If countermeasures are
enabled, MSS uses them to attack the devices on the list.
Converting a Rogue
into a Third Party
AP
If a device in the rogue list belongs to a third-party AP in your network,
you can convert the rogue into a third-party AP. When you convert a
rogue into a third-party AP, the rogue disappears from the rogue list.
Converting a rogue into a third-party AP applies only to the network plan,
in 3WXM. 3WXM does not send this information in any form to the WX
switches in the network. To prevent MSS from issuing countermeasures
against a third-party AP, you must also add the AP to the ignore list.
3WXM does send the ignore list to the WX switches in the network.
To convert a rogue
into a third-party AP
To convert a rogue into a third-party AP, use the following procedure.
1 Select the rogue in the rogue list.
2 Click on the toolbar. The Third Party AP Properties dialog is
displayed.