D-Link dws-1008 Switch User Manual


 
D-Link DWS-1008 CLI Manual 270
set rfdetect attack-list
Adds an entry to the attack list. The attack list specifies the MAC addresses of devices that MSS
should issue countermeasures against whenever the devices are detected on the network. The
attack list can contain the MAC addresses of APs and clients.
Syntax: set rfdetect attack-list mac-addr
mac-addr MAC address you want to attack.
Defaults: The attack list is empty by default.
Access: Enabled.
Usage: The attack list applies only to the switch on which the list is configured. Switches do not
share attack lists.
When on-demand countermeasures are enabled (with the set radio-profile countermeasures
configured command) only those devices configured in the attack list are subject to
countermeasures. In this case, devices found to be rogues by other means, such as policy
violations or by determining that the device is providing connectivity to the wired network, are not
attacked.
Examples: The following command adds MAC address aa:bb:cc:44:55:66 to the attack list:
DWS-1008# set rfdetect attack-list 11:22:33:44:55:66
success: MAC 11:22:33:44:55:66 is now in attacklist.
See Also:
• clear rfdetect attack-list
• show rfdetect attack-list
• set radio-profile countermeasures
set rfdetect black-list
Adds an entry to the client black list. The client black list specifies clients that are not allowed on
the network. MSS drops all packets from the clients on the black list.
Syntax: set rfdetect black-list mac-addr
mac-addr MAC address you want to place on the black list.
Defaults: The client black list is empty by default.
Access: Enabled.
Usage: In addition to manually configured entries, the list can contain entries added by MSS.