Nortel Networks 2300 Switch User Manual


 
Rogue detection and counter measures 635
Nortel WLAN—Security Switch 2300 Series Configuration Guide
Total number of entries: 1
Attacklist MAC Port/Radio/Chan RSSI SSID
----------------- ----------------- ------ ------------
11:22:33:44:55:66 ap 2/1/11 -53 rogue-ssid
To remove a MAC address from the attack list, use the following command:
clear rfdetect attack-list mac-addr
The following command clears MAC address 11:22:33:44:55:66 from the attack list:
WSS# clear rfdetect attack-list 11:22:33:44:55:66
success: 11:22:33:44:55:66 is no longer in attacklist.
Configuring an ignore list
By default, when countermeasures are enabled, WSS Software considers any non-Nortel transmitter to be a
rogue device and can send countermeasures to prevent clients from using that device. To prevent WSS
Software from sending countermeasures against a friendly device, add the device to the known devices list:
If you add a device that WSS Software has classified as a rogue to the permitted vendor list or permitted SSID
list, but not to the ignore list, WSS Software can still classify the device as a rogue. Adding an entry to the
permitted vendor list or permitted SSID list merely indicates that the device is from an allowed manufacturer
or is using an allowed SSID. However, to cause WSS Software to stop classifying the device as a rogue, you
must add the device’s MAC address to the ignore list.
To add a device to the ignore list, use the following command:
set rfdetect ignore mac-addr
The mac-addr is the BSSID of the device you want to ignore.
To ignore BSSID aa:bb:cc:11:22:33 during all RF scans, type the following command:
WSS# set rfdetect ignore aa:bb:cc:11:22:33
success: MAC aa:bb:cc:11:22:33 is now ignored.
To remove a BSSID from the ignore list, use the following command:
clear rfdetect ignore mac-addr
To display the ignore list, use the following command:
show rfdetect ignore
The following command displays an ignore list containing two BSSIDs:
WSS# show rfdetect ignore
Note. If you try to initiate countermeasures against a device on the ignore list, the ignore
list takes precedence and WSS Software does not issue the countermeasures.
Countermeasures apply only to rogue devices.