set rfdetect attack-list 653
set rfdetect
attack-list
Adds an entry to the attack list. The attack list specifies the MAC
addresses of devices that MSS should issue countermeasures against
whenever the devices are detected on the network. The attack list can
contain the MAC addresses of APs and clients.
Syntax —
set rfdetect attack-list mac-addr
mac-addr — MAC address you want to attack.
Defaults — The attack list is empty by default.
Access — Enabled.
History —Introduced in MSS Version 4.0.
Usage — The attack list applies only to the WX switch on which the list is
configured. WX switches do not share attack lists.
When on-demand countermeasures are enabled (with the set
radio-profile countermeasures configured command) only those
devices configured in the attack list are subject to countermeasures. In
this case, devices found to be rogues by other means, such as policy
violations or by determining that the device is providing connectivity to
the wired network, are not attacked.
Examples — The following command adds MAC address
aa:bb:cc:44:55:66 to the attack list:
WX4400# set rfdetect attack-list 11:22:33:44:55:66
success: MAC 11:22:33:44:55:66 is now in attacklist.
See Also
clear rfdetect attack-list on page 630
display rfdetect attack-list on page 635
set radio-profile countermeasures on page 410