set rfdetect log 657
Usage — Use this command to identify third-party APs and other devices
you are already aware of and do not want MSS to report following RF
scans.
If you try to initiate countermeasures against a device on the ignore list,
the ignore list takes precedence and MSS does not issue the
countermeasures. Countermeasures apply only to rogue devices.
If you add a device that MSS has classified as a rogue to the permitted
vendor list or permitted SSID list, but not to the ignore list, MSS can still
classify the device as a rogue. Adding an entry to the permitted vendor
list or permitted SSID list merely indicates that the device is from an
allowed manufacturer or is using an allowed SSID. However, to cause
MSS to stop classifying the device as a rogue, you must add the device’s
MAC address to the ignore list.
After you add a device that has been classified as a rogue to the ignore
list, the device remains classified as a rogue for at least 10 minutes. After
10 minutes, MSS reclassifies the device as an interfering device.
Examples — The following command configures MSS to ignore BSSID
aa:bb:cc:11:22:33 during RF scans:
WX1200# set rfdetect ignore aa:bb:cc:11:22:33
success: MAC aa:bb:cc:11:22:33 is now ignored.
See Also
clear rfdetect ignore on page 631
display rfdetect ignore on page 644
set rfdetect log Disables or reenables generation of log messages when rogues are
detected or when they disappear.
Syntax —
set rfdetect log {enable | disable}
enable — Enables logging of rogues.
disable — Disables logging of rogues.
Defaults — RF detection logging is enabled by default.
Access — Enabled.