526 RF Detection CommandsNN47250-100 (Version 02.51)Defaults WSS Software reports all non-Nortel BSSIDs detected during an RF scan.Access Enabled.History Introduced in WSS Software Version 3.0.Usage Use this command to identify third-party APs and other devices you are already aware ofand do not want WSS Software to report following RF scans.If you try to initiate countermeasures against a device on the ignore list, the ignore list takes precedence andWSS Software does not issue the countermeasures. Countermeasures apply only to rogue devices.If you add a device that WSS Software has classified as a rogue to the permitted vendor list or permitted SSIDlist, but not to the ignore list, WSS Software can still classify the device as a rogue. Adding an entry to thepermitted vendor list or permitted SSID list merely indicates that the device is from an allowed manufactureror is using an allowed SSID. However, to cause WSS Software to stop classifying the device as a rogue, youmust add the device’s MAC address to the ignore list.Examples The following command configures WSS Software to ignore BSSIDaa:bb:cc:11:22:33 during RF scans:23x0# set rfdetect ignore aa:bb:cc:11:22:33success: MAC aa:bb:cc:11:22:33 is now ignored.See Also• clear rfdetect ignore on page 513• show rfdetect ignore on page 526set rfdetect logDisables or reenables generation of log messages when rogues are detected or when they disappear.Syntax set rfdetect log {enable | disable}Defaults RF detection logging is enabled by default.Access Enabled.History Introduced in WSS Software Version 3.0.Usage The log messages for rogues are generated only on the seed and appear only in the seed’slog message buffer. Use the show log buffer command to display the messages in the seed switch’slog message buffer.Examples The following command enables RF detection logging for the Mobility Domainmanaged by this seed switch:23x0# set rfdetect log enablesuccess: rfdetect logging is enabled.enable Enables logging of rogues.disable Disables logging of rogues.