Test rflink – 3Com WXR100 3CRWXR10095A User Manual
Page 709

test rflink
709
If you add a device that MSS has classified as a rogue to the permitted
vendor list, but not to the ignore list, MSS can still classify the device as a
rogue. Adding an entry to the permitted vendor list merely indicates that
the device is from an allowed vendor. However, to cause MSS to stop
classifying the device as a rogue, you must add the device’s MAC address
to the ignore list.
Examples — The following command adds an entry for clients whose
MAC addresses start with aa:bb:cc:
WX1200# set rfdetect vendor-list client aa:bb:cc:00:00:00
success: MAC aa:bb:cc:00:00:00 is now in client vendor-list.
The trailing 00:00:00 value is required.
See Also
clear rfdetect vendor-list on page 681
display rfdetect vendor-list on page 697
test rflink
Provides information about the RF link between the WX switch and the
client based on sending test packets to the client.
Syntax
— test rflink {mac mac-addr | session-id session-id}
mac-addr
— Tests the RF link between the WX switch and the client
with the specified MAC address.
session-id
— Tests the RF link between the WX switch and the client
with the specified local session ID.
Defaults — None.
Access — Enabled.
History —Introduced in MSS Version 4.2.
Usage — Use the test rflink command to send test packets to a
specified client. The output of the command indicates the number of test
packets received and acknowledged by the client, as well as the client’s
signal strength and signal-to-noise ratio.