Configuring detection rule lists – H3C Technologies H3C WX3000E Series Wireless Switches User Manual
Page 640
![background image](https://www.manualsdir.com/files/812974/content/doc640.png)
619
Configuring detection rule lists
1.
Select Security > Rogue Detection from the navigation tree.
2.
Click the Rule List tab.
Figure 654 Configuring a rule list
3.
Configure the rule list as described in
Table 195 Configuration items
Item Description
List Type
•
MAC—Add MAC addresses to be permitted after selecting this option.
•
Wireless Service—Add SSIDs to be permitted after selecting this option.
•
Vendor—Specify vendors to be permitted after selecting this option.
•
Attacker—Add the MAC address of a device to configure the device as a rogue.
4.
Select MAC from the list and click Add.
Figure 655 Configuring a MAC address list
This manual is related to the following products:
- H3C WX5500E Series Access Controllers H3C WX3500E Series Access Controllers H3C WX2500E Series Access Controllers H3C WX6000 Series Access Controllers H3C WX5000 Series Access Controllers H3C LSUM3WCMD0 Access Controller Module H3C LSUM1WCME0 Access Controller Module H3C LSRM1WCM2A1 Access Controller Module