beautypg.com

Displaying monitor record, Table 42-4 – H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 498

background image

42-10

Table 42-4 MAC address list configuration items

Item

Description

MAC

Type the permitted MAC address in the text box.

Select the existent
devices

If you select this button, the MAC address table displays MAC addresses of the
current devices. Select the MAC addresses to be permitted.

The operation to add other types of lists is similar to the add operation of a MAC address list, and thus

the description is omitted.

Enabling Countermeasures and Configuring Aging Time for Detected Rogue Devices

Select Security > Rogue Detection from the navigation tree, and then select the AP Monitor tab. On

the page, click Common Set to enter the configuration page, as shown in

Figure 42-12

.

Figure 42-12 Countermeasures configuration

Table 42-5

describes the common configuration items.

Table 42-5 Common configuration items

Item

Description

Contermeasures
Mode

Rogue Device: Allows you to take countermeasures against rogue devices (including
illegal APs and illegal clients).

Rogue Adhoc Device: Allows you to take countermeasures against ad hoc devices.

Static Rogue Device: Allows you to take countermeasures against rogue devices
configured in the detection rule list.

Device
Aging-duration

Configure the aging time of entries in the device list.

Once a rogue device is detected, an entry for it is added to the monitor record and the
aging time starts. The aging time restarts if the device is detected again during the time.
When the aging time is reached, the entry is deleted from the monitor record and added to
the history record.

Displaying Monitor Record

Select Security > Rogue Detection from the navigation tree, and then select the Monitor Record tab

to enter the monitor record page, as shown in

Figure 42-13

.