User's Manual
Table Of Contents
- Chapter 1: Introduction 1-1
- Chapter 1: Introduction
- Chapter 2: Hardware Installation
- Chapter 3: External Antennas
- Chapter 4: Network Configuration
- Chapter 5: Initial Configuration
- Chapter 6: System Configuration
- Chapter 7: Command Line Interface
- Using the Command Line Interface
- Entering Commands
- Command Groups
- General Commands
- System Management Commands
- System Logging Commands
- System Clock Commands
- DHCP Relay Commands
- SNMP Commands
- snmp-server community
- snmp-server contact
- snmp-server location
- snmp-server enable server
- snmp-server host
- snmp-server trap
- snmp-server engine-id
- snmp-server user
- snmp-server targets
- snmp-server filter
- snmp-server filter-assignments
- show snmp groups
- show snmp users
- show snmp group-assignments
- show snmp target
- show snmp filter
- show snmp filter-assignments
- show snmp
- Flash/File Commands
- RADIUS Client
- 802.1X Authentication
- MAC Address Authentication
- Filtering Commands
- WDS Bridge Commands
- Spanning Tree Commands
- Ethernet Interface Commands
- Wireless Interface Commands
- interface wireless
- vap
- speed
- turbo
- multicast-data-rate
- channel
- transmit-power
- radio-mode
- preamble
- antenna control
- antenna id
- antenna location
- beacon-interval
- dtim-period
- fragmentation-length
- rts-threshold
- super-a
- super-g
- description
- ssid
- closed-system
- max-association
- assoc-timeout-interval
- auth-timeout-value
- shutdown
- show interface wireless
- show station
- Rogue AP Detection Commands
- Wireless Security Commands
- Link Integrity Commands
- IAPP Commands
- VLAN Commands
- WMM Commands
- Appendix A: Troubleshooting
- Appendix B: Cables and Pinouts
- Appendix C: Specifications
- Glossary
- Index
Radio Interface
6-51
6
CLI Commands for the Configuring the VAPs – From the global configuration mode,
enter the interface wireless a command to access the 802.11a radio interface.
From the 802.11a interface mode, you can access radio settings that apply to all
VAP interfaces. To access a specific VAP interface (numbered 0 to 3), use the vap
command. You can configure a name for each interface using the description
command. You can also use the closed-system command to stop sending the
SSID in beacon messages. Set any other VAP parameters and radio setting as
required before enabling the VAP interface (with the no shutdown command). To
view the current 802.11a radio settings for the VAP interface, use the show
interface wireless a 0 command as shown on 7-94.
Configuring Rogue AP Detection
To configure Rouge AP detection, select the Radio Settings page, and scroll down to
the “Rouge AP” section.
Rogue AP – A “rogue AP” is either an access point that is not authorized to
participate in the wireless network, or an access point that does not have the correct
security configuration. Rogue APs can allow unauthorized access to the network, or
fool client stations into mistakenly associating them and thereby blocking access to
network resources.
Enterprise AP(if-wireless a)#vap 0 7-94
Enterprise AP(if-wireless a: VAP[0])#description RD-AP#3 7-105
Enterprise AP(if-wireless a: VAP[0])#vlan-id 1 7-131
Enterprise AP(if-wireless a: VAP[0])#closed-system 7-106
Enterprise AP(if-wireless a: VAP[0])#authentication-timeout-
interval 30
7-107
Enterprise AP(if-wireless a: VAP[0])#association-timeout-
interval 20
7-107
Enterprise AP(if-wireless a: VAP[0])#max-association 32 7-106
Enterprise AP(if-wireless a: VAP[0])#pmksa-lifetime 900 7-123
Enterprise AP(if-wireless a: VAP[0])#