
6-163
Using the Command Line Interface
Example
show rogue-ap
This command displays the current rogue AP database.
Command Mode
Exec
Example
Wireless Security Commands
The commands described in this section configure parameters for wireless security
on the 802.11a and 802.11g interfaces.
Table 28
Wireless Security Commands
AP (if-wireless g)#rogue-ap scan
AP (if-wireless g)#rogueApDetect Completed (Radio G) : 9 APs detected
rogueAPDetect (Radio G): refreshing ap database now
AP (if-wireless g)#
AP #show rogue-ap
802.11a Channel : Rogue AP Status
AP Address(BSSID) SSID Channel(MHz) RSSI Type Privacy RSN
======================================================================
802.11g Channel : Rogue AP Status
AP Address(BSSID) SSID Channel(MHz) RSSI Type Privacy RSN
======================================================================
00-04-e2-2a-37-23 WLAN1AP 11(2462 MHz) 17 ESS 0 0
00-04-e2-2a-37-3d ANY 7(2442 MHz) 42 ESS 0 0
00-04-e2-2a-37-49 WLAN1AP 9(2452 MHz) 42 ESS 0 0
00-90-d1-08-9d-a7 WLAN1AP 1(2412 MHz) 12 ESS 0 0
00-30-f1-fb-31-f4 WLAN 6(2437 MHz) 16 ESS 0 0
AP #
Command
Function
Mode
Page
auth
Defines the 802.11 authentication type allowed by
the access point
IC-W-VAP
6-167
encryption
Defines whether or not WEP encryption is used to
provide privacy for wireless communications
IC-W-VAP
6-166
key
Sets the keys used for WEP encryption
IC-W
6-167
transmit-key
Sets the index of the key to be used for encrypting
data frames sent between the access point and
wireless clients
IC-W-VAP
6-168
Summary of Contents for 3CRWEASYA73 / WL-575
Page 18: ...1 10 ...
Page 93: ...5 45 WDS and Spanning Tree Settings Figure 40 Spanning Tree Protocol ...
Page 132: ...5 84 CHAPTER 5 SYSTEM CONFIGURATION ...
Page 320: ...A 4 ...
Page 332: ...Glossary 6 ...