5-130
C
HAPTER
5: C
OMMAND
L
INE
I
NTERFACE
show rogue-ap
This command displays the current rogue AP database.
Command Mode
Exec
Example
Wireless Security Commands
The commands described in this section configure parameters for wireless security
on the 802.11a and 802.11g interfaces.
Table 28
Wireless Security Commands
Enterprise AP#show rogue-ap
802.11a Channel : Rogue AP Status
AP Address(BSSID) SSID Channel(MHz) RSSI Type Privacy RSN
======================================================================
802.11g Channel : Rogue AP Status
AP Address(BSSID) SSID Channel(MHz) RSSI Type Privacy RSN
======================================================================
00-04-e2-2a-37-23 WLAN1AP 11(2462 MHz) 17 ESS 0 0
00-04-e2-2a-37-3d ANY 7(2442 MHz) 42 ESS 0 0
00-04-e2-2a-37-49 WLAN1AP 9(2452 MHz) 42 ESS 0 0
00-90-d1-08-9d-a7 WLAN1AP 1(2412 MHz) 12 ESS 0 0
00-30-f1-fb-31-f4 WLAN 6(2437 MHz) 16 ESS 0 0
Enterprise AP#
Command
Function
Mode
Page
auth
Defines the 802.11 authentication type allowed by
the access point
IC-W-VAP
5-134
encryption
Defines whether or not WEP encryption is used to
provide privacy for wireless communications
IC-W-VAP
5-133
key
Sets the keys used for WEP encryption
IC-W
5-134
transmit-key
Sets the index of the key to be used for encrypting
data frames sent between the access point and
wireless clients
IC-W-VAP
5-135
cipher-suite
Selects an encryption method for the global key used
for multicast and broadcast traffic
IC-W-VAP
5-136
mic_mode
Specifies how to calculate the Message Integrity
Check (MIC)
IC-W
5-137
wpa-pre-shared- key
Defines a WPA preshared-key value
IC-W-VAP
5-138
Summary of Contents for 8760 - Wireless Dual Radio 11a/b/g PoE Access Point
Page 6: ...6 ...
Page 14: ...1 6 CHAPTER 1 INTRODUCTION ...
Page 40: ...3 12 CHAPTER 3 INITIAL CONFIGURATION ...
Page 68: ...4 28 CHAPTER 4 SYSTEM CONFIGURATION Figure 32 WDS and Spanning Tree Settings ...
Page 254: ...5 152 CHAPTER 5 COMMAND LINE INTERFACE ...
Page 258: ...6 4 CHAPTER 6 TROUBLESHOOTING ...