![3Com OfficeConnect WX1200 Command Reference Manual Download Page 346](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270346.webp)
346
C
HAPTER
11: M
ANAGED
A
CCESS
P
OINT
C
OMMANDS
History
—Introduced in MSS 4.0.
Usage
— This parameter applies to all Distributed MAPs managed by the
switch. If you change the setting to
required
, the switch requires
Distributed MAPs to have encryption keys. The switch also requires their
fingerprints to be verified in MSS. When MAP security is required, a MAP
can establish a management session with the WX only if its fingerprint
has been verified by you in MSS.
A change to MAP security support does not affect management sessions
that are already established. To apply the new setting to a MAP, restart
the MAP.
Examples
— The following command configures a WX to require
Distributed MAPs to have encryption keys:
WX4400#
set dap security require
See Also
set dap fingerprint
on page 331
set service-profile cipher-wep40 on page 380
on page 391
display {ap | dap} status
on page 304
set {ap | dap}
upgrade-firmware
Disables or reenables automatic upgrade of a MAP access point’s boot
firmware.
Syntax
—
set
{
ap
port-list
|
dap
dap-num
|
auto
}
upgrade-firmware
{
enable
|
disable
}
ap
port-list
— List of ports connected to the MAP access point(s) on
which to allow automatic firmware upgrades.
dap
dap-num
— Number of a Distributed MAP on which to allow
automatic firmware upgrades.
dap auto
— Configures firmware upgrades for the MAP
configuration profile. (See
set dap auto
on page 325.)
enable
—
Enables automatic firmware upgrades.
disable
—
Disables automatic firmware upgrades.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...