![3Com OfficeConnect WX1200 Command Reference Manual Download Page 357](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270357.webp)
set radio-profile dtim-interval
357
The following command causes radios managed by radio profile
radprof3
to issue countermeasures against devices in the WX switch’s attack list:
WX1200#
set radio-profile radprof3 countermeasures configured
success: change accepted.
Note that when you issue this command, countermeasures are then
issued only against devices in the WX switch’s attack list, not against
other devices that were classified as rogues by other means.
set radio-profile
dtim-interval
Changes the number of times after every beacon that each MAP radio in
a radio profile sends a delivery traffic indication map (DTIM). A MAP
access point sends the multicast and broadcast frames stored in its
buffers to clients who request them in response to the DTIM.
The DTIM interval applies to both the beaconed SSID and the
nonbeaconed SSID.
Syntax
—
set radio-profile
name
dtim-interval
interval
name
— Radio profile name.
interval
— Number of times the DTIM is transmitted after every
beacon. You can enter a value from 1 through 31.
Defaults
— By default, MAP access points send the DTIM once after
each beacon.
Access
— Enabled.
History
—Introduced in MSS Version 3.0.
Usage
— You must disable all radios that are using a radio profile before
you can change parameters in the profile. Use the
set radio-profile
mode
command.
The DTIM interval does not apply to unicast frames.
Examples
— The following command changes the DTIM interval for
radio profile
rp1
to 2:
WX4400#
set radio-profile rp1 dtim-interval 2
success: change accepted.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...