set radio-profile rts-threshold
365
Usage
— Changing the preamble length value affects only the support
advertised by the radio. Regardless of the preamble length setting (
short
or
long
), an 802.11b/g radio accepts and can generate 802.11b/g frames
with either short or long preambles.
If a client associated with an 802.11b/g radio uses long preambles for
unicast traffic, the MAP access point still accepts frames with short
preambles but does not transmit frames with short preambles. This
change also occurs if the access point overhears a beacon from an
802.11b/g radio on another access point that indicates the radio has
clients that require long preambles.
You must disable all radios that use a radio profile before you can change
parameters in the profile. Use the
set radio-profile
mode
command.
Examples
— The following command configures 802.11b/g radios that
use the radio profile
rp_long to
advertise support for long preambles
instead of short preambles:
WX4400#
set radio-profile rp_long preamble-length long
success: change accepted.
See Also
display radio-profile
on page 317
set radio-profile mode
on page 362
set radio-profile
rts-threshold
Changes the RTS threshold for the MAP radios in a radio profile. The RTS
threshold specifies the maximum length a frame can be before the radio
uses the RTS/CTS method to send the frame. The RTS/CTS method clears
the air of other traffic to avoid corruption of the frame due to a collision
with another frame.
Syntax
—
set radio-profile
name
rts-threshold
threshold
name
— Radio profile name.
threshold
— Maximum frame length, in bytes. You can enter a value
from 256 through 3000.
Defaults
— The default RTS threshold for a MAP radio is 2346 bytes.
Access
— Enabled.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...