
Chapter 15
Complete Command List
308
WLAN
ADAPTER,
WLAN
Defines the authentication scheme:
store ifc <ifnum> wlan auth <auth-method>
(eg. open, shared, leap, kerb)
•
“Open” system authentication allows all devices that have the
authentication algorithm number for open system to
authenticate.
•
“Shared” key authentication involves a four step process using
secure or encrypted text by means of WEP.
•
“Leap” is to enable/disable LEAP operation.
•
“Kerb” is for Kerberos.
WLAN
ADAPTER,
WLAN
Define a auth-user-name to be used in the LEAP operation:
store ifc <ifnum> wlan user <auth-user-name>J/F3 1 Tf9.96 0 0 9.96 243 ( a4“)-6.6 9
•rn8( a)-1228(u)-0.1(th-)6228(u)-0.1sc
meen
the usn a
be e(te)-12.2(r)5.8(e)-122(du)-0.1 .96c0 nu
the
LEPEiceusis(.)]TJ/F2 1 Tf11.5355 0 0 12 190.8 0-6.64 Tm-0.0077 Tc0 Tw[(WLA)6.9(N)]TJ-2.0805 -1.17 TD-0.0146 Tc[(AD)-10.4(AP)-13.4(T)-7(E)-3(R,)]TJ2.0805 -1.17 TD-0.0077 Tc[(WLA)6.9(N)]TJ/F3 1 Tf9.96 0 0 9.96 243 0-6.64 Tm-0.0017 Tc0.0008 Tw[(Defi)-864(ne)-28( a au)-21(th-)61(p-0.1 a)-12(s)4.3(s)-7.7wnforu(s)-7.7ednthn APA( one)-28rtion:
Summary of Contents for Network Interface Card
Page 1: ......
Page 3: ...Network Interface Card User s Manual...
Page 6: ......
Page 32: ...Chapter 1 Printronix Customer Support Center 32...
Page 83: ......
Page 86: ......
Page 96: ...Chapter 4...
Page 102: ......
Page 144: ......
Page 202: ...Chapter 7 Troubleshooting 10 100Base T 202...
Page 210: ...Chapter 8 OS 2 Workstation Configuration 210...
Page 228: ...Chapter 9 Handling z OS Connectivity Problems 228...
Page 292: ...Chapter 12 Configuration Screens 292...
Page 300: ...Chapter 13 Font Identifier FONT Help 300...
Page 356: ...Chapter 16 Periodic Ping 356...
Page 362: ...362...
Page 376: ...Index 376...
Page 377: ......