SlideShare a Scribd company logo
Motorola Solutions
WiNG 5.2.2
Wireless Controller
CLI Reference Guide
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
MOTOROLA SOLUTIONS WING 5
       CLI REFERENCE GUIDE
                 72E-159607-01
                     Revision A
                  January 2012
ii   CLI Reference Guide


     No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means,
     without permission in writing from Motorola Solutions. This includes electronic or mechanical means, such as
     photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to
     change without notice.

     The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on
     a licensed basis. Motorola Solutions grants to the user a non-transferable and non-exclusive license to use
     each software or firmware program delivered hereunder (licensed program). Except as noted below, such
     license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of
     Motorola Solutions. No right to copy a licensed program in whole or in part is granted, except as permitted
     under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program
     with other program material, create a derivative work from a licensed program, or use a licensed program in a
     network without written permission from Motorola Solutions. The user agrees to maintain Motorola Solution’s
     copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized
     copies it makes, in whole or in part. The user agrees not to decompile, disassemble, decode, or reverse
     engineer any licensed program delivered to the user or any portion thereof.

     Motorola Solutions reserves the right to make changes to any software or product to improve reliability,
     function, or design.

     Motorola Solutions does not assume any product liability arising out of, or in connection with, the application or
     use of any product, circuit, or application described herein.

     No license is granted, either expressly or by implication, estoppel, or otherwise under any Motorola Solutions,
     Inc., intellectual property rights. An implied license only exists for equipment, circuits, and subsystems
     contained in Motorola Solutions products.
iii



Revision History
     Changes to the original guide are listed below:

        Change              Date                                         Description

      Rev A        January 2012             Final version for WiNG 5.2.2 release
iv   CLI Reference Guide
TABLE OF CONTENTS

ABOUT THIS GUIDE

Chapter 1, INTRODUCTION
  1.1 CLI Overview ...........................................................................................................................................................1-3
  1.2 Getting Context Sensitive Help ..............................................................................................................................1-7
  1.3 Using the No Command ..........................................................................................................................................1-9
      1.3.1 Basic Conventions .........................................................................................................................................1-9
  1.4 Using CLI Editing Features and Shortcuts ............................................................................................................1-10
      1.4.1 Moving the Cursor on the Command Line ..................................................................................................1-11
      1.4.2 Completing a Partial Command Name ........................................................................................................1-12
      1.4.3 Command Output pagination ......................................................................................................................1-12
      1.4.4 Creating Profiles ..........................................................................................................................................1-13
      1.4.5 Change the default profile by creating vlan 150 and mapping to ge3 Physical interface .........................1-13
           1.4.5.1 Viewing Configured APs ....................................................................................................................1-13
      1.4.6 Remote Administration ...............................................................................................................................1-14
           1.4.6.1 Configuring Telnet for Management Access ....................................................................................1-14
           1.4.6.2 Configuring ssh ..................................................................................................................................1-16


Chapter 2, USER EXEC MODE COMMANDS
  2.1 User Exec Commands .............................................................................................................................................2-2
      2.1.1 ap-upgrade ....................................................................................................................................................2-4
      2.1.2 change-passwd .............................................................................................................................................2-9
      2.1.3 clear .............................................................................................................................................................2-10
      2.1.4 clock ............................................................................................................................................................2-13
      2.1.5 cluster ..........................................................................................................................................................2-14
      2.1.6 connect ........................................................................................................................................................2-15
      2.1.7 crypto ...........................................................................................................................................................2-16
      2.1.8 disable .........................................................................................................................................................2-28
      2.1.9 enable ..........................................................................................................................................................2-29
      2.1.10 exit .............................................................................................................................................................2-30
vi         WiNG 5 System Reference Guide


           2.1.11 logging ......................................................................................................................................................2-31
           2.1.12 mint ...........................................................................................................................................................2-32
           2.1.13 no ..............................................................................................................................................................2-34
           2.1.14 page ..........................................................................................................................................................2-38
           2.1.15 ping ...........................................................................................................................................................2-39
           2.1.16 ssh .............................................................................................................................................................2-40
           2.1.17 telnet .........................................................................................................................................................2-41
           2.1.18 terminal .....................................................................................................................................................2-42
           2.1.19 time-it ........................................................................................................................................................2-43
           2.1.20 traceroute ..................................................................................................................................................2-44
           2.1.21 watch ........................................................................................................................................................2-45


Chapter 3, PRIVILEGED EXEC MODE COMMANDS
     3.1 Privileged Exec Mode Commands ..........................................................................................................................3-3
         3.1.1 ap-upgrade ....................................................................................................................................................3-5
         3.1.2 archive .........................................................................................................................................................3-10
         3.1.3 boot .............................................................................................................................................................3-12
         3.1.4 cd .................................................................................................................................................................3-13
         3.1.5 change-passwd ...........................................................................................................................................3-14
         3.1.6 clear ............................................................................................................................................................3-15
         3.1.7 clock ............................................................................................................................................................3-19
         3.1.8 cluster .........................................................................................................................................................3-20
         3.1.9 configure .....................................................................................................................................................3-21
         3.1.10 connect ......................................................................................................................................................3-22
         3.1.11 copy ...........................................................................................................................................................3-23
         3.1.12 crypto ........................................................................................................................................................3-24
         3.1.13 delete ........................................................................................................................................................3-36
         3.1.14 disable .......................................................................................................................................................3-37
         3.1.15 diff .............................................................................................................................................................3-38
         3.1.16 dir ..............................................................................................................................................................3-39
         3.1.17 edit ............................................................................................................................................................3-41
         3.1.18 enable .......................................................................................................................................................3-42
         3.1.19 erase .........................................................................................................................................................3-43
         3.1.20 exit ............................................................................................................................................................3-44
         3.1.21 format ........................................................................................................................................................3-45
         3.1.22 halt ............................................................................................................................................................3-46
         3.1.23 join-cluster ................................................................................................................................................3-47
         3.1.24 logging ......................................................................................................................................................3-48
         3.1.25 mkdir .........................................................................................................................................................3-49
         3.1.26 mint ...........................................................................................................................................................3-50
         3.1.27 more ..........................................................................................................................................................3-52
         3.1.28 no ..............................................................................................................................................................3-53
         3.1.29 page ..........................................................................................................................................................3-57
         3.1.30 ping ...........................................................................................................................................................3-58
         3.1.31 pwd ...........................................................................................................................................................3-59
         3.1.32 reload ........................................................................................................................................................3-60
Table of Contents                   vii


        3.1.33 rename ......................................................................................................................................................3-62
        3.1.34 rmdir ..........................................................................................................................................................3-63
        3.1.35 self .............................................................................................................................................................3-64
        3.1.36 ssh .............................................................................................................................................................3-65
        3.1.37 telnet .........................................................................................................................................................3-66
        3.1.38 terminal .....................................................................................................................................................3-67
        3.1.39 time-it ........................................................................................................................................................3-68
        3.1.40 traceroute ..................................................................................................................................................3-69
        3.1.41 upgrade .....................................................................................................................................................3-70
        3.1.42 upgrade-abort ............................................................................................................................................3-71
        3.1.43 watch .........................................................................................................................................................3-72


Chapter 4, GLOBAL CONFIGURATION COMMANDS
  4.1 Global Configuration Commands ............................................................................................................................4-3
      4.1.1 aaa-policy ......................................................................................................................................................4-6
      4.1.2 advanced-wips-policy ...................................................................................................................................4-7
      4.1.3 ap300 .............................................................................................................................................................4-8
      4.1.4 ap621 .............................................................................................................................................................4-9
      4.1.5 ap650 ...........................................................................................................................................................4-10
      4.1.6 ap6511 .........................................................................................................................................................4-11
      4.1.7 ap6521 .........................................................................................................................................................4-12
      4.1.8 ap6532 .........................................................................................................................................................4-13
      4.1.9 ap71xx .........................................................................................................................................................4-14
      4.1.10 association-acl-policy ...............................................................................................................................4-15
      4.1.11 auto-provisioning-policy ............................................................................................................................4-16
      4.1.12 captive portal ............................................................................................................................................4-17
          4.1.12.1 captive-portal ..................................................................................................................................4-18
          4.1.12.2 captive-portal-mode commands ......................................................................................................4-19
      4.1.13 clear ...........................................................................................................................................................4-37
      4.1.14 critical-resource-policy ..............................................................................................................................4-38
          4.1.14.1 critical-resource-policy ....................................................................................................................4-39
          4.1.14.2 critical-resource-policy-mode ..........................................................................................................4-40
      4.1.15 customize ..................................................................................................................................................4-44
      4.1.16 device ........................................................................................................................................................4-51
      4.1.17 device-categorization ................................................................................................................................4-53
          4.1.17.1 device-categorization ......................................................................................................................4-54
          4.1.17.2 device-categorization-mode commands .........................................................................................4-55
      4.1.18 dhcp-server-policy .....................................................................................................................................4-60
      4.1.19 dns-whitelist .............................................................................................................................................4-61
          4.1.19.1 dns-whitelist ....................................................................................................................................4-62
          4.1.19.2 dns-whitelist mode commands .......................................................................................................4-63
      4.1.20 do ...............................................................................................................................................................4-66
      4.1.21 end .............................................................................................................................................................4-77
      4.1.22 event-system-policy ..................................................................................................................................4-78
          4.1.22.1 event-system-policy ........................................................................................................................4-79
          4.1.22.2 event-system-policy mode commands ............................................................................................4-80
viii         WiNG 5 System Reference Guide


             4.1.23 firewall-policy .........................................................................................................................................4-101
             4.1.24 host .........................................................................................................................................................4-102
             4.1.25 igmp-snoop-policy ...................................................................................................................................4-103
             4.1.26 ip .............................................................................................................................................................4-105
             4.1.27 mac ..........................................................................................................................................................4-107
             4.1.28 management-policy ................................................................................................................................4-109
             4.1.29 mint-policy ..............................................................................................................................................4-110
             4.1.30 nac-list ....................................................................................................................................................4-111
                 4.1.30.1 nac-list ...........................................................................................................................................4-112
                 4.1.30.2 nac-list-mode ................................................................................................................................4-113
             4.1.31 no ............................................................................................................................................................4-117
             4.1.32 password-encryption ..............................................................................................................................4-119
             4.1.33 profile ......................................................................................................................................................4-120
             4.1.34 radio-qos-policy ......................................................................................................................................4-124
             4.1.35 radius-group ............................................................................................................................................4-125
             4.1.36 radius-server-policy ................................................................................................................................4-126
             4.1.37 radius-user-pool-policy ...........................................................................................................................4-127
             4.1.38 rf-domain .................................................................................................................................................4-128
                 4.1.38.1 rf-domain .......................................................................................................................................4-129
                 4.1.38.2 rf-domain-mode .............................................................................................................................4-131
             4.1.39 rfs4000 ....................................................................................................................................................4-153
             4.1.40 rfs6000 ....................................................................................................................................................4-154
             4.1.41 rfs7000 ....................................................................................................................................................4-155
             4.1.42 role-policy ...............................................................................................................................................4-156
             4.1.43 self ..........................................................................................................................................................4-157
             4.1.44 smart-rf-policy .........................................................................................................................................4-158
             4.1.45 wips-policy ..............................................................................................................................................4-159
             4.1.46 wlan ........................................................................................................................................................4-160
                 4.1.46.1 wlan ...............................................................................................................................................4-161
                 4.1.46.2 wlan-mode commands ..................................................................................................................4-162
             4.1.47 wlan-qos-policy .......................................................................................................................................4-213


Chapter 5, COMMON COMMANDS
       5.1 Common Commands ...............................................................................................................................................5-2
           5.1.1 clrscr ..............................................................................................................................................................5-3
           5.1.2 commit ..........................................................................................................................................................5-4
           5.1.3 end ................................................................................................................................................................5-5
           5.1.4 exit ................................................................................................................................................................5-6
           5.1.5 help ...............................................................................................................................................................5-7
           5.1.6 no ................................................................................................................................................................5-11
           5.1.7 revert ...........................................................................................................................................................5-13
           5.1.8 service .........................................................................................................................................................5-14
           5.1.9 show ............................................................................................................................................................5-40
           5.1.10 write ..........................................................................................................................................................5-42
Table of Contents                    ix


Chapter 6, SHOW COMMANDS
  6.1 show commands .....................................................................................................................................................6-2
      6.1.1 show ..............................................................................................................................................................6-4
      6.1.2 adoption ........................................................................................................................................................6-8
      6.1.3 advanced-wips ............................................................................................................................................6-10
      6.1.4 ap-upgrade ..................................................................................................................................................6-12
      6.1.5 boot .............................................................................................................................................................6-14
      6.1.6 captive-portal ..............................................................................................................................................6-15
      6.1.7 cdp ...............................................................................................................................................................6-18
      6.1.8 clock ............................................................................................................................................................6-20
      6.1.9 cluster ..........................................................................................................................................................6-21
      6.1.10 commands .................................................................................................................................................6-23
      6.1.11 context .......................................................................................................................................................6-25
      6.1.12 critical-resources .......................................................................................................................................6-26
      6.1.13 crypto .........................................................................................................................................................6-27
      6.1.14 debug .........................................................................................................................................................6-30
      6.1.15 debugging ..................................................................................................................................................6-33
      6.1.16 device-categorization ................................................................................................................................6-36
      6.1.17 event-history .............................................................................................................................................6-37
      6.1.18 event-system-policy ..................................................................................................................................6-38
      6.1.19 file .............................................................................................................................................................6-39
      6.1.20 firewall ......................................................................................................................................................6-40
      6.1.21 interface ....................................................................................................................................................6-44
      6.1.22 ip ................................................................................................................................................................6-47
      6.1.23 ip-access-list-stats ....................................................................................................................................6-52
      6.1.24 licenses .....................................................................................................................................................6-53
      6.1.25 lldp .............................................................................................................................................................6-54
      6.1.26 logging .......................................................................................................................................................6-55
      6.1.27 mac-access-list-stats ................................................................................................................................6-56
      6.1.28 mac-address-table ....................................................................................................................................6-57
      6.1.29 mint ...........................................................................................................................................................6-58
      6.1.30 noc .............................................................................................................................................................6-61
      6.1.31 ntp .............................................................................................................................................................6-64
      6.1.32 password-encryption .................................................................................................................................6-65
      6.1.33 power ........................................................................................................................................................6-66
      6.1.34 remote-debug ............................................................................................................................................6-67
      6.1.35 rf-domain-manager ...................................................................................................................................6-68
      6.1.36 role ............................................................................................................................................................6-69
      6.1.37 running-config ...........................................................................................................................................6-70
      6.1.38 session-changes ........................................................................................................................................6-74
      6.1.39 session-config ...........................................................................................................................................6-75
      6.1.40 sessions .....................................................................................................................................................6-76
      6.1.41 smart-rf ......................................................................................................................................................6-77
      6.1.42 spanning-tree ............................................................................................................................................6-80
      6.1.43 startup-config ............................................................................................................................................6-83
      6.1.44 terminal .....................................................................................................................................................6-84
      6.1.45 timezone ....................................................................................................................................................6-85
x         WiNG 5 System Reference Guide


          6.1.46 upgrade-status ..........................................................................................................................................6-86
          6.1.47 version .......................................................................................................................................................6-88
          6.1.48 wireless .....................................................................................................................................................6-89
          6.1.49 wwan ......................................................................................................................................................6-106


Chapter 7, PROFILES
    7.1 Creating Profiles .....................................................................................................................................................7-2
        7.1.1 aaa ................................................................................................................................................................7-5
        7.1.2 adopted-mode ...............................................................................................................................................7-7
        7.1.3 ap-upgrade ....................................................................................................................................................7-8
        7.1.4 ap300 ............................................................................................................................................................7-9
        7.1.5 ap-mobility ..................................................................................................................................................7-10
        7.1.6 arp ...............................................................................................................................................................7-11
        7.1.7 auto-learn-staging-config ...........................................................................................................................7-13
        7.1.8 autoinstall ...................................................................................................................................................7-14
        7.1.9 bridge commands ........................................................................................................................................7-15
            7.1.9.1 bridge ................................................................................................................................................7-16
            7.1.9.2 bridge-vlan-mode commands ............................................................................................................7-17
        7.1.10 cdp .............................................................................................................................................................7-30
        7.1.11 cluster .......................................................................................................................................................7-32
        7.1.12 configuration-persistence .........................................................................................................................7-34
        7.1.13 controller ...................................................................................................................................................7-35
        7.1.14 crypto ........................................................................................................................................................7-37
        7.1.15 isakmp-policy ............................................................................................................................................7-43
            7.1.15.1 authentication .................................................................................................................................7-45
            7.1.15.2 encryption ........................................................................................................................................7-46
            7.1.15.3 group ...............................................................................................................................................7-47
            7.1.15.4 hash .................................................................................................................................................7-48
            7.1.15.5 lifetime ............................................................................................................................................7-49
            7.1.15.6 no .....................................................................................................................................................7-50
        7.1.16 crypto-group ..............................................................................................................................................7-52
            7.1.16.1 dns ...................................................................................................................................................7-53
            7.1.16.2 wns ..................................................................................................................................................7-54
        7.1.17 dscp-mapping ............................................................................................................................................7-55
        7.1.18 email-notification ......................................................................................................................................7-56
        7.1.19 enforce-version .........................................................................................................................................7-58
        7.1.20 events ........................................................................................................................................................7-60
        7.1.21 ip ..............................................................................................................................................................7-61
        7.1.22 nat-pool ....................................................................................................................................................7-65
            7.1.22.1 address ............................................................................................................................................7-66
            7.1.22.2 no .....................................................................................................................................................7-67
        7.1.23 interface ....................................................................................................................................................7-68
        7.1.24 Interface Config Instance ..........................................................................................................................7-70
            7.1.24.1 cdp ...................................................................................................................................................7-72
            7.1.24.2 channel-group .................................................................................................................................7-73
            7.1.24.3 description .......................................................................................................................................7-74
Table of Contents                   xi


        7.1.24.4 dot1x ................................................................................................................................................7-75
        7.1.24.5 duplex ..............................................................................................................................................7-76
        7.1.24.6 ip ......................................................................................................................................................7-77
        7.1.24.7 lldp ...................................................................................................................................................7-79
        7.1.24.8 no .....................................................................................................................................................7-80
        7.1.24.9 qos ...................................................................................................................................................7-82
        7.1.24.10 shutdown .......................................................................................................................................7-83
        7.1.24.11 spanning-tree ................................................................................................................................7-84
        7.1.24.12 speed .............................................................................................................................................7-87
        7.1.24.13 switchport ......................................................................................................................................7-88
        7.1.24.14 use .................................................................................................................................................7-90
    7.1.25 Interface vlan Instance ..............................................................................................................................7-91
        7.1.25.1 crypto ...............................................................................................................................................7-92
        7.1.25.2 description .......................................................................................................................................7-93
        7.1.25.3 dhcp-relay-incoming ........................................................................................................................7-94
        7.1.25.4 ip ......................................................................................................................................................7-95
        7.1.25.5 no .....................................................................................................................................................7-97
        7.1.25.6 shutdown .......................................................................................................................................7-100
        7.1.25.7 use .................................................................................................................................................7-101
    7.1.26 led ............................................................................................................................................................7-102
    7.1.27 legacy-auto-downgrade ..........................................................................................................................7-103
    7.1.28 legacy-auto-update .................................................................................................................................7-104
    7.1.29 lldp ...........................................................................................................................................................7-105
    7.1.30 load-balancing .........................................................................................................................................7-107
    7.1.31 local .........................................................................................................................................................7-112
    7.1.32 logging .....................................................................................................................................................7-113
    7.1.33 mac-address-table ..................................................................................................................................7-115
    7.1.34 mint .........................................................................................................................................................7-117
    7.1.35 misconfiguration-recovery-time ..............................................................................................................7-120
    7.1.36 monitor ....................................................................................................................................................7-121
    7.1.37 neighbor-inactivity-timeout .....................................................................................................................7-122
    7.1.38 neighbor-info-interval .............................................................................................................................7-123
    7.1.39 no .............................................................................................................................................................7-124
    7.1.40 noc ...........................................................................................................................................................7-127
    7.1.41 ntp ...........................................................................................................................................................7-128
    7.1.42 preferred-controller-group ......................................................................................................................7-130
    7.1.43 power-config ...........................................................................................................................................7-131
    7.1.44 radius .......................................................................................................................................................7-133
    7.1.45 rf-domain-manager ...............................................................................................................................7-134
    7.1.46 spanning-tree ..........................................................................................................................................7-135
    7.1.47 use ...........................................................................................................................................................7-138
    7.1.48 vpn ...........................................................................................................................................................7-141
    7.1.49 wep-shared-key-auth ..............................................................................................................................7-142
7.2 Device Specific Commands ................................................................................................................................7-143
    7.2.1 area ...........................................................................................................................................................7-148
    7.2.2 channel-list ................................................................................................................................................7-149
    7.2.3 contact .......................................................................................................................................................7-150
xii         WiNG 5 System Reference Guide


            7.2.4 country-code .............................................................................................................................................7-151
            7.2.5 dhcp-redundancy .......................................................................................................................................7-152
            7.2.6 floor ...........................................................................................................................................................7-153
            7.2.7 hostname ..................................................................................................................................................7-154
            7.2.8 layout-coordinates ....................................................................................................................................7-155
            7.2.9 location .....................................................................................................................................................7-156
            7.2.10 mac-name ...............................................................................................................................................7-157
            7.2.11 neighbor-info-interval .............................................................................................................................7-158
            7.2.12 no ............................................................................................................................................................7-159
            7.2.13 override-wlan ..........................................................................................................................................7-163
            7.2.14 remove-override ......................................................................................................................................7-165
            7.2.15 rsa-key .....................................................................................................................................................7-167
            7.2.16 sensor-server ..........................................................................................................................................7-168
            7.2.17 stats ........................................................................................................................................................7-169
            7.2.18 timezone ..................................................................................................................................................7-170
            7.2.19 trustpoint .................................................................................................................................................7-171


Chapter 8, AAA-POLICY
      8.1 aaa-policy ..............................................................................................................................................................8-2
          8.1.1 accounting .....................................................................................................................................................8-3
          8.1.2 authentication ...............................................................................................................................................8-7
          8.1.3 health-check ................................................................................................................................................8-11
          8.1.4 mac-address-format ....................................................................................................................................8-12
          8.1.5 no ................................................................................................................................................................8-13
          8.1.6 server-pooling-mode ...................................................................................................................................8-16
          8.1.7 use ...............................................................................................................................................................8-17


Chapter 9, AUTO-PROVISIONING-POLICY
      9.1 auto-provisioning-policy .........................................................................................................................................9-2
          9.1.1 adopt .............................................................................................................................................................9-3
          9.1.2 default-adoption ...........................................................................................................................................9-7
          9.1.3 deny ...............................................................................................................................................................9-8
          9.1.4 no ................................................................................................................................................................9-11


Chapter 10, ADVANCED-WIPS-POLICY
      10.1 advanced-wips-policy .........................................................................................................................................10-2
          10.1.1 event .........................................................................................................................................................10-3
          10.1.2 no ............................................................................................................................................................10-10
          10.1.3 server-listen-port ....................................................................................................................................10-13
          10.1.4 terminate .................................................................................................................................................10-14
          10.1.5 use ...........................................................................................................................................................10-15


Chapter 11, ASSOCIATION-ACL-POLICY
      11.1 association-acl-policy .........................................................................................................................................11-2
Table of Contents                  xiii


        11.1.1 deny ...........................................................................................................................................................11-3
        11.1.2 no ...............................................................................................................................................................11-5
        11.1.3 permit ........................................................................................................................................................11-7


Chapter 12, ACCESS-LIST
  12.1 ip-access-list .......................................................................................................................................................12-3
      12.1.1 deny ...........................................................................................................................................................12-4
      12.1.2 no ...............................................................................................................................................................12-9
      12.1.3 permit ......................................................................................................................................................12-15
  12.2 mac-access-list .................................................................................................................................................12-21
      12.2.1 deny .........................................................................................................................................................12-22
      12.2.2 no .............................................................................................................................................................12-25
      12.2.3 permit ......................................................................................................................................................12-28


Chapter 13, DHCP-SERVER-POLICY
  13.1 dhcp-server-policy ...............................................................................................................................................13-2
      13.1.1 bootp .........................................................................................................................................................13-3
      13.1.2 dhcp-class .................................................................................................................................................13-4
          13.1.2.1 dhcp-class ........................................................................................................................................13-5
          13.1.2.2 dhcp-class-mode .............................................................................................................................13-6
      13.1.3 dhcp-pool .................................................................................................................................................13-10
          13.1.3.1 dhcp-pool .......................................................................................................................................13-11
          13.1.3.2 dhcp-pool-mode .............................................................................................................................13-13
          13.1.3.3 static-binding .................................................................................................................................13-37
      13.1.4 no .............................................................................................................................................................13-55
      13.1.5 option ......................................................................................................................................................13-57
      13.1.6 ping ..........................................................................................................................................................13-58


Chapter 14, FIREWALL-POLICY
  14.1 firewall-policy .....................................................................................................................................................14-3
      14.1.1 alg ..............................................................................................................................................................14-4
      14.1.2 clamp .........................................................................................................................................................14-5
      14.1.3 dhcp-offer-convert ....................................................................................................................................14-6
      14.1.4 dns-snoop ..................................................................................................................................................14-7
      14.1.5 firewall ......................................................................................................................................................14-8
      14.1.6 flow ...........................................................................................................................................................14-9
      14.1.7 ip ..............................................................................................................................................................14-11
      14.1.8 ip-mac ......................................................................................................................................................14-17
      14.1.9 logging .....................................................................................................................................................14-20
      14.1.10 no ...........................................................................................................................................................14-22
      14.1.11 proxy-arp ...............................................................................................................................................14-30
      14.1.12 stateful-packet-inspection-12 ...............................................................................................................14-31
      14.1.13 storm-control .........................................................................................................................................14-32
      14.1.14 virtual-defragmentation .......................................................................................................................14-35
xiv         WiNG 5 System Reference Guide


Chapter 15, IGMP-SNOOP-POLICY
      15.1 igmp-snoop-policy ..............................................................................................................................................15-2
          15.1.1 igmp-snooping ..........................................................................................................................................15-3
          15.1.2 no ..............................................................................................................................................................15-4
          15.1.3 querier .......................................................................................................................................................15-6
          15.1.4 robustness-variable ..................................................................................................................................15-7
          15.1.5 unknown-multicast-fwd ............................................................................................................................15-8


Chapter 16, MINT-POLICY
      16.1 mint-policy ..........................................................................................................................................................16-2
          16.1.1 level ...........................................................................................................................................................16-3
          16.1.2 mtu ............................................................................................................................................................16-4
          16.1.3 udp ............................................................................................................................................................16-5
          16.1.4 no ..............................................................................................................................................................16-6


Chapter 17, MANAGEMENT-POLICY
      17.1 management-policy ............................................................................................................................................17-2
          17.1.1 aaa-login ...................................................................................................................................................17-3
          17.1.2 banner .......................................................................................................................................................17-5
          17.1.3 ftp ..............................................................................................................................................................17-6
          17.1.4 http ............................................................................................................................................................17-8
          17.1.5 https ..........................................................................................................................................................17-9
          17.1.6 idle-session-timeout ...............................................................................................................................17-10
          17.1.7 no ............................................................................................................................................................17-11
          17.1.8 restrict-access .........................................................................................................................................17-14
          17.1.9 snmp-server ............................................................................................................................................17-17
          17.1.10 ssh .........................................................................................................................................................17-21
          17.1.11 telnet .....................................................................................................................................................17-22
          17.1.12 user .......................................................................................................................................................17-23


Chapter 18, RADIUS-POLICY
      18.1 radius-group ........................................................................................................................................................18-2
          18.1.1 guest .........................................................................................................................................................18-3
          18.1.2 policy .........................................................................................................................................................18-4
          18.1.3 rate-limit ...................................................................................................................................................18-7
          18.1.4 no ..............................................................................................................................................................18-8
      18.2 radius-server-policy ..........................................................................................................................................18-10
          18.2.1 authentication .........................................................................................................................................18-11
          18.2.2 crl-check ..................................................................................................................................................18-13
          18.2.3 ldap-group-verification ...........................................................................................................................18-14
          18.2.4 ldap-server ..............................................................................................................................................18-15
          18.2.5 local .........................................................................................................................................................18-18
          18.2.6 nas ...........................................................................................................................................................18-19
          18.2.7 no ............................................................................................................................................................18-20
Table of Contents                  xv


      18.2.8 proxy ........................................................................................................................................................18-23
      18.2.9 session-resumption .................................................................................................................................18-25
      18.2.10 use .........................................................................................................................................................18-26
  18.3 radius-user-pool-policy .....................................................................................................................................18-27
      18.3.1 user ..........................................................................................................................................................18-28
      18.3.2 no .............................................................................................................................................................18-30


Chapter 19, RADIO-QOS-POLICY
  19.1 radio-qos-policy ..................................................................................................................................................19-2
      19.1.1 accelerated-multicast ...............................................................................................................................19-3
      19.1.2 admission-control ......................................................................................................................................19-5
      19.1.3 no ...............................................................................................................................................................19-7
      19.1.4 wmm ........................................................................................................................................................19-10


Chapter 20, ROLE-POLICY
  20.1 role-policy ..........................................................................................................................................................20-2
      20.1.1 default-role ................................................................................................................................................20-3
      20.1.2 no ...............................................................................................................................................................20-5
      20.1.3 user-role ....................................................................................................................................................20-7
           20.1.3.1 user-role ..........................................................................................................................................20-8
           20.1.3.2 user-role commands ........................................................................................................................20-9


Chapter 21, SMART-RF-POLICY
  21.1 smart-rf-policy .....................................................................................................................................................21-2
      21.1.1 assignable-power ......................................................................................................................................21-4
      21.1.2 auto-assign-sensor ....................................................................................................................................21-5
      21.1.3 channel-list ................................................................................................................................................21-6
      21.1.4 channel-width ...........................................................................................................................................21-7
      21.1.5 coverage-hole-recovery .............................................................................................................................21-8
      21.1.6 enable ......................................................................................................................................................21-10
      21.1.7 group-by ..................................................................................................................................................21-11
      21.1.8 interference-recovery ..............................................................................................................................21-12
      21.1.9 neighbor-recovery ...................................................................................................................................21-14
      21.1.10 no ...........................................................................................................................................................21-16
      21.1.11 root-recovery .........................................................................................................................................21-18
      21.1.12 sensitivity ..............................................................................................................................................21-19
      21.1.13 smart-ocs-monitoring ............................................................................................................................21-20
      21.1.14 smart-ocs-monitoring (AP71XX) ............................................................................................................21-23


Chapter 22, WIPS-POLICY
  22.1 wips-policy ..........................................................................................................................................................22-2
      22.1.1 ap-detection ..............................................................................................................................................22-3
      22.1.2 enable ........................................................................................................................................................22-4
      22.1.3 event ..........................................................................................................................................................22-5
xvi         WiNG 5 System Reference Guide


            22.1.4 history-throttle-duration ...........................................................................................................................22-9
            22.1.5 no ............................................................................................................................................................22-10
            22.1.6 signature .................................................................................................................................................22-14
                22.1.6.1 signature .......................................................................................................................................22-15
                22.1.6.2 signature mode commands ...........................................................................................................22-16
            22.1.7 use ...........................................................................................................................................................22-31


Chapter 23, WLAN-QOS-POLICY
      23.1 wlan-qos-policy ..................................................................................................................................................23-2
          23.1.1 accelerated-multicast ...............................................................................................................................23-3
          23.1.2 classification .............................................................................................................................................23-5
          23.1.3 multicast-mask ..........................................................................................................................................23-7
          23.1.4 no ..............................................................................................................................................................23-8
          23.1.5 qos ...........................................................................................................................................................23-11
          23.1.6 rate-limit .................................................................................................................................................23-12
          23.1.7 svp-prioritization ....................................................................................................................................23-14
          23.1.8 voice-prioritization .................................................................................................................................23-15
          23.1.9 wmm .......................................................................................................................................................23-16


Chapter 24, INTERFACE-RADIO COMMANDS
      24.1 interface-radio Instance .....................................................................................................................................24-3
          24.1.1 aeroscout ..................................................................................................................................................24-5
          24.1.2 ack-timeout ...............................................................................................................................................24-6
          24.1.3 aggregation ...............................................................................................................................................24-7
          24.1.4 antenna-diversity ....................................................................................................................................24-10
          24.1.5 airtime-fairness .......................................................................................................................................24-11
          24.1.6 antenna-gain ...........................................................................................................................................24-12
          24.1.7 antenna-mode .........................................................................................................................................24-13
          24.1.8 beacon .....................................................................................................................................................24-14
          24.1.9 channel ....................................................................................................................................................24-16
          24.1.10 data-rates ..............................................................................................................................................24-17
          24.1.11 description ............................................................................................................................................24-20
          24.1.12 dynamic-chain-selection .......................................................................................................................24-21
          24.1.13 ekahau ...................................................................................................................................................24-22
          24.1.14 guard-interval ........................................................................................................................................24-23
          24.1.15 lock-rf-mode ..........................................................................................................................................24-24
          24.1.16 max-clients ............................................................................................................................................24-25
          24.1.17 mesh ......................................................................................................................................................24-26
          24.1.18 meshpoint .............................................................................................................................................24-27
          24.1.19 no ..........................................................................................................................................................24-28
          24.1.20 non-unicast ...........................................................................................................................................24-31
          24.1.21 off-channel-scan ...................................................................................................................................24-33
          24.1.22 placement .............................................................................................................................................24-34
          24.1.23 power ....................................................................................................................................................24-35
          24.1.24 preamble-short ......................................................................................................................................24-36
Table of Contents xvii


        24.1.25 probe-response .....................................................................................................................................24-37
        24.1.26 radio-share-mode ..................................................................................................................................24-38
        24.1.27 rate-selection ........................................................................................................................................24-39
        24.1.28 rf-mode ..................................................................................................................................................24-40
        24.1.29 rifs .........................................................................................................................................................24-41
        24.1.30 rts-threshold ..........................................................................................................................................24-42
        24.1.31 shutdown ...............................................................................................................................................24-43
        24.1.32 sniffer-redirect ......................................................................................................................................24-44
        24.1.33 stbc ........................................................................................................................................................24-45
        24.1.34 txbf ........................................................................................................................................................24-46
        24.1.35 use .........................................................................................................................................................24-47
        24.1.36 wireless-client .......................................................................................................................................24-48
        24.1.37 wlan .......................................................................................................................................................24-49


Chapter 25, FIREWALL LOGGING
  25.1 Firewall Log Terminology and Syslog Severity Levels .......................................................................................25-2
      25.1.1 Date format in Syslog messages ..............................................................................................................25-3
      25.1.2 FTP data connection log ............................................................................................................................25-4
      25.1.3 UDP packets log ........................................................................................................................................25-5
      25.1.4 ICMP type logs ..........................................................................................................................................25-6
      25.1.5 ICMP type logs ..........................................................................................................................................25-7
      25.1.6 Raw IP Protocol logs ...............................................................................................................................25-8
      25.1.7 Raw IP Protocol logs ................................................................................................................................25-9
      25.1.8 Firewall startup log .................................................................................................................................25-10
      25.1.9 Manual time change log .........................................................................................................................25-11
      25.1.10 Firewall ruleset log ...............................................................................................................................25-12
      25.1.11 TCP Reset Packets log ...........................................................................................................................25-14
      25.1.12 ICMP Destination log ...........................................................................................................................25-15
      25.1.13 ICMP Packet log ....................................................................................................................................25-16
      25.1.14 SSH connection log ...............................................................................................................................25-17
      25.1.15 Allowed/Dropped Packets Log ..............................................................................................................25-18


Chapter 26, MESHPOINT
  26.1 meshpoint ...........................................................................................................................................................26-2
      26.1.1 allowed-vlans ............................................................................................................................................26-4
      26.1.2 beacon-format ...........................................................................................................................................26-5
      26.1.3 control-vlan ...............................................................................................................................................26-6
      26.1.4 data-rates ..................................................................................................................................................26-7
      26.1.5 description ...............................................................................................................................................26-11
      26.1.6 meshid .....................................................................................................................................................26-12
      26.1.7 neighbor ..................................................................................................................................................26-13
      26.1.8 no .............................................................................................................................................................26-14
      26.1.9 root ..........................................................................................................................................................26-17
      26.1.10 security-mode ........................................................................................................................................26-18
      26.1.11 service ...................................................................................................................................................26-19
xviii     WiNG 5 System Reference Guide


        26.1.12 shutdown ..............................................................................................................................................26-20
        26.1.13 use .........................................................................................................................................................26-21
        26.1.14 wpa2 .....................................................................................................................................................26-22
    26.2 meshpoint-qos-policy .......................................................................................................................................26-24
        26.2.1 accelerated-multicast .............................................................................................................................26-26
        26.2.2 no ............................................................................................................................................................26-27
        26.2.3 rate-limit .................................................................................................................................................26-29
    26.3 Other Meshpoint commands ............................................................................................................................26-31
        26.3.1 meshpoint-device ....................................................................................................................................26-32
        26.3.2 no ............................................................................................................................................................26-33
        26.3.3 preferred .................................................................................................................................................26-34
        26.3.4 root ..........................................................................................................................................................26-35


Appendix A, CONTROLLER MANAGED WLAN USE CASE
    A.1 Creating a First Controller Managed WLAN ......................................................................................................... A-2
        A.1.1 Assumptions ................................................................................................................................................ A-2
        A.1.2 Design .......................................................................................................................................................... A-3
        A.1.3 Using the Command Line Interface to Configure the WLAN ...................................................................... A-4
            A.1.3.1 Logging Into the Controller for the First Time ................................................................................... A-4
            A.1.3.2 Creating a RF Domain ........................................................................................................................ A-5
            A.1.3.3 Creating a Wireless Controller Profile .............................................................................................. A-6
            A.1.3.4 Creating an AP Profile ....................................................................................................................... A-7
            A.1.3.5 Creating a DHCP Server Policy .......................................................................................................... A-9
            A.1.3.6 Completing and Testing the Configuration ..................................................................................... A-10


Appendix B, CUSTOMER SUPPORT
ABOUT THIS GUIDE

  This manual supports the following wireless controllers and connected access points:
   • AP300
   • AP621
   • AP650
   • AP6511
   • AP6521
   • AP6532
   • AP71XX
   • RFS4000
   • RFS6000
   • RFS7000
  This section is organized into the following:
   • Document Convention
   • Notational Conventions
xx   WiNG CLI Reference Guide



      Document Convention
      The following conventions are used in this document to draw your attention to important information:


                     NOTE: Indicates tips or special requirements.




            !        CAUTION: Indicates conditions that can cause equipment damage or data loss.


                     WARNING! Indicates a condition or procedure that could result in personal
                     injury or equipment damage.



                     Switch Note: Indicates caveats unique to a RFS7000, RFS6000 or RFS4000 model
                     controller.
Getting Started with the Mobile Computer                   xxi



Notational Conventions
The following notational conventions are used in this document:
• Italics are used to highlight specific items in the general text, and to identify chapters and sections in this and related
  documents
• Bullets (•) indicate:
    • lists of alternatives
    • lists of required steps that are not necessarily sequential
    • action items
• Sequential lists (those describing step-by-step procedures) appear as numbered lists
Understanding Command Syntax

 <variable>                     Variables are described with a short description enclosed within a ‘<‘ and
                                a ‘>’ pair.
                                For example, the command,
                                            rfs7000-37FABE>show interface ge 1
                                is documented as
                                            show interface ge <idx>
                                • show – The command – Display information
                                • interface – The keyword – The interface
                                • <idx> – The variable – ge Index value
|                               The pipe symbol. This is used to separate the variables/keywords in a list.
                                For example, the command
                                            rfs7000-37FABE> show .....
                                is documented as
                                            show [adoption|advanced-wips|boot|captive-
                                            portal|......]
                                where:
                                • show – The command
                                • [adoption|advanced-wips|boot|captive-portal|......] – Indicates the different
                                  commands that can be combined with the show command. However, only one
                                  of the above list can be used at a time.
                                            show adoption ...
                                            show advanced-wips ...
                                            show boot ...
xxii   WiNG CLI Reference Guide



         []                       Of the different keywords and variables listed inside a ‘[‘ & ‘]’ pair, only
                                  one can be used. Each choice in the list is separated with a ‘|’ (pipe)
                                  symbol.
                                  For example, the command
                                             rfs7000-37FABE# clear ...
                                  is documented as
                                             clear [arp-cache|cdp|crypto|event-history|
                                             firewall|ip|spanning-tree]
                                  where:
                                  • clear – The command
                                  • [arp-cache|cdp|crypto|event-history|firewall|ip|spanning-tree] – Indicates that
                                    seven keywords are available for this command and only one can be used at a
                                    time
        {}                        Any command/keyword/variable or a combination of them inside a ‘{‘ & ‘}’
                                  pair is optional. All optional commands follow the same conventions as
                                  listed above. However they are displayed italicized.
                                  For example, the command
                                             rfs7000-37FABE> show adoption ....
                                  is documented as
                                             show adoption info {on <DEVICE-OR-DOMAIN-NAME>}
                                  Here:
                                  • show adoption info – The command. This command can also be used as
                                            show adoption info
                                  • {on <DEVICE-OR-DOMAIN-NAME>} – The optional keyword on <device-or-
                                    domain-name>. The command can also be extended as
                                             show adoption info {on <DEVICE-OR-DOMAIN-NAME>}
                                  Here the keyword {on <DEVICE-OR-DOMAIN-NAME>} is optional.
Getting Started with the Mobile Computer       xxiii



command / keyword   The first word is always a command. Keywords are words that must be
                    entered as is. Commands and keywords are mandatory.
                    For example, the command,
                               rfs7000-37FABE>show wireless
                    is documented as
                               show wireless
                    where:
                      • show – The command
                      • wireless – The keyword
()                  Any command/keyword/variable or a combination of them inside a ‘(‘ & ‘)’
                    pair are recursive. All recursive commands can be listed in any order and
                    can be used once along with the rest of the commands.
                    For example, the command
                              crypto pki export request generate-rsa-key
                              test autogen-subject-name ...
                    is documented as
                              rfs7000-37FABE#crypto pki export request
                              generate-rsa-key test autogen-subject-name
                              (<URL>,email <EMAIL>,fqdn <FQDN>,ip-address
                              <IP>)
                    Here:
                      • crypto pki export request generate-rsa-key <RSA-KEYPAIR-NAME>
                      auto-gen-subject-name – is the command
                              rfs7000-37FABE#crypto pki export request
                              generate-rsa-key test autogen-subject-name
                      • (<URL>,email <EMAIL>,fqdn <FQDN>,ip-address <IP>) – is the set of
                      recursive parameters that can be used in any order.
                    where every recursive command is separated by a comma ‘,’
xxiv    WiNG CLI Reference Guide



Motorola Solutions Enterprise Mobility Support Center
         If you have a problem with your equipment, contact Motorola Solutions Enterprise Mobility Support for your region.
         Contact information is available by visiting the URL:
          http://www.motorolasolutions.com/Business/XP-EN/Pages/Contact_Us#contactus_tab
         When contacting Enterprise Mobility support, please provide the following information:
          • Serial number of the unit
          • Model number or product name
          • Software type and version number
         Motorola Solutions responds to calls by e-mail, telephone or fax within the time limits set forth in support agreements. If
         you purchased your Enterprise Mobility business product from a Motorola Solutions business partner, contact that
         business partner for support.

Customer Support Web Site
         Motorola Solutions' Support Central Web site, accessed via the Symbol-branded products link under Support for Business,
         provides information and online assistance including developer tools, software downloads, product manuals and online
         repair requests. Product support can be found at:
         http://www.motorolasolutions.com/Business/XP-EN/Pages/Contact_Us#support_tab

Product Sales and Product Information
         Motorola Solutions, Inc.
         One Motorola Plaza
         Holtsville, New York 11742-1300

         Tel: 1-631-738-2400 or 1-800-722-6234
         Fax: 1-631-738-5990

General Information
         For general information, contact Motorola Solutions at:
             Telephone (North America): 1-800-722-6234
             Telephone (International): +1-631-738-5200

Website: http://www.motorolasolutions.com
Getting Started with the Mobile Computer                    xxv



Motorola Solutions, Inc.
End-User License Agreement
BY DOWNLOADING, INSTALLING, OR USING THE SOFTWARE DESCRIBED IN THIS DOCUMENT, YOU OR THE ENTITY OR COMPANY
THAT YOU REPRESENT ("LICENSEE") ARE UNCONDITIONALLY CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO
THIS LICENSE AGREEMENT ("AGREEMENT"). LICENSEE'S USE OR CONTINUED USE OF THE DOWNLOADED OR INSTALLED
MATERIALS SHALL ALSO CONSTITUTE ASSENT TO THE TERMS OF THIS AGREEMENT. IF LICENSEE DOES NOT UNCONDITIONALLY
AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, DO NOT CONTINUTE THE INSTALLATION PROCESS. IF THESE TERMS ARE
CONSIDERED AN OFFER, ACCEPTANCE IS EXPRESSLY LIMITED TO AND EXPRESSLY CONTINGENT UPON THESE TERMS. IF YOU ARE
ACCEPTING THESE TERMS ON BEHALF OF A COMPANY, ANOTHER PERSON OR ANY OTHER LEGAL ENTITY, YOU REPRESENT AND
WARRANT THAT YOU HAVE THE AUTHORITY TO BIND THAT COMPANY, PERSON OR ENTITY.
   1. LICENSE GRANT. Subject to the terms of this Agreement, Motorola Solutions, Inc. and/or its subsidiaries ("Licensor") hereby
      grants Licensee a limited, personal, non-sublicensable, non transferable, non-exclusive license to use the software that
      Licensee is about to download or install and the documentation that accompanies it (collectively, the "Software") for
      Licensee's personal use in connection with hardware produced by Licensor and only in accordance with the accompanying
      documentation. Licensee may download, install and use the Software only on a single computer. Licensee may make one
      copy of the Software (excluding any documentation) for backup purposes, provided that copyright and other restricted rights
      notices of Licensor and its suppliers are reproduced exactly.
   2. LICENSE RESTRICTIONS. Except as expressly permitted by this Agreement, Licensee shall not, nor permit anyone else to,
      directly or indirectly: (i) copy (except for one backup copy), modify, distribute or create derivative works based upon the
      Software; (ii) reverse engineer, disassemble, decompile or otherwise attempt to discover the source code or structure,
      sequence and organization of the Software; or (iii) rent, lease, or use the Software for timesharing or service bureau
      purposes, or otherwise use the Software for any commercial purpose/on behalf of any third party. Licensee shall maintain
      and not remove or obscure any proprietary notices on the Software, and shall reproduce such notices exactly on all permitted
      copies of the Software. All title, ownership rights, and intellectual property rights in and to the Software, and any copies or
      portions thereof, shall remain in Licensor and its suppliers or licensors. Licensee understands that Licensor may modify or
      discontinue offering the Software at any time. The Software is protected by the copyright laws of the United States and
      international copyright treaties. The Software is licensed, not sold. This Agreement does not give Licensee any rights not
      expressly granted herein.
   3. INTELLECTUAL PROPERTY; CONTENT. All title and intellectual property rights in and to the Software (including but not
      limited to any images, photographs, animations, video, audio, music, text and "applets" incorporated into the Software), and
      any copies you are permitted to make herein are owned by Licensor or its suppliers. All title and intellectual property rights
      in and to the content which may be accessed through use of the Software is the property of the respective content owner
      and may be protected by applicable copyright or other intellectual property laws and treaties. This EULA grants you no rights
      to use such content. As a condition to Licensee's use of the Software, Licensee represents, warrants and covenants that
      Licensee will not use the Software: (i) to infringe the intellectual property rights or proprietary rights, or rights of publicity
      or privacy, of any third party; (ii) to violate any applicable law, statute, ordinance or regulation; (iii) to disseminate information
      or materials in any form or format ("Content") that are harmful, threatening, abusive, harassing, tortuous, defamatory, vulgar,
      obscene, libelous, or otherwise objectionable; or (iv) to disseminate any software viruses or any other computer code, files
      or programs that may interrupt, destroy or limit the functionality of any computer software or hardware or
      telecommunications equipment. Licensee, not Licensor, remains solely responsible for all Content that Licensee uploads,
      posts, e-mails, transmits, or otherwise disseminates using, or in connection with, the Software.
   4. FEES; SUPPORT AND UPGRADES. Licensor may, at Licensor's sole option, provide support services related to the Software
      ("Support Services"). Nothing in this Agreement grants Licensee any right to receive any Support Services. Use of any
      Support Services provided is governed by the Licensor policies and programs described in the user manual, in "online"
      documentation, and/or in other Licensor-provided materials or support agreements. Any supplemental software code
      provided to you as part of any Support Services shall be considered part of the Software and subject to the terms and
      conditions of this EULA. With respect to technical information you provide to Licensor as part of any Support Services,
xxvi    WiNG CLI Reference Guide


        Licensor may use such information for its business purposes, including for product support and development. Licensor will
        not utilize such technical information in a form that personally identifies Licensee.
   5.   TERMINATION. Either party may terminate this Agreement at any time, with or without cause, upon written notice. Any
        termination of this Agreement shall also terminate the licenses granted hereunder. Upon termination of this Agreement for
        any reason, Licensee shall return all copies of the Software to Licensor, or destroy and remove from all computers, hard
        drives, networks, and other storage media all copies of the Software, and shall so certify to Licensor that such actions have
        occurred. Sections 2-13 shall survive termination of this Agreement.
   6.   DISCLAIMER OF WARRANTIES. To the maximum extent permitted by applicable law, Licensor and its suppliers provide the
        Software and any (if any) Support Services AS IS AND WITH ALL FAULTS, and hereby disclaim all warranties and conditions,
        either express, implied or statutory, including, but not limited to, any (if any) implied warranties or conditions of
        merchantability, of fitness for a particular purpose, of lack of viruses, of accuracy or completeness of responses, of results,
        and of lack of negligence or lack of workmanlike effort, all with regard to the Software, and the provision of or failure to
        provide Support Services. ALSO, THERE IS NO WARRANTY OR CONDITION OF TITLE, QUIET ENJOYMENT, QUIET
        POSSESSION, CORRESPONDENCE TO DESCRIPTION, OR NONINFRINGEMENT WITH REGARD TO THE SOFTWARE. THE
        ENTIRE RISK AS TO THE QUALITY OF OR ARISING OUT OF USE OR PERFORMANCE OF THE SOFTWARE AND SUPPORT
        SERVICES, IF ANY, REMAINS WITH LICENSEE.
   7.   EXCLUSION OF INCIDENTAL, CONSEQUENTIAL AND CERTAIN OTHER DAMAGES. TO THE MAXIMUM EXTENT PERMITTED
        BY APPLICABLE LAW, IN NO EVENT SHALL LICENSOR OR ITS SUPPLIERS BE LIABLE FOR ANY GENERAL, SPECIAL,
        INCIDENTAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO,
        DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OR OTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR
        PERSONAL INJURY, FOR LOSS OF PRIVACY, FOR FAILURE TO MEET ANY DUTY INCLUDING OF GOOD FAITH OR OF
        REASONABLE CARE, FOR NEGLIGENCE, AND FOR ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT
        OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, THE PROVISION OF OR FAILURE TO
        PROVIDE SUPPORT SERVICES, OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS AGREEMENT,
        EVEN IN THE EVENT OF THE FAULT, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY, BREACH OF CONTRACT OR BREACH
        OF WARRANTY OF LICENSOR OR ANY SUPPLIER, AND EVEN IF LICENSOR OR ANY SUPPLIER HAS BEEN ADVISED OF THE
        POSSIBILITY OF SUCH DAMAGES.
   8.   LIMITATION OF LIABILITY AND REMEDIES. Notwithstanding any damages that Licensee might incur for any reason
        whatsoever (including, without limitation, all damages referenced above and all direct or general damages), the entire
        liability of Licensor and any of its suppliers under any provision of this Agreement and Licensee's exclusive remedy for all of
        the foregoing shall be limited to the greater of the amount actually paid by Licensee for the Software or U.S.$5.00. The
        foregoing limitations, exclusions and disclaimers shall apply to the maximum extent permitted by applicable law, even if any
        remedy fails its essential purpose.
Getting Started with the Mobile Computer                 xxvii


9. INDEMNITY. Licensee agrees that Licensor shall have no liability whatsoever for any use Licensee makes of the Software.
    Licensee shall indemnify and hold harmless Licensor from any claims, damages, liabilities, costs and fees (including
    reasonable attorney fees) arising from Licensee's use of the Software as well as from Licensee's failure to comply with any
    term of this Agreement.
10. FAULT TOLERANCE. The Software is not fault-tolerant and is not designed, manufactured or intended for use or resale in on-
    line control equipment in hazardous environments requiring fail-safe performance, such as, but not limited to, the operation
    of nuclear facilities, aircraft navigation or communication systems, air traffic control, life support machines, or weapons
    systems, in which the failure of the Software could lead directly or indirectly to death, personal injury, or physical or
    environmental damage ("High Risk Activities"). Licensor and its suppliers specifically disclaim any express or implied
    warranty of fitness for High Risk Activities.
11. U.S. GOVERNMENT LICENSE RIGHTS. Software provided to the U.S. Government pursuant to solicitations issued on or after
    December 1, 1995 is provided with the commercial license rights and restrictions described elsewhere herein. Software
    provided to the U.S. Government pursuant to solicitations issued prior to December 1, 1995 is provided with "Restricted
    Rights" as provided for in FAR, 48 CFR 52.227-14 (JUNE 1987) or DFAR, 48 CFR 252.227- 7013 (OCT 1988), as applicable. The
    "Manufacturer" for purposes of these regulations is Motorola Solutions, Inc., One Symbol Plaza, Holtsville, NY 11742.
12. EXPORT RESTRICTIONS. Licensee shall comply with all export laws and restrictions and regulations of the Department of
    Commerce, the United States Department of Treasury Office of Foreign Assets Control ("OFAC"), or other United States or
    foreign agency or authority, and Licensee shall not export, or allow the export or re-export of the Software in violation of any
    such restrictions, laws or regulations. By downloading or using the Software, Licensee agrees to the foregoing and
    represents and warrants that Licensee is not located in, under the control of, or a national or resident of any restricted
    country.
13. MISCELLANEOUS. Licensee may not sublicense, assign, or transfer this Agreement, or its rights or obligations hereunder,
    without the prior written consent of Licensor. Any attempt to otherwise sublicense, assign, or transfer any of the rights,
    duties, or obligations hereunder is null and void. Licensor may assign this Agreement in its sole discretion. In the event that
    any of the provisions of this Agreement shall be held by a court or other tribunal of competent jurisdiction to be illegal, invalid
    or unenforceable, such provisions shall be limited or eliminated to the minimum extent necessary so that this Agreement
    shall otherwise remain in full force and effect. No waiver or modification of this Agreement will be binding upon a party
    unless made in writing and signed by a duly authorized representative of such party and no failure or delay in enforcing any
    right will be deemed a waiver. This Agreement shall be governed by the laws of the State of New York without regard to the
    conflicts of law provisions thereof. The application the United Nations Convention of Contracts for the International Sale of
    Goods is expressly excluded. Unless waived by Licensor for a particular instance, any action or proceeding arising out of this
    Agreement must be brought exclusively in the state or federal courts of New York and Licensee hereby consents to the
    jurisdiction of such courts for any such action or proceeding. This Agreement supersedes all prior discussions and writings
    and constitutes the entire agreement between the parties with respect to the subject matter hereof. The prevailing party in
    any action arising out of this Agreement shall be entitled to costs and attorneys' fees.
xxviii   WiNG CLI Reference Guide
CHAPTER 1 INTRODUCTION

  This chapter describes the commands available using the wireless controller Command Line Interface (CLI). CLI is available
  for wireless controllers as well as access points (APs).
  Access the CLI by using:
   • A terminal emulation program running on a computer connected to the serial port on the wireless controller. The serial
     port is located on the front of the wireless controller.
   • A Telnet session through Secure Shell (SSH) over a network.
  Configuration for connecting to a Wireless Controller using a terminal emulator
  If connecting through the serial port, use the following settings to configure your terminal emulator:

   Bits Per Second                                          19200
   Data Bits                                                8
   Parity                                                   None
   Stop Bit                                                 1
   Flow Control                                             None

  When a CLI session is established, complete the following (user input is in bold):
  login as: <username>
  administrator’s login password: <password>
  User Credentials
  Use the following credentials when logging into a device for the first time:

   User Name                                                admin
   Password                                                 motorola

  When logging into the CLI for the first time, you are prompted to change the password.
1-2   WiNG CLI Reference Guide


       Examples in this reference guide
       Examples used in this reference guide are generic to the each supported wireless controller model and AP. Commands that
       are not common, are identified using the notation “Supported in the following platforms.” For an example, see below:
       Supported in the following platforms:
          • RFS6000
       The above example indicates the command is only available for a RFS6000 model wireless controller.
INTRODUCTION            1-3



1.1 CLI Overview
   The CLI is used for configuring, monitoring, and maintaining the wireless controller managed network. The user interface
   allows you to execute commands on supported wireless controllers and APs, using either a serial console or a remote
   access method.
   This chapter describes basic CLI features. Topics covered include an introduction to command modes, navigation and
   editing features, help features and command history.
   The CLI is segregated into different command modes. Each mode has its own set of commands for configuration,
   maintenance and monitoring. The commands available at any given time depend on the mode you are in, and to a lesser
   extent, the particular model used. Enter a question mark (?) at the system prompt to view a list of commands available for
   each command mode/instance.
   Use specific commands to navigate from one command mode to another. The standard order is: USER EXEC mode, PRIV
   EXEC mode and GLOBAL CONFIG mode.




                                               Figure 1-1 Hierarchy of User Modes
   Command Modes
   A session generally begins in the USER EXEC mode (one of the two access levels of the EXEC mode). For security, only a
   limited subset of EXEC commands are available in the USER EXEC mode. This level is reserved for tasks that do not change
   the wireless controller configuration.
   rfs7000-37FABE>
   The system prompt signifies the device name and the last three bytes of the device MAC address.
   To access commands, enter the PRIV EXEC mode (the second access level for the EXEC mode). Once in the PRIV EXEC mode,
   enter any EXEC command. The PRIV EXEC mode is a superset of the USER EXEC mode.
   rfs7000-37FABE> enable
   rfs7000-37FABE#
   Most of the USER EXEC mode commands are one-time commands and are not saved across wireless controller reboots.
   Save the command by executing ‘commit’ command. For example, the show command displays the current configuration
   and the clear command clears the interface.
1-4   WiNG CLI Reference Guide


       Access the GLOBAL CONFIG mode from the PRIV EXEC mode. In the GLOBAL CONFIG mode, enter commands that set
       general system characteristics. Configuration modes, allow you to change the running configuration. If you save the
       configuration later, these commands are stored across wireless controller reboots.
       Access a variety of protocol specific (or feature-specific) modes from the global configuration mode. The CLI hierarchy
       requires you to access specific configuration modes only through the global configuration mode.
       rfs7000-37FABE# configure terminal
       Enter configuration commands, one per line.                      End with CNTL/Z.
       rfs7000-37FABE(config)#
       You can also access sub-modes from the global configuration mode. Configuration sub-modes define specific features
       within the context of a configuration mode.
       rfs7000-37FABE(config)# aaa-policy test
       rfs7000-37FABE(config-aaa-policy-test)#
       Table 1.1 summarizes available wireless controller commands
                                                 Table 1.1 Wireless Controller modes and commands

                  User Exec Mode                          Priv Exec Mode                     Global Configuration Mode
        ap-upgrade                            ap-upgrade                                 aaa-policy
        change-passwd                         archive                                    advanced-wips-policy
        clear                                 boot                                       ap300
        clock                                 cd                                         ap621
        cluster                               change-passwd                              ap650
        commit                                clear                                      ap6511
        connect                               clock                                      ap6521
        crypto                                cluster                                    ap6532
        debug                                 commit                                     ap71xx
        disable                               configure                                  association-acl-policy
        enable                                connect                                    auto-provisioning-policy
        help                                  copy                                       captive-portal
        logging                               crypto                                     clear
        mint                                  debug                                      critical-resource-policy
        no                                    delete                                     customize
        page                                  diff                                       device
        ping                                  dir                                        device-categorization
        remote-debug                          disable                                    dhcp-sever-policy
        revert                                edit                                       dns-whitelist
        service                               enable                                     event-system-policy
        show                                  erase                                      firewall-policy
INTRODUCTION         1-5


                              Table 1.1 Wireless Controller modes and commands

           User Exec Mode                Priv Exec Mode                     Global Configuration Mode
ssh                         format                                   help
telnet                      halt                                     host
terminal                    help                                     igmp-snoop-policy
time-it                     logging                                  ip
traceroute                  mint                                     mac
watch                       mkdir                                    management-policy
write                       more                                     mint-policy
clrscr                      no                                       nac-list
exit                        page                                     no
                            ping                                     password-encryption
                            pwd                                      profile
                            reload                                   radio-qos-policy
                            remote-debug                             radius-group
                            rename                                   radius-server-policy
                            revert                                   radius-user-pool-policy
                            rmdir                                    rf-domain
                            self                                     rfs4000
                            service                                  rfs6000
                            show                                     rfs7000
                            ssh                                      role-policy
                            telnet                                   self
                            terminal                                 smart-rf-policy
                            time-it                                  wips-policy
                            traceroute                               wlan
                            upgrade                                  wlan-qos-policy
                            upgrade-abort                            write
                            watch                                    clrscr
                            write                                    commit
                            clrscr                                   do
                            exit                                     end
1-6   WiNG CLI Reference Guide


                                 Table 1.1 Wireless Controller modes and commands

              User Exec Mode             Priv Exec Mode                        Global Configuration Mode
                                                                        exit
                                                                        revert
                                                                        service
                                                                        show
INTRODUCTION           1-7



1.2 Getting Context Sensitive Help
   Enter a question mark (?) at the system prompt to display a list of commands available for each mode. Obtain a list of
   arguments and keywords for any command using the CLI context-sensitive help.
   Use the following commands to obtain help specific to a command mode, command name, keyword or argument:

                            Command                                                     Description
    (prompt)# help                                              Displays a brief description of the help system
    (prompt)# abbreviated-command-entry?                        Lists commands in the current mode that begin with a
                                                                particular character string
    (prompt)# abbreviated-command-entry<Tab>                    Completes a partial command name
    (prompt)# ?                                                 Lists all commands available in the command mode
    (prompt)# command ?                                         Lists the available syntax options (arguments and keywords)
                                                                for the command
    (prompt)# command keyword ?                                 Lists the next available syntax option for the command



                     NOTE: The system prompt varies depending on which configuration mode your in.



                     NOTE: Enter Ctrl + V to use ? as a regular character and not as a character used for
                     displaying context sensitive help. This is required when the user has to enter a URL that
                     ends with a ?


                     NOTE: The escape character used through out the CLI is “”. To enter a "" use ""
                     instead.


   When using context-sensitive help, the space (or lack of a space) before the question mark (?) is significant. To obtain a
   list of commands that begin with a particular sequence, enter the characters followed by a question mark (?). Do not
   include a space. This form of help is called word help, because it completes a word.
   rfs7000-37FABE#service?
   service Service Commands
   rfs7000-37FABE#service
1-8   WiNG CLI Reference Guide


       Enter a question mark (?) (in place of a keyword or argument) to list keywords or arguments. Include a space before the
       “?”. This form of help is called command syntax help. It shows the keywords or arguments available based on the
       command/keyword and argument already entered.
       rfs7000-37FABE>service ?
         advanced-wips      Advanced WIPS service commands
         clear              Clear
         cli-tables-expand Expand the cli-table in drapdown format
         cli-tables-skin    Choose a formatting layout/skin for CLI tabular outputs
         cluster            Cluster Protocol
         locator            Enable leds flashing on the device
         pktcap             Start packet capture
         radio              Radio parameters
         show               Show running system information
         smart-rf           Smart-RF Management Commands
         traceroute         Trace route to destination
         wireless           Wireless commands
       rfs7000-37FABE>service
       It’s possible to abbreviate commands and keywords to allow a unique abbreviation. For example, “configure terminal” can
       be abbreviated as config t. Since the abbreviated command is unique, the wireless controller accepts the
       abbreviation and executes the command.
       Enter the help command (available in any command mode) to provide the following description:
       rfs7000-37FABE>help
       CLI provides advanced help feature. When you need help,
       anytime at the command line please press '?'.

       If nothing matches, the help list will be empty and you must backup
       until entering a '?' shows the available options.
       Two styles of help are provided:
       1. Full help is available when you are ready to enter a
          command argument (e.g. 'show ?') and describes each possible
          argument.
       2. Partial help is provided when an abbreviated argument is entered and you want to
       know what arguments match the input
          (e.g. 'show ve?'.)
INTRODUCTION           1-9



 1.3 Using the No Command
     Almost every command has a no form. Use no to disable a feature or function or return it to its default value. Use the
     command without the no keyword to re-enable a disabled feature.

1.3.1 Basic Conventions
     Keep the following conventions in mind while working within the wireless controller CLI:
     • Use ? at the end of a command to display available sub-modes. Type the first few characters of the sub-mode and press
       the tab key to add the sub-mode. Continue using ? until you reach the last sub-mode.
     • Pre-defined CLI commands and keywords are case-insensitive: cfg = Cfg = CFG. However (for clarity), CLI commands
       and keywords are displayed (in this guide) using mixed case. For example, apPolicy, trapHosts, channelInfo.
     • Enter commands in uppercase, lowercase, or mixed case. Only passwords are case sensitive.
1 - 10 WiNG CLI Reference Guide



   1.4 Using CLI Editing Features and Shortcuts
        A variety of shortcuts and edit features are available. The following describe these features:
        • Moving the Cursor on the Command Line
        • Completing a Partial Command Name
        • Command Output pagination
INTRODUCTION 1 - 11


1.4.1 Moving the Cursor on the Command Line
     Table 1.2 on page 1-11
     Shows the key combinations or sequences to move the command line cursor. Ctrl defines the control key, which must be
     pressed simultaneously with its associated letter key. Esc means the escape key (which must be pressed first), followed
     by its associated letter key. Keys are not case sensitive. Specific letters are used to provide an easy way of remembering
     their functions. In Table 1.2 on page 1-11, bold characters indicate the relation between a letter and its function.
                                                           Table 1.2 Keystrokes Details

               Keystrokes                  Function Summary                                 Function Details
      Left Arrow                       Back character                   Moves the cursor one character to the left
      or                                                                When entering a command that extends beyond a
      Ctrl-B                                                            single line, press the Left Arrow or Ctrl-B keys
                                                                        repeatedly to move back to the system prompt.
      Right Arrow or Ctrl-F            Forward character                Moves the cursor one character to the right
      Esc- B                           Back word                        Moves the cursor back one word
      Esc- F                           Forward word                     Moves the cursor forward one word
      Ctrl-A                           Beginning of line                Moves the cursor to the beginning of the command
                                                                        line
      Ctrl-E                           End of line                      Moves the cursor to the end of the command line
      Ctrl-D                                                            Deletes the current character
      Ctrl-U                                                            Deletes text up to cursor
      Ctrl-K                                                            Deletes from the cursor to end of the line
      Ctrl-P                                                            Obtains the prior command from memory
      Ctrl-N                                                            Obtains the next command from memory
      Esc-C                                                             Converts the letter at the cursor to uppercase
      Esc-L                                                             Converts the letter at the cursor to lowercase
      Esc-D                                                             Deletes the remainder of a word
      Ctrl-W                                                            Deletes the word up to the cursor
      Ctrl-Z                                                            Returns to the root prompt
      Ctrl-T                                                            Transposes the character to the left of the cursor with
                                                                        the character located at the cursor
      Ctrl-L                                                            Clears the screen
1 - 12 WiNG CLI Reference Guide


  1.4.2 Completing a Partial Command Name
        If you cannot remember a command name (or if you want to reduce the amount of typing you have to perform), enter the
        first few letters of a command, then press the Tab key. The command line parser completes the command if the string
        entered is unique to the command mode. If your keyboard does not have a Tab key, press Ctrl-L.
        The CLI recognizes a command once you have entered enough characters to make the command unique. If you enter “conf”
        within the privileged EXEC mode, the CLI associates the entry with the configure command, since only the configure
        command begins with conf.
        In the following example, the CLI recognizes a unique string in the privileged EXEC mode when the Tab key is pressed:
        rfs7000-37FABE# conf<Tab>
        rfs7000-37FABE# configure
        When using the command completion feature, the CLI displays the full command name. The command is not executed until
        the Return or Enter key is pressed. Modify the command if the full command was not what you intended in the
        abbreviation. If entering a set of characters (indicating more than one command), the system lists all commands beginning
        with that set of characters.
        Enter a question mark (?) to obtain a list of commands beginning with that set of characters. Do not leave a space between
        the last letter and the question mark (?).
        For example, entering U lists all commands available in the current command mode:
        rfs7000-37FABE# co?
         commit     Commit all changes made in this session
          configure Enter configuration mode
          connect    Open a console connection to a remote device
          copy       Copy from one file to another
        rfs7000-37FABE# co




                        NOTE: The characters entered before the question mark are reprinted to the screen to
                        complete the command entry.



  1.4.3 Command Output pagination
        Output often extends beyond the visible screen length. For cases where output continues beyond the screen, the output is
        paused and a
        --More--
        prompt displays at the bottom of the screen. To resume the output, press the Enter key to scroll down one line or press the
        Spacebar to display the next full screen of output.
INTRODUCTION 1 - 13


1.4.4 Creating Profiles
       Profiles are sort of a ‘template’ representation of configuration. The system has:
       • a default wireless controller profile
       • a default profile for each of the following APs:
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP7131
          • AP7161
       To modify the default profile to assign an IP address to the management port:
       rfs7000-37FABE(config)#profile rfs7000 default-rfs-7000
       rfs7000-37FABE(config-profile-default-rfs-7000)#interface me1
       rfs7000-37FABE(config-profile-default-rfs-7000-if-me1)#ip address 172.16.10.2/24
       rfs7000-37FABE(config-profile-default-rfs-7000-if-me1)#commit
       rfs7000-37FABE(config-profile-default-rfs-7000)#exit
       rfs7000-37FABE(config)#
       The following command displays default ap7131 profile:
       rfs7000-37FABE(config)#profile ap7131 default-ap7131
       rfs7000-37FABE(config-profile-default-ap7131)#show context

1.4.5 Change the default profile by creating vlan 150 and mapping to ge3 Physical interface
       Logon to the wireless controller in config mode and follow the procedure below:
       rfs7000-37FABE(config-profile-default-rfs7000)# interface vlan 150
       rfs7000-37FABE(config-profile-default-rfs7000-if-vlan150)# ip address
       192.168.150.20/24
       rfs7000-37FABE(config-profile-default-rfs7000-if-vlan150)# exit
       rfs7000-37FABE(config-profile-default-rfs7000)# interface ge 3
       rfs7000-37FABE(config-profile-default-rfs7000-if-ge3)# switchport access vlan 150
       rfs7000-37FABE(config-profile-default-rfs7000-if-ge3)# commit write
       [OK]
       rfs7000-37FABE(config-profile-default-rfs7000-if-ge3)# show interface vlan 150
       Interface vlan150 is UP
         Hardware-type: vlan, Mode: Layer 3, Address: 00-15-70-37-FA-BE
         Index: 8, Metric: 1, MTU: 1500
         IP-Address: 192.168.150.20/24
           input packets 43, bytes 12828, dropped 0, multicast packets 0
           input errors 0, length 0, overrun 0, CRC 0, frame 0, fifo 0, missed 0
           output packets 0, bytes 0, dropped 0
           output errors 0, aborted 0, carrier 0, fifo 0, heartbeat 0, window 0
           collisions 0

1.4.5.1 Viewing Configured APs
       To view previously configured APs, enter the following command:
       rfs7000-37FABE(config)#show wireless ap configured
1 - 14 WiNG CLI Reference Guide


  1.4.6 Remote Administration
        A terminal server may function in remote administration mode if either the terminal services role is not installed on the
        machine or the client used to invoke the session has enabled the admin wireless controller.
        • A terminal emulation program running on a computer connected to the serial port on the wireless controller. The serial
          port is located on the front of the wireless controller.
        • A Telnet session through a Secure Shell (SSH) over a network. The Telnet session may or may not use SSH depending
          on how the wireless wireless controller is configured. Motorola Solutions recommends using SSH for remote
          administration tasks.

 1.4.6.1 Configuring Telnet for Management Access
        Login through the serial console. Perform the following:
        1. A session generally begins in the USER EXEC mode (one of the two access levels of the EXEC mode).
        2. Access the GLOBAL CONFIG mode from the PRIV EXEC mode.
           rfs7000-37FABE> en
           rfs7000-37FABE# configure terminal
           Enter configuration commands, one per line.                       End with CNTL/Z.
        3. Go to ‘default-management-policy’ mode.
           rfs7000-37FABE(config)# management-policy ?
           rfs7000-37FABE(config)# management-policy default
           rfs7000-37FABE(config-management-policy-default)#
        4. Enter Telnet and the port number at the command prompt. The port number is optional. The default port is 23. Commit
           the changes after every command. Telnet is enabled.
           rfs7000-37FABEconfig-management-policy-default)# telnet
           rfs7000-37FABE(config-management-policy-default)# commit write
        5. Connect to the wireless wireless controller through Telnet using its configured IP address. Use the following
           credentials when logging on to the device for the first time:

                        User Name                                                  admin
                        Password                                                   motorola

        When logging into the wireless controller for the first time, you are prompted to change the password.
        To change user credentials:
        1. Enter the username, password, role and access details
           rfs7000-37FABE(config-management-policy-default)# user testuser password symbol
           role helpdesk access all
           rfs7000-37FABE(config-management-policy-default)# commit
           rfs7000-37FABE(config-management-policy-default)# show context
           management-policy default
            telnet
            http server
            ssh
            user admin password 1
           c9745a77bb8663fbe9422c0bab93087208e68c40add8edd0a3b4a985aa96a682 role superuser
           access all
            user testuser password 1
           fd6af6a0e74ede3fc4bd54519e4864b078554aa2d97a623eedefae2ede682c13 role helpdesk
           access all
           rfs7000-37FABE(config-management-policy-default)# sow con
           rfs7000-37FABE(config-management-policy-default)# sow conin
           rfs7000-37FABE(config-management-policy-default)# show context include-factory
           management-policy default
            secure-management
INTRODUCTION 1 - 15


    telnet port 23
    http server
   no https server
   no ftp
   ssh port 22
   user admin password 1
  c9745a77bb8663fbe9422c0bab93087208e68c40add8edd0a3b4a985aa96a682 role superuser
  access all
   user testuser password 1
  fd6af6a0e74ede3fc4bd54519e4864b078554aa2d97a623eedefae2ede682c13 role helpdesk
  access all
   snmp-server manager v2
   snmp-server manager v3
   no snmp-server enable traps
  rfs7000-37FABE(config-management-policy-default)#
  rfs7000-37FABE(config-management-policy-default)# user testuser password symbol
  role helpdesk access all ?
2. Logon to the Telnet console and provide the user details configured in the previous step to access the wireless
   controller.
   RFS7000 release 5.2.0.0-048B
   rfs7000-37FABE login: testuser
   Password:
   Welcome to CLI
   Starting CLI...
   rfs7000-37FABE>
1 - 16 WiNG CLI Reference Guide


 1.4.6.2 Configuring ssh
        By default, SSH is enabled from the factory settings on the wireless controller. The wireless controller requires an IP
        address and login credentials.
        To enable SSH access in the default profile, login through the serial console. Perform the following:
        1. Access the GLOBAL CONFIG mode from the PRIV EXEC mode.
           rfs7000-37FABE> en
           rfs7000-37FABE# configure
           Enter configuration commands, one per line.                       End with CNTL/Z.
           rfs7000-37FABE> en
        rfs7000-37FABE# configure
        Enter configuration commands, one per line.                       End with CNTL/Z.
        2. Go to ‘default-management-policy’ mode.
           rfs7000-37FABE(config)# management-policy default
           rfs7000-37FABE(config-management-policy-default)#
        3. Enter SSH at the command prompt.
           rfs7000-37FABE(config-management-policy-default)# ssh
        4. Log into the wireless wireless controller through SSH using appropriate credentials.
        5. Use the following credentials when logging on to the device for the first time:

                        User Name                                                admin
                        Password                                                 motorola

        When logging into the wireless controller for the first time, you are prompted to change the password.
         • To change the user credentials:
           RFS7000 release 5.2.0.0-048B
           rfs7000-37FABE login: testuser
           Password:
           Welcome to CLI
           Starting CLI...
        rfs7000-37FABE>
CHAPTER 2 USER EXEC MODE
          COMMANDS
  Logging in to the wireless controller places you within the USER EXEC command mode. Typically, a login requires a user
  name and password. You have three login attempts before the connection attempt is refused. USER EXEC commands
  (available at the user level) are a subset of the commands available at the privileged level. In general, USER EXEC
  commands allow you to connect to remote devices, perform basic tests and list system information.
  To list available USER EXEC commands, use? at the command prompt. The USER EXEC prompt consists of the device host
  name followed by an angle bracket (>).
  rfs7000-37FABE?
  User Exec commands:
    ap-upgrade     AP firmware upgrade
    change-passwd Change password
    clear          Clear
    clock          Configure software system clock
    cluster        Cluster commands
    commit         Commit all changes made in this session
    connect        Open a console connection to a remote device
    crypto         Encryption related commands
    debug          Debugging functions
    disable        Turn off privileged mode command
    enable         Turn on privileged mode command
    help           Description of the interactive help system
    logging        Modify message logging facilities
    mint           MiNT protocol
    no             Negate a command or set its defaults
    page           Toggle paging
    ping           Send ICMP echo messages
    remote-debug   Troubleshoot remote system(s)
    revert         Revert changes
    service        Service Commands
    show           Show running system information
    ssh            Open an ssh connection
    telnet         Open a telnet connection
    terminal       Set terminal line parameters
    time-it        Check how long a particular command took between request and
                   completion of response
    traceroute     Trace route to destination
    watch          Repeat the specific CLI command at a periodic interval
    write          Write running configuration to memory or terminal

    clrscr                Clears the display screen
    exit                  Exit from the CLI
  rfs7000-37FABE>
2-2   WiNG CLI Reference Guide



  2.1 User Exec Commands
       Table 2.1 summarizes User Exec Mode commands
                                                     Table 2.1 User Exec Mode Commands

               Command                                     Description                                 Reference
        ap-upgrade          Enables an automatic adopted AP firmware upgrade                       page 2-4
        change-passwd       Changes the password of a logged user                                  page 2-4
        clear               Resets the last saved command                                          page 2-10
        clock               Configures the system clock                                            page 2-13
        cluster             Accesses the cluster context                                           page 2-14
        connect             Establishes a console connection to a remote device                    page 2-15
        crypto              Enables encryption                                                     page 2-16
        disable             Turns off (disables) the privileged mode command set                   page 2-28
        enable              Turns on (enables) the privileged mode command set                     page 2-29
        logging             Modifies message logging facilities                                    page 2-31
        mint                Configures MiNT protocol                                               page 2-32
        no                  Negates a command or sets its default value                            page 2-34
        page                Toggles to the wireless controller paging function                     page 2-38
        ping                Sends ICMP echo messages to a user-specified location                  page 2-39
        ssh                 Opens an SSH connection between two network devices                    page 2-40
        telnet              Opens a Telnet session                                                 page 2-41
        terminal            Sets the length/number of lines displayed within the terminal window   page 2-42
        time-it             Verifies the time taken by a particular command between request and    page 2-43
                            response
        traceroute          Traces the route to its defined destination                            page 2-44
        watch               Repeats a specific CLI command at a periodic interval                  page 2-45
        clrscr              Clears the display screen                                              page 5-3
        commit              Commits (saves) changes made in the current session                    page 5-4
        exit                Ends the current mode and moves to the previous mode                   page 5-6
        help                Displays the interactive help system                                   page 5-7
        revert              Reverts changes to their last saved configuration                      page 5-13
        service             Invokes service commands to troubleshoot or debug (config-if)          page 5-14
                            instance configurations
USER EXEC MODE COMMANDS        2-3


                                     Table 2.1 User Exec Mode Commands

    Command                               Description                          Reference
show          Displays running system information                          page 6-4
write         Writes information to memory or terminal                     page 5-42
2-4   WiNG CLI Reference Guide


 2.1.1 ap-upgrade
         User Exec Commands
       Enables an automatic firmware upgrade on an adopted AP or a set of APs. APs of the same type can be upgraded together.
       Once APs have been upgraded, they can be forced to reboot. This command also loads the firmware on to the wireless
       controller.
       The AP upgrade command also upgrades APs in a specified RF Domain.
       Supported in the following platforms:
          • AP300
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP71XX
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       ap-upgrade [<MAC/HOSTNAME>|all|ap621|ap650|ap6511|ap6521|ap6532|
          ap71xx|cancel-upgrade|load-image|rf-domain]

       ap-upgrade [<MAC/HOSTNAME>|all] {no-reboot|reboot-time <TIME>|
          upgrade-time <TIME> {no-reboot|reboot-time <TIME>}}

       ap-upgrade [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] all
          {no-reboot|reboot-time <TIME>|upgrade-time <TIME> {no-reboot|
          reboot-time <TIME>}}]

       ap-upgrade cancel-upgrade           [<MAC/HOSTNAME>|all|ap621|ap650|ap6511|
         ap6521|ap6532|71xx|on]
       ap-upgrade cancel-upgrade           [<MAC/HOSTNAME>|all]
       ap-upgrade cancel-upgrade           [ap621|ap650|ap6511|ap6521|ap6532|71xx] all
       ap-upgrade cancel-upgrade           on rf-domain [<RF-DOMAIN-NAME>|all]

       ap-upgrade load-image [ap621|ap650|ap6511|ap6521|ap6532|ap71xx]
          <IMAGE-URL>

       ap-upgrade rf-domain [<RF-DOMAIN-NAME>|all] [all|ap621|ap650|ap6511|
          ap6521|ap6532|ap71xx] {no-reboot|no-via-rf-domain|reboot-time <TIME>|
          upgrade-time <TIME> {no-reboot|reboot-time <TIME>}}
       ap-upgrade rf-domain [<RF-DOMAIN-NAME>|all] [all|ap621|ap650|ap6511|
          ap621|ap6532|ap71xx] {no-via-rf-domain} {no-reboot|reboot-time <TIME>|
          upgrade-time <TIME>}
USER EXEC MODE COMMANDS                     2-5


Parameters
• ap-upgrade [<MAC/HOSTNAME>|all] {no-reboot|reboot-time <TIME>|upgrade-time <TIME>
{no-reboot|reboot-time <TIME>}}

 [<MAC/HOSTNAME>|all]          Upgrades firmware on a specified AP or all APs adopted by the wireless controller
                               • <MAC/HOSTNAME> – Specify the MAC address or hostname of the AP.
                               • all – Upgrades all APs adopted by the wireless controller
 no-reboot                     Optional. Disables automatic reboot after a successful upgrade (the wireless
                               controller must be manually restarted)
 reboot-time <TIME>            Optional. Schedules an automatic reboot after a successful upgrade
                               • <TIME> – Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format.
 upgrade-time <TIME>           Optional. Schedules an automatic firmware upgrade
 {no-reboot|reboot-time        • <TIME> – Specify the upgrade time in the MM/DD/YYYY-HH:MM or HH:MM
 <TIME>}                         format. After a scheduled upgrade, these actions can be performed.
                                 • no-reboot – Disables automatic reboot after a successful upgrade (the wireless
                                 controller must be manually restarted)
                                 • reboot-time <TIME> – Optional. Schedules an automatic reboot after a success-
                                 ful upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM
                                 format.
• ap-upgrade [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] all {no-reboot|reboot-time
<TIME>|upgrade-time <TIME> {no-reboot|reboot-time <TIME>}}

 [ap621|ap650|ap6511|ap6521|   Upgrades firmware on all adopted APs
 ap6532|ap71xx] all            • AP621 all – Upgrades firmware on all AP621s
                               • AP650 all – Upgrades firmware on all AP650s
                               • AP6511 all – Upgrades firmware on all AP6511s
                               • AP6521 all – Upgrades firmware on all AP6521s
                               • AP6532 all – Upgrades firmware on all AP6532s
                               • AP71XX all – Upgrades firmware on all AP71XXs
                               After selecting the AP type, you can schedule an automatic upgrade and/or an
                               automatic reboot.
 no-reboot                     Optional. Disables automatic reboot after a successful upgrade (the wireless controller
                               must be manually restarted)
 reboot-time <TIME>            Optional. Schedules an automatic reboot after a successful upgrade
                               • <TIME> – Optional. Specify the reboot time in the MM/DD/YYYY-HH:MM or
                                 HH:MM format.
 upgrade-time <TIME>           Optional. Schedules firmware upgrade on an AP adopted by the wireless controller
 {no-reboot|reboot-time        • <TIME> – Specify the upgrade time in the MM/DD/YYYY-HH:MM or HH:MM
 <TIME>}                         format. After a scheduled upgrade, these actions can be performed.
                                 • no-reboot – Optional. Disables automatic reboot after a successful upgrade (the
                                 wireless controller must be manually restarted)
                                 • reboot-time <TIME> – Optional. Schedules an automatic reboot after a
                                 successful upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or
                                 HH:MM format.
2-6   WiNG CLI Reference Guide


       • ap-upgrade cancel-upgrade [<MAC/HOSTNAME>|all]

        cancel-upgrade [               Cancels scheduled firmware upgrade on a specified AP or all APs adopted by the
        <MAC/HOSTNAME>|all]            wireless controller
                                       • <MAC/HOSTNAME> – Specify the MAC address or hostname of the AP.
                                       • all – Cancels scheduled upgrade on all APs

       • ap-upgrade cancel-upgrade [ap621|ap650|ap651|ap6521|ap6532|ap71xx] all

        cancel-upgrade                  Cancels scheduled firmware upgrade on all adopted APs
        [ap621|ap650|ap6511|ap6521|     • AP621 all – Cancels scheduled upgrade on all AP621s
        ap6532|ap71xx] all
                                        • AP650 all – Cancels scheduled upgrade on all AP650s
                                        • AP6511 all – Cancels scheduled upgrade on all AP6511s
                                        • AP6521 all – Cancels scheduled upgrade on all AP6521s
                                        • AP6532 all – Cancels scheduled upgrade on all AP6532s
                                        • AP71XX all – Cancels scheduled upgrade on all AP71XXs

       • ap-upgrade cancel-upgrade on rf-domain [<DOMAIN-NAME>|all]

        cancel-upgrade on rf-domain     Cancels scheduled firmware upgrade on a specified RF Domain or all RF Domains
        [<RF-DOMAIN-NAME>|all]          • <RF-DOMAIN-NAME> – Specify the RF Domain name.
                                        • all – Cancels scheduled upgrades on all RF Domains

       • ap-upgrade load-image [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] <IMAGE-URL>

        load-image                      Loads AP firmware images on the wireless controller. Select the AP type and provide
        [ap621|ap650|6511|6521|6532|    the location of the AP firmware image.
        ap71xx]                         • AP621 <IMAGE-URL> – Loads AP621 firmware image
                                        • AP650 <IMAGE-URL> – Loads AP650 firmware image
                                        • AP6511 <IMAGE-URL> – Loads AP6511 firmware image
                                        • AP6521 <IMAGE-URL> – Loads AP6521 firmware image
                                        • AP6532 <IMAGE-URL> – Loads AP6532 firmware image
                                        • AP71XX <IMAGE-URL> – Loads AP71XX firmware image
        <IMAGE-URL>                     Specify the AP firmware image location in the following format:
                                            ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                            sftp://<user>:<passwd>@<hostname|IP>[:port]>/path/file
                                            http://<hostname|IP>[:port]/path/file
                                            cf:/path/file
                                            usb1:/path/file
                                            usb2:/path/file
USER EXEC MODE COMMANDS                   2-7


• ap-upgrade rf-domain [<RF-DOMAIN-NAME>|all] [all|ap621|ap650|ap6511|
ap6521|ap6532|ap71xx] {no-reboot|no-via-rf-domain|reboot-time <TIME>|
upgrade-time <TIME>}

rf-domain                       Upgrades AP firmware on devices in a specified RF Domain or all RF Domains
[<RF-DOMAIN-NAME>|all]          • <RF-DOMAIN-NAME> – Upgrades firmware in a specified RF Domain. Specify the
                                  RF Domain name.
                                • all – Upgrades firmware on all RF Domains
[all|ap621|ap650|ap6511|ap652   After specifying the RF Domain, select the AP type.
1|ap6532|ap71xx]                • all – Upgrades firmware on all APs
                                • AP621 – Upgrades firmware on all AP621s
                                • AP650 – Upgrades firmware on all AP650s
                                • AP6511 – Upgrades firmware on all AP6511s
                                • AP6521 – Upgrades firmware on all AP6521s
                                • AP6532 – Upgrades firmware on all AP6532s
                                • AP71XX – Upgrades firmware on all AP71XXs
{no-reboot|no-via-rf-domain     The following actions can be performed:
|reboot-time <TIME>|            • no-reboot – Optional. Disables automatic reboot after a successful upgrade (the
upgrade-time <TIME>}              wireless controller must be manually restarted)
                                • no-via-rf-domain – Optional. Performs AP firmware upgrade from the adopted
                                  device
                                • reboot-time <TIME> – Optional. Schedules an automatic reboot, after a successful
                                  upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format.
                                • upgrade-time <TIME> – Optional. Schedules an automatic firmware upgrade.
                                  Specify the upgrade time in the MM/DD/YYYY-HH:MM or HH:MM format.
{no-reboot|reboot-time <TIME>} The following are common to the [no-via-rf-domain upgrade <TIME>] and upgrade
                               parameters:
                               • no-reboot – Optional. Disables automatic reboot after a successful upgrade of
                                 firmware (the wireless controller must be manually restarted)
                               • reboot-time <TIME> – Optional. Schedules an automatic reboot after a successful
                                 upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format.
2-8   WiNG CLI Reference Guide


       Examples
       rfs7000-37FABE>ap-upgrade ap621 all
       --------------------------------------------------------------------------
                CONTROLLER           STATUS                    MESSAGE
       --------------------------------------------------------------------------
         00-15-70-37-FA-BE           Success         Queued 0 APs to upgrade
       --------------------------------------------------------------------------
       rfs7000-37FABE>
       rfs7000-37FABE>ap-upgrade all
       rfs7000-37FABE>
       rfs7000-37FABE>ap-upgrade default/rfs7000-37FABE no-reboot
       --------------------------------------------------------------------------
       CONTROLLER                 STATUS                   MESSAGE
       --------------------------------------------------------------------------
       00-23-68-88-0D-A7          Success          Queued 0 APs to upgrade
       --------------------------------------------------------------------------
       rfs7000-37FABE>

       rfs7000-37FABE>ap-upgrade rfs7000-37FABE reboot-time 06/01/2011-12:01
       --------------------------------------------------------------------------
       CONTROLLER                   STATUS                   MESSAGE
       --------------------------------------------------------------------------
         00-15-70-37-FA-BE          Success          Queued 0 APs to upgrade
       --------------------------------------------------------------------------
       rfs7000-37FABE>
USER EXEC MODE COMMANDS                    2-9


2.1.2 change-passwd
      User Exec Mode Commands
    Changes the password of a logged user. When this command is executed without any parameters, the password can be
    changed interactively.
    Supported in the following platforms:
       • AP300
       • AP621
       • AP650
       • AP6511
       • AP6521
       • AP6532
       • AP71XX
       • RFS4000
       • RFS6000
       • RFS7000
    Syntax
    change-passwd {<OLD-PASSWORD> <NEW-PASSWORD>}
    Parameters
    • change passwd {<OLD-PASSWORD> <NEW-PASSWORD>}

     <OLD-PASSWORD>                 Optional. The password can also be changed interactively. To do so, press [Enter] after
     <NEW-PASSWORD>                 the command.
                                    • <OLD-PASSWORD> – Specify the password that needs to be changed
                                    • <NEW-PASSWORD> – Specify the password to change to
    Usage Guidelines
    A password must be from 1 - 64 characters.
    Examples
    rfs7000-37FABE#change-passwd
    Enter old password:
    Enter new password:
    Password for user 'admin' changed successfully
    Please write this password change to memory(write memory) to be persistent.
    rfs7000-37FABE#write memory
    OK
    rfs7000-37FABE#
2 - 10 WiNG CLI Reference Guide


  2.1.3 clear
          User Exec Commands
        Clears parameters, cache entries, table entries, and other similar entries. The clear command is available for specific
        commands only. The information cleared using this command varies depending on the mode where the clear command is
        executed.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000

                       NOTE: Refer to the interface details below when using clear
                       • ge <index> – RFS4000 supports 5GEs and RFS6000 supports 8 GEs
                       • me1 – Available in both RFS7000 and RFS6000-up1- Uplink interface on RFS4000


        Syntax
        clear [arp-cache|cdp|crypto|event-history|ip|lldp|spanning-tree]
        clear arp-cache {on <DEVICE-NAME>}

        clear [cdp|lldp] neighbors {on <DEVICE-NAME>}

        clear crypto [ipsec|isakmp] sa [<IP>|all] {on <DEVICE-NAME>}

        clear event-history

        clear ip dhcp bindings [<IP>|all] {on <DEVICE-NAME>}

        clear    spanning-tree detected-protocols {interface|on}
        clear    spanning-tree detected-protocols {on <DEVICE-NAME>}
        clear    spanning-tree detected-protocols {interface [<INTERFACE>|
           ge    <1-4>|me1|port-channel <1-2>|vlan <1-4094>]} {on <DEVICE-NAME>}}
        Parameters
        • clear arp-cache {on <DEVICE-NAME>}

         arp-cache                       Clears Address Resolution Protocol (ARP) cache entries on an AP or wireless controller.
                                         This protocol matches the layer 3 IP addresses to the layer 2 MAC addresses.
         on <DEVICE-NAME>                Optional. Clears ARP cache entries on a specified AP or wireless controller
                                         • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
USER EXEC MODE COMMANDS 2 - 11


• clear [cdp|lldp] neighbors {on <DEVICE-NAME>}

cdp                     Clears Cisco Discovery Protocol (CDP) table entries
lldp                    Clears Link Layer Discovery Protocol (LLDP) table entries
neighbors               Clears CDP or LLDP neighbor table entries based on the option selected in the preceding
                        step
on <DEVICE-NAME>        Optional. Clears CDP or LLDP neighbor table entries on a specified AP or wireless
                        controller
                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• clear crypto [ipsec|isakmp] sa [<IP>|all] {on <DEVICE_NAME>}

crypto                  Clears encryption module database
ipsec sa                Clears Internet Protocol Security (IPSec) database security associations (SAs)
isakmp sa               Clears Internet Security Association and Key Management Protocol (ISAKMP) database
                        SAs
[<IP>|all]              The following are common to the IPSec and ISAKMP parameters:
                        • <IP> – Clears IPSec or ISAKMP SAs for a certain peer
                        • all – Clears IPSec or ISAKMP SAs for all peers
on <DEVICE-NAME>        Optional. Clears IPSec or ISAKMP SA entries on a specified AP or wireless controller
                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• clear event-history

event-history           Clears event history cache entries
• clear ip dhcp bindings [<IP>|all]

ip                      Clears a DHCP server’s IP address bindings entries
dhcp bindings           Clears Dynamic Host Configuration Protocol (DHCP) connections and server bindings
                        • bindings – Clears DHCP address binding entries
<IP>                    Clears address binding entries on a specified DHCP server. Specify the DHCP server’s IP
                        address.
all                     Clears address binding entries on all DHCP servers
• clear spanning-tree detected-protocols {on <DEVICE-NAME>}

spanning-tree           Clears spanning tree protocols on an interface, and also restarts protocol migration
detected-protocols      Restarts protocol migration
on <DEVICE-NAME>        Optional. Clears spanning tree protocols on a specified AP or wireless controller
                        • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller.
2 - 12 WiNG CLI Reference Guide


        • clear spanning-tree detected-protocols {interface [<INTERFACE>|ge <1-4>|
        me1|port-channel <1-2>|vlan <1-4094>]} {on <DEVICE-NAME>}

         spanning-tree             Clears spanning tree protocols on an interface, and also restarts protocol migration
         detected-protocols        Restarts protocol migration
         interface [<INTERFACE>|   Optional. Clears spanning tree protocols on different interfaces
         ge <1-4>|me1|             • <INTERFACE> – Clears information on a specified interface. Specify the interface
         port-channel <1-2>|         name.
         vlan <1-4094>]
                                   • ge <1-4> – Clears GigabitEthernet interface information. Select the GigabitEthernet
                                     interface index from 1 - 4.
                                   • me1 – Clears FastEthernet interface status (up1 - Clears the uplink interface)
                                   • port-channel <1-2> – Clears port channel interface information. Select the port
                                     channel index from 1 - 2.
                                   • vlan <1-4094> – Clears VLAN interface information. Select a Switch Virtual Interface
                                     (SVI) VLAN ID from 1- 4094.
         on <DEVICE-NAME>          Optional. Clears spanning tree protocol entries on a selected AP or wireless controller
                                   • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE>clear crypto isakmp sa 111.222.333.01 on rfs7000-37FABE
        rfs7000-37FABE>

        rfs7000-37FABE>clear event-history
        rfs7000-37FABE>

        rfs7000-37FABE>clear spanning-tree detected-protocols interface port-channel 1 on
        rfs7000-37FABE
        rfs7000-37FABE>

        rfs7000-37FABE>clear ip dhcp bindings 172.16.10.9 on rfs7000-37FABE
        rfs7000-37FABE>

        rfs7000-37FABE>clear cdp neighbors on rfs7000-37FABE
        rfs7000-37FABE>
        rfs7000-37FABE>clear spanning-tree detected-protocols interface ge 1
        rfs7000-37FABE>

        rfs7000-37FABE>clear lldp neighbors
        rfs7000-37FABE>
USER EXEC MODE COMMANDS 2 - 13


2.1.4 clock
        User Exec Commands
     Sets a device’s system clock
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     clock set <HH:MM:SS> <1-31> <MONTH> <1993-2035> {on <DEVICE-NAME>}
     Parameters
     • clock set <HH:MM:SS> <1-31> <MONTH> <1993-2035> {on <DEVICE-NAME>}

      clock set                     Sets a device’s software system clock
      <HH:MM:SS>                    Sets the current time (in military format hours, minutes and seconds)
      <1-31>                        Sets the numerical day of the month
      <MONTH>                       Sets the month of the year (Jan to Dec)
      <1993-2035>                   Sets a valid four digit year from 1993 - 2035
      on <DEVICE-NAME>              Optional. Sets the clock on a specified device
                                    • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
     Examples
     rfs7000-37FABE>clock set 18:16:30 7 JUL 2011 on rfs7000-37FABE
     clock set 18:16:30 7 JUL 2011 on rfs7000-37FABE
     rfs7000-37FABE>
2 - 14 WiNG CLI Reference Guide


  2.1.5 cluster
           User Exec Commands
        Initiates cluster context. The cluster context provides centralized management to configure all cluster members from any
        one member.
        Commands executed under this context are executed on all members of the cluster.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        cluster start-selection
        Parameters
        • cluster start-selection

         start-selection                 Starts a new cluster master election
        Examples
        rfs7000-37FABE>cluster start-election
        rfs7000-37FABE>
USER EXEC MODE COMMANDS 2 - 15


2.1.6 connect
       User Exec Commands
     Begins a console connection to a remote device using the remote device’s MiNT ID or name
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     connect [mint-id <MINT-ID>|<REMOTE-DEVICE-NAME>]
     Parameters
     • connect [mint-id <MINT-ID>|<REMOTE-DEVICE-NAME>]

      mint-id <MINT-ID>              Connects to the remote system using the MiNT ID
                                     • <MINT-ID> – Specify the remote device’s MiNT ID.
      <REMOTE-DEVICE-NAME>           Connects to the remote system using its name
                                     • <REMOTE-DEVICE-NAME> – Specify the remote device’s name.
     Examples
     rfs7000-37FABE>show mint lsp-db
     2 LSPs in LSP-db of 01.42.14.79:
     LSP 01.42.14.79 at level 1, hostname "rfs7000-37FABE", 1 adjacencies, seqnum 5069
     LSP 01.44.54.C0 at level 1, hostname "ap6500-4454C0", 1 adjacencies, seqnum 5265

     rfs7000-37FABE>connect mint-id 01.44.54.C0

     Entering character mode
     Escape character is '^]'.

     AP650 release 5.2.2.0-033B
     ap650-4454C0 login:

     rfs7000-37FABE>show mint lsp-db
     1 LSPs in LSP-db of 70.37.FA.BE:
     LSP 70.37.FA.BE at level 1, hostname "rfs7000-37FABE", 0 adjacencies, seqnum 65562
     rfs7000-37FABE>
2 - 16 WiNG CLI Reference Guide


  2.1.7 crypto
          User Exec Mode Commands
        Enables RSA Keypair management. Use this command to generate, delete, export, or import an RSA Keypair. It encrypts
        the RSA Keypair before an export operation. This command also enables Public Key Infrastructure (PKI) management.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        crypto [key|pki]
        crypto key [export|generate|import|zeroise]

        crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL>
           {background|on|passphrase}
        crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background}
          {on <DEVICE-NAME>}
        crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {passphrase
           <KEY-PASSPHRASE>} {background} {on <DEVICE-NAME>}
        crypto key generate rsa <RSA-KEYPAIR-NAME> <1024-2048>{on <DEVICE-NAME>}

        crypto key import rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL>
           {background|on|passphrase}
        crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL>
           {background} {on <DEVICE-NAME>}
        crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL> passphrase
           <KEY-PASSPHRASE> {background} {on <DEVICE-NAME>}
        crypto key zeroise rsa <RSA-KEYPAIR-NAME> {force} {on <DEVICE-NAME>}


        crypto pki [authenticate|export|generate|import|zeroise]

        crypto pki authenticate <TRUST-POINT> <URL> {background{on <DEVICE-NAME>}|
           on <DEVICE-NAME>}

        crypto pki export [request|trustpoint]

        crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME>
           autogen-subject-name [<EXPORT-TO-URL>, email <SEND-TO-EMAIL>, fqdn <FQDN>,
           ip-address <IP>]
        crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME>
           autogen-subject-name <EXPORT-TO-URL> {background {on <DEVICE-NAME>}|
           on <DEVICE-NAME>}
        crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-
           NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION>
           <ORGANIZATION-UNIT> [<EXPORT-TO-URL>, email <SEND-TO-EMAIL>, fqdn <FQDN>,
           ip-address <IP>]
USER EXEC MODE COMMANDS 2 - 17



crypto pki export trustpoint <TRUSTPOINT-NAME> <EXPORT-TO-URL> {background
  {on <DEVICE-NAME>}|on <DEVICE-NAME>|passphrase <KEY-PHRASE> {background
  {on <DEVICE-NAME>}|on <DEVICE-NAME>}}

crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|
  use-rsa-key] <RSA-KEYPAIR-NAME> [autogen-subject-name|subject-name]

crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|
  use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name {email <SEND-TO-EMAIL>,
  fqdn <FQDN>, ip-address <IP>, on <DEVICE-NAME>}
crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|
  use-rsa-key] <WORD> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY>
  <ORGANIZATION> <ORGANIZATION-UNIT> {email <SEND-TO-EMAIL>, fqdn <FQDN>,
  ip-address <IP>, on <DEVICE-NAME>}

crypto pki import [certificate|crl|trustpoint]

crypto pki import [certificate|crl] <TRUSTPOINT-NAME> <IMPORT-FROM-URL>
  {background {on <DEVICE-NAME>}|on <DEVICE-NAME>}]

crypto pki import trustpoint <TRUSTPOINT-NAME> <IMPORT-FROM-URL>
  {background {on <DEVICE-NAME>}|on <DEVICE-NAME>|passphrase <word>
  {background {on <DEVICE-NAME>}|on <DEVICE-NAME>}

crypto pki zeroise trustpoint <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}|
  on <DEVICE-NAME>}
Parameters
• crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {on <DEVICE-NAME>}

 key                  Enables RSA Keypair management. Use this command to export, import, generate, or
                      delete a RSA key.
 export rsa           Exports a RSA Keypair to a specified destination
 <RSA-KEYPAIR-NAME>   • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
 <EXPORT-TO-URL>      Specify the RSA Keypair destination address in the following format:
 {on <DEVICE-NAME>}       tftp://<hostname|IP>[:port]/path/file
                          ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                          sftp://<user>@<hostname|IP>[:port]>/path/file
                          http://<hostname|IP>[:port]/path/file
                          cf:/path/file
                          usb1:/path/file
                          usb2:/path/file
                      • on <DEVICE-NAME> – Optional. Performs the export operation on a specified device
                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background}
{on <DEVICE-NAME>}

 key                  Enables RSA Keypair management. Use this command to export, import, generate, or
                      delete a RSA key.
2 - 18 WiNG CLI Reference Guide



         export rsa               Exports a RSA Keypair to a specified destination
         <RSA-KEYPAIR-NAME>       • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
         <EXPORT-TO-URL>          Specify the RSA Keypair destination address in the following format:
         {background}                 tftp://<hostname|IP>[:port]/path/file
         {on <DEVICE-NAME>}
                                      ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                      sftp://<user>@<hostname|IP>[:port]>/path/file
                                      http://<hostname|IP>[:port]/path/file
                                      cf:/path/file
                                      usb1:/path/file
                                      usb2:/path/file
                                  • background – Optional. Performs the export operation in the background
                                    • on <DEVICE-NAME> – Optional. Performs the export operation on a specific device
                                       • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        • crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {passphrase <KEY-
        PASSPHRASE> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>}

         key                      Enables RSA Keypair management. Use this command to export, import, generate, or
                                  delete a RSA key.
         export rsa               Exports a RSA Keypair to a specified destination
                                  • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
         <EXPORT-TO-URL>          Specify the RSA Keypair destination address in the following format:
         {passphrase}                 tftp://<hostname|IP>[:port]/path/file
         <KEY-PASSPHRASE>
                                      ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                      sftp://<user>@<hostname|IP>[:port]>/path/file
                                      http://<hostname|IP>[:port]/path/file
                                      cf:/path/file
                                      usb1:/path/file
                                      usb2:/path/file
                                  • passphrase – Optional. Encrypts RSA Keypair before exporting it
                                    • <KEY-PASSPHRASE> – Specify a passphrase to encrypt the RSA Keypair.
         on <DEVICE-NAME>         Optional. Performs the export operation on a specified device
                                  • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • crypto key generate rsa <RSA-KEYPAIR-NAME> <1024-2048> {on <DEVICE-NAME>}

         key                      Enables RSA Keypair management. Use this command to export, import, generate, or
                                  delete a RSA key.
         generate rsa             Generates a new RSA Keypair
         <RSA-KEYPAIR-NAME>       • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
         <1024-2048>                • <1024-2048> – Sets the size of the RSA key in bits from 1024 - 2048
         on <DEVICE-NAME>         Optional. Generates the new RSA Keypair on a specified device
                                  • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
USER EXEC MODE COMMANDS 2 - 19


• crypto key import rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {on <DEVICE-NAME>}

key                   Enables RSA Keypair management. Use this command to export, import, generate, or
                      delete a RSA key.
import rsa            Imports a RSA Keypair from a specified source
<RSA-KEYPAIR-NAME>    • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
<IMPORT-TO-URL>       Specify the RSA Keypair source address in the following format:
{on <DEVICE-NAME>}        tftp://<hostname|IP>[:port]/path/file
                          ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                          sftp://<user>@<hostname|IP>[:port]>/path/file
                          http://<hostname|IP>[:port]/path/file
                          cf:/path/file
                          usb1:/path/file
                          usb2:/path/file
                      • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device
                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-TO-URL> {background}
{on <DEVICE-NAME>}

key                   Enables RSA Keypair management. Use this command to export, import, generate, or
                      delete a RSA key.
import rsa            Imports a RSA Keypair from a specified source
<RSA-KEYPAIR-NAME>    • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
<IMPORT-TO-URL>       Specify the RSA Keypair source address in the following format:
{background}              tftp://<hostname|IP>[:port]/path/file
{on <DEVICE-NAME>}
                          ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                          sftp://<user>@<hostname|IP>[:port]>/path/file
                          http://<hostname|IP>[:port]/path/file
                          cf:/path/file
                          usb1:/path/file
                          usb2:/path/file
                      • background – Optional. Performs the import operation in the background
                        • on <DEVICE-NAME> – Optional. Performs the import operation on a specified de-
                        vice
                            • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
• crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-TO-URL>
{passphrase <KEY-PASSPHRASE>} {background {on <DEVICE-NAME>}|on <DEVICE-NAME>}

key                   Enables RSA Keypair management. Use this command to export, import, generate, or
                      delete a RSA key.
import rsa            Decrypts and imports a RSA Keypair from a specified source
<RSA-KEYPAIR-NAME>    • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
2 - 20 WiNG CLI Reference Guide



         <IMPORT-TO-URL>            Specify the RSA Keypair source address in the following format:
         {passphrase}                   tftp://<hostname|IP>[:port]/path/file
         <KEY-PASSPHRASE>
                                        ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                        sftp://<user>@<hostname|IP>[:port]>/path/file
                                        http://<hostname|IP>[:port]/path/file
                                        cf:/path/file
                                        usb1:/path/file
                                        usb2:/path/file
                                    • passphrase – Optional. Decrypts the RSA Keypair before importing it
                                      • <KEY-PASSPHRASE> – Specify the passphrase to decrypt the RSA Keypair.
         on <DEVICE-NAME>           Optional. Performs the import operation on a specified device
                                    • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • crypto key zeroise <RSA-KEYPAIR-NAME> {force} {on <DEVICE-NAME>}

         key                        Enables RSA Keypair management. Use this command to export, import, generate, or
                                    delete a RSA key.
         zeroise rsa                Deletes a specified RSA Keypair
         <RSA-KEYPAIR-NAME>         • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
         force {on <DEVICE-NAME>}   Optional. Forces deletion of all certificates associated with the RSA Keypair
                                    • on <DEVICE-NAME> – Optional. Forces deletion of all certificates associated with
                                      the RSA Keypair on a specified device
                                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • crypto pki authenticate <TRUSTPOINT-NAME> <URL> {background {on <DEVICE-NAME>}|
        on <DEVICE-NAME>}

         pki                        Enables Private Key Infrastructure (PKI) management. Use this command to
                                    authenticate, export, generate, or delete a trustpoint and its associated Certificate
                                    Authority (CA) certificates.
         authenticate               Authenticates a CA certificate
         <TRUSTPOINT-NAME>          • <TRUSTPOINT-NAME> – Specify the trustpoint name.
         <URL>                      Specify the CA certificate location in the following format:
                                        tftp://<hostname|IP>[:port]/path/file
                                        ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                        sftp://<user>@<hostname|IP>[:port]>/path/file
                                        http://<hostname|IP>[:port]/path/file
                                        cf:/path/file
                                        usb1:/path/file
                                        usb2:/path/file
USER EXEC MODE COMMANDS 2 - 21



background                 Optional. Performs authentication in the background
{on <DEVICE-NAME>}         • on <DEVICE-NAME> – Optional. Performs authentication on a specified device
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
on <DEVICE-NAME>           Optional. Performs authentication on a specified device
                           • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• crypto pki request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME>
autogen-subject-name [<EXPORT-TO-URL>|email <SEND-TO-EMAIL>|fqdn <FQDN>|
ip-address <IP>]

pki                        Enables PKI management. Use this command to authenticate, export, generate, or
                           delete a trustpoint and its associated CA certificates.
request                    Sends a Certificate Signing Request (CSR) to the CA for digital identity certificate. The
                           CSR contains the applicant’s details and the RSA Keypair’s public key.
[generate-rsa-key|         Generates a new RSA Keypair or uses an existing RSA Keypair
use-rsa-key]               • generate-rsa-key – Generates a new RSA Keypair for digital authentication
<RSA-KEYPAIR-NAME>
                           • use-rsa-key – Uses an existing RSA Keypair for digital authentication
                             • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it.
                             If an existing RSA Keypair, specify its name.
autogen-subject-name       Auto generates the subject name from configuration parameters. The subject name
                           helps to identify the certificate.
<EXPORT-TO-URL>            Specify the CSR location in the following format:
{background {on <DEVICE-      tftp://<hostname|IP>[:port]/path/file
NAME}|
                              ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
on <DEVICE-NAME>}
                              sftp://<user>@<hostname|IP>[:port]>/path/file
                              http://<hostname|IP>[:port]/path/file
                              cf:/path/file
                              usb1:/path/file
                           • background – Optional. Performs the export operation in the background
                             • on <DEVICE-NAME> – Optional. Performs the export operation on a specified
                             device
                                • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
email <SEND-TO-EMAIL>      Exports CSR to a specified e-mail address
                           • <SEND-TO-EMAIL> – Specify the e-mail address of the CA.
fqdn <FQDN>                Exports CSR to a specified Fully Qualified Domain Name (FQDN)
                           • <FQDN> – Specify the FQDN of the CA.
ip address <IP>            Exports CSR to a specified device or system
                           • <IP> – Specify the IP address of the CA.
2 - 22 WiNG CLI Reference Guide


        • crypto pki request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME>
        subject-name <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT>
        [<EXPORT-TO-URL>, email <SEND-TO-EMAIL>, fqdn <FQDN>, ip-address <IP>

         pki                        Enables PKI management. Use this command to authenticate, export, generate, or
                                    delete a trustpoint and its associated CA certificates.
         request                    Sends CSR to the CA for a digital identity certificate.The CSR contains the applicant’s
                                    details and the RSA Keypair’s public key.
         [generate-rsa-key|         Generates a new RSA Keypair or uses an existing RSA Keypair
         use-rsa-key]               • generate-rsa-key – Generates a new RSA Keypair for digital authentication
         <RSA-KEYPAIR-NAME>
                                    • use-rsa-key – Uses an existing RSA Keypair for digital authentication
                                      • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it.
                                      If using an existing RSA Keypair, specify its name.
         subject-name               Specify a subject name to identify the certificate.
         <COMMON-NAME>              • <COMMON-NAME> – Specify the common name used with the CA certificate. The
                                      name should enable you to identify the certificate easily.
         <COUNTRY>                  Sets the deployment country name (2 character ISO code)
         <STATE>                    Sets the state name (2 to 64 characters)
         <CITY>                     Sets the city name (2 to 64 characters)
         <ORGANIZATION>             Sets the organization name (2 to 64 characters)
         <ORGANIZATION-UNIT>        Sets the organization unit (2 to 64 characters)
         <EXPORT-TO-URL>            Specify the CSR location in the following format:
         {background {on <DEVICE-       tftp://<hostname|IP>[:port]/path/file
         NAME}|on <DEVICE-NAME>}
                                        ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                        sftp://<user>@<hostname|IP>[:port]>/path/file
                                        http://<hostname|IP>[:port]/path/file
                                        cf:/path/file
                                        usb1:/path/file
                                    • background – Optional. Performs the export operation in the background
                                      • on <DEVICE-NAME> – Optional. Performs the export operation on a specific
                                      device.
                                         • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         email <SEND-TO-EMAIL>      Exports CSR to a specified e-mail address
                                    • <SEND-TO-EMAIL> – Specify the e-mail address of the CA.
         fqdn <FQDN>                Exports CSR to a specified FQDN
                                    • Specify the FQDN of the CA.
         ip address <IP>            Exports CSR to a specified device or system
                                    • Specify the IP address of the CA.
USER EXEC MODE COMMANDS 2 - 23


• crypto pki trustpoint <TRUSTPOINT-NAME> <EXPORT-TO-URL> {background {on <DEVICE-
NAME>}|on <DEVICE-NAME>|passphrase <KEY-PASSPHRASE> background {on <DEVICE-NAME>}|
on <DEVICE-NAME>}}

pki                        Enables PKI management. Use this command to authenticate, export, generate, or
                           delete a trustpoint and its associated CA certificates.
trustpoint                 Exports a trustpoint CA certificate, Certificate Revocation List (CRL), server certificate,
<TRUSTPOINT-NAME>          and private key
                           • <TRUSTPOINT-NAME> – Specify the trustpoint name.
<EXPORT-TO-URL>            Specify the destination address in the following format:
                              tftp://<hostname|IP>[:port]/path/file
                              ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                              sftp://<user>@<hostname|IP>[:port]>/path/file
                              http://<hostname|IP>[:port]/path/file
                              cf:/path/file
                              usb1:/path/file usb2:/path/file
background                 Optional. Performs the export operation in the background
{on <DEVICE-NAME>}         • on <DEVICE-NAME> – Optional. Performs the export operation on a specified
                             device
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
on <DEVICE-NAME>           Optional. Performs the export operation on a specified device
                           • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
passphrase                 Optional. Encrypts the key with a passphrase before exporting it
<KEY-PASSPHRASE>           • <KEY-PASSPHRASE> – Specify the passphrase.
{background {on <DEVICE-     • background – Optional. Performs the export operation in the background
NAME>}|                         • on <DEVICE-NAME> – Optional. Performs the export operation on a specified
on <DEVICE-NAME>                   device
                                   • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|
use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name {email <SEND-TO-EMAIL>|
fqdn <FQDN>|ip-address <IP>|on <DEVICE-NAME>}

pki                        Enables PKI management. Use this command to authenticate, export, generate, or
                           delete a trustpoint and its associated CA certificates.
generate                   Generates a CA certificate and a trustpoint
self-signed                Generates a self-signed CA certificate and a trustpoint
<TRUSTPOINT-NAME>          • <TRUSTPOINT-NAME> – Specify a name for the certificate and its trustpoint.
[generate-rsa-key|         Generates a new RSA Keypair, or uses an existing RSA Keypair
use-rsa-key]               • generate-rsa-key – Generates a new RSA Keypair for digital authentication
<RSA-KEYPAIR-NAME>
                           • use-rsa-key – Uses an existing RSA Keypair for digital authentication
                             • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for
                             it. If using an existing RSA Keypair, specify its name.
2 - 24 WiNG CLI Reference Guide



         autogen-subject-name     Auto generates the subject name from the configuration parameters. The subject
                                  name helps to identify the certificate
         email <SEND-TO-EMAIL>    Exports CSR to a specified e-mail address
                                  • <SEND-TO-EMAIL> – Specify the e-mail address of the CA.
         fqdn <FQDN>              Exports CSR to a specified FQDN
                                  • <FQDN> – Specify the FQDN of the CA.
         ip-address <IP>          Exports CSR to a specified device or system
                                  • <IP> – Specify the IP address of the CA.
         on <DEVICE-NAME>         Exports the CSR on a specified device
                                  • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        • crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|
        use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COMMON-NAME> <COUNTRY>
        <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> {email <SEND-TO-EMAIL>|
        fqdn <FQDN>|ip-address <IP>|on <DEVICE-NAME>}

         pki                      Enables PKI management. Use this command to authenticate, export, generate, or
                                  delete a trustpoint and its associated CA certificates.
         generate                 Generates a CA certificate and a trustpoint
         self-signed              Generates a self-signed CA certificate and a trustpoint
         <TRUSTPOINT-NAME>        • <TRUSTPOINT-NAME> – Specify a name for the certificate and its trustpoint.
         [generate-rsa-key|       Generates a new RSA Keypair, or uses an existing RSA Keypair
         use-rsa-key]             • generate-rsa-key – Generates a new RSA Keypair for digital authentication
         <RSA-KEYPAIR-NAME>
                                  • use-rsa-key – Uses an existing RSA Keypair for digital authentication
                                    • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it.
                                    If using an existing RSA Keypair, specify its name.
         subject-name             Specify a subject name to identify the certificate.
         <COMMON-NAME>            • <COMMON-NAME> – Specify the common name used with the CA certificate. The
                                    name should enable you to identify the certificate easily.
         <COUNTRY>                Sets the deployment country name (2 character ISO code)
         <STATE>                  Sets the state name (2 to 64 characters)
         <CITY>                   Sets the city name (2 to 64 characters)
         <ORGANIZATION>           Sets the organization name (2 to 64 characters)
         <ORGANIZATION-UNIT>      Sets the organization unit (2 to 64 characters)
         email <SEND-TO-EMAIL>    Exports the CSR to a specified e-mail address
                                  • <SEND-TO-EMAIL> – Specify the e-mail address of the CA.
USER EXEC MODE COMMANDS 2 - 25



fqdn <FQDN>             Exports the CSR to the CA by providing the FQDN of the CA
                        • <FQDN> – Specify the FQDN of the CA.
ip address <IP>         Exports the CSR to a specified device or system
                        • <IP> – Specify the IP address of the CA

• crypto pki import [certificate|crl] <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background
{on <DEVICE-NAME>}|on <DEVICE--NAME>}

pki                     Enables PKI management. Use this command to authenticate, export, generate, or
                        delete a trustpoint and its associated CA certificates.
import                  Imports certificates, CRL, or a trustpoint to the selected device
[certificate|crl]       Imports a signed server certificate or CRL
<TRUSTPOINT-NAME>       • certificate – Imports signed server certificate
                        • crl – Imports CRL
                          • <TRUSTPOINT-NAME> – Specify the trustpoint name (should be authenticated).
<IMPORT-FROM-URL>       Specify the signed server certificate or CRL source address in the following format:
                            tftp://<hostname|IP>[:port]/path/file
                            ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                            sftp://<user>@<hostname|IP>[:port]>/path/file
                            http://<hostname|IP>[:port]/path/file
                            cf:/path/file
                            usb1:/path/file
                            usb2:/path/file
background              Optional. Performs the import operation in the background
{on <DEVICE-NAME>}      • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device
                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
on <DEVICE-NAME>        Optional. Performs the import operation on a specified device
                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• crypto pki import trustpoint <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background {on
<DEVICE-NAME>}|on <DEVICE--NAME>}

pki                     Enables PKI management. Use this command to authenticate, export, generate, or
                        delete a trustpoint and its associated CA certificates.
import                  Imports certificates, CRL, or a trustpoint to the selected device
trustpoint              Imports a trustpoint and its associated CA certificate, server certificate, and private
<TRUSTPOINT-NAME>       key
                        • <TRUSTPOINT-NAME> – Specify the trustpoint name (should be authenticated).
2 - 26 WiNG CLI Reference Guide



         <IMPORT-FROM-URL>           Specify the trustpoint source address in the following format:
                                         tftp://<hostname|IP>[:port]/path/file
                                         ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                         sftp://<user>@<hostname|IP>[:port]>/path/file
                                         http://<hostname|IP>[:port]/path/file
                                         cf:/path/file
                                         usb1:/path/file
                                         usb2:/path/file
         background                  Optional. Performs the import operation in the background
         {on <DEVICE-NAME>}          • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device
                                       • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         on <DEVICE-NAME>            Optional. Performs the import operation on a specified device
                                     • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         passphrase                  Optional. Encrypts the trustpoint with a passphrase before importing it
         <KEY-PASSPHRASE>            • <KEY-PASSPHRASE> – Specify a passphrase.
         {background {on <DEVICE-      • background – Optional. Imports the encrypted trustpoint in the background
         NAME>}|                          • on <DEVICE-NAME> – Optional. Imports the encrypted trustpoint on a
         on <DEVICE-NAME>}                   specified device
                                             • <DEVICE-NAME.> – Specify the name of the AP or wireless controller.
        • crypto pki zeroise trustpoint <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}|
        on <DEVICE-NAME>}

         pki                        Enables PKI management. Use this command to authenticate, export, generate, or
                                    delete a trustpoint and its associated CA certificates.
         zeroise                    Deletes a trustpoint and its associated CA certificate, server certificate, and private key
         <TRUSTPOINT-NAME>          • <TRUSTPOINT-NAME> – Specify the trustpoint name (should be authenticated).
         del-key                    Optional. Deletes the private key associated with the server certificate
         {on <DEVICE-NAME>}         • on <DEVICE-NAME> – Optional. Deletes private key on a specific device
                                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         on <DEVICE-NAME>           Optional. Deletes the trustpoint on a specified device
                                    • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
USER EXEC MODE COMMANDS 2 - 27


ExamplesJ
rfs7000-37FABE#crypto key generate rsa key 1025
RSA Keypair successfully generated
rfs7000-37FABE#

rfs7000-37FABE#crypto key import rsa moto123 url passphrase word background on
rfs7000-37FABE
RSA key import operation is started in background
rfs7000-37FABE#

rfs7000-37FABE#crypto pki generate self-signed word generate-rsa-key word autogen-
subject-name fqdn word
Successfully generated self-signed certificate
rfs7000-37FABE#

rfs7000-37FABE#crypto pki zeroize trustpoint word del-key on rfs7000-37FABE
Successfully removed the trustpoint and associated certificates
%Warning: Applications associated with the trustpoint will start using default-
trustpoint
rfs7000-37FABE#
rfs7000-37FABE#crypto pki authenticate word url background on rfs7000-37FABE
Import of CA certificate started in background
rfs7000-37FABE#

rfs7000-37FABE#crypto pki import trustpoint word url passphrase word on rfs7000-37FABE
Import operaton started in background
rfs7000-37FABE#
Related Commands

no                       Resets or disables the crypto commands
2 - 28 WiNG CLI Reference Guide


  2.1.8 disable
          User Exec Commands
        Turns off (disables) the privileged mode command set. This command returns to the User Executable mode.
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        disable
        Parameters
        None
        Examples
        rfs7000-37FABE#disable
        rfs7000-37FABE>
USER EXEC MODE COMMANDS 2 - 29


2.1.9 enable
       User Exec Commands
     Turns on (enables) the privileged mode command set. This command does not do anything in the Privilege Executable
     mode.
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     enable
     Parameters
     None
     Examples
     rfs7000-37FABE>enable
     rfs7000-37FABE#
2 - 30 WiNG CLI Reference Guide


2.1.10 exit
          User Exec Commands
        Ends the current CLI session and closes the session window
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        exit
        Parameters
        None
        Examples
        rfs7000-37FABE>exit
USER EXEC MODE COMMANDS 2 - 31


2.1.11 logging
        User Exec Commands
      Modifies message logging settings
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      logging monitor {<0-7>|alerts|critical|debugging|emergencies|errors|
         informational|warnings|notifications}
      Parameters
      • logging monitor {<0-7>|alerts|critical|debugging|emergencies|errors|
      informational|warnings|notifications}

       monitor                    Sets the terminal lines logging levels. The logging severity levels can be set from
                                  0 - 7. The system configures default settings, if no logging severity level is specified.
                                  • <0-7> – Optional. Specify the logging severity level from 0-7. The various levels and
                                     their implications are as follows:
                                  • alerts – Optional. Immediate action needed (severity=1)
                                  • critical – Optional. Critical conditions (severity=2)
                                  • debugging – Optional. Debugging messages (severity=7)
                                  • emergencies – Optional. System is unusable (severity=0)
                                  • errors – Optional. Error conditions (severity=3)
                                  • informational – Optional.Informational messages (severity=6)
                                  • notifications – Optional. Normal but significant conditions (severity=5)
                                  • warnings – Optional. Warning conditions (severity=4)
      Examples
      rfs7000-37FABE>logging monitor warnings ?
      rfs7000-37FABE>

      rfs7000-37FABE>logging monitor 2
      rfs7000-37FABE>
      Related Commands

       no                          Resets the terminal lines logging levels
2 - 32 WiNG CLI Reference Guide


2.1.12 mint
          User Exec Commands
        Uses MiNT protocol to perform a ping and a traceroute to a remote device
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        mint [ping|traceroute]

        mint ping <MINT-ID> {count [<1-60>]|size [<1-64000>]|timeout [<1-10>]}
        mint traceroute <MINT-ID> {destination-port [<1-65535>]|max-hops [<1-255>]|
           source-port [<1-65535>]|timeout [<1-255>]}
        Parameters
        • mint ping <MINT-ID> {count [<1-60>]|size [<1-64000>]|timeout [<1-10>]}

         ping <MINT-ID>               Sends a MiNT echo message to a MiNT destination
                                      • <MINT-ID> – Specify the MiNT destination ID to ping.
         count <1-60>                 Optional. Sets the number of times to ping the MiNT destination
                                      • <1-60> – Specify a value from 1 - 60. The default is 3.
         size <1-64000>               Optional. Sets the MiNT payload size in bytes
                                      • <1-64000> – Specify a value from 1 - 640000. The default is 64 bytes.
         timeout <1-10>               Optional. Sets a response time in seconds
                                      • <1-10> – Specify a value from 1 - 10 seconds. The default is 1 second.
        • mint traceroute <MINT-ID> {destination-port [<1-65535>]|max-hops [<1-255>]|
        source-port [<1-65535>]|timeout [<1-255>]}

         traceroute <MINT-ID>         Prints the route packets trace to a device
                                      • <MINT-ID> – Specify the MiNT destination ID.
         destination-port             Optional. Sets the Equal-cost Multi-path (ECMP) routing destination port
         <1-65535>                    • <1-65535> – Specify a value from 1 - 65535. The default port is 45.
         max-hops <1-255>             Optional. Sets the maximum number of hops a traceroute packet traverses in the forward
                                      direction
                                      • <1-255> – Specify a value from 1 - 255. The default is 30.
USER EXEC MODE COMMANDS 2 - 33



source-port <1-65535>   Optional. Sets the ECMP source port
                        • <1-65535> – Specify a value from 1 - 65535. The default port is 45.
timeout <1-255>         Optional. Sets the minimum response time period
                        • <1-65535> – Specify a value from 1 - 255 seconds. The default is 30 seconds.
Examples
rfs7000-37FABE>mint ping 70.37.FA.BF count 20 size 128
MiNT ping 70.37.FA.BF with 128 bytes of data.
 Response from 70.37.FA.BF: id=1 time=0.292 ms
 Response from 70.37.FA.BF: id=2 time=0.206 ms
 Response from 70.37.FA.BF: id=3 time=0.184 ms
 Response from 70.37.FA.BF: id=4 time=0.160 ms
 Response from 70.37.FA.BF: id=5 time=0.138 ms
 Response from 70.37.FA.BF: id=6 time=0.161 ms
 Response from 70.37.FA.BF: id=7 time=0.174 ms
 Response from 70.37.FA.BF: id=8 time=0.207 ms
 Response from 70.37.FA.BF: id=9 time=0.157 ms
 Response from 70.37.FA.BF: id=10 time=0.153 ms
 Response from 70.37.FA.BF: id=11 time=0.159 ms
 Response from 70.37.FA.BF: id=12 time=0.173 ms
 Response from 70.37.FA.BF: id=13 time=0.156 ms
 Response from 70.37.FA.BF: id=14 time=0.209 ms
 Response from 70.37.FA.BF: id=15 time=0.147 ms
 Response from 70.37.FA.BF: id=16 time=0.203 ms
 Response from 70.37.FA.BF: id=17 time=0.148 ms
 Response from 70.37.FA.BF: id=18 time=0.169 ms
 Response from 70.37.FA.BF: id=19 time=0.164 ms
 Response from 70.37.FA.BF: id=20 time=0.177 ms

--- 70.37.FA.BF ping statistics ---
20 packets transmitted, 20 packets received, 0% packet loss
round-trip min/avg/max = 0.138/0.177/0.292 ms
2 - 34 WiNG CLI Reference Guide


2.1.13 no
             User Exec Commands
        Use the no command to revert a command or to set parameters to their default. This command is useful to turn off an
        enabled feature or set default values for a parameter.



                          NOTE: The commands have their own set of parameters that can be reset.



             • AP300
             • AP621
             • AP650
             • AP6511
             • AP6521
             • AP6532
             • AP71XX
             • RFS4000
             • RFS6000
             • RFS7000
        Syntax
        no [adoption|captive-portal|crypto|debug|logging|page|service|terminal|wireless]

        no adoption {on <DEVICE-OR-DOMAIN-NAME>}

        no captive-portal client [captive-portal <CAPTIVE-PORTAL-NAME>|<MAC>]
           {on <DEVICE-OR-DOMAIN-NAME>}

        no crypto pki [server|trustpoint]
        no crypto pki [server|trustpoint] <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}|
           on <DEVICE-NAME>}

        no logging monitor

        no page

        no service [ap300|cli-tables-expand|locator]
        no service ap300 locator <MAC>
        no service [cli-tables-expand <LINE>|locator {on <DEVICE-NAME>}]

        no terminal [length|width]

        no    wireless     client   [all {filter|on}|<MAC>]
        no    wireless     client   all {filter [wlan [<WLAN-NAME>]]}
        no    wireless     client   all {on <DEVICE-OR-DOMAIN-NAME> {filter [wlan [<WLAN-NAME>]]}}
        no    wireless     client   <MAC> {on <DEVICE-OR-DOMAIN-NAME>}
        Parameters
        • no adoption {on <DEVICE-OR-DOMAIN-NAME>}

         no adoption                      Resets the adoption status of a specified device or all devices adopted by a device
         {on <DEVICE-OR-DOMAIN-           • <DEVICE-OR-DOMAIN-NAME> – Optional. Specify the name of the AP, wireless
         NAME>}                             controller, or RF Domain.
USER EXEC MODE COMMANDS 2 - 35


• no captive-portal client [captive-portal <CAPTIVE-PORTAL-NAME>|<MAC>]
{on <DEVICE-OR-DOMAIN-NAME>}

no captive-portal client   Disconnects captive portal clients from the network
captive-portal             Disconnects captive portal clients
<CAPTIVE-PORTAL-NAME>      • <CAPTIVE-PORTAL-NAME> – Specify the captive portal name.
<MAC>                      Disconnects a specified client
                           • <MAC> – Specify the MAC address of the client.
on                         Optional. Disconnects clients on a specified device or RF Domain
<DEVICE-OR-DOMAIN-         • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
NAME>                        RF Domain.

• no crypto pki [server|trustpoint] <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}|
on <DEVICE-NAME>}

no crypto pki              Deletes all PKI authentications
[server|trustpoint]        Deletes PKI authentications, such as server certificates and trustpoints
<TRUSTPOINT-NAME>          • server – Deletes server certificates
                           • trustpoint – Deletes a trustpoint and its associated certificates
                           The following is common to the server and trustpoint parameters:
                             • <TURSTPOINT-NAME> – Deletes a trustpoint or its server certificate. Specify the
                             trustpoint name.
del-key                    Optional. Deletes the private key associated with a server certificate or trustpoint. The
{on <DEVICE-NAME>}         operation will fail if the private key is in use by other trustpoints.
                           • on <DEVICE-NAME> – Optional. Deletes the private key on a specified device
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• no logging monitor

no logging monitor         Resets terminal lines message logging levels
• no page

no page                    Resets wireless controller paging function to its default. Disabling the “page” command
                           displays the CLI command output at once, instead of page by page.

• no service ap300 locator <MAC>

no service                 Disables LEDs on AP300s or a specified device in the WLAN. It also resets the CLI table
                           expand and MiNT protocol configurations.
no ap300 locator <MAC>     Disables LEDs on AP300s
                           • <MAC> – Specify the MAC address of the AP300.
2 - 36 WiNG CLI Reference Guide


        • no service [cli-tables-expand <LINE>|locator {on <DEVICE-NAME>}]

         no service                   Disables LEDs on AP300s or a specified device in the WLAN. It also resets the CLI table
                                      expand and MiNT protocol configurations.
         cli-tables-expand <LINE>     Resets the expand configuration of the CLI table, so that the table does not expand in the
                                      drop-down format
         locator                      Disables LEDs on a specified device
         {on <DEVICE-NAME>}           • on <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller.

        • no terminal [length|width]

         no terminal [length|width]   Resets the width of the terminal window or the number of lines displayed within the
                                      terminal window
                                      • length – Resets the number of lines displayed on the terminal window to its default
                                      • width – Resets the width of the terminal window to its default

        • no wireless client all {filter [wlan [<WLAN-NAME>]]}

         no wireless client all       Disassociates all clients on a specified device or domain
         filter                       Optional. Specifies additional client selection filter
         wlan <WLAN-NAME>             • wlan – Optional. Filters clients based on the WLAN
                                        • <WLAN-NAME> – Specify the WLAN name.

        • no wireless client all {on <DEVICE-OR-DOMAIN-NAME> {filter [wlan <WLAN-NAME>]}}

         no wireless client all on    Disassociates all wireless clients on a specified device or domain
         <DEVICE-OR-DOMAIN-           • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
         NAME>                           RF Domain.
         filter                       The following are optional filter parameters:
         wlan <WLAN-NAME>             • filter – Optional. Specifies additional client selection filter
                                        • wlan – Filters clients based on the WLAN
                                            • <WLAN-NAME> – Specify the WLAN name.
        Usage Guidelines
        The no command negates any command associated with it. Wherever required, use the same parameters associated with
        the command getting negated.
        Examples
        rfs7000-37FABE>no adoption
        rfs7000-37FABE>

        rfs7000-37FABE>no page
        rfs7000-37FABE>

        rfs7000-37FABE>no service cli-tables-expand line
        rfs7000-37FABE>
USER EXEC MODE COMMANDS 2 - 37


Related Commands

auto-provisioning-policy   Resets the adoption state of a device and all devices adopted to it
captive portal             Manages captive portal clients
logging                    Modifies message logging settings
page                       Resets the wireless controller paging function to its default
service                    Performs different functions depending on the parameter passed
terminal                   Sets the length or the number of lines displayed within the terminal window
wireless-client            Manages wireless clients
2 - 38 WiNG CLI Reference Guide


2.1.14 page
          User Exec Commands
        Toggles wireless controller paging. Enabling this command displays the CLI command output page by page, instead of
        running the entire output at once.
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        page
        Parameters
        None
        Examples
        rfs7000-37FABE>page
        rfs7000-37FABE>
        Related Commands

         no                            Disables wireless controller paging
USER EXEC MODE COMMANDS 2 - 39


2.1.15 ping
        User Exec Commands
      Sends Internet Controller Message Protocol (ICMP) echo messages to a user-specified location
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      ping [<IP>|<HOSTNAME>]
      Parameters
      • ping [<IP>|<HOSTNAME>]

       <IP>                         Optional. Specify the destination IP address to ping. When entered without any
                                    parameters, this command prompts for an IP.
       <HOSTNAME>                   Optional. Specify the destination hostname to ping. When entered without any
                                    parameters, this command prompts for a hostname.
      Examples
      rfs7000-37FABE>ping 172.16.10.3
      PING 172.16.10.3 (172.16.10.3): 100 data                 bytes
      108 bytes from 172.16.10.3: seq=0 ttl=64                 time=7.100     ms
      108 bytes from 172.16.10.3: seq=1 ttl=64                 time=0.390     ms
      108 bytes from 172.16.10.3: seq=2 ttl=64                 time=0.422     ms
      108 bytes from 172.16.10.3: seq=3 ttl=64                 time=0.400     ms

      --- 172.16.10.3 ping statistics ---
      4 packets transmitted, 4 packets received, 0% packet loss
      rfs7000-37FABE>
2 - 40 WiNG CLI Reference Guide


2.1.16 ssh
          User Exec Commands
        Opens a Secure Shell (SSH) connection between two network devices
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        ssh <IP> <USER-NAME>
        Parameters
        • ssh <IP> <USER-NAME>

         [<IP>/<HOSTNAME>]           Specify the IP address or hostname of the remote system.
         <USERNAME>                   Specify the name of the user requesting SSH connection with the remote system.
        Examples
        rfs7000-37FABE>ssh 172.16.10.3 172.16.10.1
        ssh: connect to host 172.16.10.3 port 22: No route to host
        rfs7000-37FABE>
USER EXEC MODE COMMANDS 2 - 41


2.1.17 telnet
         User Exec Commands
       Opens a Telnet session between two network devices
          • AP300
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP71XX
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       telnet <IP> {<TCP-PORT>}
       Parameters
       telnet <IP> {<TCP-PORT>}

        <IP>                         Configures the IP address of the remote system to connect to. The Telnet session is
                                     established between the connecting system and the remote system.
                                     • <IP> – Specify the IP address of the remote system.
        <TCP-PORT>                   Optional. Specify the Transmission Control Protocol (TCP) port number.
       Examples
       rfs7000-37FABE>telnet 172.16.10.1
       Entering character mode
       Escape character is '^]'.


       rfs7000-37FABE release 5.2.2.0-048B
       rfs7000-37FABE login: admin
       Password:
       rfs7000-37FABE>
2 - 42 WiNG CLI Reference Guide


2.1.18 terminal
          User Exec Commands
        Sets the length or the number of lines displayed within the terminal window
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        terminal [length|width] <0-512>
        Parameters
        • terminal [length|width] <0-512>

         length <0-512>                 Sets the number of lines displayed on a terminal window
                                        • <0-512> – Specify a value from 0 - 512.
         width <0-512>                  Sets the width or number of characters displayed on a terminal window
                                        • <0-512> – Specify a value from 0 - 512.
        Examples
        rfs7000-37FABE>terminal length 150
        rfs7000-37FABE>

        rfs7000-37FABE>terminal width 215
        rfs7000-37FABE>

        rfs7000-37FABE>show context
        Terminal Type: vt102
        Length: 150     Width: 0
        rfs7000-37FABE>
        Related Commands

         no                             Resets the width of the terminal window or the number of lines displayed within the
                                        terminal window
USER EXEC MODE COMMANDS 2 - 43


2.1.19 time-it
         User Exec Commands
       Verifies the time taken by a particular command between request and response
          • AP300
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP71XX
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       time-it <COMMAND>
       Parameters
       • time-it <COMMAND>

        time-it <COMMAND>            Verifies the time taken by a particular command to execute and provide a result
                                     • <COMMAND> – Specify the command.
       Examples
       rfs7000-37FABE>time-it enable
       That took 0.00 seconds..
       rfs7000-37FABE#
2 - 44 WiNG CLI Reference Guide


2.1.20 traceroute
           User Exec Commands
        Traces the route to a defined destination
        Use ‘--help’ or ‘-h’ to display a complete list of parameters for the traceroute command
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        traceroute <LINE>
        Parameters
        • traceroute <LINE>

         traceroute <LINE>               Traces the route to a destination IP address or hostname
                                         • <LINE> – Specify a traceroute argument. For example, “service traceroute-h”.
        Examples
        rfs7000-37FABE>traceroute --help
        BusyBox v1.14.1 () multi-call binary

        Usage: traceroute [-FIldnrv] [-f 1st_ttl] [-m max_ttl] [-p port#] [-q nqueries]
                [-s src_addr] [-t tos] [-w wait] [-g gateway] [-i iface]
                [-z pausemsecs] HOST [data size]

        Trace the route to HOST

        Options:
                -F      Set the don't fragment bit
                -I      Use ICMP ECHO instead of UDP datagrams
                -l      Display the ttl value of the returned packet
                -d      Set SO_DEBUG options to socket
                -n      Print hop addresses numerically rather than symbolically
                -r      Bypass the normal routing tables and send directly to a host
                -v      Verbose
                -m max_ttl      Max time-to-live (max number of hops)
                -p port#        Base UDP port number used in probes (default is 33434)
                -q nqueries     Number of probes per 'ttl' (default 3)
                -s src_addr     IP address to use as the source address
                -t tos          Type-of-service in probe packets (default 0)
                -w wait         Time in seconds to wait for a response (default 3 sec)
                -g              Loose source route gateway (8 max)
        rfs7000-37FABE>traceroute 172.16.10.2
        traceroute to 172.16.10.2 (172.16.10.2), 30 hops max, 38 byte packets
         1 172.16.10.1 (172.16.10.1) 3002.008 ms !H 3002.219 ms !H 3003.945 ms !H
USER EXEC MODE COMMANDS 2 - 45


2.1.21 watch
        User Exec Commands
      Repeats the specified CLI command at periodic intervals
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      watch <1-3600> <LINE>
      Parameters
      • watch <1-3600> <LINE>

       watch                         Repeats a CLI command at a specified interval
       <1-3600>                      Select an interval from 1 - 3600 seconds. Pressing CTRL-Z halts execution of the
                                     command.
       <LINE>                        Specify the CLI command.
      Examples
      rfs7000-37FABE>watch 45 page
      rfs7000-37FABE>

      rfs7000-37FABE>watch 45 ping 172.16.10.2
      PING 172.16.10.2 (172.16.10.2): 100 data                  bytes
      108 bytes from 172.16.10.2: seq=0 ttl=64                  time=0.725     ms
      108 bytes from 172.16.10.2: seq=1 ttl=64                  time=0.464     ms
      108 bytes from 172.16.10.2: seq=2 ttl=64                  time=0.458     ms
      108 bytes from 172.16.10.2: seq=3 ttl=64                  time=0.378     ms
      108 bytes from 172.16.10.2: seq=4 ttl=64                  time=0.364     ms

      --- 172.16.10.2 ping statistics ---
      5 packets transmitted, 5 packets received, 0% packet loss
      round-trip min/avg/max = 0.364/0.477/0.725 ms
      rfs7000-37FABE>
2 - 46 WiNG CLI Reference Guide
CHAPTER 3 PRIVILEGED EXEC MODE
          COMMANDS
  Most PRIV EXEC commands set operating parameters. Privileged-level access should be password protected to prevent
  unauthorized use. The PRIV EXEC command set includes commands contained within the USER EXEC mode. The PRIV EXEC
  mode also provides access to configuration modes, and includes advanced testing commands.
  The PRIV EXEC mode prompt consists of the hostname of the device followed by a pound sign (#).
  To access the PRIV EXEC mode, enter the following at the prompt:
  rfs7000-37FABE>enable
  rfs7000-37FABE#
  The PRIV EXEC mode is often referred to as the enable mode, because the enable command is used to enter the mode.
  There is no provision to configure a password to get direct access to PRIV EXEC (enable) mode.
  rfs7000-37FABE#?
  Priv Exec commands:
    ap-upgrade     AP firmware upgrade
    archive        Manage archive files
    boot           Boot commands
    cd             Change current directory
    change-passwd Change password
    clear          Clear
    clock          Configure software system clock
    cluster        Cluster commands
    commit         Commit all changes made in this session
    configure      Enter configuration mode
    connect        Open a console connection to a remote device
    copy           Copy from one file to another
    crypto         Encryption related commands
    debug          Debugging functions
    delete         Deletes specified file from the system.
    diff           Display differences between two files
    dir            List files on a filesystem
    disable        Turn off privileged mode command
    edit           Edit a text file
    enable         Turn on privileged mode command
    erase          Erase a filesystem
    format         Format file system
    halt           Halt the system
    help           Description of the interactive help system
    join-cluster   Join the cluster
    logging        Modify message logging facilities
    mint           MiNT protocol
    mkdir          Create a directory
    more           Display the contents of a file
    no             Negate a command or set its defaults
3-2   WiNG CLI Reference Guide


         page            Toggle paging
         ping            Send ICMP echo messages
         pwd             Display current directory
         reload          Halt and perform a warm reboot
         remote-debug    Troubleshoot remote system(s)
         rename          Rename a file
         revert          Revert changes
         rmdir           Delete a directory
         self            Config context of the device currently logged into
         service         Service Commands
         show            Show running system information
         ssh             Open an ssh connection
         telnet          Open a telnet connection
         terminal        Set terminal line parameters
         time-it         Check how long a particular command took between request and
                         completion of response
         traceroute      Trace route to destination
         upgrade         Upgrade software image
         upgrade-abort   Abort an ongoing upgrade
         watch           Repeat the specific CLI command at a periodic interval
         write           Write running configuration to memory or terminal

         clrscr          Clears the display screen
         exit            Exit from the CLI

       rfs7000-37FABE#
PRIVILEGED EXEC MODE COMMANDS               3-3



3.1 Privileged Exec Mode Commands
   Table 3.1 summarizes the PRIV EXEC Mode commands:.
                                                 Table 3.1 Privileged Exec Commands

           Command                                       Description                                 Reference
    ap-upgrade         Enables an automatic firmware upgrade on an adopted AP                       page 3-5
    archive            Manages file archive operations                                              page 3-10
    boot               Specifies the image used after reboot                                        page 3-12
    cd                 Changes the current directory                                                page 3-13
    change-passwd      Changes the password of a logged user                                        page 3-14
    clear              Clears parameters, cache entries, table entries, and other similar entries   page 3-15
    clock              Configures the system clock                                                  page 3-19
    cluster            Initiates a cluster context                                                  page 3-20
    configure          Enters the configuration mode                                                page 3-21
    connect            Begins a console connection to a remote device                               page 3-22
    copy               Copies a file from any location to the wireless controller                   page 3-23
    crypto             Enables encryption                                                           page 3-24
    delete             Deletes a specified file from the system                                     page 3-36
    diff               Displays the differences between two files                                   page 3-38
    dir                Displays the list of files on a file system                                  page 3-39
    edit               Edits a text file                                                            page 3-41
    enable             Turns on (enables) the privileged mode commands set                          page 3-42
    erase              Erases a file system                                                         page 3-43
    exit               Ends the current CLI session and closes the session window                   page 3-44
    format             Formats the file system                                                      page 3-45
    halt               Stops the wireless controller                                                page 3-46
    join-cluster       Adds a wireless controller to an existing cluster of devices                 page 3-47
    logging            Modifies message logging parameters                                          page 3-48
    mint               Configures MiNT protocols                                                    page 3-50
    mkdir              Creates a new directory in the file system                                   page 3-49
    more               Displays the contents of a file                                              page 3-52
    no                 Reverts a command or sets values to their default settings                   page 3-53
3-4   WiNG CLI Reference Guide


                                                  Table 3.1 Privileged Exec Commands

               Command                                    Description                            Reference
        page             Toggles wireless controller paging                                     page 3-57
        ping             Sends ICMP echo messages to a user-specified location                  page 3-58
        pwd              Displays the current directory                                         page 3-59
        reload           Halts the wireless controller and performs a warm reboot               page 3-60
        rename           Renames a file in the existing file system                             page 3-62
        rmdir            Deletes an existing file from the file system                          page 3-63
        self             Displays the configuration context of the device                       page 3-64
        ssh              Connects to another device using a secure shell                        page 3-65
        telnet           Opens a Telnet session                                                 page 3-66
        terminal         Sets the length/number of lines displayed within the terminal window   page 3-67
        time-it          Verifies the time taken by a particular command between request and    page 3-68
                         response
        traceroute       Traces the route to a defined destination                              page 3-69
        upgrade          Upgrades the software image                                            page 3-70
        upgrade-abort    Aborts an ongoing software image upgrade                               page 3-71
        watch            Repeats the specific CLI command at a periodic interval                page 3-72
        clrscr           Clears the display screen                                              page 5-3
        commit           Commits (saves) the changes made in the current session                page 5-4
        do               Runs commands from EXEC mode                                           page 4-66
        end              Ends and exits the current mode and moves to the PRIV EXEC mode        page 5-5
        exit             Ends the current mode and moves to the previous mode                   page 5-6
        help             Displays interactive help system                                       page 5-7
        revert           Reverts changes to their last saved configuration                      page 5-13
        service          Invokes service commands to troubleshoot or debug (config-if)          page 5-14
                         instance configurations
        show             Displays running system information                                    page 6-4
        write            Writes information to memory or terminal                               page 5-42
PRIVILEGED EXEC MODE COMMANDS                     3-5


3.1.1 ap-upgrade
       Privileged Exec Commands
     Enables an automatic firmware upgrade on an adopted AP or a set of APs. APs of the same type can be upgraded together.
     Once APs have been upgraded, they can be forced to reboot. This command also loads the firmware on to the wireless
     controller.
     The AP upgrade command also upgrades APs in a specified RF Domain.
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     ap-upgrade [<MAC/HOSTNAME>|all|ap621|ap650|ap6511|ap6521|ap6532|
        ap71xx|cancel-upgrade|load-image|rf-domain]

     ap-upgrade [<MAC/HOSTNAME>|all] {no-reboot|reboot-time <TIME>|
        upgrade-time <TIME> {no-reboot|reboot-time <TIME>}}

     ap-upgrade [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] all
        {no-reboot|reboot-time <TIME>|upgrade-time <TIME> {no-reboot|
        reboot-time <TIME>}}]

     ap-upgrade cancel-upgrade           [<MAC/HOSTNAME>|all|ap621|ap650|ap6511|
       ap6521|ap6532|71xx|on]
     ap-upgrade cancel-upgrade           [<MAC/HOSTNAME>|all]
     ap-upgrade cancel-upgrade           [ap621|ap650|ap6511|ap6521|ap6532|71xx] all
     ap-upgrade cancel-upgrade           on rf-domain [<RF-DOMAIN-NAME>|all]

     ap-upgrade load-image [ap621|ap650|ap6511|ap6521|ap6532|ap71xx]
        <IMAGE-URL>

     ap-upgrade rf-domain [<RF-DOMAIN-NAME>|all] [all|ap621|ap650|ap6511|
        ap6521|ap6532|ap71xx] {no-reboot|no-via-rf-domain|reboot-time <TIME>|
        upgrade-time <TIME> {no-reboot|reboot-time <TIME>}}
     ap-upgrade rf-domain [<RF-DOMAIN-NAME>|all] [all|ap621|ap650|ap6511|
        ap621|ap6532|ap71xx] {no-via-rf-domain} {no-reboot|reboot-time <TIME>|
        upgrade-time <TIME>}
3-6   WiNG CLI Reference Guide


       Parameters
       • ap-upgrade [<MAC/HOSTNAME>|all] {no-reboot|reboot-time <TIME>|upgrade-time <TIME>
       {no-reboot|reboot-time <TIME>}}

        [<MAC/HOSTNAME>|all]          Upgrades firmware on a specified AP or all APs adopted by the wireless controller
                                      • <MAC/HOSTNAME> – Specify the MAC address or hostname of the AP.
                                      • all – Upgrades all APs adopted by the wireless controller
        no-reboot                     Optional. Disables automatic reboot after a successful upgrade (the wireless controller
                                      must be manually restarted)
        reboot-time <TIME>            Optional. Schedules an automatic reboot after a successful upgrade
                                      • <TIME> – Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format.
        upgrade-time <TIME>           Optional. Schedules an automatic firmware upgrade
        {no-reboot|                   • <TIME> – Specify the upgrade time in the MM/DD/YYYY-HH:MM or HH:MM
        reboot-time <TIME>}             format. After a scheduled upgrade, these actions can be performed.
                                        • no-reboot – Disables automatic reboot after a successful upgrade (the wireless
                                        controller must be manually restarted)
                                        • reboot-time <TIME> – Optional. Schedules an automatic reboot after a
                                        successful upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or
                                        HH:MM format.
       • ap-upgrade [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] all {no-reboot|reboot-time
       <TIME>|upgrade-time <TIME> {no-reboot|reboot-time <TIME>}}

        [ap621|ap650|ap6511|ap6521|   Upgrades firmware on all adopted APs
        ap6532|ap71xx] all            • AP621 all – Upgrades firmware on all AP621s
                                      • AP650 all – Upgrades firmware on all AP650s
                                      • AP6511 all – Upgrades firmware on all AP6511s
                                      • AP6521 all – Upgrades firmware on all AP6521s
                                      • AP6532 all – Upgrades firmware on all AP6532s
                                      • AP71XX all – Upgrades firmware on all AP71XXs
                                      After selecting the AP type, you can schedule an automatic upgrade and/or an
                                      automatic reboot.
        no-reboot                     Optional. Disables automatic reboot after a successful upgrade (the wireless controller
                                      must be manually restarted)
        reboot-time <TIME>            Optional. Schedules an automatic reboot after a successful upgrade
                                      • <TIME> – Optional. Specify the reboot time in the MM/DD/YYYY-HH:MM or
                                        HH:MM format.
        upgrade-time <TIME>           Optional. Schedules firmware upgrade on an AP adopted by the wireless controller
        {no-reboot|                   • <TIME> – Specify the upgrade time in the MM/DD/YYYY-HH:MM or HH:MM
        reboot-time <TIME>}             formats. After a scheduled upgrade, these actions can be performed.
                                        • no-reboot – Optional. Disables automatic reboot after a successful upgrade (the
                                        wireless controller must be manually restarted)
                                        • reboot-time <TIME> – Optional. Schedules an automatic reboot after a
                                        successful upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or
                                        HH:MM format.
PRIVILEGED EXEC MODE COMMANDS                       3-7


• ap-upgrade cancel-upgrade [<MAC/HOSTNAME>|all]

cancel-upgrade [              Cancels scheduled firmware upgrade on a specified AP or all APs adopted by the
<MAC/HOSTNAME>|all]           wireless controller
                              • <MAC/HOSTNAME> – Specify the MAC address or hostname of the AP.
                              • all – Cancels scheduled upgrade on all APs

• ap-upgrade cancel-upgrade [ap621|ap650|ap651|ap6521|ap6532|ap71xx] all

cancel-upgrade                Cancels scheduled firmware upgrade on all adopted APs
[ap621|ap650|ap6511|ap6521|   • AP621 all – Cancels scheduled upgrade on all AP621s
ap6532|ap71xx] all
                              • AP650 all – Cancels scheduled upgrade on all AP650s
                              • AP6511 all – Cancels scheduled upgrade on all AP6511s
                              • AP6521 all – Cancels scheduled upgrade on all AP6521s
                              • AP6532 all – Cancels scheduled upgrade on all AP6532s
                              • AP71XX all – Cancels scheduled upgrade on all AP71XXs

• ap-upgrade cancel-upgrade on rf-domain [<DOMAIN-NAME>|all]

cancel-upgrade on rf-domain   Cancels scheduled firmware upgrade on a specified RF Domain or all RF Domains
[<RF-DOMAIN-NAME>|all]        • <RF-DOMAIN-NAME> – Specify the RF Domain name.
                              • all – Cancels scheduled upgrades on all RF Domains

• ap-upgrade load-image [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] <IMAGE-URL>

load-image                    Loads AP firmware images on the wireless controller. Select the AP type and provide
[ap621|ap650|6511|6521|       the location of the AP firmware image.
6532|ap71xx]                  • AP621 <IMAGE-URL> – Loads AP621 firmware image
                              • AP650 <IMAGE-URL> – Loads AP650 firmware image
                              • AP6511 <IMAGE-URL> – Loads AP6511 firmware image
                              • AP6521 <IMAGE-URL> – Loads AP6521 firmware image
                              • AP6532 <IMAGE-URL> – Loads AP6532 firmware image
                              • AP71XX <IMAGE-URL> – Loads AP71XX firmware image
<IMAGE-URL>                   Specify the AP firmware image location in the following format:
                                 ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                 sftp://<user>:<passwd>@<hostname|IP>[:port]>/path/file
                                 http://<hostname|IP>[:port]/path/file
                                 cf:/path/file
                                 usb1:/path/file
                                 usb2:/path/file
3-8   WiNG CLI Reference Guide


       • ap-upgrade rf-domain [<RF-DOMAIN-NAME>|all] [all|ap621|ap650|ap6511|
       ap6521|ap6532|ap71xx] {no-reboot|no-via-rf-domain|reboot-time <TIME>|
       upgrade-time <TIME>}

        rf-domain                     Upgrades AP firmware on devices in a specified RF Domain or all RF Domains
        [<RF-DOMAIN-NAME>|all]        • <RF-DOMAIN-NAME> – Upgrades firmware in a specified RF Domain. Specify the
                                        RF Domain name.
                                      • all – Upgrades firmware on all RF Domains
        [all|ap621|ap650|ap6511|      After specifying the RF Domain, select the AP type.
        ap6521|ap6532|ap71xx]         • all – Upgrades firmware on all APs
                                      • AP621 – Upgrades firmware on all AP621s
                                      • AP650 – Upgrades firmware on all AP650s
                                      • AP6511 – Upgrades firmware on all AP6511s
                                      • AP6521 – Upgrades firmware on all AP6521s
                                      • AP6532 – Upgrades firmware on all AP6532s
                                      • AP71XX – Upgrades firmware on all AP71XXs
        {no-reboot|no-via-rf-domain   The following actions can be performed:
        |reboot-time <TIME>|          • no-reboot – Optional. Disables automatic reboot after a successful upgrade (the
        upgrade-time <TIME>}            wireless controller must be manually restarted)
                                      • no-via-rf-domain – Optional. Performs AP firmware upgrade from the adopted
                                        device
                                      • reboot-time <TIME> – Optional. Schedules an automatic reboot, after a successful
                                        upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format.
                                      • upgrade-time <TIME> – Optional. Schedules an automatic firmware upgrade
                                        Specify the upgrade time in the MM/DD/YYYY-HH:MM or HH:MM format.
        {no-reboot|                   The following are common to the [no-via-rf-domain upgrade <TIME>] and upgrade
        reboot-time <TIME>}           parameters:
                                      • no-reboot – Optional. Disables automatic reboot after a successful upgrade (the
                                        wireless controller must be manually restarted)
                                      • reboot-time <TIME> – Optional. Schedules an automatic reboot after a successful
                                        upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format.
PRIVILEGED EXEC MODE COMMANDS   3-9


Examples
rfs7000-37FABE#ap-upgrade AP621 all
--------------------------------------------------------------------------
         CONTROLLER           STATUS                    MESSAGE
--------------------------------------------------------------------------
  00-15-70-37-FA-BE           Success         Queued 0 APs to upgrade
--------------------------------------------------------------------------
rfs7000-37FABE#
rfs7000-37FABE#ap-upgrade allrfs7000-37FABE#

RFS4000-880DA7#ap-upgrade default/RFS4000-880DA7 no-reboot
--------------------------------------------------------------------------
CONTROLLER                 STATUS                   MESSAGE
--------------------------------------------------------------------------
00-23-68-88-0D-A7          Success          Queued 0 APs to upgrade
--------------------------------------------------------------------------
RFS4000-880DA7#

rfs7000-37FABE#ap-upgrade rfs7000-37FABE reboot-time 06/01/2011-12:01
--------------------------------------------------------------------------
CONTROLLER                   STATUS                   MESSAGE
--------------------------------------------------------------------------
  00-15-70-37-FA-BE          Success          Queued 0 APs to upgrade
--------------------------------------------------------------------------
rfs7000-37FABE#
3 - 10 WiNG CLI Reference Guide


  3.1.2 archive
          Privileged Exec Mode Commands
        Manages file archive operations
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        archive tar /table [<FILE>|<URL>]
        archive tar /create [<FILE>|<URL>] <FILE>
        archive tar /xtract [<FILE>|<URL>] <DIR>]
        Parameters
        • archive tar /table [<FILE>|<URL>]

         tar                              Manipulates (creates, lists or extracts) a tar file
         /table                           Lists the files in a tar file
         <FILE>                           Defines a tar filename
         <URL>                            Sets the tar file URL

        • archive tar /create [<FILE>|<URL>] <FILE>

         tar                              Manipulates (creates, lists or extracts) a tar file
         /create                          Creates a tar file
         <FILE>                           Defines tar filename
         <URL>                            Sets the tar file URL
        • archive tar /xtract [<FILE>|<URL>] <DIR>]

         tar                              Manipulates (creates, lists or extracts) a tar file
         /xtract                          Extracts content from a tar file
         <FILE>                           Defines tar filename
PRIVILEGED EXEC MODE COMMANDS 3 - 11



 <URL>                           Sets the tar file URL
 <DIR>                           Specify a directory name. When used with /create, dir is the source directory for the tar
                                 file. When used with /xtract, dir is the destination file where contents of the tar file are
                                 extracted.
Examples
How to zip the folder flash:/log/?
rfs7000-37FABE#archive tar /create flash:/out.tar flash:/log/
tar: Removing leading '/' from member names
flash/log/
flash/log/snmpd.log
flash/log/messages.log
flash/log/startup.log
flash/log/radius/
rfs7000-37FABE#dir flash:/
3 - 12 WiNG CLI Reference Guide


  3.1.3 boot
          Privileged Exec Mode Commands
        Specifies the image used after reboot
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        boot system [primary|secondary] {on <DEVICE-NAME>}
        Parameters
        • boot system [primary|secondary] {on <DEVICE-NAME>}

         system [primary|secondary]       Specifies the image used after a device reboot
                                          • primary – Uses a primary image after reboot
                                          • secondary – Uses a secondary image after reboot
         on <DEVICE-NAME>                 Optional. Specifies the primary or secondary image location on a specified device
                                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE#boot system primary on rfs7000-37FABE
        Updated system boot partition
        rfs7000-37FABE#
PRIVILEGED EXEC MODE COMMANDS 3 - 13


3.1.4 cd
       Privileged Exec Mode Commands
     Changes the current directory
     Supported in the following platforms:
        • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
     Syntax
     cd {<DIR>}
     Parameters
     • cd {<DIR>}

      <DIR>                            Optional. Changes the current directory to DIR. If a directory name is not provided, the
                                       system displays the current directory name.
     Examples

     rfs7000-37FABE#cd flash:/log/
     rfs7000-37FABE#pwd
     flash:/log/
     rfs7000-37FABE#
3 - 14 WiNG CLI Reference Guide


  3.1.5 change-passwd
          Privileged Exec Mode Commands
        Changes the password of a logged user. When this command is executed without any parameters, the password can be
        changed interactively.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        change-passwd {<OLD-PASSWORD> <NEW-PASSWORD>}
        Parameters
        • change passwd {<OLD-PASSWORD> <NEW-PASSWORD>}

         <OLD-PASSWORD>                   Optional. The password can also be changed interactively. To do so, press [Enter] after
         <NEW-PASSWORD>                   the command.
                                          • <OLD-PASSWORD> – Specify the password that needs to be changed
                                          • <NEW-PASSWORD> – Specify the password to change to
        Usage Guidelines
        A password must be from 1 - 64 characters.
        Examples
        rfs7000-37FABE#change-passwd
        Enter old password:
        Enter new password:
        Password for user 'admin' changed successfully
        Please write this password change to memory(write memory) to be persistent.
        rfs7000-37FABE#write memory
        OK
        rfs7000-37FABE#
PRIVILEGED EXEC MODE COMMANDS 3 - 15


3.1.6 clear
        Privileged Exec Mode Commands
     Clears parameters, cache entries, table entries, and other entries. The clear command is available for specific commands
     only. The information cleared using this command varies depending on the mode where the clear command is executed.
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000

                     NOTE: Refer to the interface details below when using clear
                     • ge <index> – RFS4000 supports 5GEs, RFS6000 supports 8 GEs and RFS7000 supports
                       4GEs
                     • me1 – Available in both RFS7000 and RFS6000 - up1 - Uplink interface on RFS4000

     Syntax
     clear [arp-cache|cdp|counters|crypto|event-history|firewall|
       ip|lldp|spanning-tree]

     clear arp-cache {on <DEVICE-NAME>}

     clear [cdp|lldp] neighbors {on <DEVICE-NAME>}
     clear counters [all|bridge|router|thread]
     clear counters interface [<INTERFACE>|all|ge <1-4>|me1|
        port-channel <1-2>|vlan <1-4094>]


     clear crypto [ipsec|isakmp] sa [<IP>|all] {on <DEVICE-NAME>}

     clear event-history

     clear firewall [dhcp snoop-table|dos stats|flows] {on <DEVICE-NAME>}

     clear ip dhcp bindings [<IP>|all] {on <DEVICE-NAME>}

     clear spanning-tree detected-protocols {interface |on <DEVICE-NAME>}
     clear spanning-tree detected-protocols {interface [<INTERFACE>|
       ge <1-4>|me1|port-channel <1-2>|vlan <1-4094>]} {on <DEVICE-NAME}
3 - 16 WiNG CLI Reference Guide


        Parameters
        • clear arp-cache {on <DEVICE-NAME>}

         arp-cache                    Clears Address Resolution Protocol (ARP) cache entries on an AP or wireless controller
         on <DEVICE-NAME>             Optional. Clears ARP cache entries on a specified device
                                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • clear [cdp|lldp] neighbors {on <DEVICE-NAME>}

         cdp                          Clears Cisco Discovery Protocol (CDP) table entries
         ldp                          Clears Link Layer Discovery Protocol (LLDP) neighbor table entries
         neighbors                    Clears CDP or LLDP neighbor table entries based on the option selected in the
                                      preceding step
         on <DEVICE-NAME>             Optional. Clears CDP or LLDP neighbor table entries on a specified device
                                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • clear counters [all|bridge|router|thread]

         counters                     Clears counters on a system
         [all|bridge|router|thread]   • all – Clears all counters irrespective of the interface type
                                      • bridge – Clears bridge counters
                                      • router – Clears router counters
                                      • thread – Clears per-thread counters

        • clear counters interface [<INTERFACE>|all|ge <1-4>|me1|port-channel <1-2>|
        vlan <1-4094>]

         counters interface           Clears interface counters for a specified interface
         [<INTERFACE>|all|ge <1-4>|   • <INTERFACE> – Clears a specified interface counters. Specify the interface name.
         me1|port-channel <1-2>|
                                      • all – Clears all interface counters
         vlan <1-4094>]
                                      • ge – Clears GigabitEthernet interface counters. Specify the GigabitEthernet
                                         interface index from 1 - 4.
                                      • me1 – Clears FastEthernet interface counters
                                      • port-channel – Clears port-channel interface counters. Specify the port channel
                                         interface index from 1 - 2.
                                      • vlan – Clears interface counters. Specify the Switch Virtual Interface (SVI) VLAN ID
                                         from 1 - 4094.

        • clear crypto [ipsec|isakmp] sa [<IP>|all] {on <DEVICE-NAME>}

         crypto                       Clears encryption module database
         ipsec sa                     Clears Internet Protocol Security (IPSec) database security associations (SAs)
         isakmp sa                    Clears Internet Security Association and Key Management Protocol (ISAKMP)
                                      database SAs
PRIVILEGED EXEC MODE COMMANDS 3 - 17



[<IP>|all]              The following are common to the IPSec and ISAKMP parameters:
                        • Clears IPSec or ISAKMP SAs for a certain peer
                        • Clears IPSec or ISAKMP SAs for all peers
on <DEVICE-NAME>        Optional. Clears IPSec or ISAKMP SA entries on a specified device
                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• clear event-history

event-history           Clears event history cache entries

• clear ip dhcp bindings [<IP>|all]

ip                      Clears Dynamic Host Configuration Protocol (DHCP) server IP address bindings
dhcp bindings           Clears DHCP connections and server bindings
                        • bindings – Clears DHCP address binding entries
<IP>                    Clears DHCP address binding entries on a specified DHCP server. Specify the DHCP
                        server IP address.
all                     Clears DHCP address binding entries on all DHCP servers

• clear firewall [dhcp snoop-table|dos stats|flows] {on <DEVICE-NAME>}

firewall                Clears firewall event entries
DHCP snoop-table        Clears DHCP snoop table entries
dos stats               Clears denial of service statistics
flows                   Clears established firewall sessions
on <DEVICE-NAME>        The following are common to the DHCP, DOS, and flows parameters:
                        • on <DEVICE-NAME> – Optional. Clears DHCP snoop table entries, denial of service
                          statistics, or the established firewall sessions on a specified device
                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• clear spanning-tree detected-protocols {on <DEVICE-NAME>}

spanning-tree           Clears spanning tree protocols on an interface, and also restarts protocol migration
detected-protocols      Restarts protocol migration
on <DEVICE-NAME>        Optional. Clears spanning tree protocols on a specified device
                        • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller.

• clear spanning-tree detected-protocols {interface [<INTERFACE>|ge <1-4>|me1|
port-channel <1-2>|vlan <1-4094>]} {on <DEVICE-NAME>}

spanning-tree           Clears spanning tree protocols on an interface, and also restarts protocol migration
detected-protocols      Restarts protocol migration
3 - 18 WiNG CLI Reference Guide



         interface [<INTERFACE>|   Optional. Clears spanning tree protocols on specified interfaces
         ge <1-4|me1|              • <INTERFACE> – Clears information on a specified interface. Specify the interface
         port-channel <1-2>|         name.
         vlan <1-4094>]
                                   • ge <1-4> – Clears a GigabitEthernet interface. Specify the GigabitEthernet
                                     interface index from 1- 4.
                                   • me1 – Clears a FastEthernet interface (up1 - Clears the uplink interface)
                                   • port-channel <1-2> – Clears a port channel interface. Specify the port channel
                                     index from 1 - 2.
                                   • vlan <1-4094> – Clears a VLAN interface. Specify a Switch Virtual Interface (SVI)
                                     VLAN ID from 1 - 4094.
         on <DEVICE-NAME>          The following parameters are common to all interfaces:
                                   • on <DEVICE-NAME. – Optional. Clears spanning tree protocol entries on a
                                     specified device
                                     • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE>clear crypto isakmp sa 111.222.333.01 on rfs7000-37FABE
        rfs7000-37FABE>

        rfs7000-37FABE>clear event-history
        rfs7000-37FABE>

        rfs7000-37FABE>clear spanning-tree detected-protocols interface port-channel 1 on
        rfs7000-37FABE
        rfs7000-37FABE>

        rfs7000-37FABE>clear ip dhcp bindings 172.16.10.9 on rfs7000-37FABE
        rfs7000-37FABE>

        rfs7000-37FABE#clear cdp neighbors on rfs7000-37FABE
        rfs7000-37FABE#

        RFS4000-880DA7#clear spanning-tree detected-protocols interface ge 1
        RFS4000-880DA7#

        RFS4000-880DA7#clear lldp neighbors
        RFS4000-880DA7#
PRIVILEGED EXEC MODE COMMANDS 3 - 19


3.1.7 clock
        Privileged Exec Mode Commands
     Sets a device’s system clock
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     clock set <HH:MM:SS> <1-31> <MONTH> <1993-2035> {on <DEVICE-NAME>}
     Parameters
     clock set <HH:MM:SS> <1-31> <MONTH> <1993-2035> {on <DEVICE-NAME>}

      clock set                         Sets a device’s system clock
      <HH:MM:SS>                        Sets the current time (in military format hours, minutes and seconds)
      <1-31>                            Sets the numerical day of the month
      <MONTH>                           Sets the month of the year (Jan to Dec)
      <1993-2035>                       Sets a valid four digit year from 1993 - 2035
      on <DEVICE-NAME>                  Optional. Sets the clock on a specified device
                                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
     Examples
     rfs7000-37FABE#clock set 10:07:00 29 JUL 2011
     rfs7000-37FABE#

     rfs7000-37FABE#show clock
     2011-07-29 10:07:36 UTC
     rfs7000-37FABE#
3 - 20 WiNG CLI Reference Guide


  3.1.8 cluster
           Privileged Exec Mode Commands
        Initiates the cluster context. The cluster context provides centralized management to configure all cluster members from
        any one member.
        Commands executed under this context are executed on all members of the cluster.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        cluster start-selection
        Parameters
        • cluster start-selection

         start-selection                   Starts a new cluster master election
        Examples
        rfs7000-37FABE#cluster start-election
        rfs7000-37FABE#
PRIVILEGED EXEC MODE COMMANDS 3 - 21


3.1.9 configure
        Privileged Exec Mode Commands
     Enters the configuration mode. Use this command to enter the current device’s configuration mode, or enable configuration
     from the terminal.
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     configure {self|terminal}
     Parameters
     • configure {self|terminal}

      self                              Optional. Enables the current device’s configuration mode
      terminal                          Optional. Enables configuration from the terminal
     Examples
     rfs7000-37FABE#configure self
     Enter configuration commands, one per line. End with CNTL/Z.
     rfs7000-37FABE(config-device-00-15-70-37-FA-BE)#
     rfs7000-37FABE#configure terminal
     Enter configuration commands, one per line.                       End with CNTL/Z.
     rfs7000-37FABE(config)#
3 - 22 WiNG CLI Reference Guide


3.1.10 connect
          Privileged Exec Mode Commands
        Begins a console connection to a remote device using the remote device’s MiNT ID or name
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        connect [mint-id <MINT-ID>|<REMOTE-DEVICE-NAME>]
        Parameters
        • connect [mint-id <MINT-ID>|<REMOTE-DEVICE-NAME>]

         mint-id <MINT-ID>                 Connects to a remote system using the MiNT ID
                                           • <MINT-ID> – Specify the remote device MiNT ID.
         <REMOTE-DEVICE-NAME>              Connects to a remote system using its name
                                           • <REMOTE-DEVICE-NAME> – Specify the remote device name.
        Examples
        rfs7000-37FABE#connect RFDOMAIN_UseCase1/RFS7000-37FAAA
        Entering character mode
        Escape character is '^]'.
        RFS7000 release 5.2.2.0-048B
        rfs7000-37FABE login: admin
        Password:
        Welcome to CLI
        RFS7000-37FAAA>

        rfs7000-37FABE#show mint lsp-db
        2 LSPs in LSP-db of 01.42.14.79:
        LSP 01.42.14.79 at level 1, hostname "RFS6000-421479", 1 adjacencies, seqnum 5069
        LSP 01.44.54.C0 at level 1, hostname "ap650-4454C0", 1 adjacencies, seqnum 5265

        rfs7000-37FABE>connect mint-id 01.44.54.C0
        Entering character mode
        Escape character is '^]'.
        AP650 release 5.2.2.0-026D
        ap650-4454C0 login:
PRIVILEGED EXEC MODE COMMANDS 3 - 23


3.1.11 copy
         Privileged Exec Mode Commands
      Copies a file (config,log,txt...etc) from any location to the wireless controller and vice-versa
                      NOTE: Copying a new config file onto an existing running-config file merges it with the existing
                      running-config on the wireless controller. Both the existing running-config and the new config file are
                      applied as the current running-config.
                      Copying a new config file onto a start-up config files replaces the existing start-up config file with the
                      parameters of the new file. It is better to erase the existing start-up config file and then copy the new
                      config file to the startup config.
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      copy [<SOURCE-FILE>|<SOURCE-URL>] [<DESTINATION-FILE>|<DESTINATION-URL>]
      Parameters
      • copy [<SOURCE-FILE>|<SOURCE-URL>] [<DESTINATION-FILE>|<DESTINATION-URL>]

       <SOURCE-FILE>                     Specify the source file to copy
       <SOURCE-URL>                      Specify the source file URL
       <DESTINATION-FILE>                Specify the destination file to copy to
       <DESTINATION-URL>                 Specify the destination file URL
      Examples
      Transferring file snmpd.log to remote tftp server.
      rfs7000-37FABE#copy flash:/log/snmpd.log
      tftp://157.235.208.105:/snmpd.log
      Accessing running-config file from remote tftp server into switch running-config.
      rfs7000-37FABE#copy tftp://157.235.208.105:/running-config running-config
3 - 24 WiNG CLI Reference Guide


3.1.12 crypto
          Privileged Exec Mode Commands
        Enables RSA Keypair management. Use this command to generate, delete, export, or import a RSA Keypair. It encrypts the
        RSA Keypair before an export operation. This command also enables Public Key Infrastructure (PKI) management.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        crypto [key|pki]
        crypto key [export|generate|import|zeroise]

        crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL>
           {background|on|passphrase}
        crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background}
          {on <DEVICE-NAME>}
        crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {passphrase
           <KEY-PASSPHRASE>} {background} {on <DEVICE-NAME>}
        crypto key generate rsa <RSA-KEYPAIR-NAME> <1024-2048>{on <DEVICE-NAME>}

        crypto key import rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL>
           {background|on|passphrase}
        crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL>
           {background} {on <DEVICE-NAME>}
        crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL> passphrase
           <KEY-PASSPHRASE> {background} {on <DEVICE-NAME>}
        crypto key zeroise rsa <RSA-KEYPAIR-NAME> {force} {on <DEVICE-NAME>}


        crypto pki [authenticate|export|generate|import|zeroise]

        crypto pki authenticate <TRUST-POINT> <URL> {background{on <DEVICE-NAME>}|
           on <DEVICE-NAME>}

        crypto pki export [request|trustpoint]

        crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME>
           autogen-subject-name [<EXPORT-TO-URL>, email <SEND-TO-EMAIL>, fqdn <FQDN>,
           ip-address <IP>]
        crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME>
           autogen-subject-name <EXPORT-TO-URL> {background {on <DEVICE-NAME>}|
           on <DEVICE-NAME>}
        crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-
           NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION>
           <ORGANIZATION-UNIT> [<EXPORT-TO-URL>, email <SEND-TO-EMAIL>, fqdn <FQDN>,
           ip-address <IP>]
PRIVILEGED EXEC MODE COMMANDS 3 - 25



crypto pki export trustpoint <TRUSTPOINT-NAME> <EXPORT-TO-URL> {background
  {on <DEVICE-NAME>}|on <DEVICE-NAME>|passphrase <KEY-PHRASE> {background
  {on <DEVICE-NAME>}|on <DEVICE-NAME>}}

crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|
  use-rsa-key] <RSA-KEYPAIR-NAME> [autogen-subject-name|subject-name]

crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|
  use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name {email <SEND-TO-EMAIL>,
  fqdn <FQDN>, ip-address <IP>, on <DEVICE-NAME>}
crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|
  use-rsa-key] <WORD> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY>
  <ORGANIZATION> <ORGANIZATION-UNIT> {email <SEND-TO-EMAIL>, fqdn <FQDN>,
  ip-address <IP>, on <DEVICE-NAME>}

crypto pki import [certificate|crl|trustpoint]

crypto pki import [certificate|crl] <TRUSTPOINT-NAME> <IMPORT-FROM-URL>
  {background {on <DEVICE-NAME>}|on <DEVICE-NAME>}]

crypto pki import trustpoint <TRUSTPOINT-NAME> <IMPORT-FROM-URL>
  {background {on <DEVICE-NAME>}|on <DEVICE-NAME>|passphrase <word>
  {background {on <DEVICE-NAME>}|on <DEVICE-NAME>}

crypto pki zeroise trustpoint <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}|
  on <DEVICE-NAME>}
Parameters
• crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {on <DEVICE-NAME>}

 key                        Enables RSA Keypair management. Use this command to export, import, generate, or
                            delete a RSA key.
 export rsa <RSA-KEYPAIR-   Exports a RSA Keypair to a specified destination
 NAME>                      • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
 <EXPORT-TO-URL>            Specify the RSA Keypair destination address in the following format:
 {on <DEVICE-NAME>}            tftp://<hostname|IP>[:port]/path/file
                               ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                               sftp://<user>@<hostname|IP>[:port]>/path/file
                               http://<hostname|IP>[:port]/path/file
                               cf:/path/file
                               usb1:/path/file
                               usb2:/path/file
                            • on <DEVICE-NAME> – Optional. Performs the export operation on a specified device
                              • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background}
{on <DEVICE-NAME>}

 key                        Enables RSA Keypair management. Use this command to export, import, generate, or
                            delete a RSA key.
3 - 26 WiNG CLI Reference Guide



         export rsa               Exports a RSA Keypair to a specified destination
         <RSA-KEYPAIR-NAME>       • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
         <EXPORT-TO-URL>          Specify the RSA Keypair destination address in the following format:
         {background}                 tftp://<hostname|IP>[:port]/path/file
         {on <DEVICE-NAME>}
                                      ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                      sftp://<user>@<hostname|IP>[:port]>/path/file
                                      http://<hostname|IP>[:port]/path/file
                                      cf:/path/file
                                      usb1:/path/file
                                      usb2:/path/file
                                  • background – Optional. Performs the export operation in the background
                                    • on <DEVICE-NAME> – Optional. Performs the export operation on a specified
                                    device
                                       • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL>
        {passphrase <KEY-PASSPHRASE> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>}

         key                      Enables RSA Keypair management. Use this command to export, import, generate, or
                                  delete a RSA key.
         export rsa               Exports a RSA Keypair to a specified destination
                                  • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
         <EXPORT-TO-URL>          Specify the RSA Keypair destination address in the following format:
         {passphrase}                tftp://<hostname|IP>[:port]/path/file
         <KEY-PASSPHRASE>
                                     ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                     sftp://<user>@<hostname|IP>[:port]>/path/file
                                     http://<hostname|IP>[:port]/path/file
                                     cf:/path/file
                                     usb1:/path/file
                                     usb2:/path/file
                                  • passphrase – Optional. Encrypts RSA Keypair before exporting it
                                    • <KEY-PASSPHRASE> – Specify a passphrase to encrypt the RSA Keypair.
         on <DEVICE-NAME>         Optional. Performs the export operation on a specified device
                                  • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        • crypto key generate rsa <RSA-KEYPAIR-NAME> <1024-2048> {on <DEVICE-NAME>}

         key                      Enables RSA Keypair management. Use this command to export, import, generate, or
                                  delete a RSA key.
PRIVILEGED EXEC MODE COMMANDS 3 - 27



generate rsa                Generates a new RSA Keypair
<RSA-KEYPAIR-NAME>          • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
<1024-2048>                   • <1024-2048> – Specify the size of the RSA key in bits from 1024 - 2048.
on <DEVICE-NAME>            Optional. Generates a new RSA Keypair on a specified device
                            • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• crypto key import rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {on <DEVICE-NAME>}

key                         Enables RSA Keypair management. Use this command to export, import, generate, or
                            delete a RSA key.
import rsa                  Imports a RSA Keypair from a specified source
<RSA-KEYPAIR-NAME>          • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
<IMPORT-TO-URL>             Specify the RSA Keypair source address in the following format:
{on <DEVICE-NAME>}              tftp://<hostname|IP>[:port]/path/file
                                ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                sftp://<user>@<hostname|IP>[:port]>/path/file
                                http://<hostname|IP>[:port]/path/file
                                cf:/path/file
                                usb1:/path/file
                                usb2:/path/file
                            • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device
                              • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
• crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-TO-URL> {background}
{on <DEVICE-NAME>}

key                         Enables RSA Keypair management. Use this command to export, import, generate, or
                            delete a RSA key.
import rsa                  Imports a RSA Keypair from a specified source
<RSA-KEYPAIR-NAME>          • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
<IMPORT-TO-URL>             Specify the RSA Keypair source address in the following format:
{background} {on <DEVICE-      tftp://<hostname|IP>[:port]/path/file
NAME>}
                               ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                               sftp://<user>@<hostname|IP>[:port]>/path/file
                               http://<hostname|IP>[:port]/path/file
                               cf:/path/file
                               usb1:/path/file
                               usb2:/path/file
                            • background – Optional. Performs the import operation in the background
                              • on <DEVICE-NAME> – Optional. Performs the import operation on a specified
                              device
                                 • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
3 - 28 WiNG CLI Reference Guide


        • crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-TO-URL> {passphrase <KEY-
        PASSPHRASE>} {background {on <DEVICE-NAME>}|on <DEVICE-NAME>}

         key                        Enables RSA Keypair management. Use this command to export, import, generate, or
                                    delete a RSA key.
         import rsa                 Decrypts and imports RSA Keypair from a specified source
         <RSA-KEYPAIR-NAME>         • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
         <IMPORT-TO-URL>            Specify the RSA Keypair source address in the following format:
         {passphrase}                   tftp://<hostname|IP>[:port]/path/file
         <KEY-PASSPHRASE>
                                        ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                        sftp://<user>@<hostname|IP>[:port]>/path/file
                                        http://<hostname|IP>[:port]/path/file
                                        cf:/path/file
                                        usb1:/path/file
                                        usb2:/path/file
                                    • passphrase – Optional. Decrypts RSA Keypair before importing it
                                      • <KEY-PASSPHRASE> – Specify the passphrase to decrypt the RSA Keypair.
         on <DEVICE-NAME>           Optional. Performs the import operation on a specified device
                                    • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • crypto key zeroise <RSA-KEYPAIR-NAME> {force} {on <DEVICE-NAME>}

         key                        Enables RSA Keypair management. Use this command to export, import, generate, or
                                    delete a RSA key.
         zeroise rsa                Deletes a specified RSA Keypair
         <RSA-KEYPAIR-NAME>         • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
         force {on <DEVICE-NAME>}   Optional. Forces deletion of all certificates associated with the RSA Keypair
                                    • on <DEVICE-NAME> – Optional. Forces deletion of all certificates on a specified
                                      device
                                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • crypto pki authenticate <TRUSTPOINT-NAME> <URL> {background {on <DEVICE-NAME>}|
        on <DEVICE-NAME>}

         pki                        Enables Private Key Infrastructure (PKI) management. Use this command to
                                    authenticate, export, generate, or delete a trustpoint and its associated Certificate
                                    Authority (CA) certificates.
         authenticate               Authenticates a CA certificate
         <TRUSTPOINT-NAME>          • <TRUSTPOINT-NAME> – Specify the trustpoint name.
PRIVILEGED EXEC MODE COMMANDS 3 - 29



<URL>                      Specify the CA certificate location in the following format:
                              tftp://<hostname|IP>[:port]/path/file
                              ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                              sftp://<user>@<hostname|IP>[:port]>/path/file
                              http://<hostname|IP>[:port]/path/file
                              cf:/path/file
                              usb1:/path/file
                              usb2:/path/file
background                 Optional. Performs authentication in the background
{on <DEVICE-NAME>}         • on <DEVICE-NAME> – Optional. Performs authentication on a specified device
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
on <DEVICE-NAME>           Optional. Performs authentication on a specified device
                           • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• crypto pki request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME>
autogen-subject-name [<EXPORT-TO-URL>|email <SEND-TO-EMAIL>|fqdn <FQDN>|
ip-address <IP>]

pki                        Enables PKI management. Use this command to authenticate, export, generate, or
                           delete a trustpoint and its associated CA certificates.
request                    Sends a Certificate Signing Request (CSR) to the CA for digital identity certificate. The
                           CSR contains the applicant’s details and the RSA Keypair’s public key.
[generate-rsa-key|         Generates a new RSA Keypair or uses an existing RSA Keypair
use-rsa-key]               • generate-rsa-key – Generates a new RSA Keypair for digital authentication
<RSA-KEYPAIR-NAME>
                           • use-rsa-key – Uses an existing RSA Keypair for digital authentication
                             • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it.
                             If an existing RSA Keypair, specify its name.
autogen-subject-name       Auto generates the subject name from configuration parameters. The subject name
                           helps to identify the certificate.
<EXPORT-TO-URL>            Specify the CSR destination address in the following format:
{background {on <DEVICE-      tftp://<hostname|IP>[:port]/path/file
NAME}|on <DEVICE-NAME>}
                              ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                              sftp://<user>@<hostname|IP>[:port]>/path/file
                              http://<hostname|IP>[:port]/path/file
                              cf:/path/file
                              usb1:/path/file
                              usb2:/path/file
                           • background – Optional. Performs the export operation in the background
                             • on <DEVICE-NAME> – Optional. Performs the export operation on a specified
                             device
                                • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
3 - 30 WiNG CLI Reference Guide



         email <SEND-TO-EMAIL>      Exports CSR to a specified e-mail address
                                    • <SEND-TO-EMAIL> – Specify the e-mail address of the CA.
         fqdn <FQDN>                Exports CSR to a specified Fully Qualified Domain Name (FQDN)
                                    • <FQDN> – Specify the FQDN of the CA.
         ip address <IP>            Exports CSR to a specified device or system
                                    • <IP> – Specify the IP address of the CA.

        • crypto pki request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME>
        subject-name <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT>
        [<EXPORT-TO-URL>, email <SEND-TO-EMAIL>, fqdn <FQDN>, ip-address <IP>

         pki                        Enables PKI management. Use this command to authenticate, export, generate, or
                                    delete a trustpoint and its associated CA certificates.
         request                    Sends a CSR to the CA for digital identity certificate. The CSR contains the applicant’s
                                    details and the RSA Keypair’s public key
         [generate-rsa-key|         Generates a new RSA Keypair, or uses an existing RSA Keypair
         use-rsa-key]               • generate-rsa-key – Generates a new RSA Keypair for digital authentication
         <RSA-KEYPAIR-NAME>
                                    • use-rsa-key – Uses an existing RSA Keypair for digital authentication
                                      • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it.
                                      If using an existing RSA Keypair, specify its name.
         subject-name               Specify a subject name to identify the certificate.
         <COMMON-NAME>              • <COMMON-NAME> – Specify the common name used with the CA certificate. The
                                      name should enable you to identify the certificate easily.
         <COUNTRY>                  Sets the deployment country name (2 character ISO code)
         <STATE>                    Sets the state name (2 to 64 characters)
         <CITY>                     Sets the city name (2 to 64 characters)
         <ORGANIZATION>             Sets the organization name (2 to 64 characters)
         <ORGANIZATION-UNIT>        Sets the organization unit (2 to 64 characters)
         <EXPORT-TO-URL>            Specify the CSR destination address in the following format:
         {background {on <DEVICE-       tftp://<hostname|IP>[:port]/path/file
         NAME}|on <DEVICE-NAME>}
                                        ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                        sftp://<user>@<hostname|IP>[:port]>/path/file
                                        http://<hostname|IP>[:port]/path/file
                                        cf:/path/file
                                        usb1:/path/file
                                         usb2:/path/file
                                    • background – Optional. Performs the export operation in the background
                                      • on <DEVICE-NAME> – Optional. Performs the export operation on a specified
                                      device
                                         • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
PRIVILEGED EXEC MODE COMMANDS 3 - 31



email <SEND-TO-EMAIL>      Exports CSR to a specified e-mail address
                           • <SEND-TO-EMAIL> – Specify the e-mail address of the CA.
fqdn <FQDN>                Exports CSR to a specified FQDN
                           • Specify the FQDN of the CA.
ip address <IP>            Exports the CSR to a specified device or system
                           • Specify the IP address of the CA.

• crypto pki trustpoint <TRUSTPOINT-NAME> <EXPORT-TO-URL> {background {on <DEVICE-
NAME>}|on <DEVICE-NAME>|passphrase <KEY-PASSPHRASE> background {on <DEVICE-NAME>}|
on <DEVICE-NAME>}}

pki                        Enables PKI management. Use this command to authenticate, export, generate, or
                           delete a trustpoint and its associated CA certificates.
trustpoint                 Exports trustpoint CA certificate, Certificate Revocation List (CRL), server certificate,
<TRUSTPOINT-NAME>          and private key
                           • <TRUSTPOINT-NAME> – Specify the trustpoint name.
<EXPORT-TO-URL>            Specify the destination address in the following format:
                              tftp://<hostname|IP>[:port]/path/file
                              ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                              sftp://<user>@<hostname|IP>[:port]>/path/file
                              http://<hostname|IP>[:port]/path/file
                              cf:/path/file
                              usb1:/path/file
                              usb2:/path/file
background                 Optional. Performs the export operation in the background
{on-DEVICE-NAME>}          • on <DEVICE-NAME> – Optional. Performs the export operation on a specified
                             device
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
on <DEVICE-NAME>           Optional. Performs the export operation on a specified device
                           • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
passphrase                 Optional. Encrypts key with a passphrase before exporting it
<KEY-PASSPHRASE>           • <KEY-PASSPHRASE> – Specify the passphrase.
{background {on <DEVICE-     • background – Optional. Performs the export operation in the background
NAME>}|                         • on <DEVICE-NAME> – Optional. Performs the export operation on a specified
on <DEVICE-NAME>                   device
                                   • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
• crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|
use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name {email <SEND-TO-EMAIL>|
fqdn <FQDN>|ip-address <IP>|on <DEVICE-NAME>}

pki                        Enables PKI management. Use this command to authenticate, export, generate, or
                           delete a trustpoint and its associated CA certificates.
generate                   Generates a CA certificate and a trustpoint
3 - 32 WiNG CLI Reference Guide



         self-signed                  Generates a self-signed CA certificate and a trustpoint
         <TRUSTPOINT-NAME>            • <TRUSTPOINT-NAME> – Specify a name for the certificate and its trustpoint.
         [generate-rsa-key|           Generates a new RSA Keypair, or uses an existing RSA Keypair
         use-rsa-key]                 • generate-rsa-key – Generates a new RSA Keypair for digital authentication
         <RSA-KEYPAIR-NAME>
                                      • use-rsa-key – Uses an existing RSA Keypair for digital authentication
                                        • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for
                                        it. If using an existing RSA Keypair, specify its name.
         autogen-subject-name         Auto generates the subject name from configuration parameters. The subject name
                                      helps to identify the certificate.
         email <SEND-TO-EMAIL>        Exports CSR to a specified e-mail address
                                      • <SEND-TO-EMAIL> – Specify the e-mail address of the CA.
         fqdn <FQDN>                  Exports CSR to a specified FQDN
                                      • <FQDN> – Specify the FQDN of the CA.
         ip-address <IP>              Exports CSR to a specified device or system
                                      • <IP> – Specify the IP address of the CA.
         on <DEVICE-NAME>             Exports the CSR on a specified device
                                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key|
        use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COMMON-NAME> <COUNTRY>
        <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> {email <SEND-TO-EMAIL>|
        fqdn <FQDN>|ip-address <IP>|on <DEVICE-NAME>}

         pki                          Enables PKI management. Use this command to authenticate, export, generate, or
                                      delete a trustpoint and its associated CA certificates.
         generate                     Generates a CA certificate and a trustpoint
         self-signed                  Generates a self-signed CA certificate and a trustpoint
         <TRUSTPOINT-NAME>            • <TRUSTPOINT-NAME> – Specify a name for the certificate and its trustpoint.
         [generate-rsa-key|use-rsa-   Generates a new RSA Keypair, or uses an existing RSA Keypair
         key] <RSA-KEYPAIR-NAME>      • generate-rsa-key – Generates a new RSA Keypair for digital authentication
                                      • use-rsa-key – Uses an existing RSA Keypair for digital authentication
                                        • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it.
                                        If using an existing RSA Keypair, specify its name.
         subject-name                 Enter a subject name to identify the certificate.
         <COMMON-NAME>                • <COMMON-NAME> – Specify the common name used with the CA certificate. The
                                        name should enable you to identify the certificate easily.
         <COUNTRY>                    Sets the deployment country name (2 character ISO code)
         <STATE>                      Sets the state name (2 to 64 characters)
         <CITY>                       Sets the city name (2 to 64 characters)
         <ORGANIZATION>               Sets the organization name (2 to 64 characters)
PRIVILEGED EXEC MODE COMMANDS 3 - 33



<ORGANIZATION-UNIT>     Sets the organization unit (2 to 64 characters)
email <SEND-TO-EMAIL>   Exports CSR to a specified e-mail address
                        • <SEND-TO-EMAIL> – Specify the e-mail address of the CA.
fqdn <FQDN>             Exports CSR to a specified FQDN
                        • <FQDN> – Specify the FQDN of the CA.
ip address <IP>         Exports the CSR to a specified device or system
                        • <IP> – Specify the IP address of the CA.

• crypto pki import [certificate|crl] <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background
{on <DEVICE-NAME>}|on <DEVICE--NAME>}

pki                     Enables PKI management. Use this command to authenticate, export, generate, or
                        delete a trustpoint and its associated CA certificates.
import                  Imports certificates, CRL, or a trustpoint to a selected device
[certificate|crl]       Imports a signed server certificate or a certificate revocation list
<TRUSTPOINT-NAME>       • certificate – Imports a signed server certificate
                        • crl – Imports a CRL
                          • <TRUSTPOINT-NAME> – Specify the trustpoint name (should be authenticated).
<IMPORT-FROM-URL>       Specify the signed server certificate or CRL source address in the following format:
                           tftp://<hostname|IP>[:port]/path/file
                           ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                           sftp://<user>@<hostname|IP>[:port]>/path/file
                           http://<hostname|IP>[:port]/path/file
                           cf:/path/file
                           usb1:/path/file
                           usb2:/path/file
background              Optional. Performs the import operation in the background
{on <DEVICE-NAME>}      • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device
                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
on <DEVICE-NAME>        Optional. Performs the import operation on a specified device
                        • <DEVICE-NAME> – Enter the name of the AP or wireless controller.

• crypto pki import trustpoint <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background {on
<DEVICE-NAME>}|on <DEVICE--NAME>}

pki                     Enables PKI management. Use this command to authenticate, export, generate, or
                        delete a trustpoint and its associated CA certificates.
import                  Imports certificates, CRL, or a trustpoint to the selected device
trustpoint              Imports a trustpoint and its associated CA certificate, server certificate, and private
<TRUSTPOINT-NAME>       key
                        • <TRUSTPOINT-NAME> – Specify the trustpoint name (should be authenticated).
3 - 34 WiNG CLI Reference Guide



         <IMPORT-FROM-URL>          Specify the trustpoint source address in the following format:
                                        tftp://<hostname|IP>[:port]/path/file
                                        ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                        sftp://<user>@<hostname|IP>[:port]>/path/file
                                        http://<hostname|IP>[:port]/path/file
                                        cf:/path/file
                                        usb1:/path/file
                                        usb2:/path/file
         background                 Optional. Performs the import operation in the background
         {on <DEVICE-NAME>}         • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device
                                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         on <DEVICE-NAME>           Optional. Performs the import operation on a specified device
                                    • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         passphrase                 Optional. Encrypts trustpoint with a passphrase before importing it
         <KEY-PASSPHRASE>           • <KEY-PASSPHRASE> – Specify a passphrase.
         {background {on <DEVICE-     • background – Optional. Imports encrypted trustpoint in the background
         NAME>}|                         • on <DEVICE-NAME> – Optional. Imports encrypted trustpoint on a specified
         on <DEVICE-NAME>}                  device
                                            • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        • crypto pki zeroise trustpoint <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}|
        on <DEVICE-NAME>}

         pki                        Enables PKI management. Use this command to authenticate, export, generate, or
                                    delete a trustpoint and its associated CA certificates
         zeroise                    Deletes a trustpoint and its associated CA certificate, server certificate, and private key
         <TRUSTPOINT-NAME>          • <TRUSTPOINT-NAME> – Specify the trustpoint name.
         del-key                    Optional. Deletes the private key associated with the server certificate
         {on <DEVICE-NAME>}         • on <DEVICE-NAME> – Optional. Deletes the private key on a specified device
                                      • <DEVICE-NAME> – Enter the name of the AP or wireless controller.
         on <DEVICE-NAME>           Optional. Deletes trustpoint on a specified device
                                    • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
PRIVILEGED EXEC MODE COMMANDS 3 - 35


Examples
rfs7000-37FABE#crypto key generate rsa key 1025
RSA Keypair successfully generated
rfs7000-37FABE#

rfs7000-37FABE#crypto key import rsa moto123 url passphrase word background on
rfs7000-37FABE
RSA key import operation is started in background
rfs7000-37FABE#

rfs7000-37FABE#crypto pki generate self-signed word generate-rsa-key word autogen-
subject-name fqdn word
Successfully generated self-signed certificate
rfs7000-37FABE#

rfs7000-37FABE#crypto pki zeroize trustpoint word del-key on rfs7000-37FABE
Successfully removed the trustpoint and associated certificates
%Warning: Applications associated with the trustpoint will start using default-
trustpoint
rfs7000-37FABE#
rfs7000-37FABE#crypto pki authenticate word url background on rfs7000-37FABE
Import of CA certificate started in background
rfs7000-37FABE#

rfs7000-37FABE#crypto pki import trustpoint word url passphrase word on rfs7000-37FABE
Import operaton started in background
rfs7000-37FABE#
Related Commands

no                       Resets or disables the crypto commands
3 - 36 WiNG CLI Reference Guide


3.1.13 delete
           Privileged Exec Mode Commands
        Deletes a specified file from the device’s file system
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        delete [/force <FILE>|/recursive <FILE>|<FILE>]
        Parameters
        • delete [/force <FILE>|/recursive <FILE>|<FILE>]

         /force                            Forces deletion without a prompt
         /recursive                        Performs a recursive delete
         <FILE>                            Specifies the filenames to delete
        Examples
        rfs7000-37FABE#delete flash:/out.tar flash:/out.tar.gz
        Delete flash:/out.tar [y/n]? y
        Delete flash:/out.tar.gz [y/n]? y

        rfs7000-37FABE#delete /force flash:/tmp.txt
        rfs7000-37FABE#

        rfs7000-37FABE#delete /recursive flash:/backup/
        Delete flash:/backup//fileMgmt_350_180B.core

        [y/n]? y
        Delete

        flash:/backup//fileMgmt_350_18212X.core_bk

        [y/n]? n

        Delete flash:/backup//imish_1087_18381X.core.gz

        [y/n]? n
        rfs7000-37FABE#
PRIVILEGED EXEC MODE COMMANDS 3 - 37


3.1.14 disable
        Privileged Exec Commands
      Turns off (disables) the privileged mode command set. This command returns to the User Executable mode.
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      disable
      Parameters
      None
      Examples
      rfs7000-37FABE#disable
      rfs7000-37FABE>
3 - 38 WiNG CLI Reference Guide


3.1.15 diff
           Privileged Exec Mode Commands
        Displays the differences between two files on a device’s file system or a particular URL
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        diff [<FILE>|<URL>] [<FILE>|<URL>]
        Parameters
        • diff [<FILE>|<URL>] [<FILE>|<URL>]

         FILE                              The first <FILE> is the source file for the diff. The second <FILE> is the file to compare it
                                           with.
         URL                               The first <URL> is the source URL for the file for the diff. The second <URL> is the URL
                                           of the file to compare it with.
        Examples
        rfs7000-37FABE#diff startup-config running-config
        --- startup-config
        +++ running-config
        @@ -1,3 +1,4 @@
        +!### show running-config
         !
         ! Configuration of RFS7000 version 5.2.2.0-048B
         !
        @@ -80,7 +81,6 @@
           excluded-address 172.16.10.9 172.16.10.10
           bootp ignore
         !
        -gui default
         !
         firewall-policy default
         !
        rfs7000-37FABE#
PRIVILEGED EXEC MODE COMMANDS 3 - 39


3.1.16 dir
          Privileged Exec Mode Commands
       Lists files on a device’s file system
       Supported in the following platforms:
          • AP300
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP71XX
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       dir {[/all|/recursive|<DIR>|all-filesystems]}
       Parameters
       • dir {[/all|/recursive|<DIR>|all-filesystems]}

        /all                              Optional. Lists all files
        /recursive                        Optional. Lists files recursively
        <DIR>                             Optional. Lists files in the named file path
        all-filesystems                   Optional. Lists files on all file systems
3 - 40 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE#dir
        Directory of flash:/.

          drwx             Thu Apr 29 12:36:29          2010   log
          -rw-   39        Tue Dec 29 11:41:00          2009   FILE
          drwx             Thu Apr 29 11:34:11          2010   crashinfo
          drwx             Sat Jan 1 00:00:25           2000   hotspot
          drwx             Mon Dec 14 14:09:39          2009   TestDir
          drwx             Fri Dec 11 15:38:25          2009   Testdir
        rfs7000-37FABE#
        rfs7000-37FABE#dir all-filesystems
        Directory of flash:/

          drwx              Thu   Apr   29   12:36:29   2010   log
          -rw-     39       Tue   Dec   29   11:41:00   2009   FILE
          drwx              Thu   Apr   29   11:34:11   2010   crashinfo
          drwx              Sat   Jan    1   00:00:25   2000   hotspot
          drwx              Mon   Dec   14   14:09:39   2009   TestDir
          drwx              Fri   Dec   11   15:38:25   2009   Testdir
        Directory of nvram:/

          -rw-     3460     Fri   Dec 11 14:42:44 2009         startup-config.save
          -rw-     1638     Tue   Jan 5 14:27:17 2010          startup-config-unused
          -rw-     3393     Mon   Dec 14 13:55:51 2009         startup-config.save.1
          -rw-     8059     Thu   Apr 29 12:36:27 2010         startup-config

        Directory of system:/

          drwx              Thu Apr 29 12:35:52 2010           proc

        rfs7000-37FABE#
PRIVILEGED EXEC MODE COMMANDS 3 - 41


3.1.17 edit
          Privileged Exec Mode Commands
       Edits a text file on the device’s file system
       Supported in the following platforms:
          • AP300
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP71XX
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       edit <FILE>
       Parameters
       • edit <FILE>

        <FILE>                            Specify the name of the file to modify.
       Examples
       rfs7000-37FABE#edit startup-config
         GNU nano 1.2.4     File: startup-config

       !
       ! Configuration of RFS7000 version 5.2.2.0-048B
       !
       ! version 2.0
       !
       !
       smart-rf-policy default
       !
       smart-rf-policy test
         enable
         calibration wait-time 4
       !
       wlan-qos-policy default
       !
       ^G Get Help ^O WriteOut ^R Read File ^Y Prev Page ^K Cut Text ^C Cur Pos
       ^X Exit       ^J Justify  ^W Where Is ^V Next Page ^U UnCut Txt ^T To Spell
3 - 42 WiNG CLI Reference Guide


3.1.18 enable
          Privileged Exec Mode Commands
        Turns on (enables) the privileged mode command set. This command does not do anything in the Privilege Executable
        mode.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        enable
        Parameters
        None
        Examples
        rfs7000-37FABE#enable
        rfs7000-37FABE#
PRIVILEGED EXEC MODE COMMANDS 3 - 43


3.1.19 erase
         Privileged Exec Mode Commands
      Erases a device’s file system
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      erase [cf:|flash:|nvram:|startup-config|usb1:]
      Parameters
      • erase [cf:|flash:|nvram:|startup-config|usb1:]

       cf:                            Erases everything in wireless controller cf:
       flash:                         Erases everything in wireless controller flash:
       nvram:                         Erases everything in wireless controller nvram:
       startup-config                 Erases the wireless controller’s startup configuration file. The startup configuration file is
                                      used to configure the device when it reboots.
       usb1:                          Erases everything in wireless controller usb1:
      Examples
      rfs7000-37FABE#erase startup-config
      Erase startup-config? (y/n): n
      rfs7000-37FABE#
3 - 44 WiNG CLI Reference Guide


3.1.20 exit
           Privileged Exec Mode Commands
        Ends the current CLI session and closes the session window
        For more information, see exit.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        exit
        Parameters
        None
        Examples
        rfs7000-37FABE#exit
PRIVILEGED EXEC MODE COMMANDS 3 - 45


3.1.21 format
         Privileged Exec Mode Commands
      Formats the device’s compact flash file system
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      format cf:
      Parameters
      • format cf:

       cf:                               Formats the compact flash file system
      Examples
      rfs7000-37FABE#format cf:

      Warning: This will destroy the contents of compact flash.
      Do you want to continue [y/n]? n

      rfs7000-37FABE#
3 - 46 WiNG CLI Reference Guide


3.1.22 halt
           Privileged Exec Mode Commands
        Stops (halts) a device or a wireless controller. Once halted, the system must be restarted manually.
        This command stops the device immediately. No indications or notifications are provided while the device shuts down.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        halt {on <DEVICE-NAME>}
        Parameters
        • halt {on <DEVICE-NAME>}

         halt {on <DEVICE-NAME>}           Optional. Halts a device or a wireless controller
                                           • <DEVICE-NAME> – Enter the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE#halt on rfs7000-37FABE
        rfs7000-37FABE#
PRIVILEGED EXEC MODE COMMANDS 3 - 47


3.1.23 join-cluster
         Privileged Exec Mode Commands
      Adds a wireless controller to an existing cluster of devices. Use this command to add a new wireless controller to an
      existing cluster. Before a wireless controller can be added to a cluster, a static address must be assigned to it.
      Supported in the following platforms:
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      join-cluster <IP> user <USERNAME> password <WORD> level [1|2]
      Parameters
      • join-cluster <IP> user <USERNAME> password <WORD> level [1|2]

       join-cluster                      Adds a new wireless controller to an existing cluster
       <IP>                              Specify the IP address of the cluster member.
       user <USERNAME>                   Specify a user account with super user privileges on the new cluster member
       password <WORD>                   Specify password for the account specified in the user parameter
       level [1|2]                       Configures the routing level
                                         • 1 – Configures level 1 routing
                                         • 2 – Configures level 2 routing
      Usage Guidelines
      To add a wireless controller to an existing cluster:
       • A static IP address must be configured on the wireless controller being added.
       • Username and password of one of the following accounts, superuser, network admin, system admin, or operator
         account for the new wireless controller must be provided.
      Once a wireless controller is added to the cluster, a manual “write memory” command must be executed. Without this
      command, the configuration will not persist across reboots.
      Examples
      rfs7000-37FABE#join-cluster 172.16.10.10 user admin password motorola
      Joining cluster at 172.16.10.10... Done
      Please execute “write memory” to save cluster configuration.

      rfs7000-37FABE#
3 - 48 WiNG CLI Reference Guide


3.1.24 logging
          Privileged Exec Mode Commands
        Modifies message logging settings
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        logging monitor {<0-7>|alerts|critical|debugging|emergencies|errors|
          informational|warnings|notifications}
        Parameters
        • logging monitor {<0-7>|alerts|critical|debugging|emergencies|errors|
        informational|warnings|notifications}

         monitor                            Sets terminal lines logging levels. The logging severity levels can be set from
                                            0 - 7. The system configures default settings, if no logging severity level is specified.
                                            • <0-7> – Optional. Enter the logging severity level from 0 - 7. The various levels and
                                               their implications are:
                                            • alerts – Optional. Immediate action needed (severity=1)
                                            • critical – Optional. Critical conditions (severity=2)
                                            • debugging – Optional. Debugging messages (severity=7)
                                            • emergencies – Optional. System is unusable (severity=0)
                                            • errors – Optional. Error conditions (severity=3)
                                            • informational – Optional.Informational messages (severity=6)
                                            • notifications – Optional. Normal but significant conditions (severity=5)
                                            • warnings – Optional. Warning conditions (severity=4)
        Examples
        rfs7000-37FABE#logging monitor warnings
         rfs7000-37FABE#

        rfs7000-37FABE#logging monitor 2
        rfs7000-37FABE#
        Related Commands

         no                                 Resets terminal lines logging levels
PRIVILEGED EXEC MODE COMMANDS 3 - 49


3.1.25 mkdir
         Privileged Exec Mode Commands
      Creates a new directory in the file system
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      mkdir <DIR>
      Parameters
      • mkdir <DIR>

       <DIR>                             Specify a directory name.
      Examples
      rfs7000-37FABE#dir
      Directory of flash:/.

        drwx             Fri Jul 8                 08:44:33     2011   log
        drwx             Wed Jul 28                19:01:08     2010   cache
        drwx             Fri Jul 8                 08:45:36     2011   crashinfo
        drwx             Sat Jan 1                 00:00:25     2000   hotspot
        drwx             Sat Jan 1                 00:00:09     2000   floorplans
      rfs7000-37FABE#mkdir testdir
      rfs7000-37FABE#dir
      Directory of flash:/.

        drwx                      Fri     Jul 8 08:44:33 2011          log
        drwx                      Wed     Jul 28 19:01:08 2010         cache
        drwx                      Fri     Jul 8 08:45:36 2011          crashinfo
        drwx                      Fri     Jul 8 08:45:36 2011          testdir
        drwx                      Sat     Jan 1 00:00:25 2000          hotspot
        drwx                      Sat     Jan 1 00:00:09 2000          floorplans
3 - 50 WiNG CLI Reference Guide


3.1.26 mint
          Privileged Exec Mode Commands
        Uses MiNT protocol to perform a ping and a traceroute to a remote device
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        mint [ping|traceroute]

        mint ping MINT-ID {count <1-60>|size <1-64000>|timeout <1-10>}
        mint traceroute MINT-ID {destination-port <1-65535>|max-hops <1-255>|
        source-port <1-65535>|timeout <1-255>}
        Parameters
        • mint ping MINT-ID {count <1-60>|size <1-64000>|timeout <1-10>}

         ping MINT-ID                     Sends a MiNT echo message to a MiNT destination
                                          • <MINT-ID> – Specify the MiNT destination ID to ping.
         count <1-60>                     Optional. Sets the number of times to ping the MiNT destination
                                          • <1-60> – Specify a value from 1 - 60. The default is 3.
         size <1-64000>                   Optional. Sets the MiNT payload size in bytes
                                          • <1-64000> – Specify a value from 1 - 640000 bytes. The default is 64 bytes.
         timeout <1-10>                   Optional. Sets a response time in seconds
                                          • <1-10> – Specify a value from 1 - 10 seconds. The default is 1 second.
        • mint traceroute MINT-ID {destination-port <1-65535>|max-hops <1-255>|
        source-port <1-65535>|timeout <1-255>}

         traceroute MINT-ID                Prints the route packets trace to a device
                                           • <MINT-ID> – Specify the MiNT destination ID.
         destination-port <1-65535>        Optional. Sets the Equal-cost Multi-path (ECMP) routing destination port
                                           • <1-65535> – Specify a value from 1 - 65535. The default port is 45.
         max-hops <1-255>                  Optional. Sets the maximum number of hops a traceroute packet traverses in the
                                           forward direction
                                           • <1-255> – Specify a value from 1 - 255. The default is 30.
PRIVILEGED EXEC MODE COMMANDS 3 - 51



source-port <1-65535>   Optional.Sets the ECMP source port
                        • <1-65535> – Specify a value from 1 - 65535. The default port is 45.
timeout <1-255>         Optional. Sets the minimum response time period
                        • <1-65535> – Specify a value from 1 - 255 seconds. The default is 30 seconds.
Examples
rfs7000-37FABE#mint ping 70.37.FA.BF count 20 size 128
MiNT ping 70.37.FA.BF with 128 bytes of data.
 Response from 70.37.FA.BF: id=1 time=0.292 ms
 Response from 70.37.FA.BF: id=2 time=0.206 ms
 Response from 70.37.FA.BF: id=3 time=0.184 ms
 Response from 70.37.FA.BF: id=4 time=0.160 ms
 Response from 70.37.FA.BF: id=5 time=0.138 ms
 Response from 70.37.FA.BF: id=6 time=0.161 ms
 Response from 70.37.FA.BF: id=7 time=0.174 ms
 Response from 70.37.FA.BF: id=8 time=0.207 ms
 Response from 70.37.FA.BF: id=9 time=0.157 ms
 Response from 70.37.FA.BF: id=10 time=0.153 ms
 Response from 70.37.FA.BF: id=11 time=0.159 ms
 Response from 70.37.FA.BF: id=12 time=0.173 ms
 Response from 70.37.FA.BF: id=13 time=0.156 ms
 Response from 70.37.FA.BF: id=14 time=0.209 ms
 Response from 70.37.FA.BF: id=15 time=0.147 ms
 Response from 70.37.FA.BF: id=16 time=0.203 ms
 Response from 70.37.FA.BF: id=17 time=0.148 ms
 Response from 70.37.FA.BF: id=18 time=0.169 ms
 Response from 70.37.FA.BF: id=19 time=0.164 ms
 Response from 70.37.FA.BF: id=20 time=0.177 ms

--- 70.37.FA.BF ping statistics ---
20 packets transmitted, 20 packets received, 0% packet loss
round-trip min/avg/max = 0.138/0.177/0.292 ms
3 - 52 WiNG CLI Reference Guide


3.1.27 more
           Privileged Exec Mode Commands
        Displays contents of a file on the device’s file system. This command navigates and displays specific files in the device’s
        file system. To do so, provide the complete path to the file.
        The more command also displays the startup configuration file.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        more <FILE>
        Parameters
        • more <FILE>

         <FILE>                            Specify the file name.
        Examples
        rfs7000-37FABE#more flash:/log/messages.log
        May 03 11:45:05 2010: %PM-6-PROCSTART: Starting process "/usr/sbin/dpd2"
        May 03 11:45:14 2010: %KERN-6-INFO: 0| ioctl.c:335 dev_dataplane_fw_ioctl DHCP trust
        of port 0 (ge1) set to 1 by 1021 cfgd.
        May 03 11:45:14 2010: %KERN-6-INFO: 0| ioctl.c:335 dev_dataplane_fw_ioctl DHCP trust
        of port 1 (ge2) set to 1 by 1021 cfgd.
        May 03 11:45:14 2010: %KERN-6-INFO: 0| ioctl.c:335 dev_dataplane_fw_ioctl DHCP trust
        of port 2 (ge3) set to 1 by 1021 cfgd.
        May 03 11:45:14 2010: %KERN-6-INFO: 0| ioctl.c:335 dev_dataplane_fw_ioctl DHCP trust
        of port 3 (ge4) set to 1 by 1021 cfgd.
        May 03 11:45:14 2010: %NSM-4-IFDOWN: Interface vlan1 is down
        May 03 11:45:14 2010: %NSM-4-IFUP: Interface vlan4 is up
        May 03 11:45:15 2010: %NSM-4-IFUP: Interface vlan44 is up
        May 03 11:45:15 2010: %NSM-4-IFDOWN: Interface vlan44 is down
        May 03 11:45:15 2010: %PM-6-PROCSTART: Starting process "/usr/sbin/lighttpd"
        May 03 11:45:15 2010: %FILEMGMT-5-HTTPSTART: lighttpd started in external mode with
        pid 0
        May 03 11:45:15 2010: %USER-5-NOTICE: FILEMGMT[1064]: FTP: ftp server stopped
        May 03 11:45:15 2010: %PM-6-PROCSTART: Starting process "/usr/sbin/telnetd"
        May 03 11:45:17 2010: %AUTH-6-INFO: sshd[1371]: Server listening on 0.0.0.0 port 22.
        May 03 11:45:17 2010: %AUTOINSTD-5-AUTOCLCONFDISAB: Autoinstall of cluster
        configuration is disabled
        May 03 11:45:17 2010: %AUTOINSTD-5-AUTOCONFDISAB: Autoinstall of startup configuration
        is disabled
        May 03 11:45:17 2010: %AUTOINSTD-5-AUTOIMAGEDISAB: Autoinstall of image upgrade is
        disabled
        May 03 11:45:18 2010: %KERN-6-INFO: dataplane enabled.
        rfs7000-37FABE#
PRIVILEGED EXEC MODE COMMANDS 3 - 53


3.1.28 no
           Privileged Exec Mode Commands
      Use the no command to revert a command or set parameters to their default. This command is useful to turn off an enabled
      feature or set defaults for a parameter.
      The no commands have their own set of parameters that can be reset.
      Supported in the following platforms:
         • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
      Syntax
      no [adoption|captive-portal|crypto|debug|logging|page|service|
        terminal|upgrade|wireless]

      no adoption {on <DEVICE-OR-DOMAIN-NAME>}
      no captive-portal client [captive-portal <CAPTIVE-PORTAL-NAME>|<MAC>] {on
        <DEVICE-OR-DOMAIN-NAME>}

      no crypto pki [server|trustpoint]
      no crypto pki [server|trustpoint] <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}|
        on <DEVICE-NAME>}

      no logging monitor

      no page

      no    service     [ap300|cli-tables-expand|locator|mint]
      no    service     ap300 locator <MAC>
      no    service     [cli-tables-expand <LINE>|locator {on <DEVICE-NAME>}]
      no    service     mint silence

      no terminal [length|width]
      no upgrade <PATCH-NAME> {on <DEVICE-NAME>}

      no    wireless      client    [all {filter|on}|<MAC>]
      no    wireless      client    all {filter} wlan <WLAN-NAME>
      no    wireless      client    all on <DEVICE-OR-DOMAIN-NAME> {filter} wlan <WLAN-NAME>
      no    wireless      client    <MAC> {on <DEVICE-OR-DOMAIN-NAME>}
      Parameters
      • no adoption {on <DEVICE-OR-DOMAIN-NAME>}

       no adoption                         Resets the adoption status of a specified device or all devices
       {on <DEVICE-OR-DOMAIN-              • <DEVICE-OR-DOMAIN-NAME> – Optional. Enter the name of the AP, wireless
       NAME>}                                controller, or RF Domain.
3 - 54 WiNG CLI Reference Guide


        • no captive-portal client [captive-portal <CAPTIVE-PORTAL-NAME>|<MAC>] {on <DEVICE-
        OR-DOMAIN-NAME>}

         no captive-portal client     Disconnects captive portal clients from the network
         captive-portal               Disconnects captive portal clients
         <CAPTIVE-PORTAL-NAME>        • <CAPTIVE-PORTAL-NAME> – Specify the captive portal name.
         <MAC>                        Disconnects a specified client
                                      • <MAC> – Specify the MAC address of the client.
         on <DEVICE-OR-DOMAIN-        Optional. Disconnects captive portal clients or a specified client on a specified device
         NAME>                        or RF Domain
                                      • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller,
                                         or RF Domain.

        • no crypto pki [server|trustpoint] <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}|
        on <DEVICE-NAME>}

         no crypto pki                Deletes all PKI authentications
         [server|trustpoint]          Deletes PKI authentications, such as server certificates and trustpoints
         <TRUSTPOINT-NAME>            • server – Deletes server certificates
                                      • trustpoint – Deletes a trustpoint and its associated certificates
                                      The following is common to the server and trustpoint parameters:
                                        • <TURSTPOINT-NAME> – Deletes a trustpoint or its server certificate. Specify
                                        the trustpoint name.
         del-key {on <DEVICE-NAME>}   Optional. Deletes the private key associated with a server certificate or trustpoint.
                                      The operation will fail if the private key is in use by other trustpoints.
                                      • on <DEVICE-NAME> – Deletes the private key on a specified device
                                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        • no logging monitor

         no logging monitor           Resets terminal lines message logging levels

        • no page

         no page                      Resets wireless controller paging function to its default. Disabling the “page”
                                      command displays the CLI command output at once, instead of page by page.
        • no service ap300 locator <MAC>

         no service                   Disables LEDs on AP300s or a specified device in the WLAN. It also resets the CLI
                                      table expand and MiNT protocol configurations.
         ap300 locator <MAC>          Disables LEDs on AP300s
                                      • <MAC> – Specify the MAC address of the AP300.
PRIVILEGED EXEC MODE COMMANDS 3 - 55


• no service [cli-tables-expand <LINE>|locator {on <DEVICE-NAME>}]

no service                   Disables LEDs on AP300s or a specified device in the WLAN. It also resets the CLI table
                             expand and MiNT protocol configurations.
cli-tables-expand <LINE>     Resets the expand configuration of the CLI table, so that the table does not expand in
                             the drop-down format
locator                      Disables LEDs on a specified device
{on <DEVICE-NAME>}           • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller.

• no service mint silence

no service mint silence      Disables LEDs on AP300s or a specified device in the WLAN. It also resets the CLI table
                             expand and MiNT protocol configurations.
                             • mint – Resets MiNT protocol configurations. Disables ping and traceroute
                                parameters
                                • silence – Disables MiNT echo messaging and tracing of route packets
• no upgrade <PATCH-NAME> {on <DEVICE-NAME>}

no upgrade <PATCH-NAME>      Removes a patch installed on a specified device
                             • <PATCH-NAME> – Specify the name of the patch.
on <DEVICE-NAME>             Optional. Removes a patch on a specified device
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• no terminal [length|width]

no terminal [length|width]   Resets the width of the terminal window, or the number of lines displayed within the
                             terminal window
                             • length – Resets the number of lines displayed on the terminal window to its default
                             • width – Resets the width of the terminal window to its default.
• no wireless client all {filter} wlan <WLAN-NAME>

no wireless client all       Disassociates all wireless clients on a specified device or domain
filter wlan <WLAN-NAME>      Optional. Specifies an additional client selection filter
                             • wlan – Filters clients based on the WLAN
                               • <WLAN-NAME> – Specify the WLAN name.
• no wireless client all on <DEVICE-OR-DOMAIN-NAME> {filter} wlan <WLAN-NAME>

no wireless client all on       Disassociates all clients on a specified device or domain
<DEVICE-OR-DOMAIN-NAME>         • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller,
                                   or RF Domain.
filter wlan <WLAN-NAME>         Optional. Specifies an additional client selection filter
                                • wlan – Filters clients based on the WLAN
                                  • <WLAN-NAME> – Specify the WLAN name.
3 - 56 WiNG CLI Reference Guide


        Usage Guidelines
        The no command negates any command associated with it. Wherever required, use the same parameters associated with
        the command getting negated.
        Examples
        rfs7000-37FABE#no adoption
        rfs7000-37FABE#

        rfs7000-37FABE#no page
        rfs7000-37FABE#

        rfs7000-37FABE#no service cli-tables-expand line
        rfs7000-37FABE#
        Related Commands

         adoption                     Resets the adoption state of a device and all devices adopted to it
         captive-portal               Manages captive portal clients
         debug                        Disables debug commands
         logging                      Modifies message logging settings
         page                         Resets wireless controller paging function to its default
         service                      Performs different functions depending on the parameter passed
         terminal                     Sets the length or the number of lines displayed within the terminal window
         upgrade                      Upgrades software image on a device
         wireless-client              Manages wireless clients
PRIVILEGED EXEC MODE COMMANDS 3 - 57


3.1.29 page
        Privileged Exec Mode Commands
      Toggles wireless controller paging. Enabling this command displays the CLI command output page by page, instead of
      running the entire output at once.
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      page
      Parameters
      None
      Examples
      rfs7000-37FABE#page
      rfs7000-37FABE#
      Related Commands

       no                               Disables wireless controller paging
3 - 58 WiNG CLI Reference Guide


3.1.30 ping
          Privileged Exec Mode Commands
        Sends Internet Controller Message Protocol (ICMP) echo messages to a user-specified location
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        ping [<IP>/HOSTNAME>]
        Parameters
        • ping [<IP>/HOSTNAME>]

         <IP>                             Optional. Specify the destination IP address to ping. When entered without any
                                          parameters, this command prompts for an IP.
         <HOSTNAME>                       Optional. Specify the destination hostname to ping. When entered without any
                                          parameters, this command prompts for a hostname.
        Examples
        rfs7000-37FABE#ping 172.16.10.3
        PING 172.16.10.3 (172.16.10.3): 100 data                    bytes
        108 bytes from 172.16.10.3: seq=0 ttl=64                    time=7.100     ms
        108 bytes from 172.16.10.3: seq=1 ttl=64                    time=0.390     ms
        108 bytes from 172.16.10.3: seq=2 ttl=64                    time=0.422     ms
        108 bytes from 172.16.10.3: seq=3 ttl=64                    time=0.400     ms

        --- 172.16.10.3 ping statistics ---
        4 packets transmitted, 4 packets received, 0% packet loss
        round-trip min/avg/max = 0.390/2.078/7.100 ms
        rfs7000-37FABE#
PRIVILEGED EXEC MODE COMMANDS 3 - 59


3.1.31 pwd
        Privileged Exec Mode Commands
      Displays the full path of the present working directory, similar to the UNIX pwd command
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      pwd
      Parameters
      None
      Examples
      rfs7000-37FABE#pwd
      flash:/
      rfs7000-37FABE#dir
      Directory of flash:/.

        drwx                     Fri    Jul 8 08:44:33 2011            log
        drwx                     Wed    Jul 28 19:01:08 2010           cache
        drwx                     Fri    Jul 8 08:45:36 2011            crashinfo
        drwx                     Sat    Jan 1 00:00:25 2000            hotspot
        drwx                     Sat    Jan 1 00:00:09 2000            floorplans

      rfs7000-37FABE#cd log
      rfs7000-37FABE#pwd
      flash:/log
      rfs7000-37FABE#
3 - 60 WiNG CLI Reference Guide


3.1.32 reload
          Privileged Exec Mode Commands
        Halts the wireless controller and performs a warm reboot of the device
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        reload {cancel|force|in|on}

        reload {on <DEVICE-OR-DOMAIN-NAME>}
        reload {cancel|force} {on <DEVICE-OR-DOMAIN-NAME>}

        reload {in} <1-999> {on <DEVICE-OR-DOMAIN-NAME>}
        Parameters
        • reload {on <DEVICE-OR-DOMAIN-NAME>}

         on <DEVICE-OR-DOMIN-             Optional. Performs reload on an AP, wireless controller, or RF Domain. Halts a system and
         NAME>                            performs a warm reboot
                                          • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                            RF Domain.

        • reload {cancel|force} {on <DEVICE-OR-DOMAIN-NAME>}

         cancel                           Optional. Cancels pending reloads
         force                            Optional. Forces reboot, while ignoring conditions like upgrade in progress, unsaved
                                          changes etc.
         on <DEVICE-OR-DOMAIN-            Optional. Cancels or forces a reload on an a specified device
         NAME>                            • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                            the RF Domain.
PRIVILEGED EXEC MODE COMMANDS 3 - 61


• reload {in} <1-999> {on <DEVICE-OR-DOMAIN-NAME>}

in <1-9999>             Schedules a reload after a specified time period
                        • <1-9999> – Specify the time from 1 - 999 minutes.
on <DEVICE-OR-DOMAIN-   Optional. Reloads on a specified device
NAME>                   • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                          RF Domain.
Examples
rfs7000-37FABE#reload force on rfs7000-37FABE
rfs7000-37FABE#
3 - 62 WiNG CLI Reference Guide


3.1.33 rename
           Privileged Exec Mode Commands
        Renames a file in the devices’ file system
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        rename <OLD-FILE-NAME> <NEW-FILE-NAME>
        Parameters
        • rename <OLD-FILE-NAME> <NEW-FILE-NAME>

         <OLD-FILE-NAME>                     Specify the file to rename
         <NEW-FILE-NAME>                     Specify the new file name
        Examples
        rfs7000-37FABE#dir
        Directory of flash:/.

          drwx                      Fri    Jul 8 08:44:33 2011            log
          drwx                      Fri    Jul 8 10:16:43 2011            test
          drwx                      Wed    Jul 28 19:01:08 2010           cache
          drwx                      Fri    Jul 8 08:45:36 2011            crashinfo
          drwx                      Sat    Jan 1 00:00:25 2000            hotspot
          drwx                      Sat    Jan 1 00:00:09 2000            floorplans

        rfs7000-37FABE#rename flash:/test/ testdir
        rfs7000-37FABE#dir
        Directory of flash:/.

          drwx                      Fri    Jul 8 08:44:33 2011            log
          drwx                      Wed    Jul 28 19:01:08 2010           cache
          drwx                      Fri    Jul 8 08:45:36 2011            crashinfo
          drwx                      Fri    Jul 8 10:16:43 2011            testdir
          drwx                      Sat    Jan 1 00:00:25 2000            hotspot
          drwx                      Sat    Jan 1 00:00:09 2000            floorplans
PRIVILEGED EXEC MODE COMMANDS 3 - 63


3.1.34 rmdir
         Privileged Exec Mode Commands
      Deletes an existing directory from the file system (only empty directories can be removed)
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      rmdir <DIR>
      Parameters
      • rmdir <DIR>

       rmdir <DIR>                       Specifies the directory name
      Examples
      rfs7000-37FABE#dir
      Directory of flash:/.

        drwx                      Fri    Jul 8 08:44:33 2011            log
        drwx                      Wed    Jul 28 19:01:08 2010           cache
        drwx                      Fri    Jul 8 08:45:36 2011            crashinfo
        drwx                      Fri    Jul 8 10:16:43 2011            testdir
        drwx                      Sat    Jan 1 00:00:25 2000            hotspot
        drwx                      Sat    Jan 1 00:00:09 2000            floorplans

      rfs7000-37FABE#
      rfs7000-37FABE#rmdir testdir
      rfs7000-37FABE#dir
      Directory of flash:/.

        drwx                      Fri    Jul 8 08:44:33 2011            log
        drwx                      Wed    Jul 28 19:01:08 2010           cache
        drwx                      Fri    Jul 8 08:45:36 2011            crashinfo
        drwx                      Sat    Jan 1 00:00:25 2000            hotspot
        drwx                      Sat    Jan 1 00:00:09 2000            floorplans
3 - 64 WiNG CLI Reference Guide


3.1.35 self
           Privileged Exec Mode Commands
        Displays the logged device’s configuration context
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        self
        Parameters
        None
        Examples
        rfs7000-37FABE#self
        Enter configuration commands, one per line. End with CNTL/Z.
        rfs7000-37FABE(config-device-00-15-70-37-FA-BE)#
PRIVILEGED EXEC MODE COMMANDS 3 - 65


3.1.36 ssh
         Privileged Exec Mode Commands
      Opens a Secure Shell (SSH) connection between two network devices
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      ssh [<IP/HOSTNAME>] [<USERNAME>]
      Parameters
      • ssh [<IP/HOSTNAME>] [<USERNAME>]

       [<IP>/<HOSTNAME>]                 Specify the IP address or hostname of the remote system.
       <USERNAME>                        Specify the name of the user requesting the SSH connection.
      Usage Guidelines
      To exit of the other device’s context, use the command that is relevant to that device.
      Examples
      rfs7000-37FABE#ssh 172.16.10.9 admin
      ssh: connect to host 172.16.10.9 port 22

      Entering character mode
      Escape character is '^]'.


      RFS7000 release 5.2.3.0-048B
      Login as 'cli' to access CLI.

      RFS7000 login: cli

      User Access Verification

      Username: admin
      Password:
      Welcome to CLI

      RFS7000>
3 - 66 WiNG CLI Reference Guide


3.1.37 telnet
           Privileged Exec Mode Commands
        Opens a Telnet session between two network devices
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        telnet <IP> {<TCP-PORT>}
        Parameters
        • telnet <IP> {<TCP-PORT>}

         <IP>                              Configures the remote system’s IP address. The Telnet session will be established
                                           between the connecting system and the remote system.
                                           • <IP> – Specify the remote system IP address.
         <TCP-PORT>                        Optional. Specify the Transmission Control Protocol (TCP) port.
        Usage Guidelines
        To exit of the other device’s context, use the command relevant to that device.
        Examples
        rfs7000-37FABE#telnet 172.16.10.2

        Entering character mode
        Escape character is '^]'.


        RFS7000 release 5.2.3.0-048B
        Login as 'cli' to access CLI.

        RFS7000 login: cli

        User Access Verification

        Username: admin
        Password:
        Welcome to CLI

        RFS7000>
PRIVILEGED EXEC MODE COMMANDS 3 - 67


3.1.38 terminal
        Privileged Exec Mode Commands
      Sets the number of characters per line, and the number of lines displayed within the terminal window
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      terminal [length|width] <0-512>
      Parameters
      • terminal [length|width] <0-512>

       length <0-512>                   Sets the number of lines displayed on a terminal window
                                        • <0-512> – Specify a value from 0 - 512.
       width <0-512>                    Sets the width or number of characters displayed on the terminal window
                                        • <0-512> – Specify a value from 0 - 512.
      Examples
      rfs7000-37FABE#terminal length 150
      rfs7000-37FABE#

      rfs7000-37FABE#terminal width 215
      rfs7000-37FABE#
      Related Commands

       no                               Resets the width of the terminal window or the number of lines displayed on a terminal
                                        window
3 - 68 WiNG CLI Reference Guide


3.1.39 time-it
          Privileged Exec Mode Commands
        Verifies the time taken by a particular command between request and response
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        time-it <COMMAND>
        Parameters
        • time-it <COMMAND>

         time-it <COMMAND>                Verifies the time taken by a particular command to execute and provide a result
                                          • <COMMAND> – Specify the command to time execution.
        Examples
        rfs7000-37FABE#time-it enable
        That took 0.00 seconds..
        rfs7000-37FABE#
PRIVILEGED EXEC MODE COMMANDS 3 - 69


3.1.40 traceroute
         Privileged Exec Mode Commands
      Traces the route to a defined destination
      Use ‘--help’ or ‘-h’ to display a complete list of parameters for the traceroute command
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      traceroute <LINE>
      Parameters
      • traceroute <LINE>

       <LINE>                            Traces route to a destination IP address or hostname
                                         • <LINE> – Specify a traceroute argument. For example, “service traceroute-h”.
      Examples
      rfs7000-37FABE#traceroute 172.16.10.2
      traceroute to 172.16.10.2 (172.16.10.2), 30 hops max, 38 byte packets
       1 172.16.10.1 (172.16.10.1) 3002.008 ms !H 3002.219 ms !H 3003.945 ms !H
      rfs7000-37FABE#
3 - 70 WiNG CLI Reference Guide


3.1.41 upgrade
          Privileged Exec Mode Commands
        Upgrades software image on a device
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        upgrade [<FILE>|<URL>]
        Parameters
        • upgrade [<FILE>|<URL>]

         <URL>                            Specify the target firmware image location in the following format:
                                             tftp://<hostname|IP>[:port]/path/file
                                             ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                             sftp://<user>:<passwd>@<hostname|IP>[:port]>/path/file
                                             http://<hostname|IP>[:port]/path/file
                                             cf:/path/file
                                             usb1:/path/file
                                             usb2:/path/file
         background                       Performs upgrade in the background
         on <DEVICE-NAME>                 Optional. Upgrades the software image on a remote AP or wireless controller
                                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE#upgrade tftp://157.235.208.105:/img
        var2 is 10 percent full
        /tmp is 2 percent full
        Free Memory 161896 kB
        FWU invoked via Linux shell
        Running from partition /dev/hda5, partition to
        rfs7000-37FABE#upgrade tftp://157.125.208.235/img
        Running from partition /dev/mtdblock7, partition to update is /dev/mtdblock6
        Related Commands

         no                               Removes a patch installed on a specified device
PRIVILEGED EXEC MODE COMMANDS 3 - 71


3.1.42 upgrade-abort
        Privileged Exec Mode Commands
      Aborts an ongoing software image upgrade
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      upgrade-abort {on <DEVICE-OR-DOMAIN-NAME>}
      Parameters
      • upgrade-abort {on <DEVICE-OR-DOMAIN-NAME>}

       upgrade-abort                    Aborts an ongoing software image upgrade
       on <DEVICE-OR-DOMAIN-            Optional. Aborts an ongoing software image upgrade on a specified device
       NAME>                            • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                          RF Domain.
      Examples
      rfs7000-37FABE#upgrade-abort on rfs7000-37FABE
      Error: No upgrade in progress
      rfs7000-37FABE#
3 - 72 WiNG CLI Reference Guide


3.1.43 watch
          Privileged Exec Mode Commands
        Repeats a specified CLI command at periodic intervals
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        watch <1-3600> <LINE>
        Parameters
        • watch <1-3600> <LINE>

         watch <1-3600>                   Repeats a CLI command at a specified interval
         <1-3600>                         Select an interval from 1- 3600 seconds. Pressing CTRL-Z halts execution of the
                                          command
         <LINE>                           Specify the CLI command name.
        Examples
        rfs7000-37FABE#watch 1 show clock
        rfs7000-37FABE#
CHAPTER 4 GLOBAL CONFIGURATION
          COMMANDS
  This chapter summarizes the global-configuration commands in the CLI command structure.
  The term global indicates characteristics or features effecting the system as a whole. Use the Global Configuration Mode
  to configure the system globally, or enter specific configuration modes to configure specific elements (such as interfaces
  or protocols). Use the configure terminal command (under PRIV EXEC) to enter the global configuration mode.
  The example below describes the process of entering the global configuration mode from the privileged EXEC mode:
  rfs7000-37FABE# configure terminal
  rfs7000-37FABE(config)#



                  NOTE: The system prompt changes to indicate you are now in the global configuration
                  mode. The prompt consists of the device host name followed by (config) and a pound
                  sign (#).


  Commands entered in the global configuration mode update the running configuration file as soon as they are entered.
  However, these changes are not saved in the startup configuration file until a commit write memory command is issued.
  rfs7000-37FABE(config)#?
  Global Configuration commands:
    aaa-policy                Configure a
                              authentication/accounting/authorization policy
    advanced-wips-policy      Configure a advanced-wips policy
    AP300                     Configure an AP300
    AP621                     AP621 access point
    AP650                     AP650 access point
    AP6511                    AP6511 access point
    AP6521                    AP6521 access point
    AP6532                    AP6532 access point
    AP71XX                    AP71XX access point
    association-acl-policy    Configure an association acl policy
    auto-provisioning-policy Configure an auto-provisioning policy
    captive-portal            Configure a captive portal
    clear                     Clear
    critical-resource-policy Create a critical resource monitoring policy
    customize                 Customize the output of summary cli commands
    device                    Configuration on multiple devices
    device-categorization     Configure a device categorization object
    dhcp-server-policy        DHCP server policy
    dns-whitelist             Configure a whitelist
    event-system-policy       Configure a event system policy
    firewall-policy           Configure firewall policy
4-2   WiNG CLI Reference Guide


         help                      Description of the interactive help system
         host                      Enter the configuration context of a device by
                                   specifying its hostname
         igmp-snoop-policy         Create igmp snoop policy
         ip                        Internet Protocol (IP)
         mac                       MAC configuration
         management-policy         Configure a management policy
         mint-policy               Configure the global mint policy
         nac-list                  Configure a network access control list
         no                        Negate a command or set its defaults
         password-encryption       Encrypt passwords in configuration
         profile                   Profile related commands - if no parameters are
                                   given, all profiles are selected
         radio-qos-policy          Configure a radio quality-of-service policy
         radius-group              Configure radius user group parameters
         radius-server-policy      Create device onboard radius policy
         radius-user-pool-policy   Configure Radius User Pool
         rf-domain                 Create a RF Domain or enter rf-domain context for
                                   one or more rf-domains
         RFS4000                   RFS4000 wireless controller
         RFS6000                   RFS6000 wireless controller
         RFS7000                   RFS7000 wireless controller
         role-policy               Role based firewall policy
         self                      Config context of the device currently logged into
         smart-rf-policy           Configure a Smart-RF policy
         wips-policy               Configure a wips policy
         wlan                      Create a new WLAN or enter WLAN configuration
                                   context for one or more WLANs
         wlan-qos-policy           Configure a wlan quality-of-service policy
         write                     Write running configuration to memory or terminal

         clrscr                    Clears the display screen
         commit                    Commit all changes made in this session
         do                        Run commands from Exec mode
         end                       End current mode and change to EXEC mode
         exit                      End current mode and down to previous mode
         revert                    Revert changes
         service                   Service Commands
         show                      Show running system information

       rfs7000-37FABE(config)#
GLOBAL CONFIGURATION COMMANDS                4-3



4.1 Global Configuration Commands
   Table 4.1 summarizes Global configuration commands
                                                     Table 4.1 Global Config Commands

           Command                                       Description                                  Reference
    aaa-policy            Configures a AAA policy                                                  page 4-6
    advanced-wips-        Configures an advanced WIPS policy                                       page 4-7
    policy
    ap300                 Adds a AP300 to the wireless controller managed network, and creates a   page 4-8
                          general profile for the access point
    ap621                 Adds a AP621 to the wireless controller managed network                  page 4-9
    ap650                 Adds a AP650 to the wireless controller managed network                  page 4-10
    ap6511                Adds a AP6511 to the wireless controller managed network                 page 4-11
    ap6521                Adds a AP6511 to the wireless controller managed network                 page 4-12
    ap6532                Adds a AP6532 to the wireless controller managed network                 page 4-13
    ap71xx                Adds a AP7131 or AP7161 to the wireless controller managed network       page 4-14
    association-acl-      Configures an association ACL policy                                     page 4-15
    policy
    auto-provisioning-    Configures an auto provisioning policy                                   page 4-16
    policy
    captive portal        Configures a captive portal                                              page 4-18
    clear                 Clears the event history                                                 page 4-37
    critical-resource-    Configures a critical resource policy                                    page 4-38
    policy
    customize             Customizes the CLI command summary output                                page 4-44
    device                Specifies configuration on multiple devices                              page 4-51
    device-               Configures a device categorization object                                page 4-53
    categorization
    dhcp-server-policy    Configures a DHCP server policy                                          page 4-60
    dns-whitelist         Configures a DNS whitelist                                               page 4-62
    do                    Runs commands from the EXEC mode                                         page 4-66
    event-system-policy   Configures an event system policy                                        page 4-78
    firewall-policy       Configures a firewall policy                                             page 4-101
    host                  Sets the system's network name                                           page 4-102
    igmp-snoop-policy     Configures an IGMP snoop policy                                          page 4-103
4-4   WiNG CLI Reference Guide


                                                           Table 4.1 Global Config Commands

               Command                                         Description                                 Reference
        ip                     Configures Internet Protocol (IP) components                             page 4-105
        mac                    Configures MAC access lists (goes to the MAC Access Control List (ACL)   page 4-107
                               mode)
        management-policy      Configures a management policy                                           page 4-109
        mint-policy            Configures a MiNT security policy                                        page 4-110
        nac-list               Configures a network ACL                                                 page 4-112
        no                     Negates a command or sets its default                                    page 4-117
        password-              Enables password encryption                                              page 4-119
        encryption
        profile                Configures profile related commands                                      page 4-120
        radio-qos-policy       Configures a radio qos policy                                            page 4-124
        radius-group           Configures a RADIUS group                                                page 4-125
        radius-server-policy   Configures a RADIUS server policy                                        page 4-126
        radius-user-pool-      Configures a RADIUS user pool policy                                     page 4-127
        policy
        rf-domain              Creates a RF Domain                                                      page 4-129
        rfs4000                Adds a RFS4000 wireless controller to a network                          page 4-153
        rfs6000                Adds a RFS6000 wireless controller to a network                          page 4-154
        rfs7000                Adds a RFS7000 wireless controller to a network                          page 4-155
        role-policy            Configures a role policy                                                 page 4-156
        self                   Displays a logged device’s configuration context                         page 4-157
        smart-rf-policy        Configures a Smart RF policy                                             page 4-158
        wips-policy            Configures a WIPS policy                                                 page 4-159
        wlan                   Configures a wireless WLAN                                               page 4-161
        wlan-qos-policy        Configures a WLAN QoS policy                                             page 4-213
        clrscr                 Clears the display screen                                                page 5-3
        commit                 Commits (saves) changes made in the current session                      page 5-4
        end                    Ends and exits the current mode and moves to the PRIV EXEC mode          page 5-5
        exit                   Ends the current mode and moves to the previous mode                     page 5-6
        help                   Displays the interactive help system                                     page 5-7
        revert                 Reverts changes to their last saved configuration                        page 5-13
GLOBAL CONFIGURATION COMMANDS         4-5


                                      Table 4.1 Global Config Commands

    Command                                Description                           Reference
service       Invokes service commands to troubleshoot or debug (config-if)   page 5-14
              instance configurations
show          Displays running system information                             page 6-4
write         Writes information to memory or terminal                        page 5-42
4-6   WiNG CLI Reference Guide


 4.1.1 aaa-policy
          Global Configuration Commands
       Configures an Authentication, Accounting, and Authorization (AAA) policy. This policy configures multiple servers for
       authentication and authorization. Up to six servers can be configured for providing AAA services.
       Supported in the following platforms:
          • AP300
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP71XX
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       aaa-policy <AAA-POLICY-NAME>
       Parameters
       • aaa-policy <AAA-POLICY-NAME>

        <AAA-POLICY-NAME>                 Specify the AAA policy name. If the policy does not exist, it is created.
       Examples
       rfs7000-37FABE(config)#aaa-policy test
       rfs7000-37FABE(config-aaa-policy-test)#
       Related Commands

        no                                Resets values or disables commands



                        NOTE: For more information on the AAA policy commands, see Chapter 8, AAA-POLICY.
GLOBAL CONFIGURATION COMMANDS                          4-7


4.1.2 advanced-wips-policy
       Global Configuration Commands
     Configures advanced WIPS policy parameters. The Wireless Intrusion Prevention System (WIPS) prevents unauthorized
     access to a managed network.
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     advanced-wips-policy <ADVANCED-WIPS-POLICY-NAME>
     Parameters
     • advanced-wips-policy <ADVANCED-WIPS-POLICY-NAME>

      <ADVANCED-WIPS-POLICY-           Specify the advanced WIPS policy name. If the policy does not exist, it is created.
      NAME>
     Examples
     rfs7000-37FABE(config)#advanced-wips-policy test
     rfs7000-37FABE(config-advanced-wips-policy-test)#
     Related Commands

      no                               Resets values or disables commands



                     NOTE: For more information on WIPS, see Chapter 10, ADVANCED-WIPS-POLICY.
4-8   WiNG CLI Reference Guide


 4.1.3 ap300
          Global Configuration Commands
       Adds a AP300 access point to the wireless controller managed network. If a profile for the AP is not available, a new profile
       is created.
       Supported in the following platforms:
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       ap300 {<MAC>|enter}
       Parameters
       • ap300 {<MAC>|enter}

        <MAC>                             Optional. Specify the MAC address of the AP300.
                                          When the ap300 command is issued without any parameters, the default AP300 profile is
                                          configured.
        enter                             Optional. Creates a AP300 general profile
       Examples
       rfs7000-37FABE(config)#AP300 11-22-33-44-55-66 ?
       rfs7000-37FABE(config-AP300-11-22-33-44-55-66)#

       rfs7000-37FABE(config)#show wireless ap configured
       +-----+-----------------+---------------------+------------------+--------
       | IDX |       NAME      |         MAC         |     PROFILE      | RF-DOMAIN                                         |
       +-----+-----------------+---------------------+------------------+--------
       | 1   | AP7131-889EC4   | 00-15-70-88-9E-C4   | default-AP7131   | default                                           |
       | 2   | AP300-445566    | 11-22-33-44-55-66   | default-AP300    | default                                           |
       +-----+-----------------+---------------------+------------------+--------
       rfs7000-37FABE(config)#
       Related Commands

        no                                Resets values or disables commands
GLOBAL CONFIGURATION COMMANDS                          4-9


4.1.4 ap621
        Global Configuration Commands
     Adds a AP621 access point to the wireless controller managed network. If a profile for the AP is not available, a new profile
     is created.
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     ap621 <MAC>
     Parameters
     • ap621 <MAC>

      <MAC>                             Specify the MAC address of the AP621.
     Examples
     rfs7000-37FABE(config)#ap621 11-22-33-44-55-66 ?
     rfs7000-37FABE(config-device-11-22-33-44-55-66)#

     rfs7000-37FABE(config)#show wireless ap configured
     +-----+-----------------+---------------------+------------------+--------
     | IDX |       NAME      |         MAC         |     PROFILE      | RF-DOMAIN                                         |
     +-----+-----------------+---------------------+------------------+--------
     | 1   | AP7131-889EC4   | 00-15-70-88-9E-C4   | default-AP7131   | default                                           |
     | 2   | AP621-23456     | 11-22-33-44-55-66   | default-AP621    | default                                           |
     +-----+-----------------+---------------------+------------------+--------
     rfs7000-37FABE(config)#
     Related Commands

      no                                Resets values or disables commands
4 - 10 WiNG CLI Reference Guide


  4.1.5 ap650
           Global Configuration Commands
        Adds a AP650 access point to the wireless controller managed network. If a profile for the AP is not available, a new profile
        is created.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        ap650 <MAC>
        Parameters
        • ap650 <MAC>

         <MAC>                             Specify the MAC address of the AP650.
        Examples
        rfs7000-37FABE(config)#ap650 11-22-33-44-55-66 ?
        rfs7000-37FABE(config-device-11-22-33-44-55-66)

        rfs7000-37FABE(config)#show wireless ap configured
        +-----+-----------------+---------------------+------------------+--------
        | IDX |       NAME      |         MAC         |     PROFILE      | RF-DOMAIN                                         |
        +-----+-----------------+---------------------+------------------+--------
        | 1   | AP7131-889EC4   | 00-15-70-88-9E-C4   | default-AP7131   | default                                           |
        | 2   | AP650-445566    | 11-22-33-44-55-66   | default-AP650    | default                                           |
        +-----+-----------------+---------------------+------------------+--------
        rfs7000-37FABE(config)#
        Related Commands

         no                                Resets values or disables commands
GLOBAL CONFIGURATION COMMANDS 4 - 11


4.1.6 ap6511
        Global Configuration Commands
     Adds a AP6511 access point to the wireless controller network. If a profile for the AP is not available, a new profile is
     created.
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     ap6511 <MAC>
     Parameters
     • ap6511 <MAC>

      <MAC>                             Specify the MAC address of the AP6511.
     Examples
     rfs7000-37FABE(config)#ap6511 00-17-70-88-9E-C4 ?
     rfs7000-37FABE(config-device-00-17-70-88-9E-C4)#
     Related Commands

      no                                Resets values or disables commands
4 - 12 WiNG CLI Reference Guide


  4.1.7 ap6521
           Global Configuration Commands
        Adds a AP6521 access point to the wireless controller network. If a profile for the AP is not available, a new profile is
        created.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        ap6521 <MAC>
        Parameters
        • ap6521 <MAC>

         <MAC>                         Specify the MAC address of the AP6521.
        Examples
        rfs7000-37FABE(config)#AP6521 77-88-99-01-F0-AB ?
        rfs7000-37FABE(config-device-77-88-99-01-F0-AB)#
        Related Commands

         no                            Resets values or disables commands
GLOBAL CONFIGURATION COMMANDS 4 - 13


4.1.8 ap6532
        Global Configuration Commands
     Adds a AP6532 access point to the wireless controller network. If a profile for the AP is not available, a new profile is
     created.
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     ap6532 <MAC>
     Parameters
     • ap6532 <MAC>

      <MAC>                       Specify the MAC address of the AP6532.
     Examples
     rfs7000-37FABE(config)#AP6532 00-27-70-89-9F-E4 ?
     rfs7000-37FABE(config-device-00-27-70-89-9F-E4)#
     Related Commands

      no                          Resets values or disables commands
4 - 14 WiNG CLI Reference Guide


  4.1.9 ap71xx
           Global Configuration Commands
        Adds a AP71XX series access point to the wireless controller network. If a profile for the AP is not available, a new profile
        is created.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        ap71xx <MAC>
        Parameters
        • ap71xx <MAC>

         <MAC>                         Specify the MAC address of the AP71XX.
        Examples
        rfs7000-37FABE(config)#AP71XX 00-15-70-88-9E-C4
        rfs7000-37FABE(config-device-00-15-70-88-9E-C4)#
        Related Commands

         no                            Resets values or disables commands
GLOBAL CONFIGURATION COMMANDS 4 - 15


4.1.10 association-acl-policy
         Global Configuration Commands
      Configures an association ACL policy. This policy configures a list of devices allowed or denied access to the wireless
      controller managed network.
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      association-acl-policy <ASSOCIATION-ACL-POLICY-NAME>
      Parameters
      • association-acl-policy <ASSOCIATION-ACL-POLICY-NAME>

       <ASSOCIATION-ACL-                 Specify the association ACL policy name. If the policy does not exist, it is created.
       POLICY-NAME>
      Examples
      rfs7000-37FABE(config)#association-acl-policy test
      rfs7000-37FABE(config-assoc-acl-test)#
      Related Commands

       no                                Resets values or disables commands



                       NOTE: For more information on the association-acl-policy, see Chapter 11,
                       ASSOCIATION-ACL-POLICY.
4 - 16 WiNG CLI Reference Guide


4.1.11 auto-provisioning-policy
           Global Configuration Commands
        Configures an auto provisioning policy. This policy is used to configure the automatic provisioning of device adoption. The
        policy configures how an AP is adopted based on its type.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        auto-provisioning-policy <AUTO-PROVISIONING-POLICY>
        Parameters
        • auto-provisioning-policy <AUTO-PROVISIONING-POLICY>

         <AUTO-PROVISIONING-               Specify the auto provisioning policy name. If the policy does not exist, it is created.
         POLICY>
        Examples
        rfs7000-37FABE(config)#auto-provisioning-policy test
        rfs7000-37FABE(config-auto-provisioning-policy-test)#

        Related Commands

         no                                Resets values or disables commands



                         NOTE: For more information on the association-acl-policy, see Chapter 9, AUTO-
                         PROVISIONING-POLICY.
GLOBAL CONFIGURATION COMMANDS 4 - 17


4.1.12 captive portal
         Global Configuration Commands
      The captive portal mode configures a hotspot. Table 4.2 lists the command to enter the captive portal configuration mode.
                                                       Table 4.2 Captive-Portal Commands

          Command                                       Description                                        Reference
       captive-portal        Configures captive portal Web page parameters                           page 4-18
4 - 18 WiNG CLI Reference Guide


4.1.12.1 captive-portal
           captive portal
        Configures a captive portal. A captive portal is a hotspot type guest WLAN where users access wireless controller
        resources.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        captive-portal <CAPTIVE-PORTAL>
        Parameters
        • captive-portal <CAPTIVE-PORTAL>

         <CAPTIVE-PORTAL>                 Specify the captive portal name. If the captive portal does not exist, it is created.
        Examples
        rfs7000-37FABE(config)#captive-portal testportal
        rfs7000-37FABE(config-captive-portal-testportal)#
        Related Commands

         no                               Resets values or disables commands
GLOBAL CONFIGURATION COMMANDS 4 - 19


4.1.12.2 captive-portal-mode commands
       Table 4.3 summarizes captive portal mode commands
                                                     Table 4.3 Captive-Portal-Mode Commands

               Command                                         Description                                        Reference
        access-time          Defines a client’s access time. It is used when no session time is defined in the   page 4-20
                             RADIUS response
        access-type          Configures a captive portal’s access type                                           page 4-21
        accounting           Enables a captive portal’s accounting records                                       page 4-22
        connection-mode      Configures a captive portal’s connection mode                                       page 4-23
        custom-auth          Configures custom user information                                                  page 4-24
        inactivity-timeout   Defines an inactivity timeout in seconds                                            page 4-25
        no                   Resets or disables captive portal commands                                          page 4-26
        server               Configures the captive portal server parameter                                      page 4-30
        simultaneous-        Specifies a username used by a MAC address pool                                     page 4-31
        users
        terms-agreement      Enforces the user to agree to terms and conditions (included in login page) for     page 4-32
                             captive portal access
        use                  Defines captive portal configuration settings                                       page 4-33
        webpage-location     Specifies the location of Web pages used for captive portal authentication          page 4-34
        webpage              Configures captive portal Web page parameters                                       page 4-35
        clrscr               Clears the display screen                                                           page 5-3
        commit               Commits (saves) changes made in the current session                                 page 5-4
        do                   Runs commands from EXEC mode                                                        page 4-66
        end                  Ends and exits the current mode and moves to the PRIV EXEC mode                     page 5-5
        exit                 Ends the current mode and moves to the previous mode                                page 5-6
        help                 Displays the interactive help system                                                page 5-7
        revert               Reverts changes to their last saved configuration                                   page 5-13
        service              Invokes service commands to troubleshoot or debug (config-if) instance              page 5-14
                             configurations
        show                 Displays running system information                                                 page 6-4
        write                Writes information to memory or terminal                                            page 5-42
4 - 20 WiNG CLI Reference Guide


4.1.12.2.1 access-time
           captive-portal-mode commands
        Defines the permitted access time for a client. It is used when no session time is defined in the RADIUS response.
        Supported in the following platforms:
           • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
        Syntax
        access-time <30-10080>
        Parameters
        • access-time <30-10080>

          <30-10080>                       Defines the access time allowed for a wireless client from 30 - 10080 minutes
        Examples
        rfs7000-37FABE(config-captive-portal-test)#access-time 35
        rfs7000-37FABE(config-captive-portal-test)#
        Related Commands

          no                               Resets or disables captive portal commands
GLOBAL CONFIGURATION COMMANDS 4 - 21


4.1.12.2.2 access-type
            captive-portal-mode commands
         Defines the captive portal access type
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         access-type [custom-auth-radius|logging|no-auth|radius]
         Parameters
         • access-type [custom-auth-radius|logging|no-auth|radius]

          custom-auth-radius               Verifies custom user information for authentication
          logging                          Generates a logging record of users and allowed access
          no-auth                          Configures a no authentication required for a guest (redirected to welcome message)
          radius                           Enables RADIUS authentication for wireless clients
         Examples
         rfs7000-37FABEE(config-captive-portal-test)#access-type radius
         rfs7000-37FABE(config-captive-portal-test)#

         rfs7000-37FABE(config-captive-portal-testportal)#access-type logging
         rfs7000-37FABE(config-captive-portal-testportal)#
         Related Commands

          no                               Resets or disables captive portal commands
4 - 22 WiNG CLI Reference Guide


4.1.12.2.3 accounting
            captive-portal-mode commands
         Enables accounting records for a captive portal
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         accounting [radius|syslog]

         accounting radius

         accounting syslog host <IP/HOSTNAME> {port <1-65535>}
         Parameters
         • accounting radius

          radius                           Enables support for RADIUS accounting messages

         • accounting syslog host <IP/HOSTNAME> {port <1-65535>}

          syslog                           Enables support for syslog accounting messages
          host <IP/HOSTNAME>               • host <IP/HOSTNAME> – Specifies the syslog server host address. Specify the IP
                                             address or hostname of the syslog server.
          port <1-65535>                   Optional. Specifies the syslog server’s listener port
                                           • <1-65535> – Specify the UDP port from 1- 65535.
         Examples
         rfs7000-37FABE(config-captive-portal-test)#accounting syslog host 172.16.10.13 port 1
         rfs7000-37FABE(config-captive-portal-test)#
         Related Commands

          no                                Resets or disables captive portal commands
GLOBAL CONFIGURATION COMMANDS 4 - 23


4.1.12.2.4 connection-mode
          captive-portal-mode commands
        Configures a captive portal’s connection mode. HTTP uses plain unsecured connection for user requests. HTTPS uses
        encrypted connection to support user requests.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        connection-mode [http|https]
        Parameters
        connection-mode [http|https]

         http                            Sets HHTP as the default connection mode
         https                           Sets HHTPS as the default connection mode
                                         HTTPS is a more secure version of HTTP, and uses encryption while sending and receiving
                                         requests
        Examples
        rfs7000-37FABE(config-captive-portal-test)#connection-mode https
        rfs7000-37FABE(config-captive-portal-test)#
        Related Commands

         no                              Resets or disables captive portal commands
4 - 24 WiNG CLI Reference Guide


4.1.12.2.5 custom-auth
           captive-portal-mode commands
        Configures custom user information when authenticating with the RADIUS server
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        custom-auth info <LINE>
        Parameters
        • custom-auth info <LINE>

         info <LINE>                      Configures information used for RADIUS lookup when custom auth radius access type
                                          is configured
                                          • <LINE> – Guest data needs to be provided. Specify the name, e-mail address and
                                             telephone number of the user.
        Examples
        rfs7000-37FABE(config-captive-portal-test)#custom-auth info testuser
        robert@symbol.com
        rfs7000-37FABE(config-captive-portal-test)#

        rfs7000-37FABE(config-captive-portal-testportal)#custom-auth info bob,
        bob@symbol.com, 9902833119
        rfs7000-37FABE(config-captive-portal-testportal)#show context
        captive-portal testportal
         access-type logging
         custom-auth info bob, bob@symbol.com, 9902833119
        rfs7000-37FABE(config-captive-portal-testportal)#
        Related Commands

         no                               Resets or disables captive portal commands
GLOBAL CONFIGURATION COMMANDS 4 - 25


4.1.12.2.6 inactivity-timeout
            captive-portal-mode commands
         Defines an inactivity timeout in seconds. If a frame is not received from a client for the specified time interval, the current
         session is terminated.
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         inactivity-timeout <300-1800>
         Parameters
         • inactivity-timeout <300-1800>

          <300-1800>                       Defines the duration of inactivity after which a captive portal session is automatically
                                           terminated. Set a timeout interval from 300 - 1800 seconds.
         Examples
         rfs7000-37FABE(config-captive-portal-test)#inactivity-timeout 750
         rfs7000-37FABE(config-captive-portal-test)#
         Related Commands

          no                               Resets or disables captive portal commands
4 - 26 WiNG CLI Reference Guide


4.1.12.2.7 no
            captive-portal-mode commands
         The no command disables captive portal mode commands or resets parameters to their default.
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         no [access-time|access-type|accounting|connection-mode|custom-auth|
            inactivity-timeout|server|simultaneous-users|terms-agreement|use|webpage|
            webpage-location]

         no [access-time|access-type|connection-mode|inactivity-timeout|simultaneous-users|
            terms-agreement|webpage-location]

         no accounting [radius|syslog]
         no custom-auth info

         no server host
         no server mode {centralized-controller hosting-vlan-interface}

         no use [aaa-policy|dns-whitelist

         no webpage external [agreement|fail|login|welcome]
         no webpage internal [org-name|org-signature]
         no webpage internal [agreement|fail|login|welcome] [description|footer|header|
            main-logo|small-logo|title]
         Parameters
         • no [access-time|access-type|connection-mode|inactivity-timeout|
         simultaneous-users|terms-agreement|webpage-location]

          no access-time                   Resets client access time
          no access-type                   Resets the client access type
          no connection-mode               Resets the connection mode to HTTP
          no inactivity-timeout            Resets the inactivity timeout interval
          no simultaneous-users            Resets the number of MAC addresses that can use a single user name, to its default of 1
GLOBAL CONFIGURATION COMMANDS 4 - 27



no terms-agreement       Resets the terms agreement requirement for logging in. The user no longer has to agree
                         to terms & conditions before connecting to a captive portal.
no webpage-location      Resets the use of custom Web pages for login, welcome, terms, and failure page. The
                         default of automatically created Web pages is used.
• no accounting [radius|syslog]

no accounting            Disables accounting configurations
radius                   Disables support for sending RADIUS accounting messages
syslog                   Disables support for sending syslog messages to remote syslog servers

• no custom-auth info

no custom-auth           Resets custom authentication information
info                     Resets the configuration of custom user information sent to the RADIUS server (for
                         custom-auth-radius access type)

• no server host

no server host           Clears captive portal server address
• no server mode {centralized-controller hosting-vlan-interface}

no server mode           Configures the captive portal server mode
centralized-controller   Optional. Resets the hosting VLAN interface for centralized captive portal server to its
hosting-vlan-interface   default value of zero (0)

• no use [aaa-policy|dns-whitelist

no use                   Resets profiles used with a captive portal policy
aaa-policy               Removes the AAA policy used with a captive portal policy
dns-whitelist            Removes the DNS whitelist used with a captive portal policy
• no webpage external [agreement|fail|login|welcome]

no webpage external       Resets the configuration of external Web pages displayed when a user interacts with
                          the captive portal
agreement                 Resets the agreement page
fail                      Resets the fail page
login                     Resets the login page
welcome                   Resets the welcome page

• no webpage internal [org-name|org-signature]

no webpage external       Resets the configuration of internal Web pages displayed when a user interacts with
                          the captive portal
4 - 28 WiNG CLI Reference Guide



         org-name                 Resets the organization name that is included at the top of Web pages
         org-signature            Resets the organization signature (email, addresses, phone numbers) included at the
                                  bottom of Web pages

        • no webpage internal [agreement|fail|login|welcome]
        [description|footer|header|main-logo|small-logo|title]

         no webpage external      Resets the configuration of internal Web pages displayed when a user interacts with
                                  the captive portal
         agreement                Resets the agreement page
         fail                     Resets the fail page
         login                    Resets the login page
         welcome                  Resets the welcome page
         description              Resets the description part of each Web page. This is the area where information
                                  about the captive portal and user state is displayed to the user.
         footer                   Resets the footer portion of each Web page. A footer can contain the organization
                                  signature
         header                   Resets the header portion of each Web page
         main-logo                Resets the main logo of each Web page
         small-logo               Resets the small logo of each Web page
         title                    Resets the title of each Web page
        Examples
        rfs7000-37FABE(config-captive-portal-testportal)#no webpage internal login header

        rfs7000-37FABE(config-captive-portal-testportal)#no use aaa-policy

        rfs7000-37FABE(config-captive-portal-testportal)#no custom-auth info

        rfs7000-37FABE(config-captive-portal-testportal)#no accounting radius
GLOBAL CONFIGURATION COMMANDS 4 - 29


Related Commands

access-time          Configures the allowed access time for each captive portal client
access-type          Configures a captive portal authentication and logging information
accounting           Configures a captive portal accounting information
connection-mode      Configures how clients connect to a captive portal
custom-auth          Configures the captive portal parameters required for client access
inactivity-timeout   Configures the client inactivity timeout interval
server               Configures the captive portal server parameters
simultaneous-users   Configures the maximum number of clients that can use a single captive portal user
                     name
terms-agreement      Configures if a client has to accept terms and conditions before logging to the captive
                     portal
use                  Configures a AAA policy and DNS whitelist with this captive portal policy
webpage-location     Configures the location of Web pages displayed when the user interacts with the
                     captive portal
webpage              Configures Web pages used by the captive portal to interact with users
aaa-policy           Configures a AAA policy
dns-whitelist        Configures a DNS whitelist
4 - 30 WiNG CLI Reference Guide


4.1.12.2.8 server
            captive-portal-mode commands
         Configures captive portal server parameters, such as the hostname, IP, and mode of operation
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         server [host <WORD|mode]

         server host <IP/HOSTNAME>

         server mode [centralized|centralized-controller|self]
         Parameters
         • server host <IP/HOSTNAME>

          host <IP/HOSTNAME>               Configures the captive portal authentication server
                                           • <IP/HOSTNAME> – Specify the IP address or hostname of the captive portal server.
         • server mode [centralized|centralized-controller|self]

          mode                             Configures the captive portal server mode
          centralized                      Considers the configured server hostname or IP address as the centralized captive portal
                                           server
          centralized-controller           Uses the configured hostname as the virtual captive portal server name across the
                                           wireless controller
          self                             Selects the captive portal server as the same device supporting the WLAN
         Examples
         rfs7000-37FABE(config-captive-portal-test)#server mode self
         rfs7000-37FABE(config-captive-portal-test)#

         rfs7000-37FABE(config-captive-portal-test)#server host 172.16.10.9
         rfs7000-37FABE(config-captive-portal-test)#
         Related Commands

          no                               Resets or disables captive portal commands
GLOBAL CONFIGURATION COMMANDS 4 - 31


4.1.12.2.9 simultaneous-users
           captive-portal-mode commands
        Specifies the number of MAC addresses that can simultaneously use a particular username
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        simultaneous-users <1-8192>
        Parameters
        • simultaneous-users <1-8192>

         <1-8192>                         Specifies the number of MAC addresses that can simultaneously use a particular
                                          username. Select a number from 1 - 8192.
        Examples
        rfs7000-37FABE(config-captive-portal-test)#simultaneous-users 5
        rfs7000-37FABE(config-captive-portal-test)#
        Related Commands

         no                               Resets or disables captive portal commands
4 - 32 WiNG CLI Reference Guide


4.1.12.2.10 terms-agreement
           captive-portal-mode commands
        Enforces the user to agree to terms and conditions (included in the login page) for captive portal guest access
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        terms-agreement
        Parameters
        None
        Examples
        rfs7000-37FABE(config-captive-portal-test)#terms-agreement
        rfs7000-37FABE(config-captive-portal-test)#
        Related Commands

         no                               Resets or disables captive portal commands
GLOBAL CONFIGURATION COMMANDS 4 - 33


4.1.12.2.11 use
            captive-portal-mode commands
         Configures a AAA policy and DNS whitelist with this captive portal policy. AAA policies are used to configure servers for
         this captive portal. DNS whitelists provide a method to restrict users to a set of configurable domains on the internet
         accessed through the captive portal.
         For more information on AAA policy, see Chapter 8, AAA-POLICY.
         For more information on DNS whitelists, see Chapter 4, GLOBAL CONFIGURATION COMMANDS.
         Defines captive portal configuration settings
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         use [aaa-policy <AAA-POLICY>|dns-whitelist <DNS-WHITELIST>]
         Parameters
         • use [aaa-policy <AAA-POLICY>|dns-whitelist <DNS-WHITELIST>]

          aaa-policy <AAA-POLICY>          Configures a AAA policy with this captive portal policy. AAA policies configure servers
                                           for the captive portal.
                                           • <AAA-POLICY> – Specify the AAA policy name.
          dns-whitelist <DNS-              Configures a DNS whitelist to use with this captive portal policy. DNS whitelists
          WHITELIST>                       restrict access of URLs from a captive portal.
                                           • <DNS-WHITELIST> – Specify the DNS whitelist name.
         Examples
         rfs7000-37FABE(config-captive-portal-test)#use aaa-policy test
         rfs7000-37FABE(config-captive-portal-test)#use dns-whitelist
         Captive_Portal_Allowed_URL_list
         Related Commands

          no                               Resets or disables captive portal commands
          dns-whitelist                    Configures a DNS whitelist
          aaa-policy                       Configures a AAA policy
4 - 34 WiNG CLI Reference Guide


4.1.12.2.12 webpage-location
           captive-portal-mode commands
        Specifies the location of the Web pages used for authentication. These pages can either be hosted on the system or on an
        external Web server.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        webpage-location [advanced|external|internal]
        Parameters
        webpage-location [advanced|external|internal]

         advanced                         Uses Web pages for login, welcome, failure, and terms created and stored on the
                                          wireless controller
         external                         Uses Web pages for login, welcome, failure, and terms located on an external server.
                                          Provide the URL for each of these pages
         internal                         Uses Web pages for login, welcome, and failure that are automatically generated
        Examples
        rfs7000-37FABE(config-captive-portal-test)#webpage-location internal
        rfs7000-37FABE(config-captive-portal-test)#

        rfs7000-37FABE(config-captive-portal-test)#webpage internal agreement                                 title    test123
        rfs7000-37FABE(config-captive-portal-test)#
        Related Commands

         no                               Resets or disables captive portal commands
         webpage                          Configures Web pages displayed for the login, welcome, fail, and terms pages for a
                                          captive portal
GLOBAL CONFIGURATION COMMANDS 4 - 35


4.1.12.2.13 webpage
           captive-portal-mode commands
        Configures Web pages displayed when interacting with a captive portal. There are four (4) different pages.
         • agreement – This page displays “Terms and Conditions” that a user needs to accept before allowed access to the
           captive portal.
         • fail – This page is displayed when the user is not authenticated to use the captive portal.
         • login – This page is displayed when the user connects to the captive portal. Use this page to fetch login credentials
           from the user.
         • welcome – This page is displayed to welcome an authenticated user to the captive portal.
        The Web pages for interacting with the users of a captive portal can be located either on the wireless controller or an
        external location.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        webpage [external|internal]

        webpage external [agreement|fail|login|welcome] <URL>

        webpage internal         [agreement|fail|login|org-name|org-signature|welcome]
        webpage internal         [agreement|fail|login|welcome] [description|footer|
           header|title]         <CONTENT>
        webpage internal         [agreement|fail|login|welcome] [main-logo|small-logo] <URL>
        Parameters
        • webpage external [agreement|fail|login|welcome] <URL>

         external                         Indicates the Web pages being served are external to the captive portal
         agreement                        Indicates the page is displayed for “Terms & Conditions”
         fail                             Indicates the page is displayed for login failure
         login                            Indicates the page is displayed for getting user credentials for log in to the captive portal
         welcome                          Indicates the page is displayed after a user has successfully logged in to the captive portal
         <URL>                            Indicates the URL to the Web page displayed
4 - 36 WiNG CLI Reference Guide


        • webpage internal [agreement|fail|login|welcome] description|footer|header|title]
        <CONTENT>

         internal             Indicates the Web pages being served are internal
         agreement            Indicates the page is displayed for “Terms & Conditions”
         fail                 Indicates the page is displayed for login failure
         login                Indicates the page is displayed for getting user credentials for log in to the captive portal
         welcome              Indicates the page is displayed after a user has successfully logged in to the captive portal
         description          Indicates the content is the description portion of each internal, agreement, fail, and
                              welcome page
         footer               Indicates the content is the footer portion of each internal, agreement, fail, and welcome
                              page. The footer portion contains the signature of the organization that hosts the captive
                              portal.
         header               Indicates the content is the header portion of each internal, agreement, fail, and welcome
                              page. The header portion contains the heading information for each of these pages.
         title                Indicates the content is the title of each internal, agreement, fail, and welcome page. The
                              title for each of these pages is configured here.
         <CONTENT>            Specify the content displayed for each of the different components of the Web page. You
                              can enter 900 characters for the description and 256 characters each for header, footer,
                              and title.
        • webpage internal [agreement|fail|login|welcome] [main-logo|small-logo] <URL>

         internal             Indicates the Web pages being served are internal
         agreement            Indicates the page is displayed for “Terms & Conditions”
         fail                 Indicates the page is displayed for login failure
         login                Indicates the page is displayed for getting user credentials for log in to the captive portal
         welcome              Indicates the page is displayed after a user has successfully logged in to the captive portal
         main-logo            Indicates the main logo displayed in the header portion of each Web page
         small-logo           Indicates the logo image displayed in the footer portion of each Web page, and constitutes
                              the organization’s signature
         <URL>                Indicates the complete URL of the main-log and small-logo files
        Examples
        rfs7000-37FABE(config-captive-portal-test)#webpage external fail www.symbol.com
        rfs7000-37FABE(config-captive-portal-test)#
        Related Commands

         no                       Resets or disables captive portal commands
GLOBAL CONFIGURATION COMMANDS 4 - 37


4.1.13 clear
         Global Configuration Commands
      Clears parameters, cache entries, table entries, and other similar entries. The clear command is available for specific
      commands only. The information cleared using this command varies depending on the mode where executed.
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      clear event-history
      Parameters
      • clear event-history

       event-history                     Clears the event history file
      Examples
      rfs7000-37FABE(config)#clear event-history
      rfs7000-37FABE(config)#
4 - 38 WiNG CLI Reference Guide


4.1.14 critical-resource-policy
           Global Configuration Commands
        Creates a critical resource monitoring policy. A critical resource is a device (wireless controller, router, gateway, etc.)
        considered critical to the health of the wireless controller. This is a list of IP addresses pinged regularly by the wireless
        controller. If there is a connectivity issue with a device on the critical resource list, an event is generated stating a critical
        resource is unavailable. The wireless controller does not attempt to restore connection to a critical resource. All critical
        devices are listed in a critical resource policy.
                                                        Table 4.4 Critical Resource Policy Commands

                 Command                                            Description                                        Reference
         critical-resource-policy      Configures captive portal Web page parameters                               page 4-39
GLOBAL CONFIGURATION COMMANDS 4 - 39


4.1.14.1 critical-resource-policy
           critical-resource-policy
        Creates or enters a Critical-resource Monitoring (CRM) policy. If the defined policy is not present, it is created.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        critical-resource-policy <CRITICAL-RESOURCE-POLICY>
        Parameters
        • critical-resource-policy <CRITICAL-RESOURCE-POLICY>

         <CRITICAL-RESOURCE-           Specify the critical resource monitoring policy name. If the policy does not exist, it is
         POLICY>                       created.
        Examples
        rfs7000-37FABE(config)#critical-resource-policy test
        rfs7000-37FABE(config-critical-resource-policy-test)#?

        rfs7000-37FABE(config-critical-resource-policy-test)#?
         commands:
          monitor Critical resource monitoring
          no       Negate a command or set its defaults

           clrscr          Clears the display screen
           commit          Commit all changes made in this session
           do              Run commands from Exec mode
           end             End current mode and change to EXEC mode
           exit            End current mode and down to previous mode
           help            Description of the interactive help system
           revert          Revert changes
           service         Service Commands
           show            Show running system information
           write           Write running configuration to memory or terminal

        rfs7000-37FABE(config-critical-resource-policy-test)#
        Related Commands

         no                             Disables a critical resource policy
4 - 40 WiNG CLI Reference Guide


4.1.14.2 critical-resource-policy-mode
        Table 4.5 summarizes critical resource monitoring policy commands
                                                         Table 4.5 critical-resource-policy

              Command                                        Description                              Reference
         monitor           Performs critical resource monitoring                                    page 4-41
         no                Cancels the monitoring of a critical resource                            page 4-43
         clrscr            Clears the display screen                                                page 5-3
         commit            Commits (saves) changes made in the current session                      page 5-4
         do                Runs commands from the EXEC mode                                         page 4-66
         end               Ends and exits the current mode and moves to the PRIV EXEC mode          page 5-5
         exit              Ends the current mode and moves to the previous mode                     page 5-6
         help              Displays the interactive help system                                     page 5-7
         revert            Reverts changes to their last saved configuration                        page 5-13
         service           Invokes service commands to troubleshoot or debug (config-if) instance   page 5-14
                           configurations
         show              Displays running system information                                      page 6-4
         write             Writes information to memory or terminal                                 page 5-42
GLOBAL CONFIGURATION COMMANDS 4 - 41


4.1.14.2.1 monitor
            critical-resource-policy-mode
         Monitors critical resources. Use this command to configure a critical policy and set the interval the availability of the
         critical resource is checked.
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         monitor [<IP>|ping-interval

         monitor [ping-interval <5-86400>]
         monitor <IP> ping-mode [arp-icmp|arp-only vlan <1-4094>]
         Parameters
         • monitor ping-interval <5-86400>

          ping-interval <5-86400>           Configures the ping interval. This is the duration between two successive pings to a
                                            critical resource.
                                            • <5-86400> – Specify the ping interval from 5 - 86400 seconds.

         • monitor <IP> ping-mode [arp-icmp|arp-only vlan <1-4094>]

          <IP>                              Specify the IP address of the critical resource.
          ping-mode                         Configures the type of ping packets to use. For pinging critical resources that do not have
                                            an IP address, use the arp-only mode.
          arp-icmp                          Use Address Resolution Protocol (ARP) requests or Internet Control Message Protocol
                                            (ICMP) echo requests to monitor a critical resource. To use this ping mode, an IP address
                                            must be configured for each device in the critical resource list.
          arp-only vlan <1-4094>            Uses ARP requests to monitor a critical resource. This mode can be used for devices that
                                            do not have a configured IP address.
                                            • vlan – Configures the VLAN to ping for the critical resource
                                              • <1-4094> – Specify a VLAN ID from 1 - 4094
4 - 42 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config-critical-resource-policy-test)#monitor ping-interval 10
        rfs7000-37FABE(config-critical-resource-policy-test)#

        rfs7000-37FABE(config-critical-resource-policy-test)#monitor 172.16.10.2 ping-mode
        arp-only vlan 1
        rfs7000-37FABE(config-critical-resource-policy-test)#
        Related Commands

         no                   Resets or disables critical resource policy commands
GLOBAL CONFIGURATION COMMANDS 4 - 43


4.1.14.2.2 no
            critical-resource-policy-mode
         Removes a device from the critical resource list. This command also resets the ping interval to its default.
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         no monitor [<IP>|ping-interval]
         Parameters
         • no monitor [<IP>|ping-interval]

          monitor                            Configures critical resource monitoring parameters
          <IP>                               Removes a specified device from the list of monitored devices
          ping-interval                      Resets the ping interval for pinging critical resources
         Examples
         rfs7000-37FABE(config-critical-resource-policy-test)#no monitor 172.16.10.2
         rfs7000-37FABE(config-critical-resource-policy-test)#
         Related Commands

          monitor                            Adds a device to the critical resource policy list
4 - 44 WiNG CLI Reference Guide


4.1.15 customize
          Global Configuration Commands
        Customizes the output of the summary CLI commands. Use this command to define the data displayed as a result of various
        show commands.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        customize [hostname-column-width|show-wireless-client|show-wireless-client-stats|
           show-wireless-client-stats-rf|show-wireless-radio|show-wireless-radio-stats|
           show-wireless-radio-stats-rf]

        customize hostname-column-width <1-64>

        customize show-wireless-client (ap-name <1-64>,auth,bss,enc,hostname <1-64>,ip,
           last-active,location <1-64>,mac,radio-alias <3-67>,radio-id,radio-type,state,
           username <1-64>,vendor,vlan,wlan)

        customize show-wireless-client-stats (hostname <1-64>,mac,rx-bytes,rx-errors,
           rx-packets,rx-throughput,tx-bytes,tx-dropped,tx-packets,tx-throughput)

        customize show-wireless-client-stats-rf (average-retry-number,error-rate,
           hostname <1-64>,mac,noise,q-index,rx-rate,signal,snr,t-index,tx-rate)

        customize show-wireless-radio (adopt-to,ap-name <1-64>,channel,location <1-64>,
           num-clients,power,radio-alias <3-67>,radio-id,radio-mac,rf-mode,state)

        customize show-wireless-radio-stats (radio-alias <3-67>,radio-id,radio-mac,
           rx-bytes,rx-errors,rx-packets,rx-throughput,tx-bytes,tx-dropped,tx-packets,
           tx-throughput)
        customize show-wireless-radio-stats-rf (average-retry-number,error-rate,noise,
           q-index,radio-alias <3-67>,radio-id,radio-mac,rx-rate,signal,snr,t-index,
           tx-rate)
        Parameters
        • customize hostname-column-width <1-64>

         hostname-column-width            Configures the default width of the hostname column in all show commands
         <1-64>                           • <1-64> – Specify the hostname column width from 1 - 64 characters.
GLOBAL CONFIGURATION COMMANDS 4 - 45


• customize show-wireless-client (ap-name <1-64>,auth,bss,enc,hostname <1-64>,ip,
last-active,location <1-64>,mac,radio-alias <3-67>,radio-id,radio-type,state,
username <1-64>,vendor,vlan,wlan)

show-wireless-client   Customizes the columns displayed for the show wireless client command
ap-name <1-64>         Includes the ap-name column in the show wireless client command.
                       • <1-64> – Specify the ap-name column width from 1 - 64 characters.
auth                   Includes the auth column in the show wireless client command. The auth column displays
                       the authorization protocol used by the wireless client.
bss                    Includes the BSS column in the show wireless client command. The BSS column displays
                       the BSSID the wireless client is associated with.
enc                    Includes the enc column in the show wireless client command. The enc column displays the
                       encryption suite used by the wireless client.
hostname <1-64>        Includes the hostname column in the show wireless client command. The hostname column
                       displays the hostname of the wireless client.
                       • <1-64> – Specify the hostname column width from 1 - 64 characters.
ip                     Includes the IP column in the show wireless client command. The IP column displays the
                       current IP address of the wireless client.
last-active            Includes the last-active column in the show wireless client command. The last-active
                       column displays the time of the last activity seen from the wireless client.
location <1-64>        Includes the location column in the show wireless client command. The location column
                       displays the location of the AP the wireless client is associated with.
                       • <1-64> – Specify the location column width from 1 - 64 characters.
mac                    Includes the MAC column in the show wireless client command. The MAC column displays
                       the MAC address of the wireless client.
radio-alias <3-67>     Includes the radio-alias column in the show wireless client command. The radio-alias
                       column displays the radio alias with the AP's hostname and the radio interface number in
                       the “HOSTNAME:RX” format.
                       • <1-64> – Specify the radio-alias column width from 3 - 67 characters.
radio-id               Includes the radio-id column in the show wireless client command. The radio-id column
                       displays the radio ID with the AP’s MAC address and the radio interface number in the
                       “AA-BB-CC-DD-EE-FF:RX” format.
radio-type             Includes the radio-type column in the show wireless client command. The radio-type
                       column displays the radio type of the wireless client.
state                  Includes the state column in the show wireless client command. The state column displays
                       the current availability state of the wireless client.
username <1-64>        Includes the username column in the show wireless client command. The username column
                       displays the username used to logon by the wireless client.
                       • <1-64> – Specify the username column width from 1 - 64 characters.
vendor                 Includes the vendor column in the show wireless client command. The vendor column
                       displays the vendor ID of the wireless client.
4 - 46 WiNG CLI Reference Guide



         vlan                    Includes the VLAN column in the show wireless client command. The VLAN column displays
                                 the VLAN assigned to the wireless client.
         wlan                    Includes the WLAN column in the show wireless client command. The WLAN column
                                 displays the WLAN assigned to the wireless client.
        • customize show-wireless-client-stats (hostname <1-64>,mac,rx-bytes,rx-errors,
        rx-packets,rx-throughput,tx-bytes,tx-dropped,tx-packets,tx-throughput)

         show-wireless-client-   Customizes the columns displayed for the show wireless client statistics command
         stats
         hostname <1-64>         Includes the hostname column in the show wireless client statistics command. The
                                 hostname column displays the hostname of the wireless client.
                                 • <1-64> – Sets the hostname column width from 1 - 64 characters
         mac                     Includes the MAC column in the show wireless client statistics command. The MAC column
                                 displays the MAC address of the wireless client.
         rx-bytes                Includes the rx-bytes column in the show wireless client statistics command. The rx-bytes
                                 column displays the total number of bytes received by the wireless client.
         rx-errors               Includes the rx-error column in the show wireless client statistics command. The rx-error
                                 column displays the total number of receive errors received by the wireless client.
         rx-packets              Includes the rx-packets column in the show wireless client statistics command. The
                                 rx-packets column displays the total number of packets received by the wireless client.
         rx-throughput           Includes the rx-throughput column in the show wireless client statistics command. The
                                 rx-throughput column displays the receive throughput at the wireless client.
         tx-bytes                Includes the tx-bytes column in the show wireless client statistics command. The tx-bytes
                                 column displays the total number of bytes transmitted by the wireless client.
         tx-dropped              Includes the tx-dropped column in the show wireless client statistics command. The
                                 tx-dropped column displays the total number of dropped packets by the wireless client.
         tx-packets              Includes the tx-packets column in the show wireless client statistics command. The
                                 tx-packets column displays the total number of packets transmitted by the wireless client.
         tx-throughput           Includes the tx-throughput column in the show wireless client statistics command. The
                                 tx-throughput column displays the transmission throughput at the wireless client.

        • customize show-wireless-client-stats-rf (average-retry-number,error-rate,
        hostname <1-64>,mac,noise,q-index,rx-rate,signal,snr,t-index,tx-rate)

         show-wireless-client-   Customizes the columns displayed for the show wireless client stats rf command
         stats-rf
         average-retry-number    Includes the average-retry-number column in the show wireless client statistics RF
                                 command. The average-retry-number column displays the average number of
                                 retransmissions per packet.
         error-rate              Includes the error-rate column in the show wireless client statistics rf command. The
                                 error-rate column displays the error rate information for the wireless client.
GLOBAL CONFIGURATION COMMANDS 4 - 47



hostname <1-64>       Includes the hostname column in the show wireless client statistics RF command. The
                      hostname column displays the hostname of the wireless client.
                      • <1-64> – Specify the hostname column width from 1 - 64 characters.
mac                   Includes the MAC column in the show wireless client statistics RF command. The MAC
                      column displays the MAC address of the wireless client.
noise                 Includes the noise column in the show wireless client statistics RF command. The MAC
                      column displays the noise as detected by the wireless client.
q-index               Includes the q-index column in the show wireless client statistics RF command. The q-
                      index column displays the RF quality index where a higher value indicates better RF quality.
rx-rate               Includes the rx-rate column in the show wireless client statistics RF command. The rx-rate
                      column displays the receive rate at the particular wireless client.
signal                Includes the signal column in the show wireless client statistics RF command. The signal
                      column displays the signal strength at the particular wireless client.
snr                   Includes the snr column in the show wireless client statistics RF command. The snr column
                      displays the signal to noise ratio at the particular wireless client.
t-index               Includes the t-index column in the show wireless client statistics RF command. The t-index
                      column displays the traffic utilization index at the wireless controller.
tx-rate               Includes the tx-rate column in the show wireless client statistics RF command. The tx-rate
                      column displays the packet transmission rate at the particular wireless client.

• customize show-wireless-radio (adopt-to,ap-name <1-64>,channel,location <1-64>,
num-clients,power,radio-alias <3-67>,radio-id,radio-mac,rf-mode,state)

show-wireless-radio   Customizes the columns displayed for the show wireless radio command.
adopt-to              Includes the adopt-to column in the show wireless radio command. The adopt-to column
                      displays information about the wireless controller adopting this AP.
ap-name <1-64>        Includes the ap-name column in the show wireless radio command. The adopt-to column
                      displays information about the AP this radio belongs.
                      • <1-64> – Specify the ap-name column width from 1 - 64 characters.
channel               Includes the channel column in the show wireless radio command. The channel column
                      displays information about the configured and current channel of operation for this radio.
location <1-64>       Includes the location column in the show wireless radio command. The location column
                      displays the location of the AP this radio belongs.
                      • <1-64> – Specify the location column width from 1 - 64 characters.
num-clients           Includes the num-clients column in the show wireless radio command. The num-clients
                      column displays the number of clients associated with this radio.
power                 Includes the power column in the show wireless radio command. The power column
                      displays the configured and current transmit power of the radio.
4 - 48 WiNG CLI Reference Guide



         radio-alias <3-67>          Includes the radio-alias column in the show wireless radio command. The radio-alias
                                     column displays the radio alias along with the AP's hostname and the radio interface
                                     number in the “HOSTNAME:RX” formate.
                                     • <3-67> – Specify the radio-alias column width from 3 - 67 characters.
         radio-id                    Includes the radio-id column in the show wireless radio command. The radio-id column
                                     displays the Radio ID along with the AP’s MAC address and the radio interface number in
                                     the “AA-BB-CC-DD-EE-FF:RX” format.
         radio-mac                   Includes the radio-mac column in the show wireless radio command. The radio-mac
                                     column displays the base MAC address of the radio.
         rf-mode                     Includes the rf-mode column in the show wireless radio command. The rf-mode column
                                     displays the mode in which the radio operates. The radio mode can be 2.4GHz, 4.9GHz,
                                     5GHz, or sensor.
         state                       Includes the state column in the show wireless radio command. The state column displays
                                     the current operational state of the radio.

        • customize show-wireless-radio-stats (radio-alias <3-67>,radio-id,radio-mac,
        rx-bytes,rx-errors,rx-packets,rx-throughput,tx-bytes,tx-dropped,tx-packets,
        tx-throughput)

         show-wireless-radio-stats   Customizes the columns displayed for the show wireless radio statistics command.
         radio-alias <3-67>          Includes the radio-alias column in the show wireless radio statistics command. The
                                     radio-alias column displays the radio alias along with the AP's hostname and the radio
                                     interface number in the “HOSTNAME:RX” format.
                                     • <3-67> – Specify the radio-alias column width from 3 - 67 characters.
         radio-id                    Includes the radio-id column in the show wireless radio statistics command. The radio-id
                                     column displays the Radio ID along with the AP’s MAC address and the radio interface
                                     number in the “AA-BB-CC-DD-EE-FF:RX” format.
         radio-mac                   Includes the radio-mac column in the show wireless radio statistics command. The
                                     radio-mac column displays the base MAC address of the radio.
         rx-bytes                    Includes the rx-bytes column in the show wireless radio statistics command. The rx-bytes
                                     column displays the total number of bytes received by the wireless radio.
         rx-errors                   Includes the rx-error column in the show wireless radio statistics command. The rx-error
                                     column displays the total number of receive errors received by the wireless radio.
         rx-packets                  Includes the rx-packets column in the show wireless radio statistics command. The
                                     rx-packets column displays the total number of packets received by the wireless radio.
         rx-throughput               Includes the rx-throughput column in the show wireless radio statistics command. The
                                     rx-throughput column displays the receive throughput at the wireless radio.
         tx-bytes                    Includes the tx-bytes column in the show wireless radio statistics command. The tx-bytes
                                     column displays the total number of bytes transmitted by the wireless radio.
         tx-dropped                  Includes the tx-dropped column in the show wireless radio statistics command. The
                                     tx-dropped column displays the total number of dropped packets by the wireless radio.
GLOBAL CONFIGURATION COMMANDS 4 - 49



tx-packets                 Includes the tx-packets column in the show wireless radio statistics command. The
                           tx-packets column displays the total number of packets transmitted by the wireless radio.
tx-throughput              Includes the tx-throughput column in the show wireless radio statistics command. The
                           tx-throughput column displays the transmission throughput at the wireless radio.
• customize show-wireless-radio-stats-rf (average-retry-number,error-rate,noise,
q-index,radio-alias <3-67>,radio-id,radio-mac,rx-rate,signal,snr,t-index,
tx-rate)

show-wireless-radio-stats- Customizes the columns displayed for the show wireless radio stats RF command
rf
average-retry-number       Includes the average-retry-number column in the show wireless radio statistics RF
                           command. The average-retry-number column displays the average number of
                           retransmissions per packet.
error-rate                 Includes the error-rate column in the show wireless radio statistics RF command. The
                           error-rate column displays the error rate information for the wireless radio.
noise                      Includes the noise column in the show wireless radio statistics RF command. The mac
                           column displays the noise as detected by the wireless radio.
q-index                    Includes the q-index column in the show wireless client statistics RF command. The
                           q-index column displays the RF quality index where a higher value indicates better RF
                           quality.
radio-alias <3-67>         Includes the radio-alias column in the show wireless radio statistics RF command. The
                           radio-alias column displays the radio alias along with AP's hostname and the radio
                           interface number in the “HOSTNAME:RX” format.
                           • <3-67> – Specify the radio-alias width column from 3 - 67 characters.
radio-id                   Includes the radio-id column in the show wireless radio statistics rf command. The radio-
                           id column displays the Radio ID along with the AP’s MAC address and the radio interface
                           number in the “AA-BB-CC-DD-EE-FF:RX” format.
radio-mac                  Includes the radio-mac column in the show wireless radio statistics RF command. The
                           radio-mac column displays the base MAC address of the radio.
rx-rate                    Includes the rx-rate column in the show wireless radio statistics RF command. The rx-rate
                           column displays the receive rate at the particular wireless radio.
signal                     Includes the signal column in the show wireless radio statistics RF command. The signal
                           column displays the signal strength at the particular wireless radio.
snr                        Includes the snr column in the show wireless radio statistics RF command. The snr column
                           displays the signal to noise ratio at the particular wireless radio.
t-index                    Includes the t-index column in the show wireless radio statistics RF command. The t-index
                           column displays the traffic utilization index at the wireless controller.
tx-rate                    Includes the tx-rate column in the show wireless radio statistics RF command. The tx-rate
                           column displays the packet transmission rate at the particular wireless radio.
4 - 50 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config)*#customize show-wireless-client ap-name auth
        rfs7000-37FABE(config)*#commit
        rfs7000-37FABE(config)*#show wireless client
        -----------------------
                  AP-NAME AUTH
        -----------------------
        -----------------------
        Total number of wireless clients displayed: 0
        rfs7000-37FABE(config)*#
        Related Commands

         no                       Resets values or disables commands
         wireless                 Displays wireless configuration and other information
GLOBAL CONFIGURATION COMMANDS 4 - 51


4.1.16 device
         Global Configuration Commands
      Enables simultaneous configuration of multiple devices
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      device {containing|filter}

      device
      device containing <STRING> {filter type [ap621|ap650|ap6511|ap6521|ap6532|ap71xx|
         rfs4000|rfs6000|rfs7000]}
      device filter type [ap621|ap650|ap6511|ap6521|ap6532|ap71xx|rfs4000|rfs6000|
         rfs7000]
      Parameters
      • device

       device                            Configures a basic device profile

      • device containing <STRING> {filter type [ap621|ap650|ap6511|ap6521|ap6532|ap71xx|
      rfs4000|rfs6000|rfs7000]}

       containing <STRING>               Configures the search string to search for in the device’s hostname. Only those devices
                                         that have the search string in their hostname can be configured.
                                         • <STRING> – Specify the string to search for in the hostname of the devices
       filter type                       Optional. Filters out a specific device type
       ap621                             Optional. Filters out all devices other than AP621s
       ap650                             Optional. Filters out devices other than AP650s
       ap6511                            Optional. Filters out devices other than AP6511s
       ap6521                            Optional. Filters out devices other than AP6521s
       ap6532                            Optional. Filters out devices other than AP6532s
       ap71xx                            Optional. Filters out devices other than AP71XXs
       rfs4000                           Optional. Filters out devices other than RFS4000s
4 - 52 WiNG CLI Reference Guide



         rfs6000                  Optional. Filters out devices other than RFS6000s
         rfs7000                  Optional. Filters out devices other than RFS7000s

        • device filter type [ap621|ap650|ap6511|ap6521|ap6532|ap71xx|rfs4000|rfs6000|
        rfs7000]

         filter type              Filters out a specific device type
         ap621                    Filters out all devices other than AP621s
         ap650                    Filters out devices other than AP650s
         ap6511                   Filters out devices other than AP6511s
         ap6521                   Filters out devices other than AP6521s
         ap6532                   Filters out devices other than AP6532s
         ap71xx                   Filters out devices other than AP71XXs
         rfs4000                  Filters out devices other than RFS4000s
         rfs6000                  Filters out devices other than RFS6000s
         rfs7000                  Filters out devices other than RFS7000s

        rfs7000-37FABE(config)#device containing ap filter type AP71XX
        % Error: Parsing cmd line (1)
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#device containing ap filter type ap650
        rfs7000-37FABE(config-device-{'type': 'ap650', 'con)#
        Related Commands

         no                       Resets values or disables commands
GLOBAL CONFIGURATION COMMANDS 4 - 53


4.1.17 device-categorization
         Global Configuration Commands
      Categorizes devices as sanctioned or neighboring. Categorization of devices enables quick identification and blocking of
      rogue/unsanctioned devices in the wireless controller managed network.
                                                     Table 4.6 Critical Resource Policy Commands

              Command                                           Description                                  Reference
       device-categorization         Configures a device categorization list                             page 4-54
4 - 54 WiNG CLI Reference Guide


4.1.17.1 device-categorization
           device-categorization
        Configures a device categorization list. This list categorizes devices as sanctioned or neighboring. This information
        determines which devices are allowed access to the wireless controller managed network and which are rogue devices.
        If a device categorization list does not exist, it is created.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        device-categorization <DEVICE-CATEGORIZATION-LIST-NAME>
        Parameters
        device-categorization <DEVICE-CATEGORIZATION-LIST-NAME>

         <DEVICE-CATEGORIZATION-              Specify the device categorization list name. If a list with the same name does not
         LIST-NAME>                           exist, it is created.
        Examples
        rfs7000-37FABE(config)#device-categorization RFS7000

        rfs7000-37FABE(config-device-categorization-RFS7000)#?
        Device Category Mode commands:
          mark-device Add a device
          no           Negate a command or set its defaults

           clrscr                  Clears the display screen
           commit                  Commit all changes made in this session
           do                      Run commands from Exec mode
           end                     End current mode and change to EXEC mode
           exit                    End current mode and down to previous mode
           help                    Description of the interactive help system
           revert                  Revert changes
           service                 Service Commands
           show                    Show running system information
           write                   Write running configuration to memory or terminal

        rfs7000-37FABE(config-device-categorization-RFS7000)#
        Related Commands

         no                                  Resets values or disables commands
GLOBAL CONFIGURATION COMMANDS 4 - 55


4.1.17.2 device-categorization-mode commands
          device-categorization
       Table 4.7 summarizes device categorization mode commands
                                                        Table 4.7 device-categorization-mode commands

             Command                                              Description                                 Reference
        mark-device               Adds a device to the device categorization list                          page 4-56
        no                        Removes a device from the device categorization list                     page 4-58
        clrscr                    Clears the display screen                                                page 5-3
        commit                    Commits (saves) changes made in the current session                      page 5-4
        do                        Runs commands from EXEC mode                                             page 4-66
        end                       Ends and exits the current mode and moves to the PRIV EXEC mode          page 5-5
        exit                      Ends the current mode and moves to the previous mode                     page 5-6
        help                      Displays the interactive help system                                     page 5-7
        revert                    Reverts changes to their last saved configuration                        page 5-13
        service                   Invokes service commands to troubleshoot or debug (config-if) instance   page 5-14
                                  configurations
        show                      Displays running system information                                      page 6-4
        write                     Writes information to memory or terminal                                 page 5-42
4 - 56 WiNG CLI Reference Guide


4.1.17.2.1 mark-device
           device-categorization-mode commands
        Adds a device to the device categorization list as sanctioned or neighboring. Devices are further classified as AP or client.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        mark-device [sanctioned|neighboring] [ap|client]

        mark-device [sanctioned|neighboring] ap [<MAC>|any] ssid [<SSID>|any]

        mark-device [sanctioned|neighboring] client [<MAC>|any]
        Parameters
        • mark-device [sanctioned|neighboring] ap [<MAC>|any] ssid [<SSID>|any]

         sanctioned                       Marks a device as sanctioned. A sanctioned device is authorized to use network
                                          resources by providing correct credentials.
         neighboring                      Marks a device as neighboring. A neighboring device is a neighbor in the same network
                                          as this device.
         ap [<MAC>|any]                   Marks all or a specified AP as sanctioned or neighboring based on their MAC addresses
                                          • <MAC> – Specify the MAC address of the AP.
                                          • any – Indicates all APs are marked
         ssid [<SSID>|any]                Configures the SSID for the AP. Any AP with the configured SSID is automatically marked.
                                          When the ‘any’ parameter is used, any AP with any SSID is automatically marked.
                                          • <SSID> – Specify the SSID.
                                          • any – Indicates any SSID to match
        • mark-device [sanctioned|neighboring] client [<MAC>|any]

         sanctioned                       Marks the wireless client as sanctioned. A sanctioned device is authorized to use
                                          network resources by providing correct credentials.
GLOBAL CONFIGURATION COMMANDS 4 - 57



neighboring           Marks the wireless client as neighboring. A neighboring device is a neighbor in the same
                      network as this device.
client [<MAC>|any]    Marks all or a specified wireless client as sanctioned or neighboring based on the MAC
                      address
                      • <MAC> – Specify the MAC address of the wireless client.
                      • any – Indicates all wireless clients are marked
Examples
rfs7000-37FABE(config-device-categorization-RFS7000)#mark-device sanctioned ap any
ssid any
rfs7000-37FABE(config-device-categorization-RFS7000)#


rfs7000-37FABE(config-device-categorization-RFS7000)#mark-device neighboring client
11-22-33-44-55-66
rfs7000-37FABE(config-device-categorization-RFS7000)#
Related Commands

no                    Resets or disables mark device commands
4 - 58 WiNG CLI Reference Guide


4.1.17.2.2 no
            device-categorization-mode commands
         Removes a device from the device categorization list
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         no mark-device [neighboring|sanctioned] [ap|client] [<MAC>|any]

         mark-device [sanctioned|neighboring] client [<MAC>|any]

         mark-device [sanctioned|neighboring] ap [<MAC>|any] ssid [<SSID>|any]
         Parameters
         • no mark-device [sanctioned|neighboring] ap [<MAC>|any] ssid [<SSID>|any]

          no mark-device                   Removes a device from the marked device list
          sanctioned                       Removes a device marked as sanctioned. A sanctioned device is authorized to use
                                           network resources by providing correct credentials.
          neighboring                      Removes a device marked as neighboring. A neighboring device is a neighbor in the same
                                           network as this device.
          ap [<MAC>|any]                   Removes all or a specified AP as sanctioned or neighboring
                                           • <MAC> – Specify the MAC address of the AP.
                                           • any – Indicates all APs are marked
          ssid [<SSID>|any]                Configures the AP’s SSID. Any AP with the configured SSID is removed from the marked
                                           list. When the ‘any’ parameter is used, any AP with any SSID is removed from the marked
                                           list.
                                           • <SSID> – Specify the SSID.
                                           • any – Indicates any SSID to match

         • no mark-device [sanctioned|neighboring] client [<MAC>|any]

          no mark-device                   Removes a device from the marked device list
          sanctioned                       Marks the wireless client as sanctioned. A sanctioned device is authorized to use
                                           network resources by providing correct credentials.
GLOBAL CONFIGURATION COMMANDS 4 - 59



neighboring           Removes a wireless client marked as neighboring. A neighboring device is a neighbor in
                      the same network as this device.
client [<MAC>|any]    Removes all or a specified wireless client marked as sanctioned or neighboring
                      • <MAC> – Specify the MAC address of the wireless client.
                      • any – Indicates all wireless clients are removed from the marked list
Examples
rfs7000-37FABE(config-device-categorization-RFS7000)#no mark-device authorized ap any
ssid 1
%% Error: Parsing cmd line
rfs7000-37FABE(config-device-categorization-RFS7000)#
Related Commands

mark-device           Adds a device to a list of sanctioned or neighboring devices
4 - 60 WiNG CLI Reference Guide


4.1.18 dhcp-server-policy
           Global Configuration Commands
        Configures DHCP server policy parameters, such as class, address range, and options. A new policy is created if it does
        not exist.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        dhcp-server-policy <DHCP-POLICY-NAME>
        Parameters
        • dhcp-server-policy <DHCP-POLICY-NAME>

         <DHCP-POLICY-NAME>                Specify the DHCP policy name. If the policy does not exist, it is created.
        Examples
        rfs7000-37FABE(config)#dhcp-policy test
        rfs7000-37FABE(config)#?
        Related Commands

         no                                Resets values or disables commands



                         NOTE: For more information on DHCP policy, see Chapter 13, DHCP-SERVER-POLICY.
GLOBAL CONFIGURATION COMMANDS 4 - 61


4.1.19 dns-whitelist
        Global Configuration Commands
      Configures a whitelist of devices permitted to access the wireless controller managed network or a hotspot
                                                  Table 4.8 Critical Resource Policy Commands

            Command                                         Description                                    Reference
       dns-whitelist             Configures the DNS whitelist                                          page 4-62
4 - 62 WiNG CLI Reference Guide


4.1.19.1 dns-whitelist
           dns-whitelist
        Configures a DNS whitelist. A DNS whitelist is a list of domains allowed access to the wireless controller managed
        network.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        dns-whitelist <DNS-WHITELIST>
        Parameters
        dns-whitelist <DNS-WHITELIST>

         <DNS-WHITELIST>              Specify the DNS whitelist name. If the whitelist does not exist, it is created.
        Examples
        rfs7000-37FABE(config-dns-whitelist-test)#?
        DNS Whitelist Mode commands:
          no       Negate a command or set its defaults
          permit   Match a host

           clrscr          Clears the display screen
           commit          Commit all changes made in this session
           end             End current mode and change to EXEC mode
           exit            End current mode and down to previous mode
           help            Description of the interactive help system
           revert          Revert changes
           service         Service Commands
           show            Show running system information
           write           Write running configuration to memory or terminal

        rfs7000-37FABE(config-dns-whitelist-test)#
        Related Commands

         no                            Resets values or disables commands
GLOBAL CONFIGURATION COMMANDS 4 - 63


4.1.19.2 dns-whitelist mode commands
          dns-whitelist
       Table 4.9 summarizes DNS white list mode commands
                                                      Table 4.9 dns-whitelist commands

             Command                                      Description                                Reference
        permit            Matches a host                                                           page 4-64
        no                Negates a command or sets its default values                             page 4-65
        clrscr            Clears the display screen                                                page 5-3
        commit            Commits (saves) changes made in the current session                      page 5-4
        do                Runs commands from EXEC mode                                             page 4-66
        end               Ends and exits the current mode and moves to the PRIV EXEC mode          page 5-5
        exit              Ends the current mode and moves to the previous mode                     page 5-6
        help              Displays the interactive help system                                     page 5-7
        revert            Reverts changes to their last saved configuration                        page 5-13
        service           Invokes service commands to troubleshoot or debug (config-if) instance   page 5-14
                          configurations
        show              Displays running system information                                      page 6-4
        write             Writes information to memory or terminal                                 page 5-42
4 - 64 WiNG CLI Reference Guide


4.1.19.2.1 permit
            dns-whitelist mode commands
         A whitelist is a list of host names and IP addresses permitted access to the wireless controller managed network or captive
         portal. This command adds a device by its hostname or IP address to the DNS whitelist.
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         permit <IP/HOSTNAME> {suffix}
         Parameters
         • permit <IP/HOSTNAME> {suffix}

          <IP/HOSTNAME>                   Specify the IP address or hostname of the device, to add to the DNS whitelist.
          suffix                          Optional. Matches any hostname including the specified name as suffix
         Examples
         rfs7000-37FABE(config-dns-whitelist-test)#permit motorolasolutions.com suffix

         rfs7000-37FABE(config-dns-whitelist-test)#show context
         dns-whitelist test
         permit motorolasolutions.com suffix
         rfs7000-37FABE(config-dns-whitelist-test)#
         Related Commands

          no                              Resets or disables DNS whitelist commands
GLOBAL CONFIGURATION COMMANDS 4 - 65


4.1.19.2.2 no
            dns-whitelist mode commands
         Removes a specified host or IP address from the DNS whitelist, and prevents it from accessing network resources
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         no permit <IP/HOSTNAME>
         Parameters
         • no permit <IP/HOSTNAME>

          <IP/HOSTNAME>                   Specify the device’s IP address or hostname to remove from the DNS whitelist.
         Examples
         rfs7000-37FABE(config-dns-whitelist-test)#no permit joysportsview.com
         rfs7000-37FABE(config-dns-whitelist-test)#
         Related Commands

          permit                          Adds a device to the DNS whitelist
4 - 66 WiNG CLI Reference Guide


4.1.20 do
          Global Configuration Commands
        Use the do command to run commands from the EXEC mode. These commands perform tasks, such as clearing caches,
        setting device clock, upgrades etc.
        Generally use the do command to execute commands from the Privilege Executable or User Executable modes.
        Supported in the following platforms:
           • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
        Syntax
        do [ap-upgrade|archive|boot|cd|change-passwd|clear|clock|clrscr|cluster|commit|
           configure|connect|copy|crypto|debug|delete|diff|dir|disable|edit|enable|
           erase|exit|format|halt|help|logging|mint|mkdir|more|no|page|ping|pwd|reload|
           remote-debug|rename|revert|rmdir|self|service|show|telnet|terminal|time-it|
           traceroute|upgrade|upgrade-abort|watch|write|ssh

        do ap-upgrade [<DEVICE-NAME>|all|all|ap621|ap650|ap6511|ap6521|ap6532|ap71xx|load-
        image|rf-domain|cancel-upgrade]

        do archive tar [/create|/table|/xtract] [<FILE>|<URL>]
        do boot system [primary|secondary] {on <DEVICE-NAME>}

        do cd {<DIR>}

        do change-passwd {<OLD-PASSWORD>} {<NEW-PASSWORD>}

        do clear [arp-cache|cdp|counters|event-history|firewall|ip|lldp|spanning-tree|
           crypto]
        do clock set <TIME> <DAY> <MONTH> <YEAR>

        do clrscr

        do cluster start-election

        do commit write memory

        do configure [terminal|self]

        do connect [<REMOTE-DEVICE>|mint-id <DEVICE-MINT-ID>]

        do copy [<SOURCE-FILE>|<SOURCE-URL>] [<DESTINATION-FILE>|<DESTINATION-URL>]

        do crypto [key|pki]

        do delete /force /recursive <FILE>
GLOBAL CONFIGURATION COMMANDS 4 - 67


do diff [<FILE1>|<URL1>] [<FILE2>|<URL2>]

do dir {/all} {/recursive} {<DIR>} {all-filesystems}

do disable

do edit <FILE>

do enable

do erase [cf:|flash:|nvram:|startup-config|usb1]

do exit

do format cf:

do halt {on <DEVICE>}
do help {[search|show]}

do logging monitor {[<0-7>|alerts|critical|debugging|emergencies|errors|
   informational|notification|warnings]}

do mint [ping|traceroute] <MINT-DEVICE-ID>

do mkdir <DIR>

do more <FILE>

do no [adoption|captive-portal|crypto|debug|page|service|terminal|upgrade|
   wireless|logging]
do page

do ping <IP>

do pwd

do reload {[cancel|force|in|on]}

do rename <FILE>

do revert

do rmdir <DIR>

do self

do service [advanced-wips|ap300|clear|cli-tables-expand|cli-tables-skin|cluster|
   copy|force-send-config|locator|mint|noc|pktcap|pm|radio|radius|set|show|
   smart-rf|start-shell|wireless|signal

do show [adoption|advanced-wips|ap-upgrade|boot|captive-portal|cdp|clock|cluster|
   commands|critical-resources|crypto|debug|debugging|device-categorization|
   event-history|event-system-policy|file|firewall|interface|ip|
   ip-access-list-stats|licenses|lldp|logging|mac-access-list-stats|
   mac-address-table|mint|noc|ntp|password-encryption|power|reload|remote-debug|
   rf-domain-manager|role|running-config session-changes|session-config|
   sessions smart-rf|spanning-tree|startup-config|terminal|timezone|upgrade-status|
   version|wireless|wwan|context]

do ssh <IP>

do telnet <IP/HOSTNAME>

do terminal [length <LINES>|width <CHARACTERS>]

do time-it <CLI-COMMAND>

do traceroute <ARGS>
4 - 68 WiNG CLI Reference Guide



        do upgrade [<FILE>|<URL>

        do upgrade-abort {on <DEVICE>}

        do watch <TIME> <CLI-COMMAND>

        do write [memory|terminal]
        Parameters
        • do ap-upgrade [<DEVICE-NAME>|all|all|ap621|ap650|ap6511|ap6521|ap6532|ap71xx|
        load-image|rf-domain|cancel-upgrade]

         ap-upgrade               Runs the ap-upgrade command
                                  For more information on the AP upgrade command, see ap-upgrade.

        • do archive tar [/create|/table|/xtract] [<FILE>|<URL>]

         archive                  Runs the archive command
                                  For more information on the archive command, see archive.

        • do boot system [primary|secondary] {on <DEVICE-NAME>}

         boot                     Configures the image used for the next boot
                                  For more information on the boot command, see boot.

        • do cd {<DIR>}

         cd <DIR>                 Runs the command to change the present working directory
                                  For more information on the cd command see dir.

        • do change-passwd {<OLD-PASSWORD>} {<NEW-PASSWORD>}

         change-passwd             Changes password of the logged user
         {<OLD-PASSWORD>}          For more information on the clear command, see change-passwd.
         {<NEW-PASSWORD>}

        • do clear [arp-cache|cdp|counters|event-history|firewall|ip|lldp|spanning-tree|
        crypto]

         clear                     Clears some configurations
                                   For more information on the clear command, see clear.

        • do clock set <TIME> <DAY> <MONTH> <YEAR>

         clock set <TIME> <DAY>   Sets the device’s time and date
         <MONTH> <YEAR>           For more information on the clock command, see clock.

        • do clrscr

         clrscr                   Clears the current screen
                                  For more information on the clrscr command, see clrscr.

        • do cluster start-election

         cluster start-election   Starts the configuration for creating a cluster of servers
                                  For more information on the cluster command, see cluster.
GLOBAL CONFIGURATION COMMANDS 4 - 69


• do commit writer memory

commit write memory               Commits the changes made in the current CLI session
                                  For more information on the commit command, see commit.

• do configure [terminal|self]

configure [terminal|self]         Changes the configuration mode
                                  For more information on the configure command, see configure.

• do connect [<REMOTE-DEVICE>|mint-id <DEVICE-MINT-ID>]

connect [<REMOTE-DEVICE>|         Connects to a remote device to configure it. This command uses a device’s hostname or
mint-id <DEVICE-MINT-ID>]         its MiNT ID to connect.
                                  For more information on the connect command, see connect.

• do copy [<SOURCE-FILE>|<SOURCE-URL>] [<DESTINATION-FILE>|<DESTINATION-URL>]

copy [<SOURCE-FILE>|              Copies a file from one location to another
<SOURCE-URL>]                     For more information on the copy command, see copy.
[<DESTINATION-FILE>|
<DESTINATION-URL>]

• do crypto [key|pki]

crypto [key|pki]                   Configures the crypto command
                                   For more information on the crypto command, see crypto.

• do delete /force /recursive <FILE>

delete /force /recursive <FILE> Deletes a file from the device’s file system
                                For more information on the delete command, see disable.

• do diff [<FILE1>|<URL1>] [<FILE2>|<URL2>]

diff [<FILE1>|<URL1>]              Compares two files and displays the difference between them
[<FILE2>|<URL2>]                   For more information on the diff command, see diff.

• do dir {/all} {/recursive} {<DIR>} {all-filesystems}

dir {/all} {/recursive} {<DIR>}    Displays the content of a directory in the device’s file system
{all-filesystems}                  For more information on the dir command, see dir.

• do disable

disable                             Moves the control to the User Exec mode
                                    For more information on the disable command, see disable.

• do edit <FILE>

edit <FILE>                         Edits a file
                                    For more information on the edit command, see edit.
4 - 70 WiNG CLI Reference Guide


        • do enable

         enable                          Moves the mode to Privilege Exec mode
                                         For more information on the enable command, see enable.

        • do erase [cf:|flash:|nvram:|startup-config|usb1]

         do erase [cf:|flash:|nvram:|    Erases the content of the specified storage device. Also erases the startup
         startup-config|usb1]            configuration to restore the device to its default.
                                         For more information on the erase command, see erase.

        • do exit

         exit                            Exits the CLI
                                         For more information on the exit command, see exit.

        • do format cf:

         format cf:                      Formats the CF card installed on the device
                                         For more information on the format command, see format.

        • do halt {on <DEVICE-NAME>}

         halt {on <DEVICE-NAME>}         Stops the device
                                         For more information on the halt command, see halt.

        • do help {[search|show]}

         help {[search|show]}            Displays the command line interface help
                                         For more information on the help command, see help.

        • do logging monitor {[<0-7>|alerts|critical|debugging|emergencies|errors|
        informational|notification|warnings]}

         logging monitor                Configures the logging level for the device
         {<0-7>|alerts|critical|        For more information on the logging command, see logging.
         debugging|emergencies|
         errors|informational|
         notification|warnings}

        • do mint [ping|traceroute] <MINT-DEVICE-ID>

         mint [ping|traceroute]         Performs MiNT operations such as ping and traceroute
         <MINT-DEVICE-ID>               For more information on the mint command, see mint.

        • do mkdir <DIR>

         mkdir <DIR>                    Creates a directory in the device’s file structure
                                        For more information on the dir command, see mkdir.

        • do more <FILE>

         more <FILE>                    Displays a file in the console window
                                        For more information on the more command, see more.
GLOBAL CONFIGURATION COMMANDS 4 - 71


• do no [adoption|captive-portal|crypto|debug|page|service|terminal|
upgrade|wireless|logging]

no [adoption|                   Reverts or negates a command
captive-portal|                 For more information on the no command, see the respective profiles and modes.
crypto|debug|page|
service|
terminal|upgrade|
wireless|logging]

• do page

page                            Toggles paging of the command line interface
                                For more information on the page command, see page.

• do ping <IP>

ping <IP>                        Pings a device to check its availability
                                 For more information on the ping command, see ping.

• do pwd

pwd                              Displays the current working directory
                                 For more information on the pwd command, see pwd.

• do reload {[cancel|force|in|on]}

reload {[cancel|force|in|on]}    Halts the device and performs a warm reboot
                                 For more information on the reload command, see reload.
• do rename <FILE>

rename <FILE>                    Renames a file on the device’s file system
                                 For more information on the rename command, see rename.

• do revert

revert                           Reverts the changes made to the system during the current CLI session
                                 For more information on the revert command, see revert.

• do rmdir <DIR>

rmdir <DIR>                      Removes a directory in the device’s file system
                                 For more information on the rmdir command, see rmdir.
• do self

self                             Loads the configuration context of the device currently logged into
                                 For more information on the self command, see self.
4 - 72 WiNG CLI Reference Guide


        • do service [advanced-wips|ap300|clear|cli-tables-expand|cli-tables-skin|cluster|
        copy|force-send-config|locator|mint|noc|pktcap|pm|radio|radius|set|show|
        smart-rf|start-shell|wireless|signal

         service [advanced-wips|          Performs the different service commands
         ap300|clear|cli-tables-expand|   For more information on the service commands, see service.
         cli-tables-skin|cluster|
         copy|force-send-config|
         locator|mint|noc|pktcap|pm|
         radio|radius|set|show|
         smart-rf|start-shell|
         wireless|signal
        • do show [adoption|advanced-wips|ap-upgrade|boot|captive-portal|cdp|clock|
        cluster|commands|critical-resources|crypto|debug|debugging|device-categorization|
        event-history|event-system-policy|file|firewall|interface|ip|
        ip-access-list-stats|licenses|lldp|logging|mac-access-list-stats|
        mac-address-table|mint|noc|ntp|password-encryption|power|reload|remote-debug|
        rf-domain-manager|role|running-config session-changes|session-config|
        sessions-smart-rf|spanning-tree|startup-config|terminal|timezone|upgrade-status|
        version|wireless|wwan|context]

         show [adoption|                  Displays information about the state of device, its configuration, its current status, and
         advanced-wips|ap-upgrade|        statistics
         boot|captive-portal|             For more information on the show command, see show.
         cdp|clock|cluster|commands|
         critical-resources|
         crypto|debug|
         debugging|
         device-categorization|
         event-history|
         event-system-policy|
         file|firewall|interface|ip|
         ip-access-list-stats|
         licenses|lldp|logging|
         mac-access-list-stats|
         mac-address-table|mint|noc|
         ntp|password-encryption|
         power|reload|remote-debug|
         rf-domain-manager|role|
         running-config|
         session-changes|
         session-config|
         sessions-smart-rf|
         spanning-tree|startup-config|
         terminal|timezone|
         upgrade-status|version|
         wireless|wwan|context]
        • do ssh <IP>

         ssh <IP>                         Connects to a device using the SSH protocol
                                          For more information on the SSH command, see ssh.
GLOBAL CONFIGURATION COMMANDS 4 - 73


• do telnet <IP/HOSTNAME>

telnet <IP/HOSTNAME>           Connects to a device using the Telnet protocol
                               For more information on the Telnet command, see telnet.

• do terminal [length <LINES>|width <CHARACTERS>]

do terminal [length <LINES>|   Configures the CLI display characteristics
width <CHARACTERS>]            For more information on the terminal command, see terminal.

• do time-it <CLI-COMMAND>

time-it <CLI-COMMAND>          Captures the time required to execute a command in the CLI
                               For more information on the time-it command, see time-it.

• do traceroute <ARGS>

traceroute <ARGS>              Traces the path to the target devices through the network
                               For more information on the traceroute command, see traceroute.

• do upgrade [<FILE>|<URL>

upgrade [<FILE>|<URL>          Upgrades the device’s firmware from a file or a location
                               For more information on the upgrade command, see upgrade.

• do upgrade-abort {on <DEVICE>}

upgrade-abort {on <DEVICE-     Aborts an upgrade in progress on the logged device or remote device
NAME>}                         For more information on the upgrade abort command, see upgrade-abort.

• do watch <TIME> <CLI-COMMAND>

watch <TIME>                   Repeats a CLI command at a periodic interval
<CLI-COMMAND>                  For more information on the watch command, see watch.

• do write [memory|terminal]

write [memory|terminal]        Writes the changes made to the running configuration to the memory or to the
                               terminal
                               For more information on the write command, see write.
4 - 74 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config)#do ?
          ap-upgrade     AP firmware upgrade
          archive        Manage archive files
          boot           Boot commands
          cd             Change current directory
          change-passwd Change password
          clear          Clear
          clock          Configure software system clock
          cluster        Cluster commands
          commit         Commit all changes made in this session
          configure      Enter configuration mode
          connect        Open a console connection to a remote device
          copy           Copy from one file to another
          crypto         Encryption related commands
          debug          Debugging functions
          delete         Deletes specified file from the system.
          diff           Display differences between two files
          dir            List files on a filesystem
          disable        Turn off privileged mode command
          edit           Edit a text file
          enable         Turn on privileged mode command
          erase          Erase a filesystem
          format         Format file system
          halt           Halt the system
          help           Description of the interactive help system
          logging        Modify message logging facilities
          mint           MiNT protocol
          mkdir          Create a directory
          more           Display the contents of a file
          no             Negate a command or set its defaults
          page           Toggle paging
          ping           Send ICMP echo messages
          pwd            Display current directory
          reload         Halt and perform a warm reboot
          remote-debug   Troubleshoot remote system(s)
          rename         Rename a file
          revert         Revert changes
          rmdir          Delete a directory
          self           Config context of the device currently logged into
          ssh            Open an ssh connection
          telnet         Open a telnet connection
          terminal       Set terminal line parameters
          time-it        Check how long a particular command took between request and
                         completion of response
          traceroute     Trace route to destination
          upgrade        Upgrade software image
          upgrade-abort Abort an ongoing upgrade
          watch          Repeat the specific CLI command at a periodic interval
          write          Write running configuration to memory or terminal

          clrscr           Clears the display screen
          exit             Exit from the CLI
          service          Service Commands
          show             Show running system information

        rfs7000-37FABE(config)#
        Related Commands

         ap-upgrade           Runs the ap update command
         archive              Runs the archive command
         boot                 Configures the image used for the next boot
         cd                   Runs the command to change the present working directory
GLOBAL CONFIGURATION COMMANDS 4 - 75



change-passwd   Changes the password for the current login user
clear           Clears some configurations
clock           Configures a device’s time and date
clrscr          Clears the current screen
cluster         Starts the configuration for creating a cluster of servers
commit          Commits changes made in the current CLI session
configure       Changes the configuration mode
connect         Configures a remote device. This command uses a device’s hostname or MiNT ID to connect.
copy            Copies a file from one location to another
crypto          Configures the crypto command
delete          Deletes a file from a device’s filesystem
diff            Compares two files and displays the difference
dir             Displays the content of a directory in the device’s file system
disable         Moves the control to the User Exec mode
edit            Edits a file
enable          Moves the mode to Privilege Exec mode
enable          Erases the content of the specified storage device. Also erases the startup configuration to
                restore the device to its default.
exit            Exits from the CLI
format          Formats the CF card installed on a device
halt            Stops a device
help            Displays the CLI help
logging         Configures a device’s logging
mint            Performs MiNT operations such as ping and traceroute
mkdir           Creates a directory in the device’s file structure
more            Displays a file in the console window
no              Reverts or negates a command
page            Toggles paging of the command line interface
ping            Pings a device to check its availability
pwd             Displays the current working directory
reload          Halts a device and performs a warm reboot
rename          Renames a file on a device’s file system
4 - 76 WiNG CLI Reference Guide



         revert              Reverts changes made to the system during the current CLI session
         rmdir               Removes a directory in a device’s file system
         self                Loads a device’s configuration context
         service             Executes service commands
         ssh                 Connects to a device using SSH
         show                Displays a device’s state, configuration, and statistics
         telnet              Uses Telnet to connect to a device
         terminal            Configures the CLI display characteristics
         time-it             Captures the time required to execute a command in the CLI
         traceroute          Traces the path to target devices
         upgrade             Upgrades a device’s firmware from a file or a location
         upgrade-abort       Aborts an upgrade in progress on a logged or a remote device
         watch               Repeats a CLI command at a periodic interval
         write               Writes the changes made in the current session to the memory
GLOBAL CONFIGURATION COMMANDS 4 - 77


4.1.21 end
        Global Configuration Commands
      Ends and exits the current mode and moves to the PRIV EXEC mode
      The prompt changes to the PRIV EXEC mode.
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      end
      Parameters
      None
      Examples
      rfs7000-37FABE(config)#end
      rfs7000-37FABE#
4 - 78 WiNG CLI Reference Guide


4.1.22 event-system-policy
          Global Configuration Commands
        Configures how events are supported by the wireless controller. Each event can be configured individually to perform an
        action such as sending an e-mail or forwarding a notification to its parent wireless controller etc.
                                                     Table 4.10 Event System Policy Commands

              Command                                        Description                                      Reference
         event-system-policy      Configures the event system policy                                     page 4-79
GLOBAL CONFIGURATION COMMANDS 4 - 79


4.1.22.1 event-system-policy
          event-system-policy
        Configures a system wide events handling policy
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        event-system-policy <EVENT-SYSTEM-POLICY>
        Parameters
        • event-system-policy <EVENT-SYSTEM-POLICY>

         <EVENT-SYSTEM-POLICY>         Specify the event system policy name. If the policy does not exist, it is created.
        Examples
        rfs7000-37FABE(config)#event-system-policy event-testpolicy
        rfs7000-37FABE(config-event-system-policy-event-testpolicy)#?

        rfs7000-37FABE(config-event-system-policy-event-testpolicy)#?
        Event System Policy Mode commands:
          event    Configure an event
          no       Negate a command or set its defaults

          clrscr        Clears the display screen
          commit        Commit all changes made in this session
          do            Run commands from Exec mode
          end           End current mode and change to EXEC mode
          exit          End current mode and down to previous mode
          help          Description of the interactive help system
          revert        Revert changes
          service       Service Commands
          show          Show running system information
          write         Write running configuration to memory or terminal

        rfs7000-37FABE(config-event-system-policy-event-testpolicy)#
        Related Commands

         no                             Removes an event system policy
4 - 80 WiNG CLI Reference Guide


4.1.22.2 event-system-policy mode commands
          event-system-policy
        Table 4.11 summarizes event system policy mode commands
                                                   Table 4.11 event-system-policy mode commands

           Command                                           Description                               Reference
         event              Configures an event                                                      page 4-81
         no                 Negates a command or sets its default values                             page 4-91
         clrscr             Clears the display screen                                                page 5-3
         commit             Commits (saves) changes made in the current session                      page 5-4
         do                 Runs commands from EXEC mode                                             page 4-66
         end                Ends and exits the current mode and moves to the PRIV EXEC mode          page 5-5
         exit               Ends the current mode and moves to the previous mode                     page 5-6
         help               Displays the interactive help system                                     page 5-7
         revert             Reverts changes to their last saved configuration                        page 5-13
         service            Invokes service commands to troubleshoot or debug (config-if) instance   page 5-14
                            configurations
         show               Displays running system information                                      page 6-4
         write              Writes information to memory or terminal                                 page 5-42
GLOBAL CONFIGURATION COMMANDS 4 - 81


4.1.22.2.1 event
            event-system-policy mode commands
         Configures an event and sets the action performed when the event happens
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         event <EVENT-TYPE> <EVENT> (email,forward-to-switch,snmp,syslog) [default|on|off]



                         NOTE: The parameter values for <event type> and <event name> are summarized in the
                         table under the Parameters section.
4 - 82 WiNG CLI Reference Guide


        Parameters
        • event <EVENT-TYPE> <EVENT> (email,forward-to-switch,snmp,syslog) [default|on|off]

                <event type>                                       <event name>
         aaa                      Configures authentication, authorization, and accounting related event messages
                                  • radius-discon-msg – RADIUS disconnection message
                                  • radius-session-expired – RADIUS session expired message
                                  • radius-session-not-started – RADIUS session not started message
                                  • radius-vlan-update – RADIUS VLAN update message
         adv-wips                 Configures advanced WIPS related event messages
                                  • adv-wips-event-1 – Event adv-wips-event-1 message
                                  • adv-wips-event-10 – Event adv-wips-event-10 message
                                  • adv-wips-event-105 – Event adv-wips-event-105 message
                                  • adv-wips-event-109 – Event adv-wips-event-109 message
                                  • adv-wips-event-11 – Event adv-wips-event-11 message
                                  • adv-wips-event-110 – Event adv-wips-event-110 message
                                  • adv-wips-event-111 – Event adv-wips-event-111 message
                                  • adv-wips-event-112 – Event adv-wips-event-112 message
                                  • adv-wips-event-113 – Event adv-wips-event-113 message
                                  • adv-wips-event-114 – Event adv-wips-event-114 message
                                  • adv-wips-event-115 – Event adv-wips-event-115 message
                                  • adv-wips-event-116 – Event adv-wips-event-116 message
                                  • adv-wips-event-117 – Event adv-wips-event-117 message
                                  • adv-wips-event-118 – Event adv-wips-event-118 message
                                  • adv-wips-event-119 – Event adv-wips-event-119 message
                                  • adv-wips-event-12 – Event adv-wips-event-12 message
                                  • adv-wips-event-120 – Event adv-wips-event-120 message
                                  • adv-wips-event-121 – Event adv-wips-event-121 message
                                  • adv-wips-event-13 – Event adv-wips-event-13 message
                                  • adv-wips-event-14 – Event adv-wips-event-14 message
                                  • adv-wips-event-142 – Event adv-wips-event-142 message
                                  • adv-wips-event-16 – Event adv-wips-event-16 message
                                  • adv-wips-event-19 – Event adv-wips-event-19 message
                                  • adv-wips-event-2 – Event adv-wips-event-2 message
                                  • adv-wips-event-21 – Event adv-wips-event-21message
                                  • adv-wips-event-220 – Event adv-wips-event-220 message
GLOBAL CONFIGURATION COMMANDS 4 - 83



        <event type>                                    <event name>
                       •   adv-wips-event-221 – Event adv-wips-event-221 message
                       •   adv-wips-event-222 – Event adv-wips-event-222 message
                       •   adv-wips-event-25 – Event adv-wips-event-25 message
                       •   adv-wips-event-26 – Event adv-wips-event-26 message
                       •   adv-wips-event-29 – Event adv-wips-event-29 message
                       •   adv-wips-event-3 – Event adv-wips-event-3 message
                       •   adv-wips-event-47 – Event adv-wips-event-47 message
                       •   adv-wips-event-63 – Event adv-wips-event-63 message
                       •   adv-wips-event-87 – Event adv-wips-event-87 message
ap                     Configures AP event messages
                       • adopted – Event AP adopted message
                       • adopted-to-controller – Event AP adopted to wireless controller message
                       • ap-adopted – Event access port adopted message
                       • ap-autoup-done – Event AP autoup done message
                       • ap-autoup-fail – Event AP autoup fail message
                       • ap-autoup-needed – Event AP autoup needed message
                       • ap-autoup-no-need – Event AP autoup not needed message
                       • ap-autoup-reboot – Event AP autoup reboot message
                       • ap-autoup-timeout – Event AP autoup timeout message
                       • ap-autoup-ver – Event AP autoup version message
                       • image-parse-failure – Event image parse failure message
                       • legacy-auto-update – Event legacy auto update message
                       • no-image-file – Event no image file message
                       • reset – Event reset message
                       • sw-conn-lost – Event software connection lost message
                       • unadopted – Event unadopted message
captive-portal         Configures captive portal (hotspot) related event messages
                       • allow-access – Event client allowed access message
                       • auth-failed – Event authentication failed message
                       • auth-success – Event authentication success message
                       • client-disconnect – Event client disconnected message
                       • client-removed – Event client removed message
                       • flex-log-access – Event flexible log access granted to client message
                       • inactivity-timeout – Event client time-out due to inactivity message
                       • purge-client – Event client purged message
                       • session-timeout – Event session timeout message
4 - 84 WiNG CLI Reference Guide



                   <event type>                                     <event name>
         certmgr                  Configures certificate manager related event messages
                                  • ca-cert-actions-failure – Event CA certificate actions failure message
                                  • ca-cert-actions-success – Event CA certificate actions success message
                                  • ca-key-actions-failure – Event CA key actions failure message
                                  • ca-key-actions-success – Event CA key actions success message
                                  • cert-expiry – Event certificate expiry message
                                  • crl-actions-failure – Event Certificate Revocation List (CRL) actions failure
                                    message
                                  • crl-actions-success – Event CRL actions success message
                                  • csr-export-failure – Event CSR export failure message
                                  • csr-export-success – Event CSR export success message
                                  • delete-trustpoint-action – Event delete trustpoint action message
                                  • export-trustpoint – Event export trustpoint message
                                  • import-trustpoint – Event import trustpoint message
                                  • rsa-key-actions-failure – Event RSA key actions failure message
                                  • rsa-key-actions-success – Event RSA key actions success message
                                  • svr-cert-actions-success – Event server certificate actions success message
                                  • svr-cert-actions-failure – Event server certificate actions failure message
         cfgd                     Configures configuration daemon module related event messages
                                  • acl-attached-altered – Event Access List (ACL) attached altered message
                                  • acl-rule-altered – Event ACL rule altered message
         cluster                  Configures cluster module related messages
                                  • max-exceeded – Event maximum cluster count exceeded message
         crm                      Configures Critical Resource Monitoring related event messages
                                  • critical-resource-down – Event Critical Resource Down message
                                  • critical-resource-up – Event Critical Resource Up message
         dhcpsvr                  Configures DHCP server related event messages
                                  • dhcp-start – Event DHCP server started message
                                  • dhcpsvr-stop – Event DHCP sever stopped message
                                  • relay-iface-no-ip – Event no IP address on DHCP relay interface message
                                  • relay-no-iface – Event no interface for DHCP relay message
                                  • relay-start – Event relay agent started
                                  • relay-stop – Event DHCP relay agent stopped
GLOBAL CONFIGURATION COMMANDS 4 - 85



       <event type>                                  <event name>
diag                  Configures diagnostics module related event messages
                      • autogen-tech-sprt – Event autogen technical support message
                      • buf-usage – Event buffer usage message
                      • cpu-load – Event CPU load message
                      • disk-usage – Event disk usage message
                      • elapsed-time – Event elapsed time message
                      • fan-underspeed – Event fan underspeed message
                      • fd-count – Event forward count message
                      • free-flash-disk – Event free flash disk message
                      • free-flash-inodes – Event free flash inodes message
                      • free-nvram-disk – Event free nvram disk message
                      • free-nvram-inodes – Event free nvram inodes message
                      • free-ram – Event free ram message
                      • free-ram-disk – Event free ram disk message
                      • free-ram-inodes – Event free ram inodes message
                      • head-cache-usage – Event head cache usage message
                      • high-temp – Event high temp message
                      • ip-dest-usage – Event ip destination usage message
                      • led-identify – Event led identify message
                      • low-temp – Event low temp message
                      • new-led-state – Event new led state message
                      • over-temp – Event over temp message
                      • over-voltage – Event over voltage message
                      • poe-init-fail – Event PoE init fail message
                      • poe-power-level – Event PoE power level message
                      • poe-read-fail – Event PoE read fail message
                      • poe-state-change – Event PoE state change message
                      • ram-usage – Event ram usage message
                      • under-voltage – Event under voltage message
                      • wd-reset-sys – Event wd reset system message
                      • wd-state-change – Event wd state change message
4 - 86 WiNG CLI Reference Guide



                 <event type>                                     <event name>
         dot11                    Configures 802.11 management module related event messages
                                  • client-associated – Wireless client associated event message
                                  • client-denied-assoc – Event client denied association message
                                  • client-disassociated – Wireless client disassociated message
                                  • country-code – Event country code message
                                  • country-code-error – Event country code error message
                                  • eap-cached-keys – Event EAP cached keys message
                                  • eap-client-timeout – Event EAP client timeout message
                                  • eap-failed – Event EAP failed message
                                  • eap-opp-cached-keys – Event EAP opp cached keys message
                                  • eap-preauth-client-timeout – Event EAP pre authentication client timeout
                                    message
                                  • eap-preauth-failed – Event EAP pre authentication failed message
                                  • eap-preauth-server-timeout – Event EAP pre authentication server timeout
                                    message
                                  • eap-preauth-success – Event EAP pre authentication success message
                                  • eap-server-timeout – Event EAP server timeout message
                                  • eap-success – Event EAP success message
                                  • kerberos-client-failed – Event Kerberos client failed message
                                  • kerberos-client-success – Event Kerberos client success message
                                  • kerberos-wlan-failed – Event Kerberos WLAN failed message
                                  • kerberos-wlan-success – Event Kerberos WLAN success message
                                  • kerberos-wlan-timeout – Event Kerberos WLAN timeout message
                                  • tkip-cntrmeas-end – Event TKIP cntrmeas end message
                                  • tkip-cntrmeas-start – Event TKIP cntrmeas start message
                                  • tkip-mic-fail-report – Event TKIP mic fail report message
                                  • tkip-mic-failure – Event TKIP mic failure message
                                  • unsanctioned-ap-active – Event unsanctioned AP active message
                                  • unsanctioned-ap-inactive – Event unsanctioned AP inactive message
                                  • unsanctioned-ap-status-change – Event unsanctioned AP status change
                                  • voice-call-completed – Event voice call completed message
                                  • voice-call-failed – Event voice call failed message
                                  • wpa-wpa2-failed – Event WPA-WPA2 failed message
                                  • wpa-wpa2-key-rotn – Event WPA-WPA2 key rotn message
                                  • wpa-wpa2-success – Event WPA-WPA2 success message
GLOBAL CONFIGURATION COMMANDS 4 - 87



         <event type>                                    <event name>
filemgmt                Configures file management module related event messages
                        • http – Event HTTP message
                        • httplocal – Event HTTP local message
                        • https-start – Event HTTPS start message
                        • https-wait – Event HTTPS wait message
                        • httpstart – Event HTTP start message
                        • keyadded – Event key added message
                        • keydeleted – Event key deleted message
                        • trustpointdeleted – Event trustpoint deleted message
fwu                     Configures firmware update related event messages
                        • fwuaborted – Event fwu aborted message
                        • fwubadconfig – Event fwu bad config message
                        • fwucorruptedfile – Event fwu corrupted file message
                        • fwucouldntgetfile – Event fwu could not get file message
                        • fwudone – Event fwu done message
                        • fwufileundef – Event fwu file undefined message
                        • fwunoneed – Event fwu no need message
                        • fwuprodmismatch – Event fwu prod mismatch message
                        • fwuserverundef – Event fwu server undefined message
                        • fwuserverunreachable – Event fwu server unreachable message
                        • fwusignmismatch – Event fwu signature mismatch message
                        • fwusyserr – Event fwu system error message
                        • fwuunsupportedhw – Event fwu unsupported hardware message
                        • fwuvermismatch – Event fwu version mismatch message
licmgr                  Configures license manager module related event messages
                        • lic-installed-count – Event total number of license installed count message
                        • lic-installed-default – Event default license installation message
                        • lic-installed – Event license installed message
                        • lic-invalid – Event license installation failed message
                        • lic-removed – Event license removed message
mesh                    Configures mesh module related event messages
                        • mesh-link-down – Event mesh link down message
                        • mesh-link-up – Event mesh link up message
4 - 88 WiNG CLI Reference Guide



                   <event type>                                   <event name>
         nsm                      Configures Network Service Module (NSM) related event message
                                  • dhcpc-err – Event DHCP certification error message
                                  • dhcpdefrt – Event DHCP defrt message
                                  • dhcpip – Event DHCP IP message
                                  • dhcpipchg – Event DHCP IP change message
                                  • dhcpipnoadd – Event DHCP IP overlaps static IP address message
                                  • dhcplsexp – Event DHCP lease expiry message
                                  • dhcpnak – Event DHCP server returned DHCP NAK response
                                  • ifdown – Event interface down message
                                  • ifipcfg – Event interface IP config message
                                  • ifup – Event interface up message
         pm                       Configures process monitor module related event messages
                                  • procid – Event proc ID message
                                  • procmaxrstrt – Event proc max restart message
                                  • procnoresp – Event proc no response message
                                  • procrstrt – Event proc restart message
                                  • procstart – Event proc start message
                                  • procstop – Event proc stop message
                                  • procsysrstrt – Event proc system restart message
                                  • startupcomplete – Event startup complete message
         radconf                  Configures RADIUS configuration daemon related event messages
                                  • could-not-stop-radius – Event could not stop RADIUS server message
                                  • radiusdstart – Event RADIUS server started message
                                  • radiusdstop – Event RADIUS server stopped message
         radio                    Configures radio module related event messages
                                  • acs-scan-complete – Event ACS scan completed
                                  • acs-scan-started – Event ACS scan started
                                  • radar-detected – Event radar detected message
                                  • radar-scan-completed – Event radar scan completed message
                                  • radar-scan-started – Event radar scan started message
                                  • radio-state-change – Event radio state change message
                                  • resume-home-channel – Event resume home channel message
         securitymgr              Configures the security manager module related event messages
                                  • deprecatedcli – Event deprecated CLI message
                                  • fatal-hit – Event fatal hit message
                                  • log-cli-error – Event log CLI error message
                                  • userpassstrength – Event user pass strength message
GLOBAL CONFIGURATION COMMANDS 4 - 89



          <event type>                                    <event name>
smrt                     Configures SMART RF module related event messages
                         • calibration-done – Event calibration done message
                         • calibration-started – Event calibration started message
                         • config-cleared – Configuration cleared event message
                         • cov-hole-recovery – Event coverage hole recovery message
                         • cov-hole-recovery-done – Event coverage hole recovery done message
                         • interference-recovery – Event interference recovery message
                         • neighbor-recovery – Event neighbor recovery message
                         • power-adjustment – Event power adjustment message
smtpnot                  Configures SMTP module related event messages
                         • cfg – Event cfg message
                         • cfginc – Event cfg inc message
                         • net – Event net message
                         • proto – Event proto message
                         • smtpauth – Event SMTP authentication message
                         • smtperr – Event SMTP error message
                         • smtpinfo – Event SMTP information message
system                   Configures system module related event messages
                         • clock-reset – Event clock reset message
                         • http – Event HTTP message
                         • login – Event successful login message
                         • login-fail – Event login fail message. Occurs when user authentication fails.
                         • login-fail-access – Event login fail access message.Occurs in case of access
                           violation.
                         • login-fail-bad-role – Event login fail bad role message. Occurs when user uses an
                           invalid role to logon.
                         • logout – Event logout message
                         • panic – Event panic message
                         • procstop – Event proc stop message
                         • system-autoup-disable – Event system autoup disable message
                         • system-autoup-enable – Event system autoup enable message
                         • ui-user-auth-fail – Event user authentication fail message
                         • ui-user-auth-success – Event user authentication success message
4 - 90 WiNG CLI Reference Guide



                   <event type>                                     <event name>
         test                     Configures the test module related event messages
                                  • testalert – Event test alert message
                                  • testargs – Event test arguments message
                                  • testcrit – Event test critical message
                                  • testdebug – Event test debug message
                                  • testemerg – Event test emergency message
                                  • testerr – Event test error message
                                  • testinfo – Event test information message
                                  • testnotice – Event test notice message
                                  • testwarn – Event test warning message
         wips                     Configures the Wireless IPS module related event messages
                                  • wips-client-blacklisted – Event WIPS client blacklisted message
                                  • wips-client-rem-blacklist – Event WIPS client rem blacklist message
                                  • wips-event – Event WIPS event triggered message
         email                    Sends e-mail notifications to a pre configured e-mail ID
         forward-to-switch        Forwards the messages to an external server
         snmp                     Logs an SNMP event
         syslog                   Logs event to syslog
         default                  Performs the default action for the event
         off                      Switches the event off, when the event happens, no action is performed
         on                       Switches the event on, when the event happens, the configured action is taken
        Examples
        rfs7000-37FABE(config-event-system-policy-event-testpolicy)#event aaa radius-discon-
        msg email on forward-to-switch default snmp default syslog default
        rfs7000-37FABE(config-event-system-policy-event-testpolicy)#

        rfs7000-37FABE(config-event-system-policy-adv-wips)#

        rfs7000-37FABE(config-event-system-policy-testpolicy)#show context
        event-system-policy testpolicy
         event sole adaptererr syslog off snmp off forward-to-switch off
        rfs7000-37FABE(config-event-system-policy-testpolicy)#
        Related Commands

         no                       Resets or disables events commands
GLOBAL CONFIGURATION COMMANDS 4 - 91


4.1.22.2.2 no
            event-system-policy mode commands
         Negates an event configuration
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         no [<event type>] [<event name>] [email|forward-to-switch|snmp|syslog]
         [default|on|off]
4 - 92 WiNG CLI Reference Guide


        Parameters
        • no event <EVENT-TYPE> <EVENT> (email,forward-to-switch,snmp,syslog)
        [default|on|off]

                <event type>                                       <event name>
         aaa                      Resets authentication, authorization, and accounting related event messages
                                  • radius-discon-msg – RADIUS disconnection message
                                  • radius-session-expired – RADIUS session expired message
                                  • radius-session-not-started – RADIUS session not started message
                                  • radius-vlan-update – RADIUS VLAN update message
         adv-wips                 Resets advanced WIPS related event messages
                                  • adv-wips-event-1 – Event adv-wips-event-1 message
                                  • adv-wips-event-10 – Event adv-wips-event-10 message
                                  • adv-wips-event-105 – Event adv-wips-event-105 message
                                  • adv-wips-event-109 – Event adv-wips-event-109 message
                                  • adv-wips-event-11 – Event adv-wips-event-11 message
                                  • adv-wips-event-110 – Event adv-wips-event-110 message
                                  • adv-wips-event-111 – Event adv-wips-event-111 message
                                  • adv-wips-event-112 – Event adv-wips-event-112 message
                                  • adv-wips-event-113 – Event adv-wips-event-113 message
                                  • adv-wips-event-114 – Event adv-wips-event-114 message
                                  • adv-wips-event-115 – Event adv-wips-event-115 message
                                  • adv-wips-event-116 – Event adv-wips-event-116 message
                                  • adv-wips-event-117 – Event adv-wips-event-117 message
                                  • adv-wips-event-118 – Event adv-wips-event-118 message
                                  • adv-wips-event-119 – Event adv-wips-event-119 message
                                  • adv-wips-event-12 – Event adv-wips-event-12 message
                                  • adv-wips-event-120 – Event adv-wips-event-120 message
                                  • adv-wips-event-121 – Event adv-wips-event-121 message
                                  • adv-wips-event-13 – Event adv-wips-event-13 message
                                  • adv-wips-event-14 – Event adv-wips-event-14 message
                                  • adv-wips-event-142 – Event adv-wips-event-142 message
                                  • adv-wips-event-16 – Event adv-wips-event-16 message
                                  • adv-wips-event-19 – Event adv-wips-event-19 message
                                  • adv-wips-event-2 – Event adv-wips-event-2 message
                                  • adv-wips-event-21 – Event adv-wips-event-21message
                                  • adv-wips-event-220 – Event adv-wips-event-220 message
GLOBAL CONFIGURATION COMMANDS 4 - 93



        <event type>                                    <event name>
                       •   adv-wips-event-221 – Event adv-wips-event-221 message
                       •   adv-wips-event-222 – Event adv-wips-event-222 message
                       •   adv-wips-event-25 – Event adv-wips-event-25 message
                       •   adv-wips-event-26 – Event adv-wips-event-26 message
                       •   adv-wips-event-29 – Event adv-wips-event-29 message
                       •   adv-wips-event-3 – Event adv-wips-event-3 message
                       •   adv-wips-event-47 – Event adv-wips-event-47 message
                       •   adv-wips-event-63 – Event adv-wips-event-63 message
                       •   adv-wips-event-87 – Event adv-wips-event-87 message
ap                     Resets AP event messages
                       • adopted – Event AP adopted message
                       • adopted-to-controller – Event AP adopted to wireless controller message
                       • ap-adopted – Event access port adopted message
                       • ap-autoup-done – Event AP autoup done message
                       • ap-autoup-fail – Event AP autoup fail message
                       • ap-autoup-needed – Event AP autoup needed message
                       • ap-autoup-no-need – Event AP autoup not needed message
                       • ap-autoup-reboot – Event AP autoup reboot message
                       • ap-autoup-timeout – Event AP autoup timeout message
                       • ap-autoup-ver – Event AP autoup version message
                       • image-parse-failure – Event image parse failure message
                       • legacy-auto-update – Event legacy auto update message
                       • no-image-file – Event no image file message
                       • reset – Event reset message
                       • sw-conn-lost – Event software connection lost message
                       • unadopted – Event unadopted message
captive-portal         Resets captive portal (hotspot) related event messages
                       • allow-access – Event client allowed access message
                       • auth-failed – Event authentication failed message
                       • auth-success – Event authentication success message
                       • client-disconnect – Event client disconnected message
                       • client-removed – Event client removed message
                       • flex-log-access – Event flexible log access granted to client message
                       • inactivity-timeout – Event client timed out due to inactivity message
                       • purge-client – Event client purged message
                       • session-timeout – Event session timeout message
4 - 94 WiNG CLI Reference Guide



                   <event type>                                    <event name>
         certmgr                  Resets certificate manager related event messages
                                  • ca-cert-actions-failure – Event CA certificate actions failure message
                                  • ca-cert-actions-success – Event CA certificate actions success message
                                  • ca-key-actions-failure – Event CA key actions failure message
                                  • ca-key-actions-success – Event CA key actions success message
                                  • cert-expiry – Event certificate expiry message
                                  • crl-actions-failure – Event CRL actions failure message
                                  • crl-actions-success – Event CRL actions success message
                                  • csr-export-failure – Event CSR export failure message
                                  • csr-export-success – Event CSR export success message
                                  • delete-trustpoint-action – Event delete trustpoint action message
                                  • export-trustpoint – Event export trustpoint message
                                  • import-trustpoint – Event import trustpoint message
                                  • rsa-key-actions-failure – Event RSA key actions failure message
                                  • rsa-key-actions-success – Event RSA key actions success message
                                  • srv-cert-actions-success – Event server certificate actions success message
                                  • svr-cert-actions-failure – Event server certificate actions failure message
         cfgd                     Resets configuration daemon module related event messages
                                  • acl-attached-altered – Event ACL attached altered message
                                  • acl-rule-altered – Event ACL rule altered message
         cluster                  Resets cluster module related messages
                                  • max-exceeded – Event maximum cluster count exceeded message
         crm                      Resets Critical Resource Monitoring related event messages
                                  • critical-resource-down – Event Critical Resource Down message
                                  • critical-resource-up – Event Critical Resource Up message
         dhcpsvr                  Resets DHCP server related event messages
                                  • dhcp-start – Event DHCP server started message
                                  • dhcpsvr-stop – Event DHCP sever stopped message
                                  • relay-iface-no-ip – Event no IP address on DHCP relay interface message
                                  • relay-no-iface – Event no interface for DHCP relay message
                                  • relay-start – Event relay agent started
                                  • relay-stop – Event DHCP relay agent stopped
GLOBAL CONFIGURATION COMMANDS 4 - 95



       <event type>                                   <event name>
diag                  Resets diagnostics module related event messages
                      • autogen-tech-sprt – Event autogen technical support message
                      • buf-usage – Event buffer usage message
                      • cpu-load – Event CPU load message
                      • disk-usage – Event disk usage message
                      • elapsed-time – Event elapsed time message
                      • fan-underspeed – Event fan underspeed message
                      • fd-count – Event forward count message
                      • free-flash-disk – Event free flash disk message
                      • free-flash-inodes – Event free flash inodes message
                      • free-nvram-disk – Event free nvram disk message
                      • free-nvram-inodes – Event free nvram inodes message
                      • free-ram – Event free ram message
                      • free-ram-disk – Event free ram disk message
                      • free-ram-inodes – Event free ram inodes message
                      • head-cache-usage – Event head cache usage message
                      • high-temp – Event high temp message
                      • ip-dest-usage – Event ip destination usage message
                      • led-identify – Event led identify message
                      • low-temp – Event low temp message
                      • new-led-state – Event new led state message
                      • over-temp – Event over temp message
                      • over-voltage – Event over voltage message
                      • poe-init-fail – Event PoE init fail message
                      • poe-power-level – Event PoE power level message
                      • poe-read-fail – Event PoE read fail message
                      • poe-state-change – Event PoE state change message
                      • ram-usage – Event ram usage message
                      • under-voltage – Event under voltage message
                      • wd-reset-sys – Event wd reset system message
                      • wd-state-change – Event wd state change message
4 - 96 WiNG CLI Reference Guide



                 <event type>                                     <event name>
         dot11                    Resets 802.11 management module related event messages
                                  • client-associated – Wireless client associated event message
                                  • client-denied-assoc – Event client denied association message
                                  • client-disassociated – Wireless client disassociated message
                                  • country-code – Event country code message
                                  • country-code-error – Event country code error message
                                  • eap-cached-keys – Event EAP cached keys message
                                  • eap-client-timeout – Event EAP client timeout message
                                  • eap-failed – Event EAP failed message
                                  • eap-opp-cached-keys – Event EAP opp cached keys message
                                  • eap-preauth-client-timeout – Event EAP pre authentication client timeout
                                    message
                                  • eap-preauth-failed – Event EAP pre authentication failed message
                                  • eap-preauth-server-timeout – Event EAP pre authentication server timeout
                                    message
                                  • eap-preauth-success – Event EAP pre authentication success message
                                  • eap-server-timeout – Event EAP server timeout message
                                  • eap-success – Event EAP success message
                                  • kerberos-client-failed – Event Kerberos client failed message
                                  • kerberos-client-success – Event Kerberos client success message
                                  • kerberos-wlan-failed – Event Kerberos WLAN failed message
                                  • kerberos-wlan-success – Event Kerberos WLAN success message
                                  • kerberos-wlan-timeout – Event Kerberos WLAN timeout message
                                  • tkip-cntrmeas-end – Event TKIP cntrmeas end message
                                  • tkip-cntrmeas-start – Event TKIP cntrmeas start message
                                  • tkip-mic-fail-report – Event TKIP mic fail report message
                                  • tkip-mic-failure – Event TKIP mic failure message
                                  • unsanctioned-ap-active – Event unsanctioned AP active message
                                  • unsanctioned-ap-inactive – Event unsanctioned AP inactive message
                                  • unsanctioned-ap-status-change – Event unsanctioned AP status change
                                  • voice-call-completed – Event voice call completed message
                                  • voice-call-failed – Event voice call failed message
                                  • wpa-wpa2-failed – Event WPA-WPA2 failed message
                                  • wpa-wpa2-key-rotn – Event WPA-WPA2 key rotn message
                                  • wpa-wpa2-success – Event WPA-WPA2 success message
GLOBAL CONFIGURATION COMMANDS 4 - 97



         <event type>                                    <event name>
filemgmt                Resets file management module related event messages
                        • http – Event HTTP message
                        • httplocal – Event HTTP local message
                        • https-start – Event HTTPS start message
                        • https-wait – Event HTTPS wait message
                        • httpstart – Event HTTP start message
                        • keyadded – Event key added message
                        • keydeleted – Event key deleted message
                        • trustpointdeleted – Event trustpoint deleted message
fwu                     Resets firmware update related event messages
                        • fwuaborted – Event aborted message
                        • fwubadconfig – Event bad config message
                        • fwucorruptedfile – Event corrupted file message
                        • fwucouldntgetfile – Event could not get file message
                        • fwudone – Event done message
                        • fwufileundef – Event file undefined message
                        • fwunoneed – Event no need message
                        • fwuprodmismatch – Event prod mismatch message
                        • fwuserverundef – Event server undefined message
                        • fwuserverunreachable – Event server unreachable message
                        • fwusignmismatch – Event signature mismatch message
                        • fwusyserr – Event system error message
                        • fwuunsupportedhw – Event unsupported hardware message
                        • fwuvermismatch – Event version mismatch message
licmgr                  Resets license manager module related event messages
                        • lic-installed-count – Event total number of license installed count message
                        • lic-installed-default – Event default license installation message
                        • lic-installed – Event license installed message
                        • lic-invalid – Event license installation failed message
                        • lic-removed – Event license removed message
mesh                    Resets mesh module related event messages
                        • mesh-link-down – Event mesh link down message
                        • mesh-link-up – Event mesh link up message
4 - 98 WiNG CLI Reference Guide



                   <event type>                                   <event name>
         nsm                      Resets NSM related event messages
                                  • dhcpc-err – Event DHCP certification error message
                                  • dhcpdefrt – Event DHCP defrt message
                                  • dhcpip – Event DHCP IP message
                                  • dhcpipchg – Event DHCP IP change message
                                  • dhcpipnoadd – Event DHCP IP overlaps static IP address message
                                  • dhcplsexp – Event DHCP lease expiry message
                                  • dhcpnak – Event DHCP server returned DHCP NAK response
                                  • ifdown – Event interface down message
                                  • ifipcfg – Event interface IP config message
                                  • ifup – Event interface up message
         pm                       Resets process monitor module related event messages
                                  • procid – Event proc ID message
                                  • procmaxrstrt – Event proc max restart message
                                  • procnoresp – Event proc no response message
                                  • procrstrt – Event proc restart message
                                  • procstart – Event proc start message
                                  • procstop – Event proc stop message
                                  • procsysrstrt – Event proc system restart message
                                  • startupcomplete – Event startup complete message
         radconf                  Resets RADIUS configuration daemon related event messages
                                  • could-not-stop-radius – Event could not stop RADIUS server message
                                  • radiusdstart – Event RADIUS server started message
                                  • radiusdstop – Event RADIUS server stopped message
         radio                    Resets radio module related event messages
                                  • acs-scan-complete – Event ACS scan completed
                                  • acs-scan-started – Event ACS scan started
                                  • radar-detected – Event radar detected message
                                  • radar-scan-completed – Event radar scan completed message
                                  • radar-scan-started – Event radar scan started message
                                  • radio-state-change – Event radio state change message
                                  • resume-home-channel – Event resume home channel message
         securitymgr              Resets the security manager module related event messages
                                  • deprecatedcli – Event deprecated CLI message
                                  • fatal-hit – Event fatal hit message
                                  • log-cli-error – Event log CLI error message
                                  • userpassstrength – Event user pass strength message
GLOBAL CONFIGURATION COMMANDS 4 - 99



          <event type>                                    <event name>
smrt                     Resets SMART RF module related event messages
                         • calibration-done – Event calibration done message
                         • calibration-started – Event calibration started message
                         • config-cleared – Configuration cleared event message
                         • cov-hole-recovery – Event coverage hole recovery message
                         • cov-hole-recovery-done – Event coverage hole recovery done message
                         • interference-recovery – Event interference recovery message
                         • neighbor-recovery – Event neighbor recovery message
                         • power-adjustment – Event power adjustment message
smtpnot                  Resets SMTP module related event messages
                         • cfg – Event cfg message
                         • cfginc – Event cfg inc message
                         • net – Event net message
                         • proto – Event proto message
                         • smtpauth – Event SMTP authentication message
                         • smtperr – Event SMTP error message
                         • smtpinfo – Event SMTP information message
system                   Resets system module related event messages
                         • clock-reset – Event clock reset message
                         • http – Event HTTP message
                         • login – Event successful login message
                         • login-fail – Event login fail message. Occurs when user authentication fails.
                         • login-fail-access – Event login fail access message.Occurs in case of access
                           violation.
                         • login-fail-bad-role – Event login fail bad role message. Occurs when user uses an
                           invalid role to logon.
                         • logout – Event logout message
                         • panic – Event panic message
                         • procstop – Event proc stop message
                         • system-autoup-disable – Event system autoup disable message
                         • system-autoup-enable – Event system autoup enable message
                         • ui-user-auth-fail – Event ui user authentication fail message
                         • ui-user-auth-success – Event ui user authentication success message
4 - 100 WiNG CLI Reference Guide



                 <event type>                                       <event name>
         test                      Resets the test module related event messages
                                   • testalert – Event test alert message
                                   • testargs – Event test arguments message
                                   • testcrit – Event test critical message
                                   • testdebug – Event test debug message
                                   • testemerg – Event test emergency message
                                   • testerr – Event test error message
                                   • testinfo – Event test information message
                                   • testnotice – Event test notice message
                                   • testwarn – Event test warning message
         wips                      Resets the Wireless IPS module related event messages
                                   • wips-client-blacklisted – Event WIPS client blacklisted message
                                   • wips-client-rem-blacklist – Event WIPS client rem blacklist message
                                   • wips-event – Event WIPS event triggered message
        Examples
        rfs7000-37FABE(config-event-system-policy-testpolicy)#

        rfs7000-37FABE(config-event-system-policy-testpolicy)#no event aaa
        % Error: event_system_policy[aaa] does not exist, unable to delete
        rfs7000-37FABE(config)#
        Related Commands

         event                     Configures the action taken for each event
GLOBAL CONFIGURATION COMMANDS 4 - 101


4.1.23 firewall-policy
         Global Configuration Commands
      Configures a firewall policy. This policy defines a set of rules for managing network traffic and prevent unauthorized access
      to the network behind the firewall while allowing authorized devices access.
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      firewall-policy <FIREWALL-POLICY-NAME>
      Parameters
      • firewall-policy <FIREWALL-POLICY-NAME>

       <FIREWALL-POLICY-NAME>            Specify the firewall policy name. If a firewall policy does not exist, it is created.
      Examples
      rfs7000-37FABE(config)#firewall-policy test
      rfs7000-37FABE(config-fw-policy-test)#
      Related Commands

       no                                Removes an existing firewall policy



                       NOTE: For more information on Firewall policy, see Chapter 14, FIREWALL-POLICY.
4 - 102 WiNG CLI Reference Guide


4.1.24 host
          Global Configuration Commands
        Enters the configuration context of a remote device using its hostname
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        host <DEVICE-NAME>
        Parameters
        • host <DEVICE-NAME>

         <DEVICE-NAME>                    Specify the device’s hostname. All discovered devices are displayed when ‘Tab’ is
                                          pressed to auto complete this command.
        Examples
        rfs7000-37FABE(config)#host rfs7000-37FABE
        rfs7000-37FABE(config-device-00-04-96-42-14-79)#
GLOBAL CONFIGURATION COMMANDS 4 - 103


4.1.25 igmp-snoop-policy
         Global Configuration Commands
      Configures an IGMP snoop policy. IGMP snooping filters out multicast IGMP packets for those clients not subscribed to the
      IGMP multicast group. A wireless controller floods all ports in a IGMP broadcast domain by default. This can cause
      unnecessary load on host devices that have not subscribed to these streams, requiring them to process these unwanted
      packets.
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
         • RFS7000
      Syntax
      igmp-snoop-policy <IGMP-SNOOP-POLICY-NAME>
      Parameters
      • igmp-snoop-policy <IGMP-SNOOP-POLICY-NAME>

       <IGMP-SNOOP-POLICY-               Specify the IGMP snoop policy name. This policy is created if it does not exist.
       NAME>
      Examples
      rfs7000-37FABE(config)#igmp-snoop-policy test
      rfs7000-37FABE(config-igmp-snoop-policy-test)#

      rfs7000-37FABE(config-igmp-snoop-policy-test)#?
       commands:
        igmp-snooping          Enable IGMP snooping
        no                     Negate a command or set its defaults
        querier                Configure IGMP querier
        robustness-variable    Configure IGMP Robustness Variable
        unknown-multicast-fwd Forward Unknown Multicast Packet

        clrscr                             Clears the display screen
        commit                             Commit all changes made in this session
        do                                 Run commands from Exec mode
        end                                End current mode and change to EXEC mode
        exit                               End current mode and down to previous mode
        help                               Description of the interactive help system
        revert                             Revert changes
        service                            Service Commands
        show                               Show running system information
        write                              Write running configuration to memory or terminal
      rfs7000-37FABE(config-igmp-snoop-policy-test)#
4 - 104 WiNG CLI Reference Guide


        Related Commands

         no                         Removes an IGMP snoop policy



                    NOTE: For more information on IGMP snooping and how to configure an IGMP snooping
                    policy, see Chapter 15, IGMP-SNOOP-POLICY.
GLOBAL CONFIGURATION COMMANDS 4 - 105


4.1.26 ip
            Global Configuration Commands
       Configures IP access control lists
       Access lists define access to the wireless controller managed network using a set of rules. Each rule specifies an action
       taken when a packet matches a given set of rules. If the action is deny, the packet is dropped. If the action is permit, the
       packet is allowed.
       Supported in the following platforms:
          • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
       Syntax
       ip access-list <IP-ACCESS-LIST-NAME>
       Parameters
       • ip access-list <IP-ACCESS-LIST-NAME>

        access-list                         Configures an IP access list
        <IP-ACCESS-LIST-NAME>               • <IP-ACCESS-LIST-NAME> – Specify the ACL name. If the access list does not exist,
                                              it is created.
4 - 106 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config)#ip access-list test
        rfs7000-37FABE(config-ip-acl-test)#

        rfs7000-37FABE(config-ip-acl-test)#?
        ACL Configuration commands:
          deny     Specify packets to reject
          no       Negate a command or set its defaults
          permit   Specify packets to forward

          clrscr    Clears the display screen
          commit    Commit all changes made in this session
          end       End current mode and change to EXEC mode
          exit      End current mode and down to previous mode
          help      Description of the interactive help system
          revert    Revert changes
          service   Service Commands
          show      Show running system information
          write     Write running configuration to memory or terminal

        rfs7000-37FABE(config-ip-acl-test)#
        Related Commands

         no                              Removes an IP access control list



                    NOTE: For more information on Access Control Lists, see Chapter 12, ACCESS-LIST.
GLOBAL CONFIGURATION COMMANDS 4 - 107


4.1.27 mac
         Global Configuration Commands
      Configures MAC access control lists
      Access lists define access to the wireless controller managed network using a set of rules. Each rule specifies an action
      taken when a packet matches a given set of rules. If the action is deny, the packet is dropped. If the action is permit, the
      packet is allowed.
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      mac access-list <MAC-ACCESS-LIST-NAME>
      Parameters
      • mac access-list <MAC-ACCESS-LIST-NAME>

       access-list                       Configures a MAC access control list
       <IP-ACCESS-LIST-NAME>             • <MAC-ACCESS-LIST-NAME> – Specify the ACL name. If the access control list does
                                           not exist, it is created.
4 - 108 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config)#mac access-list test
        rfs7000-37FABE(config-mac-acl-test)#

        rfs7000-37FABE(config-mac-acl-test)#?
        MAC Extended ACL Configuration commands:
          deny     Specify packets to reject
          no       Negate a command or set its defaults
          permit   Specify packets to forward

          clrscr    Clears the display screen
          commit    Commit all changes made in this session
          end       End current mode and change to EXEC mode
          exit      End current mode and down to previous mode
          help      Description of the interactive help system
          revert    Revert changes
          service   Service Commands
          show      Show running system information
          write     Write running configuration to memory or terminal

        rfs7000-37FABE(config-mac-acl-test)#
        Related Commands

         no                         Removes a MAC access control list



                    NOTE: For more information on Access Control Lists, see Chapter 12, ACCESS-LIST.
GLOBAL CONFIGURATION COMMANDS 4 - 109


4.1.28 management-policy
        Global Configuration Commands
      Configures a management policy. This policy configures parameters, such as services that run on a device, welcome
      messages, banners, and others.
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      management-policy <MANAGEMENT-POLICY-NAME>
      Parameters
      • management-policy <MANAGEMENT-POLICY-NAME>

       <MANAGEMENT-POLICY-              Specify the management policy name. If the policy does not exist, it is created.
       NAME>
      Examples
      rfs7000-37FABE(config)#management-policy test
      rfs7000-37FABE(config-management-policy-test)#
      Related Commands

       no                               Removes an existing management policy



                      NOTE: For more information on the parameters that can be configured in a management
                      policy, see Chapter 17, MANAGEMENT-POLICY.
4 - 110 WiNG CLI Reference Guide


4.1.29 mint-policy
          Global Configuration Commands
        Configures the global MiNT policy
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        mint-policy global-default
        Parameters
        • mint-policy global-default

         global-default                   Uses the global default policy
        Examples
        rfs7000-37FABE(config)#mint-policy global-default
        rfs7000-37FABE(config-mint-policy-global-default)#
        Related Commands

         no                               Removes an existing MiNT policy



                          NOTE: For more information on MiNT policy, see Chapter 16, MINT-POLICY.
GLOBAL CONFIGURATION COMMANDS 4 - 111


4.1.30 nac-list
         Global Configuration Commands
       Configures a policy, which configures a list of devices that can access a managed network based on their MAC addresses.
                                                           Table 4.12 NAC List Commands

               Command                                       Description                                  Reference
        nac-list                     Creates a NAC list policy                                     page 4-112
4 - 112 WiNG CLI Reference Guide


4.1.30.1 nac-list
           Global Configuration Commands
        Configures a Network Access Control (NAC) list that controls access to the wireless controller managed network
        Supported in the following platforms:
           • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
        Syntax
        nac-list <NAC-LIST-NAME>
        Parameters
        • nac-list <NAC-LIST-NAME>

          <NAC-LIST-NAME>                  Specify the NAC list name. If the NAC list does not exist, it is created.
        Examples
        rfs7000-37FABE(config)#nac-list test
        rfs7000-37FABE(config-nac-list-test)#

        rfs7000-37FABE(config-nac-list-test)#?
        NAC List Mode commands:
          exclude Specify MAC addresses to be excluded from the NAC enforcement list
          include Specify MAC addresses to be included in the NAC enforcement list
          no       Negate a command or set its defaults

           clrscr        Clears the display screen
           commit        Commit all changes made in this session
           do            Run commands from Exec mode
           end           End current mode and change to EXEC mode
           exit          End current mode and down to previous mode
           help          Description of the interactive help system
           revert        Revert changes
           service       Service Commands
           show          Show running system information
           write         Write running configuration to memory or terminal
        rfs7000-37FABE(config-nac-list-test)#
        Related Commands

          no                                Removes a NAC list
GLOBAL CONFIGURATION COMMANDS 4 - 113


4.1.30.2 nac-list-mode
        Table 4.13 summarizes NAC list mode commands
                                                     Table 4.13 nac-list-mode commands

                Command                                     Description                               Reference
         exclude              Specifies the MAC addresses excluded from the NAC enforcement list   page 4-114
         include              Specifies the MAC addresses included in the NAC enforcement list     page 4-115
         no                   Cancels an exclude or an include NAC list rule                       page 4-116
         clrscr               Clears the display screen                                            page 5-3
         commit               Commits (saves) changes made in the current session                  page 5-4
         do                   Runs commands from EXEC mode                                         page 4-66
         end                  Ends and exits the current mode and moves to the PRIV EXEC mode      page 5-5
         exit                 Ends the current mode and moves to the previous mode                 page 5-6
         help                 Displays the interactive help system                                 page 5-7
         revert               Reverts changes to their last saved configuration                    page 5-13
         service              Invokes service commands to troubleshoot or debug (config-if)        page 5-14
                              instance configurations
         show                 Displays running system information                                  page 6-4
         write                Writes information to memory or terminal                             page 5-42
4 - 114 WiNG CLI Reference Guide


4.1.30.2.1exclude
           nac-list-mode
        Specifies the MAC addresses excluded from the NAC enforcement list
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        exclude <START-MAC> [<END-MAC> precedence <1-1000>|precedence <1-1000>]
        Parameters
        • exclude <START-MAC> [<END-MAC> precedence <1-1000>|precedence <1-1000>]

         <START-MAC>                   Specifies a range of MAC addresses or a single MAC address to exclude from the NAC
                                       enforcement list
                                       Specify the first MAC address in the range.
                                       Use this parameter to specify a single MAC address.
         <END-MAC>                     Specify the last MAC address in the range.
         precedence <1-1000>           Sets the rule precedence. Exclude entries are checked in the order of their rule
                                       precedence.
                                       • <1-1000> – Specify a value from 1 - 1000.
        Examples
        rfs7000-37FABE(config-nac-list-test)#exclude 00-40-96-B0-BA-2A precedence 1
        rfs7000-37FABE(config-nac-list-test)#
GLOBAL CONFIGURATION COMMANDS 4 - 115


4.1.30.2.2include
           nac-list-mode
         Specifies the MAC addresses included in the NAC enforcement list
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         include <START-MAC> [<END-MAC> precedence <1-1000>|precedence <1-1000>]
         Parameters
         • include <START-MAC> [<END-MAC> precedence <1-1000>|precedence <1-1000>]

          <START-MAC>                    Specifies a range of MAC addresses or a single MAC address to include in the NAC
                                         enforcement list
                                         Specify the first MAC address in the range.
                                         Use this parameter to specify a single MAC address
          <END-MAC>                      Specify the last MAC address in the range.
          precedence <1-1000>            Sets the rule precedence. Exclude entries are checked in the order of their rule
                                         precedence.
                                         • <1-1000> – Specify a value from 1 - 1000.
         Examples
         rfs7000-37FABE(config-nac-list-test)#include 00-40-96-B0-BA-2A precedence 1
         rfs7000-37FABE(config-nac-list-test)#
4 - 116 WiNG CLI Reference Guide


4.1.30.2.3no
            nac-list-mode
         Cancels an exclude or an include NAC list rule
         Supported in the following platforms:
            • AP300
               • AP621
               • AP650
               • AP6511
               • AP6521
               • AP6532
               • AP71XX
               • RFS4000
               • RFS6000
               • RFS7000
         Syntax
         no [exclude|include]

         no [exclude|include] <START-MAC> [<END-MAC> precedence <1-1000>|
            precedence <1-1000>]
         Parameters
         • no [exclude|include] <START-MAC> [<END-MAC> precedence <1-1000>|
         precedence <1-1000>]

          no exclude                     Removes an exclude rule
          no include                     Removes an include rule
          <START-MAC>                    Specifies a range of MACs included in/removed from the NAC enforcement list
                                         Specify the first MAC address in the range.
                                         Use this parameter to specify a single MAC address.
          <END-MAC>                      Specify the last MAC address in the range.
          precedence <1-1000>            Sets the rule precedence for this rule. Exclude entries are checked in the order of their
                                         rule precedence.
                                         • <1-1000> – Specify a value from 1 - 1000.
         Examples
         rfs7000-37FABE(config-nac-list-test)#no include 00-40-96-B0-BA-2A precedence 1
         rrfs7000-37FABE(config-nac-list-test)#show context
         nac-list test
         rfs7000-37FABE(config-nac-list-test)#
         Related Commands

          exclude                         Specifies MAC addresses excluded from the NAC enforcement list
          include                         Specifies MAC addresses included in the NAC enforcement list
GLOBAL CONFIGURATION COMMANDS 4 - 117


4.1.31 no
        Global Configuration Commands
      Negates a command, or reverts configured settings to their default values
      Supported in the following platforms:
         • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
      Syntax
      no <parameter>
      Parameters
      None
      Examples
      rfs7000-37FABE(config)#no ?
        aaa-policy                            Delete a aaa policy
        advanced-wips-policy                  Delete an advanced-wips policy
        ap300                                 Delete an AP300
        ap621                                 Delete an AP621 access point
        ap650                                 Delete an AP650 access point
        ap6511                                Delete an AP6511 access point
        ap6521                                Delete an AP6521 access point
        ap6532                                Delete an AP6532 access point
        ap71xx                                Delete an AP71XX access point
        association-acl-policy                Delete an association-acl policy
        auto-provisioning-policy              Delete an auto-provisioning policy
        captive-portal                        Delete a captive portal
        critical-resource-policy              Remove device onboard critical resource policy
        customize                             Restore the custom cli commands to default
        device                                Delete multiple devices
        device-categorization                 Delete device categorization object
        dhcp-server-policy                    DHCP server policy
        dns-whitelist                         Delete a whitelist object
        event-system-policy                   Delete a event system policy
        firewall-policy                       Configure firewall policy
        igmp-snoop-policy                     Remove device onboard igmp snoop policy
        ip                                    Internet Protocol (IP)
        mac                                   MAC configuration
        management-policy                     Delete a management policy
        nac-list                              Delete an network access control list
        password-encryption                   Disable password encryption in configuration
        profile                               Delete a profile and all its associated
                                              configuration
        radio-qos-policy                      Delete a radio QoS configuration policy
        radius-group                          Local radius server group configuration
        radius-server-policy                  Remove device onboard radius policy
        radius-user-pool-policy               Configure Radius User Pool
        rf-domain                             Delete one or more RF-domains and all their
                                              associated configurations
4 - 118 WiNG CLI Reference Guide


          RFS4000                  Delete an RFS4000 wireless controller
          RFS6000                  Delete an RFS6000 wireless controller
          RFS7000                  Delete an RFS7000 wireless controller
          role-policy              Role based firewall policy
          smart-rf-policy          Delete a smart-rf-policy
          wips-policy              Delete a wips policy
          wlan                     Delete a wlan object
          wlan-qos-policy          Delete a wireless lan QoS configuration policy

          service                  Service Commands

        rfs7000-37FABE(config)#
GLOBAL CONFIGURATION COMMANDS 4 - 119


4.1.32 password-encryption
        Global Configuration Commands
      Enables password encryption within a configuration
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      password-encryption secret 2 <LINE>
      Parameters
      • password-encryption secret 2 <LINE>

       secret 2 <LINE>                  Encrypts passwords with a secret phrase
                                        • 2 – Specifies the encryption type as either SHA256 or AES256
                                          • <LINE> – Specify the encryption passphrase.
      Examples
      rfs7000-37FABE(config)#password-encryption secret 2 symbol
      rfs7000-37FABE(config)#
4 - 120 WiNG CLI Reference Guide


4.1.33 profile
           Global Configuration Commands
        Configures profile related commands. If no parameters are given, all profiles are selected.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        profile {ap621|ap650|ap6511|ap6521|ap6532|ap71xx|containing|filter|
           rfs4000|rfs6000|rfs7000}

        profile {ap621|ap650|ap6511|ap6521|ap6532|ap71xx|rfs4000|rfs6000|rfs7000}
           [<DEVICE-PROFILE-NAME>]

        profile {containing [<DEVICE-PROFILE-NAME>] {filter [type [ap621|ap650|ap6511|
           ap6521|ap6532|ap71xx|rfs4000|rfs6000|rfs7000]]}}

        profile {filter [type [ap621|ap650|ap6511|ap6521|ap6532|ap71xx|rfs4000|
           rfs6000|rfs7000]]}
        Parameters
        • profile {ap621|ap650|ap6511|ap6521|ap6532|ap71xx|containing|filter|
        rfs4000|rfs6000|rfs7000} [<DEVICE-PROFILE-NAME>]

         profile                      Configures device profile commands. If no device profile is specified, the system configures
                                      all device profiles.
         ap621                        Optional. Configures AP621 profile commands
         ap650                        Optional. Configures AP650 profile commands
         ap6511                       Optional. Configures AP6511 profile commands
         ap6521                       Optional. Configures AP6521 profile commands
         ap6532                       Optional. Configures AP6532 profile commands
         ap71xx                       Optional. Configures AP71XX profile commands
         rfs4000                      Optional. Configures RFS4000 profile commands
         rfs6000                      Optional. Configures RFS6000 profile commands
GLOBAL CONFIGURATION COMMANDS 4 - 121



rfs7000            Optional. Configures RFS7000 profile commands
<DEVICE-PROFILE-   After specifying the profile type, specify a substring in the profile name to filter profiles
NAME>

• profile {containing [<DEVICE-PROFILE-NAME>] {filter [type [ap621|ap650|ap6511|
ap6521|ap6532|ap71xx|rfs4000|rfs6000|rfs7000]]}}

profile            Configures device profile commands
containing         Optional. Configures profiles that contain a specified sub-string in the hostname
<DEVICE-PROFILE-   • <DEVICE-PROFILE-NAME> – Specify a substring in the profile name to filter profiles.
NAME>
filter type        Optional. An additional filter used to configure a specific type of device profile. If no device
                   type is specified, the system configures all device profiles.
                   • type – Filters profiles by the device type. Select a device type from the following options:
ap621              Selects a AP621 profile
ap650              Selects a AP650 profile
ap6511             Selects a AP6511 profile
ap6521             Selects a AP6511 profile
ap6532             Selects a AP6532 profile
ap71xx             Selects a AP71XX profile
rfs4000            Selects a RFS4000 profile
rfs6000            Selects a RFS6000 profile
rfs7000            Selects a RFS7000 profile

• profile {filter [type [ap621|ap650|ap6511|ap6521|ap6532|ap71xx|rfs4000|
rfs6000|rfs7000]]}

profile             Configures device profile commands
filter type         Optional. An additional filter used to configure a specific type of device profile. If no device
                    type is specified, the system configures all device profiles.
                    • type – Filters profiles by the device type. Select a device type from the following options:
ap621               Selects a AP621 profile
ap650               Selects a AP650 profile
ap6511              Selects a AP6511 profile
ap6521              Selects a AP6521 profile
ap6532              Selects a AP6532 profile
ap71xx              Selects a AP71XX profile
rfs4000             Selects a RFS4000 profile
4 - 122 WiNG CLI Reference Guide



         rfs6000              Selects a RFS6000 profile
         rfs7000              Selects a RFS7000 profile
        Examples
        rfs7000-37FABE(config)#profile RFS7000 test1
        rfs7000-37FABE(config-profile-test1)#?
        Profile Mode commands:
          aaa                             VPN AAA authentication settings
          adopted-mode                    Set Device Running in Adopted Mode
          ap-upgrade                      AP firmware upgrade
          ap300                           Adopt/unadopt AP300 device to this
                                          profile/device
          arp                             Address Resolution Protocol (ARP)
          auto-learn-staging-config       Enable learning network configuration of the
                                          devices that come for adoption
          autoinstall                     Autoinstall Configuration commands
          bridge                          Ethernet bridge
          cdp                             Cisco Discovery Protocol
          cluster                         Cluster configuration
          configuration-persistence       Enable persistence of configuration across
                                          reloads (startup config file)
          controller                      WLAN controller configuration
          crypto                          Encryption related commands
          dscp-mapping                    Configure IP DSCP to 802.1p priority mapping
                                          for untagged frames
          email-notification              Email notification configuration
          enforce-version                 Check the firmware versions of devices
                                          before interoperating
          events                          System event messages
          interface                       Select an interface to configure
          ip                              Internet Protocol (IP)
          led                             Turn LEDs on/off on the device
          legacy-auto-downgrade           Enable device firmware to auto downgrade
                                          when other legacy devices are detected
          legacy-auto-update              Enable legacy device firmware auto update
          lldp                            Link Layer Discovery Protocol
          load-balancing                  Configure load balancing parameter
          local                           Local user authentication database for VPN
          logging                         Modify message logging facilities
          mac-address-table               MAC Address Table
          mint                            MiNT protocol
          misconfiguration-recovery-time Check controller connectivity after
                                          configuration is received
          monitor                         Critical resource monitoring
          neighbor-inactivity-timeout     Configure neighbor inactivity timeout
          neighbor-info-interval          Configure neighbor information exchange
                                          interval
          no                              Negate a command or set its defaults
          noc                             Configure the noc related setting
          ntp                             Ntp server A.B.C.D
          power-config                    Configure power mode
          preferred-controller-group      Controller group this system will prefer for
                                          adoption
          radius                          Configure device-level radius authentication
                                          parameters
          rf-domain-manager               RF Domain Manager
          spanning-tree                   Spanning tree
          use                             Set setting to use
          vpn                             Vpn configuration
          wep-shared-key-auth             Enable support for 802.11 WEP shared key
                                          authentication

          clrscr                                 Clears the display screen
          commit                                 Commit all changes made in this session
          do                                     Run commands from Exec mode
          end                                    End current mode and change to EXEC mode
          exit                                   End current mode and down to previous mode
GLOBAL CONFIGURATION COMMANDS 4 - 123


  help                                      Description of the interactive help system
  revert                                    Revert changes
  service                                   Service Commands
  show                                      Show running system information
  write                                     Write running configuration to memory or
                                            terminal

rfs7000-37FABE(config-profile-test1)#



            NOTE: For more information on profiles and how to configure profiles, see Chapter 7,
            PROFILES.
4 - 124 WiNG CLI Reference Guide


4.1.34 radio-qos-policy
           Global Configuration Commands
        Configures a radio quality-of-service (QoS) policy
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        radio-qos-policy <RADIO-QOS-POLICY-NAME>
        Parameters
        • radio-qos-policy <RADIO-QOS-POLICY-NAME>

         <RADIO-QOS-POLICY-                Specify the radio QoS policy name. If the policy does not exist, it is created.
         NAME>
        Examples
        rfs7000-37FABE(config)#radio-qos-policy test
        rfs7000-37FABE(config)#




                         NOTE: For more information on radio qos policy, see Chapter 19, RADIO-QOS-POLICY.
GLOBAL CONFIGURATION COMMANDS 4 - 125


4.1.35 radius-group
        Global Configuration Commands
      Configures RADIUS user group parameters
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      radius-group <RADIUS-GROUP-NAME>
      Parameters
      • radius-group <RADIUS-GROUP-NAME>

       <RADIUS-GROUP-NAME>              Specify a RADIUS user group name. The name should not exceed 64 characters. If the
                                        RADIUS user group does not exist, it is created.
      Examples
      rfs7000-37FABE(config)#radius-group testgroup
      rfs7000-37FABE(config)#



                      NOTE: For more information on RADIUS user group commands, see Chapter 18,
                      RADIUS-POLICY.
4 - 126 WiNG CLI Reference Guide


4.1.36 radius-server-policy
          Global Configuration Commands
        Creates an onboard device RADIUS policy
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        radius-server-policy <RADIUS-SERVER-POLICY-NAME>
        Parameters
        • radius-server-policy <RADIUS-SERVER-POLICY-NAME>

         <RADIUS-SERVER-POLICY-           Specify the RADIUS server policy name. If the policy does not exist, it is created.
         NAME>
        Examples
        rfs7000-37FABE(config)#radius-server-policy testpolicy
        rfs7000-37FABE(config)#



                        NOTE: For more information on RADIUS user group commands, see Chapter 18,
                        RADIUS-POLICY.
GLOBAL CONFIGURATION COMMANDS 4 - 127


4.1.37 radius-user-pool-policy
        Global Configuration Commands
      Configures a RADIUS user pool
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      radius-user-pool-policy <RADIUS-USER-POOL-POLICY-NAME>
      Parameters
      • radius-user-pool-policy <RADIUS-USER-POOL-POLICY-NAME>

       <RADIUS-USER-POOL-               Specify the RADIUS user pool policy name. If the policy does not exist, it is created.
       POLICY-NAME>
      Examples
      rfs7000-37FABE(config)#radius-user-pool-policy testpool
      rfs7000-37FABE(config)#



                      NOTE: For more information on RADIUS user group commands, see Chapter 18,
                      RADIUS-POLICY.
4 - 128 WiNG CLI Reference Guide


4.1.38 rf-domain
          Global Configuration Commands
        An RF Domain groups devices that can logically belong to one network. The RF Domain policy configures a set of
        parameters that enable devices configured quickly as belonging to a particular RF Domain.
                                                         Table 4.14 RF Domain Commands

                Command                                      Description                                   Reference
         rf-domain                    Creates a RF Domain policy                                    page 4-129
GLOBAL CONFIGURATION COMMANDS 4 - 129


4.1.38.1 rf-domain
           rf-domain
        Creates a RF Domain or enters RF Domain context for one or more RF Domains. If the policy does not exist, it creates a
        new policy.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        rf-domain {<RF-DOMAIN-NAME>|containing <DOMAIN-NAME>}
        Parameters
        • rf-domain {<RF-DOMAIN-NAME>|containing <DOMAIN-NAME>}

         rf-domain                     Creates a new RF Domain or enters RF Domain context for one or more existing RF
                                       Domains
         <RF-DOMAIN-NAME>              Specify the RF Domain name. The name should not exceed 32 characters and should
                                       represent the intended purpose. Once created, the name cannot be edited.
         containing                    Specify an existing RF Domain that contains a specified sub-string in the domain name
         <DOMAIN-NAME>                 • <DOMAIN-NAME> – Specify a sub-string of the RF Domain name.
4 - 130 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config)#rf-domain RFS7000
        rfs7000-37FABE(config-rf-domain-RFS7000)#

        RFS4000-880DA7(config)#rf-domain default
        RFS4000-880DA7(config-rf-domain-default)#

        rfs7000-37FABE(config-rf-domain-RFS7000)#?
        RF Domain Mode commands:
          channel-list      Configure channel list to be advertised to wireless
                            clients
          contact           Configure the contact
          control-vlan      VLAN for control traffic on this RF Domain
          country-code      Configure the country of operation
          dhcp-redundancy   Enable DHCP redundancy
          layout            Configure layout
          location          Configure the location
          mac-name          Configure MAC address to name mappings
          no                Negate a command or set its defaults
          override-smartrf Configured RF Domain level overrides for smart-rf
          override-wlan     Configure RF Domain level overrides for wlan
          sensor-server     Motorola AirDefense sensor server configuration
          stats             Configure the stats related setting
          timezone          Configure the timezone
          use               Set setting to use

          clrscr              Clears the display screen
          commit              Commit all changes made in this session
          do                  Run commands from Exec mode
          end                 End current mode and change to EXEC mode
          exit                End current mode and down to previous mode
          help                Description of the interactive help system
          revert              Revert changes
          service             Service Commands
          show                Show running system information
          write               Write running configuration to memory or terminal

        rfs7000-37FABE(config-rf-domain-RFS7000)#
GLOBAL CONFIGURATION COMMANDS 4 - 131


4.1.38.2 rf-domain-mode
          rf-domain
        This section describes the default commands under RF Domain.
        Table 4.15 summarises RF Domain commands
                                                          Table 4.15 rf-domain Commands

                Command                                       Description                                     Reference
         channel-list         Configures the channel list advertised by radios                             page 4-133
         contact              Configures details of the person to contact (the network administrator) in   page 4-134
                              case of any problems impacting the RF Domain
         control-vlan         Configures VLAN for traffic control on a RF Domain                           page 4-135
         country-code         Configures the country of operation                                          page 4-136
         dhcp-redundancy      Enables DHCP redundancy on a RF Domain                                       page 4-137
         layout               Configures layout information                                                page 4-138
         location             Configures the physical location of a RF Domain                              page 4-140
         mac-name             Maps MAC addresses to names                                                  page 4-141
         no                   Negates a command or reverts configured settings to their default values     page 4-142
         override-smart-rf    Configures RF Domain level overrides for Smart RF                            page 4-144
         override-wlan        Configures RF Domain level overrides for WLAN                                page 4-145
         sensor-server        Configures a AirDefense sensor server on this RF Domain                      page 4-147
         stats                Configures stats related settings on this RF Domain. These settings define   page 4-149
                              how RF Domain statistics are updated
         timezone             Configures a RF Domain’s geographic time zone                                page 4-151
         use                  Enables the use of a specified Smart RF and/or WIPS policy                   page 4-152
         clrscr               Clears the display screen                                                    page 5-3
         commit               Commits (saves) changes made in the current session                          page 5-4
         do                   Runs commands from EXEC mode                                                 page 4-66
         end                  Ends and exits the current mode and moves to the PRIV EXEC mode              page 5-5
         exit                 Ends the current mode and moves to the previous mode                         page 5-6
         help                 Displays the interactive help system                                         page 5-7
         revert               Reverts changes to their last saved configuration                            page 5-13
         service              Invokes service commands to troubleshoot or debug (config-if)                page 5-14
                              instance configurations
4 - 132 WiNG CLI Reference Guide


                                                   Table 4.15 rf-domain Commands

             Command                                   Description                    Reference
         show             Displays running system information                      page 6-4
         write            Writes information to memory or terminal                 page 5-42
GLOBAL CONFIGURATION COMMANDS 4 - 133


4.1.38.2.1 channel-list
            rf-domain-mode
         Configures the channel list advertised by radios. This command also enables dynamic update of a channel list
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         channel-list [2.4GHz|5GHz|dynamic]

         channel-list dynamic

         channel-list [2.4GHz|5GHz] <CHANNEL-LIST>
         Parameters
         • channel-list dynamic

          dynamic                        Enables dynamic update of a channel list

         • channel-list [2.4GHz|5GHz] <CHANNEL-LIST>

          2.4GHz <CHANNEL-LIST>          Configures the channel list advertised by radios operating in the 2.4GHz mode
                                         • <CHANNLE-LIST> – Specify the list of channels separated by commas or hyphens.
          5GHz <CHANNEL-LIST>            Configures the channel list advertised by radios operating in the 5GHz mode
                                         • <CHANNLE-LIST> – Specify the list of channels separated by commas or hyphens.
         Examples
         rfs7000-37FABE(config-rf-domain-default)#channel-list 2.4GHz 1-10

         rfs7000-37FABE(config-rf-domain-default)#show context
         rf-domain RFDOMAIN_UseCase1
          location SanJose
          contact txyr399@motorola-solutions.com
          timezone America/Los_Angeles
          country-code us
          channel-list 2.4GHz 1,2,3,4,5,6,7,8,9,10
         rfs7000-37FABE(config-rf-domain-default)#
         Related Commands

          no                             Removes the list of channels configured on the selected RF Domain for 2.4GHz and 5GHz
                                         bands. Also disables dynamic update of a channel list.
4 - 134 WiNG CLI Reference Guide


4.1.38.2.2 contact
            rf-domain-mode
         Configures the contact (the network administrator) in case of problems or issues impacting the RF Domain
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         contact <WORD>
         Parameters
         • contact <WORD>

          contact <WORD>                  Specify contact details, such as name and number.
         Examples
         rfs7000-37FABE(config-rf-domain-default)#contact Bob+919620011529
         rfs7000-37FABE(config-rf-domain-default)#

         rfs7000-37FABE(config-rf-domain-default)#show context
         rf-domain default
          contact Bob+919620011529
          stats update-interval 200
          no country-code
          use smart-rf-policy Smart-RF1
          use wips-policy WIPS1
          sensor-server 2 ip 172.16.10.3
          override-wlan test vlan-pool 2 limit 20
         rfs7000-37FABE(config-rf-domain-default)#
         Related Commands

          no                                Removes contact details configured for a RF Domain
GLOBAL CONFIGURATION COMMANDS 4 - 135


4.1.38.2.3 control-vlan
            rf-domain-mode
         Configures VLAN for traffic control in this RF Domain
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         control-vlan <1-4094>
         Parameters
         • control-vlan <1-4094>

          <1-4094>                        Specify the VLAN ID from 1 - 4094.
         Examples
         rfs7000-37FABE(config-rf-domain-default)#control-vlan 1
         rfs7000-37FABE(config-rf-domain-default)#show context
         rf-domain RFDOMAIN_UseCase1
          location SanJose
          contact txyr399@motorola-solutions.com
          timezone America/Los_Angeles
          country-code us
          channel-list 2.4GHz 1,2,3,4,5,6,7,8,9,10
          control-vlan 1
         rfs7000-37FABE(config-rf-domain-default)#
         Related Commands

          no                               Disables the VLAN for controlling traffic in a RF Domain
4 - 136 WiNG CLI Reference Guide


4.1.38.2.4 country-code
           rf-domain-mode
        Configures a RF Domain’s country of operation. Since device channels transmit in specific channels unique to the country
        of operation, it is essential to configure the country code correctly or risk using the access point illegally.
        Supported in the following platforms:
           • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
        Syntax
        country-code [<WORD>]
        Parameters
        • country-code [<WORD>]

          country-code                   Configures the RF Domain’s country of operation
          <WORD>                         Specify the 2 letter ISO-3166 country code.
        Examples
        rfs7000-37FABE(config-rf-domain-default)#country-code in
        rfs7000-37FABE(config-rf-domain-default)#

        rfs7000-37FABE(config-rf-domain-default)#show context
        rf-domain default
         country-code in
        rfs7000-37FABE(config-rf-domain-default)#
        Related Commands

          no                              Removes the country of operation configured on a RF Domain
GLOBAL CONFIGURATION COMMANDS 4 - 137


4.1.38.2.5 dhcp-redundancy
          rf-domain-mode
        Enables DHCP redundancy in this RF Domain
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        dhcp-redundancy
        Parameters
        None
        Examples
        rfs7000-37FABE(config-rf-domain-default)#dhcp-redundancy
        rfs7000-37FABE(config-rf-domain-default)#

        rfs7000-37FABE(config-rf-domain-default)#show context
        rf-domain default
         country-code in
         dhcp-redundancy
        rfs7000-37FABE(config-rf-domain-default)#
        Related Commands

         no                              Removes RF Domain DHCP redundancy
4 - 138 WiNG CLI Reference Guide


4.1.38.2.6 layout
            rf-domain-mode
         Configures the RF Domain layout in terms of area, floor, and location on a map. It allows users to place APs across the
         deployment map. A maximum of 256 layouts is permitted.
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         layout [area|floor|map-location]

         layout [area|floor|map-location] {(area [<AREA-NAME>]|floor [<FLOOR-NAME>]|
            map-location [<URL> units [feet|meters] {area [<AREA-NAME>]|floor [<FLOOR-
            NAME>]}}
         Parameters
         • layout [area|floor|map-location] {(area [<AREA-NAME>]|floor [<FLOOR-NAME>]|
         map-location [<URL> units [feet|meters] {area [<AREA-NAME>]|floor [<FLOOR-NAME>]}}

          layout                           Configures the RF Domain layout in terms of area, floor, and location on a map
          area <AREA-NAME>                 Configures the RF Domain area name
                                           • <AREA-NAME> – Specify the area name.
          floor <FLOOR-NAME>               Configures the RF Domain floor name
                                           • <FLOOR-NAME> – Specify the floor name.
          map-location <URL> units         Configures the location of the RF Domain on the map
          [feet|meters]                    • <URL> – Specify the URL to configure the map location.
                                             • units – Configures the map units in terms of feet or meters
                                                • feet – Selects the unit of measurement as feet
                                                • meters – Selects the unit of measurement as meters
GLOBAL CONFIGURATION COMMANDS 4 - 139


Examples
rfs7000-37FABE(config-rf-domain-default)#layout map-location www.firstfloor.com
units meters area Ecospace floor Floor5
rfs7000-37FABE(config-rf-domain-default)#

rfs7000-37FABE(config-rf-domain-default)#show context
rf-domain default
 country-code us
 sensor-server 1 ip 172.16.10.14 port 1
 channel-list dynamic
 channel-list 2.4GHz 1,2,3,4,5,6,7,8,9,10
 layout map-location www.firstfloor.com units meters area Ecospace floor Floor5
rfs7000-37FABE(config-rf-domain-default)#
Related Commands

no                     Removes the RF Domain layout details
4 - 140 WiNG CLI Reference Guide


4.1.38.2.7 location
            rf-domain-mode
         Configures the physical location of the wireless controller RF Domain. The location could be as specific as the building
         name or floor number. Or it could be generic and include an entire site. The location defines the physical area where a
         common set of device configurations are deployed and managed by a RF Domain policy.
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         location <WORD>
         Parameters
         • location <WORD>

          location <WORD>                  Configures the RF Domain location by specifying the area or building name
                                           • <WORD> – Specify the location.
         Examples
         rfs7000-37FABE(config-rf-domain-default)#location SanJose
         rfs7000-37FABE(config-rf-domain-default)#

         rfs7000-37FABE(config-rf-domain-default)#show context
         rf-domain default
          location SanJose
          no country-code
         rfs7000-37FABE(config-rf-domain-default)#
         Related Commands

          no                               Removes the RF Domain location
GLOBAL CONFIGURATION COMMANDS 4 - 141


4.1.38.2.8 mac-name
          rf-domain-mode
        Configures a relevant name for each MAC address
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        mac-name <MAC> <NAME>
        Parameters
        • mac-name <MAC> <NAME>

         mac-name                       Configures a relevant name for each MAC address
         <MAC> <NAME>                   Specifies the MAC address
                                        • <NAME> – Specify a friendly name for this MAC address to use in events and
                                          statistics.
        Examples
        rfs7000-37FABE(config-rf-domain-default)#mac-name 11-22-33-44-55-66 TestDevice
        rfs7000-37FABE(config-rf-domain-default)#

        rfs7000-37FABE(config-rf-domain-default)#show context
        rf-domain default
         location SanJose
         no country-code
         mac-name 11-22-33-44-55-66 TestDevice
        rfs7000-37FABE(config-rf-domain-default)#
        Related Commands

         no                             Removes the MAC address to name mapping
4 - 142 WiNG CLI Reference Guide


4.1.38.2.9 no
            rf-domain-mode
         Negates a command or reverts configured settings to their default. When used in the config RF Domain mode, the no
         command negates or reverts RF Domain settings.
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         no [channel-list|contact|control-vlan|country-code|dhcp-redundancy|layout|location|
            mac-name|override-smartrf|override-wlan|sensor-server|stats|timezone|use]
         Parameters
         • no [channel-list|contact|control-vlan|country-code|dhcp-redundancy|layout|
         location|mac-name|override-smartrf|override-wlan|sensor-server|stats|timezone|
         use]

          no channel-list                  Removes the channel list for 2.4GHz and 5GHz bands. Also disables dynamic update
                                           of a channel list
          no contact                       Removes contact details configured
          no control-vlan                  Removes VLAN configured for controlling traffic
          no country-code                  Removes the country of operation configured
          no dhcp-redundancy               Removes DHCP redundancy
          no layout                        Removes the RF Domain layout details
          no location                      Removes the RF Domain location details
          no mac-name                      Removes the MAC address to name mapping
          no override-smartrf              Resets the override Smart RF settings to default
          no override-wlan                 Resets the override WLAN settings to default
          no sensor-server                 Disables a AirDefense sensor server details
          no stats                         Resets RF Domain stats settings
          no timezone                      Removes the RF Domain’s time zone
          no use                           Resets RF Domain profile settings
GLOBAL CONFIGURATION COMMANDS 4 - 143


Examples
rfs7000-37FABE(config-rf-domain-default)#mac-name 11-22-33-44-55-66 TestDevice
rfs7000-37FABE(config-rf-domain-default)#

rfs7000-37FABE(config-rf-domain-default)#show context
rf-domain default
 location SanJose
 no country-code
 mac-name 11-22-33-44-55-66 TestDevice
rfs7000-37FABE(config-rf-domain-default)#
Related Commands

channel-list          Configures the channel list advertised by radios, and enables dynamic update of channel
                      lists
contact               Configures details of the person to contact (or the administrator) in case of any problems
                      or issues impacting the RF Domain
control-vlan          Configures a VLAN for traffic control
country-code          Configures a RF Domain’s country of operation
dhcp-redundancy       Enables a RF Domain’s DHCP redundancy
layout                Configures a RF Domain’s layout maps
location              Configures a RF Domain’s deployment location
mac-name              Configures a relevant name for each MAC address
override-smart-rf     Configures RF Domain level overrides for Smart RF
override-wlan         Configures RF Domain level overrides for WLAN
sensor-server         Configures a AirDefense sensor server
stats                 Configures RF Domain stats settings
timezone              Configures a RF Domain’s geographic time zone
use                   Enables the use of a Smart RF and/or WIPS policy
4 - 144 WiNG CLI Reference Guide


4.1.38.2.10 override-smart-rf
           rf-domain-mode
         Configures RF Domain level overrides for a Smart RF policy
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         override-smartrf channel-list [2.4GHz|5GHZ] <WORD>
         Parameters
         • override-smartrf channel-list [2.4GHz|5GHZ] <WORD>

          override-smartrf                 Configures RF Domain level overrides for a Smart RF policy
          channel-list                     Enables the selection of a channel list for a Smart RF policy
          2.4GHz <WORD>                    Selects the 2.4GHz band
                                           • <WORD> – Specify a list of channels separated by commas.
          5GHz <WORD>                      Selects the 5GHz band
                                           • <WORD> – Specify a list of channels separated by commas.
         Examples
         rfs7000-37FABE(config-rf-domain-default)#override-smartrf channel-list 2.4GHz 1
         ,2,3
         rfs7000-37FABE(config-rf-domain-default)#
         rfs7000-37FABE(config-rf-domain-default)#show context
         rf-domain default
          location SanJose
          no country-code
          override-smartrf channel-list 2.4GHz 1,2,3
          mac-name 11-22-33-44-55-66 TestDevice
         rfs7000-37FABE(config-rf-domain-default)#
         Related Commands

          no                               Resets the override Smart RF settings its default
GLOBAL CONFIGURATION COMMANDS 4 - 145


4.1.38.2.11 override-wlan
           rf-domain-mode
         Configures RF Domain level overrides for a WLAN
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         overrides-wlan <WLAN> [ssid|vlan-pool|wpa-wpa2-psk]

         overrides-wlan <WLAN> [ssid <SSID>|vlan-pool <1-4094> {limit}|wpa-wpa2-psk <WORD>]
         Parameters
         • overrides-wlan <WLAN> [ssid <SSID>|vlan-pool <1-4094> {limit}|wpa-wpa2-psk <WORD>]

          <WLAN>                         Configures the WLAN name
                                         The name should not exceed 32 characters and should represent the WLAN coverage
                                         area. After creating the WLAN, configure its override parameters.
          ssid <SSID>                    Configures a override Service Set Identifier (SSID) associated with this WLAN
                                         The SSID should not exceed 32 characters.
          vlan-pool <1-4094> limit       Configures the override VLANs available to this WLAN
                                         • <1-4094> – Specify the VLAN ID from 1 - 4094.
                                           • limit – Optional. Sets a limit to the number of users on this VLAN. The maximum
                                           client limit is 8192 per VLAN. The default is 0.
          wpa-wpa2-psk <WORD>            Configures the WPA-WPA2 key or passphrase for this WLAN
                                         • <WORD> – Specify a WPA-WPA2 key or passphrase.
4 - 146 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config-rf-domain-default)#override-wlan test vlan-pool 2 limit 2
        0
        rfs7000-37FABE(config-rf-domain-default)#

        rfs7000-37FABE(config-rf-domain-default)#show context
        rf-domain default
         no country-code
         override-wlan test vlan-pool 2 limit 20
        rfs7000-37FABE(config-rf-domain-default)#
        Related Commands

         no                        Resets the override WLAN settings its default
GLOBAL CONFIGURATION COMMANDS 4 - 147


4.1.38.2.12 sensor-server
           rf-domain-mode
         Configures a AirDefense sensor server on this RF Domain. Sensor servers allow network administrators to monitor and
         download data from multiple sensors remote locations using Ethernet TCP/IP or serial communications. This enables
         administrators to respond quickly to interferences and coverage problems.
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         sensor-server <1-3> ip <IP> port [443|8443|<1-65535>]
         Parameters
         • sensor-server <1-3> ip <IP> port [443|8443|<1-65535>]

          Sensor-server <1-3>            Configures a AirDefense sensor server parameters
                                         • <1-3> – Select the server ID from 1 - 3. The server with the lowest defined ID is
                                           reached first by the wireless controller. The default is 1.
          ip <IP>                        Configures the (non DNS) IP address of the sensor server
                                         • <IP> – Specify the IP address of the sensor server.
          port [443|8443|<1-65535>]      Configures the sensor server port. The options are:
                                         • 443 – Configures port 443, the default port used by the AirDefense server
                                         • 8843 – Configures port 883, the default port used by advanced WIPS on a wireless
                                           controller
                                         • <1-6553> – Allows you to select a WIPS/AirDefense sensor server port from
                                           1 - 65535
4 - 148 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config-rf-domain-default)#sensor-server 2 ip 172.16.10.3 port 44
        3
        rfs7000-37FABE(config-rf-domain-default)#

        rfs7000-37FABE(config-rf-domain-default)#show context
        rf-domain default
         no country-code
         sensor-server 2 ip 172.16.10.3
         override-wlan test vlan-pool 2 limit 20
        rfs7000-37FABE(config-rf-domain-default)#
        Related Commands

         no                        Disables a AirDefense sensor server parameters
GLOBAL CONFIGURATION COMMANDS 4 - 149


4.1.38.2.13 stats
            rf-domain-mode
         Configures stats settings that define how RF Domain statistics are updated
         Supported in the following platforms:
            • AP300
             • AP621
             • AP650
             • AP6511
             • AP6521
             • AP6532
             • AP71XX
             • RFS4000
             • RFS6000
             • RFS7000
         Syntax
         stats [open-window|update-interval

         stats open-window <1-2> {sample-interval [<5-86640>] {size [<3-100>]}}

         stats update-interval [<5-300>|auto]]
         Parameters
         • stats open-window <1-2> {sample-interval [<5-86640>] {size [<3-100>]}}

           stats                         Configures stats related settings on this RF Domain
           open-window <1-2>             Opens a stats window to get trending data
                                         • <1-2> – Configures a numerical index ID for this RF Domain statistics
           sample-interval <5-86640>     Optional. Configures the interval at which the wireless controller captures statistics
                                         supporting this RF Domain
                                         • <5-86640> – Specify the sample interval from 5 - 86640 seconds. The default is 5
                                           seconds.
           size <3-100>                  Optional. After specifying the interval time you might specify the number of samples
                                         used by the wireless controller to define RF Domain statistics.
                                         • <3-100> – Specify the number of samples from 3 - 100. The default is 6 samples.

         • stats update-interval [<5-300>|auto]

           stats                         Configures stats related settings on this RF Domain
           update-interval               Configures the interval at which RF Domain statistics are updated. The options are:
           [<5-300>|auto]                • <5-300> – Specify an update interval from 5 - 300 seconds.
                                         • auto – The RF Domain manager automatically adjusts the update interval based on
                                           the load.
4 - 150 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config-rf-domain-default)#stats update-interval 200
        rfs7000-37FABE(config-rf-domain-default)#

        rfs7000-37FABE(config-rf-domain-default)*#show context
        rf-domain default
         stats update-interval 200
         no country-code
         sensor-server 2 ip 172.16.10.3
         override-wlan test vlan-pool 2 limit 20
        rfs7000-37FABE(config-rf-domain-default)*#
        Related Commands

         no                        Resets stats related settings
GLOBAL CONFIGURATION COMMANDS 4 - 151


4.1.38.2.14 timezone
           rf-domain-mode
         Configures the RF Domain’s geographic time zone. Configuring the time zone is essential for RF Domains deployed across
         different geographical locations.
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         timezone <TIMEZONE>
         Parameters
         • timezone <TIMEZONE>

          time <TIMEZONE>                Specify the RF Domain’s time zone.
         Examples
         rfs7000-37FABE(config-rf-domain-default)#timezone America/Los_Angeles
         rfs7000-37FABE(config-rf-domain-default)#

         rfs7000-37FABE(config-rf-domain-default)#show context
         rf-domain default
          timezone America/Los_Angeles
          stats update-interval 200
          no country-code
          use wips-policy WIPS1
          sensor-server 2 ip 172.16.10.3
          override-wlan test vlan-pool 2 limit 20
         rfs7000-37FABE(config-rf-domain-default)#
         Related Commands

          no                             Removes a RF Domain’s time zone
4 - 152 WiNG CLI Reference Guide


4.1.38.2.15 use
            rf-domain-mode
         Enables the use of Smart RF and WIPS with this RF Domain
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         use [smart-rf-policy|wips-policy]

         use [smart-rf-policy <SMART-RF-POLICY-NAME>|wips-policy <WIPS-POLICY-NAME>]
         Parameters
         • use [smart-rf-policy <SMART-RF-POLICY-NAME>|wips-policy <WIPS-POLICY-NAME>]

          use                            Uses a Smart RF policy with this RF Domain
          smart-rf-policy        Specifies a Smart RF policy
          <SMART-RF-POLICY-NAME> • <SMART-RF-POLICY-NAME> – Specify the Smart RF policy name.

          wips-policy                    Specifies a WIPS policy
          <WIPS-POLICY-NAME>             <WIPS-POLICY-NAME> – Specify the WIPS policy name.
         Examples
         rfs7000-37FABE(config-rf-domain-default)#use smart-rf-policy Smart-RF1
         rfs7000-37FABE(config-rf-domain-default)#

         rfs7000-37FABE(config-rf-domain-default)#use wips-policy WIPS1
         rfs7000-37FABE(config-rf-domain-default)#

         rfs7000-37FABE(config-rf-domain-default)#show context
         rf-domain default
          stats update-interval 200
          no country-code
          use smart-rf-policy Smart-RF1
          use wips-policy WIPS1
          sensor-server 2 ip 172.16.10.3
          override-wlan test vlan-pool 2 limit 20
         rfs7000-37FABE(config-rf-domain-default)#
         Related Commands

          no                              Resets profiles used with this RF Domain
GLOBAL CONFIGURATION COMMANDS 4 - 153


4.1.39 rfs4000
         Global Configuration Commands
      Adds an RFS4000 wireless controller to the network
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      rfs4000 <DEVICE-RFS4000>
      Parameters
      • rfs4000 <DEVICE-RFS4000>

       <DEVICE-RFS4000>              Specify the MAC address of the RFS4000.
      Examples
      rfs7000-37FABEconfig)#RFS4000 10-20-30-40-50-60
      rfs7000-37FABE(config-device-10-20-30-40-50-60)#
4 - 154 WiNG CLI Reference Guide


4.1.40 rfs6000
          Global Configuration Commands
        Adds an RFS6000 wireless controller to the network
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        rfs6000 <DEVICE-RFS6000>
        Parameters
        • rfs6000 <DEVICE-RFS6000>

         <DEVICE-RFS6000>                 Specify the MAC address of a RFS6000.
        Examples
        rfs7000-37FABE(config)#RFS6000 11-20-30-40-50-61
        rfs7000-37FABE(config-device-11-20-30-40-50-61)#
GLOBAL CONFIGURATION COMMANDS 4 - 155


4.1.41 rfs7000
         Global Configuration Commands
      Adds an RFS7000 wireless controller to the network
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      rfs7000 <DEVICE-RFS7000>
      Parameters
      • rfs7000 <DEVICE-RFS7000>

       <DEVICE-RFS7000>                  Specify the MAC address of a RFS7000.
      Examples
      rfs7000-37FABE(config)#RFS7000 12-20-30-40-50-62
      rfs7000-37FABE(config-device-12-20-30-40-50-62)#
4 - 156 WiNG CLI Reference Guide


4.1.42 role-policy
           Global Configuration Commands
        Configures a role-based firewall policy
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        role-policy <ROLE-POLICY-NAME>
        Parameters
        • role-policy <ROLE-POLICY-NAME>

         <ROLE-POLICY-NAME>                Specify the role policy name. If the policy does not exist, it is created.
        Examples
        rfs7000-37FABE(config)#role-policy role1
        rfs7000-37FABE(config)#




                         NOTE: For more information on Role policy commands, see Chapter 20, ROLE-POLICY.
GLOBAL CONFIGURATION COMMANDS 4 - 157


4.1.43 self
          Global Configuration Commands
       Displays the device’s configuration context
       Supported in the following platforms:
          • AP300
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP71XX
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       self
       Parameters
       None
       Examples
       rfs7000-37FABE(config)#self
       rfs7000-37FABE(config-device-00-15-70-37-FA-BE)#
4 - 158 WiNG CLI Reference Guide


4.1.44 smart-rf-policy
          Global Configuration Commands
        Configures a Smart RF policy
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        smart-rf-policy <SMART-RF-POLICY-NAME>
        Parameters
        • smart-rf-policy <SMART-RF-POLICY-NAME>

         <SMART-RF-POLICY-                Specify the Smart RF policy name. If the policy does not exist, it is created.
         NAME>
        Examples
        rfs7000-37FABE(config)#smart-rf-policy test
        rfs7000-37FABE(config-smart-rf-policy-test)#



                        NOTE: For more information on smart-rf policy commands, see Chapter 21, SMART-RF-
                        POLICY.
GLOBAL CONFIGURATION COMMANDS 4 - 159


4.1.45 wips-policy
        Global Configuration Commands
      Configures a WIPS policy
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      wips-policy <WIPS-POLICY-NAME>
      Parameters
      • wips-policy <WIPS-POLICY-NAME>

       <WIPS-POLICY-NAME>               Specify the WIPS policy name. If the policy does not exist, it is created.
      Examples
      rfs7000-37FABE(config)#wips-policy test
      rfs7000-37FABE(config-wips-policy-test)#




                      NOTE: For more information on WIPS policy commands, see Chapter 22, WIPS-POLICY.
4 - 160 WiNG CLI Reference Guide


4.1.46 wlan
          Global Configuration Commands
        Configures a wireless LAN
                                                           Table 4.16 WLAN Commands

                Command                                         Description               Reference
         wlan                       Configures a wireless LAN                         page 4-129
GLOBAL CONFIGURATION COMMANDS 4 - 161


4.1.46.1 wlan
          wlan
        Configures a WLAN or enters WLAN configuration context for one or more WLANs
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        wlan {<WLAN-NAME>|containing <WLAN-NAME>}
        Parameters
        • wlan {<WLAN-NAME>|containing <WLAN-NAME>}

         wlan <WLAN-NAME>               Configures a new wireless LAN
                                        • <WLAN-NAME> – Optional. Specify the WLAN name.
         containing <WLAN-NAME>         Optional. Configures an existing WLAN’s configuration context
                                        • <WLAN-NAME> – Specify a sub-string in the WLAN name. Use this parameter to
                                          filter a WLAN
        Examples
        rfs7000-37FABE(config)#wlan 1
        rfs7000-37FABE(config-wlan-1)#

        rfs7000-37FABE(config)#wlan containing wlan1
        rfs7000-37FABE(config-wlan-{'containing': 'wlan1'})#
4 - 162 WiNG CLI Reference Guide


4.1.46.2 wlan-mode commands
          wlan
        Configures WLAN mode commands. Manual WLAN mappings are erased when the actual WLAN is disabled and then
        enabled immediately
        Use the (config) instance to configure WLAN related parameters.
        To navigate to this instance, use the following commands:
        rfs7000-37FABE(config)#wlan <WLAN>
        Table 4.17 summarizes WLAN mode commands
                                                         Table 4.17 wlan-mode commands

               Command                                        Description                                  Reference
         802.11w             Enables support for Protected Management Frame (IEEE 802.11w) settings      page 4-164
         accounting          Defines WLAN accounting configuration                                       page 4-165
         acl                 Defines the actions based on an ACL rule configuration                      page 4-166
         answer-             Allows a WLAN to respond to probes for broadcast ESS                        page 4-167
         broadcast-probes
         authentication-     Sets a WLAN’s authentication type                                           page 4-168
         type
         bridging-mode       Configures how packets to/from this WLAN are bridged                        page 4-170
         broadcast-dhcp      Configures broadcast DHCP packet handling                                   page 4-171
         broadcast-ssid      Advertises a WLAN’s SSID in beacons                                         page 4-172
         captive-portal-     Configures a WLAN’s captive portal enforcement                              page 4-173
         enforcement
         client-access       Enables WLAN client access (normal data operations)                         page 4-174
         client-client-      Allows the switching of frames from one wireless client to another on a WLAN page 4-175
         communication
         client-load-        Enables load balancing of WLAN clients                                      page 4-176
         balancing
         data-rates          Specifies the 802.11 rates supported on the WLAN                            page 4-178
         description         Sets a WLAN’s description                                                   page 4-182
         encryption-type     Sets a WLAN’s encryption type                                               page 4-183
         enforce-dhcp        Drops packets from clients with a static IP address                         page 4-185
         ip                  Configures IP settings                                                      page 4-186
         kerberos            Configures Kerberos authentication parameters                               page 4-188
         motorola-           Enables support for Motorola Solutions specific extensions to 802.11        page 4-190
         extensions
GLOBAL CONFIGURATION COMMANDS 4 - 163


                                             Table 4.17 wlan-mode commands

      Command                                     Description                         Reference
no                Negates a command or sets its default value                       page 4-192
proxy-arp-mode    Enables the proxy ARP mode for ARP requests                       page 4-195
radius            Configures the RADIUS related parameters                          page 4-196
shutdown          Closes a WLAN                                                     page 4-197
ssid              Configures a WLAN’s SSID                                          page 4-198
use               Defines WLAN mode configuration settings                          page 4-199
vlan              Sets VLAN assignment for a WLAN                                   page 4-201
vlan-pool-member Adds a member VLAN to the pool of VLANs for a WLAN                 page 4-202
wep128            Configures WEP128 parameters                                      page 4-204
wep64             Configures WEP64 parameters                                       page 4-206
wireless-client   Configures the transmit power for wireless clients transmission   page 4-208
wpa-wpa2          Modifies TKIP and CCMP (WPA/WPA2) related parameters              page 4-210
4 - 164 WiNG CLI Reference Guide


4.1.46.2.1 802.11w
           wlan-mode commands
         Enables support for Protected Management Frames (PMF) (IEEE 802.11w) settings
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         802.11w [mandatory|optional|sa-query]

         802.11w [mandatory|optional]

         802.11w sa-query [attempts <1-15>|timeout <100-6000>]
         Parameters
         • 802.11w [mandatory|optional]

          802.11w mandatory           Enforces WLAN PMF settings
          802.11w optional            Advertises support for PMF, but it is enforced only for clients that indicate their support

         • 802.11w sa-query [attempts <1-15>|timeout <100-6000>]

          802.11w sa-query             Enables security association (SA) query settings
          attempts <1-15>              Sets the number of times an SA query message is attempted
          time-out <100-600>           Sets the timeout period, when waiting for a response to an sa query, before re-sending
         Examples
         rfs7000-37FABE(config-wlan-wlan1)#802.11w sa-query timeout 110
         rfs7000-37FABE(config-wlan-wlan1)#

         rfs7000-37FABE(config-wlan-wlan1)#802.11w sa-query attempts 1
         rfs7000-37FABE(config-wlan-wlan1)#

         rfs7000-37FABE(config-wlan-wlan1)#show context
         wlan wlan1
          ssid wlan1
          bridging-mode tunnel
          encryption-type none
          authentication-type none
          802.11w sa-query timeout 110
          802.11w sa-query attempts 1
         rfs7000-37FABE(config-wlan-wlan1)#
GLOBAL CONFIGURATION COMMANDS 4 - 165


4.1.46.2.2 accounting
           wlan-mode commands
         Defines the WLAN’s accounting configuration
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         accounting [radius|syslog]

         accounting radius

         accounting [syslog host <IP/HOSTNAME> {port [<1-65535>]}]
         Parameters
         • accounting radius

          accounting radius         Enables support for WLAN RADIUS accounting messages

         • accounting [radius|syslog host <IP/HOSTNAME> {port [<1-65535>]}]

          accounting syslog          Enables support for WLAN syslog accounting messages
          host <IP/HOSTNAME>         Configures a syslog destination hostname or IP address for accounting records
                                     • <IP/HOSTNAME> – Specify the IP address or name of the destination host.
          port <1-65535>             Optional. Configures the syslog server’s UDP port (this port is used to connect to the server)
                                     • <1-65535> – Specify the port from 1 - 65535.
         Examples
         rfs7000-37FABE(config-wlan-wlan1)#accounting syslog host 172.16.10.12 port 2
         rfs7000-37FABE(config-wlan-wlan1)#

         rfs7000-37FABE(config-wlan-wlan1)#show context
         wlan wlan1
          ssid wlan1
          bridging-mode tunnel
          encryption-type none
          authentication-type none
          802.11w sa-query timeout 110
          802.11w sa-query attempts 1
          accounting syslog host 172.16.10.12 port 2
         rfs7000-37FABE(config-wlan-wlan1)#
4 - 166 WiNG CLI Reference Guide


4.1.46.2.3 acl
            wlan-mode commands
         Defines the actions taken based on an ACL rule configuration
         Supported in the following platforms:
            • AP300
             • AP621
             • AP650
             • AP6511
             • AP6521
             • AP6532
             • AP71XX
             • RFS4000
             • RFS6000
             • RFS7000
         Syntax
         acl exceed-rate wireless-client-denied-traffic <0-1000000> {blacklist
            |disassociate}
         acl exceed-rate wireless-client-denied-traffic <0-1000000> {blacklist
            <0-86400>|disassociate}
         Parameters
         • acl exceed-rate wireless-client-denied-traffic <0-1000000> {blacklist
         <0-86400>|disassociate}

           acl exceed-rate             Sets the actions taken based on an ACL rule configuration (for example, drop a packet)
                                       • exceed-rate – Action is taken when the rate exceeds a specified value
           wireless-client-denied-     Sets the action to deny traffic to the wireless client, when the rate exceeds the specified
           traffic <0-1000000>         value
                                       • <0-1000000> – Specify a allowed rate threshold of disallowed traffic in packets/sec.
           blacklist <0-86400>         Optional. When enabled, sets the time interval to blacklist a wireless client
           disassociate                Optional. When enabled, disassociates a wireless client
         Examples
         rfs7000-37FABE(config-wlan-wlan1)#acl exceed-rate wireless-client-denied-traffic
          20 disassociate
         rfs7000-37FABE(config-wlan-wlan1)#
         rfs7000-37FABE(config-wlan-wlan1)#show context
         wlan wlan1
          ssid wlan1
          bridging-mode tunnel
          encryption-type none
          authentication-type none
          802.11w sa-query timeout 110
          802.11w sa-query attempts 1
          accounting syslog host 172.16.10.12 port 2
          acl exceed-rate wireless-client-denied-traffic 20 disassociate
         rfs7000-37FABE(config-wlan-wlan1)#
GLOBAL CONFIGURATION COMMANDS 4 - 167


4.1.46.2.4 answer-broadcast-probes
          wlan-mode commands
        Allows the WLAN to respond to probe requests that do not specify an SSID. These probes are for broadcast ESS.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        answer-broadcast-probes
        Parameters
        None
        Examples
        rfs7000-37FABE(config-wlan-wlan1)#answer-broadcast-probes
        rfs7000-37FABE(config-wlan-wlan1)#
4 - 168 WiNG CLI Reference Guide


4.1.46.2.5 authentication-type
           wlan-mode commands
         Sets the WLAN’s authentication type
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         authentication-type [eap|eap-mac|eap-psk|kerberos|mac|none]
         Parameters
         • authentication-type [eap|eap-mac|eap-psk|kerberos|mac|none]

          authentication-type        Configures a WLAN’s authentication type
                                     The authentication types are: EAP, EAP-MAC, EAP-PSK, Kerberos, MAC, and none.
          eap                        Configures Extensible Authentication Protocol (EAP) authentication (802.1X)
          eap-mac                    Configures EAP or MAC authentication depending on client
          eap-psk                    Configures EAP authentication or pre-shared keys depending on client (This setting is only
                                     valid with Temporal Key Integrity Protocol (TKIP) or Counter Mode with Cipher Block Chaining
                                     Message Authentication Code Protocol (CCMP))
          kerberos                   Configures Kerberos authentication (encryption will change to WEP128 if it’s not already
                                     WEP128 or Keyguard)
          mac                        Configures MAC authentication (RADIUS lookup of MAC address)
          none                       No authentication is used or the client uses pre-shared keys
GLOBAL CONFIGURATION COMMANDS 4 - 169


Examples
rfs7000-37FABE(config-wlan-wlan1)#authentication-type eap
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#show context
wlan wlan1
 ssid wlan1
 bridging-mode tunnel
 encryption-type none
 authentication-type eap
 802.11w sa-query timeout 110
 802.11w sa-query attempts 1
 accounting syslog host 172.16.10.12 port 2
 acl exceed-rate wireless-client-denied-traffic 20 disassociate
rfs7000-37FABE(config-wlan-wlan1)#
4 - 170 WiNG CLI Reference Guide


4.1.46.2.6 bridging-mode
           wlan-mode commands
        Configures how packets are bridged to and from a WLAN
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        bridging-mode [local|tunnel]
        Parameters
        • bridging-mode [local|tunnel]

         bridging-mode              Configures how packets are bridged to and from a WLAN. The options available are local and
                                    tunnel.
         local                      Bridges packets between WLAN and local ethernet ports
         tunnel                     Tunnels packets to other devices (typically a wireless controller)

        Examples
        rfs7000-37FABE(config-wlan-wlan1)#bridging-mode local
        rfs7000-37FABE(config-wlan-wlan1)#

        rfs7000-37FABE(config-wlan-wlan1)#show context
        wlan wlan1
         ssid wlan1
         bridging-mode local
         encryption-type none
         authentication-type eap
         802.11w sa-query timeout 110
         802.11w sa-query attempts 1
         accounting syslog host 172.16.10.12 port 2
         acl exceed-rate wireless-client-denied-traffic 20 disassociate
        rfs7000-37FABE(config-wlan-wlan1)#
GLOBAL CONFIGURATION COMMANDS 4 - 171


4.1.46.2.7 broadcast-dhcp
           wlan-mode commands
        Configures the broadcast DHCP packet handling parameters
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        broadcast-dhcp validate-offer
        Parameters
        • broadcast-dhcp validate-offer

         validate-offer                 Validates the broadcast DHCP packet destination (a wireless client associated to the
                                        radio) before forwarding over the air
        Examples
        rfs7000-37FABE(config-wlan-wlan1)#broadcast-dhcp validate-offer
        rfs7000-37FABE(config-wlan-wlan1)#

        rfs7000-37FABE(config-wlan-wlan1)#show context
        wlan wlan1
         ssid wlan1
         bridging-mode local
         encryption-type none
         authentication-type eap
         802.11w sa-query timeout 110
         802.11w sa-query attempts 1
         accounting syslog host 172.16.10.12 port 2
         acl exceed-rate wireless-client-denied-traffic 20 disassociate
         broadcast-dhcp validate-offer
        rfs7000-37FABE(config-wlan-wlan1)#
4 - 172 WiNG CLI Reference Guide


4.1.46.2.8 broadcast-ssid
           wlan-mode commands
         Advertises the WLAN SSID in beacons
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         broadcast-ssid
         Parameters
         None
         Examples
         rfs7000-37FABE(config-wlan-wlan1)#broadcast-ssid
         rfs7000-37FABE(config-wlan-wlan1)#
GLOBAL CONFIGURATION COMMANDS 4 - 173


4.1.46.2.9 captive-portal-enforcement
           wlan-mode commands
        Configures the WLAN’s captive portal enforcement
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        captive-portal-enforcement {fall-back}
        Parameters
        • captive-portal-enforcement {fall-back}

         captive-portal-enforcement     Enables captive portal enforcement on a WLAN
         fall-back                      Optional. Enforces captive portal validation if WLAN authentication fails (applicable to
                                        EAP or MAC authentication only)
        Examples
        rfs7000-37FABE(config-wlan-wlan1)#captive-portal-enforcement fall-back
        rfs7000-37FABE(config-wlan-wlan1)#

        rfs7000-37FABE(config-wlan-wlan1)#show context
        wlan wlan1
         ssid wlan1
         bridging-mode local
         encryption-type none
         authentication-type eap
         802.11w sa-query timeout 110
         802.11w sa-query attempts 1
         accounting syslog host 172.16.10.12 port 2
         captive-portal-enforcement fall-back
         acl exceed-rate wireless-client-denied-traffic 20 disassociate
         broadcast-dhcp validate-offer
        rfs7000-37FABE(config-wlan-wlan1)#
4 - 174 WiNG CLI Reference Guide


4.1.46.2.10 client-access
           wlan-mode commands
         Enables WLAN client access (for normal data operations)
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         client-access
         Parameters
         None
         Examples
         rfs7000-37FABE(config-wlan-wlan1)#client-access
         rfs7000-37FABE(config-wlan-wlan1)#
GLOBAL CONFIGURATION COMMANDS 4 - 175


4.1.46.2.11 client-client-communication
           wlan-mode commands
        Allows frame switching from one client to another on a WLAN
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        client-client-communication
        Parameters
        None
        Examples
        rfs7000-37FABE(config-wlan-wlan1)#client-client-communication
        rfs7000-37FABE(config-wlan-wlan1)#s
4 - 176 WiNG CLI Reference Guide


4.1.46.2.12 client-load-balancing
           wlan-mode commands
         Configures client load balancing on a WLAN
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         client-load-balancing {allow-single-band-clients|band-discovery-intvl|
            capability-ageout-time|max-probe-req|probe-req-invl}

         client-load-balancing {allow-single-band-clients [2.4Ghz|5Ghz]|
            band-discovery-intvl [<0-10000>]|capability-ageout-time [<0-10000>]}

         client-load-balancing {{max-probe-req|probe-req-intvl} [2.4Ghz|5Ghz] [<0-10000>]}
         Parameters
         • client-load-balancing {allow-single-band-clients [2.4Ghz|5Ghz]|
         band-discovery-intvl [<0-10000>]|capability-ageout-time [<0-10000>]}

          client-load-balancing          Configures client load balancing on a WLAN
          allow-single-band-clients      Optional. Allows single band clients to associate even during load balancing
          [2.4GHz|5GHz]                  • 2.4GHz – Enables load balancing across 2.4GHz channels
                                         • 5GHz – Enables load balancing across 5GHz channels
          band-discovery-intvl           Optional. Configures time interval to discover a client's band capability before
          <0-10000>                      associating it
                                         • <0-10000> – Specify a value from 0 - 10000 seconds.
          capability-ageout-time         Optional. Configures a client's capability ageout interval
          <0-10000>                      • <0-10000> – Specify a value from 0 - 10000 seconds.

         • client-load-balancing {{max-probe-req|probe-req-intvl} [2.4Ghz|5Ghz]
         [<0-10000>]}

          client-load-balancing          Configures load balancing of clients on a WLAN
GLOBAL CONFIGURATION COMMANDS 4 - 177



max-probe-req             Optional. Configures client probe request interval limits for association
[2.4GHz|5GHz] <0-10000>   • 2.4GHz – Configures maximum client probe requests on 2.4GHz radios
                          • 5GHz – Configures maximum client probe requests on 5GHz radios
                            • <0-10000> – Specify a client probe request threshold from 0 - 100000.
probe-req-intvl           Optional. Configures client probe request interval limits for association
2.4GHz|5GHz] <0-10000>    • 2.4GHz – Configures client probe request interval on 2.4GHz radios
                          • 5GHz – Configures client probe request interval on 5GHz radios
                            • <0-10000> – Specify a value from 0 - 100000.
Examples
rfs7000-37FABE(config-wlan-wlan1)#client-load-balancing allow-single-band-clients
2.4ghz
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#client-load-balancing band-discovery-intvl 2
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABEconfig-wlan-wlan1)#client-load-balancing probe-req-intvl 5ghz 5
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#show context
wlan wlan1
 ssid wlan1
 bridging-mode local
 encryption-type none
 authentication-type eap
 802.11w sa-query timeout 110
 802.11w sa-query attempts 1
 accounting syslog host 172.16.10.12 port 2
 client-load-balancing probe-req-intvl 5ghz 5
 client-load-balancing band-discovery-intvl 2
 captive-portal-enforcement fall-back
 acl exceed-rate wireless-client-denied-traffic 20 disassociate
 broadcast-dhcp validate-offer
rfs7000-37FABE(config-wlan-wlan1)#
4 - 178 WiNG CLI Reference Guide


4.1.46.2.13 data-rates
            wlan-mode commands
         Specifies the 802.11 rates supported on a WLAN
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         data-rates [2.4GHz|5GHz]

         data-rates 2.4GHz [b-only|bg|bgn|custom|default|g-only|gn]

         data-rates 2.4GHz [b-only|bg|bgn|default|g-only|gn]

         data-rates 2.4GHz custom [1|11|12|18|2|24|36|48|5.5|54|6|9|
            basic-1|basic-11|basic-12|basic-18|basci-2|basic-24|basic-36|
            basic-48|basic-5.5|basic-54|basic-6|basic-9|basic-mcs0-7|mcs0-15|
            mcs0-7|mcs8-15]

         data-rates 5GHz [a-only|an|custom|default]

         data-rates 5GHz [a-only|an|default]

         data-rates 5GHz custom [12|18|24|36|48|54|6|9|basic-1|basi-11|
            basic-12|basic-18|basic-2|basic-24|basic-36|basic-48|basic-5.5|basic-54|
            basic-6|basic-9|basic-mcs0-7|mcs0-15|mcs0-7|mcs8-15]
         Parameters
         • data-rates 2.4GHz [b-only|bg|bgn|default|g-only|gn]

          data-rates                 Specifies the 802.11 rates supported when mapped to a 2.4GHz radio
          b-only                     Uses rates that support only 11b clients
          bg                         Uses rates that support both 11b and 11g clients
          bgn                        Uses rates that support 11b, 11g and 11n clients
          default                    Uses the default rates configured for a 2.4GHz radio
          g-only                     Uses rates that support operation in the 11g only mode
          gn                         Uses rates that support 11g and 11n clients
GLOBAL CONFIGURATION COMMANDS 4 - 179


• data-rates 5GHz [a-only|an|default]

data-rates                 Specifies the 802.11 rates supported when mapped to a 5GHz radio
a-only                     Uses rates that support operation in 11a only
an                         Uses rates that support 11a and 11n clients
default                    Uses default rates configured for a 5GHz

• data-rates [2.4GHz|5GHz] custom [1|11|12|18|2|24|36|48|5.5|54|6|9|
basic-1|basic-11|basic-12|basic-18|basic-2|basic-24|basic-36|
basic-48|basic-5.5|basic-54|basic-6|basic-9|basic-mcs0-7|mcs0-15|
mcs0-7|mcs8-15]

data-rates [2.4GHz|5GHz]   Specifies the 802.11 rates supported when mapped to a 2.4GHz or 5GHz radio
custom                     Configures a data rates list by specifying each rate individually. Use 'basic-' prefix before
                           a rate to indicate it is used as a basic rate (For example, 'data-rates custom basic-1 basic-
                           2 5.5 11').
                           The data-rates for 2.4GHz and 5GHz channels are the same with a few exceptions. The
                           2.4GHz channel has a few extra data rates: 1, 11, 2, and 5.5.
4 - 180 WiNG CLI Reference Guide



         1,11,2,5.5                   The following data rates are specific to the 2.4GHz channel:
                                      • 1 – 1-Mbps
                                      • 11 – 11-Mbps
                                      • 2 – 2-Mbps
                                      • 5.5 – 5.5-Mbps
         12,18,24,36,48,54,6,9,       The following data rates are common to both the 2.4Ghz and 5GHz channels:
         basic-1,basic-11,            • 12 – 12 Mbps
         basic-12,basic-18,basic-2,
                                      • 18 – 18-Mbps
         basic-36,basic-48,basic-
         5.5,                         • 24 – 24 Mbps
         basic-54,basic-6,basic-9,    • 36 – 36-Mbps
         basic-mcs0-7,mcs0-15,        • 48 – 48-Mbps
         mcs0-7,mcs8-15               • 54 – 54-Mbps
                                      • 6 – 6-Mbps
                                      • 9 – 9-Mbps
                                      • basic-1 – basic 1-Mbps
                                      • basic-11 – basic 11-Mbps
                                      • basic-12 – basic 12-Mbps
                                      • basic-18 – basic 18-Mbps
                                      • basic-2 – basic 2-Mbps
                                      • basic-36 – basic 36-Mbps
                                      • basic-48 – basic 48-Mbps
                                      • basic-5.5 – basic 5.5-Mbps
                                      • basic-54 – basic 54-Mbps
                                      • basic-6 – basic 6-Mbps
                                      • basic-9 – basic 9-Mbps
                                      • basic-mcs0-7 – Modulation and coding scheme 0-7 as a basic rate
                                      • mcs0-15 – Modulation and coding scheme 0-15
                                      • mcs0-7 – Modulation and coding scheme 0-7
                                      • mcs8-15 – Modulation and coding scheme 8-15
GLOBAL CONFIGURATION COMMANDS 4 - 181


Examples
rfs7000-37FABE(config-wlan-wlan1)#data-rates 2.4GHz gn
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#show context
wlan wlan1
 ssid wlan1
 bridging-mode local
 encryption-type none
 authentication-type eap
 802.11w sa-query timeout 110
 802.11w sa-query attempts 1
 accounting syslog host 172.16.10.12 port 2
 data-rates 2.4GHz gn
 client-load-balancing probe-req-intvl 5ghz 5
 client-load-balancing band-discovery-intvl 2
 captive-portal-enforcement fall-back
 acl exceed-rate wireless-client-denied-traffic 20 disassociate
 broadcast-dhcp validate-offer
rfs7000-37FABE(config-wlan-wlan1)#
4 - 182 WiNG CLI Reference Guide


4.1.46.2.14 description
           wlan-mode commands
         Defines the WLAN description
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         description <LINE>
         Parameters
         • description <LINE>

          <LINE>                        Specify a WLAN description
         Examples
         rfs7000-37FABE(config-wlan-wlan1)#description testwlan
         rfs7000-37FABE(config-wlan-wlan1)#

         rfs7000-37FABE(config-wlan-wlan1)#show context
         wlan wlan1
          description testwlan
          ssid wlan1
          bridging-mode local
          encryption-type none
          authentication-type eap
          802.11w sa-query timeout 110
          802.11w sa-query attempts 1
          accounting syslog host 172.16.10.12 port 2
          data-rates 2.4GHz gn
          client-load-balancing probe-req-intvl 5ghz 5
          client-load-balancing band-discovery-intvl 2
          captive-portal-enforcement fall-back
          acl exceed-rate wireless-client-denied-traffic 20 disassociate
          broadcast-dhcp validate-offer
         rfs7000-37FABE(config-wlan-wlan1)#
GLOBAL CONFIGURATION COMMANDS 4 - 183


4.1.46.2.15 encryption-type
           wlan-mode commands
         Sets a WLAN’s encryption type
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         encryption-type [ccmp|keyguard|none|tkip|tkip-ccmp|wep128|
            web128-keyguard|wep64]
         Parameters
         • encryption-type [ccmp|keyguard|none|tkip|tkip-ccmp|wep128|
         web128-keyguard|wep64]

          encryption-type                Configures the WLAN’s data encryption parameters
          ccmp                           Configures Advanced Encryption Standard (AES) Counter Mode CBC-MAC Protocol
                                         (AES-CCM/CCMP)
          keyguard                       Configures Keyguard-MCM (Mobile Computing Mode)
          tkip                           Configures TKIP
          tkip-ccmp                      Configures the TKIP and AES-CCM/CCMP encryption modes
          wep128                         Configures WEP with 128 bit keys
          wep128-keyguard                Configures WEP128 as well as Keyguard-MCM encryption modes
          wep64                          Configures WEP with 64 bit keys. A WEP64 configuration is insecure when two WLANs
                                         are mapped to the same VLAN, and one uses no encryption while the other uses WEP.
4 - 184 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABEconfig-wlan-wlan1)#encryption-type tkip-ccmp
        rfs7000-37FABE(config-wlan-wlan1)#

        rfs7000-37FABE(config-wlan-wlan1)#show context
        wlan wlan1
         description testwlan
         ssid wlan1
         bridging-mode local
         encryption-type tkip-ccmp
         authentication-type eap
         802.11w sa-query timeout 110
         802.11w sa-query attempts 1
         accounting syslog host 172.16.10.12 port 2
         data-rates 2.4GHz gn
         client-load-balancing probe-req-intvl 5ghz 5
         client-load-balancing band-discovery-intvl 2
         captive-portal-enforcement fall-back
         acl exceed-rate wireless-client-denied-traffic 20 disassociate
         broadcast-dhcp validate-offer
        rfs7000-37FABE(config-wlan-wlan1)#
GLOBAL CONFIGURATION COMMANDS 4 - 185


4.1.46.2.16 enforce-dhcp
           wlan-mode commands
        Drops packets from clients with a static IP address
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        enforce-dhcp
        Parameters
        None
        Examples
        rfs7000-37FABE(config-wlan-wlan1)#enforce-dhcp
        rfs7000-37FABE(config-wlan-wlan1)#

        rfs7000-37FABE(config-wlan-wlan1)#show context
        wlan wlan1
         description testwlan
         ssid wlan1
         bridging-mode local
         encryption-type tkip-ccmp
         authentication-type eap
         802.11w sa-query timeout 110
         802.11w sa-query attempts 1
         accounting syslog host 172.16.10.12 port 2
         data-rates 2.4GHz gn
         client-load-balancing probe-req-intvl 5ghz 5
         client-load-balancing band-discovery-intvl 2
         captive-portal-enforcement fall-back
         acl exceed-rate wireless-client-denied-traffic 20 disassociate
         enforce-dhcp
         broadcast-dhcp validate-offer
        rfs7000-37FABE(config-wlan-wlan1)#
4 - 186 WiNG CLI Reference Guide


4.1.46.2.17 ip
             wlan-mode commands
          Configures Internet Protocol (IP) settings
          Supported in the following platforms:
             • AP300
             • AP621
             • AP650
             • AP6511
             • AP6521
             • AP6532
             • AP71XX
             • RFS4000
             • RFS6000
             • RFS7000
          Syntax
          ip [arp|dhcp]

          ip arp [header-mismatch-validation|trust]

          ip dhcp trust
          Parameters
          • ip arp [header-mismatch-validation|trust]

           ip arp                       Configures the IP settings for ARP packets
           header-mismatch-             Verifies mismatch of source MAC address in the ARP and Ethernet headers
           validation
           trust                        Sets ARP responses as trusted for a WLAN/range
          • ip dhcp trust

           ip dhcp                      Configures the IP settings for DHCP packets
           trust                        Sets DHCP responses as trusted for a WLAN/range
GLOBAL CONFIGURATION COMMANDS 4 - 187


Examples
rfs7000-37FABE(config-wlan-wlan1)#ip dhcp trust
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#show context
wlan wlan1
 description testwlan
 ssid wlan1
 bridging-mode local
 encryption-type tkip-ccmp
 authentication-type eap
 802.11w sa-query timeout 110
 802.11w sa-query attempts 1
 accounting syslog host 172.16.10.12 port 2
 data-rates 2.4GHz gn
 client-load-balancing probe-req-intvl 5ghz 5
 client-load-balancing band-discovery-intvl 2
 captive-portal-enforcement fall-back
 ip dhcp trust
 acl exceed-rate wireless-client-denied-traffic 20 disassociate
 enforce-dhcp
 broadcast-dhcp validate-offer
rfs7000-37FABE(config-wlan-wlan1)#
4 - 188 WiNG CLI Reference Guide


4.1.46.2.18 kerberos
           wlan-mode commands
         Configures Kerberos authentication parameters on a WLAN
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         kerberos [password|realm|server]

         kerberos password [0 <LINE>|2 <LINE>|<LINE>]

         kerberos realm <REALM>

         kerberos server [primary|secondary|timeout]

         kerberos server [primary|secondary] host <IP/HOSTNAME> {port [<1-65535>]}

         keberos server timeout <1-60>
         Parameters
         • kerberos password [0 <LINE>|2 <LINE>|<LINE>]

          kerberos                    Configures a WLAN’s Kerberos authentication parameters
                                      The parameters are: password, realm, and server.
          password                    Configures a Kerberos Key Distribution Center (KDC) server password. The password
                                      should not exceed 127 characters. The password options are:
                                      • 0 <LINE> – Configures a clear text password
                                      • 2 <LINE> – Configures an encrypted password
                                      • <LINE> – Specify the password.

         • kerberos realm <REALM>

          kerberos                    Configures a WLAN’s Kerberos authentication parameters
                                      The parameters are: password, realm, and server.
          realm <REALM>               Configures a Kerberos KDC server realm. The REALM should not exceed 127 characters.
GLOBAL CONFIGURATION COMMANDS 4 - 189


• kerberos server [primary|secondary] host <IP/HOSTNAME> {port [<1-65535>]}

kerberos              Configures a WLAN’s Kerberos authentication parameters
                      The parameters are: password, realm, and server.
server                Configures the primary and secondary KDC server parameters
[primary|secondary]   • primary – Configures the primary KDC server parameters
                      • secondary – Configures the secondary KDC server parameters
host <IP/HOSTNAME>    Sets the primary or secondary KDC server address
                      • <IP/HOSTNAME> – Specify the IP address or name of the KDC server.
port <1-65535>        Optional. Configures the UDP port used to connect to the KDC server
                      • <1-65535> – Specify the port from 1 - 65535. The default is 88.
• keberos server timeout <1-60>

kerberos              Configures a WLAN’s Kerberos authentication parameters
                      The parameters are: password, realm, and server.
timeout <1-60>        Modifies the Kerberos KDC server‘s timeout parameters
                      • <1-60> – Specifies the time the wireless controller waits for a response from the
                        Kerberos KDC server before retrying. Specify a value from 1 - 60 seconds.
Examples
rfs7000-37FABE(config-wlan-wlan1)#kerberos server timeout 12
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#kerberos server primary host 172.16.10.9 port
88
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#show context
wlan wlan1
 description testwlan
 ssid wlan1
 bridging-mode local
 encryption-type tkip-ccmp
 authentication-type eap
 802.11w sa-query timeout 110
 802.11w sa-query attempts 1
 kerberos server timeout 12
 kerberos server primary host 172.16.10.9
 accounting syslog host 172.16.10.12 port 2
 data-rates 2.4GHz gn
 client-load-balancing probe-req-intvl 5ghz 5
 client-load-balancing band-discovery-intvl 2
 captive-portal-enforcement fall-back
 ip dhcp trust
 acl exceed-rate wireless-client-denied-traffic 20 disassociate
 enforce-dhcp
 broadcast-dhcp validate-offer
rfs7000-37FABE(config-wlan-wlan1)#
4 - 190 WiNG CLI Reference Guide


4.1.46.2.19 motorola-extensions
           wlan-mode commands
        Enables support for Motorola Solutions specific extensions to 802.11
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        motorola-extensions [move-command|smart-scan|symbol-load-information|
           wmm-load-information]
        Parameters
        • otorola-extensions [move-command|smart-scan|symbol-load-information|
        wmm-load-information]

         motorola-extensions            Enables support for Motorola Solutions specific extensions to 802.11
         move-command                   Enables support for Motorola move (fast roaming) feature
         smart-scan                     Enables support for smart scanning feature
         symbol-load-information        Enables support for the Symbol Technologies load information element (Element ID 173)
         wmm-load-information           Enables support for the Motorola Solutions WMM load information element
GLOBAL CONFIGURATION COMMANDS 4 - 191


Examples
rfs7000-37FABE(config-wlan-wlan1)#motorola-extensions wmm-load-information
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#show context
wlan wlan1
 description testwlan
 ssid wlan1
 bridging-mode local
 encryption-type tkip-ccmp
 authentication-type eap
 802.11w sa-query timeout 110
 802.11w sa-query attempts 1
 kerberos server timeout 12
 kerberos server primary host 172.16.10.9
 accounting syslog host 172.16.10.12 port 2
 data-rates 2.4GHz gn
 motorola-extensions wmm-load-information
 client-load-balancing probe-req-intvl 5ghz 5
 client-load-balancing band-discovery-intvl 2
 captive-portal-enforcement fall-back
 ip dhcp trust
 acl exceed-rate wireless-client-denied-traffic 20 disassociate
 enforce-dhcp
 broadcast-dhcp validate-offer
rfs7000-37FABE(config-wlan-wlan1)#
4 - 192 WiNG CLI Reference Guide


4.1.46.2.20 no
            wlan-mode commands
         Negates WLAN mode commands and reverts values to their default
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         no <parameter>
         Parameters
         None
         Usage Guidelines
         The no command negates any command associated with it. Wherever required, use the same parameters associated with
         the command getting negated.
         Examples
         rfs7000-37FABE(config-wlan-wlan1)#no ?
           802.11w                      Disable support for Protected Management Frames
                                        (IEEE 802.11w)
           accounting                   Configure how accounting records are created
                                        for this wlan
           acl                          Actions taken based on ACL configuration [
                                        packet drop being one of them]
           answer-broadcast-probes      Do not Include this wlan when responding to
                                        probe requests that do not specify an SSID
           authentication-type          Reset the authentication to use on this wlan to
                                        default (none/Pre-shared keys)
           broadcast-dhcp               Configure broadcast DHCP packet handling
           broadcast-ssid               Do not advertise the SSID of the WLAN in
                                        beacons
           captive-portal-enforcement   Configure how captive-portal is enforced on the
                                        wlan
           client-access                Disallow client access on this wlan (no data
                                        operations)
           client-client-communication Disallow switching of frames from one wireless
                                        client to another on this wlan
           client-load-balancing        Disable load-balancing of clients on this wlan
           data-rates                   Reset data rate configuration to default
           description                  Reset the description of the wlan
           encryption-type              Reset the encryption to use on this wlan to
                                        default (none)
           enforce-dhcp                 Drop packets from Wireless Clients with static
                                        IP address
           ip                           Internet Protocol (IP)
           kerberos                     Configure kerberos authentication parameters
           motorola-extensions          Disable support for Motorola-Specific
GLOBAL CONFIGURATION COMMANDS 4 - 193


                               extensions to 802.11
  proxy-arp-mode               Configure handling of ARP requests with
                               proxy-arp is enabled
  radius                       Configure RADIUS related parameters
  shutdown                     Enable the use of this wlan
  ssid                         Configure ssid
  use                          Set setting to use
  vlan                         Map the default vlan (vlan-id 1) to the wlan
  vlan-pool-member             Delete a mapped vlan from this wlan
  wep128                       Reset WEP128 parameters
  wep64                        Reset WEP64 parameters
  wireless-client              Configure wireless-client specific parameters
  wpa-wpa2                     Modify tkip-ccmp (wpa/wpa2) related parameters

  service                      Service Commands

rfs7000-37FABE(config-wlan-wlan1)#
The wlan1 settings before the execution of the no command:

rfs7000-37FABE(config-wlan-wlan1)#show context
wlan wlan1
 description testwlan
 ssid wlan1
 bridging-mode local
 encryption-type tkip-ccmp
 authentication-type eap
 802.11w sa-query timeout 110
 802.11w sa-query attempts 1
 kerberos server timeout 12
 kerberos server primary host 172.16.10.9
 accounting syslog host 172.16.10.12 port 2
 data-rates 2.4GHz gn
 motorola-extensions wmm-load-information
 client-load-balancing probe-req-intvl 5ghz 5
 client-load-balancing band-discovery-intvl 2
 captive-portal-enforcement fall-back
 ip dhcp trust
 acl exceed-rate wireless-client-denied-traffic 20 disassociate
 enforce-dhcp
 broadcast-dhcp validate-offer
rfs7000-37FABE(config-wlan-wlan1)#


rfs7000-37FABE(config-wlan-wlan1)#no accounting syslog
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#no description
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#no authentication-type
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#no encryption-type
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#no enforce-dhcp
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#no kerberos server primary host
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#no kerberos server timeout
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#no data-rates 2.4GHz
rfs7000-37FABE(config-wlan-wlan1)#
The wlan1 settings after the execution of the no command:
4 - 194 WiNG CLI Reference Guide


        rfs7000-37FABE(config-wlan-wlan1)#show context
        wlan wlan1
         ssid wlan1
         bridging-mode local
         encryption-type none
         authentication-type none
         802.11w sa-query timeout 110
         802.11w sa-query attempts 1
         motorola-extensions wmm-load-information
         client-load-balancing probe-req-intvl 5ghz 5
         client-load-balancing band-discovery-intvl 2
         captive-portal-enforcement fall-back
         ip dhcp trust
         acl exceed-rate wireless-client-denied-traffic 20 disassociate
         broadcast-dhcp validate-offer
        rfs7000-37FABE(config-wlan-wlan1)#
GLOBAL CONFIGURATION COMMANDS 4 - 195


4.1.46.2.21 proxy-arp-mode
           wlan-mode commands
        Enables proxy ARP mode for handling ARP requests
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        proxy-arp-mode [dynamic|strict]
        Parameters
        • proxy-arp-mode [dynamic|strict]

         proxy-arp-mode                 Enables proxy ARP mode for handling ARP requests. The options available are dynamic
                                        and strict.
         dynamic                        Forwards ARP requests to the wireless side (for which a response could not be proxied)
         strict                         Does not forward ARP requests to the wireless side
        Examples
        rfs7000-37FABE(config-wlan-wlan1)#proxy-arp-mode strict
        rfs7000-37FABE(config-wlan-wlan1)#
        rfs7000-37FABE(config-wlan-wlan1)#show context
        wlan wlan1
         ssid wlan1
         bridging-mode local
         encryption-type none
         authentication-type none
         802.11w sa-query timeout 110
         802.11w sa-query attempts 1
         motorola-extensions wmm-load-information
         client-load-balancing probe-req-intvl 5ghz 5
         client-load-balancing band-discovery-intvl 2
         captive-portal-enforcement fall-back
         ip dhcp trust
         acl exceed-rate wireless-client-denied-traffic 20 disassociate
         proxy-arp-mode strict
         broadcast-dhcp validate-offer
        rfs7000-37FABE(config-wlan-wlan1)#
4 - 196 WiNG CLI Reference Guide


4.1.46.2.22 radius
            wlan-mode commands
         Configures RADIUS related parameters
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         radius [dynamic-authorization|nas-identifier|nas-port-id|vlan-assignment]

         radius [dynamic-authorization|nas-identifier <NAS-ID>|
            nas-port-id <NAS-PORT-ID>|vlan-assignment]
         Parameters
         • radius [dynamic-authorization|nas-identifier <NAS-ID>|
         nas-port-id <NAS-PORT-ID>|vlan-assignment]

          dynamic-authorization         Enables support for disconnect and change of authorization messages (RFC5176)
          nas-identifier <NAS-ID>       Configures the WLAN NAS identifier sent to the RADIUS server. The NAS identifier
                                        should not exceed 256 characters.
          nas-port-id                   Configures the WLAN NAS port ID sent to the RADIUS server. The NAS port identifier
          <NAS-PORT-ID>                 should not exceed 256 characters.
          vlan-assignment               Configures the VLAN assignment of a WLAN
         Examples
         rfs7000-37FABE(config-wlan-wlan1)#radius vlan-assignment
         rfs7000-37FABE(config-wlan-wlan1)#

         rfs7000-37FABE(config-wlan-wlan1)#show context
         wlan wlan1
          ssid wlan1
          bridging-mode local
          encryption-type none
          authentication-type none
          802.11w sa-query timeout 110
          802.11w sa-query attempts 1
          radius vlan-assignment
          motorola-extensions wmm-load-information
          client-load-balancing probe-req-intvl 5ghz 5
          client-load-balancing band-discovery-intvl 2
          proxy-arp-mode strict
         rfs7000-37FABE(config-wlan-wlan1)#
GLOBAL CONFIGURATION COMMANDS 4 - 197


4.1.46.2.23 shutdown
           wlan-mode commands
        Shuts down a WLAN
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        shutdown
        Parameters
        None
        Examples
        rfs7000-37FABE(config-wlan-1)#shutdown
4 - 198 WiNG CLI Reference Guide


4.1.46.2.24 ssid
            wlan-mode commands
         Configures a WLAN’s SSID
         Supported in the following platforms:
            • AP300
             • AP621
             • AP650
             • AP6511
             • AP6521
             • AP6532
             • AP71XX
             • RFS4000
             • RFS6000
             • RFS7000
         Syntax
         ssid <SSID>
         Parameters
         • ssid <SSID>

          <SSID>                         Specify the WLAN’s SSID. The WLAN SSID is case sensitive and alphanumeric. It’s
                                         length should not exceed 32 characters.
         Examples
         rfs7000-37FABE(config-wlan-wlan1)#ssid test1
         rfs7000-37FABE(config-wlan-wlan1)#

         rfs7000-37FABE(config-wlan-wlan1)#show context
         wlan wlan1
          ssid test1
          bridging-mode local
          encryption-type none
          authentication-type none
          802.11w sa-query timeout 110
          802.11w sa-query attempts 1
          radius vlan-assignment
          motorola-extensions wmm-load-information
          client-load-balancing probe-req-intvl 5ghz 5
          client-load-balancing band-discovery-intvl 2
          proxy-arp-mode strict
         rfs7000-37FABE(config-wlan-wlan1)#
GLOBAL CONFIGURATION COMMANDS 4 - 199


4.1.46.2.25 use
            wlan-mode commands
         This command associates an existing captive portal with a WLAN.
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         use [aaa-policy|association-acl-policy|captive-portal|ip-access-list|
            mac-access-list|wlan-qos-policy]

         use [aaa-policy <AAA-POLICY-NAME>|association-acl-policy <ASSOCIATION-POLICY-
            NAME>|captive-portal <CAPTIVE-PORTAL-NAME>|wlan-qos-policy <WLAN-QOS-POLICY-
            NAME>]

         use ip-access-list [in|out] <IP-ACCESS-LIST-NAME>
         use mac-access-list [in|out] <MAC-ACCESS-LIST-NAME>
         Parameters
         • use [aaa-policy <AAA-POLICY-NAME>|association-acl-policy <ASSOCIATION-POLICY-
         NAME>|captive-portal <CAPTIVE-PORTAL-NAME>|wlan-qos-policy <WLAN-QOS-POLICY-NAME>]

          aaa-policy                     Uses a specified AAA policy with a WLAN
          <AAA-POLICY-NAME>              • <AAA-POLICY-NAME> – Specify the name of the AAA policy.
          association-acl                Uses a specified association ACL policy with a WLAN
          <ASSOCIATION-POLICY-           • <ASSOCIATION-POLICY-NAME> – Specify the name of the association ACL policy.
          NAME>
          captive-portal                 Enables a WLAN’s captive portal authentication
          <CAPTIVE-PORTAL-NAME>          • <CAPTIVE-PORTAL-NAME> – Specify the name of the captive portal.
          wlan-qos-policy                Uses a specified WLAN QoS policy with a WLAN
          <WLAN-QOS-POLICY-              • <wlan-qos-policy-name> – Specify the name of the WLAN QoS policy.
          NAME>

         • use ip-access-list [in|out] <IP-ACCESS-LIST-NAME>]

          ip-access-list [in|out] <IP-   Specifies the IP access list for incoming and outgoing packets
          ACCESS-LIST-NAME>              • in – Incoming packets
                                         • out – Outgoing packets
                                           • <IP-ACCESS-LIST-NAME> – Specify the name of the IP access list.
4 - 200 WiNG CLI Reference Guide


        • use mac-access-list [in|out] <MAC-ACCESS-LIST-NAME>

         mac-access-list [in|out]   Specifies the MAC access list for incoming and outgoing packets.
         <MAC-ACCESS-LIST-          • in – Incoming packets
         NAME>
                                    • out – Outgoing packets
                                      • <MAC-ACCESS-LIST-NAME> – Specify the name of the MAC access list.
        Examples
        rfs7000-37FABE(config-wlan-wlan1)#use ip-access-list in symbol
        rfs7000-37FABE(config-wlan-wlan1)#

        rfs7000-37FABE(config-wlan-wlan1)#show context
        wlan wlan1
         ssid test1
         bridging-mode local
         encryption-type none
         authentication-type none
         802.11w sa-query timeout 110
         802.11w sa-query attempts 1
         radius vlan-assignment
         motorola-extensions wmm-load-information
         client-load-balancing probe-req-intvl 5ghz 5
         client-load-balancing band-discovery-intvl 2
         use ip-access-list in symbol
         proxy-arp-mode strict
        rfs7000-37FABE(config-wlan-wlan1)#
GLOBAL CONFIGURATION COMMANDS 4 - 201


4.1.46.2.26 vlan
            wlan-mode commands
         Sets the VLAN where traffic from a WLAN is mapped
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         vlan <1-4094>
         Parameters
         • vlan <1-4094>

          <1-4094>                    Sets a WLAN’s VLAN ID. This command starts a new VLAN assignment for a WLAN index.
                                      All prior VLAN settings are erased.
         Examples
         rfs7000-37FABE(config-wlan-wlan1)#vlan 4
         rfs7000-37FABE(config-wlan-wlan1)#

         rfs7000-37FABE(config-wlan-wlan1)#show context
         wlan wlan1
          ssid test1
          vlan 4
          bridging-mode local
          encryption-type none
          authentication-type none
          802.11w sa-query timeout 110
          802.11w sa-query attempts 1
          radius vlan-assignment
          motorola-extensions wmm-load-information
          client-load-balancing probe-req-intvl 5ghz 5
          client-load-balancing band-discovery-intvl 2
          use ip-access-list in symbol
          proxy-arp-mode strict
         rfs7000-37FABE(config-wlan-wlan1)#
4 - 202 WiNG CLI Reference Guide


4.1.46.2.27 vlan-pool-member
           wlan-mode commands
        Adds a member VLAN to a WLAN’s VLAN pool


                          NOTE: Configuration of a VLAN pool overrides the 'vlan' configuration.


        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        vlan-pool-member <WORD> {limit [<0-8192>]}
        Parameters
        • vlan-pool-member <WORD> {limit [<0-8192>]}

         vlan-pool-member               Adds a member VLAN to a WLAN’s VLAN pool
         <WORD>                         Defines the VLAN configuration. It is either a single index, or a list of VLAN IDs (For
                                        example, 1,3,7)
         limit <0-8192>                 Optional. Is ignored if the number of clients are limited and well within the limits of the
                                        DHCP pool on the VLAN
                                        • <0-8192> – Specifies the number of users allowed
GLOBAL CONFIGURATION COMMANDS 4 - 203


Examples
rfs7000-37FABE(config-wlan-wlan1)#vlan-pool-member 1-10 limit 1
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#show context
wlan wlan1
 ssid test1
 vlan-pool-member 1 limit 1
 vlan-pool-member 2 limit 1
 vlan-pool-member 3 limit 1
 vlan-pool-member 4 limit 1
 vlan-pool-member 5 limit 1
 vlan-pool-member 6 limit 1
 vlan-pool-member 7 limit 1
 vlan-pool-member 8 limit 1
 vlan-pool-member 9 limit 1
 vlan-pool-member 10 limit 1
 bridging-mode local
 encryption-type none
 authentication-type none
 802.11w sa-query timeout 110
 802.11w sa-query attempts 1
 radius vlan-assignment
 motorola-extensions wmm-load-information
 client-load-balancing probe-req-intvl 5ghz 5
 client-load-balancing band-discovery-intvl 2
 use ip-access-list in symbol
 proxy-arp-mode strict
rfs7000-37FABE(config-wlan-wlan1)#
4 - 204 WiNG CLI Reference Guide


4.1.46.2.28 wep128
           wlan-mode commands
        Configures WEP128 parameters
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        wep128 [key|keys-from-passkey|transmit-key]

        wep128 key <1-4> [ascii|hex] [0 <WORD>|2 <WORD>|<WORD>]

        wep128 keys-from-passkey <WORD>

        wep128 transmit-key <1-4>
        Parameters
        • wep128 key <1-4> [ascii|hex] [0 <WORD>|2 <WORD>|<WORD>]

         wep128                        Configures WEP128 parameters. The parameters are: key, key-from-passkey, and
                                       transmit-key.
         key <1-4>]                    Configures pre-shared hex keys
                                       • <1-4> – Configures a maximum of four key indexes. Select the key index from
                                         1 - 4.
         ascii                         Sets keys as ASCII characters (5 characters for WEP64, 13 for WEP128)
         [0 <WORD>|                    • 0 <WORD> – Configures a clear text key
         2 <WORD>|<WORD>]
                                       • 2 <WORD> – Configures an encrypted key
                                       • <WORD> – Configures keys as 13 ASCII characters converted to hex, or 26
                                         hexadecimal characters
         hex                           Sets keys as hexadecimal characters (10 characters for WEP64, 26 for WEP128).
         [0 <WORD>|                    • 0 <WORD> – Configures a clear text key
         2 <WORD>|<WORD>]
                                       • 2 <WORD> – Configures an encrypted key
                                       • <WORD> – Configures keys as 13 ASCII characters converted to hex, or 26
                                         hexadecimal characters
GLOBAL CONFIGURATION COMMANDS 4 - 205


• wep128 keys-from-passkey <WORD>]

keys-from-passkey    Specifies a passphrase from which keys are derived
<WORD>               • <WORD> – Specify a passphrase from 4 - 32 characters.

• wep128 transmit-key <1-4>]

transmit-key <1-4>   Configures the key index used for transmission from an AP to a wireless client
                     • <1-4> – Specify a key index from 1 - 4.
Examples
rfs7000-37FABE(config-wlan-wlan1)#wep128 transmit-key 1
rfs7000-37FABE(config-wlan-wlan1)#
4 - 206 WiNG CLI Reference Guide


4.1.46.2.29 wep64
           wlan-mode commands
        Configures WEP64 parameters
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        wep64 [key|keys-from-passkey|transmit-key]

        wep64 key <1-4> [ascii|hex] [0 <WORD>|2 <WORD>|<WORD>]

        wep64 keys-from-passkey <WORD>

        wep64 transmit-key <1-4>]
        Parameters
        • wep64 key <1-4> [ascii|hex] [0 <WORD>|2 <WORD>|<WORD>]

         wep64                       Configures WEP64 parameters
                                     The parameters are: key, key-from-passkey, and transmit-key.
         key <1-4>]                  Configures pre-shared hex keys
                                     • <1-4> – Configures a maximum of four key indexes. Select a key index from 1 - 4.
         ascii                       Sets keys as ASCII characters (5 characters for WEP64, 13 for WEP128)
         [0 <WORD>|                  • 0 <WORD> – Configures a clear text key
         2 <WORD>|<WORD>]
                                     • 2 <WORD> – Configures an encrypted key
                                     • <WORD> – Configures key (10 hex or 5 ASCII characters for WEP64, 26 hex or 13 ASCII
                                       characters for WEP128).
         hex                         Sets keys as hexadecimal characters (10 characters for WEP64, 26 for WEP128).
         [0 <WORD>|                  • 0 <WORD> – Configures a clear text key
         2 <WORD>|<WORD>]
                                     • 2 <WORD> – Configures an encrypted key
                                     • <WORD> – Configures the key (10 hex or 5 ASCII characters for WEP64, 26 hex or 13
                                       ASCII characters for WEP128)

        • wep64 keys-from-passkey <WORD>]

         keys-from-passkey           Specifies a passphrase from which keys are derived
         <WORD>                      • <WORD> – Specify a passphrase from 4 - 32 characters.
GLOBAL CONFIGURATION COMMANDS 4 - 207


• wep64 transmit-key <1-4>]

transmit-key <1-4>   Configures the key index used for transmission from an AP to a wireless client
                     • <1-4> – Specify a key index from 1 - 4.
Examples
rfs7000-37FABE(config-wlan-wlan1)#wep64 key 1 ascii symbo
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#wep64 transmit-key 1
rfs7000-37FABE(config-wlan-wlan1)#
4 - 208 WiNG CLI Reference Guide


4.1.46.2.30 wireless-client
            wlan-mode commands
         Configures the transmit power indicated to clients
         Supported in the following platforms:
            • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
         Syntax
         wireless-client [cred-cache-ageout|hold-time |inactivity-timeout|
            max-firewall-sessions|reauthentication|tx-power|vlan-cache-out]

         wireless-client [cred-cache-ageout <60-86400>|hold-time <1-300>|
            inactivity-timeout <60-86400>|max-firewall-sessions <10-10000>|
            reauthentication <30-86400>|tx-power <0-20>|vlan-cache-out <60-86400>]
         Parameters
         • wireless-client [cred-cache-ageout <60-86400>|hold-time <1-300>|
         inactivity-timeout <60-86400>|max-firewall-sessions <10-10000>|
         reauthentication <30-86400>|tx-power <0-20>|vlan-cache-out <60-86400>]

          wireless-client               Configures the transmit power indicated to wireless clients for transmission
          cred-cache-ageout             Configures the timeout period for which client credentials (For example, encryption keys)
          <60-86400>                    are cached across associations
                                        • <60-86400> – Specify a value from 60 - 86400 seconds.
          hold-time <1-300>             Configures the time period for which wireless client state information is cached post
                                        roaming
                                        • <1-300> – Specify a value from 1 - 300 seconds.
          inactivity-timeout            Configures an inactivity timeout period in seconds. If a frame is not received from a
          <60-86400>                    wireless client for this period of time, the client is disassociated.
                                        • <60-86400> – Specify a value from 60 - 86400 seconds.
          max-firewall-sessions         Configures the maximum firewall sessions allowed per client on a WLAN
          <10-10000>                    • <10-10000> – Specify the maximum number of firewall sessions allowed from
                                          10 - 10000.
          reauthentication              Configures periodic reauthentication of associated clients
          <30-86400>                    • <30-86400> – Specify the client reauthentication interval from 30 - 86400 seconds.
GLOBAL CONFIGURATION COMMANDS 4 - 209



tx-power <0-20>      Configures the transmit power indicated to clients
                     • <0-20> – Specify a value from 0 - 20 dBm.
vlan-cache-ageout    Configures the timeout period for which client VLAN information is cached across
<60-86400>           associations.
                     • <60-86400> – Specify a value from 60 - 86400 seconds.
Examples
rfs7000-37FABE(config-wlan-wlan1)#wireless-client cred-cache-ageout 65
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#wireless-client hold-time 10
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#wireless-client max-firewall-sessions 100
rfs7000-37FABE(config-wlan-wlan1)#
rfs7000-37FABE(config-wlan-wlan1)#wireless-client reauthentication 35
rfs7000-37FABE(config-wlan-wlan1)#
rfs7000-37FABE(config-wlan-wlan1)#wireless-client tx-power 12
rfs7000-37FABE(config-wlan-wlan1)#

rfs7000-37FABE(config-wlan-wlan1)#show context
wlan wlan1
 ssid wlan1
 bridging-mode tunnel
 encryption-type none
 authentication-type none
 wireless-client hold-time 10
 wireless-client cred-cache-ageout 65
 wireless-client max-firewall-sessions 100
 wireless-client reauthentication 35
 wep64 key 1 hex 0 73796d626f
 wireless-client tx-power 12
rfs7000-37FABE(config-wlan-wlan1)#
4 - 210 WiNG CLI Reference Guide


4.1.46.2.31 wpa-wpa2
          wlan-mode commands
        Modifies TKIP-CCMP (WPA/WPA2) related parameters
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        wpa-wpa2 [exclude-wpa2-tkip|handshake|key-rotation|opp-pmk-caching|
           pmk-caching|preauthentication|psk|tkip-countermeasures|use-sha256-akm]

        wpa-wpa2 [exclude-wpa2-tkip|opp-pmk-caching|pmk-caching|preauthentication|
           use-sha256-akm]

        wpa-wpa2 handshake [attempts|init-wait|priority|timeout]

        wpa-wpa2 handshake [attempts <1-5>|init-wait <5-1000000>|priority [high|normal]|
           timeout <10-5000>]

        wpa-wpa2 key-rotation [broadcast|unicast] <30-86400>]

        wpa-wpa2 psk [0 <LINE>|2 <LINE>|<LINE>]

        wpa-wpa2 tkip-countermeasures holdtime <0-65535>
        Parameters
        • wpa-wpa2 [exclude-wpa2-tkip|opp-pmk-caching|pmk-caching|preauthentication|
        use-sha256-akm]

         wpa-wpa2                   Modifies TKIP-CCMP (WPA/WPA2) related parameters
         exclude-wpa2-tkip          Excludes the Wi-Fi Protected Access II (WPA2) version of TKIP. It supports the WPA version
                                    of TKIP only.
         opp-pmk-caching            Uses opportunistic key caching (same Pairwise Master Key (PMK) across APs for fast
                                    roaming with EAP.802.1x).
         pmk-caching                Uses cached pair-wise master keys (fast roaming with eap/802.1x)
         preauthentication          Uses pre-authentication mode (WPA2 fast roaming)
         use-sha256-akm             Uses sha256 authentication key management suite
GLOBAL CONFIGURATION COMMANDS 4 - 211


• wpa-wpa2 handshake [attempts <1-5>|init-wait <5-1000000>|
priority [high|normal]|timeout <10-5000>]

wpa-wpa2                 Modifies TKIP-CCMP (WPA/WPA2) related parameters
handshake                Configures WPA/WPA2 handshake parameters
attempts <1-5>           Configures the total number of times a message is transmitted towards a non-responsive
                         client
                         • <1-5> – Specify a value from 1 - 5.
init-wait <5-1000000>    Configures a minimum wait-time period before the first handshake message is transmitted
                         from the AP
                         • <5-1000000> – Specify a value from 5 - 1000000 microseconds.
priority [high|normal]   Configures the relative priority of handshake messages compared to other data traffic
                         • high – Treats handshake messages as high priority packets on a radio
                         • normal – Treats handshake messages as normal priority packets on a radio
timeout <10-5000>        Configures the timeout period for a handshake message to retire. Once this timeout period
                         is over, the handshake message is retired.
                         • <10-5000> – Specify a value from 10 - 5000 milliseconds.

• wpa-wpa2 key-rotation [broadcast|unicast] <30-86400>

wpa-wpa2                 Modifies TKIP-CCMP (WPA/WPA2) related parameters
key-rotation             Configures parameters related to periodic rotation of encryption keys. The parameters are
                         periodic rotation of keys for broadcast, multicast, and unicast traffic.
broadcast <30-86400>     Configures the periodic rotation of keys used for broadcast and multicast traffic. This
                         parameter specifies the interval at which keys are rotated
                         • <30-86400> – Specify a value from 30 - 86400 seconds.
unicast <30-86400>       Configures a periodic interval for the rotation of keys, used for unicast traffic
                         • <30-86400> – Specify a value from 30 - 86400 seconds.

• wpa-wpa2 psk [0 <LINE>|2 <LINE>|<LINE>]

wpa-wpa2                 Modifies TKIP-CCMP (WPA/WPA2) related parameters
psk                      Configures a pre-shared key. The key options are: 0, 2, and LINE
0 <LINE>                 Configures a clear text key
2 <LINE>                 Configures an encrypted key
<LINE>                   Enter the pre-shared key either as a passphrase not exceeding 8 - 63 characters, or as a 64
                         character (256bit) hexadecimal value

• wpa-wpa2 tkip-countermeasures holdtime <0-65535>]

wpa-wpa2                 Modifies TKIP-CCMP (WPA/WPA2) parameters
4 - 212 WiNG CLI Reference Guide



         tkip-countermeasures   Configures a hold time period for implementation of TKIP counter measures
         holdtime <0-65535>     Configures the amount of time a WLAN is disabled when TKIP counter measures are
                                invoked
                                • <0-65535> – Specify a value from 0 - 65536 seconds.
        Examples
        rfs7000-37FABE(config-wlan-wlan1)#wpa-wpa2 tkip-countermeasures hold-time 2
        rfs7000-37FABE(config-wlan-wlan1)#

        rfs7000-37FABE(config-wlan-wlan1)#show context
        wlan wlan1
         ssid wlan1
         bridging-mode tunnel
         encryption-type none
         authentication-type none
         wireless-client hold-time 10
         wireless-client cred-cache-ageout 65
         wireless-client max-firewall-sessions 100
         wireless-client reauthentication 35
         wpa-wpa2 tkip-countermeasures hold-time 2
         wep64 key 1 hex 0 73796d626f
         wireless-client tx-power 12
        rfs7000-37FABE(config-wlan-wlan1)#
GLOBAL CONFIGURATION COMMANDS 4 - 213


4.1.47 wlan-qos-policy
        Global Configuration Commands
      Configures a WLAN QoS policy
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      wlan-qos-policy <WLAN-QOS-POLICY-NAME>
      Parameters
      • wlan-qos-policy <WLAN-QOS-POLICY-NAME>

       <WLAN-QOS-POLICY-                Specify the WLAN QoS policy name. If the policy does not exist, it is created.
       NAME>
      Examples

      rfs7000-37FABE(config)#wlan-qos-policy test
      rfs7000-37FABE(config-wlan-qos-test)#



                      NOTE: For more information on WLAN QoS policy commands, see Chapter 23, WLAN-
                      QOS-POLICY.
4 - 214 WiNG CLI Reference Guide
CHAPTER 5 COMMON COMMANDS

  This chapter describes the CLI commands used in the USER EXEC, PRIV EXEC, and GLOBAL CONFIG modes.
  The PRIV EXEC command set contains commands available within the USER EXEC mode. Some commands can be entered
  in either mode. Commands entered in either the USER EXEC or PRIV EXEC mode are referred to as EXEC mode commands.
  If a user or privilege is not specified, the referenced command can be entered in either mode.
5-2   WiNG CLI Reference Guide



  5.1 Common Commands
       Table 5.1 summarizes common commands
                                                Table 5.1 Common Commands in Controller

             Command                                     Description                                Reference
        clrscr           Clears the display screen                                                page 5-3
        commit           Commits (saves) changes made in the current session                      page 5-4
        end              Ends and exits the current mode and moves to the PRIV EXEC mode          page 5-5
        exit             Ends the current mode and moves to the previous mode                     page 5-6
        help             Displays the interactive help system                                     page 5-7
        no               Negates a command or reverts values to their default settings            page 5-11
        revert           Reverts changes to their last saved configuration                        page 5-13
        service          Invokes service commands to troubleshoot or debug (config-if) instance   page 5-14
                         configurations.
        show             Displays running system information                                      page 5-40
        write            Writes the system’s running configuration to memory or terminal          page 5-42
COMMON COMMANDS   5-3


5.1.1 clrscr
        Common Commands
     Clears the screen and refreshes the prompt, irrespective of the mode you are in
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     clrscr
     Parameters
     None
     Examples
     The terminal window or screen before the clrscr command is executed:
     rfs7000-37FABE#ap-upgrade ?
       DEVICE-NAME     Name/MAC address of AP
       all             Upgrade all access points
       AP621           Upgrade an AP621 device
       AP650           Upgrade an AP650 device
       AP6511          Upgrade an AP6511 device
       AP6521          Upgrade an AP6521 device
       AP6532          Upgrade an AP6532 device
       AP71XX          Upgrade an AP71XX device
       cancel-upgrade Cancel upgrading the AP
       load-image      Load the AP images to controller for ap-upgrades
       rf-domain       Upgrade all access points belonging to an RF Domain

     rfs7000-37FABE#clrscr

     The terminal window or screen after the clrscr command is executed:
     rfs7000-37FABE#
5-4   WiNG CLI Reference Guide


 5.1.2 commit
         Common Commands
       Commits all changes made in the active session. Use the commit command to save and invoke settings entered during the
       current transaction.
       Supported in the following platforms:
          • AP300
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP71XX
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       commit {write}{memory}
       Parameters
       • commit {write}{memory}

        write                           Optional. If a commit succeeds, the configuration is written to memory
        memory                          Optional. Writes to memory
       Examples
       rfs7000-37FABE#commit write memory
       [OK]
       rfs7000-37FABE#
COMMON COMMANDS                  5-5


5.1.3 end
       Common Commands in Controller
     Ends and exits the current mode and moves to the PRIV EXEC mode. The prompt changes to rfs7000-37FABE#.
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     end
     Parameters
     None
     Examples
     rfs7000-37FABE(config)#end
     rfs7000-37FABE#
5-6   WiNG CLI Reference Guide


 5.1.4 exit
          Common Commands
       The exit command works differently in its three supported modes. In the Global Config mode, it ends the current mode and
       moves to the previous mode, which is the Priv Exec mode. The prompt changes from (config)# to #. When used in the
       Priv Exec and User Exec modes, the exit command ends the current session and connection to the terminal device.
       Supported in the following platforms:
          • AP300
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP71XX
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       exit
       Parameters
       None
       Examples
       rfs7000-37FABE(config)#exit
       rfs7000-37FABE#
COMMON COMMANDS              5-7


5.1.5 help
        Common Commands
     Describes the interactive help system
     Use this command to access the advanced help feature. Use “?” anytime at the command prompt to access the help topic
     Two kinds of help are provided:
      • Full help is available when ready to enter a command argument
      • Partial help is provided when an abbreviated argument is entered and you want to know what arguments match the
        input (for example 'show ve?').
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     help {search|show}
     help {show [configuration-tree]}

     help {search [<WORD>] {detailed|only-show|skip-no|skip-show}}




                    NOTE: The show configuration-tree option is not available in the Global Config mode.



     Parameters
     • help {show [configuration-tree]}

      show configuration-tree          Optional. Displays the running system information
                                       • configuration-tree – Displays relationship amongst configuration objects
5-8   WiNG CLI Reference Guide


       • help {search [<WORD>] {detailed|only-show|skip-no|skip-show}}

        search <WORD>             Optional. Searches for CLI commands related to a specific target term
                                  • <WORD> – Specify a target term (for example, a feature, or configuration parameter).
                                    After specifying the term, select one of the following options: detailed, only-show,
                                    skip-no, or skip-show. The system displays information based on the option selected.
        detailed                  Optional. Searches and displays help strings in addition to mode and commands
        only-show                 Optional. Displays only “show” commands. Does not display configuration commands
        skip-no                   Optional. Displays only configuration commands. Does not display “no” commands
        skip-show                 Optional. Displays only configuration commands. Does not display “show” commands
       Examples
       rfs7000-37FABE>help search crypto detailed
       Found 29 references for “crypto”
             Found 113 references for “crypto”

       Mode    : User Exec
       Command : show crypto key rsa (|public-key-detail) (|(on DEVICE-NAME))
                   Show running system information
                    Encryption related commands
                     Key management operations
                      Show RSA public Keys
                       Show the public key in PEM format
                        On AP/Controller
                         AP / Controller name
                    : show crypto pki trustpoints (WORD|all|)(|(on DEVICE-NAME))
                              Show running system information
                              Encryption related commands
                              Public Key Infrastructure related commands
                              Display the configured trustpoints
                              Display a particular trustpoint's details
                              Display details for all trustpoints
                              On AP/Controller
                               AP / Controller name

                    : show crypto isakmp sa (|(on DEVICE-NAME))
                               Show running system information
                               Encryption Module
                               Show ISAKMP related statistics
                               Show all ISAKMP Security Associations
                               On AP/Controller
                               AP / Controller name

                    : show crypto ipsec sa (|(on DEVICE-NAME))
                               Show running system information
                               Encryption Module
                               Show IPSec related statistics
                               IPSec security association
                               On AP/Controller
                               AP / Controller name

               : crypto key generate rsa WORD <1024-2048> (|(on DEVICE-NAME))
                          Encryption related commands
                          Key management operations
                          Generate a keypair
                          Generate a RSA keypair
                          Keypair name
       ....................................................................................
       ................................................................rfs7000-37FABE>

       rfs7000-37FABE>help show configuration-tree
COMMON COMMANDS          5-9



 ## ACCESS-POINT / SWITCH ## ---+
                                |
                                +--> [[ RF-DOMAIN ]]
                                |
                                +--> [[ PROFILE ]]
                                |
                            +--> Device specific parameters (license, serial number,
hostname)
                                |
                               +--> Configuration Overrides of rf-domain and profile
 ## RF-DOMAIN ## ---+
                    |
                    +--> RF parameters, WIPS server parameters
                    |
                    +--> [[ SMART-RF-POLICY ]]
                    |
                    +--> [[ WIPS POLICY ]]

 ## PROFILE ## ---+
                  |
                  +-->   Physical interface (interface GE,ME,UP etc)
                  |                           |
                  |                           +--> [[ RATE-LIMIT-TRUST-POLICY ]]
                  |
                  +-->   Vlan interface (interface VLAN1/VLAN36 etc)
                  |
                  +-->   Radio interface (interface RADIO1, RADIO2 etc)
                  |                             |
                  |                             +--> Radio specific Configuration
                  |                             |
                  |                             +--> [[ RADIO-QOS-POLICY ]]
                  |                             |
                  |                             +--> [[ ASSOC-ACL-POLICY ]]
                  |                             |
                  |                             +--> [[ WLAN ]]
                  |
                  +-->   [[ MANAGEMENT-POLICY ]]
                  |
                  +-->   [[ DHCP-SERVER-POLICY ]]
                  |
                  +-->   [[ FIREWALL-POLICY ]]
                  |
                  +-->   [[ NAT-POLICY ]]
                  |
                  +-->   [[ VPN-POLICY ]]
                  |
                  +-->   [[ ADVANCED-WIPS-POLICY ]]
                  |
                  +-->   [[ CAPTIVE-PORTAL ]]
                  |
                  +-->   [[ ROLE-POLICY ]]
                  |
                  +-->   [[ RADIUS-SERVER-POLICY ]]
                  |
                  +-->   [[ ADOPTION-POLICY ]]

 ## MESHPOINT ## ---+
                    |
                    +--> [[ MESHPOINT-QOS-POLICY ]]
....................................................................................
................................................................rfs7000-37FABE>

rfs7000-37FABE>help search clrscr only-show
found no commands containing "clrscr"
rfs7000-37FABE>


rfs7000-37FABE>help search service skip-show
5 - 10 WiNG CLI Reference Guide


        Found 32 references for "service"

        Mode    : User Exec
        Command : service show cli
                : service show rim config (|include-factory)
                : service show wireless credential-cache
                : service show wireless neighbors
                : service show general stats(|(on DEVICE-OR-DOMAIN-NAME))
                : service show process(|(on DEVICE-OR-DOMAIN-NAME))
                : service show mem(|(on DEVICE-OR-DOMAIN-NAME))
                : service show top(|(on DEVICE-OR-DOMAIN-NAME))
                : service show crash-info (|(on DEVICE-OR-DOMAIN-NAME))
                : service cli-tables-skin
        (none|minimal|thin|thick|stars|hashes|percent|ansi|utf-8) (grid|)
                : service cli-tables-expand (|left|right)
                : service wireless clear unauthorized aps (|(on DEVICE-OR-DOMAIN-NAME))
                : service wireless qos delete-tspec AA-BB-CC-DD-EE-FF tid <0-7>
                : service wireless wips clear-event-history
                : service wireless wips clear-mu-blacklist (all|(mac AA-BB-CC-DD-EE-FF))
                : service radio <1-3> dfs simulate-radar (primary|extension)
                : service smart-rf run-calibration
                : service smart-rf stop-calibration
                : service cluster manual-revert
                : service advanced-wips clear-event-history
                : service advanced-wips clear-event-history (dos-eap-failure-spoof|id-theft-
        out-of-sequence|id-theft-eapol-success-spoof-detected|wlan-jack-attack-
        detected|essid-jack-attack-detected|monkey-jack-attack-detected|null-probe-response-
        detected|fata-jack-detected|fake-dhcp-server-detected|crackable-wep-iv-used|windows-
        zero-config-memory-leak|multicast-all-systems-on-subnet|multicast-all-routers-on-
        subnet|multicast-ospf-all-routers-detection|multicast-ospf-designated-routers-
        detection|multicast-rip2-routers-detection|multicast-igmp-routers-
        detection|multicast-vrrp-agent|multicast-hsrp-agent|multicast-dhcp-server-relay-
        agent|multicast-igmp-detection|netbios-detection|stp-detection|ipx-
        detection|invalid-management-frame|invalid-channel-advertized|dos-deauthentication-
        detection|dos-disassociation-detection|dos-rts-flood|rogue-ap-detection|accidental-
        association|probe-response-flood|dos-cts-flood|dos-eapol-logoff-storm|unauthorized-
        bridge)
                : service start-shell
                : service pktcap on(bridge|drop|deny|router|wireless|vpn|radio (all|<1-3>)
        (|promiscuous)|rim|interface `WORD|ge <1-4>|me1|pc <1-4>|vlan <1-4094>')(|{direction
        (any|inbound|outbound)|acl-name WORD|verbose|hex|count <1-1000000>|snap <1-
        2048>|write (FILE|URL|tzsp WORD)|tcpdump})(|filter LINE)

        Mode    : Profile Mode
        Command : service watchdog

        Mode    : Radio Mode
        Command : service antenna-type (default|dual-
        band|omni|yagi|embedded|panel|patch|sector|out-omni|in-patch|AP650-int)
                : service disable-erp
                : service disable-ht-protection
                : service recalibration-interval <0-65535>
        ....................................................................................
        rfs7000-37FABE>

        rfs7000-37FABE>help search mint only-show
        Found 8 references for "mint"

        Mode    : User Exec
        Command : show mint   neighbors (|details)(|(on DEVICE-NAME))
                : show mint   links (|details)(|(on DEVICE-NAME))
                : show mint   id(|(on DEVICE-NAME))
                : show mint   stats(|(on DEVICE-NAME))
                : show mint   route(|(on DEVICE-NAME))
                : show mint   lsp
                : show mint   lsp-db (|details)(|(on DEVICE-NAME))
                : show mint   mlcp(|(on DEVICE-NAME))
        rfs7000-37FABE>
COMMON COMMANDS 5 - 11


5.1.6 no
       Common Commands
     Negates a command or sets its default. Though the no command is common to the User Exec, Priv Exec, and Global Config
     modes, it negates a different set of commands in each mode.
     Supported in the following platforms:
        • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
     Syntax
     no <PARAMETER>
     Parameters
     None
     Usage Guidelines
     The no command negates any command associated with it. Wherever required, use the same parameters associated with
     the command getting negated.
     Examples
     Global Config mode: No command options
      rfs7000-37FABE(config)#no ?
       aaa-policy                 Delete a aaa policy
       advanced-wips-policy       Delete an advanced-wips policy
       AP300                      Delete an AP300
       AP621                      Delete an AP621 access point
       AP650                      Delete an AP650 access point
       AP6511                     Delete an AP6511 access point
       AP6521                     Delete an AP6521 access point
       AP6532                     Delete an AP6532 access point
       AP71XX                     Delete an AP71XX access point
       association-acl-policy     Delete an association-acl policy
       auto-provisioning-policy Delete an auto-provisioning policy
       captive-portal             Delete a captive portal
       critical-resource-policy Remove device onboard critical resource policy
       customize                  Restore the custom cli commands to default
       device                     Delete multiple devices
       device-categorization      Delete device categorization object
       dhcp-server-policy         DHCP server policy
       dns-whitelist              Delete a whitelist object
       event-system-policy        Delete a event system policy
       firewall-policy            Configure firewall policy
       igmp-snoop-policy          Remove device onboard igmp snoop policy
       ip                         Internet Protocol (IP)
       mac                        MAC configuration
       management-policy          Delete a management policy
       nac-list                   Delete an network access control list
       password-encryption        Disable password encryption in configuration
       profile                    Delete a profile and all its associated
5 - 12 WiNG CLI Reference Guide


                                        configuration
          radio-qos-policy              Delete a radio QoS configuration policy
          radius-group                  Local radius server group configuration
          radius-server-policy          Remove device onboard radius policy
          radius-user-pool-policy       Configure Radius User Pool
          rf-domain                     Delete one or more RF-domains and all their
                                        associated configurations
          RFS4000                       Delete an RFS4000 wireless controller
          RFS6000                       Delete an RFS6000 wireless controller
          RFS7000                       Delete an RFS7000 wireless controller
          role-policy                   Role based firewall policy
          smart-rf-policy               Delete a smart-rf-policy
          wips-policy                   Delete a wips policy
          wlan                          Delete a wlan object
          wlan-qos-policy               Delete a wireless lan QoS configuration policy
          service                       Service Commands
        rfs7000-37FABE(config)#
        Priv Exec mode: No command options
        rfs7000-37FABE#no ?
          adoption        Reset adoption state of the device (& all devices adopted to
                          it)
          captive-portal Captive portal commands
          crypto          Encryption related commands
          debug           Debugging functions
          logging         Modify message logging facilities
          page            Toggle paging
          service         Service Commands
          terminal        Set terminal line parameters
          upgrade         Remove a patch
          wireless        Wireless Configuration/Statistics commands
        rfs7000-37FABE#

        user Exec mode: No command options
        rfs7000-37FABE>no ?
          adoption        Reset adoption state of the device (& all devices adopted to
                          it)
          captive-portal Captive portal commands
          crypto          Encryption related commands
          debug           Debugging functions
          logging         Modify message logging facilities
          page            Toggle paging
          service         Service Commands
          terminal        Set terminal line parameters
          wireless        Wireless Configuration/Statistics commands
        rfs7000-37FABE>
        Related Commands

         no                       User Exec Commands mode
         no                       Priv Exec Commands mode
         no                       Global Config Commands mode
COMMON COMMANDS 5 - 13


5.1.7 revert
        Common Commands
     Reverts changes made to their last saved configuration
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     revert
     Parameters
     None
     Examples
     rfs7000-37FABE>revert
     rfs7000-37FABE>
5 - 14 WiNG CLI Reference Guide


  5.1.8 service
           Common Commands
        Service commands are used to view and manage wireless controller configurations in all modes. The service commands
        and their corresponding parameters vary from mode to mode. The User Exec Mode and Priv Exec Mode commands provide
        same functionalities with a few minor changes. The Global Config service command sets the size of history files. It also
        enables viewing of CLI tree of the current mode.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax (User Exec Mode)
        service [advanced-wips|ap300|clear|cli-tables-expand|cli-tables-skin|cluster
           force-send-config|locator|noc|pktcap|radio|radius|set|show|smart-rf|wireless]

        service advanced-wips [clear-event-history|terminate-device <MAC>]
        service advanced-wips clear-event-history {accidental-association|
           crackable-wep-iv-used|dos-cts-flood|dos-deauthentication-detection|
           dos-disassociation-detection|dos-eap-failure-spoof|dos-eapol-logoff-storm|
           dos-rts-flood|essid-jack-attack-detected|fake-dhcp-server-detected|
           fata-jack-detected|id-theft-eapol-success-spoof-detected|
           id-theft-out-of-sequence|invalid-channel-advertized|invalid-management-frame|
           ipx-detection|monkey-jack-attack-detected|multicast-all-routers-on-subnet|
           multicast-all-systems-on-subnet|multicast-dhcp-server-relay-agent|
           multicast-hsrp-agent|multicast-igmp-detection|multicast-igrp-routers-detection|
           multicast-ospf-all-routers-detection|multicast-ospf-designated-routers-detection|
           multicast-rip2-routers-detection|multicast-vrrp-agent|netbios-detection|
           null-probe-response-detected|probe-response-flood|rogue-ap-detection|
           stp-detection|unauthorized-bridge|windows-zero-config-memory-leak|
           wlan-jack-attack-detected}

        service ap300 [dns-name|dot1x|locator|reload]
        service ap300 dot1x username <USERNAME> password <PASSWORD>
           on [all|ap-mac <MAC>]
        service ap300 dns-name <DNS> on [all|ap-mac <MAC>]
        service ap300 [locator|reload] <MAC>
        service clear [ap-upgrade|command-history|noc|reboot-history|unsanctioned|
           upgrade-history|wireless]
        service clear ap-ugrade history {on <DOMAIN-NAME>}
        service clear [command-history|reboot-history|upgrade-history]{on <DEVICE-NAME>}
        service clear noc statistics
        service clear unsanctioned aps {on <DEVICE-OR-DOMAIN-NAME>}]
        service clear wireless [ap|client|radio|wlan]
        service clear wireless [ap|client] statistics {<MAC> {(on <DEVICE-OR-DOMAIN-NAME>)}
        service clear wireless radio statistics {<MAC/HOSTNAME> <1-3> {(on <DEVICE-OR-DOMAIN-
           NAME>)}
        service clear wireless wlan statistics {<WLAN> {(on <DEVICE-OR-DOMAIN-NAME)}

        service cli-tables-expand {left|right}
COMMON COMMANDS 5 - 15



service cli-tables-skin [ansi|hashes|minimal|none|percent|stars|thick|thin|
   utf-8] {grid}

service cluster force [active|configured-state|standby]

service force-send-config {on <DEVICE-OR-DOMAIN-NAME>}

service locator {on <DEVICE-NAME>}

service noc parallel-updates <1-1024>
service pktcap on [bridge|deny|drop|ext-vlan|interface|radio|rim|router|
   vpn|wireless]
service pktcap on [bridge|deny|drop|ext-vlan|rim|router|vpn|wireless]
   {(acl-name <ACL>,count <1-1000000>,direction [any|inbound|outbound],
   filter <LINE>,hex,rate <1-100>,snap <1-2048>,tcpdump|verbose,
   write [file|url|tzsp [<IP/TZSP HOSTNAME>]])}
service pktcap on interface [<INTERFACE>|ge <1-4>|me1|port-channel <1-2>|
   vlan <1-4094>] {(acl-name <ACL>,count <1-1000000>,
   direction [any|inbound|outbound],filter <LINE>,hex,rate <1-100>,
   snap <1-2048>,tcpdump|verbose,write [file|url|tzsp [<IP/TZSP HOSTNAME>]])}
service pktcap on radio [<1-3>|all] {(acl-name <ACL>,count <1-1000000>,
   direction [any|inbound|outbound],filter <LINE>,hex,rate <1-100>,
   snap <1-2048>,tcpdump|verbose,write [file|url|tzsp [<IP/TZSP HOSTNAME>]])}

service radio <1-3> dfs simulator-radar [extension|primary]

service radius test   [<IP>|<HOSTNAME>] [<WORD>|<PORT>]
service radius test   [<IP>|<HOSTNAME>] <WORD> <USERNAME> <PASSWORD> {wlan <WLAN>
   ssid <SSID> {(on   <DEVICE-NAME>)}}
service radius test   [<IP>|<HOSTNAME>] <PORT> <1024-65535> <WORD> <USERNAME>
   <PASSWORD> {wlan   <WLAN> ssid <SSID> {(on <DEVICE-NAME>)}

service set validation-mode [full|partial] {on <DEVICE-NAME>}

service show [advanced-wips|captive-portal|cli|command-history|
   configuration-revision|crash-info|dhcp-lease|diag|info|mac-vendor|mem|
   mint|noc|pm|process|reboot-history|rf-domain-manager|snmp|startup-log|sysinfo|
   top|upgrade-history|watch-dog|wireless|xpath-history]

service show advanced-wips stats [ap-table|client-table|connected-sensors-status|
   termination-entries]
service show captive-portal [servers|user-cache] {on <DEVICE-NAME>}
service show [cli|configuration-revision|mac-vendor <OUI/MAC>|noc diag|
   snmp session|xpath-history|
service show [command-history|crash-info|info|mem|process|reboot-history|
   startup-log|sysinfo|top|upgrade-history|watchdog] {on <DEVICE-NAME>}

service show dhcp-lease {<INTERFACE>|on|vlan <1-4094>} {(on <DEVICE-NAME>)}

service show diag [led-status|stats] {on <DEVICE-NAME>}

service show mint adopted-devices {on <DEVICE_NAME>}

service show pm {history {(on <DEVICE-NAME>)}}

service show rf-domain-manager diag {<MAC/HOSTNAME> {(on <DEVICE-OR-DOMAIN-
   NAME>)}

service show wireless [aaa-stats|ap300|client|config-internal|credential-cache|
   dns-cache|neighbors|stats-client|vlan-usage|meshpoint]]
service show wireless [aaa-stats|credential-cache|dns-cache] {on <DEVICE-NAME>}
service show wireless [ap300 <MAC>|neighbors|vlan-usage]
service show wireless client proc [info|stats] {<MAC> {{on <DEVICE-OR-DOMAIN-
   NAME>)}}
service show wireless config-internal {include-factory}]
service show wireless stats-client diag {<MAC/HOSTNAME> {(on <DEVICE-OR-
   DOMAIN-NAME>)}}
5 - 16 WiNG CLI Reference Guide


        service show wireless meshpoint neighbor proc [info|stats] {<MAC>|on <DEVICE-OR-
           DOMAIN-NAME>}

        service smart-rf [clear-config|clear-history|interactive-calibration|
           interactive-calibration-result|run-calibration|save-config|stop-calibration]
        service smart-rf [clear-config|clear-history|interactive-calibration|
           run-calibration|save-config|stop-calibration]{on <DOMAIN-NAME>}
        service smart-rf interactive-calibration-result [discard|replace-current-config|
           write-to-configuration]{on <DOMAIN-NAME>}

        service wireless [client|dump-core-snapshot|qos|wips]
        service wireless client beacon-request <MAC> mode [active|passive|table]
           ssid [<SSID>|any] channel-report [<CHANNEL-LIST>|none]
           {on <DEVICE-NAME>}
        service wireless qos delete-tspec <MAC> tid <0-7>
        service wireless wips [clear-client-blacklist|clear-event-history]
        service wireless wips clear-client-blacklist [all|mac <MAC>
        service wireless wips clear-event-history {on <DEVICE-OR-DOMAIN-NAME>}
        Parameters (User Exec Mode)
        • service advanced-wips clear-event-history {accidental-association|
        crackable-wep-iv-used|dos-cts-flood|dos-deauthentication-detection|
        dos-disassociation-detection|dos-eap-failure-spoof|dos-eapol-logoff-storm|
        dos-rts-flood|essid-jack-attack-detected|fake-dhcp-server-detected|
        fata-jack-detected|id-theft-eapol-success-spoof-detected|
        id-theft-out-of-sequence|invalid-channel-advertized|invalid-management-frame|
        ipx-detection|monkey-jack-attack-detected|multicast-all-routers-on-subnet|
        multicast-all-systems-on-subnet|multicast-dhcp-server-relay-agent|
        multicast-hsrp-agent|multicast-igmp-detection|multicast-igrp-routers-detection|
        multicast-ospf-all-routers-detection|multicast-ospf-designated-routers-detection|
        multicast-rip2-routers-detection|multicast-vrrp-agent|netbios-detection|
        null-probe-response-detected|probe-response-flood|rogue-ap-detection|
        stp-detection|unathorized-bridge|windows-zero-config-memory-leak|
        wlan-jack-attack-detected}

         advanced-wips clear-event-    The advanced Wireless Intrusion Prevention System (WIPS) service command clears
         history                       event history and terminates a device.
                                       • clear-event-history – Clears event history based on the parameters passed
         accidental-association        Optional. Clears accidental wireless client association event history
         crackable-wep-iv-used         Optional. Clears crackable Wired Equivalent Privacy (WEP) IV used event history
         dos-cts-flood                 Optional. Clears DoS Clear-To-Send (CTS) flood event history
         dos-deauthentication-         Optional. Clears DoS de-authentication detection event history
         detection
         dos-disassociation-detection Optional. Clears DoS disassociation detection event history
         dos-eap-failure-spoof         Optional. Clears DoS Extensible Authentication Protocol (EAP) failure spoof detection
                                       event history
         dos-eapol-logoff-storm        Optional. Clears DoS Extensible Authentication Protocol over LAN (EAPoL) logoff storm
                                       detection event history
         dos-rts-flood                 Optional. Clears DoS request-to-send (RTS) flood detection event history
         essid-jack-attack-detected    Optional. Clears Extended Service Set ID (ESSID) jack attacks detection event history
         fake-dhcp-server-detected     Optional. Clears fake DHCP server detection event history
         fata-jack-detected            Optional. Clears fata-jack attacks detection event history
COMMON COMMANDS 5 - 17



id-theft-eapol-success-        Optional. Clears IDs theft - EAPOL success spoof detection event history
spoof-detected
id-theft-out-of-sequence       Optional. Clears IDs theft-out-of-sequence detection event history
invalid-channel-advertized     Optional. Clears invalid channel advertizement detection event history
invalid-management-frame       Optional. Clears invalid management frames detection event history
ipx-detection                  Optional. Clears automatic IPX interface detection event history
monkey-jack-attack-            Optional. Detects monkey-jack attacks detection event history
detected
multicast-all-routers-on-      Optional. Clears all multicast routers on the subnet detection event history
subnet
multicast-all-systems-on-      Optional. Clears all multicast systems on the subnet detection event history
subnet
multicast-dhcp-server-relay-   Optional. Clears multicast DHCP server relay agents detection event history
agent
multicast-hsrp-agent           Optional. Clears multicast Hot Standby Router Policy (HSRP) agents detection event
                               history
multicast-igmp-detection       Optional. Clears multicast Internet Group Management Protocol (IGMP) detection event
                               history
multicast-igrp-routers-        Optional. Clears multicast Interior Gateway Router Protocol (IGRP) routers detection
detection                      event history
multicast-ospf-all-routers-    Optional. Clears multicast Open Shortest Path First (OSPF) all routers detection event
detection                      history
multicast-ospf-designated-     Optional. Clears multicast OSPF designated routers detection event history
routers-detection
multicast-rip2-routers-        Optional. Clears multicast RIP2 routers detection event history
detection
multicast-vrrp-agent           Optional. Clears multicast Virtual Router Redundancy Protocol (VRRP) agents detection
                               event history
netbios-detection              Optional. Clears NetBIOS detection event history
null-probe-response-           Optional. Clears null probe response detection event history
detected
probe-response-flood           Optional. Clears probe response flood detection event history
rogue-ap-detection             Optional. Clears rogue AP detection event history
stp-detection                  Optional. Clears Spanning Tree Protocol (STP) detection event history
unauthorized-bridge            Optional. Clears unauthorized bridge detection event history
5 - 18 WiNG CLI Reference Guide



         windows-zero-config-        Optional. Clears Windows zero configuration memory leak detection event history
         memory-leak
         wlan-jack-attack-detected   Optional. Clears WLAN jack attack detection event history

        • service advanced-wips terminate-device <MAC>]

         advanced-wips terminate-     The advanced WIPS service command clears event history details, and terminates a
         device <MAC>                 device.
                                      • terminate-device – Terminates a specified device
                                        • <MAC> – Specify the MAC address of the AP or wireless client.

        • service ap300 [dot1x username <USERNAME> password <PASSWORD> on [all|ap-mac <MAC>]

         ap300                        Sets global AP300 configuration parameters
         dot1x                        Sets 802.1x authentication parameters
         username <USERNAME>          Authenticates user before providing access
                                      • <USERNAME> – Specify the username.
         password <PASSWORD>          Authenticates password before providing access
                                      • <PASSWORD> – Specify the password.
         on [all|                     Sets global AP300 parameters on a specified AP300 or all AP300s
         ap-mac <MAC>]                • all – Sets global parameters on all AP300s
                                      • AP300 <MAC> – Sets global parameters on a specified AP300
                                        • <MAC> – Specify the MAC address of the AP300.

        • service ap300 dns-name <DNS> on [all|ap-mac <MAC>]

         ap300                        Sets global AP300 configuration parameters
         dns-name <DNS>               Authenticates DNS server name
                                      • <DNS> – Specify the DNS sever name.
         on [all|ap-mac <MAC>]        Adopts a specified AP300 or al AP300s
                                      • all – Adopts all AP300s
                                      • AP300 <MAC> – Adopts a specified AP300
                                        • <MAC> – Specify the MAC address of the AP300.

        • service ap300 [locator|reload] <MAC>

         ap300                        Sets global AP300 configuration parameters
         locator                      Enables AP300 LEDs
         reload                       Resets an AP300
         <MAC>                        Provides the MAC address of the AP300
                                      • <MAC> – Specify the MAC address of the AP300.
COMMON COMMANDS 5 - 19


• service clear ap-upgrade history {on <DOMAIN-NAME>}]

clear ap-upgrade history          Clears firmware upgrade history
on <DOMAIN-NAME>                  Optional. Clears firmware upgrade details in a specified RF Domain
                                  • <DOMAIN-NAME> – Specify the RF Domain name.

• service clear [command-history|reboot-history|upgrade-history] {on <DEVICE-NAME>}

clear [command-history|          Clears command history, reboot history, or device upgrade history
reboot-history|
upgrade-history]
on <DEVICE-NAME>                 Optional. Clears history on a specified device
                                 • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• service clear noc statistics]

clear noc statistics             Clears Network Operations Center (NOC) applicable statistics counters

• service clear unsanctioned aps {on <DEVICE-OR-DOMAIN-NAME>}]

clear unsanctioned aps           Clears the unsanctioned APs list
on                               Optional. Clears the list on a specified device or RF Domain
<DEVICE-OR-DOMAIN-               • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
NAME>                              RF Domain.

• service clear wireless [ap|client] {<MAC> {on <DEVICE-OR-DOMAIN-NAME>}|
on <DEVICE-OR-DOMAIN-NAME>}

clear wireless [ap|client]       Clears applicable statistics counters
                                 • AP – Clears AP statistics counters
                                 • client – Clears wireless client statistics counters
<MAC>                            Optional. Specify the MAC address of the AP.
{on <DEVICE-OR-DOMAIN-           • on <DEVICE-OR-DOMAIN-NAME> – Optional. Specify the name of the AP, wireless
NAME>}                             controller, or RF Domain.

• service clear wireless radio statistics {<MAC/HOSTNAME> <1-3> {(on <DEVICE-OR-
DOMAIN-NAME>)}

clear wireless radio statistics Clears applicable wireless radio statistics counters
<MAC/HOSTNAME>                   Optional. Specify the MAC address or hostname of the radio, or append the interface
<1-3>                            number to form the radio ID in the AA-BB-CC-DD-EE-FF:RX or HOSTNAME:RX format.
                                 • <1-3> – Specify the radio interface index, if not specified as part of the radio ID.
on <DEVICE-OR-DOMAIN-            Optional. Specify the name of the AP, wireless controller, or RF Domain.
NAME>

• service clear wireless wlan statistics {<WLAN> {(on <DEVICE-OR-DOMAIN-NAME>)}

clear wireless wlan statistics    Clears WLAN statistics counters
5 - 20 WiNG CLI Reference Guide



         <WLAN>                   Clears statistics counters on a specified WLAN
         on <DEVICE-OR-DOMAIN-    Optional. Specify the name of the AP, wireless controller, or RF Domain.
         NAME>

        • service cli-tables-expand {left|right}

         cli-tables-expand        Displays the CLI table in a drop-down format
         left                     Optional. Displays the output in a left-justified format
         right                    Optional. Displays the output in a right-justified format
        • service cli-tables-skin [ansi|hashes|minimal|none|percent|stars|thick|thin|utf-8]
        {grid}

         cli-tables-skin          Selects a formatting layout or skin for CLI tabular outputs
         [ansi|hashes|minimal|    • ansi – Uses ANSI characters for borders
         none|percent|
                                  • hashes – Uses hashes (#) for borders
         stars|thick|
         thin|uf-8]               • minimal – Uses one horizontal line between title and data rows
                                  • none – Displays space separated items with no decoration
                                  • percent – Uses the percent sign (%) for borders
                                  • stars – Uses asterisks (*) for borders
                                  • thick – Uses thick lines for borders
                                  • thin – Uses thin lines for borders
                                  • utf-8 – Uses UTF-8 characters for borders
         grid                     Optional. Uses a complete grid instead of title lines

        • service cluster force [active|configured-state|standby]

         cluster                  Enables cluster protocol management
         force                    Forces action commands on a cluster
         active                   Changes the cluster run status to active
         configured-state         Restores a cluster to the configured state
         standby                  Changes the cluster run status to standby
        • service force-send-config {on <DEVICE-OR-DOMAIN-NAME>}

         force-send-config        Resends configuration details
         on <DEVICE-OR-DOMAIN-    Optional. Resends configuration details to a device
         NAME>                    • <DEVICE-OR-DOMAIN-NAME> – Optional. Specify the name of the AP, wireless
                                    controller, or RF Domain.
        • service locator {on <DEVICE-NAME>}

         locator                  Enables LEDs
         on <DEVICE-NAME>         Optional. Enables LEDs on a device
                                  • <DEVICE-NAME> – Specify name of the AP or wireless controller.
COMMON COMMANDS 5 - 21


• service noc parallel-updates <1-1024>

noc                      Configures NOC wireless controller serviceability commands
parallel-updates         Sets a limit to the number of parallel threads
<1-1024>                 • <1-1024> – Specify a value from 1 - 1024.

• service pktcap on [bridge|deny|drop|ext-vlan|rim|router|vpn|wireless]
{(acl-name <ACL>|count <1-1000000>|direction [any|inbound|outbound]|
filter|hex|rate <1-100>|snap <1-2048>|tcpdump|verbose|
write [file|url|tzsp <IP/TZSP HOSTNAME>])}

pktcap on                Captures data packets crossing at a specified location
                         • on – Defines the packet capture location
bridge                   Captures packets transiting through the Ethernet bridge
deny                     Captures packets denied by an Access Control List (ACL)
drop                     Captures packets at the drop locations
ext-vlan                 Captures packets forwarded to or from an extended VLAN
rim                      Captures packets at the Radio Interface Module (RIM)
router                   Captures packets transiting through an IP router
vpn                      Captures packets forwarded to or from a VPN link
wireless                 Captures packets forwarded to or from a wireless device
acl-name <ACL>           Optional. Specify the ACL that matches the acl-name for the 'deny' location
count <1-1000000>        Optional. Limits the captured packet count. Specify a value from 1 -1000000.
direction                Optional. Changes the packet direction with respect to a device. The direction can be
[any|inbound|outbound]   set as any, inbound, or outbound.
5 - 22 WiNG CLI Reference Guide



         filter                              Optional. Filters packets based on the option selected (must be used as a last option)
         [<LINE>|arp|capwap|cdp|dot1         The filter options are:
         1|dropreason|dst|ether|             • <LINE> – Defines user defined packet capture filter
         host|icmp|igmp|ip|ipv6|l2|l3|l4
                                             • arp – Matches ARP packets
         |lldp|mint|net|not|port|priority|
         radio|src|tcp|udp|vlan|wlan]        • capwap – Matches CAPWAP packets
                                             • cdp – Matches CDP packets
                                             • dot11 – Matches 802.11 packets
                                             • dropreason – Matches packet drop reason
                                             • dst – Matches IP destination
                                             • ether – Matches Ethernet packets
                                             • host – Matches host destination
                                             • icmp – Matches ICMP packets
                                             • igmp – Matches IGMP packets
                                             • ip – Matches IPV4 packets
                                             • ipv6 – Matches IPV6 packets
                                             • l2 – Matches L2 header
                                             • l3 – Matches L3 header
                                             • l4 – Matches L4 header
                                             • lldp – Matches LLDP packets
                                             • mint – Matches MiNT packets
                                             • net – Matches IP in subnet
                                             • not – Filters out any packet that matches the filter criteria (For example, if not TCP
                                               is used, all tcp packets are filtered out)
                                             • port – Matches TCP or UDP port
                                             • priority – Matches packet priority
                                             • radio – Matches radio
                                             • src – Matches IP source
                                             • stp – Matches STP packets
                                             • tcp – Matches TCP packets
                                             • udp – Match UDP packets
                                             • vlan – Matches VLAN
                                             • wlan – Matches WLAN
         hex                                 Optional. Provides binary output of the captured packets
         rate <1-100>                        Optional. Specifies the packet capture rate
                                             • <1-100> – Specify a value from 1 - 100 seconds.
         snap <1-2048>                       Optional. Captures the data length
                                             • <1-2048> – Specify a value from 1 - 2048 characters.
         tcpdump                             Optional. Decodes tcpdump. The tcpdump analyzes network behavior, performance,
                                             and infrastructure. It also analyzes applications that generate or receive traffic.
COMMON COMMANDS 5 - 23



verbose                  Optional. Displays full packet body
write                    Captures packets to a specified file. Provide the file name and location in the following
                         format:
                         FILE – flash:/path/file
                                cf:/path/file
                                usb1:/path/file
                                usb2:/path/file
                                vram:startup-config
                         URL – tftp://<hostname|IP>[:port]/path/file
                                ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                sftp://<user>@<hostname|IP>[:port]>/path/file
                         tzsp – Tazman Sniffer Protocol (TZSP) host. Specify the TZSP host’s IP address or
                         hostname.
• service pktcap on radio [<1-3>|all] {(acl-name <ACL>|count <1-1000000>|
direction [any|inbound|outbound]|filter <LINE>|hex|promiscuous|rate <1-100>|
snap <1-2048>|tcpdump|verbose|write [file|url|tzsp <IP/TZSP HOSTNAME>])}

pktcap on radio          Captures data packets on a specified radio or on all radios (802.11)
[<1-3>|all]              • <1-3> – Specify the radio index from 1 - 3.
                         • all – Captures data packets on all radios (802.11)
acl-name <ACL>           Optional. Specify the ACL name.
count <1-1000000>        Optional. Sets a specified number of packets to capture
                         • <1-1000000> – Specify a value from 1 -1000000.
direction                Optional. Changes the packet direction with respect to a device. The direction can be
[any|inbound|outbound]   set as any, inbound, or outbound.
filter <LINE>            Optional. Filters packets based on the option selected (must be used as a last option)
                         • <LINE> – Define a packet capture filter or select any one of the available options.
                           The options are: arp, capwap, cdp, dot11, dropreason, dst, ether, host, icmp, igmp,
                           ip, ipv6, 12, 13, 14, lldp, mint, net, not, port, priority, radio, src, stp, tcp, udp, vlan, and
                           wlan.
hex                      Optional. Provides binary output of the captured packets
promiscuous              Optional. Enables limited promiscuous mode capture on the current channel (disables
                         normal operation during the capture)
rate <1-100>             Optional. Specifies the packet capture rate
                         • <1-100> – Specify a value from 1 - 100 seconds.
snap <1-2048>            Optional. Captures the data length
                         • <1-2048> – Specify a value from 1 - 2048 characters.
tcpdump                  Optional. Decodes the TCP dump
5 - 24 WiNG CLI Reference Guide



         verbose                   Optional. Provides verbose output
         write                     Captures packets to a specified file. Provide the file name and location in the following
                                   format:
                                   FILE – flash:/path/file
                                          cf:/path/file
                                          usb1:/path/file
                                          usb2:/path/file
                                          nvram:startup-config
                                   URL – tftp://<hostname|IP>[:port]/path/file
                                          ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                          sftp://<user>@<hostname|IP>[:port]>/path/file
                                   tzsp – The TZSP host. Specify the TZSP host’s IP address or hostname.

        • service pktcap on interface [<INTERFACE>|ge <1-4>|me|port-channel <1-2>|
        vlan <1-4094] {(acl-name <ACL>|count <1-1000000>|direction [any|inbound|outbound]|
        filter <LINE>|hex|rate <1-100>|snap <1-2048>|tcpdump|verbose|
        write [file|url|tzsp <IP/TZSP HOSTNAME>])}

         pktcap on                 Captures data packets at a specified interface
                                   • on – Specify the capture location.
         interface [<INTERFACE>|   Captures packets at a specified interface. The options are:
         ge <1-4>|me1|             • <INTERFACE> – Specify the interface name.
         port-channel <1-2|
                                   • ge <1-4> – Selects a GigabitEthernet interface index from 1 - 4
         vlan <1-4094>]
                                   • me1 – Selects the FastEthernet interface
                                   • port-channel <1-2> – Selects a port-channel interface index from 1- 2
                                   • vlan <1-4094> – Selects a VLAN ID from 1 - 4094
         acl-name <ACL>            Optional. Specify the ACL that matches the ACL name for the 'deny' location
         count <1-1000000>         Optional. Sets a specified number of packets to capture
                                   • <1-1000000> – Specify a value from 1 - 1000000.
         direction                 Optional. Changes the packet direction with respect to a device. The direction can be
         [any|inbound|outbound]    set as any, inbound, or outbound.
         filter <LINE>             Optional. Filters packets based on the option selected (must be used as a last option)
                                   • <LINE> – Define a packet capture filter or select any one of the available options.
         hex                       Optional. Provides binary output of the captured packets
         rate <1-100>              Optional. Specifies the packet capture rate
                                   • <1-100> – Specify a value from 1 - 100 seconds.
         snap <1-2048>             Optional. Captures the data length
                                   • <1-2048> – Specify a value from 1 - 2048 characters.
         tcpdump                   Optional. Decodes the TCP dump
COMMON COMMANDS 5 - 25



verbose                Optional. Provides verbose output
write                  Captures packets to a specified file. Provide the file name and location in the following
                       format:
                       FILE – flash:/path/file
                              cf:/path/file
                              usb1:/path/file
                              usb2:/path/file
                              nvram:startup-config
                       URL – tftp://<hostname|IP>[:port]/path/file
                              ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                              sftp://<user>@<hostname|IP>[:port]>/path/file
                       tzsp – The TZSP host. Specify the TZSP host’s IP address or hostname.

• service radio <1-3> dfs simulate-radar [extension|primary]

radio <1-3>            Configures radio’s parameters
                       • <1-3> – Specify the radio index from 1 - 3.
dfs                    Enables Dynamic Frequency Selection (DFS)
simulate-radar         Simulates the presence of a radar on a channel. Select the channel type from the
[extension|primary]    following options:
                       • extension – Simulates a radar on the radio’s current extension channel
                       • primary – Simulates a radar on the radio’s current primary channel

• service radius test [<IP>|<HOSTNAME>] <WORD> <USERNAME> <PASSWORD> {wlan <WLAN>
ssid <SSID> {(on <DEVICE-NAME>)}}

radius test            Tests a RADIUS server account
                       • test – Tests the RADIUS server account with user parameters
[<IP>|<HOSTNAME>]      Sets the IP address or hostname of the RADIUS server
                       • <IP> – Specify the RADIUS server’s IP address.
                       • <HOSTNAME> – Specify the RADIUS server’s hostname.
<WORD>                 Specify the shared secret to logon to the RADIUS server.
<USERNAME>             Specify the name of the user for authentication.
<PASSWORD>             Specify the password.
wlan <WLAN>            Tests the local RADIUS WLAN. Specify the local RADIUS WLAN name.
ssid <SSID>            • ssid <SSID> – Specify the local RADIUS server’s SSID.
on <DEVICE-NAME>       Optional. Performs the tests on a specified device
                       • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
5 - 26 WiNG CLI Reference Guide


        • service radius test [<IP>|<HOSTNAME>] <PORT> <1024-65535> <WORD> <USERNAME>
        <PASSWORD> {wlan <WLAN> ssid <SSID> {(on <DEVICE-NAME>)}}

         radius test                      Tests a RADIUS server account
                                          • test – Tests the RADIUS server account with user parameters
         [<IP>|<HOSTNAME>]                Sets the IP address or hostname of the RADIUS server
                                          • <IP> – Specify the RADIUS server’s IP address.
                                          • <HOSTNAME> – Specify the RADIUS server’s hostname.
         <PORT> <1024-65535>              Specify the RADIUS server port from 1024 - 65535. The default port is 1812.
         <WORD>                           Specify the shared secret to logon to the RADIUS server.
         <USERNAME>                       Specify the name of the user for authentication.
         <PASSWORD>                       Specify the password.
         wlan <WLAN>                      Tests the RADIUS server on the local WLAN. Specify the local WLAN name.
         ssid <SSID>                      • ssid <SSID> – Specify the RADIUS server’s SSID.
         on <DEVICE-NAME>                 Optional. Performs the tests on a specified device
                                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • service set validation-mode [full|partial] {on <DEVICE-NAME>}

         set                              Sets the validation mode for running configuration validation
         validation-mode [full|partial]   Sets the validation mode
                                          • full – Performs a full configuration validation
                                          • partial – Performs a partial configuration validation
         on <DEVICE-NAME>                 Optional. Performs configuration validation on a specified device
                                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • service show advanced-wips stats [ap-table|client-table|
        connected-sensors-status|termination-entries]

         show                             Displays running system statistics based on the parameters passed
         advanced-wips stats              Displays advanced WIPS statistics
         ap-table                         Displays AP table statistics
         client-table                     Displays client table statistics
         connected-sensors-status         Displays connected sensors statistics
         termination-entries              Displays termination entries statistics

        • service show captive-portal [servers|user-cache] {on <DEVICE-NAME>}

         show                             Displays running system statistics based on the parameters passed
         captive-portal                   Displays captive portal information
         servers                          Displays server information for active captive portals
COMMON COMMANDS 5 - 27



user-cache               Displays cached user details for a captive portal
on <DEVICE-NAME>         Optional. Displays server information or cached user details on a specified device
                         • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• service show [cli|configuration-revision|mac-vendor <OUI/MAC>|noc diag|
snmp session|xpath-history]

show                     Displays running system statistics based on the parameters passed
cli                      Displays CLI tree of the current mode
configuration-revision   Displays current configuration revision number
mac-vendor               Displays vendor name for a specified MAC address or Organizationally Unique Identifier
<OUI/MAC>                (OUI) part of the MAC address
                         • <OUI/MAC> – Specify the MAC address or its OUI. The first six digits of the MAC
                            address is the OUI. Use the AABBCC or AA-BB-CC format to provide the OUI.
noc diag                 Displays NOC diagnostic details
snmp session             Displays SNMP session details
xpath-history            Displays XPath history

• service show [command-history|crash-info|info|mem|process|reboot-histroy|
startup-log|sysinfo|top|upgrade-history|watchdog] {on <DEVICE-NAME>}

show                     Displays running system statistics based on the parameters passed
command-history          Displays command history (lists all commands executed)
crash-info               Displays information about core, panic, and AP dump files
info                     Displays snapshot of available support information
mem                      Displays a system’s current memory usage (displays the total memory and available
                         memory)
process                  Displays active system process information (displays all processes currently running on
                         the system)
reboot-history           Displays the device’s reboot history
startup-log              Displays the device’s startup log
sysinfo                  Displays a system’s memory usage
top                      Displays system resource information
upgrade-history          Displays the device’s upgrade history (displays details, such as date, time, and status
                         of the upgrade, old version, new version etc.)
5 - 28 WiNG CLI Reference Guide



         watchdog                 Displays the device’s watchdog status
         on <DEVICE-NAME>         The following parameters are common to all of the above:
                                  • on <DEVICE-NAME> – Optional. Displays information for a specified device. If no
                                    device is specified, the system displays information for the logged device
                                    • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • service show dhcp-lease {<INTERFACE>|on|vlan <1-4094>} {(on <DEVICE-NAME>)}

         show                     Displays running system statistics based on the parameters passed
         dhcp-lease               Displays DHCP lease information received from the server
         <INTERFACE>              Displays DHCP lease information for a specified router interface
                                  • <INTERFACE> – Specify the router interface name.
         on                       Displays DHCP lease information for a specified device
         vlan <1-4094>            Displays DHCP lease information for a VLAN
                                  • <1-4094> – Specify a VLAN index from 1 - 4094.
         on <DEVICE-NAME>         Optional. Displays DHCP lease information for a specified device. If no device is
                                  specified, the system displays information for the logged device.
                                  • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • service show diag [led-staus|stats] {(on <DEVICE-NAME>)}]

         show                     Displays running system statistics based on the parameters passed
         diag                     Displays diagnostic statistics, such as LED status, fan speed, and sensor temperature
         led-status               Displays LED state variables and the current state
         stats                    Displays fan speed and sensor temperature statistics
         on <DEVICE-NAME>         Optional. Displays diagnostic statistics for a specified device. If no device is specified,
                                  the system displays information for the logged device.
                                  • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • service show mint adopted-devices {(on <DEVICE-NAME>)}]

         show                     Displays running system statistics based on the parameters passed
         mint                     Displays MiNT protocol details
         adopted-devices          Displays adopted devices status in dpd2
         on <DEVICE-NAME>         Optional. Displays MiNT protocol details for a specified device. If no device is specified,
                                  the system displays information for the logged device.
                                  • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • service show pm {history {(on <DEVICE-NAME>)}}]

         show                     Displays running system statistics based on the parameters passed
         pm                       Displays the Process Monitor (PM) controlled process details
COMMON COMMANDS 5 - 29



history                  Optional. Displays process change history (the time at which the change was
                         implemented, and the events that triggered the change)
on <DEVICE-NAME>         Optional. Displays process change history for a specified device. If no device is
                         specified, the system displays information for the logged device.
                         • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• service show rf-domain-manager diag {(<MAC/HOSTNAME> {(on <DEVICE-OR-DOMAIN-
NAME>)}}]

show                    Displays running system statistics based on the parameters passed
rf-domain-manager       Displays RF Domain manager information
diag                    Displays RF Domain manager related diagnostics statistics
<MAC/HOSTNAME>          Optional. Specify the MAC address or hostname of the RF Domain manager.
on <DEVICE-OR-DOMAIN-   Optional. Displays diagnostics statistics on a specified device or domain
NAME>                   • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF
                          Domain.

• service show wireless [aaa-stats|credential-cache|dns-cache] {on <DEVICE-NAME>}]

show                    Displays running system statistics based on the parameters passed
wireless                Displays WLAN statistics (WLAN AAA policy, configuration parameters, VLAN usage etc.)
aaa-stats               Displays AAA policy statistics
credential-cache        Displays clients cached credentials statistics (VLAN, keys etc.)
dns-cache               Displays cache of resolved names of servers related to wireless networking
on <DEVICE-NAME>        Optional. Displays WLAN statistics for a specified device. If no device is specified, the
                        system displays information for the logged device.
                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• service show wireless [ap300 <MAC>|neighbors|vlan-usage] {on <DEVICE-NAME>}]

show                    Displays running system statistics based on the parameters passed
wireless                Displays WLAN statistics (WLAN AAA policy, configuration parameters, VLAN usage
                        etc.)
ap300 <MAC>             Displays WLAN AP300 statistics
                        • <MAC> – Specify the MAC address of the AP300.
neighbors               Displays neighboring device statistics for roaming and flow migration
vlan-usage              Displays VLAN statistics across WLANs
on <DEVICE-NAME>        Optional. Displays WLAN statistics for a specified device
                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
5 - 30 WiNG CLI Reference Guide


        • service show wireless client proc [info|stats] {<MAC> {(on <DEVICE-OR-DOMAIN-
        NAME)}}]

         show                     Displays running system statistics based on the parameters passed
         wireless                 Displays WLAN statistics (WLAN AAA policy, configuration parameters, VLAN usage
                                  etc.)
         client                   Displays WLAN client statistics
         proc                     Displays dataplane proc entries
                                  These proc entries provide statistics on each wireless client on the WLAN.
         info                     Displays information of a specified wireless client
         stats                    Displays statistical data of a specified wireless client
         <MAC>                    Optional. Specify the MAC address of the wireless client.
         on <DEVICE-OR-DOMAIN-    Optional. Displays information on a specified device or domain.
         NAME>                    • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                    RF Domain.
        • service show wireless config-internal {include-factory}]

         show                     Displays running system statistics based on the parameters passed
         wireless                 Displays WLAN statistics (WLAN AAA policy, configuration parameters, VLAN usage
                                  etc.)
         config-internal          Displays internal configuration parameters
         include-factory          Optional. Displays factory default settings

        • service show wireless stats-client diag {<MAC/HOSTNAME> {(on <DEVICE-OR-DOMAIN-
        NAME)}}]

         show                     Displays running system statistics based on the parameters passed
         wireless                 Displays WLAN statistics (WLAN AAA policy, configuration parameters, VLAN usage
                                  etc.)
         stats-client             Displays managed AP statistics
         <MAC/HOSTNAME>           Optional. Specify the MAC address or hostname of the AP.
         on <DEVICE-OR-DOMAIN-    Optional. Displays statistics on a specified AP, or all APs on a specified domain.
         NAME>                    • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                    RF Domain.

        • service show wireless meshpoint neighbor proc [info|stats] {<MAC>|on <DEVICE-OR-
        DOMAIN-NAME>}

         show                     Displays running system statistics based on the parameters passed
         wireless                 Displays WLAN statistics (WLAN AAA policy, configuration parameters, VLAN usage
                                  etc.)
         meshpoint                Displays mesh point information
COMMON COMMANDS 5 - 31



neighbor                   Displays proc entries about neighbor devices
proc                       Displays proc entries
info                       Displays information about neigbor devices
stats                      Displays staticstics about neighbor devices
<MAC>                      Optional. Specify the MAC address of the neighbor device.
on <DEVICE-OR-DOMAIN-      Optional. Displays statistics or neighbor information on a specified AP, or all APs on a
NAME>                      specified domain.
                           • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                             RF Domain.

• service smart-rf [clear-config|clear-history|interactive-calibration|
run-calibration|save-config|stop-calibration] {on <DOMAIN-NAME>}]

smart-rf                   Enables Smart RF management
clear-config               Clears WLAN Smart RF configuration on all devices
clear-history              Clears WLAN Smart RF history on all devices
interactive-calibration    Enables interactive Smart RF calibration
run-calibration            Starts a new Smart RF calibration process
save-config                Saves Smart RF configuration on all device, and also saves the history on the domain
                           manager
stop-calibration           Stops Smart RF configuration, currently in progress
on <DOMAIN-NAME>           Optional. Enables Smart RF management on a specified RF Domain
                           • <DOMAIN-NAME> – Specify the RF Domain name.

• service smart-rf interactive-calibration-result [discard|replace-current-
config|write-to-configuration] {on <DOMAIN-NAME>}]

smart-rf                   Enables Smart RF management
interactive-calibration-   Displays interactive Smart RF calibration results
result
discard                    Discards interactive Smart RF calibration results
replace-current-config     Replaces current radio configuration
write-to-configuration     Writes and saves radio settings to configuration
on <DOMAIN-NAME>           Optional. Displays interactive Smart RF calibration results on a specified RF Domain
                           • <DOMAIN-NAME> – Specify the RF Domain name.
5 - 32 WiNG CLI Reference Guide


        • service wireless client beacon-request <MAC> mode [active|passive|table] ssid
        [<SSID>|any] channel-report [<CHANNEL-LIST>|none] {on <DEVICE-NAME>}]

         wireless client beacon-        Sends beacon measurement requests to a wireless client
         requests
         <MAC>                          Specify the MAC address of the wireless client.
         mode [active|passive|table]    Specifies the beacon measurements mode
                                        • Active – Requests beacon measurements in the active mode
                                        • Passive – Requests beacon measurements in the passive mode
                                        • Table – Requests beacon measurements in the table mode
         ssid [<SSID>|any]              Specifies if the measurements have to be made for a specified SSID or for any SSID
                                        • <SSID> – Requests beacon measurement for a specified SSID
                                        • any – Requests beacon measurement for any SSID
         channel-report [<CHANNEL-      Configures channel report in the request. The request can include a list of channels or
         LIST>|                         can apply to all channels
         none]                          • <CHANNEL-LIST> – Request includes a list of channels. The client has to send
                                          beacon measurements only for those channels included in the request
                                        • none – Request applies to all channels
         on <DEVICE-NAME>               Optional. Sends requests on a specified device
                                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • service wireless qos delete-tspec <MAC> tid <0-7>

         wireless qos delete-tspec     Sends a delete TSPEC request to a wireless client
         <MAC>                         Specify the MAC address of the wireless client.
         tid <0-7>                     Deletes the Traffic Identifier (TID)
                                       • <0-7> – Select the TID from 0 - 7.
        • service wireless wips clear-client-blacklist [all|mac <MAC>]

         wireless wips                 Enables management of WIPS parameters
         clear-client-blacklist        Removes a specified client or all clients from the blacklist
         [all|mac <MAC>]               • all – Removes all clients from the blacklist
                                       • mac <MAC> – Removes a specified client form the blacklist
                                         • <MAC> – Specify the MAC address of the wireless client.

        • service wireless wips clear-event-history {on <DEVICE-OR-DOMAIN-NAME}]

         wireless wips                 Enables WIPS management
         clear-event-history           Clears event history
         on <DEVICE-OR-DOMAIN-         Optional. Clears event history on a device or RF Domain
         NAME>                         • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                         RF Domain.
COMMON COMMANDS 5 - 33


Syntax (Privilege Exec Mode)

                NOTE: The “service” command of the Priv Exec Mode is the same as the service
                command in the User Exec Mode. There a few modifications that have been documented
                in this section. For the syntax and parameters of the other commands refer to the
                (User Exec Mode) syntax and (User Exec Mode) parameters sections of this chapter.

service [advanced-wips|clear|cli-tables-expand|cli-tables-skin|cluster|copy|
   locator|mint|noc|pktcap|pm|radio|set|show|signal|smart-rf|start-shell||wireless]
service copy tech-support [FILE|URL]
service clear [ap-upgrade|command-history|crash-info|noc|reboot-history|
   unsanctioned|upgrade-history|wireless]
service mint [clear [lsp-db|mlcp
]|debug-log [flash-and-syslog|flash-only]|
   expire [lsp|spf]|flood [csnp|lsp]|silence]
service signal [abort <PROCESS>|kill <PROCESS>]
service pm stop{on <DEVICE-NAME>}
service show [advanced-wips|captive-portal|cli|command-history|crash-info|
   dhcp-lease|diag|info|last-passwd|mac-vendor|mem|noc|pm|process|reboot-history|
   rf-domain-manager|snmp|startup-log|sysinfo||top|upgrade-history|watchdog|
   wireless|xpath-history]
service start-shell
Parameters (Privilege Exec Mode)
• service copy tech-support <FILE> <URL>

 copy tech-support           Copies files for technical support
                             • tech-support – Copies extensive system information useful for troubleshooting
 <FILE>                      Specify the file name in the following format:
                                cf:/path/file
                                usb1:/path/file
                                usb2:/path/file
 <URL>                       Specify the file location in the following format:
                                tftp://<hostname|IP>[:port]/path/file
                                ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file
                                sftp://<user>:<passwd>@<hostname|IP>[:port]>/path/file

• service clear crash-info {on <DEVICE-NAME>}

 clear crash-info            Clears all crash files
 on <DEVICE-NAME>            Optional. Clears crash files on a specified device. These crash files are core, panic, and AP
                             dump
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• service mint [clear [lsp-dp|mlcp]|debug-log [flash-and-syslog|flash-only]|expire
[lsp|spf]|flood [csnp|lsp]|silence]

 mint                        Enables MiNT protocol management (clears LSP database, enables debug logging,
                             enables running silence etc.)
 clear [lsp-dp|mlcp]         Clears LSP database and MiNT Link Control Protocol (MLCP) links
                             • lsp-dp – Clears MiNT Label Switched Path (LSP) database
                             • mlcp – Clears MLCP links
5 - 34 WiNG CLI Reference Guide



         debug-log              Enables debug message logging
         [flash-and-syslog|     • flash-and-syslog – Logs debug messages to the flash and syslog files
         flash-only]
                                • flash-only – Logs debug messages to the flash file only
         expire [lsp|spf]       Forces expiration of LSP and recalculation of Shortest Path First (SPF)
                                • lsp – Forces expiration of LSP
                                • spf – Forces recalculation of SPF
         flood [csnp|lsp]       Floods control packets
                                • csnp – Floods our Complete Sequence Number Packets (CSNP)
                                • lsp – Floods our LSP
         silence                Run silent

        • service pm stop {on <DEVICE-NAME>}

         pm                     Stops the Process Monitor (PM)
         stops                  Stops the PM from monitoring all daemons
         on <DEVICE-NAME>       Optional. Stops the PM on a specified device
                                • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • service show last-passwd

         show                   Displays running system statistics based on the parameters passed
         last-passwd            Displays the last password used to enter shell
        • service signal [abort <PROCESS>|kill <PROCESS>]

         signal                 Sends a signal to a process
                                • tech-support – Copies extensive system information useful for troubleshooting
         abort                  Sends an abort signal to a process, and forces it to dump to core
                                • <PROCESS> – Specify the process name.
         kill                   Sends a kill signal to a process, and forces it to terminate without a core
                                • <PROCESS> – Specify the process name.

        • service start-shell

         start-shell              Provides shell access
COMMON COMMANDS 5 - 35


Syntax (Global Config Mode)
service [set|show cli]
service set [command-history <10-300>|upgrade-history <10-100>|
reboot-history <10-100>] {on <DEVICE-NAME>}
Parameters (Global Config Mode)
• service set [command-history <10-300>|upgrade-history <10-300>|reboot-history <10-
300>] {on <DEVICE-NAME>}

 set                      Sets the size of history files
 command-history          Sets the size of the command history file
 <10-300>                 • <10-300> – Specify a value from 10 - 300. The default is 200.
 upgrade-history          Sets the size of the upgrade history file
 <10-100>                 • <10-100> – Specify a value from 10 - 100. The default is 50.
 reboot-history           Sets the size of the reboot history file
 <10-100>                 • <10-100> – Specify a value from 10 - 100. The default is 50.
 on <DEVICE-NAME>         Optional. Sets the size of history files on a specified device
                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• service show cli

 show cli                 Displays running system configuration details
                          • cli – Displays the CLI tree of the current mode
Examples
rfs7000-37FABE>service cli-tables-skin stars
rfs7000-37FABE>

rfs7000-37FABE>service pktcap on interface vlan 2
Capturing up to 50 packets. Use Ctrl-C to abort.

rfs7000-37FABE>service show cli
User Exec mode: +-do
+-help [help]
  +-show
    +-configuration-tree [help show configuration-tree]
  +-search
    +-WORD [help search WORD (|detailed|only-show|skip-show)]
       +-detailed [help search WORD (|detailed|only-show|skip-show)]
       +-only-show [help search WORD (|detailed|only-show|skip-show)]
       +-skip-show [help search WORD (|detailed|only-show|skip-show)]
+-show
  +-commands [show commands]
  +-running-config [show (running-config|session-config) (|include-factory)]
    +-include-factory [show (running-config|session-config) (|include-factory)]
    +-interface [show running-config interface (|`WORD|ge <1-4>|me1|pc <1-4>|vlan <1-
4094>') (|include-factory)]
       +-WORD [show running-config interface (|`WORD|ge <1-4>|me1|pc <1-4>|vlan <1-
4094>') (|include-factory)]
         +-include-factory [show running-config interface (|`WORD|ge <1-4>|me1|pc <1-
4>|vlan <1-4094>') (|include-factory)]
       +-ge
         +-<1-4> [show running-config interface (|`WORD|ge <1-4>|me1|pc <1-4>|vlan <1-
4094>') (|include-factory)]
          +-include-factory [show running-config interface (|`WORD|ge <1-4>|me1|pc <1-
4>|vlan <1-4094>') (|include-
factory)].................................................................rfs7000-
37FABE
5 - 36 WiNG CLI Reference Guide


        rfs7000-37FABE>service show general stats on rfs7000-37FABE
        Current Fan Speed: 6540 Minimum Fan Speed: TBD Hysteresis: TBD

        Sensor   1   Temperature:   31C
        Sensor   2   Temperature:   55C
        Sensor   3   Temperature:   29C
        Sensor   4   Temperature:   28C
        Sensor   5   Temperature:   26C
        Sensor   6   Temperature:   28C


        rfs7000-37FABE>

        rfs7000-37FABE>service wireless wips clear-mu-blacklist mac 11-22-33-44-55-66
        rfs7000-37FABE>

        rfs7000-37FABE#service signal kill testp
        Sending a kill signal to testp
        rfs7000-37FABE#
        rfs7000-37FABE#service signal abort testprocess
        Sending an abort signal to testprocess
        rfs7000-37FABE#

        rfs7000-37FABE#service mint clear lsp-db
        rfs7000-37FABE#

        rfs7000-37FABE#service mint silence
        rfs7000-37FABE#

        rfs7000-37FABE#service pm stop on rfs7000-37FABE
        rfs7000-37FABE#
        rfs7000-37FABE(config)#service show cli
        Global Config mode:
        +-help [help]
          +-search
            +-WORD [help search WORD (|detailed|only-show|skip-show)]
               +-detailed [help search WORD (|detailed|only-show|skip-show)]
               +-only-show [help search WORD (|detailed|only-show|skip-show)]
               +-skip-show [help search WORD (|detailed|only-show|skip-show)]
        +-show
          +-commands [show commands]
          +-eval
            +-LINE [show eval LINE]
          +-debugging [show debugging (|(on DEVICE-OR-DOMAIN-NAME))]
            +-cfgd [show debugging cfgd]
            +-on
               +-DEVICE-OR-DOMAIN-NAME [show debugging (|(on DEVICE-OR-DOMAIN-NAME))]
            +-wireless [show debugging wireless (|(on DEVICE-OR-DOMAIN-NAME))]
               +-on
               +-DEVICE-OR-DOMAIN-NAME [show debugging wireless (|(on DEVICE-OR-DOMAIN-NAME))]
            +-voice [show debugging voice (|(on DEVICE-OR-DOMAIN-NAME))]
               +-on
                 +-DEVICE-OR-DOMAIN-NAME [show debugging voice (|(on DEVICE-OR-DOMAIN-NAME))]
            +-captive-portal [show debugging captive-portal (|(on DEVICE-OR-DOMAIN-NAME))]
               +-on
                +-DEVICE-OR-DOMAIN-NAME [show debugging captive-portal (|(on DEVICE-OR-DOMAIN-
        NAME))]
            +-dhcpsvr [show debugging dhcpsvr (|(on DEVICE-NAME))]
               +-on..............................................................
        rfs7000-37FABE(config)#

        rfs7000-37FABE#service traceroute -h
        traceroute: invalid option -- h
        BusyBox v1.14.1 () multi-call binary

        Usage: traceroute [-FIldnrv] [-f 1st_ttl] [-m max_ttl] [-p port#] [-q nqueries]
                [-s src_addr] [-t tos] [-w wait] [-g gateway] [-i iface]
                [-z pausemsecs] HOST [data size]
COMMON COMMANDS 5 - 37


Trace the route to HOST

Options:
             -F      Set the don't fragment bit
             -I      Use ICMP ECHO instead of UDP datagrams
             -l      Display the ttl value of the returned packet
             -d      Set SO_DEBUG options to socket
             -n      Print hop addresses numerically rather than symbolically
             -r      Bypass the normal routing tables and send directly to a host
             -v      Verbose
             -m max_ttl      Max time-to-live (max number of hops)
             -p port#        Base UDP port number used in probes
                             (default is 33434)
             -q nqueries     Number of probes per 'ttl' (default 3)
             -s src_addr     IP address to use as the source address
             -t tos          Type-of-service in probe packets (default 0)
             -w wait         Time in seconds to wait for a response
                             (default 3 sec)
             -g              Loose source route gateway (8 max)

rfs7000-37FABE#

rfs7000-37FABE>ser show ap configured
--------------------------------------------------------------------------
 IDX        NAME              MAC            PROFILE        RF-DOMAIN       ADOPTED-BY
-------------------------------------------------------------------------- 1
ap7131-889EC4    00-15-70-88-9E-C4   default-AP7131    default     un-adopted
2    AP650-445566    11-22-33-44-55-66   default-AP650     default     un-adopted
  3 AP650-000000     00-A0-F8-00-00-00 default-AP650      default    00-15-70-37-FA-BE
--------------------------------------------------------------------------
rfs7000-37FABE>
rfs7000-37FABE>service show command-history on rfs7000-37FABE
Configured size of command history is 200

Date & Time          User      Location           Command
=====================================================================
Jul 28 16:39:34 2010  admin    172.16.10.10 17      service locator on rfs7000-37FABE
Jul 28 16:39:13 2010   admin     172.16.10.10 17       exit
Jul 28 16:17:51 2010   admin     172.16.10.10 17       exit
Jul 28 16:15:58 2010   admin     172.16.10.10 17       exit
Jul 28 16:15:53 2010   admin     172.16.10.10 17       advanced-wips-policy test
Jul 28 16:08:13 2010   admin     172.16.10.10 17       exit
Jul 28 15:24:25 2010   admin     172.16.10.10 16       firewall-policy test
Jul 28 13:51:59 2010   admin     172.16.10.10 15       exit
Jul 28 13:51:47 2010   admin     172.16.10.10 15       exit
Jul 28 13:51:44 2010   admin     172.16.10.10 15       exit
Jul 28 13:51:43 2010   admin     172.16.10.10 15       exit
Jul 28 13:21:17 2010   admin     172.16.10.10 15       aaa-policy test
Jul 28 13:20:35 2010   admin     172.16.10.10 15       exit
Jul 28 13:09:14 2010   admin     172.16.10.10 15       exit
Jul 28 13:08:44 2010   admin     172.16.10.10 15       aaa-policy test
Jul 27 13:46:46 2010  admin     172.16.10.10 6      ip nat pool pool1 prefix-length 1
Jul 27 13:44:46 2010   admin     172.16.10.10 6       profile RFS7000 default-RFS7000
Jul 27 12:39:29 2010   admin     172.16.10.12 5       reload force
Jul 27 12:28:41 2010   admin     172.16.10.12 20       reload force
Jul 27 12:28:39 2010   admin     172.16.10.12 20       write memory
..................................................................
rfs7000-37FABE>

rfs7000-37FABE>service show diag stats on rfs7000-37FABE

fan 1 current speed: 6660 min_speed: 2000 hysteresis: 250
fan 2 current speed: 6720 min_speed: 2000 hysteresis: 250
fan 3 current speed: 6540 min_speed: 2000 hysteresis: 250

Sensor   1    Temperature   32.0   C
Sensor   2    Temperature   58.0   C
Sensor   3    Temperature   29.0   C
Sensor   4    Temperature   28.0   C
5 - 38 WiNG CLI Reference Guide


        Sensor 5 Temperature 26.0 C
        Sensor 6 Temperature 28.0 C

        rfs7000-37FABE>service show info on rrfs7000-37FABE
        7.7M out of 8.0M available for logs.
        9.4M out of 10.0M available for history.
        19.2M out of 20.0M available for crashinfo.

        List of Files:

        cfgd.log                                5.7K    Jul   28   17:17
        fmgr.log                                221     Jul   27   12:40
        messages.log                            1.0K    Jul   27   12:41
        startup.log                             52.3K   Jul   27   12:40
        command.history                         903     Jul   28   16:39
        reboot.history                          1.6K    Jul   27   12:40
        ugrade.history                          698     Jul   27   12:39
        Please export these files or delete them for more space.

        rfs7000-37FABE>
        rfs7000-37FABEE>service show upgrade-history on rfs7000-37FABE
        Configured size of upgrade history is 50
          Date & Time            Old Version     New Version      Status
        =====================================================================
        Jul 27 12:37:30 2010 5.2.2.0-098D 5.2.2.0-097B Successful
        Jul 27 12:26:34 2010 5.2.2.0-097B 5.2.2.0-098D Successful
        Jul 22 16:33:04 2010 5.2.2.0-096B 5.2.2.0-097B Successful
        Jul 22 16:32:15 2010 5.2.2.0-096B 5.2.2.0-096B Unable to get update file. ftpget:
        cannot connect to remote host (172.16.10.1): Connection refused
        Jul 19 17:51:29 2010 5.2.2.0-090D 5.2.2.0-096B Successful
        Jul 12 12:41:12 2010 5.2.2.0-088D 5.2.2.0-090D Successful
        Jul 06 12:38:49 2010 5.2.2.0-086D 5.2.2.0-088D Successful
        Jun 29 13:06:50 2010 5.2.2.0-084D 5.2.2.0-086D Successful
        ..........................................................
        rfs7000-37FABE
        rfs7000-37FABE>service show watchdog
        watchdog is enabled
        countdown: 255 seconds of 260 remain until reset
        rfs7000-37FABE>

        rfs7000-37FABE>service show xpath-history
        ------------------------------------------------------------------------------------
        DATE&TIME            USER                    XPATH                      DURATION(MS)
        ------------------------------------------------------------------------------------
          Wed Jul 28 17:29:49 2010 [system] /wing-stats/device/00-A0-F8-00-00-00/_internal/
        adjust_stats_interval     40
          Wed Jul 28 17:29:49 2010 [system] /wing-stats/device/00-15-70-37-FA-BE/_internal/
        adjust_stats_interval     16
          Wed Jul 28 17:29:43 2010 [system] /wing-stats/device/00-A0-F8-00-00-00/_internal/
        adjust_stats_interval     39
          Wed Jul 28 17:29:43 2010 [system] /wing-stats/device/00-15-70-37-FA-BE/_internal/
        adjust_stats_interval     16
          Wed Jul 28 17:29:37 2010 [system] /wing-stats/device/00-A0-F8-00-00-00/_internal/
        adjust_stats_interval     40
          Wed Jul 28 17:29:37 2010 [system] /wing-stats/device/00-15-70-37-FA-BE/_internal/
        adjust_stats_interval     17
          Wed Jul 28 17:29:31 2010 [system] /wing-stats/device/00-A0-F8-00-00-00/_internal/
        adjust_stats_interval     40
          Wed Jul 28 17:29:31 2010 [system] /wing-stats/device/00-15-70-37-FA-BE/_internal/
        adjust_stats_interval     16
          Wed Jul 28 17:29:30 2010   [system] /wing-stats/device/00-15-70-37-FA-BE/watchdog-
        status                     6

        rfs7000-37FABE#service show last-passwd
        Last password used: password with MAC 00:15:70:37:fa:be
        rfs7000-37FABE#

        rfs7000-37FABE>service show wireless ap diag on rfs7000-37FABE
COMMON COMMANDS 5 - 39


--------------------------------------------------------------------------------
           AP-MAC                      FIELD                     VALUE
--------------------------------------------------------------------------------
  00-15-70-37-FA-BE          is_manager                   True
  00-15-70-37-FA-BE          last_stats_upload            107802.617188
  00-15-70-37-FA-BE          manager_mint_id              70.37.FA.BE
  00-15-70-37-FA-BE          max_pull_time                2.80668640137
  00-15-70-37-FA-BE          num_adoptions                0
  00-15-70-37-FA-BE          num_config_failed            0
  00-15-70-37-FA-BE          num_config_received          0
  00-15-70-37-FA-BE          num_stats_pulled             17951
  00-15-70-37-FA-BE          num_stats_pushed             0
  00-15-70-37-FA-BE          upload_state                 master
------------------------------------------------------------------------------------
AP-MAC                      FIELD                     VALUE
--------------------------------------------------------------------------
  00-A0-F8-00-00-00          is_manager                   False
  00-A0-F8-00-00-00          last_stats_upload            449767.65625
  00-A0-F8-00-00-00          manager_mint_id              70.37.FA.BE
  00-A0-F8-00-00-00          max_pull_time                0
  00-A0-F8-00-00-00          num_adoptions                2
  00-A0-F8-00-00-00          num_config_applied           2
  00-A0-F8-00-00-00          num_config_failed            0
  00-A0-F8-00-00-00          num_config_received          2
  00-A0-F8-00-00-00          num_stats_pulled             74796
  00-A0-F8-00-00-00          num_stats_pushed             3
  00-A0-F8-00-00-00          upload_state                 connected
--------------------------------------------------------------------------
Total number of APs displayed: 2
rfs7000-37FABE>

rfs7000-37FABE>service show wireless config-internal
! Startup-Config-Playback Completed: Yes
no debug wireless
no country-code
!
wlan-qos-policy default
  no rate-limit wlan to-air
  no rate-limit wlan from-air
  no rate-limit client to-air
  no rate-limit client from-air
!
wlan wlan1
  ssid wlan1
  vlan 1
  qos-policy default
  encryption-type none
  authentication-type none
  no accounting radius
  no accounting syslog
rfs7000-37FABE>

System Information:

Free RAM: 68.0% (169 of 249) Min: 10.0%
File Descriptors: free: 24198 used: 960 max: 25500
CPU load averages: 1 min: 0.0% 5 min: 0.0% 15 min: 0.0%

Kernel Buffers:
Size:      32   64     128    256    512     1k    2k    4k     8k   16k   32k   64k   128k
Usage:   2761 2965     927    201    549    107   141    25     68     0     1     2      0
Limit: 32768 8192     4096   4096   8192   8192 16384 16384   1024   512   256    64     64
rfs7000-37FABE#

rfs7000-37FABE>service clear wireless radio statistics on rfs7000-37FABE
clear radio stats on *: o.k.

rfs7000-37FABE#service show dhcp-lease vlan 1 on rfs7000-37FABE
No dhcp lease information available
rfs7000-37FABE#
5 - 40 WiNG CLI Reference Guide


  5.1.9 show
          Common Commands
        Displays specified system component settings. There are a number of ways to invoke the show command:
        • When invoked without any arguments, it displays information about the current context. If the current context contains
          instances, the show command (usually) displays a list of these instances.
        • When invoked with the display parameter, it displays information about that component.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show <parameter>
        Parameters
        None
COMMON COMMANDS 5 - 41


Examples
rfs7000-37FABE#show ?
  adoption                  Display information related to adoption to wireless
                            controller
  advanced-wips             Advanced WIPS
  ap-upgrade                AP Upgrade
  boot                      Display boot configuration.
  captive-portal            Captive portal commands
  cdp                       Cisco Discovery Protocol
  clock                     Display system clock
  cluster                   Cluster Protocol
  commands                  Show command lists
  context                   Information about current context
  critical-resources        Critical Resources
  crypto                    Encryption related commands
  debug                     Show Debugging status
  debugging                 Debugging functions
  device-categorization     Device Categorization
  event-history             Display event history
  event-system-policy       Display event system policy
  file                      Display filesystem information
  firewall                  Wireless Firewall
  interface                 Interface Configuration/Statistics commands
  ip                        Internet Protocol (IP)
  ip-access-list-stats      IP Access list stats
  licenses                  Show installed licenses and usage
  lldp                      Link Layer Discovery Protocol
  logging                   Show logging information
  mac-access-list-stats     MAC Access list stats
  mac-address-table         Display MAC address table
  mint                      MiNT protocol
  noc                       Noc-level information
  ntp                       Network time protocol
  password-encryption       Pasword encryption
  power                     Show power over ethernet command
  reload                    Scheduled reload information
  remote-debug              Show details of remote debug sessions
  rf-domain-manager         Show RF Domain Manager selection details
  role                      Role based firewall
  running-config            Current operating configuration
  session-changes           Configuration changes made in this session
  session-config            This session configuration
  sessions                  Display CLI sessions
  smart-rf                  Smart-RF Management Commands
  spanning-tree             Display spanning tree information
  startup-config            Startup configuration
  terminal                  Display terminal configuration parameters
  timezone                  The timezone
  upgrade-status            Display last image upgrade status
  version                   Display software & hardware version
  wireless                  Wireless commands
  wwan                      Display wireless WAN Status

rfs7000-37FABE#




           NOTE: For more information on the show command, see Chapter 6, SHOW
           COMMANDS.
5 - 42 WiNG CLI Reference Guide


5.1.10 write
          Common Commands
        Writes the system running configuration to memory or terminal
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        write [memory|terminal]
        Parameters
        • write [memory|terminal]

         memory                       Writes to the non-volatile (NV) memory
         terminal                     Writes to terminal
        Examples
        rfs7000-37FABE>write memory
        [OK]
        rfs7000-37FABE>


        rfs7000-37FABE>write terminal
        !
        ! Configuration of RFS7000 version 5.2.2.0-048B
        !
        ! version 2.1
        !
        !
        smart-rf-policy default
        !
        smart-rf-policy test
          enable
          calibration wait-time 4
        !
        wlan-qos-policy default
        !
        wlan-qos-policy test
          voice-prioritization
          svp-prioritization
          wmm background cw-max 8
          wmm video txop-limit 9
        ..........................................................................rfs7000-
        37FABE>
CHAPTER 6 SHOW COMMANDS

  Show commands display information about a configuration setting or display statistical information. Use this command to
  see the current running configuration as well as the start-up configuration. The show command also displays the
  configuration of the current context.
  This chapter describes the ‘show’ CLI commands used in the USER EXEC, PRIV EXEC, and GLOBAL CONFIG modes.
  Commands entered in either USER EXEC mode or PRIV EXEC mode are referred to as EXEC mode commands. If a user or
  privilege is not specified, the referenced command can be entered in either mode.
  This chapter also describes the ‘show’ commands in the ‘GLOBAL CONFIG’ mode. The commands can be entered in all
  three modes, except commands like file, IP access list stats, MAC access list stats, and upgrade stats, which cannot be
  entered in the User Executable Mode.
6-2   WiNG CLI Reference Guide



  6.1 show commands
       Table 6.1 summarizes show commands

               Command                                              Description                Reference
        show                   Displays settings for the specified system component           page 6-4
        adoption               Displays information related to wireless controller adoption   page 6-8
        advanced-wips          Displays advanced WIPS settings                                page 6-10
        ap-upgrade             Displays access point software image upgrade information       page 6-12
        boot                   Displays a device boot configuration                           page 6-14
        captive-portal         Displays WLAN hotspot functions                                page 6-15
        cdp                    Displays a Cisco Discovery Protocol (CDP) neighbor table       page 6-18
        clock                  Displays the software system clock                             page 6-20
        cluster                Displays cluster commands                                      page 6-21
        commands               Displays command list                                          page 6-23
        context                Displays information about the current context                 page 6-25
        critical-resources     Displays critical resource information                         page 6-26
        crypto                 Displays encryption mode information                           page 6-27
        debug                  Displays debugging configuration information                   page 6-30
        debugging              Displays debugging configuration information                   page 6-33
        device-                Displays device categorization details                         page 6-33
        categorization
        event-history          Displays event history                                         page 6-37
        event-system-          Displays event system policy configuration information         page 6-38
        policy
        file                   Displays file system information                               page 6-39
        firewall               Displays wireless firewall information                         page 6-40
        interface              Displays wireless controller interface status                  page 6-44
        ip                     Displays Internet Protocol (IP) related information            page 6-47
        ip-access-list-stats   Displays IP access list statistics                             page 6-52
        licenses               Displays installed licenses and usage information              page 6-53
        lldp                   Displays Link Layer Discovery Protocol (LLDP) information      page 6-54
        logging                Displays logging information                                   page 6-55
SHOW COMMANDS        6-3



       Command                                       Description                                Reference
mac-access-list-    Displays MAC access list statistics                                        page 6-56
stats
mac-address-table   Displays MAC address table entries                                         page 6-57
mint                Displays MiNT protocol configuration commands                              page 6-58
noc                 Displays Noc-level information                                             page 6-61
ntp                 Displays Network Time Protocol (NTP) information                           page 6-64
password-           Displays password encryption status                                        page 6-65
encryption
power               Displays Power over Ethernet (PoE) information                             page 6-66
remote-debug        Displays remote debug session data                                         page 6-67
rf-domain-          Displays RF Domain manager selection details                               page 6-68
manager
role                Displays role-based firewall information                                   page 6-69
running-config      Displays contents of configuration files                                   page 6-70
session-changes     Displays configuration changes made in this session                        page 6-74
session-config      Displays a list of currently active open sessions on the device            page 6-75
sessions            Displays CLI sessions                                                      page 6-76
smart-rf            Displays Smart RF management commands                                      page 6-77
spanning-tree       Displays spanning tree information                                         page 6-80
startup-config      Displays complete startup configuration script on the console              page 6-83
terminal            Displays terminal configuration parameters                                 page 6-84
timezone            Displays timezone                                                          page 6-85
upgrade-status      Displays image upgrade status                                              page 6-86
version             Displays a device’s software and hardware version                          page 6-88
wireless            Displays wireless configuration parameters                                 page 6-89
wwan                Displays wireless WAN status                                               page 6-106
6-4   WiNG CLI Reference Guide


 6.1.1 show
         show commands
       The show command displays the following information:
       • A device’s current configuration
       • A device’s start up configuration
       • A device’s current context configuration, such as profiles and policies
       Supported in the following platforms:
          • AP300
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP71XX
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       show <parameter>
       Parameters
       None
       Examples
       The following examples list the show commands in the different modes:
       GLOBAL CONFIG Mode
       rfs7000-37FABE(config)#show ?
         adoption               Display information related to adoption to wireless
                                controller
         advanced-wips          Advanced WIPS
         ap-upgrade             AP Upgrade
         boot                   Display boot configuration.
         captive-portal         Captive portal commands
         cdp                    Cisco Discovery Protocol
         clock                  Display system clock
         cluster                Cluster Protocol
         commands               Show command lists
         context                Information about current context
         critical-resources     Critical Resources
         crypto                 Encryption related commands
         debug                  Show Debugging status
         debugging              Debugging functions
         device-categorization Device Categorization
         event-history          Display event history
         event-system-policy    Display event system policy
         file                   Display filesystem information
         firewall               Wireless Firewall
         interface              Interface Configuration/Statistics commands
         ip                     Internet Protocol (IP)
         ip-access-list-stats   IP Access list stats
         licenses               Show installed licenses and usage
         lldp                   Link Layer Discovery Protocol
SHOW COMMANDS      6-5


  logging                 Show logging information
  mac-access-list-stats   MAC Access list stats
  mac-address-table       Display MAC address table
  mint                    MiNT protocol
  noc                     Noc-level information
  ntp                     Network time protocol
  password-encryption     Pasword encryption
  power                   Show power over ethernet command
  reload                  Scheduled reload information
  remote-debug            Show details of remote debug sessions
  rf-domain-manager       Show RF Domain Manager selection details
  role                    Role based firewall
  running-config          Current operating configuration
  session-changes         Configuration changes made in this session
  session-config          This session configuration
  sessions                Display CLI sessions
  smart-rf                Smart-RF Management Commands
  spanning-tree           Display spanning tree information
  startup-config          Startup configuration
  terminal                Display terminal configuration parameters
  timezone                The timezone
  upgrade-status          Display last image upgrade status
  version                 Display software & hardware version
  wireless                Wireless commands
  wwan                    Display wireless WAN Status

rfs7000-37FABE(config)#

rfs7000-37FABE(config)#
rfs7000-37FABE(config)#show clock
2011-04-30 09:28:29 GMT

PRIVILEGE EXEC Mode
rfs7000-37FABE#show ?
  adoption                Display information related to adoption to wireless
                          controller
  advanced-wips           Advanced WIPS
  ap-upgrade              AP Upgrade
  boot                    Display boot configuration.
  captive-portal          Captive portal commands
  cdp                     Cisco Discovery Protocol
  clock                   Display system clock
  cluster                 Cluster Protocol
  commands                Show command lists
  context                 Information about current context
  critical-resources      Critical Resources
  crypto                  Encryption related commands
  debug                   Show Debugging status
  debugging               Debugging functions
  device-categorization   Device Categorization
  event-history           Display event history
  event-system-policy     Display event system policy
  file                    Display filesystem information
  firewall                Wireless Firewall
  interface               Interface Configuration/Statistics commands
  ip                      Internet Protocol (IP)
  ip-access-list-stats    IP Access list stats
  licenses                Show installed licenses and usage
  lldp                    Link Layer Discovery Protocol
  logging                 Show logging information
  mac-access-list-stats   MAC Access list stats
  mac-address-table       Display MAC address table
  mint                    MiNT protocol
  noc                     Noc-level information
  ntp                     Network time protocol
  password-encryption     Pasword encryption
  power                   Show power over ethernet command
  reload                  Scheduled reload information
  remote-debug            Show details of remote debug sessions
6-6   WiNG CLI Reference Guide


         rf-domain-manager       Show RF Domain Manager selection details
         role                    Role based firewall
         running-config          Current operating configuration
         session-changes         Configuration changes made in this session
         session-config          This session configuration
         sessions                Display CLI sessions
         smart-rf                Smart-RF Management Commands
         spanning-tree           Display spanning tree information
         startup-config          Startup configuration
         terminal                Display terminal configuration parameters
         timezone                The timezone
         upgrade-status          Display last image upgrade status
         version                 Display software & hardware version
         wireless                Wireless commands
         wwan                    Display wireless WAN Status

       rfs7000-37FABE#
       rfs7000-37FABE#show terminal
       rfs7000-37FABE#show terminal
       Terminal Type: xterm
       Length: 24     Width: 80

       USER EXEC Mode
       rfs7000-37FABE>show ?
         adoption                Display information related to adoption to wireless
                                 controller
         advanced-wips           Advanced WIPS
         ap-upgrade              AP Upgrade
         captive-portal          Captive portal commands
         cdp                     Cisco Discovery Protocol
         clock                   Display system clock
         cluster                 Cluster Protocol
         commands                Show command lists
         context                 Information about current context
         critical-resources      Critical Resources
         crypto                  Encryption related commands
         debug                   Show Debugging status
         debugging               Debugging functions
         device-categorization   Device Categorization
         event-history           Display event history
         event-system-policy     Display event system policy
         firewall                Wireless Firewall
         interface               Interface Configuration/Statistics commands
         ip                      Internet Protocol (IP)
         licenses                Show installed licenses and usage
         lldp                    Link Layer Discovery Protocol
         logging                 Show logging information
         mac-address-table       Display MAC address table
         mint                    MiNT protocol
         noc                     Noc-level information
         ntp                     Network time protocol
         password-encryption     Pasword encryption
         power                   Show power over ethernet command
         remote-debug            Show details of remote debug sessions
         rf-domain-manager       Show RF Domain Manager selection details
         role                    Role based firewall
         running-config          Current operating configuration
         session-changes         Configuration changes made in this session
         session-config          This session configuration
         sessions                Display CLI sessions
         smart-rf                Smart-RF Management Commands
         spanning-tree           Display spanning tree information
         startup-config          Startup configuration
         terminal                Display terminal configuration parameters
         timezone                The timezone
         version                 Display software & hardware version
         wireless                Wireless commands
         wwan                    Display wireless WAN Status
SHOW COMMANDS         6-7



rfs7000-37FABE>


rfs7000-37FABE>show wireless ap configured
--------------------------------------------------------------------------
  IDX        NAME         MAC            PROFILE       RF-DOMAIN   ADOPTED-BY
--------------------------------------------------------------------------
1     AP7131-889EC4 00-15-70-88-9E-C4   default-AP7131   default    un-adopted
2     AP650-445566  11-22-33-44-55-66   default-AP650    default     un-adopted
--------------------------------------------------------------------------
rfs7000-37FABE>
6-8   WiNG CLI Reference Guide


 6.1.2 adoption
         show commands
       The adoption command is common to all three modes. It displays information related to APs adopted by a wireless
       controller.
       Supported in the following platforms:
          • AP300
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP71XX
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       show adoption [config-errors|history|info|offline|pending|status]
       show adoption [config-errors <DEVICE-NAME>|history {on <DEVICE-NAME>}|
          info {on <DEVICE-NAME>}|offline|pending {on <DEVICE-NAME>}|
          status {on <DEVICE-NAME>}]
       Parameters
       • show adoption [config-errors <DEVICE-NAME>|history {on <DEVICE-NAME>}|info {on
       <DEVICE-NAME>}|offline|pending {on <DEVICE-NAME>}|status {on-<DEVICE-NAME>}]

        adoption                     Displays an AP adoption history and status. It also displays adopted device configuration
                                     errors.
        config-errors                Displays configuration errors of an AP or all APs adopted by a wireless controller
        <DEVICE-NAME>                • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        history                      Displays adoption history status
        {on <DEVICE-NAME>}           • on <DEVICE-NAME> – Optional. Displays adoption history status on a specified device
                                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        info                         Displays adopted device details
        {on <DEVICE-NAME>}           • on <DEVICE-NAME> – Optional. Displays adoption details on a specified device
                                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        offline                      Displays device’s non-adopted status and its adopted access points
        pending                      Displays details for access points pending adoption, but have to actually connect to
        {on <DEVICE-NAME>}           wireless controller
                                     • on <DEVICE-NAME> – Optional. Displays information on a specified device
                                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        status                       Displays a device’s adoption status
        {on <DEVICE-NAME>}           • on <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller.
SHOW COMMANDS       6-9


Examples
rfs7000-37FABE(config-device-00-15-70-37-FA-BE)#show adoption offline
--------------------------------------------------------------------------
MAC              HOST-NAME           TYPE           RF-DOMAIN
--------------------------------------------------------------------------
 00-15-70-88-9E-C4   AP7131-889EC4     AP7131           default
 11-22-33-44-55-66   AP650-445566      AP650           default
--------------------------------------------------------------------------
Total number of APs displayed: 2
rfs7000-37FABE(config-device-00-15-70-37-FA-BE)#

rfs7000-37FABE(config-adoption-policy-test)#show adoption info
Number of APs adopted : 1
Number of AAPs adopted : 0
Available AP licenses : 49
Available AAP licenses : 50
Device in cluster      : No
Cluster state          : active

--------------------------------------------------------------------------
 MAC               HOST-NAME   TYPE    VERSION       ADOPTED-BY        LAST-ADOPTION
--------------------------------------------------------------------------
00-A0-F8-00-00-00 AP650-000000 AP650 5.2.2.0-048B    00-15-70-37-FA-BE    2010-08-17
23:48:48
--------------------------------------------------------------------------
Total number of APs displayed: 1
rfs7000-37FABE(config-adoption-policy-test)#

rfs7000-37FABE(config)#show adoption history
--------------------------------------------------------------------------
MAC                 TYPE      EVENT          REASON       TIME-STAMP
--------------------------------------------------------------------------
00-23-68-13-9B-34 AP7131    adopted           N.A.  2011-01-01 05:28:14
--------------------------------------------------------------------------
rfs7000-37FABE(config)#
6 - 10 WiNG CLI Reference Guide


  6.1.3 advanced-wips
          show commands
        Displays advanced Wireless Intrusion Prevention Policy (WIPS) settings
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show advanced-wips [configuration|stats]

        show advanced-wips configuration [events {thresholds}|terminate-list]
        show advanced-wips stats [ap-table|client-table|connected-sensors|
           event-history|server-listening-port]
        show advanced-wips stats [detected-aps|detected-clients-for AP <MAC>]
           {[neighboring|sanstioned|unsanctioned]}
        Parameters
        • show advanced-wips configuration [events {thresholds}|terminate-list]

         configuration                Displays advanced WIPS settings
         events thresholds            Displays events summary
                                      Advanced WIPS policies are assigned to wireless controllers and support various events
                                      depending on the configuration. These events are individually triggered against
                                      authorized, unauthorized, and neighboring devices.
                                      • thresholds – Optional. Displays threshold values for each event configured in the
                                         advanced WIPS policy
         terminate-list               Displays the terminate list

        • show advanced-wips stats [ap-table|client-table|connected-sensors|event-
        history|server-listening-port]

         stats                         Displays advanced WIPS statistics
         ap-table                      Displays AP table statistics
         client-table                  Displays station table statistics
         connected-sensors             Displays connected sensors statistics
SHOW COMMANDS 6 - 11



event-history               Displays advanced WIPS event history
server-listening-port       Displays advanced WIPS server listening port statistics

• show advanced-wips stats [detected-aps|detected-clients-for AP <MAC>]
{[neighboring|sanstioned|unsanctioned]}

stats                       Displays advanced WIPS statistics
detected-aps               Displays AP details based on the parameters passed
{neighboring|sanctioned|un • neighboring – Optional. Displays neighboring AP statistics
sanctioned}
                           • sanctioned – Optional. Displays sanctioned AP statistics
                           • unsanctioned – Optional. Displays unsanctioned AP statistics
detected-clients-for-ap     Displays clients statistics for APs
<MAC>                       • <MAC> – Displays clients for a specified AP. Enter the MAC address (BSS-ID) of the AP.
{neighboring|sanctioned|       • neighboring – Optional. Displays neighboring client information
unsanctioned}                  • sanctioned – Optional. Displays sanctioned client information
                               • unsanctioned – Optional. Displays unsanctioned client information
Examples
rfs7000-37FABE(config)#show advanced-wips configuration events
+------+----+---------------------------------------------+----------+----
|POLICY|SLNO|NAME|AUTHORIZED|UNAUTHORIZED|NEIGHBORING|
+------+----+---------------------------------------------+----------+----
Trigger-S: Trigger against Sanctioned devices enabled(Y)/disabled(N)
Trigger-U: Trigger against Unsanctioned devices enabled(Y)/disabled(N)
Trigger-N: Trigger against Neighboring devices enabled(Y)/disabled(N)
                                     | -        | -          | -         |
+------+----+---------------------------------------------+----------+----
rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show advanced-wips configuration events thresholds
+--------+-----+--------------------------+--------------------------+----
| POLICY | # |            EVENT           |        THRESHOLD         | VALUE                                 |
+--------+-----+--------------------------+--------------------------+----
| test   | 1   | dos-eapol-logoff-storm   | eapol-start-frames-ap    | 9                                     |
| test   | 2   | dos-eapol-logoff-storm   | eapol-start-frames-mu    | 99                                    |
| test   | 3   | dos-cts-flood            | cts-frames-ratio         | 8                                     |
| test   | 4   | dos-cts-flood            | mu-rx-cts-frames         | 20                                    |
+--------+-----+--------------------------+--------------------------+----
rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show advanced-wips stats detected-stations-for-ap 11-22-33-44-
55-66 authorized
Number of stations associated to the AP 11-22-33-44-55-66: 0
rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show advanced-wips stats client-table
Number of clients: 2
rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show advanced-wips configuration events thresholds
--------------------------------------------------------------------------
  POLICY     #            EVENT                    THRESHOLD             VALUE
--------------------------------------------------------------------------
  test     1     probe-response-flood       probe-rsp-frames-count     50
  test     2     dos-cts-flood              cts-frames-ratio           70
  test     3     dos-cts-flood              mu-rx-cts-frames           20
  test     4     dos-eapol-logoff-storm     eapol-start-frames-ap      10
------------------------------------------------------------------------
rfs7000-37FABE(config)#
6 - 12 WiNG CLI Reference Guide


  6.1.4 ap-upgrade
          show commands
        Displays AP firmware image upgrade information
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show ap-upgrade [history {on <RF-DOMAIN-NAME>}|load-image-status|status
           {on [<RF-DOMAIN-NAME>|<RF-DOMAIN-MANAGER>]}|versions {on <RF-DOMAIN-MANAGER>}]
        Parameters
        • show ap-upgrade [history {on <RF-DOMAIN-NAME>}|load-image-status|status
        {on [<RF-DOMAIN-NAME>|<RF-DOMAIN-MANAGER>]|versions {<RF-DOMAIN-MANAGER>}]

         ap-upgrade                     Displays AP firmware upgrade details
         history                        Displays AP firmware upgrade history (AP address, upgrade result, time of upgrade,
         {on <RF-DOMAIN-NAME>}          number of retries, upgrade by etc.)
                                        • on <RF-DOMAIN-NAME> – Optional. Displays device firmware upgrade history in a
                                           RF Domain
                                           • <RF-DOMAIN-NAME> – Specify the RF Domain name.
         load-image-status              Displays firmware image download status on a device
         status                         Displays AP firmware upgrade status
         on {<RF-DOMAIN-NAME>|          • on – Optional. Displays firmware upgrade status on a RF Domain or RF Domain
         <RF-DOMAIN-MANAGER>}              manager
                                           • <RF-DOMAIN-NAME> – Optional. Specify the RF Domain name.
                                           • <RF-DOMAIN MANAGER> – Optional. Specify the RF Domain manager name.
         versions                       Displays upgrade image versions
         {on <RF-DOMAIN-                • on <RF-DOMAIN-MANAGER> – Optional. Displays upgrade image versions on
         MANAGER>}                         devices adopted by a RF Domain manager
SHOW COMMANDS 6 - 13


Examples
rfs7000-37FABE(config)#show ap-upgrade history
------------------------------------------------------------------------------------
AP         RESULT     TIME         RETRIES      UPGRADED-BY    LAST-UPDATE-ERROR
------------------------------------------------------------------------------------
 00-04-96-44-54-C0        done 2011-03-31 02:06:39        0                00-04-96-
42-14-79 -
 00-04-96-44-54-C0        done 2011-04-14 00:46:52        0                00-04-96-
42-14-79 -
 00-04-96-44-54-C0        done 2011-04-25 00:12:00        0                00-04-96-
42-14-79 -
 00-04-96-44-54-C0        done 2011-04-28 07:17:38        0                00-04-96-
42-14-79 -
 00-04-96-44-54-C0        done 2011-05-04 12:15:31        0                00-04-96-
42-14-79 -
Total number of entries displayed: 5
6 - 14 WiNG CLI Reference Guide


  6.1.5 boot
          show commands
        Displays a device’s boot configuration. Use the on command to view a remote device’s boot configuration.



                       NOTE: This command is not present in the USER EXEC Mode.



        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show boot {on <DEVICE-NAME>}
        Parameters
        • show boot {on <DEVICE-NAME>}

         boot                           Displays primary and secondary image boot configuration details (build date, install
                                        date, version, and the image used to boot the current session)
         on <DEVICE-NAME>               Optional. Displays boot configuration information on a specified device
                                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE(config)#show boot on rfs7000-37FABE
        --------------------------------------------------------------------------
             IMAGE            BUILD DATE             INSTALL DATE          VERSION
        --------------------------------------------------------------------------
          Primary       2011-05-10 09:58:17     2010-02-07 10:33:55     5.2.0.0-026D
          Secondary     2011-06-10 21:29:31     2011-06-15 14:21:17     5.2.0.0-033D
        --------------------------------------------------------------------------
        Current Boot       : Secondary
        Next Boot          : Secondary
        Software Fallback : Enabled

        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 15


6.1.6 captive-portal
        show commands
     Displays WLAN hotspot information
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     show captive-portal client {filter|on}

     show captive-portal client              {filter [captive-portal|ip|state|vlan|wlan]}
     show captive-portal client              {filter captive-portal [<CAPTIVE-PORTAL>|
        not <CAPTIVE-PORTAL>]}]
     show captive-portal client              {filter ip [<IP>|not <IP>]}
     show captive-portal client              {filter state [not[pending|success]
        |pending|success]}
     show captive-portal client              {filter vlan [<VLAN>|not <VLAN>]}
     show captive-portal client              {filter wlan [<WLAN>|not <WLAN>]}
     show captive-portal client              {on <DEVICE-OR-DOMAIN-NAME> {filter {captive-portal|
        ip|state|vlan|wlan}}
     Parameters
     • show captive-portal client {filter captive-portal [<CAPTIVE-PORTAL>|
     not <CAPTIVE-PORTAL>]}

      captive-portal client         Displays captive portal client information
      filter                        Optional. Defines additional filters
      captive-portal                Optional. Displays a specified captive portal client information
      [<CAPTIVE-PORTAL>|            • <CAPTIVE-PORTAL> – Specify the captive portal name.
      not <CAPTIVE-PORTAL>]
                                    • not <CAPTIVE-PORTAL> – Inverts the match selection
     • show captive-portal client {filter ip [<IP>|not <IP>]}

      captive-portal client          Displays captive portal client information
      filter                         Optional. Defines additional filters
      ip [<IP>|not <IP>]             Displays captive portal client information based on the IP address passed
                                     • <IP> – Specify the IP address.
                                     • not <IP> – Inverts the match selection
6 - 16 WiNG CLI Reference Guide


        • show captive-portal client {filter state [not [pending|success]|
        pending|success]}

         captive-portal client          Displays captive portal client information
         filter                         Optional. Defines additional filters
         state not [pending|success]]   Optional. Filters clients based on their authentication state
                                        • not – Inverts match selection
                                          • pending – Displays clients successfully authenticated (Opposite of pending authen-
                                          tication)
                                          • success – Displays clients redirected for authentication (Opposite of successful au-
                                          thentication)
         state [pending|success]]       Optional. Filters clients based on their authentication state
                                        • pending – Displays clients redirected for authentication
                                        • success – Displays clients successfully authenticated

        • show captive-portal client {filter vlan [<VALN-ID>|not <VLAN-ID>]}

         captive-portal client          Displays captive portal client information
         filter                         Optional. Defines additional filters
         vlan [<VLAN>|                  Optional. Displays clients on a specified VLAN
         not <VLAN>]                    • <VLAN> – Specify the VLAN ID.
                                        • not <VLAN> – Inverts match selection
        • show captive-portal client {filter wlan [<WALN-ID>|not <WLAN-ID>]}

         captive-portal client          Displays captive portal client information
         filter                         Optional. Defines additional filters
         wlan [<WLAN>|                  Optional. Displays clients on a specified WLAN
         not <WLAN>]                    • <WLAN> – Specify the WLAN ID.
                                        • not <WLAN> – Inverts match selection
        • show captive-portal client {on <DEVICE-OR-DMAIN-NAME> filter [captive-
        portal|ip|state|vlan|wlan]}

         captive-portal client           Displays captive portal client information
         on <DEVICE-OR-DOMAIN-           Optional. Displays captive portal clients on a specified device or RF Domain
         NAME>                           • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                           RF Domain.
         filter                          Optional. Defines additional filters
                                         • captive-portal – Optional. Displays client information for a specified captive portal
                                         • ip – Optional. Displays captive portal client information based on the IP address
                                           passed
                                         • state – Optional. Displays client information based on the their authentication state
                                         • vlan – Displays clients on a specified VLAN
                                         • wlan – Optional. Displays clients on a specified WLAN
SHOW COMMANDS 6 - 17


Examples
rfs7000-37FABE(config)#show captive-portal client on RFS7000-421479
------------------------------------------------------------------------------------
CLIENT     IP        CAPTIVE-PORTAL       WLAN       VLAN    STATE      SESSION TIME
------------------------------------------------------------------------------------
------------------------------------------------------------------------------------
Total number of captive portal clients displayed: 0
6 - 18 WiNG CLI Reference Guide


  6.1.7 cdp
           show commands
        Displays the Cisco Discovery Protocol (CDP) neighbor table
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show cdp [neighbors|report] {detail {on <DEVICE-OR-DOMAIN-NAME>}|
        on <DEVICE-OR-DOMAIN-NAME>}
        Parameters
        • show cdp [neighbors|report] {detail {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-OR-
        DOMAIN-NAME>}

         cdp [neighbors|report]      Displays CDP neighbors table or aggregated CDP neighbors table
         detail                      Optional. Displays CDP neighbors table or aggregated CDP neighbors table details
         {on <DEVICE-OR-             • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays table details on a specified
         DOMAIN-NAME>}                 device or RF Domain
                                       • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                       RF Domain.
         on <DEVICE-OR-              Optional. Displays table details on a specified device or domain (This option does not
         DOMAIN-NAME>                display detailed information)
                                     • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                        RF Domain.
SHOW COMMANDS 6 - 19


Examples
The following example displays CDP neighbors table in detail.

rfs7000-37FABE(config)#show cdp neighbors detail on rfs7000-37FABE
-------------------------
Device ID: RFS4000-229D58
Entry address(es):
  IP Address: 172.16.10.6
  IP Address: 169.254.157.88
Platform: RFS-4010-00010-WR, Capabilites: Router Switch
Interface: ge1, Port ID (outgoing port): ge1
Hold Time: 173 sec

advertisement version: 2
Native VLAN: 1
Duplex: full
Version :
5.2.2.0-048B
-------------------------
Device ID: rfs6000-380649
Entry address(es):
  IP Address: 2.2.2.2
  IP Address: 172.16.10.4
Platform: RFS6000, Capabilites: Router Switch
Interface: ge1, Port ID (outgoing port): ge1
Hold Time: 173 sec

advertisement version: 2
--More--
rfs7000-37FABE(config)#

The following example shows a non-detailed CDP neighbors table.

rfs7000-37FABE(config)#show cdp neighbors on rfs7000-37FABE
--------------------------------------------------------------------------
   Device ID    Neighbor IP       Platform      Local Intrfce Port ID    Duplex
--------------------------------------------------------------------------
 rfs4000-229D58 172.16.10.6 RFS-4010-00010-WR ge1               ge1      full
 rfs6000-380649 2.2.2.2       RFS6000            ge1            ge1      full
--------------------------------------------------------------------------
rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show cdp neighbors on rfs7000-37FABE
--------------------------------------------------------------------------------
   Device ID      Neighbor IP     Platform Local Intrfce Port ID       Duplex
--------------------------------------------------------------------------------
 ap650-4454C0 169.254.84.192 AP650-ROW ge8               ge1      full
--------------------------------------------------------------------------------
6 - 20 WiNG CLI Reference Guide


  6.1.8 clock
           show commands
        Displays a system’s clock
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show clock {on <DEVICE-NAME>}
        Parameters
        • show clock {on <DEVICE-NAME>}

         clock                         Displays a system’s clock
         on <DEVICE-NAME>              Optional. Displays system clock on a specified device
                                       • <DEVICE-NAME> – Specify the name of the AP, wireless controller, or RF Domain.
        Examples
        rfs7000-37FABE(config)#show clock
        2011-06-21 14:14:49 IST
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 21


6.1.9 cluster
        show commands
     Displays cluster information (cluster configuration parameters, members, status etc.)
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     show cluster [configuration|members {detail}|status]
     Parameters
     • show cluster [configuration|members {detail}|status]

      cluster                       Displays cluster information
      configuration                 Displays cluster configuration parameters
      members {detail}              Displays cluster members configured on the logged device
                                    • detail – Optional. Displays detailed information of known cluster members
      status                        Displays cluster status
6 - 22 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config)#show cluster configuration
        Cluster Configuration Information
         Mode                             : Active
         Number of peer(s)                : 0
         Auto revert                      : Disabled
         Auto revert interval (Mins)      : 5
         Controller AP license                : 0
         Controller AAP license               : 0
         Controller max AP adoption capacity : 1024

        Cluster Runtime Information
         Cluster protocol version           :   1
         Cluster run state                  :   active
         Cluster AP license                 :   0
         Cluster AAP license                :   0
         Controller AP count                      : 0
         Controller AAP count                     : 0
         Cluster AP count                   :   0
         Cluster AAP count                  :   0
         Cluster max AP adoption capacity   :   1024
         Number of connected peer(s)        :   0

        rfs7000-37FABE(config)#show cluster members detail
        +-------------+-------------------+--------+--------+---------+----------|      ID |
        MAC | MODE |AP COUNT|AAP COUNT|AP LICENSE|AAP LICENSE|      VERSION   |
        +-------------+-------------------+--------+--------+---------+----------|
        70.37.fa.be | 00-15-70-37-FA-BE | Active | 0   | 0      | 0      | 0  | Unknown     |
        +-------------+-------------------+--------+--------+---------+----------+
SHOW COMMANDS 6 - 23


6.1.10 commands
       show commands
     Displays commands available for the current mode
     Supported in the following platforms:
        • AP300
        • AP621
        • AP650
        • AP6511
        • AP6521
        • AP6532
        • AP71XX
        • RFS4000
        • RFS6000
        • RFS7000
     Syntax
     show commands
     Parameters
     None
     Examples
     rfs7000-37FABE(config)#show commands
         help
       help search WORD (|detailed|only-show|skip-show)
       show commands
       show debugging (|(on DEVICE-OR-DOMAIN-NAME))
       show debugging cfgd
       show debugging wireless (|(on DEVICE-OR-DOMAIN-NAME))
       show debugging voice (|(on DEVICE-OR-DOMAIN-NAME))
       show debugging captive-portal (|(on DEVICE-OR-DOMAIN-NAME))
       show debugging dhcpsvr (|(on DEVICE-NAME))
       show debugging mstp (|(on DEVICE-OR-DOMAIN-NAME))
       show debugging advanced-wips
       show debugging vpn (|(on DEVICE-NAME))
       show debugging radius (|(on DEVICE-NAME))
       show (running-config|session-config) (|include-factory)
       show running-config interface (|`WORD|ge <1-4>|me1|pc <1-4>|vlan <1-4094>')
     (|include-factory)
       show running-config wlan WLAN (|include-factory)
       show (running-config) device (self|DEVICE-NAME) (|include-factory)
       show session-changes
       show startup-config (|include-factory)
       show adoption info (|(on DEVICE-NAME))
       show adoption offline
       show licenses
       show password-encryption status
       show debug xpath get WORD (|WORD)
       show debug xpath count WORD
       show debug xpath list WORD
       show rf-domain-manager
       show timezone
       show event-history
       show ntp status
       show ntp associations (|detail)
       show device-categorization summary
       show wireless ap (|(on DEVICE-OR-DOMAIN-NAME))
6 - 24 WiNG CLI Reference Guide


          show wireless ap configured
          show wireless ap detail (|WORD)
          show wireless unsanctioned aps (|(on DEVICE-OR-DOMAIN-NAME))
          show wireless unsanctioned aps detailed (|(on DEVICE-OR-DOMAIN-NAME))
          show wireless unsanctioned aps statistics (|(on DEVICE-OR-DOMAIN-NAME))
          show wireless client (|(on DEVICE-OR-DOMAIN-NAME)) (|(filter {|(state (|not) (data-
        ready|roaming))|(wlan (|not) WLAN)|(ip (|not) A.B.C.D)}))
          show wireless client detail AA-BB-CC-DD-EE-FF (|(on DEVICE-OR-DOMAIN-NAME))
          show wireless client statistics (|traffic) (|(on DEVICE-OR-DOMAIN-NAME))
          show wireless client statistics rf (|(on DEVICE-OR-DOMAIN-NAME))
        ...............................................
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 25


6.1.11 context
         show commands
      Displays the current context details
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show context {include-factory|session-config {include-factory}}
      Parameters
      • show context {include-factory|session-config {include-factory}}

       include-factory                Optional. Includes factory defaults
       session-config                 Optional. Displays running system information in the current context
       include-factory                • include-factory – Optional. Includes factory defaults
      Examples
      rfs7000-37FABE>show context include-factory
      !
      ! Configuration of RFS7000 version 5.2.2.0-048B
      !
      !
      version 2.1
      !
      !
      firewall-policy default
        ip dos smurf log-and-drop log-level warnings
        ip dos twinge log-and-drop log-level warnings
        ip dos invalid-protocol log-and-drop log-level warnings
        ip dos router-advt log-and-drop log-level warnings
        ip dos router-solicit log-and-drop log-level warnings
        ip dos option-route log-and-drop log-level warnings
        ip dos ascend log-and-drop log-level warnings
        ip dos chargen log-and-drop log-level warnings
        ip dos fraggle log-and-drop log-level warnings
        ip dos snork log-and-drop log-level warnings
        ip dos ftp-bounce log-and-drop log-level warnings
        ip dos tcp-intercept log-and-drop log-level warnings
        ip dos broadcast-multicast-icmp log-and-drop log-level warnings
        ip dos land log-and-drop log-level warnings
        ip dos tcp-xmas-scan log-and-drop log-level warnings
      --More--
      rfs7000-37FABE>
6 - 26 WiNG CLI Reference Guide


6.1.12 critical-resources
           show commands
        Displays critical resource information. Critical resources are resources vital to the wireless controller managed network.
        Some critical resources are security spanning routers, switches, firewalls, VPNs, VLANs, WiFi access points etc.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show critical-resources {on <DEVICE-NAME>}
        Parameters
        • show critical-resources {on <DEVICE-NAME>}

         critical-resources             Displays critical resource information
         on <DEVICE-NAME>               Optional. Displays critical resource information on a specified device
                                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        RFS4000-22CDAA(config)#sh critical-resources on RFS4000-22CDAA
        --------------------------------------------------------------------------
        CRITICAL RESOURCE IP        VLAN          PING-MODE            STATE
        --------------------------------------------------------------------------
        172.168.1.103                1             arp-icmp             up
SHOW COMMANDS 6 - 27


6.1.13 crypto
        show commands
      Displays encryption mode information
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show crypto [ipsec|isakmp|key|pki]

      show crypto [ipsec|isakmp] sa {on <DEVICE-NAME>}
      show crypto key rsa {on <DEVICE-NAME>|public-key-detail {on <DEVICE-
         NAME>}
      show crypto pki trustpoints {<TRUSTPOINT> {on <DEVICE-NAME>}|
         all {on <DEVICE-NAME>}|on <DEVICE-NAME>}
      Parameters
      • show crypto [ipsec|isakmp] sa {on <DEVICE-NAME>}

       crypto [ipsec|isakmp] sa       Displays encryption information
                                      • ipsec – Displays Internet Protocol Security (IPSec) statistics. The IPSec encryption
                                         authenticates and encrypts each IP packet in a communication session.
                                      • isakmp – Displays Internet Security Association and Key Management Protocol
                                         (ISAKMP) statistics. The ISAKMP protocol provides a means of authentication and key
                                         exchange.
                                      The following is common to the IPSec and ISAKMP parameters:
                                         • sa – Displays all IPSec or ISAKMP Security Associations (SA)
       on <DEVICE-NAME>               Optional. Displays IPSec or ISAKMP SAs on a specified device
                                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

      • show crypto key rsa {on <DEVICE-NAME>|public-key-detail {on <DEVICE-NAME>}}

       crypto key                     Displays key management operations
6 - 28 WiNG CLI Reference Guide



         rsa {on <DEVICE-NAME>}   Displays RSA public keys
                                  • on <DEVICE-NAME> – Optional. Displays RSA public keys on a specified device
                                     • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         public-key-detail        Displays public key in the Privacy Enhanced Mail (PEM) format
         {on <DEVICE-NAME>}       • on <DEVICE-NAME> – Optional. Displays public key on a specified device
                                     • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • show crypto pki trustpoints {<TRUSTPOINT> {on <DEVICE-NAME>}|all {on <DEVICE-
        NAME>}|on <DEVICE-NAME>}

         crypto pki               Displays Public Key Infrastructure (PKI) commands
         trustpoints              Displays WLAN trustpoints
         <TRUSTPOINT>             Optional. Displays a specified trustpoint. Specify the trustpoint name.
         {on <DEVICE-NAME>}       • on <DEVICE-NAME> – Optional. Displays trustpoint details on a specified device
                                    • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         all {on <DEVICE-NAME>}   Optional. Displays all trustpoints
                                  • on <DEVICE-NAME> – Optional. Displays all trustpoints configured on a specified
                                    device
                                    • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         on <DEVICE-NAME>         Optional. Displays trustpoints configured on a specified device
                                  • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE(config)#show crypto key rsa public-key-detail on rfs7000-37FABE

        RSA key name: default-trustpoint-srvr-priv-key   Key-length: 1024
        -----BEGIN PUBLIC KEY-----
        MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDGHBR2bxLeRZ4G6hm7jHJRSaeE
        A216r4s4qptiSld+rKeMiHPtFbyELedk3dITkzF1EU7Ov0vKzant0pyAmdJ8ci//
        wSQMmZjX3RwF9OFBRp2C09LFj?1VX2fsoD6xXhJHBLieJ9qzF+ZQ2CYG7+r29P/o
        3rfr/GLaTN3C6RIWvQIDAQAB
        -----END PUBLIC KEY-----


        RSA key name: default_rsa_key        Key-length: 1024
        -----BEGIN PUBLIC KEY-----
        MIGdMA0GCSqGSIb3DQEBAQUAA4GLADCBhwKBgQCwXXWGE9j/i3EiSjnY9x1Ktsbt
        rzgqB1KhlShWIgnWqlxjzvO6S?GmBPG5XqBS3rKqIzrgh6fXF2cNJZweWgc1QktL
        AoZN/MeCiGVGiJZmtmyKlHPMgyyLGqm6krvWFfOdqlA85+WdQyvDsevTVVp/OiEB
        al4SsIvMG+U/UQaI1wIBIw==
        -----END PUBLIC KEY-----

        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show crypto key rsa on rfs7000-37FABE
        +------------+-------------------------------------------+----------------
        |     #      |                  KEY NAME                 |      KEY LENGTH     |
        +------------+-------------------------------------------+----------------
        | 1          | default-trustpoint-srvr-priv-key          | 1024                |
        | 2          | default_rsa_key                           | 1024                |
        +------------+-------------------------------------------+---------------------+
        rfs7000-37FABE(config)#
        rfs7000-37FABEconfig)#show crypto pki trustpoints all on rfs7000-37FABE

        Trustpoint Name: default-trustpoint                   (self signed)
SHOW COMMANDS 6 - 29


--------------------------------------------------------------------------
  CRL present: no
  Server Certificate details:
    Key used: default-trustpoint-srvr-priv-key
    Serial Number: 0671
    Subject Name:
      C=US, ST=CA, L=San Jose, O=Enterprise Mobility, OU=EWLAN, CN=Motorola
    Issuer Name:
      C=US, ST=CA, L=San Jose, O=Enterprise Mobility, OU=EWLAN, CN=Motorola
    Valid From : Tue Sep 22 16:19:51 2009 UTC
    Valid Until: Wed Sep 22 16:19:51 2010 UTC


rfs7000-37FABE(config)#
rfs7000-37FABE(config)#show crypto pki trustpoints all

Trustpoint Name: default-trustpoint        (self signed)
--------------------------------------------------------------------------
  CRL present: no
  Server Certificate details:
    Key used: default-trustpoint-srvr-priv-key
    Serial Number: 0671
    Subject Name:
      C=US, ST=CA, L=San Jose, O=Enterprise Mobility, OU=EWLAN, CN=Motorola
    Issuer Name:
      C=US, ST=CA, L=San Jose, O=Enterprise Mobility, OU=EWLAN, CN=Motorola
    Valid From : Tue Sep 22 16:19:51 2009 UTC
    Valid Until: Wed Sep 22 16:19:51 2010 UTC

rfs7000-37FABE(config)#
6 - 30 WiNG CLI Reference Guide


6.1.14 debug
          show commands
        Displays debugging status of the DPD2 module, profile functions, and XPath operations
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show debug [dpd2|profile|xpath]

        show debug dpd2 {on <DEVICE-NAME>}
        show debug profile <WORD> {arg <WORD>}

        show debug xpath [count|get|list]

        show debug xpath [count|list] <WORD>

        show debug xpath get <WORD> {option|param <WORD> option} [do-profiling|
           no-pretty|show-tail-only|use-generator|use-streaming]
        Parameters
        • show debug dpd2 {on <DEVICE-NAME>}

         debug dpd2                    Displays DPD2 module debugging status
         on <DEVICE-NAME>              Optional. Displays the debugging status on a specified device
                                       • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        • show debug profile <WORD> {arg <WORD>}

         debug profile <WORD>          Displays profile function debugging status
         {arg <WORD>}                  • <WORD> – Specify the name of the profile function.
                                          • arg <WORD> – Optional. Specify arguments for the function in a single word,
                                          separated by a coma (for example. cli,[3,4]).

        • show debug xpath [count|list] <WORD>

         debug xpath                   Displays XPath-based operation debugging status
SHOW COMMANDS 6 - 31



count <WORD>          Prints the number of items under an XPath node
                      • <WORD> – Specify the XPath node. (for example, /wing-stats/device/self/interface)
list <WORD>           Lists the names (keys) under an XPath node
                      • <WORD> – Specify the XPath node. (for example, /wing-stats/device/self/interface)

• show debug xpath get <WORD> {option|param <WORD> option} [do-profiling|
no-pretty|show-tail-only|use-generator|use-streaming]

debug xpath           Displays XPath-based operation debugging status
get <WORD>            Prints the XPath node value based on the options passed
                      • <WORD> – Specify the XPath node. (for example, /wing-stats/device/self/interface)
option                Optional. Prints the XPath node value based on the options passed
                      Select one of the following options:
                      • do-profiling – Performs profiling
                      • no-pretty – Disables pretty for speed
                      • show-tail-only – Displays only the tail of the result
                      • use-generator – Performs streaming using generator interface
                      • use-streaming – Uses streaming interface
param <WORD> option   Optional. Prints the XPath node value based on the options passed
                      • <WORD> – Specify the parameter in the dictionary format (for example,
                        rf_domain_name:a_name,dummy_name:dummy_value)
                        • option – After entering the parameter, select one of the following options:
                           • do-profiling – Performs profiling
                           • no-pretty – Disables pretty for speed
                           • show-tail-only – Displays only the tail of the result
                           • use-generator – Performs streaming using generator interface
                           • use-streaming – Uses streaming interface
6 - 32 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config)#show debug xpath count /wing-stats
        Success: 4
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show debug xpath get word option do-profiling no-pretty
        Wed Jun 22 09:28:34 2011    /var/profile

                   26 function calls in 0.001 CPU seconds

           Ordered by: standard name
           ncalls tottime percall cumtime percall filename:lineno(function)
                 1    0.000    0.000     0.001     0.001 <string>:1(<module>)
               1    0.000     0.000    0.001     0.001 cluster_db_api.py:36(cluster_db_get_api)
              1    0.000    0.000    0.001    0.001 debugcli.py:163(debug_xpath_get_stats_body)
                 2    0.000    0.000     0.000     0.000 log.py:133(dlog)
                 1    0.000    0.000     0.000     0.000 re.py:144(sub)
                 1    0.000    0.000     0.000     0.000 re.py:227(_compile)
                 1    0.000    0.000     0.000     0.000 utils.py:174(dlog_stats)
                 1    0.000    0.000     0.000     0.000 utils.py:186(dlog_snmp)
                 1    0.000    0.000     0.000     0.000 xpath_parser.py:104(__init__)
                 1    0.000    0.000     0.000     0.000 xpath_parser.py:124(splitsegments)
                 1    0.000    0.000     0.000     0.000 xpath_parser.py:194(stripFilters)
                 1    0.000    0.000     0.000     0.000 xpath_parser.py:6(__init__)
                 1    0.000    0.000     0.000     0.000 {built-in method sub}
                 1    0.000    0.000     0.000     0.000 {isinstance}
                 2    0.000    0.000     0.000     0.000 {len}
                 2    0.000    0.000     0.000     0.000 {method 'append' of 'list' objects}
                1    0.000    0.000     0.000    0.000 {method 'disable' of '_lsprof.Profiler'
        objects}
                 1    0.000    0.000     0.000     0.000 {method 'find' of 'str' objects}
                 3    0.000    0.000     0.000     0.000 {method 'get' of 'dict' objects}
                 2    0.000    0.000     0.000     0.000 {method 'startswith' of 'str' objects}


        done profiling
        rfs7000-37FABE(config)#

        rfs7000-37FABEconfig)#show debug xpath list /wing-stats
        Success: ['device', 'rf_domain', 'noc']
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 33


6.1.15 debugging
        show commands
      Displays debugging information
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show debugging {advanced-wips|captive-portal|cfgd|dhcpsvr|mint|mstp|
         nsm|on|radius|snmp|voice|vpn|wireless}
      show debugging {[advanced-wips|cfgd]}
      show debugging {[captive-portal|mint|mstp|nsm|voice|wireless]}
         {on <DEVICE-OR-DOMAIN-NAME>}
      show debugging {on <DEVICE-OR-DOMAIN-NAME>}
      show debugging {dhcpsvr|radius|snmp|vpn} {on <DEVICE-NAME>}
      Parameters
      • show debugging {advanced-wips|cfgd}

       debugging                       Displays debugging processes in progress based on the parameters passed
       {advanced-wips|cfgd}            • advanced-wips – Optional. Displays the advanced WIPS module’s debugging
                                          configuration
                                       • cfgd – Optional. Displays the cfgd process debugging configuration
6 - 34 WiNG CLI Reference Guide


        • show debugging {captive-portal|mint|mstp|nsm|voice|wireless} {on <DEVICE-OR-DOMAIN-
        NAME>}

         debugging                   Displays debugging processes in progress based on the parameters passed
         {captive-portal|            • captive-portal – Optional. Displays the hotspot (HSD) module’s debugging
         mint|mstp|nsm|voice|           configuration
         wireless}
                                     • mint – Optional. Displays the MiNT module’s debugging configuration
                                     • mstp – Optional. Displays the Multiple Spanning Tree (MST) module’s debugging
                                        configuration
                                     • nsm – Optional. Displays Network Service Module (NSM) debugging configuration
                                     • voice – Optional. Displays the voice module’s debugging configuration
                                     • wireless – Optional. Displays the wireless module’s debugging configuration
         on <DEVICE-OR-DOMAIN-       The following are common to all of the above options:
         NAME>                       • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays debugging processes on a
                                       device or RF Domain.
                                       • <DEVICE-OR-DOMAIN-NAME> – The name of the AP, wireless controller, or
                                       RF Domain.

        • show debugging {dhcpsvr|radius|snmp|vpn} {on <DEVICE-NAME>}

         debugging                   Displays debugging processes in progress based on the parameters passed
         {dhcpsvr|radius|snmp|       • dhcpsvr – Optional. Displays the DHCP server configuration module’s debugging
         vpn}                           information
                                     • radius – Optional. Displays the RADIUS server configuration module’s debugging
                                        information
                                     • snmp – Optional. Displays the Simple Network Management Protocol (SNMP)
                                        module’s debugging information
                                     • vpn – Optional. Displays the VPN module’s debugging information
                                     • snmp – Optional. Displays the SNMP module’s debugging information
         on <DEVICE-NAME>            The following are common to all of the above options:
                                     • on <DEVICE-NAME> – Optional. Displays debugging processes on a specified device
                                       • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • show debugging {on <DEVICE-OR-DOMAIN-NAME>}

         debugging {on <DEVICE-OR-   Displays all debugging processes in progress on a specified device or RF Domain.
         DMAIN-NAME>}                • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays debugging processes in
                                        progress, on a device or RF Domain
                                        • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller,
                                        or RF Domain.
SHOW COMMANDS 6 - 35


Examples
rfs7000-37FABE(config)#show debugging cfgd
cfgd:
        config debugging is on
        cluster debugging is on
rfs7000-37FABE(config)#
6 - 36 WiNG CLI Reference Guide


6.1.16 device-categorization
          show commands
        Displays device categorization summary
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show device-categorization summary
        Parameters
        • show device-categorization summary

         device-categorization           Displays device categorization summary
         summary
        Examples
        rfs7000-37FABE(config)#show device-categorization summary
        --------------------------------------------------------------------------
             POLICY        #           A/N       AP/CLIENT        MAC          SSID
        --------------------------------------------------------------------------
        DEVICE-CATEGORIZATION   1   sanctioned    client 00-40-96-B0-BA-2D     -
        DEVICE-CATEGORIZATION   2   neighboring   client 00-40-96-B0-BA-2A     -
        DEVICE-CATEGORIZATION   3   sanctioned      ap    00-23-68-31-12-65   ASDF
        --------------------------------------------------------------------------
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 37


6.1.17 event-history
         show commands
      Displays event history report
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show event-history {on <DEVICE-OR-DOMAIN-NAME>}
      Parameters
      • show event-history {on <DEVICE-OR-DOMAIN-NAME>}

       event-history                     Displays event history report
       on <DEVICE-OR-DOMAIN-             Optional. Displays event history report on a device or RF Domain
       NAME>                             • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller,
                                           or RF Domain.
      Examples
      rfs7000-37FABE(config)#show event-history
      EVENT HISTORY REPORT
      Generated on '2011-06-22 12:50:10 IST' by 'admin'

      2011-06-22 10:28:22      00-15-70-37-FA-BE SYSTEM    LOGIN                                     Successfully
      logged in User: 'admin' with privilege 'superuser' from 'ssh'
      2011-06-22 10:25:01        00-15-70-37-FA-BE SYSTEM     LOGOUT                                         Logged
      out User: 'admin' with privilege 'superuser' from '172.16.10.10'
      2011-06-22 09:39:35       00-15-70-37-FA-BE NSM        IFUP                                        Interface
      ge3 is up
      2011-06-22 09:39:34       00-15-70-37-FA-BE NSM        IFUP                                        Interface
      ge3 is up
      2011-06-22 09:37:16       00-15-70-37-FA-BE NSM       IFDOWN                                       Interface
      ge3 is down
      2011-06-22 07:24:21      00-15-70-37-FA-BE SYSTEM    LOGIN                                     Successfully
      logged in User: 'admin' with privilege 'superuser' from 'ssh'
      2011-06-22 07:01:54       00-15-70-37-FA-BE NSM        IFUP                                        Interface
      ge3 is up
      2011-06-22 07:01:53       00-15-70-37-FA-BE NSM        IFUP                                        Interface
      ge3 is up
      2011-06-22 07:01:35       00-15-70-37-FA-BE NSM       IFDOWN                                       Interface
      ge3 is down
      2011-06-22 07:01:18       00-15-70-37-FA-BE NSM        IFUP                                        Interface
      ge3 is up
      --More--
      rfs7000-37FABE(config)#
6 - 38 WiNG CLI Reference Guide


6.1.18 event-system-policy
           show commands
        Displays detailed event system policy configuration
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show event-system-policy [config|detail] <EVENT-SYSTEM-POLICY>
        Parameters
        • show event-system-policy [config|detail] <EVENT-SYSTEM-POLICY>

         event-system-policy          Displays event system policy configuration
         config                       Displays configuration for a specified policy
         detail                       Displays detailed configuration for a specified policy
         <EVENT-SYSTEM-POLICY>        Specify the event system policy name.
        Examples
        rfs7000-37FABE(config)#show event-system-policy config testpolicy
        --------------------------------------------------------------------------
        MODULE          EVENT            SYSLOG    SNMP   FORWARD         EMAIL
        --------------------------------------------------------------------------
        aaa       radius-discon-msg      on        on      on         default
        --------------------------------------------------------------------------
        rfs7000-37FABE(config)#
        rfs7000-37FABE
SHOW COMMANDS 6 - 39


6.1.19 file
          show commands
       Displays file system information



                      NOTE: This command is not available in the USER EXEC Mode.



       Supported in the following platforms:
          • AP300
          • AP621
          • AP650
          • AP6511
          • AP6521
          • AP6532
          • AP71XX
          • RFS4000
          • RFS6000
          • RFS7000
       Syntax
       show file [information <FILE>|systems]
       Parameters
       • show file [information <FILE>|systems]

        information <FILE>            Displays file information
                                      • <FILE> – Specify the file name.
        systems                       Lists all file systems present in the system
       Examples
       rfs7000-37FABE(config)#show file systems
       File Systems:

            Size(b)     Free(b)               Type       Prefix
                  -            -            opaque       system:
           10485760     9916416              flash       nvram:
           20971520    20131840              flash       flash:
                  -            -           network       (null)
                  -            -           network       rdp:
                  -            -           network       sftp:
                  -            -           network       http:
                  -            -           network       ftp:
                  -            -           network       tftp:
           20971520    20131840                  -       hotspot:
       rfs7000-37FABE(config)#

       rfs7000-37FABE(config)#show file information flash
       flash::
         type is directory
       rfs7000-37FABE(config)#
6 - 40 WiNG CLI Reference Guide


6.1.20 firewall
           show commands
        Displays wireless firewall information, such as DHCP snoop table entries, denial of service statistics, active session
        summaries etc.
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show firewall [dhcp|dos|flows]
        show firewall [dhcp snoop-table|dos stats] {on <DEVICE-NAME>}]

        show firewall flows {[filter|management|on|stats|wireless-client <MAC>]}

        show firewall flows {filter [dir|dst port <1-65535>|ether|flow-type|icmp|
           igmp|ip|max-idle|min-bytes|min-idle|min-pkts|not|port|src|tcp|udp]}

        show firewall flows {management {on <DEVICE-NAME>}|stats {on <DEVICE-
           NAME>}|wireless-client <MAC>|on <DEVICE-NAME>}

        Parameters
        • show firewall [dhcp snoop-table|dos stats]

         dhcp snoop-table               Displays Dynamic Host Configuration Protocol (DHCP) snoop table entries
                                        • snoop-table – Displays DHCP snoop table entries
                                        DHCP snooping acts as a firewall between non-trusted hosts and the DHCP server. Snoop
                                        table entries contain MAC address, IP address, lease time, binding type, and interface
                                        information of non-trusted interfaces.
         dos stats                      Displays Denial of Service (DoS) statistics
         on <DEVICE-NAME>               The following are common to the DHCP snoop table and DoS stats parameters:
                                        • on <DEVICE-NAME> – Optional. Displays snoop table entries, or DoS stats on a
                                          specified device
                                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
SHOW COMMANDS 6 - 41


• show firewall flows {management {on <DEVICE-NAME>}|stats {on <DEVICE-
NAME>}|wireless-client <MAC>|on <DEVICE-NAME>}

firewall flows             Notifies a session has been established
management                 Optional. Displays management traffic firewall flows
{on <DEVICE-NAME>}         • on <DEVICE-NAME> – Optional. Displays firewall flows on a specified device
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
stats                      Optional. Displays active session summary
{on <DEVICE-NAME>}         • on <DEVICE-NAME> – Optional. Displays active session summary on a specified
                             device
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
wireless-client <MAC>      Optional. Displays wireless clients firewall flows
                           • <MAC> – Specify the MAC address of the wireless client.
on <DEVICE-NAME>           Optional. Displays all firewall flows on a specified device
                           • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• show firewall flows filter [(dir|dst|ether|flow-type|icmp|igmp|ip|
max-idle|min-bytes|min-idle|min-pkts|not|port|src|tcp|udp)] {(dir|dst|ether|
flow-type|ip|max-idle|min-bytes|min-idle|min-pkts|port|src)}

firewall filter            Defines additional firewall flow filter parameters
dir [wired-wired|wired-    Matches the packet flow direction
wireless|wireless-         • wired-wired – Wired to wired flows
wired|wireless-wireless]
                           • wired-wireless – Wired to wireless flows
                           • wireless-wired – Wireless to wired flows
                           • wireless-wireless – Wireless to wireless flows
dst <PORT> <1-65535>       Matches the destination port with the specified port
                           • <PORT> – Specifies the destination port
                             • <1-65535> – Specify the destination port number from 1 - 65535.
ether                      Displays Ethernet filter options
[dst <MAC>|host <MAC>|     • dst <MAC> – Matches the destination MAC address
src|vlan]
                           • host <MAC> – Matches flows containing the specified MAC address
                           • src <MAC> – Matches only the source MAC address
                           • vlan <1-4094> – Matches the VLAN number of the traffic with the specified value.
                              Specify a value from 1- 4094.
flow-type                  Matches the traffic flow type
[bridged|natted|routed|    • bridged – Bridged flows
wired|wireless]
                           • natted – Natted flows
                           • routed – Routed flows
                           • wired – Flows belonging to wired hosts
                           • wireless – Flows containing a mobile unit
6 - 42 WiNG CLI Reference Guide



         icmp {code|type}         Matches flows with the specified Internet Control Message Protocol (ICMP) code and
                                  type
                                  • code – Matches flows with the specified ICMP code
                                  • type – Matches flows with the specified ICMP type
         igmp                     Matches Internet Group Management Protocol (IGMP) flows
         ip [dst <IPv4>|host      Filters firewall flows based on the IPv4 parameters passed
         <IPv4>|proto <0-254>|    • dst <IPv4> – Matches destination IP address
         src <IPv4>]
                                  • host <IPv4> – Matches flows containing IPv4 address
                                  • proto <0-254> – Matches the IPv4 protocol
                                  • src <IPv4> – Matches source IP address
         max-idle                 Filters firewall flows idle for at least the specified duration. Specify a max-idle value
                                  from 1 - 4294967295 bytes.
         min-bytes                Filters firewall flows seen at least the specified number of bytes. Specify a min-bytes
                                  value from 1 - 4294967295 bytes.
         min-idle                 Filters firewall flows idle for at least the specified duration. Specify a min-idle value
                                  from 1 - 4294967295 bytes.
         min-pkts                 Filters firewall flows with at least the given number of packets. Specify a min-bytes
                                  value from 1 - 4294967295 bytes.
         not                      Negates the filter expression selected
         port <1-65535>           Matches either the source or destination port. Specify a port from 1 - 65535.
         src <1-65535>            Matches the source port with the specified port. Specify a port from 1 - 65535.
         tcp                      Matches TCP flows
         udp                      Matches UDP flows
SHOW COMMANDS 6 - 43


Examples
rfs7000-37FABE(config)#show firewall dhcp snoop-table on rfs7000-37FABE
Snoop Binding <157.235.208.252, 00-15-70-37-FA-BE, Vlan 4>
Type Controller-SVI, Touched 32 seconds ago
--------------------------------------------------------------------------
Snoop Binding <172.16.10.2, 00-15-70-37-FA-BE, Vlan 1>
Type Controller-SVI, Touched 1 seconds ago
--------------------------------------------------------------------------
rfs7000-37FABE(config)#


rfs7000-37FABE(config)#show firewall flows management on rfs7000-37FABE
========== Flow# 1 Summary ==========
Forward:
 Vlan 1, TCP 172.16.10.10 port 3995 > 172.16.10.1 port 22
 00-02-B3-28-D1-55 > 00-15-70-37-FA-BE, ingress port ge1
 Egress port: <local>, Egress interface: vlan1, Next hop: <local> (00-15-70-37-FA-BE)
 573 packets, 49202 bytes, last packet 0 seconds ago
Reverse:
 Vlan 1, TCP 172.16.10.1 port 22 > 172.16.10.10 port 3995
 00-15-70-37-FA-BE > 00-02-B3-28-D1-55, ingress port local
 Egress port: ge1, Egress interface: vlan1, Next hop: 172.16.10.10 (00-02-B3-28-D1-55)
 552 packets, 63541 bytes, last packet 0 seconds ago
TCP state: Established
Flow times out in 1 hour 30 minutes

rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show firewall flows stats   on rfs7000-37FABE
Active Flows       2
TCP flows          1
UDP flows          0
DHCP flows         1
ICMP flows         0
IPsec flows        0
L3/Unknown flows   0
rfs7000-37FABE(config)#
6 - 44 WiNG CLI Reference Guide


6.1.21 interface
           show commands
        Displays wireless controller interface status
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show interfaces {<INTERFACE>|brief|counters|ge <1-4>|me1|on|
          port-channel {<1-2>|switchport|vlan <1-4094>} {on <DEVICE-NAME>}
        Parameters
        • show interfaces {<INTERFACE>|brief|counters|ge <1-4>|me1|on|
        port-cahnnel <1-2>|switchport|vlan <1-4094>} {on <DEVICE-NAME>}

         interfaces                     Displays wireless controller interface status based on the parameters passed
         <INTERFACE>                    Displays status of the interface specified by the <INTERFACE> parameter. Specify the
         {on <DEVICE-NAME>}             interface name.
                                        • on <DEVICE-NAME> – Optional. Displays interface status on a specified device
                                           • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         brief                          Displays a brief summary of the interface status and configuration
         {on <DEVICE-NAME>}             • on <DEVICE-NAME> – Optional. Displays a brief summary on a specified device
                                           • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         counters                       Displays interface Tx or Rx counters
         {on <DEVICE-NAME>}             • on <DEVICE-NAME> – Optional. Displays interface Tx or Rx counters on a specified
                                           device
                                           • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         ge <1-4>                       Displays Gigabit Ethernet interface status and configuration
                                        • <1-4> – Select the Gigabit Ethernet interface index from 1 - 4.
         me1                            Displays Fast Ethernet interface status and configuration
         {on <DEVICE-NAME>}             • on <DEVICE-NAME> – Optional. Displays Fast Ethernet interface status on a specified
                                           device
                                           • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
SHOW COMMANDS 6 - 45



on <DEVICE-NAME>      Displays interface status on a specified device
                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
port-channel <1-2>    Displays port channel interface status and configuration
                      • <1-2> – Specify the port channel index from 1 - 2.
switch port           Displays layer 2 interface status
{on <DEVICE-NAME>}    • on <DEVICE-NAME> – Optional. Displays interface status on a specified device
                         • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
vlan <1-4094>         Displays VLAN interface status and configuration
{on <DEVICE-NAME>}    • <1-4094> – Specify the Switch Virtual Interface (SVI) VLAN ID from 1 - 4094.
                      • on <DEVICE-NAME> – Optional. Displays interface status on a specified device
                         • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
Examples
rfs7000-37FABE(config)#show interface switchport on rfs7000-37FABEE
--------------------------------------------------------------------------
 INTERFACE          STATUS   MODE     VLAN(S)
--------------------------------------------------------------------------
 ge1                UP       access   1
 ge2                DOWN     access   1
 ge3                UP       access   1
 ge4                DOWN     access   1
--------------------------------------------------------------------------
A '*' next to the VLAN ID indicates the native vlan for that trunk port
rfs7000-37FABE(config)#
rfs7000-37FABE(config)#show interface vlan 1
Interface vlan1 is UP
  Hardware-type: vlan, Mode: Layer 3, Address: 00-15-70-37-FA-BE
  Index: 4, Metric: 1, MTU: 1500
  IP-Address: 172.16.10.1/24
    input packets 587971, bytes 58545041, dropped 0, multicast packets 0
    input errors 0, length 0, overrun 0, CRC 0, frame 0, fifo 0, missed 0
    output packets 56223, bytes 4995566, dropped 0
    output errors 0, aborted 0, carrier 0, fifo 0, heartbeat 0, window 0
    collisions 0
rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show interface ge 2 on rfs7000-37FABE
Interface ge2 is DOWN
  Hardware-type: ethernet, Mode: Layer 2, Address: 00-15-70-37-FA-C0
  Index: 2002, Metric: 1, MTU: 1500
  Speed: Admin Auto, Operational n/a, Maximum 1G
  Duplex: Admin Auto, Operational n/a
  Active-medium: n/a
  Switchport settings: access, access-vlan: 1
    Input packets 0, bytes 0, dropped 0
    Received 0 unicasts, 0 broadcasts, 0 multicasts
    Input errors 0, runts 0, giants 0
    CRC 0, frame 0, fragment 0, jabber 0
    Output packets 501587, bytes 60935912, dropped 0
    Sent 3 unicasts, 4613 broadcasts, 496971 multicasts
    Output errors 0, collisions 0, late collisions 0
    Excessive collisions 0

rfs7000-37FABE(config)#
6 - 46 WiNG CLI Reference Guide


        rfs7000-37FABE(config)#show interface counters
        --------------------------------------------------------------------------
             #      MAC       RX-PKTS       RX-BYTES       RX-DROP       TX-PKTS       TX-
        BYTES         TX-DROP
        --------------------------------------------------------------------------
         me1    00-...-F7 0            0             0           0            0            0
         vlan1  00-...-BE 588384       58580154       0          56435       5013682       0
         ge1    00-...-BF 1906950      175560930     0          1402226      589235764     0
         ge2    00-...-C0 0           0             0           501615       60939303      0
         ge3    00-...-C1 1354163      581149840     0          1877890      175646105     0
         ge4    00-...-C2 0           0             0           501615       60939303      0
        --------------------------------------------------------------------------
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 47


6.1.22 ip
            show commands
       Displays IP related information
       Supported in the following platforms:
          • AP300
            • AP621
            • AP650
            • AP6511
            • AP6521
            • AP6532
            • AP71XX
            • RFS4000
            • RFS6000
            • RFS7000
       Syntax
       show ip [arp|ddns|dhcp|dhcp-vendor-options|domain-name|igmp|interface|
          name-server|nat|route|routing]
       show ip arp {<VLAN-NAME> {on <DEVICE-NAME>}|on <DEVICE-NAME>}
       show ip ddns bindings {on <DEVICE-NAME>}

       show ip dhcp [binding|networks|status]
       show ip dhcp [networks|status] {on <DEVICE-NAME>}]
       show ip dhcp binding {manual <DEVICE-NAME>|on <DEVICE-NAME>}

       show ip [dhcp-vendor-options|domain-name|name-server|routing] {on <DEVICE-
          NAME>}
       show ip igmp snooping [mrouter|vlan]
       show ip igmp snooping mrouter vlan <1-4095> {on <DEVICE-NAME>}
       show ip igmp snooping vlan <1-4095> {<IP> {on <DEVICE-NAME>}|
          on <DEVICE-NAME>}

       show ip interface {<INTERFACE> {on <DEVICE-NAME>}|brief {on <DEVICE-NAME>}|
          on <DEVICE-NAME>}
       show ip nat translations verbose {on <DEVICE-NAME>}
       show ip route {<INTERFACE>|ge <1-4>|me1|port-channel <1-2>|vlan <1-4094>}
          {on <DEVICE-NAME>}
       show ip route {on <DEVICE-NAME>}
       Parameters
       • show ip arp {<VLAN-NAME> {on <DEVICE-NAME>}|on <DEVICE-NAME>}

        ip arp                           Displays Address Resolution Protocol (ARP) configuration details
        <VLAN-NAME>                      Optional. Displays ARP configuration on a specified VLAN. Specify the VLAN name.
        {on <DEVICE-NAME>}               • on <DEVICE-NAME> – Optional. Displays VLAN ARP configuration on a specified
                                           device
                                           • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        on <DEVICE-NAME>                 Optional. Displays VLAN ARP configuration details on a specified device
                                         • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
6 - 48 WiNG CLI Reference Guide


        • show ip ddns bindings {on <DEVICE-NAME>}

         ip ddns                  Displays Dynamic Domain Name Server (DDNS) configuration details
         bindings                 Displays DDNS address bindings
         {on <DEVICE-NAME>}       • on <DEVICE-NAME> – Optional. Displays address bindings on a specified device
                                     • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • show ip dhcp [networks|status] {on <DEVICE-NAME>}

         ip dhcp                  Displays the DHCP server configuration details
         networks                 Displays the DHCP server network details
         {on <DEVICE-NAME>}       • on <DEVICE-NAME> – Optional. Displays server network details on a specified device
                                     • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         status {on <DEVICE-      Displays the DHCP server status
         NAME>}                   • on <DEVICE-NAME> – Optional. Displays server status on a specified device
                                     • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • show ip dhcp binding {manual {on <DEVICE-NAME>}|on <DEVICE-NAME>}

         ip dhcp                  Displays the DHCP server configuration details
         bindings                 Displays DHCP address bindings
         manual {on <DEVICE-      Displays static DHCP address bindings
         NAME>}                   • on <DEVICE-NAME> – Optional. Displays address bindings on a specified device
                                     • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         on <DEVICE-NAME>         Displays DHCP address bindings on a specified device
                                  • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller.

        • show ip [dhcp-vendor-options|domain-name|name-server|routing] {on <DEVICE-NAME>}

         ip dhcp-vendor-options    Displays DHCP 43 parameters received from the DHCP server
         {on <DEVICE-NAME>}        • on <DEVICE-NAME> – Optional. Displays DHCP 43 parameters received from a
                                      specified device
                                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         ip domain-name            Displays DNS default domain
         {on <DEVICE-NAME>}        • on <DEVICE-NAME> – Optional. Displays the default domain on a specified device
                                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         ip name-server            Display the DNS name server details
         {on <DEVICE-NAME>}        • on <DEVICE-NAME> – Optional. Displays server details on a specified device
                                      • <DEVICE-NAME> – Specify the name of the AP or the wireless controller.
         ip routing                Displays the routing status
         {on <DEVICE-NAME>}        • on <DEVICE-NAME> – Optional. Displays routing details on a specified device
                                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
SHOW COMMANDS 6 - 49


• show ip igmp snooping mrouter vlan <1-4095> {on <DEVICE-NAME>}

ip igmp                   Displays IGMP configuration details
snooping                  Displays IGMP snooping configuration details
mrouter vlan <1-4095>     Displays VALN IGMP snooping mrouter configuration
{on <DEVICE-NAME>}        • <1-4095> – Specify the VLAN ID from 1 - 4095.
                             • on <DEVICE-NAME> – Optional. Displays details on a specified device
                                  • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• show ip igmp snooping vlan <1-4095> {<IP> {on <DEVICE-NAME>}|on <DEVICE-NAME>}

ip igmp                   Displays IGMP configuration details
snooping                  Displays IGMP snooping configuration details
vlan <1-4095>             Displays VLAN IGMP snooping configuration
                          • <1-4095> – Specify the VLAN ID from 1 - 4095.
<IP> {on <DEVICE-NAME>}   Optional. Specify the multicast group IP address.
                          • on <DEVICE-NAME> – Optional. Displays configuration details on a specified device
                            • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• show ip interface {<INTERFACE> {on <DEVICE-NAME>}|brief {on <DEVICE-NAME>}}

ip interface              Displays administrative and operational status of all layer 3 interfaces or a specified
                          layer 3 interface
<INTERFACE>               Displays a specified interface status. Specify the interface name.
{on <DEVICE-NAME>}        • on <DEVICE-NAME> – Optional. Displays interface status on a specified device
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
brief                     Displays a brief summary of interface status and configuration
                          • on <DEVICE-NAME> – Optional. Displays a brief summary on a specified device
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• show ip nat translations verbose {on <DEVICE-NAME>}

ip nat translations       Displays Network Address Translation (NAT) translations
verbose                   Displays detailed NAT translations
                          • on <DEVICE-NAME> – Optional.Displays NAT translations on a specified device
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• show ip route {<INTERFACE>|ge <1-4>|me1|port-channel <1-2>|vlan <1-4095>} {on
<DEVICE-NAME>}

ip route                  Displays route table details
<INTERFACE>               Displays route table details for a specified interface
{on <DEVICE-NAME>}        • on <DEVICE-NAME> – Optional. Displays route table details on a specified device
                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
6 - 50 WiNG CLI Reference Guide



         ge <1-4>                 Displays GigabitEthernet interface route table details
         {on <DEVICE-NAME>}       • <1-4> – Specify the GigabitEthernet interface index from 1 - 4.
                                     • on <DEVICE-NAME> – Optional. Displays route table details on a specified de-
                                     vice
                                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         me1 {on <DEVICE-NAME>}   Displays FastEthernet interface route table details
                                  • on <DEVICE-NAME> – Optional. Displays route table details on a specified device
                                     • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         port-channel <1-2>       Displays port channel interface route table details
         {on <DEVICE-NAME>}       • on <DEVICE_NAME> – Optional. Displays route table details on a specified device
                                     • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         vlan <1-4095>            Displays VLAN interface route table details
         {on <DEVICE-NAME>}       • on <DEVICE_NAME> – Optional. Displays route table details on a specified device
                                     • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE(config)#show ip arp test on rfs7000-37FABEE
        +--------------------+-------------------------+---------------+----------
        |         IP         |           MAC           |   INTERFACE   |      TYPE                            |
        +--------------------+-------------------------+---------------+----------
        | 172.16.10.11       | 00-50-DA-95-11-13       | vlan1         | dynamic                              |
        | 172.16.10.10       | 00-02-B3-28-D1-55       | vlan1         | dynamic                              |
        +--------------------+-------------------------+---------------+----------
        rfs7000-37FABE(config)#


        rfs7000-37FABE(config)#show ip interface brief on rfs7000-37FABE
        +-----------------+----------------------------+--------------+-----------
        |     INTERFACE   |      IP-ADDRESS/MASK       |    STATUS    |    PROTOCOL                           |
        +-----------------+----------------------------+--------------+-----------
        | me1             | unassigned                 | DOWN         | down                                  |
        | vlan44          | unassigned                 | UP           | up                                    |
        | vlan1           | 172.16.10.2/24             | UP           | up                                    |
        | vlan4           | 157.235.208.252/24         | UP           | up                                    |
        +-----------------+----------------------------+--------------+-----------
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show ip nat translations verbose on rfs7000-37FABE

        PROTO ACTUAL SOURCE       ACTUAL DESTINATION  NATTED SOURCE       NATTED DESTINATION
        --------------------------------------------------------------------------

        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show ip route test on rfs7000-37FABE
        +-------------------------+--------------------+------------+-------------
        |       DESTINATION       |      GATEWAY       |    FLAGS   |    INTERFACE                            |
        +-------------------------+--------------------+------------+-------------
        | 157.235.208.0/24        | direct             | C          | vlan4                                   |
        | 172.16.10.0/24          | direct             | C          | vlan1                                   |
        | default                 | 172.16.10.9        | CG         | vlan1                                   |
        +-------------------------+--------------------+------------+-------------
        Flags: C - Connected G - Gateway
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show ip route pc 2
        +-------------------------+--------------------+------------+-------------
        |       DESTINATION       |      GATEWAY       |   FLAGS    |    INTERFACE                            |
        +-------------------------+--------------------+------------+-------------
        | 157.235.208.0/24        | direct             | C          | vlan4                                   |
SHOW COMMANDS 6 - 51


| 172.16.10.0/24          | direct             | C          | vlan1            |
| default                 | 172.16.10.9        | CG         | vlan1            |
+-------------------------+--------------------+------------+-------------
Flags: C - Connected G - Gateway
rfs7000-37FABEconfig)#

rfs7000-37FABE(config)#show ip route vlan 1 on rfs7000-37FABE
+------------------------+---------------------+-------------+------------
|      DESTINATION       |        GATEWAY      |    FLAGS     |    INTERFACE   |
+------------------------+---------------------+-------------+------------
| 172.16.10.0/24         | direct              | C            | vlan1          |
| default                | 172.16.10.9         | CG           | vlan1          |
+------------------------+---------------------+-------------+------------
Flags: C - Connected G - Gateway
rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show ip route ge 1 on rfs7000-37FABE-------------------------
-------------------------------------------------
   DESTINATION             GATEWAY          FLAGS           INTERFACE
--------------------------------------------------------------------------
  172.16.12.0/24            direct            C              vlan3
  172.16.11.0/24            direct            C              vlan2
  172.16.10.0/24            direct            C              vlan1
--------------------------------------------------------------------------
Flags: C - Connected G - Gateway
rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show ip routing on rfs7000-37FABE
IP routing is enabled.
rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show ip dhcp status on rfs7000-37FABE
State of DHCP server: running
Interfaces: vlan2, vlan3
rfs7000-37FABE(config)#
6 - 52 WiNG CLI Reference Guide


6.1.23 ip-access-list-stats
           show commands
        Displays IP access list statistics



                         NOTE: This command is not available in the USER EXEC Mode



        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show ip-access-list-stats {<IP-ACCESS-LIST> {on <DEVICE-NAME>}|on <DEVICE-
           NAME>}
        Parameters
        • show ip-access-list-stats {<IP-ACCESS-LIST> {on <DEVICE-NAME>}|
        on <DEVICE-NAME>}

         ip-access-list-stats            Displays IP access list statistics
         <IP-ACCESS-LIST>                Displays statistics for a specified IP access list
         {on <DEVICE-NAME>}              • <IP-ACCESS-LIST> – Optional. Specify the IP access list name.
                                            • on <DEVICE-NAME> – Optional. Displays statistics on a specified device
                                              • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         on <DEVICE-NAME>                Optional. Displays all IP access list statistics on a specified device
                                         • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE(config)#show ip-access-list-stats
        IP Access-list: # Restrict Management ACL #
          permit tcp any any eq ftp rule-precedence 1                               Hitcount: 0
          permit tcp any any eq www rule-precedence 2                               Hitcount: 41
          permit tcp any any eq ssh rule-precedence 3                               Hitcount: 448
          permit tcp any any eq https rule-precedence 4                               Hitcount: 0
          permit udp any any eq snmp rule-precedence 5                               Hitcount: 0
          permit tcp any any eq telnet rule-precedence 6                               Hitcount: 4
SHOW COMMANDS 6 - 53


6.1.24 licenses
        show commands
      Displays installed licenses and usage information
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show licenses
      Parameters
      None
      Examples
      rfs7000-37FABE(config)#show licenses
      Serial Number : 6268529900014

      Device Licenses:
        AP-LICENSE
          String     :
      8088bb045018988b85bcd575d0ab7dbc802885bcc680a96194dfbeedc28d4117058eb53bd8b
          Value      : 50
          Used       : 0
        AAP-LICENSE
          String     :
      8088bb045018988bf98ff7127cda1d354bc689885fcc6b625b695384946d4117058eb53bd8b
          Value      : 50
          Used       : 0
      rfs7000-37FABE(config)#
6 - 54 WiNG CLI Reference Guide


6.1.25 lldp
           show commands
        Displays Link Layer Discovery Protocol (LLDP) information
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show lldp neighbors {on <DEVICE-NAME>}
        Parameters
        • show lldp neighbors {on <DEVICE-NAME>}

         lldp                           Displays LLDP neighbor table
         on <DEVICE-NAME>               Optional. Displays LLDP neighbor table on a specified device
                                        • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE(config)#show lldp neighbors
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show lldp neighbors on rfs7000-37FABE
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 55


6.1.26 logging
         show commands
      Displays network activity log
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show logging {on <DEVICE-NAME>}
      Parameters
      • show logging {on <DEVICE-NAME>}

       logging                        Displays logging information on a specified device
       {on <DEVICE-NAME>}             • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller.

      Examples
      rfs7000-37FABE(config)#show logging on rfs7000-37FABE
      Logging module: enabled
          Aggregation time: disabled
          Console logging: level warnings
          Monitor logging: disabled
          Buffered logging: level warnings
          Syslog logging: level warnings
              Facility: local7

      Log Buffer (2294 bytes):


      Jul 08 16:44:26 2011: %CERTMGR-4-CERT_EXPIRY:                     server certificate for trustpoint
      mint_security_trustpoint has expired
      Jul 08 16:44:26 2011: %CERTMGR-4-CERT_EXPIRY:                     ca certificate for trustpoint
      mint_security_trustpoint has expired
      Jul 08 15:44:26 2011: %CERTMGR-4-CERT_EXPIRY:                     server certificate for trustpoint
      mint_security_trustpoint has expired
      Jul 08 15:44:26 2011: %CERTMGR-4-CERT_EXPIRY:                     ca certificate for trustpoint
      mint_security_trustpoint has expired
      Jul 08 14:44:26 2011: %CERTMGR-4-CERT_EXPIRY:                     server certificate for trustpoint
      mint_security_trustpoint has expired
      Jul 08 14:44:26 2011: %CERTMGR-4-CERT_EXPIRY:                     ca certificate for trustpoint mint--
      More--
      rfs7000-37FABE(config)#
6 - 56 WiNG CLI Reference Guide


6.1.27 mac-access-list-stats
           show commands
        Displays MAC access list statistics



                       NOTE: This command is not present in USER EXEC Mode



        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show mac-access-list-stats {<MAC-ACCESS-LIST> {on <DEVICE-NAME>}|
           on <DEVICE-NAME>}
        Parameters
        • show mac-access-list-stats {<MAC-ACCESS-LIST> {on <DEVICE-NAME>}|on <DEVICE-NAME>}

         mac-access-list-stats         Displays MAC access list statistics
         <MAC-ACCESS-LIST>             Displays statistics for a specified MAC access list
         {on <DEVICE-NAME>}            • <MAC-ACCESS-LIST> – Optional. Specify the MAC access list name.
                                          • on <DEVICE-NAME> – Optional. Displays statistics on a specified device
                                            • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         on <DEVICE-NAME>              Optional. Displays MAC access list statistics on a specified device
                                       • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE(config)#show mac-access-list-stats on rfs7000-37FABEE
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 57


6.1.28 mac-address-table
        show commands
      Displays MAC address table entries
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show mac-address-table {on <DEVICE-NAME>}
      Parameters
      • show mac-address-table {on <DEVICE-NAME>}

       mac-address-table             Displays MAC address table entries
       on <DEVICE-NAME>              Optional. Displays MAC address table entries on a specified device
                                     • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
      Examples
      rfs7000-37FABE(config)#show mac-address-table on rfs7000-37FABE
      +------------+----------+-----------+-------------------------+-----------
      |   BRIDGE   |   VLAN   |     PORT  |           MAC           |    STATE                              |
      +------------+----------+-----------+-------------------------+-----------
      | 1          | 1        | ge1       | 00-50-DA-EE-B5-5C       | forward                                   |
      | 1          | 1        | ge1       | 00-A0-F8-00-00-00       | forward                                   |
      | 1          | 1        | ge1       | 00-02-B3-28-D1-55       | forward                                   |
      | 1          | 1        | ge1       | 00-A0-F8-68-D5-5D       | forward                                   |
      | 1          | 1        | ge1       | 00-50-DA-95-11-13       | forward                                   |
      | 1          | 1        | ge1       | 00-15-70-38-06-53       | forward                                   |
      | 1          | 1        | ge1       | 00-15-70-41-9F-7F       | forward                                   |
      | 1          | 1        | ge1       | 00-15-70-88-9E-C4       | forward                                   |
      +------------+----------+-----------+-------------------------+-----------
      rfs7000-37FABE(config)#
6 - 58 WiNG CLI Reference Guide


6.1.29 mint
          show commands
        Displays MiNT protocol configuration commands
        Supported in the following platforms:
           • AP300
              • AP621
              • AP650
              • AP6511
              • AP6521
              • AP6532
              • AP71XX
              • RFS4000
              • RFS6000
              • RFS7000
        Syntax
        show mint [config|dis|id|info|known-adopters|links|lsp|lsp-db|mlcp|
           neighbors|route|stats|tunneled-vlans]

        show mint [config|id|info|known-adopters|route|stats|tunneled-vlans]
           {on <DEVICE-NAME>}

        show mint [dis|links|neighbors] {details {on <DEVICE-NAME>}|
           on <DEVICE-NAME>}

        show mint lsp-db {details <AA.BB.CC.DD> {on <DEVICE-NAME>}|on <DEVICE-NAME>

        show mint mlcp {history {on <DEVICE-NAME>}|on <DEVICE-NAME>}
        Parameters
        • show mint [config|id|info|known-adopters|route|stats|tunneled-vlans]
        {on <DEVICE-NAME>}

         mint                            Displays MiNT protocol information based on the parameters passed
         config                          Displays MiNT related configuration details
         id                              Displays local MiNT ID
         known-adopters                  Displays known, possible, or reachable adopters
         route                           Displays MiNT route table details
         stats                           Displays MiNT related statistics
         tunneled-vlans                  Displays MiNT tunneled VLAN details
         on <DEVICE-NAME>                The following are common to all of the above:
                                         • on <DEVICE-NAME> – Optional. Displays MiNT protocol details on a specified
                                           device
                                           • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
SHOW COMMANDS 6 - 59


• show mint [dis|links|neighbors] {details {on <DEVICE-NAME>}|on <DEVICE-NAME>}

mint                         Displays MiNT protocol information based on the parameters passed
dis                          Displays MiNT network Designated Intermediate Systems (DISes)
links                        Displays MiNT networking link details
neighbors                    Displays adjacent MiNT peer details
details                      The following are common to the dis, links, and neighbors parameters:
{on <DEVICE-NAME>}I          • details – Optional. Displays detailed MiNT information
on <DEVICE-NAME>               • on <DEVICE-NAME> – Optional. Displays MiNT information on a specified de-
                               vice

• show mint lsp-db {details <AA.BB.CC.DD> {on <DEVICE-NAME>}|on <DEVICE-NAME>}

mint                         Displays MiNT protocol information based on the parameters passed
lsp-db                       Displays MiNT LSP database entries
details <AA.BB.CC.DD>        Optional. Displays detailed MiNT LSP database entries
{on <DEVICE-NAME>}           • <AA.BB.CC.DD> – Specify the MiNT address in the <AA.BB.CC.DD> format.
                               • on <DEVICE-NAME> – Optional. Displays MiNT LSP database entries on a spec-
                               ified device

• show mint mlcp {history {on <DEVICE-NAME>}|on <DEVICE-NAME>}

mint                         Displays MiNT protocol information based on the parameters passed
mlcp                         Displays MiNT Link Creation Protocol (MLCP) status
history {on <DEVICE-NAME>}   Optional. Displays MLCP client history
                             • on <DEVICE-NAME> – Optional. Displays MLCP client history on a specified device
6 - 60 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config)#show mint stats
        0 L1 neighbors
        L1 LSP DB size 1 LSPs (0 KB)
        1 L1 routes
        Last SPFs took 0s
        SPF (re)calculated 1 times.
        levels 1
        base priority 180
        dis priority 180
        rfs7000-37FABE(config)#
        rfs7000-37FABE(config)#show mint lsp
        id 70.37.fa.be, level 1, seqnum 18640, 0 adjacencies, 0 extended-vlans,
        expires in 1145 seconds, republish in 722 seconds, changed True,
        ext-vlan FDB pri 0, 180 bytes

        rfs7000-37FABE(config)#show mint lsp-db
        Level 1 LSPs
          70.37.fa.be: seqnum 18640, 0 adjacencies, 0 extended-vlans, expires in 1138 seconds
        1 LSPs in level 1 database

        rfs7000-37FABE(config)#show mint route on rfs7000-37FABE
        Destination : Next-Hop(s)
        70.37.FA.BE : 70.37.FA.BE via self
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show mint known-adopters on rfs7000-37FABE
        70.37.FA.BE
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 61


6.1.30 noc
        show commands
      Displays Network Operations Center (NOC) level information
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show noc [client-list|device|domain]

      show noc device {filter {offline|online|rf-domain {<DOMAIN-NAME>|
         not <DOMAIN-NAME>]}

      show noc domain [managers|statistics {details}]

      Parameters
      • show noc client-list

       noc client-list               Displays a list of clients at the NOC level

      • show noc device {filter {offline|online|rf-domain {<DOMAIN-NAME>|not <DOMAIN-
      NAME>}}

       noc device filter              Displays devices in a network
                                      • filter – Optional. Displays network devices
                                      Use additional filters to view specific details
       offline                        Displays offline devices
       online                         Displays online devices
       rf-domain                      Displays devices on a specified RF Domain
       {<DOMAIN-NAME>|                • <DOMAIN-NAME> – Optional. Specify the name of the RF Domain.
       not <DOMAIN-NAME>}                • not <DOMAIN-NAME> – Inverts the selection

      • show noc domain [managers|statistics {details}]

       noc domain                     Displays RF Domain information
                                      Use this command to view all domain managers and get RF Domain statistics
6 - 62 WiNG CLI Reference Guide



         managers                 Lists RF Domains and managers
         statistics {details}     Displays RF Domains statistics
                                  • details – Optional. Provides detailed RF Domain statistics
        Examples
        rfs7000-37FABE(config)#show noc device
        +-----------------+----------------+--------+----------------+------------
        | MAC| HOST-NAME | TYPE| CLUSTER| RF-DOMAIN |ADOPTED-BY|       ONLINE |
        +-----------------+----------------+--------+----------------+------------
        |99-88-77-66-55-44|   ap7131-665544| ap7131|     | default|     | offline                    |
        |00-15-70-88-9E-C4|   ap7131-889EC4| ap7131|    | default|     | offline                 |
        |11-22-33-44-55-66|     ap650-445566|  ap650| |   default|     | offline                 |
        |00-15-70-37-FA-BE| rfs7000-37FABE| RFS7000|     | default|    | online                  |
        +-----------------+----------------+--------+----------------+------------
        Total number of clients displayed: 4
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show noc domain statistics details
        ==========================================================================
        RF-Domain RFDOMAIN_UseCase1
        Note: TX = AP->Client, RX = Client->AP
        --------------------------------------------------------------------------
        Data bytes            : ( TX + RX = Total ), 0 + 0 = 0 bytes
        Data throughput       : ( TX + RX = Total ), 0 Kbps + 0 Kbps = 0 Kbps
        Data packets          : ( TX + RX = Total ), 0 + 0 = 0 pkts
        Data pkts/sec         : ( TX + RX = Total ), 0 + 0 = 0 pps
        BCMC Packets          : ( TX + RX = Total ), 0 + 0 = 0 pkts
        Management Packets    : ( TX + RX = Total ), 0 + 0 = 0 pkts
        Packets Discarded     : 0 - Tx Dropped, 0 - Rx Errors
        Indicators            : T = 0 @ Max user rate of 0 Kbps
        Distribution          : 0 Clients, 0 radios
        Client count Detais   : 0/0/0 (b/bg/bgn); 0/0 (a/an)
        Stats Update Info     : 6 seconds - update interval, mode is auto
        Threat Level          : 0
        Cause of concern      :
        Remedy                :
        Last update           : 2010-01-31 10:30:22 by 00-15-70-37-FA-BE
        --------------------------------------------------------------------------

        Total number of RF-domain displayed: 1
        rfs7000-37FABE(config-rf-domain-RFDOMAIN_UseCase1)#

        rfs7000-37FABE(config)#show noc device filter online
        --------------------------------------------------------------------------
        MAC    HOST-NAME     TYPE        CLUSTER      RF-DOMAIN       ADOPTED-BY     ONLINE
        -------------------------------------------------------------------------- 00-15-70-
        37-FA-BE rfs7000-37FABE RFS7000 RFDOMAI..echPubs              online
        --------------------------------------------------------------------------Total
        number of clients displayed: 1
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show noc domain statistics details
        ==========================================================================RF-Domain
        RFDOMAIN_TechPubs
        Note: TX = AP->Client, RX = Client->AP
        --------------------------------------------------------------------------
        Data bytes            : ( TX + RX = Total ), 0 + 0 = 0 bytes
        Data throughput       : ( TX + RX = Total ), 0 Kbps + 0 Kbps = 0 Kbps
        Data packets          : ( TX + RX = Total ), 0 + 0 = 0 pkts
        Data pkts/sec         : ( TX + RX = Total ), 0 + 0 = 0 pps
        BCMC Packets          : ( TX + RX = Total ), 0 + 0 = 0 pkts
        Management Packets    : ( TX + RX = Total ), 0 + 0 = 0 pkts
        Packets Discarded     : 0 - Tx Dropped, 0 - Rx Errors
        Indicators            : T = 0 @ Max user rate of 0 Kbps
        Distribution          : 0 Clients, 0 radios
        Client count Detais   : 0/0/0 (b/bg/bgn); 0/0 (a/an)
SHOW COMMANDS 6 - 63


Stats Update Info     : 6 seconds - update interval, mode is auto
Threat Level          : 1
Cause of concern      : no sensors enabled in RF-domain RFDOMAIN_TechPubs
Remedy                : enable AP detection
Last update           : 2011-01-09 08:44:15 by 00-15-70-37-FA-BE
--------------------------------------------------------------------------

Total number of RF-domain displayed: 1
rfs7000-37FABE(config)#
6 - 64 WiNG CLI Reference Guide


6.1.31 ntp
          show commands
        Displays Network Time Protocol (NTP) information
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show ntp [associations|status]
        show ntp [associations {detail|on}|status {on <DEVICE-NAME>}
        Parameters
        • show ntp [associations {detail|on}|status {on <DEVICE-NAME>}]

         ntp associations {detail|on}   Displays existing NTP associations
                                        • detail – Optional. Displays detailed NTP associations
                                           • on <DEVICE-NAME> – Optional. Displays NTP associations on a specified device
                                             • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         ntp status                     Displays NTP association status
         {on <DEVICE-NAME>}             • on <DEVICE-NAME> – Optional. Displays NTP association status on a specified device
                                           • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE>show ntp associations
         address     ref clock    st when poll reach delay offset disp
         * master (synced), # master (unsynced), + selected, - candidate, ~ configured
        rfs7000-37FABE>

        rfs7000-37FABE>show ntp status
        Clock is synchronized, stratum 0, actual frequency is 0.0000 Hz, precision is 2**0
        reference time is 00000000.00000000 (Feb 07 06:28:16 UTC 2036)
        clock offset is 0.000 msec, root delay is 0.000 msec
        root dispersion is 0.000 msec
        rfs7000-37FABE>

        rfs7000-37FABE>show ntp status
        Clock is synchronized, stratum 0, actual frequency is 0.0000 Hz, precision is 2^0
        reference time is 00000000.00000000 (Feb 07 06:28:16 UTC 2036)
        clock offset is 0.000 msec, root delay is 0.000 msec
        root dispersion is 0.000 msec,
        rfs7000-37FABE>
SHOW COMMANDS 6 - 65


6.1.32 password-encryption
        show commands
      Displays password encryption status (enabled/disabled)
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show password-encryption status
      Parameters
      • show password-encryption status

       password-encryption status         Displays password encryption status (enabled/disabled)
      Examples
      rfs7000-37FABE(config)#show password-encryption status
      Password encryption is disabled
      rfs7000-37FABE(config)#
6 - 66 WiNG CLI Reference Guide


6.1.33 power
          show commands
        Displays Power Over Ethernet (PoE) information
        Supported in the following platforms:
           • RFS4000
           • RFS6000
        Syntax
        show power [configuration|status] {on <DEVICE-NAME>}
        Parameters
        • show power [configuration|status] {on <DEVICE-NAME>}

         power                         Displays PoE information (PoE configuration and status)
         configuration                 Displays detailed PoE configuration
         {on <DEVICE-NAME>}            • on <DEVICE-NAME> – Optional. Displays configuration on a specified device
                                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         status                        Displays PoE status
         {on <DEVICE-NAME>}            • on <DEVICE-NAME> – Optional. Displays status on a specified device
                                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE(config)#show power status on rfs6000-37FAAA
        System Voltage: 53.4 volts
          Guard Band: 32 watts
          Power Budget: 190 watts Power Consumption: 0 watts
          poe device 1 temperature 35C
          poe device 2 temperature 38C
        --------------------------------------------------------------------------------
              PORT       VOLTS             mA         WATTS        CLASS       STATUS
        --------------------------------------------------------------------------------
          ge1           0.0              0           0.0         0           Off
          ge2           0.0              0           0.0         0           Off
          ge3           0.0              0           0.0         0           Off
          ge4           0.0              0           0.0         0           Off
          ge5           0.0              0           0.0         0           Off
          ge6           0.0              0           0.0         0           Off
          ge7           0.0              0           0.0         0           Off
          ge8           0.0              0           0.0         0           Off
        --------------------------------------------------------------------------------
        RFS6000-37FAAA(config)#show power configuration
        --------------------------------------------------------------------------------
                PORT            PRIORITY           POWER LIMIT             ENABLED
        --------------------------------------------------------------------------------
          ge1               low                30.0W                   yes
          ge2               low                30.0W                   yes
          ge3               low                30.0W                   yes
          ge4               low                30.0W                   yes
          ge5               low                30.0W                   yes
          ge6               low                30.0W                   yes
          ge7               low                30.0W                   yes
          ge8               low                30.0W                   yes
        --------------------------------------------------------------------------------
SHOW COMMANDS 6 - 67


6.1.34 remote-debug
        show commands
      Displays remote debug session information
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show remote-debugging
      Parameters
      None
      Examples
      rfs7000-37FABE(config)#show remote-debug
      live-pktcap
       Not running
      wireless
       Not running
      copy-crashinfo
       Not running
      offline-pktcap
       Not running
      copy-techsupport
       Not running
      more
       Not running
      rfs7000-37FABE(config)#
6 - 68 WiNG CLI Reference Guide


6.1.35 rf-domain-manager
          show commands
        Displays RF Domain manager selection details
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show rf-domain-manager
        Parameters
        None
        Examples
        rfs7000-37FABE(config)#show rf-domain-manager
         RF Domain default
         RF Domain Manager:
            ID: 70.37.fa.be
            Priority: 9
            Has IP connectivity
            Has non-mesh links
            Last change 12265 seconds ago
         This device:
            Priority: 9
            Has IP connectivity
            Has non-mesh links
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 69


6.1.36 role
         show commands
      Displays role based firewall information
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show role wireless-clients {on <DEVICE-NAME>}
      Parameters
      • show role wireless-clients {on <DEVICE-NAME>}

       role wireless-clients         Displays clients associated with roles
                                     • on <DEVICE-NAME> – Optional. Displays clients associated with roles on a specified
                                        device
      Examples
      rfs7000-37FABE(config)#show role wireless-clients on rfs7000-37FABEE
      No ROLE statistics found.
      rfs7000-37FABE(config)#
6 - 70 WiNG CLI Reference Guide


6.1.37 running-config
           show commands
        Displays configuration files (where all configured MAC and IP access lists are applied to an interface)
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show running-config {aaa-policy|association-acl-policy|auto-provisioning-
           policy|captive-portal-policy|device|dhcp-server-policy|firewall-policy|
           include-factory|interface|management-policy|profile|radio-qos-policy|
           rf-domain|smart-rf-policy|wlan|wlan-qos-policy}

        show running-config {aaa-policy|association-acl-policy|auto-provisioning-
           policy|captive-portal-policy|dhcp-server-policy|firewall-policy|
           management-policy|radio-qos-policy|smart-rf-policy|wlan-qos-policy}
           <POLICY-NAME> {include-factory}}
        show running-config {device [<MAC>|self] {include-factory}}

        show running-config {include-factory}

        show running-config {interface {<INTERFACE>|ge <1-4>|include-factory|
           me1|port-channel <1-2>|vlan <1-4095>} {include-factory}}

        show running-config {profile [ap621|ap650|ap6511|ap6521|ap6532|ap71xx|
           rfs4000|rfs6000|rfs7000] <PROFILE-NAME> {include-factory}}

        show running-config {rf-domain <DOMAIN-NAME> {include-factory}}

        show running-config {wlan <WLAN-NAME> {include-factory}}

        Parameters
        • show running-config {aaa-policy|association-acl-policy|
        auto-provisioning-policy|captive-portal-policy|dhcp-server-policy|
        firewall-policy|management-policy|radio-qos-policy|smart-rf-policy|wlan-qos-policy}
        <PLOICY-NAME> {include-factory}

         running-config                 Optional. Displays current configuration details
         aaa-policy                     Optional. Displays AAA policy configuration details
         association-acl-policy         Optional. Displays association ACL policy configuration details
         auto-provisioning-policy       Optional. Displays auto provisioning policy configuration details
         captive-portal-policy          Optional. Displays captive portal policy configuration details
SHOW COMMANDS 6 - 71



dhcp-server-policy    Optional. Displays the DHCP server policy configuration details
firewall-policy       Optional. Displays firewall policy configuration details
management-policy     Optional. Displays management policy configuration details
radio-qos-policy      Optional. Displays radio QoS policy configuration details
smart-rf-policy       Optional. Displays Smart RF policy configuration details
wlan-qos-policy       Optional. Displays WLAN QoS policy configuration details
<POLICY-NAME>         The following is common to all policies listed above:
                      • <POLICY-NAME> – Specify the name of the policy.
include-factory       This parameter is common to all policies listed above.
                      • Optional. Includes factory defaults
• show running-config {device [<MAC>|self] {include-factory}}

running-config        Displays current configuration details
device {<MAC>|self}   Optional. Displays device configuration details
                      • <MAC> – Optional. Displays configuration of a specified device. Specify the MAC
                        address of the device.
                      • self – Optional. Displays the logged device’s configuration
include-factory       The following is common to the <MAC> and self parameters:
                      • Optional. Displays factory default values

• show running-config {include-factory}}

running-config        Displays current configuration details
include-factory       Optional. Includes factory default values

• show running-config {interface {<INTERFACE>|ge <1-4>|include-factory|me1|port-
channel <1-2>|vlan <1-4095>} {include-factory}}

running-config        Displays current configuration details
interface             Optional. Displays interface configuration
<INTERFACE>           Displays a specified interface configuration. Specify the interface name.
ge <1-4>              Displays GigabitEthernet interface configuration details
                      • <1-4> – Specify a GigabitEthernet interface index from 1 - 4.
me1                   Displays FastEthernet interface configuration details
port-channel <1-2>    Displays port channel interface configuration details
                      • <1-2> – Specify a port channel interface index from 1 - 2.
6 - 72 WiNG CLI Reference Guide



         vlan <1-4095>            Displays VLAN interface configuration details
                                  • <1-4095> – Specify the VLAN interface number from 1 - 4095.
         include-factory          This parameter is common to all of the interface options.
                                  • Optional. Includes factory defaults

        • show running-config {profile [ap621|ap650|ap6511|ap6521|ap6532|
        ap71xx|rfs4000|rfs6000|rfs7000] <PROFILE-NAME> {include-factory}}

         running-config           Displays current configuration
         profile                  Optional. Displays current configuration for a specified profile
         ap621                    Displays AP621 profile configuration
         <PROFILE-NAME>           • <PROFILE-NAME> – Displays configuration for a specified AP621 profile. Specify the
                                     AP621 profile name.
         ap650                    Displays AP650 profile configuration
         <PROFILE-NAME>           • <PROFILE-NAME> – Displays configuration for a specified AP650 profile. Specify the
                                     AP650 profile name.
         ap6511                   Displays AP6511 profile
         <PROFILE-NAME>           • <PROFILE-NAME> – Displays configuration for a specified AP6511 profile. Specify the
                                     AP6511 profile name.
         ap6521                   Displays AP6521 profile configuration
         <PROFILE-NAME>           • <PROFILE-NAME> – Displays configuration for a specified AP6521 profile. Specify the
                                     AP6521 profile name.
         ap6532                   Displays AP6532 profile configuration
         <PROFILE-NAME>           • <PROFILE-NAME> – Displays configuration for a specified AP6532 profile. Specify the
                                     AP6532 profile name.
         ap71xx <PROFILE-NAME>    Displays AP71XX profile configuration
                                  • <PROFILE-NAME> – Displays configuration for a specified AP71XX profile. Specify the
                                     AP71XX profile name.
         rfs4000                  Displays RFS4000 profile configuration
         <PROFILE-NAME>           • <PROFILE-NAME> – Displays configuration for a specified RFS4000 profile. Specify
                                     the RFS4000 profile name.
         rfs6000                  Displays RFS6000 profile configuration
         <PROFILE-NAME>           • <PROFILE-NAME> – Displays configuration for a specified RFS6000 profile. Specify
                                     the RFS6000 profile name.
         rfs7000                  Displays RFS7000 profile configuration
         <PROFILE-NAME>           • <PROFILE-NAME> – Displays configuration for a specified RFS6000 profile. Specify
                                     the RFS6000 profile name.
         include-factory          Optional.This parameter is common to all profiles. It includes factory defaults
SHOW COMMANDS 6 - 73


• show running-config {rf-domain <DOMAIN-NAME> {include-factory}}

running-config        Displays current configuration
rf-domain             Optional. Displays current configuration for a RF Domain
<DOMAIN-NAME>         Specify the name of the RF Domain.
include-factory       Optional. Includes factory defaults

• show running-config {wlan <WLAN-NAME> {include-factory}}

running-config        Displays current configuration
wlan                  Optional. Displays current configuration for a WLAN
<DOMAIN-NAME>         Displays current configuration for a specified WLAN. Specify the name of the WLAN.
include-factory       Optional. Includes factory defaults
Examples
rfs7000-37FABE(config)#show running-config device self
!
firewall ratelimit-trust policy default
!
management-policy default
  telnet
  http server
  ssh
!
firewall-policy default
!
mint-security-policy the_policy
  rejoin-timeout 35
!
device-discover-policy default
!
RFS7000 00-15-70-37-FA-BE
  hostname rfs7000-37FABE
  no country-code
  bridge vlan 3
  bridge vlan 5
   ip dhcp trust
   ip igmp snooping querier version 2
   ip igmp snooping querier max-response-time 3
   ip igmp snooping querier timer expiry 89
  wep-shared-key-auth
  radius nas-identifier test
--More--
rfs7000-37FABE(config)
rfs7000-37FABE(config)#show running-config device 11-22-33-44-55-66 include-factory
!
radio-qos-policy default
  wmm best-effort aifsn 3
  wmm video txop-limit 94
  wmm video aifsn 1
  wmm video cw-min 3
  wmm video cw-max 4
  wmm voice txop-limit 47
  wmm voice aifsn 1
  wmm voice cw-min 2
--More--
6 - 74 WiNG CLI Reference Guide


6.1.38 session-changes
          show commands
        Displays configuration changes made in the current session
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show session-changes
        Parameters
        None
        Examples
        rfs7000-37FABE(config)#show session-changes

        No changes in this session
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 75


6.1.39 session-config
         show commands
      Lists active open sessions on a device
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show session-config {include-factory}
      Parameters
      • show session-config {include-factory}

       session-config                    Displays current session configuration
       include-factory                   • include-factory – Optional. Includes factory defaults
      Examples
      rfs7000-37FABE(config)#show session-config
      !
      ! Configuration of RFS7000 version 5.2.2.0-048B
      !
      !
      version 2.1
      !
      !
      ip access-list BROADCAST-MULTICAST-CONTROL
        permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"
        permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP
      replies"
       deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny
      windows netbios"
        deny ip any 224.0.0.0/4 rule-precedence 21 rule-description "deny IP multicast"
       deny ip any host 255.255.255.255 rule-precedence 22 rule-description "deny IP local
      broadcast"
        permit ip any any rule-precedence 100 rule-description "permit all IP traffic"
      !
      mac access-list PERMIT-ARP-AND-IPv4
       permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic"
       permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic"
      --More--
      rfs7000-37FABE(config)#
6 - 76 WiNG CLI Reference Guide


6.1.40 sessions
           show commands
        Displays CLI sessions initiated on a device
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show sessions {on <DEVICE-NAME>}
        Parameters
        • show sessions {on <DEVICE-NAME>}

         sessions                     Displays CLI sessions initiated on a device
         on <DEVICE-NAME>             Optional. Displays CLI sessions on a specified device
                                      • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE(config)#show sessions on rfs7000-37FABE
        INDEX   COOKIE NAME             START TIME                                   FROM
        1       4       snmp            2011-06-23 07:59:25                          127.0.0.1
        2       14      admin           2011-06-24 08:12:44                          Console
        3       15      admin           2011-06-24 08:42:26                          172.16.10.10

        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 77


6.1.41 smart-rf
         show commands
      Displays Smart RF management commands
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show smart-rf [calibration-status|channel-distribution|history|history-timeline|
         interactive-calibration-config|radio]

      show smart-rf [calibration-status|channel-distribution|history|history-timeline|
         interactive-calibration-config] {on <DOMAIN-NAME>}]

      show smart-rf      radio {<MAC>|activity|all-11an|all-11bgn|energy|neighbors|on <DOMAIN-
         NAME>]
      show smart-rf      radio {<MAC>|all-11an|all-11bgn|energy <MAC>} {on <DOMAIN-NAME>}
      show smart-rf      radio {activity|neigbors}{<MAC>|all-11an|all-11bgn|on <DOMAIN-NAME>}
      show smart-rf      radio {activity|neigbors}{<MAC>|all-11an|all-11bgn} {on <DOMAIN-
         NAME>}
      Parameters
      • show [calibration-status|channel-distribution|history|history-timeline|
      interactive-calibration-config] {on <DOMAIN-NAME>}

       calibration-status              Displays Smart RF calibration status
       {on <DOMAIN-NAME>}              • on <DOMAIN-NAME> – Optional. Displays Smart RF calibration status on a specified
                                          RF Domain
                                          • <DOMAIN-NAME> – Specify the RF Domain name.
       channel-distribution            Displays Smart RF channel distribution
       {on <DOMAIN-NAME>}              • on <DOMAIN-NAME> – Optional. Displays Smart RF channel distribution on a
                                          specified RF Domain
                                          • <DOMAIN-NAME> – Specify the RF Domain name.
       history                         Displays Smart RF calibration history
       {on <DOMAIN-NAME>}              • on <DOMAIN NAME> – Optional. Displays Smart RF calibration history on a
                                          specified RF Domain
                                          • <DOMAIN NAME> – Specify the RF Domain name.
6 - 78 WiNG CLI Reference Guide



         history-timeline                 Displays extended Smart RF calibration history on an hourly or daily timeline
         {on <DOMAIN-NAME>}               • on <DOMAIN-NAME> – Optional. Displays extended timeline on a specified
                                             RF Domain
                                             • <DOMAIN NAME> – Specify the RF Domain name.
         interactive-calibration-config   Displays simulated calibration configuration
         {on <DOMAIN-NAME>}               • on <DOMAIN-NAME> – Optional. Displays configuration on a specified RF Domain
                                             • on <DOMAIN-NAME> – Specify the RF Domain name.

        • show smart-rf radio {<MAC>|all-11an|all-11bgn|energy <MAC>}{on <DOMAIN-NAME>}

         radio                            Displays radio related commands
         <MAC>                            Optional. Displays details of a specified radio. Specify the MAC address of the radio in
                                          a <AA-BB-CC-DD-EE-FF> format.
         all-11an                         Optional. Displays all 11a radios currently in the configuration
         all-11bgn                        Optional. Displays all 11bg radios currently in the configuration
         energy {<MAC>}                   Optional. Displays radio energy
                                          Specify the MAC address of the radio
                                          • <MAC> – Optional. Specify the radio’s MAC address in the
                                             <AA-BB-CC-DD-EE-FF> format.
         on <DOMAIN-NAME>                 The following is common to above parameters:
                                          • on <DOMAIN-NAME> – Optional. Displays radio details on a specified RF Domain
                                            • <DOMAIN-NAME> – Specify the RF Domain name.
        • show smart-rf radio {activity|neighbors} {<MAC>|all-11an|all-11bgn} {on <DOMAIN-
        NAME>}

         radio                            Displays radio related commands
         activity                         Optional. Displays changes related to radio power, number of radio channels, or
                                          coverage holes. Use additional filters to view specific details.
         <MAC>                            Optional. Displays radio activity for a specified radio
                                          • <MAC> – Specify the MAC address of the radio.
         all-11an                         Optional. Displays radio activity of all 11a radios in the configuration
         all-11bgn                        Optional.Displays radio activity of all 11bg radios in the configuration
         on <DOMAIN-NAME>                 Optional. Displays radio activity of all radios within a specified RF Domain
                                          • <DOMAIN-NAME> – Specify the RF Domain name.
SHOW COMMANDS 6 - 79


Examples
rfs7000-37FABE(config)#show smart-rf calibration-status
No calibration currently in progress
rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show smart-rf history
rfs7000-37FABE(config)#
6 - 80 WiNG CLI Reference Guide


6.1.42 spanning-tree
          show commands
        Displays spanning tree information
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show spanning-tree mst {configuration|detail|instance|on}
        show spanning-tree mst {configuration {(on <DEVICE-NAME>)}}
        show spanning-tree mst {detail interface {<INTERFACE>|ge<1-4>|me1|
           port-channel<1-2>|vlan <1-4094>} {(on <DEVICE-NAME>)}}
        show spanning-tree mst {instance <1-15> {interface <INTERFACE>} {(on <DEVICE-NAME>)}}
        Parameters
        • show spanning-tree mst {configuration {(on <DEVICE-NAME>)}}

         spanning-tree                 Displays spanning tree information
         mst                           Displays Multiple Spanning Tree (MST) configuration
         configuration                 Optional. Displays MST configuration
         {on <DEVICE-NAME>}            • on <DEVICE-NAME> – Optional. Displays MST configuration on a specified device
                                         • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

        • show spanning-tree mst {detail interface {<Interfaced <1-4>|me1|
        port-channel <1-2>|vlan <1-4094>} {(on <DEVICE-NAME>)}}

         spanning-tree                 Displays spanning tree information
         mst                           Displays MST configuration
         detail                        Optional. Displays detailed MST configuration based on the parameters passed
SHOW COMMANDS 6 - 81



interface [<INTERFACE>|   Displays detailed MST configuration for a specified interface
age <1-4>|me1|            • <INTERFACE> – Displays detailed MST configuration for a specified interface. Specify
port-channel <1-2>|          the interface name.
van <1-4094>]
                          • age <1-4> – Displays GigabitEthernet interface MST configuration
                             • <1-4> – Select the GigabitEthernet interface index from 1 - 4.
                          • me1 – Displays FastEthernet interface MST configuration
                          • port-channel – Displays port channel interface MST configuration
                             • <1-2> – Select the port channel interface index from 1 - 2.
                          • vlan – Displays VLAN interface MST configuration
                             • <1-4094> – Select the SVI VLAN ID from 1 - 4094.
on <DEVICE-NAME>          Optional. Displays detailed MST configuration on a specified device
                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.

• show spanning-tree mst {instance <1-15> {interface <INTERFACE>} {(on <DEVICE-
NAME>)}}

spanning-tree             Displays spanning tree information
mst                       Displays MST configuration. Use additional filters to view specific details.
instance <1-15>           Optional. Displays information for a particular MST instance
                          • <1-15> – Specify the instance ID from 1 - 15.
interface [<INTERFACE>|   Optional. Displays MST configuration for a specific interface instance. The options are:
ge <1-4>|me1|             • <INTERFACE> – Displays MST configuration for a specified interface. Specify the
port-channel <1-2>|         interface name.
vlan <1-4094>]
                          • ge – Displays GigabitEthernet interface MST configuration
                            • <1-4> – Select the GigabitEthernet interface index from 1 - 4.
                          • me1 – Displays FastEthernet interface MST configuration
                          • port-channel – Displays port channel interface MST configuration
                            • <1-2> – Select the port channel interface index from 1 - 2.
                          • vlan – Displays VLAN interface MST configuration
                               • <1-4094> – Select the SVI VLAN ID from 1 - 4094.
on <DEVICE-NAME>          Optional. Displays MST configuration on a specified device
                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
6 - 82 WiNG CLI Reference Guide


        Examples
        rfs7000-37FABE(config)#show spanning-tree mst configuration on rfs7000-37FABE
        %%
        % MSTP Configuration Information for bridge 1 :
        %%------------------------------------------------------
        % Format Id       : 0
        % Name            : My Name
        % Revision Level : 0
        % Digest          : 0xac36177f50283cd4b83821d8ab26de62
        %%------------------------------------------------------

        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show spanning-tree mst detail interface test on rfs7000-37FABE
        % Bridge up - Spanning Tree Disabled
        % CIST Root Path Cost 0 - CIST Root Port 0 - CIST Bridge Priority 32768
        % Forward Delay 15 - Hello Time 2 - Max Age 20 - Max hops 20
        % 1: CIST Root Id 800000157037fabf
        % 1: CIST Reg Root Id 800000157037fabf
        % 1: CIST Bridge Id 800000157037fabf
        % portfast bpdu-filter disabled
        % portfast bpdu-guard disabled
        % portfast portfast errdisable timeout disabled
        % portfast errdisable timeout interval 300 sec
        % cisco interoperability not configured - Current cisco interoperability off

        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show spanning-tree mst detail
        % Bridge up - Spanning Tree Disabled
        % CIST Root Path Cost 0 - CIST Root Port 0 - CIST Bridge Priority 32768
        % Forward Delay 15 - Hello Time 2 - Max Age 20 - Max hops 20
        % 1: CIST Root Id 800000157037fabf
        % 1: CIST Reg Root Id 800000157037fabf
        % 1: CIST Bridge Id 800000157037fabf
        % 1: portfast bpdu-guard disabled
        % portfast portfast errdisable timeout disabled
        % portfast errdisable timeout interval 300 sec
        % cisco interoperability not configured - Current cisco interoperability off

        %   ge4:   Port 2004 - Id 87d4 - Role Disabled - State Forwarding
        %   ge4:   Designated External Path Cost 0 - Internal Path Cost 0
        %   ge4:   Configured Path Cost 11520 - Add type Implicit - ref count 1
        %   ge4:   Designated Port Id 0 - CST Priority 128
        %   ge4:   ge4: CIST Root 0000000000000000
        %   ge4:   ge4: Regional Root 0000000000000000
        %   ge4:   ge4: Designated Bridge 0000000000000000
        %   ge4:   Message Age 0 - Max Age 0
        %   ge4:   CIST Hello Time 0 - Forward Delay 0
        %   ge4:   CIST Forward Timer 0 - Msg Age Timer 0 - Hello Timer 0
        %   ge4:   Version Multiple Spanning Tree Protocol - Received None - Send MSTP
        %   ge4:   Portfast configured - Current portfast on
        %   ge4:   portfast bpdu-guard enabled - Current portfast bpdu-guard off
        %   ge4:   portfast bpdu-filter enabled - Current portfast bpdu-filter off
        %   ge4:   no root guard configured - Current root guard off
        %   ge4:   Configured Link Type point-to-point - Current point-to-point

        %   ge3:   Port 2003 - Id 87d3 - Role Disabled - State Forwarding
        %   ge3:   Designated External Path Cost 0 - Internal Path Cost 0
        %   ge3:   Configured Path Cost 11520 - Add type Implicit - ref count 1
        %   ge3:   Designated Port Id 0 - CST Priority 128
        --More--

        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show spanning-tree mst instance 1 interface test on rfs7000-
        37FABE
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 83


6.1.43 startup-config
         show commands
      Displays complete startup configuration script
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show startup-config {include-factory}
      Parameters
      • show startup-config {include-factory}

       startup-config                Displays startup configuration script
       include-factory               • include-factory – Optional. Includes factory defaults
      Examples
      rrfs7000-37FABE(config)#show startup-config include-factory
      !
      ! Configuration of RFS7000 version 5.2.2.0-048B
      !
      !
      version 2.1
      !
      !
      ip access-list BROADCAST-MULTICAST-CONTROL
        permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"
        permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP
      replies"
       deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny
      windows netbios"
        deny ip any 224.0.0.0/4 rule-precedence 21 rule-description "deny IP multicast"
       deny ip any host 255.255.255.255 rule-precedence 22 rule-description "deny IP local
      broadcast"
        permit ip any any rule-precedence 100 rule-description "permit all IP traffic"
      !
      mac access-list PERMIT-ARP-AND-IPv4
       permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic"
       permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic"
      --More--
      rfs7000-37FABE(config)#
6 - 84 WiNG CLI Reference Guide


6.1.44 terminal
          show commands
        Displays terminal configuration parameters
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show terminal
        Parameters
        None
        Examples
        rfs7000-37FABE(config)#show terminal
        Terminal Type: xterm
        Length: 45     Width: 126
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 85


6.1.45 timezone
        show commands
      Displays a device’s timezone
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show timezone
      Parameters
      • show timezone

       timezone                      Displays timezone where the AP or wireless controller is deployed

      Examples
      rfs7000-37FABE(config)#show timezone
      Timezone is America/Los_Angeles
6 - 86 WiNG CLI Reference Guide


6.1.46 upgrade-status
          show commands
        Displays the last image upgrade status



                       NOTE: This command is not available in the USER EXEC Mode



        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show upgrade-status {detail {on <DEVICE-NAME>}|on <DEVICE-NAME>}
        Parameters
        • show upgrade-status {detail {on <DEVICE-NAME>}|on <DEVICE-NAME>}

         detail                        Displays last image upgrade log
         {on <DEVICE-NAME>}            • on <DEVICE-NAME> – Optional. Displays last image upgrade log on a specified device
                                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
         on <DEVICE-NAME>              Optional. Displays last image upgrade status on a specified device
                                       • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
SHOW COMMANDS 6 - 87


Examples
rfs7000-37FABE(config)#show upgrade-status detail on rfs7000-37FABEE
Last Image Upgrade Status : Successful
Last Image Upgrade Time   : 2011-06-15 08:51:17 UTC
rfs7000-37FABE(config)#

--------------------------------------------------------
Running from partition /dev/mtdblock6, partition to update is /dev/mtdblock7
var2 is 6 percent full
/tmp is 6 percent full
Free Memory 155900 kB
FWU invoked via Linux shell
Validating image file header
Making file system
Extracting files (this can take some time).
Version of firmware update file is 5.2.2.0-033D
Successful
rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show upgrade-status on rfs7000-37FABE
Last Image Upgrade Status : Successful
Last Image Upgrade Time   : 04:12:2010 08:44:00 UTC
rfs7000-37FABE(config)#
6 - 88 WiNG CLI Reference Guide


6.1.47 version
          show commands
        Displays a device’s software and hardware version
        Supported in the following platforms:
           • AP300
           • AP621
           • AP650
           • AP6511
           • AP6521
           • AP6532
           • AP71XX
           • RFS4000
           • RFS6000
           • RFS7000
        Syntax
        show version {on <DEVICE-NAME>}
        Parameters
        • show version {on <DEVICE-NAME>}

         version                       Displays software and hardware versions on all devices or a specified device
         {on <DEVICE-NAME>}            • on <DEVICE-NAME> – Optional. Displays software and hardware versions on a
                                          specified device
                                          • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
        Examples
        rfs7000-37FABE(config)#show version on rfs7000-37FABE
        RFS7000 version 5.2.2.0-048B
        Copyright (c) 2004-2011 Motorola Solutions, Inc. All rights reserved.
        Booted from secondary

        rfs7000-37FABE uptime is 3 days, 19 hours 14 minutes
        CPU is RMI XLR V0.4
        255464 kB of on-board RAM
        Base ethernet MAC address is 00-15-70-37-FA-BE
        System serial number is 6268529900014
        Model number is RFS-7010-1000-WR
        FPGA version is 3.41
        rfs7000-37FABE(config)#
SHOW COMMANDS 6 - 89


6.1.48 wireless
        show commands
      Displays wireless configuration parameters
      Supported in the following platforms:
         • AP300
         • AP621
         • AP650
         • AP6511
         • AP6521
         • AP6532
         • AP71XX
         • RFS4000
         • RFS6000
         • RFS7000
      Syntax
      show wireless [ap|client|domain|mesh|meshpoint|radio|regulatory|sensor-server|
         unsanctioned|wips|wlan]

      show wireless ap {configured|detail|load-balancing|on <DEVICE-NAME>}
      show wireless ap {detail {<MAC/HOST-NAME> {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-
         OR-DOMAIN-NAME>}
      show wireless ap {load-balancing {client-capability|events|neighbors} {(on <DEVICE-
      NAME>)}

      show wireless client {associaton-history|detail|filter|on <DEVICE-OR-DOMAIN-
         NAME>|statistics|tspec}
      show wireless client {association-history <MAC> {on <DEVICE-OR-DOMAIN-NAME>}}
      show wireless client {detail <MAC> {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-OR-
         DOMAIN-NAME>
      show wireless client {filter {ip|on <DEVICE-OR-DOMAIN-NAME>|state|wlan}}
      show wireless client {filter ip [<IP>|not <IP>] {on <DEVICE-OR-DOMAIN-NAME>]}
      show wireless client {filter state [data-ready|not [data-ready|roaming]|roaming] {on
         <DEVICE-OR-DOMAIN-NAME>]}
      show wireless client {filter wlan [<WLAN>|not <WLAN>] {on <DEVICE-OR-DOMAIN-NAME>]}
      show wireless client {statistics {detail <MAC>|rf|window-data <MAC>} {(on <DEVICE-OR-
         DOMAIN-NAME>)}}
      show wireless client {tspec <MAC> {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-OR-DOMAIN-
         NAME>}

      show wireless domain statistics {detail {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-OR-
         DOMAIN-NAME>}}]

      show wireless mesh [detail|links {on <DEVICE-OR-DOMAIN-NAME>}]
      show wireless mesh detail {<DEVICE-NAME>|filter|on <DEVICE-OR-DOMAIN-NAME>}
      show wireless mesh detail {<DEVICE-NAME> <1-3> {(filter <RADIO-MAC>)} {(on <DEVICE-
         OR-DOMAIN-NAME>)}

      show wireless meshpoint [config|detail|multicast|neighbor|path|proxy|root|security|
         statistics|usage-mappings|on]
      show wireless meshpoint config {filter [device <DEVICE-NAME>|rf-domain <RF-DOMAIN>}
      show wireless meshpoint detail {<MESHPOINT>}
      show wireless meshpoint multicast [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}
      show wireless meshpoint neighbor [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}
      show wireless meshpoint path [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}
      show wireless meshpoint proxy [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}
      show wireless meshpoint root [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}
      show wireless meshpoint security [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}
6 - 90 WiNG CLI Reference Guide


        show wireless meshpoint statistics [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}
        show wireless meshpoint statistics on <DEVICE-OR-DOMAIN-NAME>
        show wireless meshpoint usage-mappings

        show wireless radio {detail|on <DEVICE-OR-DOMAIN-NAME>|statistics|tspec}
        show wireless radio {detail {<DEVICE-NAME> <1-3> (filter {on <DEVICE-OR-DOMAIN-
           NAME>|<RADIO-MAC>})}
        show wireless radio {statistics {detail|on|rf|windows-data}}
        show wireless radio {statistics {on <DEVICE-OR-DOMAIN-NAME>|rf {on <DEVICE-
           OR-DOMAIN-NAME>}}
        show wireless radio {statistics {detail|window-data} {<DEVICE-NAME> <1-3>} {(filter
        <RADIO-MAC>)} {(on <DEVICE-OR-DOMAIN-NAME>)}

        show wireless regulatory [channel-info <WORD>|country-code <WORD>|
           device-type]
        show wireless regulatory device-type [ap650|ap6511|ap7131|rfs4000] <WORD>

        show wireless sensor-server {on <DEVICE-OR-DOMAIN-NAME>}
        show wireless unsanctioned aps {detail|statistics} {(on <DEVICE-OR-DOMAIN-NAME>)}

        show wireless wips [client-blacklist|event-history]{on <DEVICE-OR-DOMAIN-NAME>}

        show wireless wlan {config|detail <WLAN>|on <DEVICE-OR-DOMAIN-NAME>|
           policy-mappings|statistics|usage-mappings}
        show wireless wlan {detail <WLAN>|on <DEVICE-OR-DOMAIN-NAME>|policy-mappings|
           usage-mappings}
        show wireless {config filter {device <DEVICE-NAME>|rf-domain <DOMAIN-NAME>}}
        show wireless wlan statitics {<WLAN>|detail|traffic} {on <DEVICE-OR-DOMAIN-NAME>}

        Parameters
        • show wireless ap {configured}

         wireless                 Displays wireless configuration parameters
         ap                       Displays information on wireless controller managed access points
         configured               Optional. Displays all configured AP information

        • show wireless ap {detail {<MAC/HOST-NAME> {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-
        OR-DOMAIN-NAME>}}

         wireless                 Displays wireless configuration parameters
         ap                       Displays information on wireless controller managed access points
         detail                   Optional. Displays detailed information for all APs or a specified AP
         {<MAC/HOST-NAME>         • <MAC/HOST-NAME> – Optional. Displays information for a specified AP
         {on <DEVICE-OR-DOMAIN-     • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays information on a specified
         NAME>}                     device or RF Domain
                                       • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless control-
                                          ler, or RF Domain.
         on <DEVICE-OR-DOMAIN-    Optional. Displays information on a specified device or RF Domain
         NAME>}                   • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                    RF Domain.

        • show wireless ap {load-balancing {client-capability|events|neighbors} {(on <DEVICE-
        NAME>)}}

         wireless                  Displays wireless configuration parameters
         ap                        Displays information on wireless controller managed access points
SHOW COMMANDS 6 - 91



load-balancing              Optional. Displays load balancing status. Use additional filters to view specific details.
{client-capability|         • client capability – Optional. Displays client band capability
events|neighbors}
                            • events – Optional. Displays client events
                            • neighbors – Optional. Displays neighboring clients
on <DEVICE-NAME>            The following are common to the client capability, events, and neighbors parameters:
                            • on – Optional. Displays load balancing status on a specified device
                              • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
• show wireless client {association-history <MAC> {on <DEVICE-OR-DOMAIN-NAME>}}

wireless                    Displays wireless configuration parameters
client                      Displays client information based on the parameters passed
association-history <MAC>   Optional. Displays association history for a specified client
                            • <MAC> – Specify the MAC address of the client.
on <DEVICE-OR-DOMAIN-       Optional. Displays association history on a specified device or RF Domain
NAME>                       • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                              RF Domain.
• show wireless client {detail <MAC> {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-OR-
DOMAIN-NAME>}

wireless                    Displays wireless configuration parameters
client                      Displays client information based on the parameters passed
detail <MAC>                Optional. Displays detailed information for a specified client
{on <DEVICE-OR-DOMAIN-      • <MAC> – Specify the MAC address of the client.
NAME>}                        • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays detailed information on a
                              specified device or RF Domain
                                 • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless control-
                                    ler, or RF Domain.
on <DEVICE-OR-DOMAIN-       Optional. Displays client information on a specified device or RF Domain
NAME>                       • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                              RF Domain.

• show wireless client {filter ip {<IP>|not <IP>} {on <DEVICE-OR-DOMAIN-NAME>}

wireless                    Displays wireless configuration parameters
client                      Displays client information based on the parameters passed
6 - 92 WiNG CLI Reference Guide



         filter IP {<IP>|not <IP>}    Optional. Uses IP address to filter clients
                                      • <IP> – Optional. Selects clients based on the IP address passed
                                      • not <IP> – Optional. Inverts the match selection
         on <DEVICE-OR-DOMAIN-        The following is common to the IP and not IP parameters:
         NAME>                        • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays association history on a
                                        specified device or RF Domain
                                        • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller,
                                        or RF Domain.

        • show wireless client {filter state {data-ready|not {data-ready|roaming}|roaming}
        {on <DEVICE-OR-DOMAIN-NAME>}

         wireless                     Displays wireless configuration parameters
         client                       Displays client information based on the parameters passed
         filter state {data-ready|    Optional. Filters clients based on their state
         not {data-ready|roaming}|    • data-ready – Optional. Selects wireless clients in the data-ready state
         roaming}
                                      • not {data-ready|roaming} – Optional. Inverts match selection. Selects wireless
                                        clients neither ready nor roaming
                                      • Roaming – Optional. Selects roaming clients
         on <DEVICE-OR-DOMAIN-        The following is common to the ready, not, and roaming parameters:
         NAME>                        • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays client details on a specified
                                        device or RF Domain
        • show wireless client {filter wlan {<WLAN>|not {WLAN} {on <DEVICE-OR-DOMAIN-NAME>}

         wireless                    Displays wireless configuration parameters
         client                      Displays client information based on the parameters passed
         filter wlan {<WLAN>|        Optional. Filters clients on a specified WLAN
         not <WLAN>}                 • <WLAN> – Specify the WLAN name.
                                     • not <WLAN> – Inverts the match selection
         on <DEVICE-OR-DOMAIN-       The following are common to the WLAN and not parameters:
         NAME>                       • on <DEVICE-OR-DOMAIN-NAME> – Optional. Filters clients on a specified device or
                                       RF Domain

        • show wireless client {statistics {detail <MAC>|rf|window-data <mac>} {on <DEVICE-
        OR-DOMAIN-NAME>}

         wireless                    Displays wireless configuration parameters
         client                      Displays client information based on the parameters passed
SHOW COMMANDS 6 - 93



statistics               Optional. Displays detailed client statistics. Use additional filters to view specific
{detail <MAC>|           details.
rf|window-data <MAC>}    • detail <MAC> – Optional. Displays detailed statistics for a specified client
                           • <MAC> – Specify the MAC address of the client.
                         • rf – Displays detailed client statistics on a specified device or RF Domain
                         • window-data <MAC> – Displays historical data, for a specified client
                           • <MAC> – Specify the MAC address of the client
on <DEVICE-OR-DOMAIN-    The following are common to the detail <MAC>, RF, and window-data <MAC>
NAME>                    parameters:
                         • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays client statistics on a specified
                           device or RF Domain

• show wireless client {tspec {<MAC> {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-OR-
DOMAIN-NAME>}}

wireless                 Displays wireless configuration parameters
client                   Displays client information based on the parameters passed
tspec <MAC>              Optional. Displays detailed TSPEC information for all clients or a specified client
{on <DEVICE-OR-DOMAIN-   • <MAC> – Optional. Displays detailed TSPEC information for a specified client
NAME>}                     • <MAC> – Specify the MAC address of the client.
                              • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays detailed TSPEC infor-
                                 mation on a specified device or RF Domain
on <DEVICE-OR-DOMAIN-    Optional. Displays detailed TSPEC information for all wireless clients on a specified
NAME>                    device or RF Domain
                         • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                           RF Domain.

• show wireless mesh links {on <DEVICE-OR-DOMAIN-NAME>}

wireless                 Displays wireless configuration parameters
mesh                     Displays information on radio mesh
links                    Optional. Displays active links of a radio mesh
{on <DEVICE-OR-DOMAIN-   • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays active links of a radio mesh
NAME>}                     on a specified device or RF Domain

• show wireless mesh detail {<DEVICE-NAME> <1-3> {(filter <RADIO-MAC>)} {(on <DEVICE-
OR-DOMAIN-NAME>)}}

wireless                 Displays wireless configuration parameters
mesh                     Displays radio mesh information
detail                   Optional. Displays detailed radio mesh information
<DEVICE-NAME> <1-3>      Optional. Specify the MAC address or hostname, or append the interface number to
                         form the mesh ID in the AA-BB-CC-DD-EE-FF:RX or HOSTNAME:RX format.
                         • <1-3> – Optional. Specify the mesh interface index.
6 - 94 WiNG CLI Reference Guide



         filter <RADIO-MAC>       Optional. Provides additional filters
                                  • <RADIO-MAC> – Optional. Filters based on the radio MAC address
         on <DEVICE-OR-DOMAIN-    Optional. After specifying the radio MAC address, further refine the search by
         NAME>                    specifying a device or RF Domain.
                                  • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                    RF Domain.

        • show wireless meshpoint {filter [device <DEVICE-NAME>|rf-domain <RF-DOMAIN>}

         wireless                 Displays wireless configuration parameters
         meshpoint                Displays mesh point status and other related information
         filter                   Optional. Displays mesh point information based on either the device or RF Domain the
                                  mesh point is in.
         device <DEVICE-NAME>     Optional. Displays mesh point information on the device identified by
                                  <DEVICE-NAME>.
         rf-domain <RF-DOMAN>     Optional. Displays mesh point information for the rf-domain specified by the
                                  <RF-DOMAIN> value.

        • show wireless meshpoint config {filter [device <DEVICE-NAME>|rf-domain <RF-DOMAIN>}

         wireless                 Displays wireless configuration parameters
         meshpoint                Displays mesh point status and other related information.
         config                   Displays the mesh point configuration details.
         filter                   Optional. Displays mesh point configuration details based on either the device or RF
                                  Domain the mesh point is in.
         device <DEVICE-NAME>     Optional. Displays mesh point configuration details on the device identified by
                                  <DEVICE-NAME>
         rf-domain <RF-DOMAN>     Optional. Displays mesh point configuration details for the rf-domain specified by the
                                  <RF-DOMAIN> value.
        • show wireless meshpoint detail {<MESHPOINT>}

         wireless                 Displays wireless configuration parameters
         meshpoint                Displays mesh point status and other related information
         detail                   Displays detailed mesh point information
         <MESHPOINT>              Displays detailed information for the mesh point <MESHPOINT>

        • show wireless meshpoint multicast [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}

         wireless                 Displays wireless configuration parameters
         meshpoint                Displays mesh point status and other related information
         multicast                Displays mesh point multicast information
SHOW COMMANDS 6 - 95



<MESHPOINT>             Displays detailed information for the mesh point <MESHPOINT>
detail                  Displays detailed mesh point multicast information
on <DEVICE-OR-DOMAIN-   Optional. Displays multicast information for a selected mesh point on a device or
NAME>                   domain specified by <DEVICE-OR-DOMAIN>.

• show wireless meshpoint neighbor [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}

wireless                Displays wireless configuration parameters
meshpoint               Displays mesh point status and other related information
neighbor                Displays mesh point neighbor information
<MESHPOINT>             Displays detailed neighbor information for the mesh point <MESHPOINT>
detail                  Displays detailed neighbor information
on <DEVICE-OR-DOMAIN-   Optional. Displays neighbor information for a selected mesh point on a device or
NAME>                   domain specified by <DEVICE-OR-DOMAIN>.

• show wireless meshpoint path [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}

wireless                Displays wireless configuration parameters
meshpoint               Displays mesh point status and other related information
path                    Displays mesh point path information
<MESHPOINT>             Displays detailed path information for the mesh point <MESHPOINT>
detail                  Displays detailed path information
on <DEVICE-OR-DOMAIN-   Optional. Displays path information for a selected mesh point on a device or domain
NAME>                   specified by <DEVICE-OR-DOMAIN>.

• show wireless meshpoint proxy [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}

wireless                Displays wireless configuration parameters
meshpoint               Displays mesh point status and other related information
proxy                   Displays mesh point proxy information
<MESHPOINT>             Displays detailed proxy information for the mesh point <MESHPOINT>
detail                  Displays detailed proxy information
on <DEVICE-OR-DOMAIN-   Optional. Displays proxy information for a selected mesh point on a device or domain
NAME>                   specified by <DEVICE-OR-DOMAIN>.

• show wireless meshpoint root [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}

wireless                Displays wireless configuration parameters
meshpoint               Displays mesh point status and other related information
root                    Displays mesh point root information
6 - 96 WiNG CLI Reference Guide



         <MESHPOINT>              Displays detailed root information for the mesh point <MESHPOINT>
         detail                   Displays detailed root information
         on <DEVICE-OR-DOMAIN-    Optional. Displays root information for a selected mesh point on a device or domain
         NAME>                    specified by <DEVICE-OR-DOMAIN>.

        • show wireless meshpoint security [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}

         wireless                 Displays wireless configuration parameters
         meshpoint                Displays mesh point status and other related information
         security                 Displays mesh point security information
         <MESHPOINT>              Displays detailed security information for the mesh point <MESHPOINT>
         detail                   Displays detailed security information
         on <DEVICE-OR-DOMAIN-    Optional. Displays security information for a selected mesh point on a device or domain
         NAME>                    specified by <DEVICE-OR-DOMAIN>.

        • show wireless meshpoint statistics [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-
        NAME>}

         wireless                 Displays wireless configuration parameters
         meshpoint                Displays mesh point status and other related information
         statistics               Displays mesh point statistics
         <MESHPOINT>              Displays detailed statistics for the mesh point <MESHPOINT>
         detail                   Displays detailed statistics
         on <DEVICE-OR-DOMAIN-    Optional. Displays statistics for a selected mesh point on a device or domain specified
         NAME>                    by <DEVICE-OR-DOMAIN>.

        • show wireless meshpoint statistics on <DEVICE-OR-DOMAIN-NAME>

         wireless                 Displays wireless configuration parameters
         meshpoint                Displays mesh point status and other related information
         statistics               Displays mesh point statistics
         on <DEVICE-OR-DOMAIN-    Displays statistics for a selected mesh point on a device or domain specified by
         NAME>                    <DEVICE-OR-DOMAIN>
        • show wireless meshpoint usage-mappings

         wireless                 Displays wireless configuration parameters
         meshpoint                Displays mesh point status and other related information
         usage-mappings           Displays mesh point usage mappings
SHOW COMMANDS 6 - 97


• show wireless radio {detail {<DEVICE-NAME> <1-3> {(filter <RADIO-MAC>)} {(on
<DEVICE-OR-DOMAIN-NAME>)}}

wireless                    Displays wireless configuration parameters
radio                       Displays radio operation status and other related information
detail                      Optional. Displays detailed radio operation status
<DEVICE-NAME> <1-3>         Optional. Specify the MAC address or hostname, or append the interface number to
                            form the radio ID in the AA-BB-CC-DD-EE-FF:RX or HOSTNAME:RX format.
                            • <1-3> – Optional. Specify the radio interface index.
filter <RADIO-MAC>          Optional. Provides additional filters
                            • <RADIO-MAC> – Optional. Filters based on the radio MAC address
on <DEVICE-OR-DOMAIN-       Optional. After specifying the radio MAC address, further refine the search by
NAME>                       specifying a device or RF Domain.
                            • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                              RF Domain.

• show wireless radio {statistics {on <DEVICE-OR-DOMAIN-NAME>|rf {on <DEVICE-OR-
DOMAIN-NAME>}}

wireless                    Displays wireless configuration parameters
radio                       Displays radio operation status and other related information
statistics                  Optional. Displays radio traffic and RF statistics
{on <DEVICE-OR-DOMIAN-      • on <DEVICE-OR-DOMIAN-NAME> – Optional. Displays traffic and RF related
NAME>|                        statistics on a specified device or RF Domain
rf {on <DEVICE-OR-DOMAIN-     • <DEVICE-OR-DOMIAN-NAME> – Specify the name of the AP, wireless controller,
NAME>}}                       or RF Domain.
                            • rf – Optional. Displays RF statistics on a specified device or RF Domain
                              • <DEVICE-OR-DOMIAN-NAME> – Specify the name of the AP, wireless controller,
                              or RF Domain.
• show wireless radio {statistics {detail|window-data} {<DEVICE-NAME> <1-3> {(filter
<RADIO-MAC>)} {(on <DEVICE-OR-DOMAIN-NAME>)}}

wireless                    Displays wireless configuration parameters
radio                       Displays radio operation status and other related information
statistics                  Optional. Displays radio traffic and RF statistics. Use additional filters to view specific
{detail|window-data}        details. The options are: are:
                            • detail – Displays detailed traffic and RF statistics of all radios
                            • window-data – Displays historical data over a time window
<DEVICE-NAME> <1-3>         The following are common to the detail and window-data parameters:
                            • <DEVICE-NAME> – Optional. Specify the MAC address or hostname, or append the
                              interface number to form the radio ID in the AA-BB-CC-DD-EE-FF:RX or
                              HOSTNAME:RX format.
                              • <1-3> – Optional. Specify the radio interface index.
6 - 98 WiNG CLI Reference Guide



         filter <RADIO-MAC>        Optional. Provides additional filters
                                   • <RADIO-MAC> – Optional. Filters based on the radio MAC address
         on <DEVICE-OR-DOMAIN-     Optional. After specifying the radio MAC address, further refine the search by
         NAME>                     specifying a device or RF Domain.
                                   • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                     RF Domain.

        • show wireless regulatory [channel-info <WORD>|county-code <WORD>]

         wireless                 Displays wireless configuration parameters
         regulatory               Displays wireless regulatory information
         channel-info <WORD>      Displays channel information
                                  • <WORD> – Specify the channel number.
         country-code <WORD>      Displays country code to country name information
                                  • <WORD> – Specify the two letter ISO-3166 country code.

        • show wireless regulatory device-type [ap650|ap6511|ap71xx|rfs4000] <WORD>

         wireless                 Displays wireless configuration parameters
         regulatory               Displays wireless regulatory information
         device-type              Displays regulatory information based on the device type
         [ap650|ap6511|ap71xx|    • ap650 – Displays AP650 information
         rfs4000] <WORD>
                                  • ap6511 – Displays AP6511 information
                                  • ap71xx – Displays AP71XX information
                                  • rfs4000 – Displays RFS4000 information
                                  The following is common to all of the above:
                                     • <WORD> – Specify the two letter ISO-3166 country code.

        • show wireless sensor-server {on <DEVICE-OR-DOMAIN-NAME>}

         wireless                 Displays wireless configuration parameters
         sensor- server           Displays AirDefense sensor server configuration details
         {on <DEVICE-OR-DOMAIN-   • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays AirDefense sensor server
         NAME>}                      configuration on a specified device or RF Domain

        • show wireless unsanctioned aps {detailed|statistics} {(on <DEVICE-OR-DOMAIN-NAME>)}

         wireless                 Displays wireless configuration parameters
         unsanctioned aps         Displays unauthorized APs. Use additional filters to view specific details.
         detailed                 Optional. Displays detailed unauthorized APs information
SHOW COMMANDS 6 - 99



statistics                      Optional. Displays channel statistics
on <DEVICE-OR-DOMAIN-           The following is common to the detailed and statistics parameters:
NAME>                           • on <DEVICE-OR-DOMAIN-NAME> – Optional. Specify the name of the AP, wireless
                                  controller, or RF Domain.
• show wireless wips [client-blacklist|event-history] {on <DEVICE-OR-DOMAIN-NAME>}

wireless                        Displays wireless configuration parameters
wips [client-blacklist|event-   Displays the WIPS details
history]                        • client-blacklist – Displays blacklisted clients
                                • event-history – Displays event history
on <DEVICE-OR-DOMAIN-           The following are common to the client-blacklist and event-history parameters:
NAME>                           • on <DEVICE-OR-DOMAIN-NAME> – Optional. Specify the name of the AP, wireless
                                  controller, or RF Domain.

• show wlan {detail <WLAN>|on <DEVICE-OR-DOMAIN-NAME>|policy-mappings|usage-mappings}

wireless                        Displays wireless configuration parameters
wlan                            Displays WLAN related information based on the parameters passed
detail <WLAN>                   Optional. Displays WLAN configuration
                                • <WLAN> – Specify the WLAN name.
on <DEVICE-OR-DOMAIN-           Optional. Displays WLAN configuration on a specified device or RF Domain
NAME>                           • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or
                                  RF Domain.
policy-mappings                 Optional. Displays WLAN policy mappings
usage-mappings                  Optional. Lists all devices and profiles using the WLAN

• show wlan {config filter {device <DEVICE-NAME>|rf-domain <DOMAIN-NAME>}

wireless                        Displays wireless configuration parameters
wlan                            Displays WLAN related information based on the parameters passed
config filter                   Optional. Filters WLAN information based on the device name or RF Domain
device <DEVICE-NAME>            Optional. Filters WLAN information based on the device name
                                • <DEVICE-NAME> – Specify the device name.
rf-domain                       Optional. Filters WLAN information based on the RF Domain
<DOMAIN-NAME>                   • <DOMAIN-NAME> – Specify the RF Domain name.

• show wlan {statistics {<WLAN>|detail} {(on <DEVICE-OR-DOMAIN-NAME>)}

wireless                         Displays wireless configuration parameters
wlan                             Displays WLAN related information based on the parameters passed
6 - 100 WiNG CLI Reference Guide



         statistics {<WLAN>|detail}   Optional. Displays WLAN statistics. Use additional filters to view specific details
                                      • <WLAN> – Optional. Displays WLAN statistics. Specify the WLAN name.
                                      • detail – Optional. Displays detailed WLAN statistics
         on <DEVICE-OR-DOMAIN-        The following is common to the <WLAN> and detail parameters:
         NAME>                        • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays WLAN statistics on a
                                        specified device or RF Domain
        Examples
        rfs7000-37FABE(config)#show wireless sensor server status on ap7131-889EC4
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show wireless unauthorized aps detailed
        Number of APs seen: 1
        rfs7000-37FABE(config)#
        rfs7000-37FABE(config)#show wireless wips mu-blacklist
        No mobile units blacklisted
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show wireless wlan config
        +-----------+---------+-----------+-------------+-----------------+-------
        |    NAME   | ENABLE |     SSID   | ENCRYPTION | AUTHENTICATION |      VLAN                                     |
        +-----------+---------+-----------+-------------+-----------------+-------
        | test      | Y       | test      | none         | none           | 1                                           |
        | motorola | Y        | motorola | none          | none           | 1                                           |
        | wlan1     | Y       | wlan1     | none         | none           | 1                                           |
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show wireless wlan statistics
        +---------------------+----------+----------+--------+--------+--------+--
        |        WLAN        | TX BYTES | RX BYTES |TX PKTS |RX PKTS |TX KBPS |RX KBPS |DROPPED
        | ERRORS |
        +---------------------+----------+----------+--------+--------+--------+-
        |          motorola |       0 |       0 |     0 |    0 |     0 |     0 |     0 |    0 |
        |             wlan1 |       0 |       0 |    0 |     0 |     0 |     0 |     0 |    0 |
        +---------------------+----------+----------+--------+--------+--------+--
        Total number of wlan displayed: 2
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show wireless regulatory channel-info 1
        Center frequency for channel 1 is 2412MHz
        rfs7000-37FABE(config)#

        rfs7000-37FABE(config)#show wireless regulatory country-code
        ISO CODE                       NAME
        ------------------------------------------------------------
          al                           Algeria
          ai                           Anguilla
          ar                           Argentina
          au                           Australia
          at                           Austria
          bs                           Bahamas
          bh                           Bahrain
          bb                           Barbados
          by                           Belarus
          be                           Belgium
          bm                           Bermuda
          bo                           Bolivia
          bw                           Botswana
          ba                           Bosnia-Herzegovina
          br                           Brazil
          bg                           Bulgaria
          ca                           Canada
          ky                           Cayman Islands
        ......................................................
SHOW COMMANDS 6 - 101


rfs7000-37FABE(config)#

rfs7000-37FABE(config)#show wireless regulatory device-type ap650 in
--------------------------------------------------------------------------
# Channel Set Power(mW) Power (dBm)     Placement          DFS         CAC(mins)
--------------------------------------------------------------------------
    1  1-13        4000      36          Indoor/Outdoor   NA              NA
  2   36-64       200       23          Indoor           Not Required   0
  3   149-165     1000      30          Outdoor          Not Required   0
  4   149-165     200       23          Indoor           Not Required   0
--------------------------------------------------------------------------
rfs7000-37FABE(config)#
RFS4000-880DA7(config)#show wireless ap detail RFS4000-880DA7 on RFS4000-880DA7

AP: 00-23-68-88-0D-A7
 AP Name                :   RFS4000-880DA7
 Location               :   default
 RF-Domain              :   default
 Type                   :   RFS4000
 Model                  :   RFS-4011-11110-US
 Num of radios          :   2
 Num of clients         :   0
 Last Smart-RF time     :   not done
 Stats update mode      :   auto
 Stats interval         :   6
 Radio Modes            :
      radio-1           :   wlan
      radio-2           :   wlan
 Country-code           :   not-set
 Site-Survivable        :   True
 Last error             :
 Fault Detected         :   False

RFS4000-880DA7(config)#

RFS4000-880DA7(config)#show wireless ap load-balancing on default/RFS4000-880DA7

AP: 00-23-68-88-0D-A7
Client requests on 5ghz   : allowed
Client requests on 2.4ghz : allowed

Average AP load in neighborhood                 :   0 %
Load on this AP                                 :   0 %
Total 2.4ghz band load in neighborhood          :   0 %
Total 5ghz band load in neighborhood            :   0 %
Configured band ratio 2.4ghz to 5ghz            :   1:1
Current band ratio 2.4ghz to 5ghz               :   0:0
Average 2.4ghz channel load in neighborhood     :   0 %
Average 5ghz channel load in neighborhood       :   0 %
Load on this AP's 2.4ghz channel                :   0 %
Load on this AP's 5ghz channel                  :   0 %

Total number of APs displayed: 1
RFS4000-880DA7(config)#

RFS4000-880DA7(config)#show wireless ap on default
--------------------------------------------------------------------------
MODE        : radio modes - W = WLAN, S=Sensor, ' ' (Space) = radio not present
--------------------------------------------------------------------------
AP-NAME    AP-LOCATION       RF-DOMAIN      AP-MAC   #RADIOS MODE #CLIENT
LAST-CAL-TIME
--------------------------------------------------------------------------
RFS4000-880DA7    default    default 00-23-68-88-0D-A7   2   W-W    0
not done
--------------------------------------------------------------------------
Total number of APs displayed: 1
RFS4000-880DA7(config)#
rfs7000-37FABE(config)#show wireless meshpoint config
--------------------------------------------------------------------------------
6 - 102 WiNG CLI Reference Guide


                   NAME                 ENABLE                        MESHID
        --------------------------------------------------------------------------------
                   test                 Y                        TesingMeshPoint
        --------------------------------------------------------------------------------
        rfs7000-37FABE(config)#show wireless meshpoint detail
        SUMMARY
         NAME                 | test [MESHID:TesingMeshP
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)
Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)

More Related Content

PDF
Motorola solutions wing 4.4 wireless controller cli reference guide (part no....
PDF
Motorola solutions wing 4.4 wireless controller system reference guide (part ...
PDF
Motorola solutions wing 5.5 access point system reference guide (part no. mn0...
PDF
intel-soa-v2704-sec-eng
PDF
Release11.2 releasenotes issue1
DOC
Portable device installation_considerations
PDF
172809159 sip
PDF
Motorola solutions wing 4.4 ap7131 n access point product reference guide (pa...
Motorola solutions wing 4.4 wireless controller cli reference guide (part no....
Motorola solutions wing 4.4 wireless controller system reference guide (part ...
Motorola solutions wing 5.5 access point system reference guide (part no. mn0...
intel-soa-v2704-sec-eng
Release11.2 releasenotes issue1
Portable device installation_considerations
172809159 sip
Motorola solutions wing 4.4 ap7131 n access point product reference guide (pa...

What's hot (17)

PDF
How to use autel maxicheck steering angle sensor calibration
DOC
Huawei y330 u15 v100 r001c00b111custc605d002 update guide 2.1
PDF
e1171_p4se-u2
PDF
아보태블릿PC ARBOR Gladius8 2D 7.85인치 안드로이드 태블릿PC 매뉴얼
PDF
Allwinner A13 CPU datasheet
PDF
How to use Autel MOT Pro EU908 Multi Function Scanner
PDF
Asus p5k
PDF
rtht
PDF
430ug slau049f
PDF
Oracle 10-g-recommendations-v1 2
PDF
Jtag Help Desk manual 1.0
PDF
Motorola solutions wing 4.4 ap51xx access point product reference guide (part...
PDF
11iadutil
PDF
Eva9000 9150 um_27_mar09
PDF
Utran qo s alert actions
PDF
Honeywell udc 2500
PDF
Video and Streaming in Nokia Phones v1.0
How to use autel maxicheck steering angle sensor calibration
Huawei y330 u15 v100 r001c00b111custc605d002 update guide 2.1
e1171_p4se-u2
아보태블릿PC ARBOR Gladius8 2D 7.85인치 안드로이드 태블릿PC 매뉴얼
Allwinner A13 CPU datasheet
How to use Autel MOT Pro EU908 Multi Function Scanner
Asus p5k
rtht
430ug slau049f
Oracle 10-g-recommendations-v1 2
Jtag Help Desk manual 1.0
Motorola solutions wing 4.4 ap51xx access point product reference guide (part...
11iadutil
Eva9000 9150 um_27_mar09
Utran qo s alert actions
Honeywell udc 2500
Video and Streaming in Nokia Phones v1.0
Ad

Similar to Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a) (20)

PDF
Motorola solutions wing 4.4 wireless controller cli reference guide (part no....
PDF
Motorolascanner sd kforwindows
PDF
지브라PDA Zebra MC9200 2D 산업용PDA 바코드PDA 매뉴얼
PDF
지브라PDA Zebra MC45 2D 산업용PDA 바코드PDA 매뉴얼
PDF
지브라PDA Zebra MC2100 2D 산업용PDA 바코드PDA 매뉴얼
PDF
Motorola r56 2005_manual
PDF
지브라스캐너 Zebra CS3000 1D 포켓타입 모바일스캐너 매뉴얼
PDF
Release11.2 releasenotes issue1
PDF
지브라PDA Zebra MC9500-K 2D 산업용PDA 바코드PDA 매뉴얼
PDF
지브라키오스크 Zebra MK3100 8인치 마이크로키오스크 산업용키오스크 산업용PC 매뉴얼
PDF
Ovm user's guide
PDF
Motorola solutions wing 4.4 ap7131 n access point product reference guide (pa...
PDF
B28654oas10g best pracitice
PDF
PDF
지브라PDA Zebra MC18 2D 산업용PDA 퍼스널쇼퍼 바코드PDA 매뉴얼
PDF
Motorola MotoTRBO System Planner
PDF
2010 06 ess user guide_v5
PDF
SLM
PDF
Network updater4 0onlinehelpissue2
PDF
Network updater4 0onlinehelpissue2
Motorola solutions wing 4.4 wireless controller cli reference guide (part no....
Motorolascanner sd kforwindows
지브라PDA Zebra MC9200 2D 산업용PDA 바코드PDA 매뉴얼
지브라PDA Zebra MC45 2D 산업용PDA 바코드PDA 매뉴얼
지브라PDA Zebra MC2100 2D 산업용PDA 바코드PDA 매뉴얼
Motorola r56 2005_manual
지브라스캐너 Zebra CS3000 1D 포켓타입 모바일스캐너 매뉴얼
Release11.2 releasenotes issue1
지브라PDA Zebra MC9500-K 2D 산업용PDA 바코드PDA 매뉴얼
지브라키오스크 Zebra MK3100 8인치 마이크로키오스크 산업용키오스크 산업용PC 매뉴얼
Ovm user's guide
Motorola solutions wing 4.4 ap7131 n access point product reference guide (pa...
B28654oas10g best pracitice
지브라PDA Zebra MC18 2D 산업용PDA 퍼스널쇼퍼 바코드PDA 매뉴얼
Motorola MotoTRBO System Planner
2010 06 ess user guide_v5
SLM
Network updater4 0onlinehelpissue2
Network updater4 0onlinehelpissue2
Ad

More from Advantec Distribution (20)

PDF
E pmp for public presentation feb 27 2015
PDF
1 wi ng5_wlan_brochure
PDF
Vx9000 datasheet
PDF
Nx7500 datasheet
PDF
Nx9500 datasheet
PDF
Nx4500 6500 datasheet
PDF
Rfs7000 datasheet
PDF
Rfs6000 datasheet
PDF
Rfs4000 datasheet
PDF
Ap8200 datasheet
PDF
Ap7181 datasheet
PDF
Ap8222 datasheet
PDF
Ap8163 datasheet
PDF
Ap6562 datasheet
PDF
Ap8122 datasheet
PDF
Ap8132 datasheet
PDF
Ap7532 datasheet
PDF
Ap7502 datasheet
PDF
Ap7131 datasheet
PDF
Ap7522 datasheet
E pmp for public presentation feb 27 2015
1 wi ng5_wlan_brochure
Vx9000 datasheet
Nx7500 datasheet
Nx9500 datasheet
Nx4500 6500 datasheet
Rfs7000 datasheet
Rfs6000 datasheet
Rfs4000 datasheet
Ap8200 datasheet
Ap7181 datasheet
Ap8222 datasheet
Ap8163 datasheet
Ap6562 datasheet
Ap8122 datasheet
Ap8132 datasheet
Ap7532 datasheet
Ap7502 datasheet
Ap7131 datasheet
Ap7522 datasheet

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Empathic Computing: Creating Shared Understanding
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Big Data Technologies - Introduction.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
Review of recent advances in non-invasive hemoglobin estimation
Spectral efficient network and resource selection model in 5G networks
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Empathic Computing: Creating Shared Understanding
NewMind AI Monthly Chronicles - July 2025
Big Data Technologies - Introduction.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Building Integrated photovoltaic BIPV_UPV.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The AUB Centre for AI in Media Proposal.docx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity

Motorola solutions wing 5.2.2 wireless controller cli reference guide (part no. 72 e 159607-01 rev. a)

  • 1. Motorola Solutions WiNG 5.2.2 Wireless Controller CLI Reference Guide
  • 3. MOTOROLA SOLUTIONS WING 5 CLI REFERENCE GUIDE 72E-159607-01 Revision A January 2012
  • 4. ii CLI Reference Guide No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Motorola Solutions. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice. The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Motorola Solutions grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Motorola Solutions. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Motorola Solutions. The user agrees to maintain Motorola Solution’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user agrees not to decompile, disassemble, decode, or reverse engineer any licensed program delivered to the user or any portion thereof. Motorola Solutions reserves the right to make changes to any software or product to improve reliability, function, or design. Motorola Solutions does not assume any product liability arising out of, or in connection with, the application or use of any product, circuit, or application described herein. No license is granted, either expressly or by implication, estoppel, or otherwise under any Motorola Solutions, Inc., intellectual property rights. An implied license only exists for equipment, circuits, and subsystems contained in Motorola Solutions products.
  • 5. iii Revision History Changes to the original guide are listed below: Change Date Description Rev A January 2012 Final version for WiNG 5.2.2 release
  • 6. iv CLI Reference Guide
  • 7. TABLE OF CONTENTS ABOUT THIS GUIDE Chapter 1, INTRODUCTION 1.1 CLI Overview ...........................................................................................................................................................1-3 1.2 Getting Context Sensitive Help ..............................................................................................................................1-7 1.3 Using the No Command ..........................................................................................................................................1-9 1.3.1 Basic Conventions .........................................................................................................................................1-9 1.4 Using CLI Editing Features and Shortcuts ............................................................................................................1-10 1.4.1 Moving the Cursor on the Command Line ..................................................................................................1-11 1.4.2 Completing a Partial Command Name ........................................................................................................1-12 1.4.3 Command Output pagination ......................................................................................................................1-12 1.4.4 Creating Profiles ..........................................................................................................................................1-13 1.4.5 Change the default profile by creating vlan 150 and mapping to ge3 Physical interface .........................1-13 1.4.5.1 Viewing Configured APs ....................................................................................................................1-13 1.4.6 Remote Administration ...............................................................................................................................1-14 1.4.6.1 Configuring Telnet for Management Access ....................................................................................1-14 1.4.6.2 Configuring ssh ..................................................................................................................................1-16 Chapter 2, USER EXEC MODE COMMANDS 2.1 User Exec Commands .............................................................................................................................................2-2 2.1.1 ap-upgrade ....................................................................................................................................................2-4 2.1.2 change-passwd .............................................................................................................................................2-9 2.1.3 clear .............................................................................................................................................................2-10 2.1.4 clock ............................................................................................................................................................2-13 2.1.5 cluster ..........................................................................................................................................................2-14 2.1.6 connect ........................................................................................................................................................2-15 2.1.7 crypto ...........................................................................................................................................................2-16 2.1.8 disable .........................................................................................................................................................2-28 2.1.9 enable ..........................................................................................................................................................2-29 2.1.10 exit .............................................................................................................................................................2-30
  • 8. vi WiNG 5 System Reference Guide 2.1.11 logging ......................................................................................................................................................2-31 2.1.12 mint ...........................................................................................................................................................2-32 2.1.13 no ..............................................................................................................................................................2-34 2.1.14 page ..........................................................................................................................................................2-38 2.1.15 ping ...........................................................................................................................................................2-39 2.1.16 ssh .............................................................................................................................................................2-40 2.1.17 telnet .........................................................................................................................................................2-41 2.1.18 terminal .....................................................................................................................................................2-42 2.1.19 time-it ........................................................................................................................................................2-43 2.1.20 traceroute ..................................................................................................................................................2-44 2.1.21 watch ........................................................................................................................................................2-45 Chapter 3, PRIVILEGED EXEC MODE COMMANDS 3.1 Privileged Exec Mode Commands ..........................................................................................................................3-3 3.1.1 ap-upgrade ....................................................................................................................................................3-5 3.1.2 archive .........................................................................................................................................................3-10 3.1.3 boot .............................................................................................................................................................3-12 3.1.4 cd .................................................................................................................................................................3-13 3.1.5 change-passwd ...........................................................................................................................................3-14 3.1.6 clear ............................................................................................................................................................3-15 3.1.7 clock ............................................................................................................................................................3-19 3.1.8 cluster .........................................................................................................................................................3-20 3.1.9 configure .....................................................................................................................................................3-21 3.1.10 connect ......................................................................................................................................................3-22 3.1.11 copy ...........................................................................................................................................................3-23 3.1.12 crypto ........................................................................................................................................................3-24 3.1.13 delete ........................................................................................................................................................3-36 3.1.14 disable .......................................................................................................................................................3-37 3.1.15 diff .............................................................................................................................................................3-38 3.1.16 dir ..............................................................................................................................................................3-39 3.1.17 edit ............................................................................................................................................................3-41 3.1.18 enable .......................................................................................................................................................3-42 3.1.19 erase .........................................................................................................................................................3-43 3.1.20 exit ............................................................................................................................................................3-44 3.1.21 format ........................................................................................................................................................3-45 3.1.22 halt ............................................................................................................................................................3-46 3.1.23 join-cluster ................................................................................................................................................3-47 3.1.24 logging ......................................................................................................................................................3-48 3.1.25 mkdir .........................................................................................................................................................3-49 3.1.26 mint ...........................................................................................................................................................3-50 3.1.27 more ..........................................................................................................................................................3-52 3.1.28 no ..............................................................................................................................................................3-53 3.1.29 page ..........................................................................................................................................................3-57 3.1.30 ping ...........................................................................................................................................................3-58 3.1.31 pwd ...........................................................................................................................................................3-59 3.1.32 reload ........................................................................................................................................................3-60
  • 9. Table of Contents vii 3.1.33 rename ......................................................................................................................................................3-62 3.1.34 rmdir ..........................................................................................................................................................3-63 3.1.35 self .............................................................................................................................................................3-64 3.1.36 ssh .............................................................................................................................................................3-65 3.1.37 telnet .........................................................................................................................................................3-66 3.1.38 terminal .....................................................................................................................................................3-67 3.1.39 time-it ........................................................................................................................................................3-68 3.1.40 traceroute ..................................................................................................................................................3-69 3.1.41 upgrade .....................................................................................................................................................3-70 3.1.42 upgrade-abort ............................................................................................................................................3-71 3.1.43 watch .........................................................................................................................................................3-72 Chapter 4, GLOBAL CONFIGURATION COMMANDS 4.1 Global Configuration Commands ............................................................................................................................4-3 4.1.1 aaa-policy ......................................................................................................................................................4-6 4.1.2 advanced-wips-policy ...................................................................................................................................4-7 4.1.3 ap300 .............................................................................................................................................................4-8 4.1.4 ap621 .............................................................................................................................................................4-9 4.1.5 ap650 ...........................................................................................................................................................4-10 4.1.6 ap6511 .........................................................................................................................................................4-11 4.1.7 ap6521 .........................................................................................................................................................4-12 4.1.8 ap6532 .........................................................................................................................................................4-13 4.1.9 ap71xx .........................................................................................................................................................4-14 4.1.10 association-acl-policy ...............................................................................................................................4-15 4.1.11 auto-provisioning-policy ............................................................................................................................4-16 4.1.12 captive portal ............................................................................................................................................4-17 4.1.12.1 captive-portal ..................................................................................................................................4-18 4.1.12.2 captive-portal-mode commands ......................................................................................................4-19 4.1.13 clear ...........................................................................................................................................................4-37 4.1.14 critical-resource-policy ..............................................................................................................................4-38 4.1.14.1 critical-resource-policy ....................................................................................................................4-39 4.1.14.2 critical-resource-policy-mode ..........................................................................................................4-40 4.1.15 customize ..................................................................................................................................................4-44 4.1.16 device ........................................................................................................................................................4-51 4.1.17 device-categorization ................................................................................................................................4-53 4.1.17.1 device-categorization ......................................................................................................................4-54 4.1.17.2 device-categorization-mode commands .........................................................................................4-55 4.1.18 dhcp-server-policy .....................................................................................................................................4-60 4.1.19 dns-whitelist .............................................................................................................................................4-61 4.1.19.1 dns-whitelist ....................................................................................................................................4-62 4.1.19.2 dns-whitelist mode commands .......................................................................................................4-63 4.1.20 do ...............................................................................................................................................................4-66 4.1.21 end .............................................................................................................................................................4-77 4.1.22 event-system-policy ..................................................................................................................................4-78 4.1.22.1 event-system-policy ........................................................................................................................4-79 4.1.22.2 event-system-policy mode commands ............................................................................................4-80
  • 10. viii WiNG 5 System Reference Guide 4.1.23 firewall-policy .........................................................................................................................................4-101 4.1.24 host .........................................................................................................................................................4-102 4.1.25 igmp-snoop-policy ...................................................................................................................................4-103 4.1.26 ip .............................................................................................................................................................4-105 4.1.27 mac ..........................................................................................................................................................4-107 4.1.28 management-policy ................................................................................................................................4-109 4.1.29 mint-policy ..............................................................................................................................................4-110 4.1.30 nac-list ....................................................................................................................................................4-111 4.1.30.1 nac-list ...........................................................................................................................................4-112 4.1.30.2 nac-list-mode ................................................................................................................................4-113 4.1.31 no ............................................................................................................................................................4-117 4.1.32 password-encryption ..............................................................................................................................4-119 4.1.33 profile ......................................................................................................................................................4-120 4.1.34 radio-qos-policy ......................................................................................................................................4-124 4.1.35 radius-group ............................................................................................................................................4-125 4.1.36 radius-server-policy ................................................................................................................................4-126 4.1.37 radius-user-pool-policy ...........................................................................................................................4-127 4.1.38 rf-domain .................................................................................................................................................4-128 4.1.38.1 rf-domain .......................................................................................................................................4-129 4.1.38.2 rf-domain-mode .............................................................................................................................4-131 4.1.39 rfs4000 ....................................................................................................................................................4-153 4.1.40 rfs6000 ....................................................................................................................................................4-154 4.1.41 rfs7000 ....................................................................................................................................................4-155 4.1.42 role-policy ...............................................................................................................................................4-156 4.1.43 self ..........................................................................................................................................................4-157 4.1.44 smart-rf-policy .........................................................................................................................................4-158 4.1.45 wips-policy ..............................................................................................................................................4-159 4.1.46 wlan ........................................................................................................................................................4-160 4.1.46.1 wlan ...............................................................................................................................................4-161 4.1.46.2 wlan-mode commands ..................................................................................................................4-162 4.1.47 wlan-qos-policy .......................................................................................................................................4-213 Chapter 5, COMMON COMMANDS 5.1 Common Commands ...............................................................................................................................................5-2 5.1.1 clrscr ..............................................................................................................................................................5-3 5.1.2 commit ..........................................................................................................................................................5-4 5.1.3 end ................................................................................................................................................................5-5 5.1.4 exit ................................................................................................................................................................5-6 5.1.5 help ...............................................................................................................................................................5-7 5.1.6 no ................................................................................................................................................................5-11 5.1.7 revert ...........................................................................................................................................................5-13 5.1.8 service .........................................................................................................................................................5-14 5.1.9 show ............................................................................................................................................................5-40 5.1.10 write ..........................................................................................................................................................5-42
  • 11. Table of Contents ix Chapter 6, SHOW COMMANDS 6.1 show commands .....................................................................................................................................................6-2 6.1.1 show ..............................................................................................................................................................6-4 6.1.2 adoption ........................................................................................................................................................6-8 6.1.3 advanced-wips ............................................................................................................................................6-10 6.1.4 ap-upgrade ..................................................................................................................................................6-12 6.1.5 boot .............................................................................................................................................................6-14 6.1.6 captive-portal ..............................................................................................................................................6-15 6.1.7 cdp ...............................................................................................................................................................6-18 6.1.8 clock ............................................................................................................................................................6-20 6.1.9 cluster ..........................................................................................................................................................6-21 6.1.10 commands .................................................................................................................................................6-23 6.1.11 context .......................................................................................................................................................6-25 6.1.12 critical-resources .......................................................................................................................................6-26 6.1.13 crypto .........................................................................................................................................................6-27 6.1.14 debug .........................................................................................................................................................6-30 6.1.15 debugging ..................................................................................................................................................6-33 6.1.16 device-categorization ................................................................................................................................6-36 6.1.17 event-history .............................................................................................................................................6-37 6.1.18 event-system-policy ..................................................................................................................................6-38 6.1.19 file .............................................................................................................................................................6-39 6.1.20 firewall ......................................................................................................................................................6-40 6.1.21 interface ....................................................................................................................................................6-44 6.1.22 ip ................................................................................................................................................................6-47 6.1.23 ip-access-list-stats ....................................................................................................................................6-52 6.1.24 licenses .....................................................................................................................................................6-53 6.1.25 lldp .............................................................................................................................................................6-54 6.1.26 logging .......................................................................................................................................................6-55 6.1.27 mac-access-list-stats ................................................................................................................................6-56 6.1.28 mac-address-table ....................................................................................................................................6-57 6.1.29 mint ...........................................................................................................................................................6-58 6.1.30 noc .............................................................................................................................................................6-61 6.1.31 ntp .............................................................................................................................................................6-64 6.1.32 password-encryption .................................................................................................................................6-65 6.1.33 power ........................................................................................................................................................6-66 6.1.34 remote-debug ............................................................................................................................................6-67 6.1.35 rf-domain-manager ...................................................................................................................................6-68 6.1.36 role ............................................................................................................................................................6-69 6.1.37 running-config ...........................................................................................................................................6-70 6.1.38 session-changes ........................................................................................................................................6-74 6.1.39 session-config ...........................................................................................................................................6-75 6.1.40 sessions .....................................................................................................................................................6-76 6.1.41 smart-rf ......................................................................................................................................................6-77 6.1.42 spanning-tree ............................................................................................................................................6-80 6.1.43 startup-config ............................................................................................................................................6-83 6.1.44 terminal .....................................................................................................................................................6-84 6.1.45 timezone ....................................................................................................................................................6-85
  • 12. x WiNG 5 System Reference Guide 6.1.46 upgrade-status ..........................................................................................................................................6-86 6.1.47 version .......................................................................................................................................................6-88 6.1.48 wireless .....................................................................................................................................................6-89 6.1.49 wwan ......................................................................................................................................................6-106 Chapter 7, PROFILES 7.1 Creating Profiles .....................................................................................................................................................7-2 7.1.1 aaa ................................................................................................................................................................7-5 7.1.2 adopted-mode ...............................................................................................................................................7-7 7.1.3 ap-upgrade ....................................................................................................................................................7-8 7.1.4 ap300 ............................................................................................................................................................7-9 7.1.5 ap-mobility ..................................................................................................................................................7-10 7.1.6 arp ...............................................................................................................................................................7-11 7.1.7 auto-learn-staging-config ...........................................................................................................................7-13 7.1.8 autoinstall ...................................................................................................................................................7-14 7.1.9 bridge commands ........................................................................................................................................7-15 7.1.9.1 bridge ................................................................................................................................................7-16 7.1.9.2 bridge-vlan-mode commands ............................................................................................................7-17 7.1.10 cdp .............................................................................................................................................................7-30 7.1.11 cluster .......................................................................................................................................................7-32 7.1.12 configuration-persistence .........................................................................................................................7-34 7.1.13 controller ...................................................................................................................................................7-35 7.1.14 crypto ........................................................................................................................................................7-37 7.1.15 isakmp-policy ............................................................................................................................................7-43 7.1.15.1 authentication .................................................................................................................................7-45 7.1.15.2 encryption ........................................................................................................................................7-46 7.1.15.3 group ...............................................................................................................................................7-47 7.1.15.4 hash .................................................................................................................................................7-48 7.1.15.5 lifetime ............................................................................................................................................7-49 7.1.15.6 no .....................................................................................................................................................7-50 7.1.16 crypto-group ..............................................................................................................................................7-52 7.1.16.1 dns ...................................................................................................................................................7-53 7.1.16.2 wns ..................................................................................................................................................7-54 7.1.17 dscp-mapping ............................................................................................................................................7-55 7.1.18 email-notification ......................................................................................................................................7-56 7.1.19 enforce-version .........................................................................................................................................7-58 7.1.20 events ........................................................................................................................................................7-60 7.1.21 ip ..............................................................................................................................................................7-61 7.1.22 nat-pool ....................................................................................................................................................7-65 7.1.22.1 address ............................................................................................................................................7-66 7.1.22.2 no .....................................................................................................................................................7-67 7.1.23 interface ....................................................................................................................................................7-68 7.1.24 Interface Config Instance ..........................................................................................................................7-70 7.1.24.1 cdp ...................................................................................................................................................7-72 7.1.24.2 channel-group .................................................................................................................................7-73 7.1.24.3 description .......................................................................................................................................7-74
  • 13. Table of Contents xi 7.1.24.4 dot1x ................................................................................................................................................7-75 7.1.24.5 duplex ..............................................................................................................................................7-76 7.1.24.6 ip ......................................................................................................................................................7-77 7.1.24.7 lldp ...................................................................................................................................................7-79 7.1.24.8 no .....................................................................................................................................................7-80 7.1.24.9 qos ...................................................................................................................................................7-82 7.1.24.10 shutdown .......................................................................................................................................7-83 7.1.24.11 spanning-tree ................................................................................................................................7-84 7.1.24.12 speed .............................................................................................................................................7-87 7.1.24.13 switchport ......................................................................................................................................7-88 7.1.24.14 use .................................................................................................................................................7-90 7.1.25 Interface vlan Instance ..............................................................................................................................7-91 7.1.25.1 crypto ...............................................................................................................................................7-92 7.1.25.2 description .......................................................................................................................................7-93 7.1.25.3 dhcp-relay-incoming ........................................................................................................................7-94 7.1.25.4 ip ......................................................................................................................................................7-95 7.1.25.5 no .....................................................................................................................................................7-97 7.1.25.6 shutdown .......................................................................................................................................7-100 7.1.25.7 use .................................................................................................................................................7-101 7.1.26 led ............................................................................................................................................................7-102 7.1.27 legacy-auto-downgrade ..........................................................................................................................7-103 7.1.28 legacy-auto-update .................................................................................................................................7-104 7.1.29 lldp ...........................................................................................................................................................7-105 7.1.30 load-balancing .........................................................................................................................................7-107 7.1.31 local .........................................................................................................................................................7-112 7.1.32 logging .....................................................................................................................................................7-113 7.1.33 mac-address-table ..................................................................................................................................7-115 7.1.34 mint .........................................................................................................................................................7-117 7.1.35 misconfiguration-recovery-time ..............................................................................................................7-120 7.1.36 monitor ....................................................................................................................................................7-121 7.1.37 neighbor-inactivity-timeout .....................................................................................................................7-122 7.1.38 neighbor-info-interval .............................................................................................................................7-123 7.1.39 no .............................................................................................................................................................7-124 7.1.40 noc ...........................................................................................................................................................7-127 7.1.41 ntp ...........................................................................................................................................................7-128 7.1.42 preferred-controller-group ......................................................................................................................7-130 7.1.43 power-config ...........................................................................................................................................7-131 7.1.44 radius .......................................................................................................................................................7-133 7.1.45 rf-domain-manager ...............................................................................................................................7-134 7.1.46 spanning-tree ..........................................................................................................................................7-135 7.1.47 use ...........................................................................................................................................................7-138 7.1.48 vpn ...........................................................................................................................................................7-141 7.1.49 wep-shared-key-auth ..............................................................................................................................7-142 7.2 Device Specific Commands ................................................................................................................................7-143 7.2.1 area ...........................................................................................................................................................7-148 7.2.2 channel-list ................................................................................................................................................7-149 7.2.3 contact .......................................................................................................................................................7-150
  • 14. xii WiNG 5 System Reference Guide 7.2.4 country-code .............................................................................................................................................7-151 7.2.5 dhcp-redundancy .......................................................................................................................................7-152 7.2.6 floor ...........................................................................................................................................................7-153 7.2.7 hostname ..................................................................................................................................................7-154 7.2.8 layout-coordinates ....................................................................................................................................7-155 7.2.9 location .....................................................................................................................................................7-156 7.2.10 mac-name ...............................................................................................................................................7-157 7.2.11 neighbor-info-interval .............................................................................................................................7-158 7.2.12 no ............................................................................................................................................................7-159 7.2.13 override-wlan ..........................................................................................................................................7-163 7.2.14 remove-override ......................................................................................................................................7-165 7.2.15 rsa-key .....................................................................................................................................................7-167 7.2.16 sensor-server ..........................................................................................................................................7-168 7.2.17 stats ........................................................................................................................................................7-169 7.2.18 timezone ..................................................................................................................................................7-170 7.2.19 trustpoint .................................................................................................................................................7-171 Chapter 8, AAA-POLICY 8.1 aaa-policy ..............................................................................................................................................................8-2 8.1.1 accounting .....................................................................................................................................................8-3 8.1.2 authentication ...............................................................................................................................................8-7 8.1.3 health-check ................................................................................................................................................8-11 8.1.4 mac-address-format ....................................................................................................................................8-12 8.1.5 no ................................................................................................................................................................8-13 8.1.6 server-pooling-mode ...................................................................................................................................8-16 8.1.7 use ...............................................................................................................................................................8-17 Chapter 9, AUTO-PROVISIONING-POLICY 9.1 auto-provisioning-policy .........................................................................................................................................9-2 9.1.1 adopt .............................................................................................................................................................9-3 9.1.2 default-adoption ...........................................................................................................................................9-7 9.1.3 deny ...............................................................................................................................................................9-8 9.1.4 no ................................................................................................................................................................9-11 Chapter 10, ADVANCED-WIPS-POLICY 10.1 advanced-wips-policy .........................................................................................................................................10-2 10.1.1 event .........................................................................................................................................................10-3 10.1.2 no ............................................................................................................................................................10-10 10.1.3 server-listen-port ....................................................................................................................................10-13 10.1.4 terminate .................................................................................................................................................10-14 10.1.5 use ...........................................................................................................................................................10-15 Chapter 11, ASSOCIATION-ACL-POLICY 11.1 association-acl-policy .........................................................................................................................................11-2
  • 15. Table of Contents xiii 11.1.1 deny ...........................................................................................................................................................11-3 11.1.2 no ...............................................................................................................................................................11-5 11.1.3 permit ........................................................................................................................................................11-7 Chapter 12, ACCESS-LIST 12.1 ip-access-list .......................................................................................................................................................12-3 12.1.1 deny ...........................................................................................................................................................12-4 12.1.2 no ...............................................................................................................................................................12-9 12.1.3 permit ......................................................................................................................................................12-15 12.2 mac-access-list .................................................................................................................................................12-21 12.2.1 deny .........................................................................................................................................................12-22 12.2.2 no .............................................................................................................................................................12-25 12.2.3 permit ......................................................................................................................................................12-28 Chapter 13, DHCP-SERVER-POLICY 13.1 dhcp-server-policy ...............................................................................................................................................13-2 13.1.1 bootp .........................................................................................................................................................13-3 13.1.2 dhcp-class .................................................................................................................................................13-4 13.1.2.1 dhcp-class ........................................................................................................................................13-5 13.1.2.2 dhcp-class-mode .............................................................................................................................13-6 13.1.3 dhcp-pool .................................................................................................................................................13-10 13.1.3.1 dhcp-pool .......................................................................................................................................13-11 13.1.3.2 dhcp-pool-mode .............................................................................................................................13-13 13.1.3.3 static-binding .................................................................................................................................13-37 13.1.4 no .............................................................................................................................................................13-55 13.1.5 option ......................................................................................................................................................13-57 13.1.6 ping ..........................................................................................................................................................13-58 Chapter 14, FIREWALL-POLICY 14.1 firewall-policy .....................................................................................................................................................14-3 14.1.1 alg ..............................................................................................................................................................14-4 14.1.2 clamp .........................................................................................................................................................14-5 14.1.3 dhcp-offer-convert ....................................................................................................................................14-6 14.1.4 dns-snoop ..................................................................................................................................................14-7 14.1.5 firewall ......................................................................................................................................................14-8 14.1.6 flow ...........................................................................................................................................................14-9 14.1.7 ip ..............................................................................................................................................................14-11 14.1.8 ip-mac ......................................................................................................................................................14-17 14.1.9 logging .....................................................................................................................................................14-20 14.1.10 no ...........................................................................................................................................................14-22 14.1.11 proxy-arp ...............................................................................................................................................14-30 14.1.12 stateful-packet-inspection-12 ...............................................................................................................14-31 14.1.13 storm-control .........................................................................................................................................14-32 14.1.14 virtual-defragmentation .......................................................................................................................14-35
  • 16. xiv WiNG 5 System Reference Guide Chapter 15, IGMP-SNOOP-POLICY 15.1 igmp-snoop-policy ..............................................................................................................................................15-2 15.1.1 igmp-snooping ..........................................................................................................................................15-3 15.1.2 no ..............................................................................................................................................................15-4 15.1.3 querier .......................................................................................................................................................15-6 15.1.4 robustness-variable ..................................................................................................................................15-7 15.1.5 unknown-multicast-fwd ............................................................................................................................15-8 Chapter 16, MINT-POLICY 16.1 mint-policy ..........................................................................................................................................................16-2 16.1.1 level ...........................................................................................................................................................16-3 16.1.2 mtu ............................................................................................................................................................16-4 16.1.3 udp ............................................................................................................................................................16-5 16.1.4 no ..............................................................................................................................................................16-6 Chapter 17, MANAGEMENT-POLICY 17.1 management-policy ............................................................................................................................................17-2 17.1.1 aaa-login ...................................................................................................................................................17-3 17.1.2 banner .......................................................................................................................................................17-5 17.1.3 ftp ..............................................................................................................................................................17-6 17.1.4 http ............................................................................................................................................................17-8 17.1.5 https ..........................................................................................................................................................17-9 17.1.6 idle-session-timeout ...............................................................................................................................17-10 17.1.7 no ............................................................................................................................................................17-11 17.1.8 restrict-access .........................................................................................................................................17-14 17.1.9 snmp-server ............................................................................................................................................17-17 17.1.10 ssh .........................................................................................................................................................17-21 17.1.11 telnet .....................................................................................................................................................17-22 17.1.12 user .......................................................................................................................................................17-23 Chapter 18, RADIUS-POLICY 18.1 radius-group ........................................................................................................................................................18-2 18.1.1 guest .........................................................................................................................................................18-3 18.1.2 policy .........................................................................................................................................................18-4 18.1.3 rate-limit ...................................................................................................................................................18-7 18.1.4 no ..............................................................................................................................................................18-8 18.2 radius-server-policy ..........................................................................................................................................18-10 18.2.1 authentication .........................................................................................................................................18-11 18.2.2 crl-check ..................................................................................................................................................18-13 18.2.3 ldap-group-verification ...........................................................................................................................18-14 18.2.4 ldap-server ..............................................................................................................................................18-15 18.2.5 local .........................................................................................................................................................18-18 18.2.6 nas ...........................................................................................................................................................18-19 18.2.7 no ............................................................................................................................................................18-20
  • 17. Table of Contents xv 18.2.8 proxy ........................................................................................................................................................18-23 18.2.9 session-resumption .................................................................................................................................18-25 18.2.10 use .........................................................................................................................................................18-26 18.3 radius-user-pool-policy .....................................................................................................................................18-27 18.3.1 user ..........................................................................................................................................................18-28 18.3.2 no .............................................................................................................................................................18-30 Chapter 19, RADIO-QOS-POLICY 19.1 radio-qos-policy ..................................................................................................................................................19-2 19.1.1 accelerated-multicast ...............................................................................................................................19-3 19.1.2 admission-control ......................................................................................................................................19-5 19.1.3 no ...............................................................................................................................................................19-7 19.1.4 wmm ........................................................................................................................................................19-10 Chapter 20, ROLE-POLICY 20.1 role-policy ..........................................................................................................................................................20-2 20.1.1 default-role ................................................................................................................................................20-3 20.1.2 no ...............................................................................................................................................................20-5 20.1.3 user-role ....................................................................................................................................................20-7 20.1.3.1 user-role ..........................................................................................................................................20-8 20.1.3.2 user-role commands ........................................................................................................................20-9 Chapter 21, SMART-RF-POLICY 21.1 smart-rf-policy .....................................................................................................................................................21-2 21.1.1 assignable-power ......................................................................................................................................21-4 21.1.2 auto-assign-sensor ....................................................................................................................................21-5 21.1.3 channel-list ................................................................................................................................................21-6 21.1.4 channel-width ...........................................................................................................................................21-7 21.1.5 coverage-hole-recovery .............................................................................................................................21-8 21.1.6 enable ......................................................................................................................................................21-10 21.1.7 group-by ..................................................................................................................................................21-11 21.1.8 interference-recovery ..............................................................................................................................21-12 21.1.9 neighbor-recovery ...................................................................................................................................21-14 21.1.10 no ...........................................................................................................................................................21-16 21.1.11 root-recovery .........................................................................................................................................21-18 21.1.12 sensitivity ..............................................................................................................................................21-19 21.1.13 smart-ocs-monitoring ............................................................................................................................21-20 21.1.14 smart-ocs-monitoring (AP71XX) ............................................................................................................21-23 Chapter 22, WIPS-POLICY 22.1 wips-policy ..........................................................................................................................................................22-2 22.1.1 ap-detection ..............................................................................................................................................22-3 22.1.2 enable ........................................................................................................................................................22-4 22.1.3 event ..........................................................................................................................................................22-5
  • 18. xvi WiNG 5 System Reference Guide 22.1.4 history-throttle-duration ...........................................................................................................................22-9 22.1.5 no ............................................................................................................................................................22-10 22.1.6 signature .................................................................................................................................................22-14 22.1.6.1 signature .......................................................................................................................................22-15 22.1.6.2 signature mode commands ...........................................................................................................22-16 22.1.7 use ...........................................................................................................................................................22-31 Chapter 23, WLAN-QOS-POLICY 23.1 wlan-qos-policy ..................................................................................................................................................23-2 23.1.1 accelerated-multicast ...............................................................................................................................23-3 23.1.2 classification .............................................................................................................................................23-5 23.1.3 multicast-mask ..........................................................................................................................................23-7 23.1.4 no ..............................................................................................................................................................23-8 23.1.5 qos ...........................................................................................................................................................23-11 23.1.6 rate-limit .................................................................................................................................................23-12 23.1.7 svp-prioritization ....................................................................................................................................23-14 23.1.8 voice-prioritization .................................................................................................................................23-15 23.1.9 wmm .......................................................................................................................................................23-16 Chapter 24, INTERFACE-RADIO COMMANDS 24.1 interface-radio Instance .....................................................................................................................................24-3 24.1.1 aeroscout ..................................................................................................................................................24-5 24.1.2 ack-timeout ...............................................................................................................................................24-6 24.1.3 aggregation ...............................................................................................................................................24-7 24.1.4 antenna-diversity ....................................................................................................................................24-10 24.1.5 airtime-fairness .......................................................................................................................................24-11 24.1.6 antenna-gain ...........................................................................................................................................24-12 24.1.7 antenna-mode .........................................................................................................................................24-13 24.1.8 beacon .....................................................................................................................................................24-14 24.1.9 channel ....................................................................................................................................................24-16 24.1.10 data-rates ..............................................................................................................................................24-17 24.1.11 description ............................................................................................................................................24-20 24.1.12 dynamic-chain-selection .......................................................................................................................24-21 24.1.13 ekahau ...................................................................................................................................................24-22 24.1.14 guard-interval ........................................................................................................................................24-23 24.1.15 lock-rf-mode ..........................................................................................................................................24-24 24.1.16 max-clients ............................................................................................................................................24-25 24.1.17 mesh ......................................................................................................................................................24-26 24.1.18 meshpoint .............................................................................................................................................24-27 24.1.19 no ..........................................................................................................................................................24-28 24.1.20 non-unicast ...........................................................................................................................................24-31 24.1.21 off-channel-scan ...................................................................................................................................24-33 24.1.22 placement .............................................................................................................................................24-34 24.1.23 power ....................................................................................................................................................24-35 24.1.24 preamble-short ......................................................................................................................................24-36
  • 19. Table of Contents xvii 24.1.25 probe-response .....................................................................................................................................24-37 24.1.26 radio-share-mode ..................................................................................................................................24-38 24.1.27 rate-selection ........................................................................................................................................24-39 24.1.28 rf-mode ..................................................................................................................................................24-40 24.1.29 rifs .........................................................................................................................................................24-41 24.1.30 rts-threshold ..........................................................................................................................................24-42 24.1.31 shutdown ...............................................................................................................................................24-43 24.1.32 sniffer-redirect ......................................................................................................................................24-44 24.1.33 stbc ........................................................................................................................................................24-45 24.1.34 txbf ........................................................................................................................................................24-46 24.1.35 use .........................................................................................................................................................24-47 24.1.36 wireless-client .......................................................................................................................................24-48 24.1.37 wlan .......................................................................................................................................................24-49 Chapter 25, FIREWALL LOGGING 25.1 Firewall Log Terminology and Syslog Severity Levels .......................................................................................25-2 25.1.1 Date format in Syslog messages ..............................................................................................................25-3 25.1.2 FTP data connection log ............................................................................................................................25-4 25.1.3 UDP packets log ........................................................................................................................................25-5 25.1.4 ICMP type logs ..........................................................................................................................................25-6 25.1.5 ICMP type logs ..........................................................................................................................................25-7 25.1.6 Raw IP Protocol logs ...............................................................................................................................25-8 25.1.7 Raw IP Protocol logs ................................................................................................................................25-9 25.1.8 Firewall startup log .................................................................................................................................25-10 25.1.9 Manual time change log .........................................................................................................................25-11 25.1.10 Firewall ruleset log ...............................................................................................................................25-12 25.1.11 TCP Reset Packets log ...........................................................................................................................25-14 25.1.12 ICMP Destination log ...........................................................................................................................25-15 25.1.13 ICMP Packet log ....................................................................................................................................25-16 25.1.14 SSH connection log ...............................................................................................................................25-17 25.1.15 Allowed/Dropped Packets Log ..............................................................................................................25-18 Chapter 26, MESHPOINT 26.1 meshpoint ...........................................................................................................................................................26-2 26.1.1 allowed-vlans ............................................................................................................................................26-4 26.1.2 beacon-format ...........................................................................................................................................26-5 26.1.3 control-vlan ...............................................................................................................................................26-6 26.1.4 data-rates ..................................................................................................................................................26-7 26.1.5 description ...............................................................................................................................................26-11 26.1.6 meshid .....................................................................................................................................................26-12 26.1.7 neighbor ..................................................................................................................................................26-13 26.1.8 no .............................................................................................................................................................26-14 26.1.9 root ..........................................................................................................................................................26-17 26.1.10 security-mode ........................................................................................................................................26-18 26.1.11 service ...................................................................................................................................................26-19
  • 20. xviii WiNG 5 System Reference Guide 26.1.12 shutdown ..............................................................................................................................................26-20 26.1.13 use .........................................................................................................................................................26-21 26.1.14 wpa2 .....................................................................................................................................................26-22 26.2 meshpoint-qos-policy .......................................................................................................................................26-24 26.2.1 accelerated-multicast .............................................................................................................................26-26 26.2.2 no ............................................................................................................................................................26-27 26.2.3 rate-limit .................................................................................................................................................26-29 26.3 Other Meshpoint commands ............................................................................................................................26-31 26.3.1 meshpoint-device ....................................................................................................................................26-32 26.3.2 no ............................................................................................................................................................26-33 26.3.3 preferred .................................................................................................................................................26-34 26.3.4 root ..........................................................................................................................................................26-35 Appendix A, CONTROLLER MANAGED WLAN USE CASE A.1 Creating a First Controller Managed WLAN ......................................................................................................... A-2 A.1.1 Assumptions ................................................................................................................................................ A-2 A.1.2 Design .......................................................................................................................................................... A-3 A.1.3 Using the Command Line Interface to Configure the WLAN ...................................................................... A-4 A.1.3.1 Logging Into the Controller for the First Time ................................................................................... A-4 A.1.3.2 Creating a RF Domain ........................................................................................................................ A-5 A.1.3.3 Creating a Wireless Controller Profile .............................................................................................. A-6 A.1.3.4 Creating an AP Profile ....................................................................................................................... A-7 A.1.3.5 Creating a DHCP Server Policy .......................................................................................................... A-9 A.1.3.6 Completing and Testing the Configuration ..................................................................................... A-10 Appendix B, CUSTOMER SUPPORT
  • 21. ABOUT THIS GUIDE This manual supports the following wireless controllers and connected access points: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 This section is organized into the following: • Document Convention • Notational Conventions
  • 22. xx WiNG CLI Reference Guide Document Convention The following conventions are used in this document to draw your attention to important information: NOTE: Indicates tips or special requirements. ! CAUTION: Indicates conditions that can cause equipment damage or data loss. WARNING! Indicates a condition or procedure that could result in personal injury or equipment damage. Switch Note: Indicates caveats unique to a RFS7000, RFS6000 or RFS4000 model controller.
  • 23. Getting Started with the Mobile Computer xxi Notational Conventions The following notational conventions are used in this document: • Italics are used to highlight specific items in the general text, and to identify chapters and sections in this and related documents • Bullets (•) indicate: • lists of alternatives • lists of required steps that are not necessarily sequential • action items • Sequential lists (those describing step-by-step procedures) appear as numbered lists Understanding Command Syntax <variable> Variables are described with a short description enclosed within a ‘<‘ and a ‘>’ pair. For example, the command, rfs7000-37FABE>show interface ge 1 is documented as show interface ge <idx> • show – The command – Display information • interface – The keyword – The interface • <idx> – The variable – ge Index value | The pipe symbol. This is used to separate the variables/keywords in a list. For example, the command rfs7000-37FABE> show ..... is documented as show [adoption|advanced-wips|boot|captive- portal|......] where: • show – The command • [adoption|advanced-wips|boot|captive-portal|......] – Indicates the different commands that can be combined with the show command. However, only one of the above list can be used at a time. show adoption ... show advanced-wips ... show boot ...
  • 24. xxii WiNG CLI Reference Guide [] Of the different keywords and variables listed inside a ‘[‘ & ‘]’ pair, only one can be used. Each choice in the list is separated with a ‘|’ (pipe) symbol. For example, the command rfs7000-37FABE# clear ... is documented as clear [arp-cache|cdp|crypto|event-history| firewall|ip|spanning-tree] where: • clear – The command • [arp-cache|cdp|crypto|event-history|firewall|ip|spanning-tree] – Indicates that seven keywords are available for this command and only one can be used at a time {} Any command/keyword/variable or a combination of them inside a ‘{‘ & ‘}’ pair is optional. All optional commands follow the same conventions as listed above. However they are displayed italicized. For example, the command rfs7000-37FABE> show adoption .... is documented as show adoption info {on <DEVICE-OR-DOMAIN-NAME>} Here: • show adoption info – The command. This command can also be used as show adoption info • {on <DEVICE-OR-DOMAIN-NAME>} – The optional keyword on <device-or- domain-name>. The command can also be extended as show adoption info {on <DEVICE-OR-DOMAIN-NAME>} Here the keyword {on <DEVICE-OR-DOMAIN-NAME>} is optional.
  • 25. Getting Started with the Mobile Computer xxiii command / keyword The first word is always a command. Keywords are words that must be entered as is. Commands and keywords are mandatory. For example, the command, rfs7000-37FABE>show wireless is documented as show wireless where: • show – The command • wireless – The keyword () Any command/keyword/variable or a combination of them inside a ‘(‘ & ‘)’ pair are recursive. All recursive commands can be listed in any order and can be used once along with the rest of the commands. For example, the command crypto pki export request generate-rsa-key test autogen-subject-name ... is documented as rfs7000-37FABE#crypto pki export request generate-rsa-key test autogen-subject-name (<URL>,email <EMAIL>,fqdn <FQDN>,ip-address <IP>) Here: • crypto pki export request generate-rsa-key <RSA-KEYPAIR-NAME> auto-gen-subject-name – is the command rfs7000-37FABE#crypto pki export request generate-rsa-key test autogen-subject-name • (<URL>,email <EMAIL>,fqdn <FQDN>,ip-address <IP>) – is the set of recursive parameters that can be used in any order. where every recursive command is separated by a comma ‘,’
  • 26. xxiv WiNG CLI Reference Guide Motorola Solutions Enterprise Mobility Support Center If you have a problem with your equipment, contact Motorola Solutions Enterprise Mobility Support for your region. Contact information is available by visiting the URL: http://www.motorolasolutions.com/Business/XP-EN/Pages/Contact_Us#contactus_tab When contacting Enterprise Mobility support, please provide the following information: • Serial number of the unit • Model number or product name • Software type and version number Motorola Solutions responds to calls by e-mail, telephone or fax within the time limits set forth in support agreements. If you purchased your Enterprise Mobility business product from a Motorola Solutions business partner, contact that business partner for support. Customer Support Web Site Motorola Solutions' Support Central Web site, accessed via the Symbol-branded products link under Support for Business, provides information and online assistance including developer tools, software downloads, product manuals and online repair requests. Product support can be found at: http://www.motorolasolutions.com/Business/XP-EN/Pages/Contact_Us#support_tab Product Sales and Product Information Motorola Solutions, Inc. One Motorola Plaza Holtsville, New York 11742-1300 Tel: 1-631-738-2400 or 1-800-722-6234 Fax: 1-631-738-5990 General Information For general information, contact Motorola Solutions at: Telephone (North America): 1-800-722-6234 Telephone (International): +1-631-738-5200 Website: http://www.motorolasolutions.com
  • 27. Getting Started with the Mobile Computer xxv Motorola Solutions, Inc. End-User License Agreement BY DOWNLOADING, INSTALLING, OR USING THE SOFTWARE DESCRIBED IN THIS DOCUMENT, YOU OR THE ENTITY OR COMPANY THAT YOU REPRESENT ("LICENSEE") ARE UNCONDITIONALLY CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS LICENSE AGREEMENT ("AGREEMENT"). LICENSEE'S USE OR CONTINUED USE OF THE DOWNLOADED OR INSTALLED MATERIALS SHALL ALSO CONSTITUTE ASSENT TO THE TERMS OF THIS AGREEMENT. IF LICENSEE DOES NOT UNCONDITIONALLY AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, DO NOT CONTINUTE THE INSTALLATION PROCESS. IF THESE TERMS ARE CONSIDERED AN OFFER, ACCEPTANCE IS EXPRESSLY LIMITED TO AND EXPRESSLY CONTINGENT UPON THESE TERMS. IF YOU ARE ACCEPTING THESE TERMS ON BEHALF OF A COMPANY, ANOTHER PERSON OR ANY OTHER LEGAL ENTITY, YOU REPRESENT AND WARRANT THAT YOU HAVE THE AUTHORITY TO BIND THAT COMPANY, PERSON OR ENTITY. 1. LICENSE GRANT. Subject to the terms of this Agreement, Motorola Solutions, Inc. and/or its subsidiaries ("Licensor") hereby grants Licensee a limited, personal, non-sublicensable, non transferable, non-exclusive license to use the software that Licensee is about to download or install and the documentation that accompanies it (collectively, the "Software") for Licensee's personal use in connection with hardware produced by Licensor and only in accordance with the accompanying documentation. Licensee may download, install and use the Software only on a single computer. Licensee may make one copy of the Software (excluding any documentation) for backup purposes, provided that copyright and other restricted rights notices of Licensor and its suppliers are reproduced exactly. 2. LICENSE RESTRICTIONS. Except as expressly permitted by this Agreement, Licensee shall not, nor permit anyone else to, directly or indirectly: (i) copy (except for one backup copy), modify, distribute or create derivative works based upon the Software; (ii) reverse engineer, disassemble, decompile or otherwise attempt to discover the source code or structure, sequence and organization of the Software; or (iii) rent, lease, or use the Software for timesharing or service bureau purposes, or otherwise use the Software for any commercial purpose/on behalf of any third party. Licensee shall maintain and not remove or obscure any proprietary notices on the Software, and shall reproduce such notices exactly on all permitted copies of the Software. All title, ownership rights, and intellectual property rights in and to the Software, and any copies or portions thereof, shall remain in Licensor and its suppliers or licensors. Licensee understands that Licensor may modify or discontinue offering the Software at any time. The Software is protected by the copyright laws of the United States and international copyright treaties. The Software is licensed, not sold. This Agreement does not give Licensee any rights not expressly granted herein. 3. INTELLECTUAL PROPERTY; CONTENT. All title and intellectual property rights in and to the Software (including but not limited to any images, photographs, animations, video, audio, music, text and "applets" incorporated into the Software), and any copies you are permitted to make herein are owned by Licensor or its suppliers. All title and intellectual property rights in and to the content which may be accessed through use of the Software is the property of the respective content owner and may be protected by applicable copyright or other intellectual property laws and treaties. This EULA grants you no rights to use such content. As a condition to Licensee's use of the Software, Licensee represents, warrants and covenants that Licensee will not use the Software: (i) to infringe the intellectual property rights or proprietary rights, or rights of publicity or privacy, of any third party; (ii) to violate any applicable law, statute, ordinance or regulation; (iii) to disseminate information or materials in any form or format ("Content") that are harmful, threatening, abusive, harassing, tortuous, defamatory, vulgar, obscene, libelous, or otherwise objectionable; or (iv) to disseminate any software viruses or any other computer code, files or programs that may interrupt, destroy or limit the functionality of any computer software or hardware or telecommunications equipment. Licensee, not Licensor, remains solely responsible for all Content that Licensee uploads, posts, e-mails, transmits, or otherwise disseminates using, or in connection with, the Software. 4. FEES; SUPPORT AND UPGRADES. Licensor may, at Licensor's sole option, provide support services related to the Software ("Support Services"). Nothing in this Agreement grants Licensee any right to receive any Support Services. Use of any Support Services provided is governed by the Licensor policies and programs described in the user manual, in "online" documentation, and/or in other Licensor-provided materials or support agreements. Any supplemental software code provided to you as part of any Support Services shall be considered part of the Software and subject to the terms and conditions of this EULA. With respect to technical information you provide to Licensor as part of any Support Services,
  • 28. xxvi WiNG CLI Reference Guide Licensor may use such information for its business purposes, including for product support and development. Licensor will not utilize such technical information in a form that personally identifies Licensee. 5. TERMINATION. Either party may terminate this Agreement at any time, with or without cause, upon written notice. Any termination of this Agreement shall also terminate the licenses granted hereunder. Upon termination of this Agreement for any reason, Licensee shall return all copies of the Software to Licensor, or destroy and remove from all computers, hard drives, networks, and other storage media all copies of the Software, and shall so certify to Licensor that such actions have occurred. Sections 2-13 shall survive termination of this Agreement. 6. DISCLAIMER OF WARRANTIES. To the maximum extent permitted by applicable law, Licensor and its suppliers provide the Software and any (if any) Support Services AS IS AND WITH ALL FAULTS, and hereby disclaim all warranties and conditions, either express, implied or statutory, including, but not limited to, any (if any) implied warranties or conditions of merchantability, of fitness for a particular purpose, of lack of viruses, of accuracy or completeness of responses, of results, and of lack of negligence or lack of workmanlike effort, all with regard to the Software, and the provision of or failure to provide Support Services. ALSO, THERE IS NO WARRANTY OR CONDITION OF TITLE, QUIET ENJOYMENT, QUIET POSSESSION, CORRESPONDENCE TO DESCRIPTION, OR NONINFRINGEMENT WITH REGARD TO THE SOFTWARE. THE ENTIRE RISK AS TO THE QUALITY OF OR ARISING OUT OF USE OR PERFORMANCE OF THE SOFTWARE AND SUPPORT SERVICES, IF ANY, REMAINS WITH LICENSEE. 7. EXCLUSION OF INCIDENTAL, CONSEQUENTIAL AND CERTAIN OTHER DAMAGES. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL LICENSOR OR ITS SUPPLIERS BE LIABLE FOR ANY GENERAL, SPECIAL, INCIDENTAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OR OTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR PERSONAL INJURY, FOR LOSS OF PRIVACY, FOR FAILURE TO MEET ANY DUTY INCLUDING OF GOOD FAITH OR OF REASONABLE CARE, FOR NEGLIGENCE, AND FOR ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT SERVICES, OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS AGREEMENT, EVEN IN THE EVENT OF THE FAULT, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY, BREACH OF CONTRACT OR BREACH OF WARRANTY OF LICENSOR OR ANY SUPPLIER, AND EVEN IF LICENSOR OR ANY SUPPLIER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 8. LIMITATION OF LIABILITY AND REMEDIES. Notwithstanding any damages that Licensee might incur for any reason whatsoever (including, without limitation, all damages referenced above and all direct or general damages), the entire liability of Licensor and any of its suppliers under any provision of this Agreement and Licensee's exclusive remedy for all of the foregoing shall be limited to the greater of the amount actually paid by Licensee for the Software or U.S.$5.00. The foregoing limitations, exclusions and disclaimers shall apply to the maximum extent permitted by applicable law, even if any remedy fails its essential purpose.
  • 29. Getting Started with the Mobile Computer xxvii 9. INDEMNITY. Licensee agrees that Licensor shall have no liability whatsoever for any use Licensee makes of the Software. Licensee shall indemnify and hold harmless Licensor from any claims, damages, liabilities, costs and fees (including reasonable attorney fees) arising from Licensee's use of the Software as well as from Licensee's failure to comply with any term of this Agreement. 10. FAULT TOLERANCE. The Software is not fault-tolerant and is not designed, manufactured or intended for use or resale in on- line control equipment in hazardous environments requiring fail-safe performance, such as, but not limited to, the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, life support machines, or weapons systems, in which the failure of the Software could lead directly or indirectly to death, personal injury, or physical or environmental damage ("High Risk Activities"). Licensor and its suppliers specifically disclaim any express or implied warranty of fitness for High Risk Activities. 11. U.S. GOVERNMENT LICENSE RIGHTS. Software provided to the U.S. Government pursuant to solicitations issued on or after December 1, 1995 is provided with the commercial license rights and restrictions described elsewhere herein. Software provided to the U.S. Government pursuant to solicitations issued prior to December 1, 1995 is provided with "Restricted Rights" as provided for in FAR, 48 CFR 52.227-14 (JUNE 1987) or DFAR, 48 CFR 252.227- 7013 (OCT 1988), as applicable. The "Manufacturer" for purposes of these regulations is Motorola Solutions, Inc., One Symbol Plaza, Holtsville, NY 11742. 12. EXPORT RESTRICTIONS. Licensee shall comply with all export laws and restrictions and regulations of the Department of Commerce, the United States Department of Treasury Office of Foreign Assets Control ("OFAC"), or other United States or foreign agency or authority, and Licensee shall not export, or allow the export or re-export of the Software in violation of any such restrictions, laws or regulations. By downloading or using the Software, Licensee agrees to the foregoing and represents and warrants that Licensee is not located in, under the control of, or a national or resident of any restricted country. 13. MISCELLANEOUS. Licensee may not sublicense, assign, or transfer this Agreement, or its rights or obligations hereunder, without the prior written consent of Licensor. Any attempt to otherwise sublicense, assign, or transfer any of the rights, duties, or obligations hereunder is null and void. Licensor may assign this Agreement in its sole discretion. In the event that any of the provisions of this Agreement shall be held by a court or other tribunal of competent jurisdiction to be illegal, invalid or unenforceable, such provisions shall be limited or eliminated to the minimum extent necessary so that this Agreement shall otherwise remain in full force and effect. No waiver or modification of this Agreement will be binding upon a party unless made in writing and signed by a duly authorized representative of such party and no failure or delay in enforcing any right will be deemed a waiver. This Agreement shall be governed by the laws of the State of New York without regard to the conflicts of law provisions thereof. The application the United Nations Convention of Contracts for the International Sale of Goods is expressly excluded. Unless waived by Licensor for a particular instance, any action or proceeding arising out of this Agreement must be brought exclusively in the state or federal courts of New York and Licensee hereby consents to the jurisdiction of such courts for any such action or proceeding. This Agreement supersedes all prior discussions and writings and constitutes the entire agreement between the parties with respect to the subject matter hereof. The prevailing party in any action arising out of this Agreement shall be entitled to costs and attorneys' fees.
  • 30. xxviii WiNG CLI Reference Guide
  • 31. CHAPTER 1 INTRODUCTION This chapter describes the commands available using the wireless controller Command Line Interface (CLI). CLI is available for wireless controllers as well as access points (APs). Access the CLI by using: • A terminal emulation program running on a computer connected to the serial port on the wireless controller. The serial port is located on the front of the wireless controller. • A Telnet session through Secure Shell (SSH) over a network. Configuration for connecting to a Wireless Controller using a terminal emulator If connecting through the serial port, use the following settings to configure your terminal emulator: Bits Per Second 19200 Data Bits 8 Parity None Stop Bit 1 Flow Control None When a CLI session is established, complete the following (user input is in bold): login as: <username> administrator’s login password: <password> User Credentials Use the following credentials when logging into a device for the first time: User Name admin Password motorola When logging into the CLI for the first time, you are prompted to change the password.
  • 32. 1-2 WiNG CLI Reference Guide Examples in this reference guide Examples used in this reference guide are generic to the each supported wireless controller model and AP. Commands that are not common, are identified using the notation “Supported in the following platforms.” For an example, see below: Supported in the following platforms: • RFS6000 The above example indicates the command is only available for a RFS6000 model wireless controller.
  • 33. INTRODUCTION 1-3 1.1 CLI Overview The CLI is used for configuring, monitoring, and maintaining the wireless controller managed network. The user interface allows you to execute commands on supported wireless controllers and APs, using either a serial console or a remote access method. This chapter describes basic CLI features. Topics covered include an introduction to command modes, navigation and editing features, help features and command history. The CLI is segregated into different command modes. Each mode has its own set of commands for configuration, maintenance and monitoring. The commands available at any given time depend on the mode you are in, and to a lesser extent, the particular model used. Enter a question mark (?) at the system prompt to view a list of commands available for each command mode/instance. Use specific commands to navigate from one command mode to another. The standard order is: USER EXEC mode, PRIV EXEC mode and GLOBAL CONFIG mode. Figure 1-1 Hierarchy of User Modes Command Modes A session generally begins in the USER EXEC mode (one of the two access levels of the EXEC mode). For security, only a limited subset of EXEC commands are available in the USER EXEC mode. This level is reserved for tasks that do not change the wireless controller configuration. rfs7000-37FABE> The system prompt signifies the device name and the last three bytes of the device MAC address. To access commands, enter the PRIV EXEC mode (the second access level for the EXEC mode). Once in the PRIV EXEC mode, enter any EXEC command. The PRIV EXEC mode is a superset of the USER EXEC mode. rfs7000-37FABE> enable rfs7000-37FABE# Most of the USER EXEC mode commands are one-time commands and are not saved across wireless controller reboots. Save the command by executing ‘commit’ command. For example, the show command displays the current configuration and the clear command clears the interface.
  • 34. 1-4 WiNG CLI Reference Guide Access the GLOBAL CONFIG mode from the PRIV EXEC mode. In the GLOBAL CONFIG mode, enter commands that set general system characteristics. Configuration modes, allow you to change the running configuration. If you save the configuration later, these commands are stored across wireless controller reboots. Access a variety of protocol specific (or feature-specific) modes from the global configuration mode. The CLI hierarchy requires you to access specific configuration modes only through the global configuration mode. rfs7000-37FABE# configure terminal Enter configuration commands, one per line. End with CNTL/Z. rfs7000-37FABE(config)# You can also access sub-modes from the global configuration mode. Configuration sub-modes define specific features within the context of a configuration mode. rfs7000-37FABE(config)# aaa-policy test rfs7000-37FABE(config-aaa-policy-test)# Table 1.1 summarizes available wireless controller commands Table 1.1 Wireless Controller modes and commands User Exec Mode Priv Exec Mode Global Configuration Mode ap-upgrade ap-upgrade aaa-policy change-passwd archive advanced-wips-policy clear boot ap300 clock cd ap621 cluster change-passwd ap650 commit clear ap6511 connect clock ap6521 crypto cluster ap6532 debug commit ap71xx disable configure association-acl-policy enable connect auto-provisioning-policy help copy captive-portal logging crypto clear mint debug critical-resource-policy no delete customize page diff device ping dir device-categorization remote-debug disable dhcp-sever-policy revert edit dns-whitelist service enable event-system-policy show erase firewall-policy
  • 35. INTRODUCTION 1-5 Table 1.1 Wireless Controller modes and commands User Exec Mode Priv Exec Mode Global Configuration Mode ssh format help telnet halt host terminal help igmp-snoop-policy time-it logging ip traceroute mint mac watch mkdir management-policy write more mint-policy clrscr no nac-list exit page no ping password-encryption pwd profile reload radio-qos-policy remote-debug radius-group rename radius-server-policy revert radius-user-pool-policy rmdir rf-domain self rfs4000 service rfs6000 show rfs7000 ssh role-policy telnet self terminal smart-rf-policy time-it wips-policy traceroute wlan upgrade wlan-qos-policy upgrade-abort write watch clrscr write commit clrscr do exit end
  • 36. 1-6 WiNG CLI Reference Guide Table 1.1 Wireless Controller modes and commands User Exec Mode Priv Exec Mode Global Configuration Mode exit revert service show
  • 37. INTRODUCTION 1-7 1.2 Getting Context Sensitive Help Enter a question mark (?) at the system prompt to display a list of commands available for each mode. Obtain a list of arguments and keywords for any command using the CLI context-sensitive help. Use the following commands to obtain help specific to a command mode, command name, keyword or argument: Command Description (prompt)# help Displays a brief description of the help system (prompt)# abbreviated-command-entry? Lists commands in the current mode that begin with a particular character string (prompt)# abbreviated-command-entry<Tab> Completes a partial command name (prompt)# ? Lists all commands available in the command mode (prompt)# command ? Lists the available syntax options (arguments and keywords) for the command (prompt)# command keyword ? Lists the next available syntax option for the command NOTE: The system prompt varies depending on which configuration mode your in. NOTE: Enter Ctrl + V to use ? as a regular character and not as a character used for displaying context sensitive help. This is required when the user has to enter a URL that ends with a ? NOTE: The escape character used through out the CLI is “”. To enter a "" use "" instead. When using context-sensitive help, the space (or lack of a space) before the question mark (?) is significant. To obtain a list of commands that begin with a particular sequence, enter the characters followed by a question mark (?). Do not include a space. This form of help is called word help, because it completes a word. rfs7000-37FABE#service? service Service Commands rfs7000-37FABE#service
  • 38. 1-8 WiNG CLI Reference Guide Enter a question mark (?) (in place of a keyword or argument) to list keywords or arguments. Include a space before the “?”. This form of help is called command syntax help. It shows the keywords or arguments available based on the command/keyword and argument already entered. rfs7000-37FABE>service ? advanced-wips Advanced WIPS service commands clear Clear cli-tables-expand Expand the cli-table in drapdown format cli-tables-skin Choose a formatting layout/skin for CLI tabular outputs cluster Cluster Protocol locator Enable leds flashing on the device pktcap Start packet capture radio Radio parameters show Show running system information smart-rf Smart-RF Management Commands traceroute Trace route to destination wireless Wireless commands rfs7000-37FABE>service It’s possible to abbreviate commands and keywords to allow a unique abbreviation. For example, “configure terminal” can be abbreviated as config t. Since the abbreviated command is unique, the wireless controller accepts the abbreviation and executes the command. Enter the help command (available in any command mode) to provide the following description: rfs7000-37FABE>help CLI provides advanced help feature. When you need help, anytime at the command line please press '?'. If nothing matches, the help list will be empty and you must backup until entering a '?' shows the available options. Two styles of help are provided: 1. Full help is available when you are ready to enter a command argument (e.g. 'show ?') and describes each possible argument. 2. Partial help is provided when an abbreviated argument is entered and you want to know what arguments match the input (e.g. 'show ve?'.)
  • 39. INTRODUCTION 1-9 1.3 Using the No Command Almost every command has a no form. Use no to disable a feature or function or return it to its default value. Use the command without the no keyword to re-enable a disabled feature. 1.3.1 Basic Conventions Keep the following conventions in mind while working within the wireless controller CLI: • Use ? at the end of a command to display available sub-modes. Type the first few characters of the sub-mode and press the tab key to add the sub-mode. Continue using ? until you reach the last sub-mode. • Pre-defined CLI commands and keywords are case-insensitive: cfg = Cfg = CFG. However (for clarity), CLI commands and keywords are displayed (in this guide) using mixed case. For example, apPolicy, trapHosts, channelInfo. • Enter commands in uppercase, lowercase, or mixed case. Only passwords are case sensitive.
  • 40. 1 - 10 WiNG CLI Reference Guide 1.4 Using CLI Editing Features and Shortcuts A variety of shortcuts and edit features are available. The following describe these features: • Moving the Cursor on the Command Line • Completing a Partial Command Name • Command Output pagination
  • 41. INTRODUCTION 1 - 11 1.4.1 Moving the Cursor on the Command Line Table 1.2 on page 1-11 Shows the key combinations or sequences to move the command line cursor. Ctrl defines the control key, which must be pressed simultaneously with its associated letter key. Esc means the escape key (which must be pressed first), followed by its associated letter key. Keys are not case sensitive. Specific letters are used to provide an easy way of remembering their functions. In Table 1.2 on page 1-11, bold characters indicate the relation between a letter and its function. Table 1.2 Keystrokes Details Keystrokes Function Summary Function Details Left Arrow Back character Moves the cursor one character to the left or When entering a command that extends beyond a Ctrl-B single line, press the Left Arrow or Ctrl-B keys repeatedly to move back to the system prompt. Right Arrow or Ctrl-F Forward character Moves the cursor one character to the right Esc- B Back word Moves the cursor back one word Esc- F Forward word Moves the cursor forward one word Ctrl-A Beginning of line Moves the cursor to the beginning of the command line Ctrl-E End of line Moves the cursor to the end of the command line Ctrl-D Deletes the current character Ctrl-U Deletes text up to cursor Ctrl-K Deletes from the cursor to end of the line Ctrl-P Obtains the prior command from memory Ctrl-N Obtains the next command from memory Esc-C Converts the letter at the cursor to uppercase Esc-L Converts the letter at the cursor to lowercase Esc-D Deletes the remainder of a word Ctrl-W Deletes the word up to the cursor Ctrl-Z Returns to the root prompt Ctrl-T Transposes the character to the left of the cursor with the character located at the cursor Ctrl-L Clears the screen
  • 42. 1 - 12 WiNG CLI Reference Guide 1.4.2 Completing a Partial Command Name If you cannot remember a command name (or if you want to reduce the amount of typing you have to perform), enter the first few letters of a command, then press the Tab key. The command line parser completes the command if the string entered is unique to the command mode. If your keyboard does not have a Tab key, press Ctrl-L. The CLI recognizes a command once you have entered enough characters to make the command unique. If you enter “conf” within the privileged EXEC mode, the CLI associates the entry with the configure command, since only the configure command begins with conf. In the following example, the CLI recognizes a unique string in the privileged EXEC mode when the Tab key is pressed: rfs7000-37FABE# conf<Tab> rfs7000-37FABE# configure When using the command completion feature, the CLI displays the full command name. The command is not executed until the Return or Enter key is pressed. Modify the command if the full command was not what you intended in the abbreviation. If entering a set of characters (indicating more than one command), the system lists all commands beginning with that set of characters. Enter a question mark (?) to obtain a list of commands beginning with that set of characters. Do not leave a space between the last letter and the question mark (?). For example, entering U lists all commands available in the current command mode: rfs7000-37FABE# co? commit Commit all changes made in this session configure Enter configuration mode connect Open a console connection to a remote device copy Copy from one file to another rfs7000-37FABE# co NOTE: The characters entered before the question mark are reprinted to the screen to complete the command entry. 1.4.3 Command Output pagination Output often extends beyond the visible screen length. For cases where output continues beyond the screen, the output is paused and a --More-- prompt displays at the bottom of the screen. To resume the output, press the Enter key to scroll down one line or press the Spacebar to display the next full screen of output.
  • 43. INTRODUCTION 1 - 13 1.4.4 Creating Profiles Profiles are sort of a ‘template’ representation of configuration. The system has: • a default wireless controller profile • a default profile for each of the following APs: • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP7131 • AP7161 To modify the default profile to assign an IP address to the management port: rfs7000-37FABE(config)#profile rfs7000 default-rfs-7000 rfs7000-37FABE(config-profile-default-rfs-7000)#interface me1 rfs7000-37FABE(config-profile-default-rfs-7000-if-me1)#ip address 172.16.10.2/24 rfs7000-37FABE(config-profile-default-rfs-7000-if-me1)#commit rfs7000-37FABE(config-profile-default-rfs-7000)#exit rfs7000-37FABE(config)# The following command displays default ap7131 profile: rfs7000-37FABE(config)#profile ap7131 default-ap7131 rfs7000-37FABE(config-profile-default-ap7131)#show context 1.4.5 Change the default profile by creating vlan 150 and mapping to ge3 Physical interface Logon to the wireless controller in config mode and follow the procedure below: rfs7000-37FABE(config-profile-default-rfs7000)# interface vlan 150 rfs7000-37FABE(config-profile-default-rfs7000-if-vlan150)# ip address 192.168.150.20/24 rfs7000-37FABE(config-profile-default-rfs7000-if-vlan150)# exit rfs7000-37FABE(config-profile-default-rfs7000)# interface ge 3 rfs7000-37FABE(config-profile-default-rfs7000-if-ge3)# switchport access vlan 150 rfs7000-37FABE(config-profile-default-rfs7000-if-ge3)# commit write [OK] rfs7000-37FABE(config-profile-default-rfs7000-if-ge3)# show interface vlan 150 Interface vlan150 is UP Hardware-type: vlan, Mode: Layer 3, Address: 00-15-70-37-FA-BE Index: 8, Metric: 1, MTU: 1500 IP-Address: 192.168.150.20/24 input packets 43, bytes 12828, dropped 0, multicast packets 0 input errors 0, length 0, overrun 0, CRC 0, frame 0, fifo 0, missed 0 output packets 0, bytes 0, dropped 0 output errors 0, aborted 0, carrier 0, fifo 0, heartbeat 0, window 0 collisions 0 1.4.5.1 Viewing Configured APs To view previously configured APs, enter the following command: rfs7000-37FABE(config)#show wireless ap configured
  • 44. 1 - 14 WiNG CLI Reference Guide 1.4.6 Remote Administration A terminal server may function in remote administration mode if either the terminal services role is not installed on the machine or the client used to invoke the session has enabled the admin wireless controller. • A terminal emulation program running on a computer connected to the serial port on the wireless controller. The serial port is located on the front of the wireless controller. • A Telnet session through a Secure Shell (SSH) over a network. The Telnet session may or may not use SSH depending on how the wireless wireless controller is configured. Motorola Solutions recommends using SSH for remote administration tasks. 1.4.6.1 Configuring Telnet for Management Access Login through the serial console. Perform the following: 1. A session generally begins in the USER EXEC mode (one of the two access levels of the EXEC mode). 2. Access the GLOBAL CONFIG mode from the PRIV EXEC mode. rfs7000-37FABE> en rfs7000-37FABE# configure terminal Enter configuration commands, one per line. End with CNTL/Z. 3. Go to ‘default-management-policy’ mode. rfs7000-37FABE(config)# management-policy ? rfs7000-37FABE(config)# management-policy default rfs7000-37FABE(config-management-policy-default)# 4. Enter Telnet and the port number at the command prompt. The port number is optional. The default port is 23. Commit the changes after every command. Telnet is enabled. rfs7000-37FABEconfig-management-policy-default)# telnet rfs7000-37FABE(config-management-policy-default)# commit write 5. Connect to the wireless wireless controller through Telnet using its configured IP address. Use the following credentials when logging on to the device for the first time: User Name admin Password motorola When logging into the wireless controller for the first time, you are prompted to change the password. To change user credentials: 1. Enter the username, password, role and access details rfs7000-37FABE(config-management-policy-default)# user testuser password symbol role helpdesk access all rfs7000-37FABE(config-management-policy-default)# commit rfs7000-37FABE(config-management-policy-default)# show context management-policy default telnet http server ssh user admin password 1 c9745a77bb8663fbe9422c0bab93087208e68c40add8edd0a3b4a985aa96a682 role superuser access all user testuser password 1 fd6af6a0e74ede3fc4bd54519e4864b078554aa2d97a623eedefae2ede682c13 role helpdesk access all rfs7000-37FABE(config-management-policy-default)# sow con rfs7000-37FABE(config-management-policy-default)# sow conin rfs7000-37FABE(config-management-policy-default)# show context include-factory management-policy default secure-management
  • 45. INTRODUCTION 1 - 15 telnet port 23 http server no https server no ftp ssh port 22 user admin password 1 c9745a77bb8663fbe9422c0bab93087208e68c40add8edd0a3b4a985aa96a682 role superuser access all user testuser password 1 fd6af6a0e74ede3fc4bd54519e4864b078554aa2d97a623eedefae2ede682c13 role helpdesk access all snmp-server manager v2 snmp-server manager v3 no snmp-server enable traps rfs7000-37FABE(config-management-policy-default)# rfs7000-37FABE(config-management-policy-default)# user testuser password symbol role helpdesk access all ? 2. Logon to the Telnet console and provide the user details configured in the previous step to access the wireless controller. RFS7000 release 5.2.0.0-048B rfs7000-37FABE login: testuser Password: Welcome to CLI Starting CLI... rfs7000-37FABE>
  • 46. 1 - 16 WiNG CLI Reference Guide 1.4.6.2 Configuring ssh By default, SSH is enabled from the factory settings on the wireless controller. The wireless controller requires an IP address and login credentials. To enable SSH access in the default profile, login through the serial console. Perform the following: 1. Access the GLOBAL CONFIG mode from the PRIV EXEC mode. rfs7000-37FABE> en rfs7000-37FABE# configure Enter configuration commands, one per line. End with CNTL/Z. rfs7000-37FABE> en rfs7000-37FABE# configure Enter configuration commands, one per line. End with CNTL/Z. 2. Go to ‘default-management-policy’ mode. rfs7000-37FABE(config)# management-policy default rfs7000-37FABE(config-management-policy-default)# 3. Enter SSH at the command prompt. rfs7000-37FABE(config-management-policy-default)# ssh 4. Log into the wireless wireless controller through SSH using appropriate credentials. 5. Use the following credentials when logging on to the device for the first time: User Name admin Password motorola When logging into the wireless controller for the first time, you are prompted to change the password. • To change the user credentials: RFS7000 release 5.2.0.0-048B rfs7000-37FABE login: testuser Password: Welcome to CLI Starting CLI... rfs7000-37FABE>
  • 47. CHAPTER 2 USER EXEC MODE COMMANDS Logging in to the wireless controller places you within the USER EXEC command mode. Typically, a login requires a user name and password. You have three login attempts before the connection attempt is refused. USER EXEC commands (available at the user level) are a subset of the commands available at the privileged level. In general, USER EXEC commands allow you to connect to remote devices, perform basic tests and list system information. To list available USER EXEC commands, use? at the command prompt. The USER EXEC prompt consists of the device host name followed by an angle bracket (>). rfs7000-37FABE? User Exec commands: ap-upgrade AP firmware upgrade change-passwd Change password clear Clear clock Configure software system clock cluster Cluster commands commit Commit all changes made in this session connect Open a console connection to a remote device crypto Encryption related commands debug Debugging functions disable Turn off privileged mode command enable Turn on privileged mode command help Description of the interactive help system logging Modify message logging facilities mint MiNT protocol no Negate a command or set its defaults page Toggle paging ping Send ICMP echo messages remote-debug Troubleshoot remote system(s) revert Revert changes service Service Commands show Show running system information ssh Open an ssh connection telnet Open a telnet connection terminal Set terminal line parameters time-it Check how long a particular command took between request and completion of response traceroute Trace route to destination watch Repeat the specific CLI command at a periodic interval write Write running configuration to memory or terminal clrscr Clears the display screen exit Exit from the CLI rfs7000-37FABE>
  • 48. 2-2 WiNG CLI Reference Guide 2.1 User Exec Commands Table 2.1 summarizes User Exec Mode commands Table 2.1 User Exec Mode Commands Command Description Reference ap-upgrade Enables an automatic adopted AP firmware upgrade page 2-4 change-passwd Changes the password of a logged user page 2-4 clear Resets the last saved command page 2-10 clock Configures the system clock page 2-13 cluster Accesses the cluster context page 2-14 connect Establishes a console connection to a remote device page 2-15 crypto Enables encryption page 2-16 disable Turns off (disables) the privileged mode command set page 2-28 enable Turns on (enables) the privileged mode command set page 2-29 logging Modifies message logging facilities page 2-31 mint Configures MiNT protocol page 2-32 no Negates a command or sets its default value page 2-34 page Toggles to the wireless controller paging function page 2-38 ping Sends ICMP echo messages to a user-specified location page 2-39 ssh Opens an SSH connection between two network devices page 2-40 telnet Opens a Telnet session page 2-41 terminal Sets the length/number of lines displayed within the terminal window page 2-42 time-it Verifies the time taken by a particular command between request and page 2-43 response traceroute Traces the route to its defined destination page 2-44 watch Repeats a specific CLI command at a periodic interval page 2-45 clrscr Clears the display screen page 5-3 commit Commits (saves) changes made in the current session page 5-4 exit Ends the current mode and moves to the previous mode page 5-6 help Displays the interactive help system page 5-7 revert Reverts changes to their last saved configuration page 5-13 service Invokes service commands to troubleshoot or debug (config-if) page 5-14 instance configurations
  • 49. USER EXEC MODE COMMANDS 2-3 Table 2.1 User Exec Mode Commands Command Description Reference show Displays running system information page 6-4 write Writes information to memory or terminal page 5-42
  • 50. 2-4 WiNG CLI Reference Guide 2.1.1 ap-upgrade User Exec Commands Enables an automatic firmware upgrade on an adopted AP or a set of APs. APs of the same type can be upgraded together. Once APs have been upgraded, they can be forced to reboot. This command also loads the firmware on to the wireless controller. The AP upgrade command also upgrades APs in a specified RF Domain. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ap-upgrade [<MAC/HOSTNAME>|all|ap621|ap650|ap6511|ap6521|ap6532| ap71xx|cancel-upgrade|load-image|rf-domain] ap-upgrade [<MAC/HOSTNAME>|all] {no-reboot|reboot-time <TIME>| upgrade-time <TIME> {no-reboot|reboot-time <TIME>}} ap-upgrade [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] all {no-reboot|reboot-time <TIME>|upgrade-time <TIME> {no-reboot| reboot-time <TIME>}}] ap-upgrade cancel-upgrade [<MAC/HOSTNAME>|all|ap621|ap650|ap6511| ap6521|ap6532|71xx|on] ap-upgrade cancel-upgrade [<MAC/HOSTNAME>|all] ap-upgrade cancel-upgrade [ap621|ap650|ap6511|ap6521|ap6532|71xx] all ap-upgrade cancel-upgrade on rf-domain [<RF-DOMAIN-NAME>|all] ap-upgrade load-image [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] <IMAGE-URL> ap-upgrade rf-domain [<RF-DOMAIN-NAME>|all] [all|ap621|ap650|ap6511| ap6521|ap6532|ap71xx] {no-reboot|no-via-rf-domain|reboot-time <TIME>| upgrade-time <TIME> {no-reboot|reboot-time <TIME>}} ap-upgrade rf-domain [<RF-DOMAIN-NAME>|all] [all|ap621|ap650|ap6511| ap621|ap6532|ap71xx] {no-via-rf-domain} {no-reboot|reboot-time <TIME>| upgrade-time <TIME>}
  • 51. USER EXEC MODE COMMANDS 2-5 Parameters • ap-upgrade [<MAC/HOSTNAME>|all] {no-reboot|reboot-time <TIME>|upgrade-time <TIME> {no-reboot|reboot-time <TIME>}} [<MAC/HOSTNAME>|all] Upgrades firmware on a specified AP or all APs adopted by the wireless controller • <MAC/HOSTNAME> – Specify the MAC address or hostname of the AP. • all – Upgrades all APs adopted by the wireless controller no-reboot Optional. Disables automatic reboot after a successful upgrade (the wireless controller must be manually restarted) reboot-time <TIME> Optional. Schedules an automatic reboot after a successful upgrade • <TIME> – Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format. upgrade-time <TIME> Optional. Schedules an automatic firmware upgrade {no-reboot|reboot-time • <TIME> – Specify the upgrade time in the MM/DD/YYYY-HH:MM or HH:MM <TIME>} format. After a scheduled upgrade, these actions can be performed. • no-reboot – Disables automatic reboot after a successful upgrade (the wireless controller must be manually restarted) • reboot-time <TIME> – Optional. Schedules an automatic reboot after a success- ful upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format. • ap-upgrade [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] all {no-reboot|reboot-time <TIME>|upgrade-time <TIME> {no-reboot|reboot-time <TIME>}} [ap621|ap650|ap6511|ap6521| Upgrades firmware on all adopted APs ap6532|ap71xx] all • AP621 all – Upgrades firmware on all AP621s • AP650 all – Upgrades firmware on all AP650s • AP6511 all – Upgrades firmware on all AP6511s • AP6521 all – Upgrades firmware on all AP6521s • AP6532 all – Upgrades firmware on all AP6532s • AP71XX all – Upgrades firmware on all AP71XXs After selecting the AP type, you can schedule an automatic upgrade and/or an automatic reboot. no-reboot Optional. Disables automatic reboot after a successful upgrade (the wireless controller must be manually restarted) reboot-time <TIME> Optional. Schedules an automatic reboot after a successful upgrade • <TIME> – Optional. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format. upgrade-time <TIME> Optional. Schedules firmware upgrade on an AP adopted by the wireless controller {no-reboot|reboot-time • <TIME> – Specify the upgrade time in the MM/DD/YYYY-HH:MM or HH:MM <TIME>} format. After a scheduled upgrade, these actions can be performed. • no-reboot – Optional. Disables automatic reboot after a successful upgrade (the wireless controller must be manually restarted) • reboot-time <TIME> – Optional. Schedules an automatic reboot after a successful upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format.
  • 52. 2-6 WiNG CLI Reference Guide • ap-upgrade cancel-upgrade [<MAC/HOSTNAME>|all] cancel-upgrade [ Cancels scheduled firmware upgrade on a specified AP or all APs adopted by the <MAC/HOSTNAME>|all] wireless controller • <MAC/HOSTNAME> – Specify the MAC address or hostname of the AP. • all – Cancels scheduled upgrade on all APs • ap-upgrade cancel-upgrade [ap621|ap650|ap651|ap6521|ap6532|ap71xx] all cancel-upgrade Cancels scheduled firmware upgrade on all adopted APs [ap621|ap650|ap6511|ap6521| • AP621 all – Cancels scheduled upgrade on all AP621s ap6532|ap71xx] all • AP650 all – Cancels scheduled upgrade on all AP650s • AP6511 all – Cancels scheduled upgrade on all AP6511s • AP6521 all – Cancels scheduled upgrade on all AP6521s • AP6532 all – Cancels scheduled upgrade on all AP6532s • AP71XX all – Cancels scheduled upgrade on all AP71XXs • ap-upgrade cancel-upgrade on rf-domain [<DOMAIN-NAME>|all] cancel-upgrade on rf-domain Cancels scheduled firmware upgrade on a specified RF Domain or all RF Domains [<RF-DOMAIN-NAME>|all] • <RF-DOMAIN-NAME> – Specify the RF Domain name. • all – Cancels scheduled upgrades on all RF Domains • ap-upgrade load-image [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] <IMAGE-URL> load-image Loads AP firmware images on the wireless controller. Select the AP type and provide [ap621|ap650|6511|6521|6532| the location of the AP firmware image. ap71xx] • AP621 <IMAGE-URL> – Loads AP621 firmware image • AP650 <IMAGE-URL> – Loads AP650 firmware image • AP6511 <IMAGE-URL> – Loads AP6511 firmware image • AP6521 <IMAGE-URL> – Loads AP6521 firmware image • AP6532 <IMAGE-URL> – Loads AP6532 firmware image • AP71XX <IMAGE-URL> – Loads AP71XX firmware image <IMAGE-URL> Specify the AP firmware image location in the following format: ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>:<passwd>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file
  • 53. USER EXEC MODE COMMANDS 2-7 • ap-upgrade rf-domain [<RF-DOMAIN-NAME>|all] [all|ap621|ap650|ap6511| ap6521|ap6532|ap71xx] {no-reboot|no-via-rf-domain|reboot-time <TIME>| upgrade-time <TIME>} rf-domain Upgrades AP firmware on devices in a specified RF Domain or all RF Domains [<RF-DOMAIN-NAME>|all] • <RF-DOMAIN-NAME> – Upgrades firmware in a specified RF Domain. Specify the RF Domain name. • all – Upgrades firmware on all RF Domains [all|ap621|ap650|ap6511|ap652 After specifying the RF Domain, select the AP type. 1|ap6532|ap71xx] • all – Upgrades firmware on all APs • AP621 – Upgrades firmware on all AP621s • AP650 – Upgrades firmware on all AP650s • AP6511 – Upgrades firmware on all AP6511s • AP6521 – Upgrades firmware on all AP6521s • AP6532 – Upgrades firmware on all AP6532s • AP71XX – Upgrades firmware on all AP71XXs {no-reboot|no-via-rf-domain The following actions can be performed: |reboot-time <TIME>| • no-reboot – Optional. Disables automatic reboot after a successful upgrade (the upgrade-time <TIME>} wireless controller must be manually restarted) • no-via-rf-domain – Optional. Performs AP firmware upgrade from the adopted device • reboot-time <TIME> – Optional. Schedules an automatic reboot, after a successful upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format. • upgrade-time <TIME> – Optional. Schedules an automatic firmware upgrade. Specify the upgrade time in the MM/DD/YYYY-HH:MM or HH:MM format. {no-reboot|reboot-time <TIME>} The following are common to the [no-via-rf-domain upgrade <TIME>] and upgrade parameters: • no-reboot – Optional. Disables automatic reboot after a successful upgrade of firmware (the wireless controller must be manually restarted) • reboot-time <TIME> – Optional. Schedules an automatic reboot after a successful upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format.
  • 54. 2-8 WiNG CLI Reference Guide Examples rfs7000-37FABE>ap-upgrade ap621 all -------------------------------------------------------------------------- CONTROLLER STATUS MESSAGE -------------------------------------------------------------------------- 00-15-70-37-FA-BE Success Queued 0 APs to upgrade -------------------------------------------------------------------------- rfs7000-37FABE> rfs7000-37FABE>ap-upgrade all rfs7000-37FABE> rfs7000-37FABE>ap-upgrade default/rfs7000-37FABE no-reboot -------------------------------------------------------------------------- CONTROLLER STATUS MESSAGE -------------------------------------------------------------------------- 00-23-68-88-0D-A7 Success Queued 0 APs to upgrade -------------------------------------------------------------------------- rfs7000-37FABE> rfs7000-37FABE>ap-upgrade rfs7000-37FABE reboot-time 06/01/2011-12:01 -------------------------------------------------------------------------- CONTROLLER STATUS MESSAGE -------------------------------------------------------------------------- 00-15-70-37-FA-BE Success Queued 0 APs to upgrade -------------------------------------------------------------------------- rfs7000-37FABE>
  • 55. USER EXEC MODE COMMANDS 2-9 2.1.2 change-passwd User Exec Mode Commands Changes the password of a logged user. When this command is executed without any parameters, the password can be changed interactively. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax change-passwd {<OLD-PASSWORD> <NEW-PASSWORD>} Parameters • change passwd {<OLD-PASSWORD> <NEW-PASSWORD>} <OLD-PASSWORD> Optional. The password can also be changed interactively. To do so, press [Enter] after <NEW-PASSWORD> the command. • <OLD-PASSWORD> – Specify the password that needs to be changed • <NEW-PASSWORD> – Specify the password to change to Usage Guidelines A password must be from 1 - 64 characters. Examples rfs7000-37FABE#change-passwd Enter old password: Enter new password: Password for user 'admin' changed successfully Please write this password change to memory(write memory) to be persistent. rfs7000-37FABE#write memory OK rfs7000-37FABE#
  • 56. 2 - 10 WiNG CLI Reference Guide 2.1.3 clear User Exec Commands Clears parameters, cache entries, table entries, and other similar entries. The clear command is available for specific commands only. The information cleared using this command varies depending on the mode where the clear command is executed. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 NOTE: Refer to the interface details below when using clear • ge <index> – RFS4000 supports 5GEs and RFS6000 supports 8 GEs • me1 – Available in both RFS7000 and RFS6000-up1- Uplink interface on RFS4000 Syntax clear [arp-cache|cdp|crypto|event-history|ip|lldp|spanning-tree] clear arp-cache {on <DEVICE-NAME>} clear [cdp|lldp] neighbors {on <DEVICE-NAME>} clear crypto [ipsec|isakmp] sa [<IP>|all] {on <DEVICE-NAME>} clear event-history clear ip dhcp bindings [<IP>|all] {on <DEVICE-NAME>} clear spanning-tree detected-protocols {interface|on} clear spanning-tree detected-protocols {on <DEVICE-NAME>} clear spanning-tree detected-protocols {interface [<INTERFACE>| ge <1-4>|me1|port-channel <1-2>|vlan <1-4094>]} {on <DEVICE-NAME>}} Parameters • clear arp-cache {on <DEVICE-NAME>} arp-cache Clears Address Resolution Protocol (ARP) cache entries on an AP or wireless controller. This protocol matches the layer 3 IP addresses to the layer 2 MAC addresses. on <DEVICE-NAME> Optional. Clears ARP cache entries on a specified AP or wireless controller • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 57. USER EXEC MODE COMMANDS 2 - 11 • clear [cdp|lldp] neighbors {on <DEVICE-NAME>} cdp Clears Cisco Discovery Protocol (CDP) table entries lldp Clears Link Layer Discovery Protocol (LLDP) table entries neighbors Clears CDP or LLDP neighbor table entries based on the option selected in the preceding step on <DEVICE-NAME> Optional. Clears CDP or LLDP neighbor table entries on a specified AP or wireless controller • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • clear crypto [ipsec|isakmp] sa [<IP>|all] {on <DEVICE_NAME>} crypto Clears encryption module database ipsec sa Clears Internet Protocol Security (IPSec) database security associations (SAs) isakmp sa Clears Internet Security Association and Key Management Protocol (ISAKMP) database SAs [<IP>|all] The following are common to the IPSec and ISAKMP parameters: • <IP> – Clears IPSec or ISAKMP SAs for a certain peer • all – Clears IPSec or ISAKMP SAs for all peers on <DEVICE-NAME> Optional. Clears IPSec or ISAKMP SA entries on a specified AP or wireless controller • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • clear event-history event-history Clears event history cache entries • clear ip dhcp bindings [<IP>|all] ip Clears a DHCP server’s IP address bindings entries dhcp bindings Clears Dynamic Host Configuration Protocol (DHCP) connections and server bindings • bindings – Clears DHCP address binding entries <IP> Clears address binding entries on a specified DHCP server. Specify the DHCP server’s IP address. all Clears address binding entries on all DHCP servers • clear spanning-tree detected-protocols {on <DEVICE-NAME>} spanning-tree Clears spanning tree protocols on an interface, and also restarts protocol migration detected-protocols Restarts protocol migration on <DEVICE-NAME> Optional. Clears spanning tree protocols on a specified AP or wireless controller • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller.
  • 58. 2 - 12 WiNG CLI Reference Guide • clear spanning-tree detected-protocols {interface [<INTERFACE>|ge <1-4>| me1|port-channel <1-2>|vlan <1-4094>]} {on <DEVICE-NAME>} spanning-tree Clears spanning tree protocols on an interface, and also restarts protocol migration detected-protocols Restarts protocol migration interface [<INTERFACE>| Optional. Clears spanning tree protocols on different interfaces ge <1-4>|me1| • <INTERFACE> – Clears information on a specified interface. Specify the interface port-channel <1-2>| name. vlan <1-4094>] • ge <1-4> – Clears GigabitEthernet interface information. Select the GigabitEthernet interface index from 1 - 4. • me1 – Clears FastEthernet interface status (up1 - Clears the uplink interface) • port-channel <1-2> – Clears port channel interface information. Select the port channel index from 1 - 2. • vlan <1-4094> – Clears VLAN interface information. Select a Switch Virtual Interface (SVI) VLAN ID from 1- 4094. on <DEVICE-NAME> Optional. Clears spanning tree protocol entries on a selected AP or wireless controller • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller. Examples rfs7000-37FABE>clear crypto isakmp sa 111.222.333.01 on rfs7000-37FABE rfs7000-37FABE> rfs7000-37FABE>clear event-history rfs7000-37FABE> rfs7000-37FABE>clear spanning-tree detected-protocols interface port-channel 1 on rfs7000-37FABE rfs7000-37FABE> rfs7000-37FABE>clear ip dhcp bindings 172.16.10.9 on rfs7000-37FABE rfs7000-37FABE> rfs7000-37FABE>clear cdp neighbors on rfs7000-37FABE rfs7000-37FABE> rfs7000-37FABE>clear spanning-tree detected-protocols interface ge 1 rfs7000-37FABE> rfs7000-37FABE>clear lldp neighbors rfs7000-37FABE>
  • 59. USER EXEC MODE COMMANDS 2 - 13 2.1.4 clock User Exec Commands Sets a device’s system clock Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax clock set <HH:MM:SS> <1-31> <MONTH> <1993-2035> {on <DEVICE-NAME>} Parameters • clock set <HH:MM:SS> <1-31> <MONTH> <1993-2035> {on <DEVICE-NAME>} clock set Sets a device’s software system clock <HH:MM:SS> Sets the current time (in military format hours, minutes and seconds) <1-31> Sets the numerical day of the month <MONTH> Sets the month of the year (Jan to Dec) <1993-2035> Sets a valid four digit year from 1993 - 2035 on <DEVICE-NAME> Optional. Sets the clock on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE>clock set 18:16:30 7 JUL 2011 on rfs7000-37FABE clock set 18:16:30 7 JUL 2011 on rfs7000-37FABE rfs7000-37FABE>
  • 60. 2 - 14 WiNG CLI Reference Guide 2.1.5 cluster User Exec Commands Initiates cluster context. The cluster context provides centralized management to configure all cluster members from any one member. Commands executed under this context are executed on all members of the cluster. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax cluster start-selection Parameters • cluster start-selection start-selection Starts a new cluster master election Examples rfs7000-37FABE>cluster start-election rfs7000-37FABE>
  • 61. USER EXEC MODE COMMANDS 2 - 15 2.1.6 connect User Exec Commands Begins a console connection to a remote device using the remote device’s MiNT ID or name Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax connect [mint-id <MINT-ID>|<REMOTE-DEVICE-NAME>] Parameters • connect [mint-id <MINT-ID>|<REMOTE-DEVICE-NAME>] mint-id <MINT-ID> Connects to the remote system using the MiNT ID • <MINT-ID> – Specify the remote device’s MiNT ID. <REMOTE-DEVICE-NAME> Connects to the remote system using its name • <REMOTE-DEVICE-NAME> – Specify the remote device’s name. Examples rfs7000-37FABE>show mint lsp-db 2 LSPs in LSP-db of 01.42.14.79: LSP 01.42.14.79 at level 1, hostname "rfs7000-37FABE", 1 adjacencies, seqnum 5069 LSP 01.44.54.C0 at level 1, hostname "ap6500-4454C0", 1 adjacencies, seqnum 5265 rfs7000-37FABE>connect mint-id 01.44.54.C0 Entering character mode Escape character is '^]'. AP650 release 5.2.2.0-033B ap650-4454C0 login: rfs7000-37FABE>show mint lsp-db 1 LSPs in LSP-db of 70.37.FA.BE: LSP 70.37.FA.BE at level 1, hostname "rfs7000-37FABE", 0 adjacencies, seqnum 65562 rfs7000-37FABE>
  • 62. 2 - 16 WiNG CLI Reference Guide 2.1.7 crypto User Exec Mode Commands Enables RSA Keypair management. Use this command to generate, delete, export, or import an RSA Keypair. It encrypts the RSA Keypair before an export operation. This command also enables Public Key Infrastructure (PKI) management. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax crypto [key|pki] crypto key [export|generate|import|zeroise] crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background|on|passphrase} crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background} {on <DEVICE-NAME>} crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {passphrase <KEY-PASSPHRASE>} {background} {on <DEVICE-NAME>} crypto key generate rsa <RSA-KEYPAIR-NAME> <1024-2048>{on <DEVICE-NAME>} crypto key import rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background|on|passphrase} crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL> {background} {on <DEVICE-NAME>} crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL> passphrase <KEY-PASSPHRASE> {background} {on <DEVICE-NAME>} crypto key zeroise rsa <RSA-KEYPAIR-NAME> {force} {on <DEVICE-NAME>} crypto pki [authenticate|export|generate|import|zeroise] crypto pki authenticate <TRUST-POINT> <URL> {background{on <DEVICE-NAME>}| on <DEVICE-NAME>} crypto pki export [request|trustpoint] crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name [<EXPORT-TO-URL>, email <SEND-TO-EMAIL>, fqdn <FQDN>, ip-address <IP>] crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name <EXPORT-TO-URL> {background {on <DEVICE-NAME>}| on <DEVICE-NAME>} crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR- NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> [<EXPORT-TO-URL>, email <SEND-TO-EMAIL>, fqdn <FQDN>, ip-address <IP>]
  • 63. USER EXEC MODE COMMANDS 2 - 17 crypto pki export trustpoint <TRUSTPOINT-NAME> <EXPORT-TO-URL> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>|passphrase <KEY-PHRASE> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>}} crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> [autogen-subject-name|subject-name] crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name {email <SEND-TO-EMAIL>, fqdn <FQDN>, ip-address <IP>, on <DEVICE-NAME>} crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key| use-rsa-key] <WORD> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> {email <SEND-TO-EMAIL>, fqdn <FQDN>, ip-address <IP>, on <DEVICE-NAME>} crypto pki import [certificate|crl|trustpoint] crypto pki import [certificate|crl] <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>}] crypto pki import trustpoint <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>|passphrase <word> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>} crypto pki zeroise trustpoint <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}| on <DEVICE-NAME>} Parameters • crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. export rsa Exports a RSA Keypair to a specified destination <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <EXPORT-TO-URL> Specify the RSA Keypair destination address in the following format: {on <DEVICE-NAME>} tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • on <DEVICE-NAME> – Optional. Performs the export operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background} {on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key.
  • 64. 2 - 18 WiNG CLI Reference Guide export rsa Exports a RSA Keypair to a specified destination <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <EXPORT-TO-URL> Specify the RSA Keypair destination address in the following format: {background} tftp://<hostname|IP>[:port]/path/file {on <DEVICE-NAME>} ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • background – Optional. Performs the export operation in the background • on <DEVICE-NAME> – Optional. Performs the export operation on a specific device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {passphrase <KEY- PASSPHRASE> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. export rsa Exports a RSA Keypair to a specified destination • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <EXPORT-TO-URL> Specify the RSA Keypair destination address in the following format: {passphrase} tftp://<hostname|IP>[:port]/path/file <KEY-PASSPHRASE> ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • passphrase – Optional. Encrypts RSA Keypair before exporting it • <KEY-PASSPHRASE> – Specify a passphrase to encrypt the RSA Keypair. on <DEVICE-NAME> Optional. Performs the export operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto key generate rsa <RSA-KEYPAIR-NAME> <1024-2048> {on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. generate rsa Generates a new RSA Keypair <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <1024-2048> • <1024-2048> – Sets the size of the RSA key in bits from 1024 - 2048 on <DEVICE-NAME> Optional. Generates the new RSA Keypair on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 65. USER EXEC MODE COMMANDS 2 - 19 • crypto key import rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. import rsa Imports a RSA Keypair from a specified source <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <IMPORT-TO-URL> Specify the RSA Keypair source address in the following format: {on <DEVICE-NAME>} tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-TO-URL> {background} {on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. import rsa Imports a RSA Keypair from a specified source <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <IMPORT-TO-URL> Specify the RSA Keypair source address in the following format: {background} tftp://<hostname|IP>[:port]/path/file {on <DEVICE-NAME>} ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • background – Optional. Performs the import operation in the background • on <DEVICE-NAME> – Optional. Performs the import operation on a specified de- vice • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-TO-URL> {passphrase <KEY-PASSPHRASE>} {background {on <DEVICE-NAME>}|on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. import rsa Decrypts and imports a RSA Keypair from a specified source <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name.
  • 66. 2 - 20 WiNG CLI Reference Guide <IMPORT-TO-URL> Specify the RSA Keypair source address in the following format: {passphrase} tftp://<hostname|IP>[:port]/path/file <KEY-PASSPHRASE> ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • passphrase – Optional. Decrypts the RSA Keypair before importing it • <KEY-PASSPHRASE> – Specify the passphrase to decrypt the RSA Keypair. on <DEVICE-NAME> Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto key zeroise <RSA-KEYPAIR-NAME> {force} {on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. zeroise rsa Deletes a specified RSA Keypair <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. force {on <DEVICE-NAME>} Optional. Forces deletion of all certificates associated with the RSA Keypair • on <DEVICE-NAME> – Optional. Forces deletion of all certificates associated with the RSA Keypair on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto pki authenticate <TRUSTPOINT-NAME> <URL> {background {on <DEVICE-NAME>}| on <DEVICE-NAME>} pki Enables Private Key Infrastructure (PKI) management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated Certificate Authority (CA) certificates. authenticate Authenticates a CA certificate <TRUSTPOINT-NAME> • <TRUSTPOINT-NAME> – Specify the trustpoint name. <URL> Specify the CA certificate location in the following format: tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file
  • 67. USER EXEC MODE COMMANDS 2 - 21 background Optional. Performs authentication in the background {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Performs authentication on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Performs authentication on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto pki request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name [<EXPORT-TO-URL>|email <SEND-TO-EMAIL>|fqdn <FQDN>| ip-address <IP>] pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. request Sends a Certificate Signing Request (CSR) to the CA for digital identity certificate. The CSR contains the applicant’s details and the RSA Keypair’s public key. [generate-rsa-key| Generates a new RSA Keypair or uses an existing RSA Keypair use-rsa-key] • generate-rsa-key – Generates a new RSA Keypair for digital authentication <RSA-KEYPAIR-NAME> • use-rsa-key – Uses an existing RSA Keypair for digital authentication • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it. If an existing RSA Keypair, specify its name. autogen-subject-name Auto generates the subject name from configuration parameters. The subject name helps to identify the certificate. <EXPORT-TO-URL> Specify the CSR location in the following format: {background {on <DEVICE- tftp://<hostname|IP>[:port]/path/file NAME}| ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file on <DEVICE-NAME>} sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file • background – Optional. Performs the export operation in the background • on <DEVICE-NAME> – Optional. Performs the export operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. email <SEND-TO-EMAIL> Exports CSR to a specified e-mail address • <SEND-TO-EMAIL> – Specify the e-mail address of the CA. fqdn <FQDN> Exports CSR to a specified Fully Qualified Domain Name (FQDN) • <FQDN> – Specify the FQDN of the CA. ip address <IP> Exports CSR to a specified device or system • <IP> – Specify the IP address of the CA.
  • 68. 2 - 22 WiNG CLI Reference Guide • crypto pki request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> [<EXPORT-TO-URL>, email <SEND-TO-EMAIL>, fqdn <FQDN>, ip-address <IP> pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. request Sends CSR to the CA for a digital identity certificate.The CSR contains the applicant’s details and the RSA Keypair’s public key. [generate-rsa-key| Generates a new RSA Keypair or uses an existing RSA Keypair use-rsa-key] • generate-rsa-key – Generates a new RSA Keypair for digital authentication <RSA-KEYPAIR-NAME> • use-rsa-key – Uses an existing RSA Keypair for digital authentication • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it. If using an existing RSA Keypair, specify its name. subject-name Specify a subject name to identify the certificate. <COMMON-NAME> • <COMMON-NAME> – Specify the common name used with the CA certificate. The name should enable you to identify the certificate easily. <COUNTRY> Sets the deployment country name (2 character ISO code) <STATE> Sets the state name (2 to 64 characters) <CITY> Sets the city name (2 to 64 characters) <ORGANIZATION> Sets the organization name (2 to 64 characters) <ORGANIZATION-UNIT> Sets the organization unit (2 to 64 characters) <EXPORT-TO-URL> Specify the CSR location in the following format: {background {on <DEVICE- tftp://<hostname|IP>[:port]/path/file NAME}|on <DEVICE-NAME>} ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file • background – Optional. Performs the export operation in the background • on <DEVICE-NAME> – Optional. Performs the export operation on a specific device. • <DEVICE-NAME> – Specify the name of the AP or wireless controller. email <SEND-TO-EMAIL> Exports CSR to a specified e-mail address • <SEND-TO-EMAIL> – Specify the e-mail address of the CA. fqdn <FQDN> Exports CSR to a specified FQDN • Specify the FQDN of the CA. ip address <IP> Exports CSR to a specified device or system • Specify the IP address of the CA.
  • 69. USER EXEC MODE COMMANDS 2 - 23 • crypto pki trustpoint <TRUSTPOINT-NAME> <EXPORT-TO-URL> {background {on <DEVICE- NAME>}|on <DEVICE-NAME>|passphrase <KEY-PASSPHRASE> background {on <DEVICE-NAME>}| on <DEVICE-NAME>}} pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. trustpoint Exports a trustpoint CA certificate, Certificate Revocation List (CRL), server certificate, <TRUSTPOINT-NAME> and private key • <TRUSTPOINT-NAME> – Specify the trustpoint name. <EXPORT-TO-URL> Specify the destination address in the following format: tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background Optional. Performs the export operation in the background {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Performs the export operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Performs the export operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. passphrase Optional. Encrypts the key with a passphrase before exporting it <KEY-PASSPHRASE> • <KEY-PASSPHRASE> – Specify the passphrase. {background {on <DEVICE- • background – Optional. Performs the export operation in the background NAME>}| • on <DEVICE-NAME> – Optional. Performs the export operation on a specified on <DEVICE-NAME> device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name {email <SEND-TO-EMAIL>| fqdn <FQDN>|ip-address <IP>|on <DEVICE-NAME>} pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. generate Generates a CA certificate and a trustpoint self-signed Generates a self-signed CA certificate and a trustpoint <TRUSTPOINT-NAME> • <TRUSTPOINT-NAME> – Specify a name for the certificate and its trustpoint. [generate-rsa-key| Generates a new RSA Keypair, or uses an existing RSA Keypair use-rsa-key] • generate-rsa-key – Generates a new RSA Keypair for digital authentication <RSA-KEYPAIR-NAME> • use-rsa-key – Uses an existing RSA Keypair for digital authentication • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it. If using an existing RSA Keypair, specify its name.
  • 70. 2 - 24 WiNG CLI Reference Guide autogen-subject-name Auto generates the subject name from the configuration parameters. The subject name helps to identify the certificate email <SEND-TO-EMAIL> Exports CSR to a specified e-mail address • <SEND-TO-EMAIL> – Specify the e-mail address of the CA. fqdn <FQDN> Exports CSR to a specified FQDN • <FQDN> – Specify the FQDN of the CA. ip-address <IP> Exports CSR to a specified device or system • <IP> – Specify the IP address of the CA. on <DEVICE-NAME> Exports the CSR on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> {email <SEND-TO-EMAIL>| fqdn <FQDN>|ip-address <IP>|on <DEVICE-NAME>} pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. generate Generates a CA certificate and a trustpoint self-signed Generates a self-signed CA certificate and a trustpoint <TRUSTPOINT-NAME> • <TRUSTPOINT-NAME> – Specify a name for the certificate and its trustpoint. [generate-rsa-key| Generates a new RSA Keypair, or uses an existing RSA Keypair use-rsa-key] • generate-rsa-key – Generates a new RSA Keypair for digital authentication <RSA-KEYPAIR-NAME> • use-rsa-key – Uses an existing RSA Keypair for digital authentication • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it. If using an existing RSA Keypair, specify its name. subject-name Specify a subject name to identify the certificate. <COMMON-NAME> • <COMMON-NAME> – Specify the common name used with the CA certificate. The name should enable you to identify the certificate easily. <COUNTRY> Sets the deployment country name (2 character ISO code) <STATE> Sets the state name (2 to 64 characters) <CITY> Sets the city name (2 to 64 characters) <ORGANIZATION> Sets the organization name (2 to 64 characters) <ORGANIZATION-UNIT> Sets the organization unit (2 to 64 characters) email <SEND-TO-EMAIL> Exports the CSR to a specified e-mail address • <SEND-TO-EMAIL> – Specify the e-mail address of the CA.
  • 71. USER EXEC MODE COMMANDS 2 - 25 fqdn <FQDN> Exports the CSR to the CA by providing the FQDN of the CA • <FQDN> – Specify the FQDN of the CA. ip address <IP> Exports the CSR to a specified device or system • <IP> – Specify the IP address of the CA • crypto pki import [certificate|crl] <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background {on <DEVICE-NAME>}|on <DEVICE--NAME>} pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. import Imports certificates, CRL, or a trustpoint to the selected device [certificate|crl] Imports a signed server certificate or CRL <TRUSTPOINT-NAME> • certificate – Imports signed server certificate • crl – Imports CRL • <TRUSTPOINT-NAME> – Specify the trustpoint name (should be authenticated). <IMPORT-FROM-URL> Specify the signed server certificate or CRL source address in the following format: tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background Optional. Performs the import operation in the background {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto pki import trustpoint <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background {on <DEVICE-NAME>}|on <DEVICE--NAME>} pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. import Imports certificates, CRL, or a trustpoint to the selected device trustpoint Imports a trustpoint and its associated CA certificate, server certificate, and private <TRUSTPOINT-NAME> key • <TRUSTPOINT-NAME> – Specify the trustpoint name (should be authenticated).
  • 72. 2 - 26 WiNG CLI Reference Guide <IMPORT-FROM-URL> Specify the trustpoint source address in the following format: tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background Optional. Performs the import operation in the background {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. passphrase Optional. Encrypts the trustpoint with a passphrase before importing it <KEY-PASSPHRASE> • <KEY-PASSPHRASE> – Specify a passphrase. {background {on <DEVICE- • background – Optional. Imports the encrypted trustpoint in the background NAME>}| • on <DEVICE-NAME> – Optional. Imports the encrypted trustpoint on a on <DEVICE-NAME>} specified device • <DEVICE-NAME.> – Specify the name of the AP or wireless controller. • crypto pki zeroise trustpoint <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}| on <DEVICE-NAME>} pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. zeroise Deletes a trustpoint and its associated CA certificate, server certificate, and private key <TRUSTPOINT-NAME> • <TRUSTPOINT-NAME> – Specify the trustpoint name (should be authenticated). del-key Optional. Deletes the private key associated with the server certificate {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Deletes private key on a specific device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Deletes the trustpoint on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 73. USER EXEC MODE COMMANDS 2 - 27 ExamplesJ rfs7000-37FABE#crypto key generate rsa key 1025 RSA Keypair successfully generated rfs7000-37FABE# rfs7000-37FABE#crypto key import rsa moto123 url passphrase word background on rfs7000-37FABE RSA key import operation is started in background rfs7000-37FABE# rfs7000-37FABE#crypto pki generate self-signed word generate-rsa-key word autogen- subject-name fqdn word Successfully generated self-signed certificate rfs7000-37FABE# rfs7000-37FABE#crypto pki zeroize trustpoint word del-key on rfs7000-37FABE Successfully removed the trustpoint and associated certificates %Warning: Applications associated with the trustpoint will start using default- trustpoint rfs7000-37FABE# rfs7000-37FABE#crypto pki authenticate word url background on rfs7000-37FABE Import of CA certificate started in background rfs7000-37FABE# rfs7000-37FABE#crypto pki import trustpoint word url passphrase word on rfs7000-37FABE Import operaton started in background rfs7000-37FABE# Related Commands no Resets or disables the crypto commands
  • 74. 2 - 28 WiNG CLI Reference Guide 2.1.8 disable User Exec Commands Turns off (disables) the privileged mode command set. This command returns to the User Executable mode. • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax disable Parameters None Examples rfs7000-37FABE#disable rfs7000-37FABE>
  • 75. USER EXEC MODE COMMANDS 2 - 29 2.1.9 enable User Exec Commands Turns on (enables) the privileged mode command set. This command does not do anything in the Privilege Executable mode. • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax enable Parameters None Examples rfs7000-37FABE>enable rfs7000-37FABE#
  • 76. 2 - 30 WiNG CLI Reference Guide 2.1.10 exit User Exec Commands Ends the current CLI session and closes the session window • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax exit Parameters None Examples rfs7000-37FABE>exit
  • 77. USER EXEC MODE COMMANDS 2 - 31 2.1.11 logging User Exec Commands Modifies message logging settings • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax logging monitor {<0-7>|alerts|critical|debugging|emergencies|errors| informational|warnings|notifications} Parameters • logging monitor {<0-7>|alerts|critical|debugging|emergencies|errors| informational|warnings|notifications} monitor Sets the terminal lines logging levels. The logging severity levels can be set from 0 - 7. The system configures default settings, if no logging severity level is specified. • <0-7> – Optional. Specify the logging severity level from 0-7. The various levels and their implications are as follows: • alerts – Optional. Immediate action needed (severity=1) • critical – Optional. Critical conditions (severity=2) • debugging – Optional. Debugging messages (severity=7) • emergencies – Optional. System is unusable (severity=0) • errors – Optional. Error conditions (severity=3) • informational – Optional.Informational messages (severity=6) • notifications – Optional. Normal but significant conditions (severity=5) • warnings – Optional. Warning conditions (severity=4) Examples rfs7000-37FABE>logging monitor warnings ? rfs7000-37FABE> rfs7000-37FABE>logging monitor 2 rfs7000-37FABE> Related Commands no Resets the terminal lines logging levels
  • 78. 2 - 32 WiNG CLI Reference Guide 2.1.12 mint User Exec Commands Uses MiNT protocol to perform a ping and a traceroute to a remote device • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax mint [ping|traceroute] mint ping <MINT-ID> {count [<1-60>]|size [<1-64000>]|timeout [<1-10>]} mint traceroute <MINT-ID> {destination-port [<1-65535>]|max-hops [<1-255>]| source-port [<1-65535>]|timeout [<1-255>]} Parameters • mint ping <MINT-ID> {count [<1-60>]|size [<1-64000>]|timeout [<1-10>]} ping <MINT-ID> Sends a MiNT echo message to a MiNT destination • <MINT-ID> – Specify the MiNT destination ID to ping. count <1-60> Optional. Sets the number of times to ping the MiNT destination • <1-60> – Specify a value from 1 - 60. The default is 3. size <1-64000> Optional. Sets the MiNT payload size in bytes • <1-64000> – Specify a value from 1 - 640000. The default is 64 bytes. timeout <1-10> Optional. Sets a response time in seconds • <1-10> – Specify a value from 1 - 10 seconds. The default is 1 second. • mint traceroute <MINT-ID> {destination-port [<1-65535>]|max-hops [<1-255>]| source-port [<1-65535>]|timeout [<1-255>]} traceroute <MINT-ID> Prints the route packets trace to a device • <MINT-ID> – Specify the MiNT destination ID. destination-port Optional. Sets the Equal-cost Multi-path (ECMP) routing destination port <1-65535> • <1-65535> – Specify a value from 1 - 65535. The default port is 45. max-hops <1-255> Optional. Sets the maximum number of hops a traceroute packet traverses in the forward direction • <1-255> – Specify a value from 1 - 255. The default is 30.
  • 79. USER EXEC MODE COMMANDS 2 - 33 source-port <1-65535> Optional. Sets the ECMP source port • <1-65535> – Specify a value from 1 - 65535. The default port is 45. timeout <1-255> Optional. Sets the minimum response time period • <1-65535> – Specify a value from 1 - 255 seconds. The default is 30 seconds. Examples rfs7000-37FABE>mint ping 70.37.FA.BF count 20 size 128 MiNT ping 70.37.FA.BF with 128 bytes of data. Response from 70.37.FA.BF: id=1 time=0.292 ms Response from 70.37.FA.BF: id=2 time=0.206 ms Response from 70.37.FA.BF: id=3 time=0.184 ms Response from 70.37.FA.BF: id=4 time=0.160 ms Response from 70.37.FA.BF: id=5 time=0.138 ms Response from 70.37.FA.BF: id=6 time=0.161 ms Response from 70.37.FA.BF: id=7 time=0.174 ms Response from 70.37.FA.BF: id=8 time=0.207 ms Response from 70.37.FA.BF: id=9 time=0.157 ms Response from 70.37.FA.BF: id=10 time=0.153 ms Response from 70.37.FA.BF: id=11 time=0.159 ms Response from 70.37.FA.BF: id=12 time=0.173 ms Response from 70.37.FA.BF: id=13 time=0.156 ms Response from 70.37.FA.BF: id=14 time=0.209 ms Response from 70.37.FA.BF: id=15 time=0.147 ms Response from 70.37.FA.BF: id=16 time=0.203 ms Response from 70.37.FA.BF: id=17 time=0.148 ms Response from 70.37.FA.BF: id=18 time=0.169 ms Response from 70.37.FA.BF: id=19 time=0.164 ms Response from 70.37.FA.BF: id=20 time=0.177 ms --- 70.37.FA.BF ping statistics --- 20 packets transmitted, 20 packets received, 0% packet loss round-trip min/avg/max = 0.138/0.177/0.292 ms
  • 80. 2 - 34 WiNG CLI Reference Guide 2.1.13 no User Exec Commands Use the no command to revert a command or to set parameters to their default. This command is useful to turn off an enabled feature or set default values for a parameter. NOTE: The commands have their own set of parameters that can be reset. • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax no [adoption|captive-portal|crypto|debug|logging|page|service|terminal|wireless] no adoption {on <DEVICE-OR-DOMAIN-NAME>} no captive-portal client [captive-portal <CAPTIVE-PORTAL-NAME>|<MAC>] {on <DEVICE-OR-DOMAIN-NAME>} no crypto pki [server|trustpoint] no crypto pki [server|trustpoint] <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}| on <DEVICE-NAME>} no logging monitor no page no service [ap300|cli-tables-expand|locator] no service ap300 locator <MAC> no service [cli-tables-expand <LINE>|locator {on <DEVICE-NAME>}] no terminal [length|width] no wireless client [all {filter|on}|<MAC>] no wireless client all {filter [wlan [<WLAN-NAME>]]} no wireless client all {on <DEVICE-OR-DOMAIN-NAME> {filter [wlan [<WLAN-NAME>]]}} no wireless client <MAC> {on <DEVICE-OR-DOMAIN-NAME>} Parameters • no adoption {on <DEVICE-OR-DOMAIN-NAME>} no adoption Resets the adoption status of a specified device or all devices adopted by a device {on <DEVICE-OR-DOMAIN- • <DEVICE-OR-DOMAIN-NAME> – Optional. Specify the name of the AP, wireless NAME>} controller, or RF Domain.
  • 81. USER EXEC MODE COMMANDS 2 - 35 • no captive-portal client [captive-portal <CAPTIVE-PORTAL-NAME>|<MAC>] {on <DEVICE-OR-DOMAIN-NAME>} no captive-portal client Disconnects captive portal clients from the network captive-portal Disconnects captive portal clients <CAPTIVE-PORTAL-NAME> • <CAPTIVE-PORTAL-NAME> – Specify the captive portal name. <MAC> Disconnects a specified client • <MAC> – Specify the MAC address of the client. on Optional. Disconnects clients on a specified device or RF Domain <DEVICE-OR-DOMAIN- • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or NAME> RF Domain. • no crypto pki [server|trustpoint] <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}| on <DEVICE-NAME>} no crypto pki Deletes all PKI authentications [server|trustpoint] Deletes PKI authentications, such as server certificates and trustpoints <TRUSTPOINT-NAME> • server – Deletes server certificates • trustpoint – Deletes a trustpoint and its associated certificates The following is common to the server and trustpoint parameters: • <TURSTPOINT-NAME> – Deletes a trustpoint or its server certificate. Specify the trustpoint name. del-key Optional. Deletes the private key associated with a server certificate or trustpoint. The {on <DEVICE-NAME>} operation will fail if the private key is in use by other trustpoints. • on <DEVICE-NAME> – Optional. Deletes the private key on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • no logging monitor no logging monitor Resets terminal lines message logging levels • no page no page Resets wireless controller paging function to its default. Disabling the “page” command displays the CLI command output at once, instead of page by page. • no service ap300 locator <MAC> no service Disables LEDs on AP300s or a specified device in the WLAN. It also resets the CLI table expand and MiNT protocol configurations. no ap300 locator <MAC> Disables LEDs on AP300s • <MAC> – Specify the MAC address of the AP300.
  • 82. 2 - 36 WiNG CLI Reference Guide • no service [cli-tables-expand <LINE>|locator {on <DEVICE-NAME>}] no service Disables LEDs on AP300s or a specified device in the WLAN. It also resets the CLI table expand and MiNT protocol configurations. cli-tables-expand <LINE> Resets the expand configuration of the CLI table, so that the table does not expand in the drop-down format locator Disables LEDs on a specified device {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller. • no terminal [length|width] no terminal [length|width] Resets the width of the terminal window or the number of lines displayed within the terminal window • length – Resets the number of lines displayed on the terminal window to its default • width – Resets the width of the terminal window to its default • no wireless client all {filter [wlan [<WLAN-NAME>]]} no wireless client all Disassociates all clients on a specified device or domain filter Optional. Specifies additional client selection filter wlan <WLAN-NAME> • wlan – Optional. Filters clients based on the WLAN • <WLAN-NAME> – Specify the WLAN name. • no wireless client all {on <DEVICE-OR-DOMAIN-NAME> {filter [wlan <WLAN-NAME>]}} no wireless client all on Disassociates all wireless clients on a specified device or domain <DEVICE-OR-DOMAIN- • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or NAME> RF Domain. filter The following are optional filter parameters: wlan <WLAN-NAME> • filter – Optional. Specifies additional client selection filter • wlan – Filters clients based on the WLAN • <WLAN-NAME> – Specify the WLAN name. Usage Guidelines The no command negates any command associated with it. Wherever required, use the same parameters associated with the command getting negated. Examples rfs7000-37FABE>no adoption rfs7000-37FABE> rfs7000-37FABE>no page rfs7000-37FABE> rfs7000-37FABE>no service cli-tables-expand line rfs7000-37FABE>
  • 83. USER EXEC MODE COMMANDS 2 - 37 Related Commands auto-provisioning-policy Resets the adoption state of a device and all devices adopted to it captive portal Manages captive portal clients logging Modifies message logging settings page Resets the wireless controller paging function to its default service Performs different functions depending on the parameter passed terminal Sets the length or the number of lines displayed within the terminal window wireless-client Manages wireless clients
  • 84. 2 - 38 WiNG CLI Reference Guide 2.1.14 page User Exec Commands Toggles wireless controller paging. Enabling this command displays the CLI command output page by page, instead of running the entire output at once. • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax page Parameters None Examples rfs7000-37FABE>page rfs7000-37FABE> Related Commands no Disables wireless controller paging
  • 85. USER EXEC MODE COMMANDS 2 - 39 2.1.15 ping User Exec Commands Sends Internet Controller Message Protocol (ICMP) echo messages to a user-specified location • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ping [<IP>|<HOSTNAME>] Parameters • ping [<IP>|<HOSTNAME>] <IP> Optional. Specify the destination IP address to ping. When entered without any parameters, this command prompts for an IP. <HOSTNAME> Optional. Specify the destination hostname to ping. When entered without any parameters, this command prompts for a hostname. Examples rfs7000-37FABE>ping 172.16.10.3 PING 172.16.10.3 (172.16.10.3): 100 data bytes 108 bytes from 172.16.10.3: seq=0 ttl=64 time=7.100 ms 108 bytes from 172.16.10.3: seq=1 ttl=64 time=0.390 ms 108 bytes from 172.16.10.3: seq=2 ttl=64 time=0.422 ms 108 bytes from 172.16.10.3: seq=3 ttl=64 time=0.400 ms --- 172.16.10.3 ping statistics --- 4 packets transmitted, 4 packets received, 0% packet loss rfs7000-37FABE>
  • 86. 2 - 40 WiNG CLI Reference Guide 2.1.16 ssh User Exec Commands Opens a Secure Shell (SSH) connection between two network devices • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ssh <IP> <USER-NAME> Parameters • ssh <IP> <USER-NAME> [<IP>/<HOSTNAME>] Specify the IP address or hostname of the remote system. <USERNAME> Specify the name of the user requesting SSH connection with the remote system. Examples rfs7000-37FABE>ssh 172.16.10.3 172.16.10.1 ssh: connect to host 172.16.10.3 port 22: No route to host rfs7000-37FABE>
  • 87. USER EXEC MODE COMMANDS 2 - 41 2.1.17 telnet User Exec Commands Opens a Telnet session between two network devices • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax telnet <IP> {<TCP-PORT>} Parameters telnet <IP> {<TCP-PORT>} <IP> Configures the IP address of the remote system to connect to. The Telnet session is established between the connecting system and the remote system. • <IP> – Specify the IP address of the remote system. <TCP-PORT> Optional. Specify the Transmission Control Protocol (TCP) port number. Examples rfs7000-37FABE>telnet 172.16.10.1 Entering character mode Escape character is '^]'. rfs7000-37FABE release 5.2.2.0-048B rfs7000-37FABE login: admin Password: rfs7000-37FABE>
  • 88. 2 - 42 WiNG CLI Reference Guide 2.1.18 terminal User Exec Commands Sets the length or the number of lines displayed within the terminal window • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax terminal [length|width] <0-512> Parameters • terminal [length|width] <0-512> length <0-512> Sets the number of lines displayed on a terminal window • <0-512> – Specify a value from 0 - 512. width <0-512> Sets the width or number of characters displayed on a terminal window • <0-512> – Specify a value from 0 - 512. Examples rfs7000-37FABE>terminal length 150 rfs7000-37FABE> rfs7000-37FABE>terminal width 215 rfs7000-37FABE> rfs7000-37FABE>show context Terminal Type: vt102 Length: 150 Width: 0 rfs7000-37FABE> Related Commands no Resets the width of the terminal window or the number of lines displayed within the terminal window
  • 89. USER EXEC MODE COMMANDS 2 - 43 2.1.19 time-it User Exec Commands Verifies the time taken by a particular command between request and response • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax time-it <COMMAND> Parameters • time-it <COMMAND> time-it <COMMAND> Verifies the time taken by a particular command to execute and provide a result • <COMMAND> – Specify the command. Examples rfs7000-37FABE>time-it enable That took 0.00 seconds.. rfs7000-37FABE#
  • 90. 2 - 44 WiNG CLI Reference Guide 2.1.20 traceroute User Exec Commands Traces the route to a defined destination Use ‘--help’ or ‘-h’ to display a complete list of parameters for the traceroute command • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax traceroute <LINE> Parameters • traceroute <LINE> traceroute <LINE> Traces the route to a destination IP address or hostname • <LINE> – Specify a traceroute argument. For example, “service traceroute-h”. Examples rfs7000-37FABE>traceroute --help BusyBox v1.14.1 () multi-call binary Usage: traceroute [-FIldnrv] [-f 1st_ttl] [-m max_ttl] [-p port#] [-q nqueries] [-s src_addr] [-t tos] [-w wait] [-g gateway] [-i iface] [-z pausemsecs] HOST [data size] Trace the route to HOST Options: -F Set the don't fragment bit -I Use ICMP ECHO instead of UDP datagrams -l Display the ttl value of the returned packet -d Set SO_DEBUG options to socket -n Print hop addresses numerically rather than symbolically -r Bypass the normal routing tables and send directly to a host -v Verbose -m max_ttl Max time-to-live (max number of hops) -p port# Base UDP port number used in probes (default is 33434) -q nqueries Number of probes per 'ttl' (default 3) -s src_addr IP address to use as the source address -t tos Type-of-service in probe packets (default 0) -w wait Time in seconds to wait for a response (default 3 sec) -g Loose source route gateway (8 max) rfs7000-37FABE>traceroute 172.16.10.2 traceroute to 172.16.10.2 (172.16.10.2), 30 hops max, 38 byte packets 1 172.16.10.1 (172.16.10.1) 3002.008 ms !H 3002.219 ms !H 3003.945 ms !H
  • 91. USER EXEC MODE COMMANDS 2 - 45 2.1.21 watch User Exec Commands Repeats the specified CLI command at periodic intervals • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax watch <1-3600> <LINE> Parameters • watch <1-3600> <LINE> watch Repeats a CLI command at a specified interval <1-3600> Select an interval from 1 - 3600 seconds. Pressing CTRL-Z halts execution of the command. <LINE> Specify the CLI command. Examples rfs7000-37FABE>watch 45 page rfs7000-37FABE> rfs7000-37FABE>watch 45 ping 172.16.10.2 PING 172.16.10.2 (172.16.10.2): 100 data bytes 108 bytes from 172.16.10.2: seq=0 ttl=64 time=0.725 ms 108 bytes from 172.16.10.2: seq=1 ttl=64 time=0.464 ms 108 bytes from 172.16.10.2: seq=2 ttl=64 time=0.458 ms 108 bytes from 172.16.10.2: seq=3 ttl=64 time=0.378 ms 108 bytes from 172.16.10.2: seq=4 ttl=64 time=0.364 ms --- 172.16.10.2 ping statistics --- 5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max = 0.364/0.477/0.725 ms rfs7000-37FABE>
  • 92. 2 - 46 WiNG CLI Reference Guide
  • 93. CHAPTER 3 PRIVILEGED EXEC MODE COMMANDS Most PRIV EXEC commands set operating parameters. Privileged-level access should be password protected to prevent unauthorized use. The PRIV EXEC command set includes commands contained within the USER EXEC mode. The PRIV EXEC mode also provides access to configuration modes, and includes advanced testing commands. The PRIV EXEC mode prompt consists of the hostname of the device followed by a pound sign (#). To access the PRIV EXEC mode, enter the following at the prompt: rfs7000-37FABE>enable rfs7000-37FABE# The PRIV EXEC mode is often referred to as the enable mode, because the enable command is used to enter the mode. There is no provision to configure a password to get direct access to PRIV EXEC (enable) mode. rfs7000-37FABE#? Priv Exec commands: ap-upgrade AP firmware upgrade archive Manage archive files boot Boot commands cd Change current directory change-passwd Change password clear Clear clock Configure software system clock cluster Cluster commands commit Commit all changes made in this session configure Enter configuration mode connect Open a console connection to a remote device copy Copy from one file to another crypto Encryption related commands debug Debugging functions delete Deletes specified file from the system. diff Display differences between two files dir List files on a filesystem disable Turn off privileged mode command edit Edit a text file enable Turn on privileged mode command erase Erase a filesystem format Format file system halt Halt the system help Description of the interactive help system join-cluster Join the cluster logging Modify message logging facilities mint MiNT protocol mkdir Create a directory more Display the contents of a file no Negate a command or set its defaults
  • 94. 3-2 WiNG CLI Reference Guide page Toggle paging ping Send ICMP echo messages pwd Display current directory reload Halt and perform a warm reboot remote-debug Troubleshoot remote system(s) rename Rename a file revert Revert changes rmdir Delete a directory self Config context of the device currently logged into service Service Commands show Show running system information ssh Open an ssh connection telnet Open a telnet connection terminal Set terminal line parameters time-it Check how long a particular command took between request and completion of response traceroute Trace route to destination upgrade Upgrade software image upgrade-abort Abort an ongoing upgrade watch Repeat the specific CLI command at a periodic interval write Write running configuration to memory or terminal clrscr Clears the display screen exit Exit from the CLI rfs7000-37FABE#
  • 95. PRIVILEGED EXEC MODE COMMANDS 3-3 3.1 Privileged Exec Mode Commands Table 3.1 summarizes the PRIV EXEC Mode commands:. Table 3.1 Privileged Exec Commands Command Description Reference ap-upgrade Enables an automatic firmware upgrade on an adopted AP page 3-5 archive Manages file archive operations page 3-10 boot Specifies the image used after reboot page 3-12 cd Changes the current directory page 3-13 change-passwd Changes the password of a logged user page 3-14 clear Clears parameters, cache entries, table entries, and other similar entries page 3-15 clock Configures the system clock page 3-19 cluster Initiates a cluster context page 3-20 configure Enters the configuration mode page 3-21 connect Begins a console connection to a remote device page 3-22 copy Copies a file from any location to the wireless controller page 3-23 crypto Enables encryption page 3-24 delete Deletes a specified file from the system page 3-36 diff Displays the differences between two files page 3-38 dir Displays the list of files on a file system page 3-39 edit Edits a text file page 3-41 enable Turns on (enables) the privileged mode commands set page 3-42 erase Erases a file system page 3-43 exit Ends the current CLI session and closes the session window page 3-44 format Formats the file system page 3-45 halt Stops the wireless controller page 3-46 join-cluster Adds a wireless controller to an existing cluster of devices page 3-47 logging Modifies message logging parameters page 3-48 mint Configures MiNT protocols page 3-50 mkdir Creates a new directory in the file system page 3-49 more Displays the contents of a file page 3-52 no Reverts a command or sets values to their default settings page 3-53
  • 96. 3-4 WiNG CLI Reference Guide Table 3.1 Privileged Exec Commands Command Description Reference page Toggles wireless controller paging page 3-57 ping Sends ICMP echo messages to a user-specified location page 3-58 pwd Displays the current directory page 3-59 reload Halts the wireless controller and performs a warm reboot page 3-60 rename Renames a file in the existing file system page 3-62 rmdir Deletes an existing file from the file system page 3-63 self Displays the configuration context of the device page 3-64 ssh Connects to another device using a secure shell page 3-65 telnet Opens a Telnet session page 3-66 terminal Sets the length/number of lines displayed within the terminal window page 3-67 time-it Verifies the time taken by a particular command between request and page 3-68 response traceroute Traces the route to a defined destination page 3-69 upgrade Upgrades the software image page 3-70 upgrade-abort Aborts an ongoing software image upgrade page 3-71 watch Repeats the specific CLI command at a periodic interval page 3-72 clrscr Clears the display screen page 5-3 commit Commits (saves) the changes made in the current session page 5-4 do Runs commands from EXEC mode page 4-66 end Ends and exits the current mode and moves to the PRIV EXEC mode page 5-5 exit Ends the current mode and moves to the previous mode page 5-6 help Displays interactive help system page 5-7 revert Reverts changes to their last saved configuration page 5-13 service Invokes service commands to troubleshoot or debug (config-if) page 5-14 instance configurations show Displays running system information page 6-4 write Writes information to memory or terminal page 5-42
  • 97. PRIVILEGED EXEC MODE COMMANDS 3-5 3.1.1 ap-upgrade Privileged Exec Commands Enables an automatic firmware upgrade on an adopted AP or a set of APs. APs of the same type can be upgraded together. Once APs have been upgraded, they can be forced to reboot. This command also loads the firmware on to the wireless controller. The AP upgrade command also upgrades APs in a specified RF Domain. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ap-upgrade [<MAC/HOSTNAME>|all|ap621|ap650|ap6511|ap6521|ap6532| ap71xx|cancel-upgrade|load-image|rf-domain] ap-upgrade [<MAC/HOSTNAME>|all] {no-reboot|reboot-time <TIME>| upgrade-time <TIME> {no-reboot|reboot-time <TIME>}} ap-upgrade [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] all {no-reboot|reboot-time <TIME>|upgrade-time <TIME> {no-reboot| reboot-time <TIME>}}] ap-upgrade cancel-upgrade [<MAC/HOSTNAME>|all|ap621|ap650|ap6511| ap6521|ap6532|71xx|on] ap-upgrade cancel-upgrade [<MAC/HOSTNAME>|all] ap-upgrade cancel-upgrade [ap621|ap650|ap6511|ap6521|ap6532|71xx] all ap-upgrade cancel-upgrade on rf-domain [<RF-DOMAIN-NAME>|all] ap-upgrade load-image [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] <IMAGE-URL> ap-upgrade rf-domain [<RF-DOMAIN-NAME>|all] [all|ap621|ap650|ap6511| ap6521|ap6532|ap71xx] {no-reboot|no-via-rf-domain|reboot-time <TIME>| upgrade-time <TIME> {no-reboot|reboot-time <TIME>}} ap-upgrade rf-domain [<RF-DOMAIN-NAME>|all] [all|ap621|ap650|ap6511| ap621|ap6532|ap71xx] {no-via-rf-domain} {no-reboot|reboot-time <TIME>| upgrade-time <TIME>}
  • 98. 3-6 WiNG CLI Reference Guide Parameters • ap-upgrade [<MAC/HOSTNAME>|all] {no-reboot|reboot-time <TIME>|upgrade-time <TIME> {no-reboot|reboot-time <TIME>}} [<MAC/HOSTNAME>|all] Upgrades firmware on a specified AP or all APs adopted by the wireless controller • <MAC/HOSTNAME> – Specify the MAC address or hostname of the AP. • all – Upgrades all APs adopted by the wireless controller no-reboot Optional. Disables automatic reboot after a successful upgrade (the wireless controller must be manually restarted) reboot-time <TIME> Optional. Schedules an automatic reboot after a successful upgrade • <TIME> – Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format. upgrade-time <TIME> Optional. Schedules an automatic firmware upgrade {no-reboot| • <TIME> – Specify the upgrade time in the MM/DD/YYYY-HH:MM or HH:MM reboot-time <TIME>} format. After a scheduled upgrade, these actions can be performed. • no-reboot – Disables automatic reboot after a successful upgrade (the wireless controller must be manually restarted) • reboot-time <TIME> – Optional. Schedules an automatic reboot after a successful upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format. • ap-upgrade [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] all {no-reboot|reboot-time <TIME>|upgrade-time <TIME> {no-reboot|reboot-time <TIME>}} [ap621|ap650|ap6511|ap6521| Upgrades firmware on all adopted APs ap6532|ap71xx] all • AP621 all – Upgrades firmware on all AP621s • AP650 all – Upgrades firmware on all AP650s • AP6511 all – Upgrades firmware on all AP6511s • AP6521 all – Upgrades firmware on all AP6521s • AP6532 all – Upgrades firmware on all AP6532s • AP71XX all – Upgrades firmware on all AP71XXs After selecting the AP type, you can schedule an automatic upgrade and/or an automatic reboot. no-reboot Optional. Disables automatic reboot after a successful upgrade (the wireless controller must be manually restarted) reboot-time <TIME> Optional. Schedules an automatic reboot after a successful upgrade • <TIME> – Optional. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format. upgrade-time <TIME> Optional. Schedules firmware upgrade on an AP adopted by the wireless controller {no-reboot| • <TIME> – Specify the upgrade time in the MM/DD/YYYY-HH:MM or HH:MM reboot-time <TIME>} formats. After a scheduled upgrade, these actions can be performed. • no-reboot – Optional. Disables automatic reboot after a successful upgrade (the wireless controller must be manually restarted) • reboot-time <TIME> – Optional. Schedules an automatic reboot after a successful upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format.
  • 99. PRIVILEGED EXEC MODE COMMANDS 3-7 • ap-upgrade cancel-upgrade [<MAC/HOSTNAME>|all] cancel-upgrade [ Cancels scheduled firmware upgrade on a specified AP or all APs adopted by the <MAC/HOSTNAME>|all] wireless controller • <MAC/HOSTNAME> – Specify the MAC address or hostname of the AP. • all – Cancels scheduled upgrade on all APs • ap-upgrade cancel-upgrade [ap621|ap650|ap651|ap6521|ap6532|ap71xx] all cancel-upgrade Cancels scheduled firmware upgrade on all adopted APs [ap621|ap650|ap6511|ap6521| • AP621 all – Cancels scheduled upgrade on all AP621s ap6532|ap71xx] all • AP650 all – Cancels scheduled upgrade on all AP650s • AP6511 all – Cancels scheduled upgrade on all AP6511s • AP6521 all – Cancels scheduled upgrade on all AP6521s • AP6532 all – Cancels scheduled upgrade on all AP6532s • AP71XX all – Cancels scheduled upgrade on all AP71XXs • ap-upgrade cancel-upgrade on rf-domain [<DOMAIN-NAME>|all] cancel-upgrade on rf-domain Cancels scheduled firmware upgrade on a specified RF Domain or all RF Domains [<RF-DOMAIN-NAME>|all] • <RF-DOMAIN-NAME> – Specify the RF Domain name. • all – Cancels scheduled upgrades on all RF Domains • ap-upgrade load-image [ap621|ap650|ap6511|ap6521|ap6532|ap71xx] <IMAGE-URL> load-image Loads AP firmware images on the wireless controller. Select the AP type and provide [ap621|ap650|6511|6521| the location of the AP firmware image. 6532|ap71xx] • AP621 <IMAGE-URL> – Loads AP621 firmware image • AP650 <IMAGE-URL> – Loads AP650 firmware image • AP6511 <IMAGE-URL> – Loads AP6511 firmware image • AP6521 <IMAGE-URL> – Loads AP6521 firmware image • AP6532 <IMAGE-URL> – Loads AP6532 firmware image • AP71XX <IMAGE-URL> – Loads AP71XX firmware image <IMAGE-URL> Specify the AP firmware image location in the following format: ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>:<passwd>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file
  • 100. 3-8 WiNG CLI Reference Guide • ap-upgrade rf-domain [<RF-DOMAIN-NAME>|all] [all|ap621|ap650|ap6511| ap6521|ap6532|ap71xx] {no-reboot|no-via-rf-domain|reboot-time <TIME>| upgrade-time <TIME>} rf-domain Upgrades AP firmware on devices in a specified RF Domain or all RF Domains [<RF-DOMAIN-NAME>|all] • <RF-DOMAIN-NAME> – Upgrades firmware in a specified RF Domain. Specify the RF Domain name. • all – Upgrades firmware on all RF Domains [all|ap621|ap650|ap6511| After specifying the RF Domain, select the AP type. ap6521|ap6532|ap71xx] • all – Upgrades firmware on all APs • AP621 – Upgrades firmware on all AP621s • AP650 – Upgrades firmware on all AP650s • AP6511 – Upgrades firmware on all AP6511s • AP6521 – Upgrades firmware on all AP6521s • AP6532 – Upgrades firmware on all AP6532s • AP71XX – Upgrades firmware on all AP71XXs {no-reboot|no-via-rf-domain The following actions can be performed: |reboot-time <TIME>| • no-reboot – Optional. Disables automatic reboot after a successful upgrade (the upgrade-time <TIME>} wireless controller must be manually restarted) • no-via-rf-domain – Optional. Performs AP firmware upgrade from the adopted device • reboot-time <TIME> – Optional. Schedules an automatic reboot, after a successful upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format. • upgrade-time <TIME> – Optional. Schedules an automatic firmware upgrade Specify the upgrade time in the MM/DD/YYYY-HH:MM or HH:MM format. {no-reboot| The following are common to the [no-via-rf-domain upgrade <TIME>] and upgrade reboot-time <TIME>} parameters: • no-reboot – Optional. Disables automatic reboot after a successful upgrade (the wireless controller must be manually restarted) • reboot-time <TIME> – Optional. Schedules an automatic reboot after a successful upgrade. Specify the reboot time in the MM/DD/YYYY-HH:MM or HH:MM format.
  • 101. PRIVILEGED EXEC MODE COMMANDS 3-9 Examples rfs7000-37FABE#ap-upgrade AP621 all -------------------------------------------------------------------------- CONTROLLER STATUS MESSAGE -------------------------------------------------------------------------- 00-15-70-37-FA-BE Success Queued 0 APs to upgrade -------------------------------------------------------------------------- rfs7000-37FABE# rfs7000-37FABE#ap-upgrade allrfs7000-37FABE# RFS4000-880DA7#ap-upgrade default/RFS4000-880DA7 no-reboot -------------------------------------------------------------------------- CONTROLLER STATUS MESSAGE -------------------------------------------------------------------------- 00-23-68-88-0D-A7 Success Queued 0 APs to upgrade -------------------------------------------------------------------------- RFS4000-880DA7# rfs7000-37FABE#ap-upgrade rfs7000-37FABE reboot-time 06/01/2011-12:01 -------------------------------------------------------------------------- CONTROLLER STATUS MESSAGE -------------------------------------------------------------------------- 00-15-70-37-FA-BE Success Queued 0 APs to upgrade -------------------------------------------------------------------------- rfs7000-37FABE#
  • 102. 3 - 10 WiNG CLI Reference Guide 3.1.2 archive Privileged Exec Mode Commands Manages file archive operations Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax archive tar /table [<FILE>|<URL>] archive tar /create [<FILE>|<URL>] <FILE> archive tar /xtract [<FILE>|<URL>] <DIR>] Parameters • archive tar /table [<FILE>|<URL>] tar Manipulates (creates, lists or extracts) a tar file /table Lists the files in a tar file <FILE> Defines a tar filename <URL> Sets the tar file URL • archive tar /create [<FILE>|<URL>] <FILE> tar Manipulates (creates, lists or extracts) a tar file /create Creates a tar file <FILE> Defines tar filename <URL> Sets the tar file URL • archive tar /xtract [<FILE>|<URL>] <DIR>] tar Manipulates (creates, lists or extracts) a tar file /xtract Extracts content from a tar file <FILE> Defines tar filename
  • 103. PRIVILEGED EXEC MODE COMMANDS 3 - 11 <URL> Sets the tar file URL <DIR> Specify a directory name. When used with /create, dir is the source directory for the tar file. When used with /xtract, dir is the destination file where contents of the tar file are extracted. Examples How to zip the folder flash:/log/? rfs7000-37FABE#archive tar /create flash:/out.tar flash:/log/ tar: Removing leading '/' from member names flash/log/ flash/log/snmpd.log flash/log/messages.log flash/log/startup.log flash/log/radius/ rfs7000-37FABE#dir flash:/
  • 104. 3 - 12 WiNG CLI Reference Guide 3.1.3 boot Privileged Exec Mode Commands Specifies the image used after reboot Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax boot system [primary|secondary] {on <DEVICE-NAME>} Parameters • boot system [primary|secondary] {on <DEVICE-NAME>} system [primary|secondary] Specifies the image used after a device reboot • primary – Uses a primary image after reboot • secondary – Uses a secondary image after reboot on <DEVICE-NAME> Optional. Specifies the primary or secondary image location on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE#boot system primary on rfs7000-37FABE Updated system boot partition rfs7000-37FABE#
  • 105. PRIVILEGED EXEC MODE COMMANDS 3 - 13 3.1.4 cd Privileged Exec Mode Commands Changes the current directory Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax cd {<DIR>} Parameters • cd {<DIR>} <DIR> Optional. Changes the current directory to DIR. If a directory name is not provided, the system displays the current directory name. Examples rfs7000-37FABE#cd flash:/log/ rfs7000-37FABE#pwd flash:/log/ rfs7000-37FABE#
  • 106. 3 - 14 WiNG CLI Reference Guide 3.1.5 change-passwd Privileged Exec Mode Commands Changes the password of a logged user. When this command is executed without any parameters, the password can be changed interactively. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax change-passwd {<OLD-PASSWORD> <NEW-PASSWORD>} Parameters • change passwd {<OLD-PASSWORD> <NEW-PASSWORD>} <OLD-PASSWORD> Optional. The password can also be changed interactively. To do so, press [Enter] after <NEW-PASSWORD> the command. • <OLD-PASSWORD> – Specify the password that needs to be changed • <NEW-PASSWORD> – Specify the password to change to Usage Guidelines A password must be from 1 - 64 characters. Examples rfs7000-37FABE#change-passwd Enter old password: Enter new password: Password for user 'admin' changed successfully Please write this password change to memory(write memory) to be persistent. rfs7000-37FABE#write memory OK rfs7000-37FABE#
  • 107. PRIVILEGED EXEC MODE COMMANDS 3 - 15 3.1.6 clear Privileged Exec Mode Commands Clears parameters, cache entries, table entries, and other entries. The clear command is available for specific commands only. The information cleared using this command varies depending on the mode where the clear command is executed. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 NOTE: Refer to the interface details below when using clear • ge <index> – RFS4000 supports 5GEs, RFS6000 supports 8 GEs and RFS7000 supports 4GEs • me1 – Available in both RFS7000 and RFS6000 - up1 - Uplink interface on RFS4000 Syntax clear [arp-cache|cdp|counters|crypto|event-history|firewall| ip|lldp|spanning-tree] clear arp-cache {on <DEVICE-NAME>} clear [cdp|lldp] neighbors {on <DEVICE-NAME>} clear counters [all|bridge|router|thread] clear counters interface [<INTERFACE>|all|ge <1-4>|me1| port-channel <1-2>|vlan <1-4094>] clear crypto [ipsec|isakmp] sa [<IP>|all] {on <DEVICE-NAME>} clear event-history clear firewall [dhcp snoop-table|dos stats|flows] {on <DEVICE-NAME>} clear ip dhcp bindings [<IP>|all] {on <DEVICE-NAME>} clear spanning-tree detected-protocols {interface |on <DEVICE-NAME>} clear spanning-tree detected-protocols {interface [<INTERFACE>| ge <1-4>|me1|port-channel <1-2>|vlan <1-4094>]} {on <DEVICE-NAME}
  • 108. 3 - 16 WiNG CLI Reference Guide Parameters • clear arp-cache {on <DEVICE-NAME>} arp-cache Clears Address Resolution Protocol (ARP) cache entries on an AP or wireless controller on <DEVICE-NAME> Optional. Clears ARP cache entries on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • clear [cdp|lldp] neighbors {on <DEVICE-NAME>} cdp Clears Cisco Discovery Protocol (CDP) table entries ldp Clears Link Layer Discovery Protocol (LLDP) neighbor table entries neighbors Clears CDP or LLDP neighbor table entries based on the option selected in the preceding step on <DEVICE-NAME> Optional. Clears CDP or LLDP neighbor table entries on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • clear counters [all|bridge|router|thread] counters Clears counters on a system [all|bridge|router|thread] • all – Clears all counters irrespective of the interface type • bridge – Clears bridge counters • router – Clears router counters • thread – Clears per-thread counters • clear counters interface [<INTERFACE>|all|ge <1-4>|me1|port-channel <1-2>| vlan <1-4094>] counters interface Clears interface counters for a specified interface [<INTERFACE>|all|ge <1-4>| • <INTERFACE> – Clears a specified interface counters. Specify the interface name. me1|port-channel <1-2>| • all – Clears all interface counters vlan <1-4094>] • ge – Clears GigabitEthernet interface counters. Specify the GigabitEthernet interface index from 1 - 4. • me1 – Clears FastEthernet interface counters • port-channel – Clears port-channel interface counters. Specify the port channel interface index from 1 - 2. • vlan – Clears interface counters. Specify the Switch Virtual Interface (SVI) VLAN ID from 1 - 4094. • clear crypto [ipsec|isakmp] sa [<IP>|all] {on <DEVICE-NAME>} crypto Clears encryption module database ipsec sa Clears Internet Protocol Security (IPSec) database security associations (SAs) isakmp sa Clears Internet Security Association and Key Management Protocol (ISAKMP) database SAs
  • 109. PRIVILEGED EXEC MODE COMMANDS 3 - 17 [<IP>|all] The following are common to the IPSec and ISAKMP parameters: • Clears IPSec or ISAKMP SAs for a certain peer • Clears IPSec or ISAKMP SAs for all peers on <DEVICE-NAME> Optional. Clears IPSec or ISAKMP SA entries on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • clear event-history event-history Clears event history cache entries • clear ip dhcp bindings [<IP>|all] ip Clears Dynamic Host Configuration Protocol (DHCP) server IP address bindings dhcp bindings Clears DHCP connections and server bindings • bindings – Clears DHCP address binding entries <IP> Clears DHCP address binding entries on a specified DHCP server. Specify the DHCP server IP address. all Clears DHCP address binding entries on all DHCP servers • clear firewall [dhcp snoop-table|dos stats|flows] {on <DEVICE-NAME>} firewall Clears firewall event entries DHCP snoop-table Clears DHCP snoop table entries dos stats Clears denial of service statistics flows Clears established firewall sessions on <DEVICE-NAME> The following are common to the DHCP, DOS, and flows parameters: • on <DEVICE-NAME> – Optional. Clears DHCP snoop table entries, denial of service statistics, or the established firewall sessions on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • clear spanning-tree detected-protocols {on <DEVICE-NAME>} spanning-tree Clears spanning tree protocols on an interface, and also restarts protocol migration detected-protocols Restarts protocol migration on <DEVICE-NAME> Optional. Clears spanning tree protocols on a specified device • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller. • clear spanning-tree detected-protocols {interface [<INTERFACE>|ge <1-4>|me1| port-channel <1-2>|vlan <1-4094>]} {on <DEVICE-NAME>} spanning-tree Clears spanning tree protocols on an interface, and also restarts protocol migration detected-protocols Restarts protocol migration
  • 110. 3 - 18 WiNG CLI Reference Guide interface [<INTERFACE>| Optional. Clears spanning tree protocols on specified interfaces ge <1-4|me1| • <INTERFACE> – Clears information on a specified interface. Specify the interface port-channel <1-2>| name. vlan <1-4094>] • ge <1-4> – Clears a GigabitEthernet interface. Specify the GigabitEthernet interface index from 1- 4. • me1 – Clears a FastEthernet interface (up1 - Clears the uplink interface) • port-channel <1-2> – Clears a port channel interface. Specify the port channel index from 1 - 2. • vlan <1-4094> – Clears a VLAN interface. Specify a Switch Virtual Interface (SVI) VLAN ID from 1 - 4094. on <DEVICE-NAME> The following parameters are common to all interfaces: • on <DEVICE-NAME. – Optional. Clears spanning tree protocol entries on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE>clear crypto isakmp sa 111.222.333.01 on rfs7000-37FABE rfs7000-37FABE> rfs7000-37FABE>clear event-history rfs7000-37FABE> rfs7000-37FABE>clear spanning-tree detected-protocols interface port-channel 1 on rfs7000-37FABE rfs7000-37FABE> rfs7000-37FABE>clear ip dhcp bindings 172.16.10.9 on rfs7000-37FABE rfs7000-37FABE> rfs7000-37FABE#clear cdp neighbors on rfs7000-37FABE rfs7000-37FABE# RFS4000-880DA7#clear spanning-tree detected-protocols interface ge 1 RFS4000-880DA7# RFS4000-880DA7#clear lldp neighbors RFS4000-880DA7#
  • 111. PRIVILEGED EXEC MODE COMMANDS 3 - 19 3.1.7 clock Privileged Exec Mode Commands Sets a device’s system clock Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax clock set <HH:MM:SS> <1-31> <MONTH> <1993-2035> {on <DEVICE-NAME>} Parameters clock set <HH:MM:SS> <1-31> <MONTH> <1993-2035> {on <DEVICE-NAME>} clock set Sets a device’s system clock <HH:MM:SS> Sets the current time (in military format hours, minutes and seconds) <1-31> Sets the numerical day of the month <MONTH> Sets the month of the year (Jan to Dec) <1993-2035> Sets a valid four digit year from 1993 - 2035 on <DEVICE-NAME> Optional. Sets the clock on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE#clock set 10:07:00 29 JUL 2011 rfs7000-37FABE# rfs7000-37FABE#show clock 2011-07-29 10:07:36 UTC rfs7000-37FABE#
  • 112. 3 - 20 WiNG CLI Reference Guide 3.1.8 cluster Privileged Exec Mode Commands Initiates the cluster context. The cluster context provides centralized management to configure all cluster members from any one member. Commands executed under this context are executed on all members of the cluster. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax cluster start-selection Parameters • cluster start-selection start-selection Starts a new cluster master election Examples rfs7000-37FABE#cluster start-election rfs7000-37FABE#
  • 113. PRIVILEGED EXEC MODE COMMANDS 3 - 21 3.1.9 configure Privileged Exec Mode Commands Enters the configuration mode. Use this command to enter the current device’s configuration mode, or enable configuration from the terminal. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax configure {self|terminal} Parameters • configure {self|terminal} self Optional. Enables the current device’s configuration mode terminal Optional. Enables configuration from the terminal Examples rfs7000-37FABE#configure self Enter configuration commands, one per line. End with CNTL/Z. rfs7000-37FABE(config-device-00-15-70-37-FA-BE)# rfs7000-37FABE#configure terminal Enter configuration commands, one per line. End with CNTL/Z. rfs7000-37FABE(config)#
  • 114. 3 - 22 WiNG CLI Reference Guide 3.1.10 connect Privileged Exec Mode Commands Begins a console connection to a remote device using the remote device’s MiNT ID or name Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax connect [mint-id <MINT-ID>|<REMOTE-DEVICE-NAME>] Parameters • connect [mint-id <MINT-ID>|<REMOTE-DEVICE-NAME>] mint-id <MINT-ID> Connects to a remote system using the MiNT ID • <MINT-ID> – Specify the remote device MiNT ID. <REMOTE-DEVICE-NAME> Connects to a remote system using its name • <REMOTE-DEVICE-NAME> – Specify the remote device name. Examples rfs7000-37FABE#connect RFDOMAIN_UseCase1/RFS7000-37FAAA Entering character mode Escape character is '^]'. RFS7000 release 5.2.2.0-048B rfs7000-37FABE login: admin Password: Welcome to CLI RFS7000-37FAAA> rfs7000-37FABE#show mint lsp-db 2 LSPs in LSP-db of 01.42.14.79: LSP 01.42.14.79 at level 1, hostname "RFS6000-421479", 1 adjacencies, seqnum 5069 LSP 01.44.54.C0 at level 1, hostname "ap650-4454C0", 1 adjacencies, seqnum 5265 rfs7000-37FABE>connect mint-id 01.44.54.C0 Entering character mode Escape character is '^]'. AP650 release 5.2.2.0-026D ap650-4454C0 login:
  • 115. PRIVILEGED EXEC MODE COMMANDS 3 - 23 3.1.11 copy Privileged Exec Mode Commands Copies a file (config,log,txt...etc) from any location to the wireless controller and vice-versa NOTE: Copying a new config file onto an existing running-config file merges it with the existing running-config on the wireless controller. Both the existing running-config and the new config file are applied as the current running-config. Copying a new config file onto a start-up config files replaces the existing start-up config file with the parameters of the new file. It is better to erase the existing start-up config file and then copy the new config file to the startup config. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax copy [<SOURCE-FILE>|<SOURCE-URL>] [<DESTINATION-FILE>|<DESTINATION-URL>] Parameters • copy [<SOURCE-FILE>|<SOURCE-URL>] [<DESTINATION-FILE>|<DESTINATION-URL>] <SOURCE-FILE> Specify the source file to copy <SOURCE-URL> Specify the source file URL <DESTINATION-FILE> Specify the destination file to copy to <DESTINATION-URL> Specify the destination file URL Examples Transferring file snmpd.log to remote tftp server. rfs7000-37FABE#copy flash:/log/snmpd.log tftp://157.235.208.105:/snmpd.log Accessing running-config file from remote tftp server into switch running-config. rfs7000-37FABE#copy tftp://157.235.208.105:/running-config running-config
  • 116. 3 - 24 WiNG CLI Reference Guide 3.1.12 crypto Privileged Exec Mode Commands Enables RSA Keypair management. Use this command to generate, delete, export, or import a RSA Keypair. It encrypts the RSA Keypair before an export operation. This command also enables Public Key Infrastructure (PKI) management. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax crypto [key|pki] crypto key [export|generate|import|zeroise] crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background|on|passphrase} crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background} {on <DEVICE-NAME>} crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {passphrase <KEY-PASSPHRASE>} {background} {on <DEVICE-NAME>} crypto key generate rsa <RSA-KEYPAIR-NAME> <1024-2048>{on <DEVICE-NAME>} crypto key import rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background|on|passphrase} crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL> {background} {on <DEVICE-NAME>} crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-FROM-URL> passphrase <KEY-PASSPHRASE> {background} {on <DEVICE-NAME>} crypto key zeroise rsa <RSA-KEYPAIR-NAME> {force} {on <DEVICE-NAME>} crypto pki [authenticate|export|generate|import|zeroise] crypto pki authenticate <TRUST-POINT> <URL> {background{on <DEVICE-NAME>}| on <DEVICE-NAME>} crypto pki export [request|trustpoint] crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name [<EXPORT-TO-URL>, email <SEND-TO-EMAIL>, fqdn <FQDN>, ip-address <IP>] crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name <EXPORT-TO-URL> {background {on <DEVICE-NAME>}| on <DEVICE-NAME>} crypto pki export request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR- NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> [<EXPORT-TO-URL>, email <SEND-TO-EMAIL>, fqdn <FQDN>, ip-address <IP>]
  • 117. PRIVILEGED EXEC MODE COMMANDS 3 - 25 crypto pki export trustpoint <TRUSTPOINT-NAME> <EXPORT-TO-URL> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>|passphrase <KEY-PHRASE> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>}} crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> [autogen-subject-name|subject-name] crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name {email <SEND-TO-EMAIL>, fqdn <FQDN>, ip-address <IP>, on <DEVICE-NAME>} crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key| use-rsa-key] <WORD> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> {email <SEND-TO-EMAIL>, fqdn <FQDN>, ip-address <IP>, on <DEVICE-NAME>} crypto pki import [certificate|crl|trustpoint] crypto pki import [certificate|crl] <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>}] crypto pki import trustpoint <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>|passphrase <word> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>} crypto pki zeroise trustpoint <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}| on <DEVICE-NAME>} Parameters • crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. export rsa <RSA-KEYPAIR- Exports a RSA Keypair to a specified destination NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <EXPORT-TO-URL> Specify the RSA Keypair destination address in the following format: {on <DEVICE-NAME>} tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • on <DEVICE-NAME> – Optional. Performs the export operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {background} {on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key.
  • 118. 3 - 26 WiNG CLI Reference Guide export rsa Exports a RSA Keypair to a specified destination <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <EXPORT-TO-URL> Specify the RSA Keypair destination address in the following format: {background} tftp://<hostname|IP>[:port]/path/file {on <DEVICE-NAME>} ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • background – Optional. Performs the export operation in the background • on <DEVICE-NAME> – Optional. Performs the export operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto key export rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {passphrase <KEY-PASSPHRASE> {background {on <DEVICE-NAME>}|on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. export rsa Exports a RSA Keypair to a specified destination • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <EXPORT-TO-URL> Specify the RSA Keypair destination address in the following format: {passphrase} tftp://<hostname|IP>[:port]/path/file <KEY-PASSPHRASE> ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • passphrase – Optional. Encrypts RSA Keypair before exporting it • <KEY-PASSPHRASE> – Specify a passphrase to encrypt the RSA Keypair. on <DEVICE-NAME> Optional. Performs the export operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto key generate rsa <RSA-KEYPAIR-NAME> <1024-2048> {on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key.
  • 119. PRIVILEGED EXEC MODE COMMANDS 3 - 27 generate rsa Generates a new RSA Keypair <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <1024-2048> • <1024-2048> – Specify the size of the RSA key in bits from 1024 - 2048. on <DEVICE-NAME> Optional. Generates a new RSA Keypair on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto key import rsa <RSA-KEYPAIR-NAME> <EXPORT-TO-URL> {on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. import rsa Imports a RSA Keypair from a specified source <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <IMPORT-TO-URL> Specify the RSA Keypair source address in the following format: {on <DEVICE-NAME>} tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-TO-URL> {background} {on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. import rsa Imports a RSA Keypair from a specified source <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <IMPORT-TO-URL> Specify the RSA Keypair source address in the following format: {background} {on <DEVICE- tftp://<hostname|IP>[:port]/path/file NAME>} ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • background – Optional. Performs the import operation in the background • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 120. 3 - 28 WiNG CLI Reference Guide • crypto key import rsa <RSA-KEYPAIR-NAME> <IMPORT-TO-URL> {passphrase <KEY- PASSPHRASE>} {background {on <DEVICE-NAME>}|on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. import rsa Decrypts and imports RSA Keypair from a specified source <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. <IMPORT-TO-URL> Specify the RSA Keypair source address in the following format: {passphrase} tftp://<hostname|IP>[:port]/path/file <KEY-PASSPHRASE> ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • passphrase – Optional. Decrypts RSA Keypair before importing it • <KEY-PASSPHRASE> – Specify the passphrase to decrypt the RSA Keypair. on <DEVICE-NAME> Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto key zeroise <RSA-KEYPAIR-NAME> {force} {on <DEVICE-NAME>} key Enables RSA Keypair management. Use this command to export, import, generate, or delete a RSA key. zeroise rsa Deletes a specified RSA Keypair <RSA-KEYPAIR-NAME> • <RSA-KEYPAIR-NAME> – Specify the RSA Keypair name. force {on <DEVICE-NAME>} Optional. Forces deletion of all certificates associated with the RSA Keypair • on <DEVICE-NAME> – Optional. Forces deletion of all certificates on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto pki authenticate <TRUSTPOINT-NAME> <URL> {background {on <DEVICE-NAME>}| on <DEVICE-NAME>} pki Enables Private Key Infrastructure (PKI) management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated Certificate Authority (CA) certificates. authenticate Authenticates a CA certificate <TRUSTPOINT-NAME> • <TRUSTPOINT-NAME> – Specify the trustpoint name.
  • 121. PRIVILEGED EXEC MODE COMMANDS 3 - 29 <URL> Specify the CA certificate location in the following format: tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background Optional. Performs authentication in the background {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Performs authentication on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Performs authentication on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto pki request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name [<EXPORT-TO-URL>|email <SEND-TO-EMAIL>|fqdn <FQDN>| ip-address <IP>] pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. request Sends a Certificate Signing Request (CSR) to the CA for digital identity certificate. The CSR contains the applicant’s details and the RSA Keypair’s public key. [generate-rsa-key| Generates a new RSA Keypair or uses an existing RSA Keypair use-rsa-key] • generate-rsa-key – Generates a new RSA Keypair for digital authentication <RSA-KEYPAIR-NAME> • use-rsa-key – Uses an existing RSA Keypair for digital authentication • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it. If an existing RSA Keypair, specify its name. autogen-subject-name Auto generates the subject name from configuration parameters. The subject name helps to identify the certificate. <EXPORT-TO-URL> Specify the CSR destination address in the following format: {background {on <DEVICE- tftp://<hostname|IP>[:port]/path/file NAME}|on <DEVICE-NAME>} ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • background – Optional. Performs the export operation in the background • on <DEVICE-NAME> – Optional. Performs the export operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 122. 3 - 30 WiNG CLI Reference Guide email <SEND-TO-EMAIL> Exports CSR to a specified e-mail address • <SEND-TO-EMAIL> – Specify the e-mail address of the CA. fqdn <FQDN> Exports CSR to a specified Fully Qualified Domain Name (FQDN) • <FQDN> – Specify the FQDN of the CA. ip address <IP> Exports CSR to a specified device or system • <IP> – Specify the IP address of the CA. • crypto pki request [generate-rsa-key|use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> [<EXPORT-TO-URL>, email <SEND-TO-EMAIL>, fqdn <FQDN>, ip-address <IP> pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. request Sends a CSR to the CA for digital identity certificate. The CSR contains the applicant’s details and the RSA Keypair’s public key [generate-rsa-key| Generates a new RSA Keypair, or uses an existing RSA Keypair use-rsa-key] • generate-rsa-key – Generates a new RSA Keypair for digital authentication <RSA-KEYPAIR-NAME> • use-rsa-key – Uses an existing RSA Keypair for digital authentication • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it. If using an existing RSA Keypair, specify its name. subject-name Specify a subject name to identify the certificate. <COMMON-NAME> • <COMMON-NAME> – Specify the common name used with the CA certificate. The name should enable you to identify the certificate easily. <COUNTRY> Sets the deployment country name (2 character ISO code) <STATE> Sets the state name (2 to 64 characters) <CITY> Sets the city name (2 to 64 characters) <ORGANIZATION> Sets the organization name (2 to 64 characters) <ORGANIZATION-UNIT> Sets the organization unit (2 to 64 characters) <EXPORT-TO-URL> Specify the CSR destination address in the following format: {background {on <DEVICE- tftp://<hostname|IP>[:port]/path/file NAME}|on <DEVICE-NAME>} ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file • background – Optional. Performs the export operation in the background • on <DEVICE-NAME> – Optional. Performs the export operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 123. PRIVILEGED EXEC MODE COMMANDS 3 - 31 email <SEND-TO-EMAIL> Exports CSR to a specified e-mail address • <SEND-TO-EMAIL> – Specify the e-mail address of the CA. fqdn <FQDN> Exports CSR to a specified FQDN • Specify the FQDN of the CA. ip address <IP> Exports the CSR to a specified device or system • Specify the IP address of the CA. • crypto pki trustpoint <TRUSTPOINT-NAME> <EXPORT-TO-URL> {background {on <DEVICE- NAME>}|on <DEVICE-NAME>|passphrase <KEY-PASSPHRASE> background {on <DEVICE-NAME>}| on <DEVICE-NAME>}} pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. trustpoint Exports trustpoint CA certificate, Certificate Revocation List (CRL), server certificate, <TRUSTPOINT-NAME> and private key • <TRUSTPOINT-NAME> – Specify the trustpoint name. <EXPORT-TO-URL> Specify the destination address in the following format: tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background Optional. Performs the export operation in the background {on-DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Performs the export operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Performs the export operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. passphrase Optional. Encrypts key with a passphrase before exporting it <KEY-PASSPHRASE> • <KEY-PASSPHRASE> – Specify the passphrase. {background {on <DEVICE- • background – Optional. Performs the export operation in the background NAME>}| • on <DEVICE-NAME> – Optional. Performs the export operation on a specified on <DEVICE-NAME> device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> autogen-subject-name {email <SEND-TO-EMAIL>| fqdn <FQDN>|ip-address <IP>|on <DEVICE-NAME>} pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. generate Generates a CA certificate and a trustpoint
  • 124. 3 - 32 WiNG CLI Reference Guide self-signed Generates a self-signed CA certificate and a trustpoint <TRUSTPOINT-NAME> • <TRUSTPOINT-NAME> – Specify a name for the certificate and its trustpoint. [generate-rsa-key| Generates a new RSA Keypair, or uses an existing RSA Keypair use-rsa-key] • generate-rsa-key – Generates a new RSA Keypair for digital authentication <RSA-KEYPAIR-NAME> • use-rsa-key – Uses an existing RSA Keypair for digital authentication • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it. If using an existing RSA Keypair, specify its name. autogen-subject-name Auto generates the subject name from configuration parameters. The subject name helps to identify the certificate. email <SEND-TO-EMAIL> Exports CSR to a specified e-mail address • <SEND-TO-EMAIL> – Specify the e-mail address of the CA. fqdn <FQDN> Exports CSR to a specified FQDN • <FQDN> – Specify the FQDN of the CA. ip-address <IP> Exports CSR to a specified device or system • <IP> – Specify the IP address of the CA. on <DEVICE-NAME> Exports the CSR on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto pki generate self-signed <TRUSTPOINT-NAME> [generate-rsa-key| use-rsa-key] <RSA-KEYPAIR-NAME> subject-name <COMMON-NAME> <COUNTRY> <STATE> <CITY> <ORGANIZATION> <ORGANIZATION-UNIT> {email <SEND-TO-EMAIL>| fqdn <FQDN>|ip-address <IP>|on <DEVICE-NAME>} pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. generate Generates a CA certificate and a trustpoint self-signed Generates a self-signed CA certificate and a trustpoint <TRUSTPOINT-NAME> • <TRUSTPOINT-NAME> – Specify a name for the certificate and its trustpoint. [generate-rsa-key|use-rsa- Generates a new RSA Keypair, or uses an existing RSA Keypair key] <RSA-KEYPAIR-NAME> • generate-rsa-key – Generates a new RSA Keypair for digital authentication • use-rsa-key – Uses an existing RSA Keypair for digital authentication • <RSA-KEYPAIR-NAME> – If generating a new RSA Keypair, specify a name for it. If using an existing RSA Keypair, specify its name. subject-name Enter a subject name to identify the certificate. <COMMON-NAME> • <COMMON-NAME> – Specify the common name used with the CA certificate. The name should enable you to identify the certificate easily. <COUNTRY> Sets the deployment country name (2 character ISO code) <STATE> Sets the state name (2 to 64 characters) <CITY> Sets the city name (2 to 64 characters) <ORGANIZATION> Sets the organization name (2 to 64 characters)
  • 125. PRIVILEGED EXEC MODE COMMANDS 3 - 33 <ORGANIZATION-UNIT> Sets the organization unit (2 to 64 characters) email <SEND-TO-EMAIL> Exports CSR to a specified e-mail address • <SEND-TO-EMAIL> – Specify the e-mail address of the CA. fqdn <FQDN> Exports CSR to a specified FQDN • <FQDN> – Specify the FQDN of the CA. ip address <IP> Exports the CSR to a specified device or system • <IP> – Specify the IP address of the CA. • crypto pki import [certificate|crl] <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background {on <DEVICE-NAME>}|on <DEVICE--NAME>} pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. import Imports certificates, CRL, or a trustpoint to a selected device [certificate|crl] Imports a signed server certificate or a certificate revocation list <TRUSTPOINT-NAME> • certificate – Imports a signed server certificate • crl – Imports a CRL • <TRUSTPOINT-NAME> – Specify the trustpoint name (should be authenticated). <IMPORT-FROM-URL> Specify the signed server certificate or CRL source address in the following format: tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background Optional. Performs the import operation in the background {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Enter the name of the AP or wireless controller. • crypto pki import trustpoint <TRUSTPOINT-NAME> <IMPORT-FROM-URL> {background {on <DEVICE-NAME>}|on <DEVICE--NAME>} pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. import Imports certificates, CRL, or a trustpoint to the selected device trustpoint Imports a trustpoint and its associated CA certificate, server certificate, and private <TRUSTPOINT-NAME> key • <TRUSTPOINT-NAME> – Specify the trustpoint name (should be authenticated).
  • 126. 3 - 34 WiNG CLI Reference Guide <IMPORT-FROM-URL> Specify the trustpoint source address in the following format: tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background Optional. Performs the import operation in the background {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Performs the import operation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. passphrase Optional. Encrypts trustpoint with a passphrase before importing it <KEY-PASSPHRASE> • <KEY-PASSPHRASE> – Specify a passphrase. {background {on <DEVICE- • background – Optional. Imports encrypted trustpoint in the background NAME>}| • on <DEVICE-NAME> – Optional. Imports encrypted trustpoint on a specified on <DEVICE-NAME>} device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • crypto pki zeroise trustpoint <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}| on <DEVICE-NAME>} pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates zeroise Deletes a trustpoint and its associated CA certificate, server certificate, and private key <TRUSTPOINT-NAME> • <TRUSTPOINT-NAME> – Specify the trustpoint name. del-key Optional. Deletes the private key associated with the server certificate {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Deletes the private key on a specified device • <DEVICE-NAME> – Enter the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Deletes trustpoint on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 127. PRIVILEGED EXEC MODE COMMANDS 3 - 35 Examples rfs7000-37FABE#crypto key generate rsa key 1025 RSA Keypair successfully generated rfs7000-37FABE# rfs7000-37FABE#crypto key import rsa moto123 url passphrase word background on rfs7000-37FABE RSA key import operation is started in background rfs7000-37FABE# rfs7000-37FABE#crypto pki generate self-signed word generate-rsa-key word autogen- subject-name fqdn word Successfully generated self-signed certificate rfs7000-37FABE# rfs7000-37FABE#crypto pki zeroize trustpoint word del-key on rfs7000-37FABE Successfully removed the trustpoint and associated certificates %Warning: Applications associated with the trustpoint will start using default- trustpoint rfs7000-37FABE# rfs7000-37FABE#crypto pki authenticate word url background on rfs7000-37FABE Import of CA certificate started in background rfs7000-37FABE# rfs7000-37FABE#crypto pki import trustpoint word url passphrase word on rfs7000-37FABE Import operaton started in background rfs7000-37FABE# Related Commands no Resets or disables the crypto commands
  • 128. 3 - 36 WiNG CLI Reference Guide 3.1.13 delete Privileged Exec Mode Commands Deletes a specified file from the device’s file system Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax delete [/force <FILE>|/recursive <FILE>|<FILE>] Parameters • delete [/force <FILE>|/recursive <FILE>|<FILE>] /force Forces deletion without a prompt /recursive Performs a recursive delete <FILE> Specifies the filenames to delete Examples rfs7000-37FABE#delete flash:/out.tar flash:/out.tar.gz Delete flash:/out.tar [y/n]? y Delete flash:/out.tar.gz [y/n]? y rfs7000-37FABE#delete /force flash:/tmp.txt rfs7000-37FABE# rfs7000-37FABE#delete /recursive flash:/backup/ Delete flash:/backup//fileMgmt_350_180B.core [y/n]? y Delete flash:/backup//fileMgmt_350_18212X.core_bk [y/n]? n Delete flash:/backup//imish_1087_18381X.core.gz [y/n]? n rfs7000-37FABE#
  • 129. PRIVILEGED EXEC MODE COMMANDS 3 - 37 3.1.14 disable Privileged Exec Commands Turns off (disables) the privileged mode command set. This command returns to the User Executable mode. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax disable Parameters None Examples rfs7000-37FABE#disable rfs7000-37FABE>
  • 130. 3 - 38 WiNG CLI Reference Guide 3.1.15 diff Privileged Exec Mode Commands Displays the differences between two files on a device’s file system or a particular URL Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax diff [<FILE>|<URL>] [<FILE>|<URL>] Parameters • diff [<FILE>|<URL>] [<FILE>|<URL>] FILE The first <FILE> is the source file for the diff. The second <FILE> is the file to compare it with. URL The first <URL> is the source URL for the file for the diff. The second <URL> is the URL of the file to compare it with. Examples rfs7000-37FABE#diff startup-config running-config --- startup-config +++ running-config @@ -1,3 +1,4 @@ +!### show running-config ! ! Configuration of RFS7000 version 5.2.2.0-048B ! @@ -80,7 +81,6 @@ excluded-address 172.16.10.9 172.16.10.10 bootp ignore ! -gui default ! firewall-policy default ! rfs7000-37FABE#
  • 131. PRIVILEGED EXEC MODE COMMANDS 3 - 39 3.1.16 dir Privileged Exec Mode Commands Lists files on a device’s file system Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax dir {[/all|/recursive|<DIR>|all-filesystems]} Parameters • dir {[/all|/recursive|<DIR>|all-filesystems]} /all Optional. Lists all files /recursive Optional. Lists files recursively <DIR> Optional. Lists files in the named file path all-filesystems Optional. Lists files on all file systems
  • 132. 3 - 40 WiNG CLI Reference Guide Examples rfs7000-37FABE#dir Directory of flash:/. drwx Thu Apr 29 12:36:29 2010 log -rw- 39 Tue Dec 29 11:41:00 2009 FILE drwx Thu Apr 29 11:34:11 2010 crashinfo drwx Sat Jan 1 00:00:25 2000 hotspot drwx Mon Dec 14 14:09:39 2009 TestDir drwx Fri Dec 11 15:38:25 2009 Testdir rfs7000-37FABE# rfs7000-37FABE#dir all-filesystems Directory of flash:/ drwx Thu Apr 29 12:36:29 2010 log -rw- 39 Tue Dec 29 11:41:00 2009 FILE drwx Thu Apr 29 11:34:11 2010 crashinfo drwx Sat Jan 1 00:00:25 2000 hotspot drwx Mon Dec 14 14:09:39 2009 TestDir drwx Fri Dec 11 15:38:25 2009 Testdir Directory of nvram:/ -rw- 3460 Fri Dec 11 14:42:44 2009 startup-config.save -rw- 1638 Tue Jan 5 14:27:17 2010 startup-config-unused -rw- 3393 Mon Dec 14 13:55:51 2009 startup-config.save.1 -rw- 8059 Thu Apr 29 12:36:27 2010 startup-config Directory of system:/ drwx Thu Apr 29 12:35:52 2010 proc rfs7000-37FABE#
  • 133. PRIVILEGED EXEC MODE COMMANDS 3 - 41 3.1.17 edit Privileged Exec Mode Commands Edits a text file on the device’s file system Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax edit <FILE> Parameters • edit <FILE> <FILE> Specify the name of the file to modify. Examples rfs7000-37FABE#edit startup-config GNU nano 1.2.4 File: startup-config ! ! Configuration of RFS7000 version 5.2.2.0-048B ! ! version 2.0 ! ! smart-rf-policy default ! smart-rf-policy test enable calibration wait-time 4 ! wlan-qos-policy default ! ^G Get Help ^O WriteOut ^R Read File ^Y Prev Page ^K Cut Text ^C Cur Pos ^X Exit ^J Justify ^W Where Is ^V Next Page ^U UnCut Txt ^T To Spell
  • 134. 3 - 42 WiNG CLI Reference Guide 3.1.18 enable Privileged Exec Mode Commands Turns on (enables) the privileged mode command set. This command does not do anything in the Privilege Executable mode. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax enable Parameters None Examples rfs7000-37FABE#enable rfs7000-37FABE#
  • 135. PRIVILEGED EXEC MODE COMMANDS 3 - 43 3.1.19 erase Privileged Exec Mode Commands Erases a device’s file system Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax erase [cf:|flash:|nvram:|startup-config|usb1:] Parameters • erase [cf:|flash:|nvram:|startup-config|usb1:] cf: Erases everything in wireless controller cf: flash: Erases everything in wireless controller flash: nvram: Erases everything in wireless controller nvram: startup-config Erases the wireless controller’s startup configuration file. The startup configuration file is used to configure the device when it reboots. usb1: Erases everything in wireless controller usb1: Examples rfs7000-37FABE#erase startup-config Erase startup-config? (y/n): n rfs7000-37FABE#
  • 136. 3 - 44 WiNG CLI Reference Guide 3.1.20 exit Privileged Exec Mode Commands Ends the current CLI session and closes the session window For more information, see exit. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax exit Parameters None Examples rfs7000-37FABE#exit
  • 137. PRIVILEGED EXEC MODE COMMANDS 3 - 45 3.1.21 format Privileged Exec Mode Commands Formats the device’s compact flash file system Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax format cf: Parameters • format cf: cf: Formats the compact flash file system Examples rfs7000-37FABE#format cf: Warning: This will destroy the contents of compact flash. Do you want to continue [y/n]? n rfs7000-37FABE#
  • 138. 3 - 46 WiNG CLI Reference Guide 3.1.22 halt Privileged Exec Mode Commands Stops (halts) a device or a wireless controller. Once halted, the system must be restarted manually. This command stops the device immediately. No indications or notifications are provided while the device shuts down. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax halt {on <DEVICE-NAME>} Parameters • halt {on <DEVICE-NAME>} halt {on <DEVICE-NAME>} Optional. Halts a device or a wireless controller • <DEVICE-NAME> – Enter the name of the AP or wireless controller. Examples rfs7000-37FABE#halt on rfs7000-37FABE rfs7000-37FABE#
  • 139. PRIVILEGED EXEC MODE COMMANDS 3 - 47 3.1.23 join-cluster Privileged Exec Mode Commands Adds a wireless controller to an existing cluster of devices. Use this command to add a new wireless controller to an existing cluster. Before a wireless controller can be added to a cluster, a static address must be assigned to it. Supported in the following platforms: • RFS4000 • RFS6000 • RFS7000 Syntax join-cluster <IP> user <USERNAME> password <WORD> level [1|2] Parameters • join-cluster <IP> user <USERNAME> password <WORD> level [1|2] join-cluster Adds a new wireless controller to an existing cluster <IP> Specify the IP address of the cluster member. user <USERNAME> Specify a user account with super user privileges on the new cluster member password <WORD> Specify password for the account specified in the user parameter level [1|2] Configures the routing level • 1 – Configures level 1 routing • 2 – Configures level 2 routing Usage Guidelines To add a wireless controller to an existing cluster: • A static IP address must be configured on the wireless controller being added. • Username and password of one of the following accounts, superuser, network admin, system admin, or operator account for the new wireless controller must be provided. Once a wireless controller is added to the cluster, a manual “write memory” command must be executed. Without this command, the configuration will not persist across reboots. Examples rfs7000-37FABE#join-cluster 172.16.10.10 user admin password motorola Joining cluster at 172.16.10.10... Done Please execute “write memory” to save cluster configuration. rfs7000-37FABE#
  • 140. 3 - 48 WiNG CLI Reference Guide 3.1.24 logging Privileged Exec Mode Commands Modifies message logging settings Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax logging monitor {<0-7>|alerts|critical|debugging|emergencies|errors| informational|warnings|notifications} Parameters • logging monitor {<0-7>|alerts|critical|debugging|emergencies|errors| informational|warnings|notifications} monitor Sets terminal lines logging levels. The logging severity levels can be set from 0 - 7. The system configures default settings, if no logging severity level is specified. • <0-7> – Optional. Enter the logging severity level from 0 - 7. The various levels and their implications are: • alerts – Optional. Immediate action needed (severity=1) • critical – Optional. Critical conditions (severity=2) • debugging – Optional. Debugging messages (severity=7) • emergencies – Optional. System is unusable (severity=0) • errors – Optional. Error conditions (severity=3) • informational – Optional.Informational messages (severity=6) • notifications – Optional. Normal but significant conditions (severity=5) • warnings – Optional. Warning conditions (severity=4) Examples rfs7000-37FABE#logging monitor warnings rfs7000-37FABE# rfs7000-37FABE#logging monitor 2 rfs7000-37FABE# Related Commands no Resets terminal lines logging levels
  • 141. PRIVILEGED EXEC MODE COMMANDS 3 - 49 3.1.25 mkdir Privileged Exec Mode Commands Creates a new directory in the file system Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax mkdir <DIR> Parameters • mkdir <DIR> <DIR> Specify a directory name. Examples rfs7000-37FABE#dir Directory of flash:/. drwx Fri Jul 8 08:44:33 2011 log drwx Wed Jul 28 19:01:08 2010 cache drwx Fri Jul 8 08:45:36 2011 crashinfo drwx Sat Jan 1 00:00:25 2000 hotspot drwx Sat Jan 1 00:00:09 2000 floorplans rfs7000-37FABE#mkdir testdir rfs7000-37FABE#dir Directory of flash:/. drwx Fri Jul 8 08:44:33 2011 log drwx Wed Jul 28 19:01:08 2010 cache drwx Fri Jul 8 08:45:36 2011 crashinfo drwx Fri Jul 8 08:45:36 2011 testdir drwx Sat Jan 1 00:00:25 2000 hotspot drwx Sat Jan 1 00:00:09 2000 floorplans
  • 142. 3 - 50 WiNG CLI Reference Guide 3.1.26 mint Privileged Exec Mode Commands Uses MiNT protocol to perform a ping and a traceroute to a remote device Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax mint [ping|traceroute] mint ping MINT-ID {count <1-60>|size <1-64000>|timeout <1-10>} mint traceroute MINT-ID {destination-port <1-65535>|max-hops <1-255>| source-port <1-65535>|timeout <1-255>} Parameters • mint ping MINT-ID {count <1-60>|size <1-64000>|timeout <1-10>} ping MINT-ID Sends a MiNT echo message to a MiNT destination • <MINT-ID> – Specify the MiNT destination ID to ping. count <1-60> Optional. Sets the number of times to ping the MiNT destination • <1-60> – Specify a value from 1 - 60. The default is 3. size <1-64000> Optional. Sets the MiNT payload size in bytes • <1-64000> – Specify a value from 1 - 640000 bytes. The default is 64 bytes. timeout <1-10> Optional. Sets a response time in seconds • <1-10> – Specify a value from 1 - 10 seconds. The default is 1 second. • mint traceroute MINT-ID {destination-port <1-65535>|max-hops <1-255>| source-port <1-65535>|timeout <1-255>} traceroute MINT-ID Prints the route packets trace to a device • <MINT-ID> – Specify the MiNT destination ID. destination-port <1-65535> Optional. Sets the Equal-cost Multi-path (ECMP) routing destination port • <1-65535> – Specify a value from 1 - 65535. The default port is 45. max-hops <1-255> Optional. Sets the maximum number of hops a traceroute packet traverses in the forward direction • <1-255> – Specify a value from 1 - 255. The default is 30.
  • 143. PRIVILEGED EXEC MODE COMMANDS 3 - 51 source-port <1-65535> Optional.Sets the ECMP source port • <1-65535> – Specify a value from 1 - 65535. The default port is 45. timeout <1-255> Optional. Sets the minimum response time period • <1-65535> – Specify a value from 1 - 255 seconds. The default is 30 seconds. Examples rfs7000-37FABE#mint ping 70.37.FA.BF count 20 size 128 MiNT ping 70.37.FA.BF with 128 bytes of data. Response from 70.37.FA.BF: id=1 time=0.292 ms Response from 70.37.FA.BF: id=2 time=0.206 ms Response from 70.37.FA.BF: id=3 time=0.184 ms Response from 70.37.FA.BF: id=4 time=0.160 ms Response from 70.37.FA.BF: id=5 time=0.138 ms Response from 70.37.FA.BF: id=6 time=0.161 ms Response from 70.37.FA.BF: id=7 time=0.174 ms Response from 70.37.FA.BF: id=8 time=0.207 ms Response from 70.37.FA.BF: id=9 time=0.157 ms Response from 70.37.FA.BF: id=10 time=0.153 ms Response from 70.37.FA.BF: id=11 time=0.159 ms Response from 70.37.FA.BF: id=12 time=0.173 ms Response from 70.37.FA.BF: id=13 time=0.156 ms Response from 70.37.FA.BF: id=14 time=0.209 ms Response from 70.37.FA.BF: id=15 time=0.147 ms Response from 70.37.FA.BF: id=16 time=0.203 ms Response from 70.37.FA.BF: id=17 time=0.148 ms Response from 70.37.FA.BF: id=18 time=0.169 ms Response from 70.37.FA.BF: id=19 time=0.164 ms Response from 70.37.FA.BF: id=20 time=0.177 ms --- 70.37.FA.BF ping statistics --- 20 packets transmitted, 20 packets received, 0% packet loss round-trip min/avg/max = 0.138/0.177/0.292 ms
  • 144. 3 - 52 WiNG CLI Reference Guide 3.1.27 more Privileged Exec Mode Commands Displays contents of a file on the device’s file system. This command navigates and displays specific files in the device’s file system. To do so, provide the complete path to the file. The more command also displays the startup configuration file. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax more <FILE> Parameters • more <FILE> <FILE> Specify the file name. Examples rfs7000-37FABE#more flash:/log/messages.log May 03 11:45:05 2010: %PM-6-PROCSTART: Starting process "/usr/sbin/dpd2" May 03 11:45:14 2010: %KERN-6-INFO: 0| ioctl.c:335 dev_dataplane_fw_ioctl DHCP trust of port 0 (ge1) set to 1 by 1021 cfgd. May 03 11:45:14 2010: %KERN-6-INFO: 0| ioctl.c:335 dev_dataplane_fw_ioctl DHCP trust of port 1 (ge2) set to 1 by 1021 cfgd. May 03 11:45:14 2010: %KERN-6-INFO: 0| ioctl.c:335 dev_dataplane_fw_ioctl DHCP trust of port 2 (ge3) set to 1 by 1021 cfgd. May 03 11:45:14 2010: %KERN-6-INFO: 0| ioctl.c:335 dev_dataplane_fw_ioctl DHCP trust of port 3 (ge4) set to 1 by 1021 cfgd. May 03 11:45:14 2010: %NSM-4-IFDOWN: Interface vlan1 is down May 03 11:45:14 2010: %NSM-4-IFUP: Interface vlan4 is up May 03 11:45:15 2010: %NSM-4-IFUP: Interface vlan44 is up May 03 11:45:15 2010: %NSM-4-IFDOWN: Interface vlan44 is down May 03 11:45:15 2010: %PM-6-PROCSTART: Starting process "/usr/sbin/lighttpd" May 03 11:45:15 2010: %FILEMGMT-5-HTTPSTART: lighttpd started in external mode with pid 0 May 03 11:45:15 2010: %USER-5-NOTICE: FILEMGMT[1064]: FTP: ftp server stopped May 03 11:45:15 2010: %PM-6-PROCSTART: Starting process "/usr/sbin/telnetd" May 03 11:45:17 2010: %AUTH-6-INFO: sshd[1371]: Server listening on 0.0.0.0 port 22. May 03 11:45:17 2010: %AUTOINSTD-5-AUTOCLCONFDISAB: Autoinstall of cluster configuration is disabled May 03 11:45:17 2010: %AUTOINSTD-5-AUTOCONFDISAB: Autoinstall of startup configuration is disabled May 03 11:45:17 2010: %AUTOINSTD-5-AUTOIMAGEDISAB: Autoinstall of image upgrade is disabled May 03 11:45:18 2010: %KERN-6-INFO: dataplane enabled. rfs7000-37FABE#
  • 145. PRIVILEGED EXEC MODE COMMANDS 3 - 53 3.1.28 no Privileged Exec Mode Commands Use the no command to revert a command or set parameters to their default. This command is useful to turn off an enabled feature or set defaults for a parameter. The no commands have their own set of parameters that can be reset. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax no [adoption|captive-portal|crypto|debug|logging|page|service| terminal|upgrade|wireless] no adoption {on <DEVICE-OR-DOMAIN-NAME>} no captive-portal client [captive-portal <CAPTIVE-PORTAL-NAME>|<MAC>] {on <DEVICE-OR-DOMAIN-NAME>} no crypto pki [server|trustpoint] no crypto pki [server|trustpoint] <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}| on <DEVICE-NAME>} no logging monitor no page no service [ap300|cli-tables-expand|locator|mint] no service ap300 locator <MAC> no service [cli-tables-expand <LINE>|locator {on <DEVICE-NAME>}] no service mint silence no terminal [length|width] no upgrade <PATCH-NAME> {on <DEVICE-NAME>} no wireless client [all {filter|on}|<MAC>] no wireless client all {filter} wlan <WLAN-NAME> no wireless client all on <DEVICE-OR-DOMAIN-NAME> {filter} wlan <WLAN-NAME> no wireless client <MAC> {on <DEVICE-OR-DOMAIN-NAME>} Parameters • no adoption {on <DEVICE-OR-DOMAIN-NAME>} no adoption Resets the adoption status of a specified device or all devices {on <DEVICE-OR-DOMAIN- • <DEVICE-OR-DOMAIN-NAME> – Optional. Enter the name of the AP, wireless NAME>} controller, or RF Domain.
  • 146. 3 - 54 WiNG CLI Reference Guide • no captive-portal client [captive-portal <CAPTIVE-PORTAL-NAME>|<MAC>] {on <DEVICE- OR-DOMAIN-NAME>} no captive-portal client Disconnects captive portal clients from the network captive-portal Disconnects captive portal clients <CAPTIVE-PORTAL-NAME> • <CAPTIVE-PORTAL-NAME> – Specify the captive portal name. <MAC> Disconnects a specified client • <MAC> – Specify the MAC address of the client. on <DEVICE-OR-DOMAIN- Optional. Disconnects captive portal clients or a specified client on a specified device NAME> or RF Domain • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • no crypto pki [server|trustpoint] <TRUSTPOINT-NAME> {del-key {on <DEVICE-NAME>}| on <DEVICE-NAME>} no crypto pki Deletes all PKI authentications [server|trustpoint] Deletes PKI authentications, such as server certificates and trustpoints <TRUSTPOINT-NAME> • server – Deletes server certificates • trustpoint – Deletes a trustpoint and its associated certificates The following is common to the server and trustpoint parameters: • <TURSTPOINT-NAME> – Deletes a trustpoint or its server certificate. Specify the trustpoint name. del-key {on <DEVICE-NAME>} Optional. Deletes the private key associated with a server certificate or trustpoint. The operation will fail if the private key is in use by other trustpoints. • on <DEVICE-NAME> – Deletes the private key on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • no logging monitor no logging monitor Resets terminal lines message logging levels • no page no page Resets wireless controller paging function to its default. Disabling the “page” command displays the CLI command output at once, instead of page by page. • no service ap300 locator <MAC> no service Disables LEDs on AP300s or a specified device in the WLAN. It also resets the CLI table expand and MiNT protocol configurations. ap300 locator <MAC> Disables LEDs on AP300s • <MAC> – Specify the MAC address of the AP300.
  • 147. PRIVILEGED EXEC MODE COMMANDS 3 - 55 • no service [cli-tables-expand <LINE>|locator {on <DEVICE-NAME>}] no service Disables LEDs on AP300s or a specified device in the WLAN. It also resets the CLI table expand and MiNT protocol configurations. cli-tables-expand <LINE> Resets the expand configuration of the CLI table, so that the table does not expand in the drop-down format locator Disables LEDs on a specified device {on <DEVICE-NAME>} • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller. • no service mint silence no service mint silence Disables LEDs on AP300s or a specified device in the WLAN. It also resets the CLI table expand and MiNT protocol configurations. • mint – Resets MiNT protocol configurations. Disables ping and traceroute parameters • silence – Disables MiNT echo messaging and tracing of route packets • no upgrade <PATCH-NAME> {on <DEVICE-NAME>} no upgrade <PATCH-NAME> Removes a patch installed on a specified device • <PATCH-NAME> – Specify the name of the patch. on <DEVICE-NAME> Optional. Removes a patch on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • no terminal [length|width] no terminal [length|width] Resets the width of the terminal window, or the number of lines displayed within the terminal window • length – Resets the number of lines displayed on the terminal window to its default • width – Resets the width of the terminal window to its default. • no wireless client all {filter} wlan <WLAN-NAME> no wireless client all Disassociates all wireless clients on a specified device or domain filter wlan <WLAN-NAME> Optional. Specifies an additional client selection filter • wlan – Filters clients based on the WLAN • <WLAN-NAME> – Specify the WLAN name. • no wireless client all on <DEVICE-OR-DOMAIN-NAME> {filter} wlan <WLAN-NAME> no wireless client all on Disassociates all clients on a specified device or domain <DEVICE-OR-DOMAIN-NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. filter wlan <WLAN-NAME> Optional. Specifies an additional client selection filter • wlan – Filters clients based on the WLAN • <WLAN-NAME> – Specify the WLAN name.
  • 148. 3 - 56 WiNG CLI Reference Guide Usage Guidelines The no command negates any command associated with it. Wherever required, use the same parameters associated with the command getting negated. Examples rfs7000-37FABE#no adoption rfs7000-37FABE# rfs7000-37FABE#no page rfs7000-37FABE# rfs7000-37FABE#no service cli-tables-expand line rfs7000-37FABE# Related Commands adoption Resets the adoption state of a device and all devices adopted to it captive-portal Manages captive portal clients debug Disables debug commands logging Modifies message logging settings page Resets wireless controller paging function to its default service Performs different functions depending on the parameter passed terminal Sets the length or the number of lines displayed within the terminal window upgrade Upgrades software image on a device wireless-client Manages wireless clients
  • 149. PRIVILEGED EXEC MODE COMMANDS 3 - 57 3.1.29 page Privileged Exec Mode Commands Toggles wireless controller paging. Enabling this command displays the CLI command output page by page, instead of running the entire output at once. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax page Parameters None Examples rfs7000-37FABE#page rfs7000-37FABE# Related Commands no Disables wireless controller paging
  • 150. 3 - 58 WiNG CLI Reference Guide 3.1.30 ping Privileged Exec Mode Commands Sends Internet Controller Message Protocol (ICMP) echo messages to a user-specified location Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ping [<IP>/HOSTNAME>] Parameters • ping [<IP>/HOSTNAME>] <IP> Optional. Specify the destination IP address to ping. When entered without any parameters, this command prompts for an IP. <HOSTNAME> Optional. Specify the destination hostname to ping. When entered without any parameters, this command prompts for a hostname. Examples rfs7000-37FABE#ping 172.16.10.3 PING 172.16.10.3 (172.16.10.3): 100 data bytes 108 bytes from 172.16.10.3: seq=0 ttl=64 time=7.100 ms 108 bytes from 172.16.10.3: seq=1 ttl=64 time=0.390 ms 108 bytes from 172.16.10.3: seq=2 ttl=64 time=0.422 ms 108 bytes from 172.16.10.3: seq=3 ttl=64 time=0.400 ms --- 172.16.10.3 ping statistics --- 4 packets transmitted, 4 packets received, 0% packet loss round-trip min/avg/max = 0.390/2.078/7.100 ms rfs7000-37FABE#
  • 151. PRIVILEGED EXEC MODE COMMANDS 3 - 59 3.1.31 pwd Privileged Exec Mode Commands Displays the full path of the present working directory, similar to the UNIX pwd command Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax pwd Parameters None Examples rfs7000-37FABE#pwd flash:/ rfs7000-37FABE#dir Directory of flash:/. drwx Fri Jul 8 08:44:33 2011 log drwx Wed Jul 28 19:01:08 2010 cache drwx Fri Jul 8 08:45:36 2011 crashinfo drwx Sat Jan 1 00:00:25 2000 hotspot drwx Sat Jan 1 00:00:09 2000 floorplans rfs7000-37FABE#cd log rfs7000-37FABE#pwd flash:/log rfs7000-37FABE#
  • 152. 3 - 60 WiNG CLI Reference Guide 3.1.32 reload Privileged Exec Mode Commands Halts the wireless controller and performs a warm reboot of the device Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax reload {cancel|force|in|on} reload {on <DEVICE-OR-DOMAIN-NAME>} reload {cancel|force} {on <DEVICE-OR-DOMAIN-NAME>} reload {in} <1-999> {on <DEVICE-OR-DOMAIN-NAME>} Parameters • reload {on <DEVICE-OR-DOMAIN-NAME>} on <DEVICE-OR-DOMIN- Optional. Performs reload on an AP, wireless controller, or RF Domain. Halts a system and NAME> performs a warm reboot • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • reload {cancel|force} {on <DEVICE-OR-DOMAIN-NAME>} cancel Optional. Cancels pending reloads force Optional. Forces reboot, while ignoring conditions like upgrade in progress, unsaved changes etc. on <DEVICE-OR-DOMAIN- Optional. Cancels or forces a reload on an a specified device NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or the RF Domain.
  • 153. PRIVILEGED EXEC MODE COMMANDS 3 - 61 • reload {in} <1-999> {on <DEVICE-OR-DOMAIN-NAME>} in <1-9999> Schedules a reload after a specified time period • <1-9999> – Specify the time from 1 - 999 minutes. on <DEVICE-OR-DOMAIN- Optional. Reloads on a specified device NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. Examples rfs7000-37FABE#reload force on rfs7000-37FABE rfs7000-37FABE#
  • 154. 3 - 62 WiNG CLI Reference Guide 3.1.33 rename Privileged Exec Mode Commands Renames a file in the devices’ file system Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax rename <OLD-FILE-NAME> <NEW-FILE-NAME> Parameters • rename <OLD-FILE-NAME> <NEW-FILE-NAME> <OLD-FILE-NAME> Specify the file to rename <NEW-FILE-NAME> Specify the new file name Examples rfs7000-37FABE#dir Directory of flash:/. drwx Fri Jul 8 08:44:33 2011 log drwx Fri Jul 8 10:16:43 2011 test drwx Wed Jul 28 19:01:08 2010 cache drwx Fri Jul 8 08:45:36 2011 crashinfo drwx Sat Jan 1 00:00:25 2000 hotspot drwx Sat Jan 1 00:00:09 2000 floorplans rfs7000-37FABE#rename flash:/test/ testdir rfs7000-37FABE#dir Directory of flash:/. drwx Fri Jul 8 08:44:33 2011 log drwx Wed Jul 28 19:01:08 2010 cache drwx Fri Jul 8 08:45:36 2011 crashinfo drwx Fri Jul 8 10:16:43 2011 testdir drwx Sat Jan 1 00:00:25 2000 hotspot drwx Sat Jan 1 00:00:09 2000 floorplans
  • 155. PRIVILEGED EXEC MODE COMMANDS 3 - 63 3.1.34 rmdir Privileged Exec Mode Commands Deletes an existing directory from the file system (only empty directories can be removed) Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax rmdir <DIR> Parameters • rmdir <DIR> rmdir <DIR> Specifies the directory name Examples rfs7000-37FABE#dir Directory of flash:/. drwx Fri Jul 8 08:44:33 2011 log drwx Wed Jul 28 19:01:08 2010 cache drwx Fri Jul 8 08:45:36 2011 crashinfo drwx Fri Jul 8 10:16:43 2011 testdir drwx Sat Jan 1 00:00:25 2000 hotspot drwx Sat Jan 1 00:00:09 2000 floorplans rfs7000-37FABE# rfs7000-37FABE#rmdir testdir rfs7000-37FABE#dir Directory of flash:/. drwx Fri Jul 8 08:44:33 2011 log drwx Wed Jul 28 19:01:08 2010 cache drwx Fri Jul 8 08:45:36 2011 crashinfo drwx Sat Jan 1 00:00:25 2000 hotspot drwx Sat Jan 1 00:00:09 2000 floorplans
  • 156. 3 - 64 WiNG CLI Reference Guide 3.1.35 self Privileged Exec Mode Commands Displays the logged device’s configuration context Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax self Parameters None Examples rfs7000-37FABE#self Enter configuration commands, one per line. End with CNTL/Z. rfs7000-37FABE(config-device-00-15-70-37-FA-BE)#
  • 157. PRIVILEGED EXEC MODE COMMANDS 3 - 65 3.1.36 ssh Privileged Exec Mode Commands Opens a Secure Shell (SSH) connection between two network devices Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ssh [<IP/HOSTNAME>] [<USERNAME>] Parameters • ssh [<IP/HOSTNAME>] [<USERNAME>] [<IP>/<HOSTNAME>] Specify the IP address or hostname of the remote system. <USERNAME> Specify the name of the user requesting the SSH connection. Usage Guidelines To exit of the other device’s context, use the command that is relevant to that device. Examples rfs7000-37FABE#ssh 172.16.10.9 admin ssh: connect to host 172.16.10.9 port 22 Entering character mode Escape character is '^]'. RFS7000 release 5.2.3.0-048B Login as 'cli' to access CLI. RFS7000 login: cli User Access Verification Username: admin Password: Welcome to CLI RFS7000>
  • 158. 3 - 66 WiNG CLI Reference Guide 3.1.37 telnet Privileged Exec Mode Commands Opens a Telnet session between two network devices Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax telnet <IP> {<TCP-PORT>} Parameters • telnet <IP> {<TCP-PORT>} <IP> Configures the remote system’s IP address. The Telnet session will be established between the connecting system and the remote system. • <IP> – Specify the remote system IP address. <TCP-PORT> Optional. Specify the Transmission Control Protocol (TCP) port. Usage Guidelines To exit of the other device’s context, use the command relevant to that device. Examples rfs7000-37FABE#telnet 172.16.10.2 Entering character mode Escape character is '^]'. RFS7000 release 5.2.3.0-048B Login as 'cli' to access CLI. RFS7000 login: cli User Access Verification Username: admin Password: Welcome to CLI RFS7000>
  • 159. PRIVILEGED EXEC MODE COMMANDS 3 - 67 3.1.38 terminal Privileged Exec Mode Commands Sets the number of characters per line, and the number of lines displayed within the terminal window Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax terminal [length|width] <0-512> Parameters • terminal [length|width] <0-512> length <0-512> Sets the number of lines displayed on a terminal window • <0-512> – Specify a value from 0 - 512. width <0-512> Sets the width or number of characters displayed on the terminal window • <0-512> – Specify a value from 0 - 512. Examples rfs7000-37FABE#terminal length 150 rfs7000-37FABE# rfs7000-37FABE#terminal width 215 rfs7000-37FABE# Related Commands no Resets the width of the terminal window or the number of lines displayed on a terminal window
  • 160. 3 - 68 WiNG CLI Reference Guide 3.1.39 time-it Privileged Exec Mode Commands Verifies the time taken by a particular command between request and response Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax time-it <COMMAND> Parameters • time-it <COMMAND> time-it <COMMAND> Verifies the time taken by a particular command to execute and provide a result • <COMMAND> – Specify the command to time execution. Examples rfs7000-37FABE#time-it enable That took 0.00 seconds.. rfs7000-37FABE#
  • 161. PRIVILEGED EXEC MODE COMMANDS 3 - 69 3.1.40 traceroute Privileged Exec Mode Commands Traces the route to a defined destination Use ‘--help’ or ‘-h’ to display a complete list of parameters for the traceroute command Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax traceroute <LINE> Parameters • traceroute <LINE> <LINE> Traces route to a destination IP address or hostname • <LINE> – Specify a traceroute argument. For example, “service traceroute-h”. Examples rfs7000-37FABE#traceroute 172.16.10.2 traceroute to 172.16.10.2 (172.16.10.2), 30 hops max, 38 byte packets 1 172.16.10.1 (172.16.10.1) 3002.008 ms !H 3002.219 ms !H 3003.945 ms !H rfs7000-37FABE#
  • 162. 3 - 70 WiNG CLI Reference Guide 3.1.41 upgrade Privileged Exec Mode Commands Upgrades software image on a device Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax upgrade [<FILE>|<URL>] Parameters • upgrade [<FILE>|<URL>] <URL> Specify the target firmware image location in the following format: tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>:<passwd>@<hostname|IP>[:port]>/path/file http://<hostname|IP>[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background Performs upgrade in the background on <DEVICE-NAME> Optional. Upgrades the software image on a remote AP or wireless controller • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE#upgrade tftp://157.235.208.105:/img var2 is 10 percent full /tmp is 2 percent full Free Memory 161896 kB FWU invoked via Linux shell Running from partition /dev/hda5, partition to rfs7000-37FABE#upgrade tftp://157.125.208.235/img Running from partition /dev/mtdblock7, partition to update is /dev/mtdblock6 Related Commands no Removes a patch installed on a specified device
  • 163. PRIVILEGED EXEC MODE COMMANDS 3 - 71 3.1.42 upgrade-abort Privileged Exec Mode Commands Aborts an ongoing software image upgrade Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax upgrade-abort {on <DEVICE-OR-DOMAIN-NAME>} Parameters • upgrade-abort {on <DEVICE-OR-DOMAIN-NAME>} upgrade-abort Aborts an ongoing software image upgrade on <DEVICE-OR-DOMAIN- Optional. Aborts an ongoing software image upgrade on a specified device NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. Examples rfs7000-37FABE#upgrade-abort on rfs7000-37FABE Error: No upgrade in progress rfs7000-37FABE#
  • 164. 3 - 72 WiNG CLI Reference Guide 3.1.43 watch Privileged Exec Mode Commands Repeats a specified CLI command at periodic intervals Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax watch <1-3600> <LINE> Parameters • watch <1-3600> <LINE> watch <1-3600> Repeats a CLI command at a specified interval <1-3600> Select an interval from 1- 3600 seconds. Pressing CTRL-Z halts execution of the command <LINE> Specify the CLI command name. Examples rfs7000-37FABE#watch 1 show clock rfs7000-37FABE#
  • 165. CHAPTER 4 GLOBAL CONFIGURATION COMMANDS This chapter summarizes the global-configuration commands in the CLI command structure. The term global indicates characteristics or features effecting the system as a whole. Use the Global Configuration Mode to configure the system globally, or enter specific configuration modes to configure specific elements (such as interfaces or protocols). Use the configure terminal command (under PRIV EXEC) to enter the global configuration mode. The example below describes the process of entering the global configuration mode from the privileged EXEC mode: rfs7000-37FABE# configure terminal rfs7000-37FABE(config)# NOTE: The system prompt changes to indicate you are now in the global configuration mode. The prompt consists of the device host name followed by (config) and a pound sign (#). Commands entered in the global configuration mode update the running configuration file as soon as they are entered. However, these changes are not saved in the startup configuration file until a commit write memory command is issued. rfs7000-37FABE(config)#? Global Configuration commands: aaa-policy Configure a authentication/accounting/authorization policy advanced-wips-policy Configure a advanced-wips policy AP300 Configure an AP300 AP621 AP621 access point AP650 AP650 access point AP6511 AP6511 access point AP6521 AP6521 access point AP6532 AP6532 access point AP71XX AP71XX access point association-acl-policy Configure an association acl policy auto-provisioning-policy Configure an auto-provisioning policy captive-portal Configure a captive portal clear Clear critical-resource-policy Create a critical resource monitoring policy customize Customize the output of summary cli commands device Configuration on multiple devices device-categorization Configure a device categorization object dhcp-server-policy DHCP server policy dns-whitelist Configure a whitelist event-system-policy Configure a event system policy firewall-policy Configure firewall policy
  • 166. 4-2 WiNG CLI Reference Guide help Description of the interactive help system host Enter the configuration context of a device by specifying its hostname igmp-snoop-policy Create igmp snoop policy ip Internet Protocol (IP) mac MAC configuration management-policy Configure a management policy mint-policy Configure the global mint policy nac-list Configure a network access control list no Negate a command or set its defaults password-encryption Encrypt passwords in configuration profile Profile related commands - if no parameters are given, all profiles are selected radio-qos-policy Configure a radio quality-of-service policy radius-group Configure radius user group parameters radius-server-policy Create device onboard radius policy radius-user-pool-policy Configure Radius User Pool rf-domain Create a RF Domain or enter rf-domain context for one or more rf-domains RFS4000 RFS4000 wireless controller RFS6000 RFS6000 wireless controller RFS7000 RFS7000 wireless controller role-policy Role based firewall policy self Config context of the device currently logged into smart-rf-policy Configure a Smart-RF policy wips-policy Configure a wips policy wlan Create a new WLAN or enter WLAN configuration context for one or more WLANs wlan-qos-policy Configure a wlan quality-of-service policy write Write running configuration to memory or terminal clrscr Clears the display screen commit Commit all changes made in this session do Run commands from Exec mode end End current mode and change to EXEC mode exit End current mode and down to previous mode revert Revert changes service Service Commands show Show running system information rfs7000-37FABE(config)#
  • 167. GLOBAL CONFIGURATION COMMANDS 4-3 4.1 Global Configuration Commands Table 4.1 summarizes Global configuration commands Table 4.1 Global Config Commands Command Description Reference aaa-policy Configures a AAA policy page 4-6 advanced-wips- Configures an advanced WIPS policy page 4-7 policy ap300 Adds a AP300 to the wireless controller managed network, and creates a page 4-8 general profile for the access point ap621 Adds a AP621 to the wireless controller managed network page 4-9 ap650 Adds a AP650 to the wireless controller managed network page 4-10 ap6511 Adds a AP6511 to the wireless controller managed network page 4-11 ap6521 Adds a AP6511 to the wireless controller managed network page 4-12 ap6532 Adds a AP6532 to the wireless controller managed network page 4-13 ap71xx Adds a AP7131 or AP7161 to the wireless controller managed network page 4-14 association-acl- Configures an association ACL policy page 4-15 policy auto-provisioning- Configures an auto provisioning policy page 4-16 policy captive portal Configures a captive portal page 4-18 clear Clears the event history page 4-37 critical-resource- Configures a critical resource policy page 4-38 policy customize Customizes the CLI command summary output page 4-44 device Specifies configuration on multiple devices page 4-51 device- Configures a device categorization object page 4-53 categorization dhcp-server-policy Configures a DHCP server policy page 4-60 dns-whitelist Configures a DNS whitelist page 4-62 do Runs commands from the EXEC mode page 4-66 event-system-policy Configures an event system policy page 4-78 firewall-policy Configures a firewall policy page 4-101 host Sets the system's network name page 4-102 igmp-snoop-policy Configures an IGMP snoop policy page 4-103
  • 168. 4-4 WiNG CLI Reference Guide Table 4.1 Global Config Commands Command Description Reference ip Configures Internet Protocol (IP) components page 4-105 mac Configures MAC access lists (goes to the MAC Access Control List (ACL) page 4-107 mode) management-policy Configures a management policy page 4-109 mint-policy Configures a MiNT security policy page 4-110 nac-list Configures a network ACL page 4-112 no Negates a command or sets its default page 4-117 password- Enables password encryption page 4-119 encryption profile Configures profile related commands page 4-120 radio-qos-policy Configures a radio qos policy page 4-124 radius-group Configures a RADIUS group page 4-125 radius-server-policy Configures a RADIUS server policy page 4-126 radius-user-pool- Configures a RADIUS user pool policy page 4-127 policy rf-domain Creates a RF Domain page 4-129 rfs4000 Adds a RFS4000 wireless controller to a network page 4-153 rfs6000 Adds a RFS6000 wireless controller to a network page 4-154 rfs7000 Adds a RFS7000 wireless controller to a network page 4-155 role-policy Configures a role policy page 4-156 self Displays a logged device’s configuration context page 4-157 smart-rf-policy Configures a Smart RF policy page 4-158 wips-policy Configures a WIPS policy page 4-159 wlan Configures a wireless WLAN page 4-161 wlan-qos-policy Configures a WLAN QoS policy page 4-213 clrscr Clears the display screen page 5-3 commit Commits (saves) changes made in the current session page 5-4 end Ends and exits the current mode and moves to the PRIV EXEC mode page 5-5 exit Ends the current mode and moves to the previous mode page 5-6 help Displays the interactive help system page 5-7 revert Reverts changes to their last saved configuration page 5-13
  • 169. GLOBAL CONFIGURATION COMMANDS 4-5 Table 4.1 Global Config Commands Command Description Reference service Invokes service commands to troubleshoot or debug (config-if) page 5-14 instance configurations show Displays running system information page 6-4 write Writes information to memory or terminal page 5-42
  • 170. 4-6 WiNG CLI Reference Guide 4.1.1 aaa-policy Global Configuration Commands Configures an Authentication, Accounting, and Authorization (AAA) policy. This policy configures multiple servers for authentication and authorization. Up to six servers can be configured for providing AAA services. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax aaa-policy <AAA-POLICY-NAME> Parameters • aaa-policy <AAA-POLICY-NAME> <AAA-POLICY-NAME> Specify the AAA policy name. If the policy does not exist, it is created. Examples rfs7000-37FABE(config)#aaa-policy test rfs7000-37FABE(config-aaa-policy-test)# Related Commands no Resets values or disables commands NOTE: For more information on the AAA policy commands, see Chapter 8, AAA-POLICY.
  • 171. GLOBAL CONFIGURATION COMMANDS 4-7 4.1.2 advanced-wips-policy Global Configuration Commands Configures advanced WIPS policy parameters. The Wireless Intrusion Prevention System (WIPS) prevents unauthorized access to a managed network. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax advanced-wips-policy <ADVANCED-WIPS-POLICY-NAME> Parameters • advanced-wips-policy <ADVANCED-WIPS-POLICY-NAME> <ADVANCED-WIPS-POLICY- Specify the advanced WIPS policy name. If the policy does not exist, it is created. NAME> Examples rfs7000-37FABE(config)#advanced-wips-policy test rfs7000-37FABE(config-advanced-wips-policy-test)# Related Commands no Resets values or disables commands NOTE: For more information on WIPS, see Chapter 10, ADVANCED-WIPS-POLICY.
  • 172. 4-8 WiNG CLI Reference Guide 4.1.3 ap300 Global Configuration Commands Adds a AP300 access point to the wireless controller managed network. If a profile for the AP is not available, a new profile is created. Supported in the following platforms: • RFS4000 • RFS6000 • RFS7000 Syntax ap300 {<MAC>|enter} Parameters • ap300 {<MAC>|enter} <MAC> Optional. Specify the MAC address of the AP300. When the ap300 command is issued without any parameters, the default AP300 profile is configured. enter Optional. Creates a AP300 general profile Examples rfs7000-37FABE(config)#AP300 11-22-33-44-55-66 ? rfs7000-37FABE(config-AP300-11-22-33-44-55-66)# rfs7000-37FABE(config)#show wireless ap configured +-----+-----------------+---------------------+------------------+-------- | IDX | NAME | MAC | PROFILE | RF-DOMAIN | +-----+-----------------+---------------------+------------------+-------- | 1 | AP7131-889EC4 | 00-15-70-88-9E-C4 | default-AP7131 | default | | 2 | AP300-445566 | 11-22-33-44-55-66 | default-AP300 | default | +-----+-----------------+---------------------+------------------+-------- rfs7000-37FABE(config)# Related Commands no Resets values or disables commands
  • 173. GLOBAL CONFIGURATION COMMANDS 4-9 4.1.4 ap621 Global Configuration Commands Adds a AP621 access point to the wireless controller managed network. If a profile for the AP is not available, a new profile is created. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ap621 <MAC> Parameters • ap621 <MAC> <MAC> Specify the MAC address of the AP621. Examples rfs7000-37FABE(config)#ap621 11-22-33-44-55-66 ? rfs7000-37FABE(config-device-11-22-33-44-55-66)# rfs7000-37FABE(config)#show wireless ap configured +-----+-----------------+---------------------+------------------+-------- | IDX | NAME | MAC | PROFILE | RF-DOMAIN | +-----+-----------------+---------------------+------------------+-------- | 1 | AP7131-889EC4 | 00-15-70-88-9E-C4 | default-AP7131 | default | | 2 | AP621-23456 | 11-22-33-44-55-66 | default-AP621 | default | +-----+-----------------+---------------------+------------------+-------- rfs7000-37FABE(config)# Related Commands no Resets values or disables commands
  • 174. 4 - 10 WiNG CLI Reference Guide 4.1.5 ap650 Global Configuration Commands Adds a AP650 access point to the wireless controller managed network. If a profile for the AP is not available, a new profile is created. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ap650 <MAC> Parameters • ap650 <MAC> <MAC> Specify the MAC address of the AP650. Examples rfs7000-37FABE(config)#ap650 11-22-33-44-55-66 ? rfs7000-37FABE(config-device-11-22-33-44-55-66) rfs7000-37FABE(config)#show wireless ap configured +-----+-----------------+---------------------+------------------+-------- | IDX | NAME | MAC | PROFILE | RF-DOMAIN | +-----+-----------------+---------------------+------------------+-------- | 1 | AP7131-889EC4 | 00-15-70-88-9E-C4 | default-AP7131 | default | | 2 | AP650-445566 | 11-22-33-44-55-66 | default-AP650 | default | +-----+-----------------+---------------------+------------------+-------- rfs7000-37FABE(config)# Related Commands no Resets values or disables commands
  • 175. GLOBAL CONFIGURATION COMMANDS 4 - 11 4.1.6 ap6511 Global Configuration Commands Adds a AP6511 access point to the wireless controller network. If a profile for the AP is not available, a new profile is created. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ap6511 <MAC> Parameters • ap6511 <MAC> <MAC> Specify the MAC address of the AP6511. Examples rfs7000-37FABE(config)#ap6511 00-17-70-88-9E-C4 ? rfs7000-37FABE(config-device-00-17-70-88-9E-C4)# Related Commands no Resets values or disables commands
  • 176. 4 - 12 WiNG CLI Reference Guide 4.1.7 ap6521 Global Configuration Commands Adds a AP6521 access point to the wireless controller network. If a profile for the AP is not available, a new profile is created. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ap6521 <MAC> Parameters • ap6521 <MAC> <MAC> Specify the MAC address of the AP6521. Examples rfs7000-37FABE(config)#AP6521 77-88-99-01-F0-AB ? rfs7000-37FABE(config-device-77-88-99-01-F0-AB)# Related Commands no Resets values or disables commands
  • 177. GLOBAL CONFIGURATION COMMANDS 4 - 13 4.1.8 ap6532 Global Configuration Commands Adds a AP6532 access point to the wireless controller network. If a profile for the AP is not available, a new profile is created. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ap6532 <MAC> Parameters • ap6532 <MAC> <MAC> Specify the MAC address of the AP6532. Examples rfs7000-37FABE(config)#AP6532 00-27-70-89-9F-E4 ? rfs7000-37FABE(config-device-00-27-70-89-9F-E4)# Related Commands no Resets values or disables commands
  • 178. 4 - 14 WiNG CLI Reference Guide 4.1.9 ap71xx Global Configuration Commands Adds a AP71XX series access point to the wireless controller network. If a profile for the AP is not available, a new profile is created. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ap71xx <MAC> Parameters • ap71xx <MAC> <MAC> Specify the MAC address of the AP71XX. Examples rfs7000-37FABE(config)#AP71XX 00-15-70-88-9E-C4 rfs7000-37FABE(config-device-00-15-70-88-9E-C4)# Related Commands no Resets values or disables commands
  • 179. GLOBAL CONFIGURATION COMMANDS 4 - 15 4.1.10 association-acl-policy Global Configuration Commands Configures an association ACL policy. This policy configures a list of devices allowed or denied access to the wireless controller managed network. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax association-acl-policy <ASSOCIATION-ACL-POLICY-NAME> Parameters • association-acl-policy <ASSOCIATION-ACL-POLICY-NAME> <ASSOCIATION-ACL- Specify the association ACL policy name. If the policy does not exist, it is created. POLICY-NAME> Examples rfs7000-37FABE(config)#association-acl-policy test rfs7000-37FABE(config-assoc-acl-test)# Related Commands no Resets values or disables commands NOTE: For more information on the association-acl-policy, see Chapter 11, ASSOCIATION-ACL-POLICY.
  • 180. 4 - 16 WiNG CLI Reference Guide 4.1.11 auto-provisioning-policy Global Configuration Commands Configures an auto provisioning policy. This policy is used to configure the automatic provisioning of device adoption. The policy configures how an AP is adopted based on its type. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax auto-provisioning-policy <AUTO-PROVISIONING-POLICY> Parameters • auto-provisioning-policy <AUTO-PROVISIONING-POLICY> <AUTO-PROVISIONING- Specify the auto provisioning policy name. If the policy does not exist, it is created. POLICY> Examples rfs7000-37FABE(config)#auto-provisioning-policy test rfs7000-37FABE(config-auto-provisioning-policy-test)# Related Commands no Resets values or disables commands NOTE: For more information on the association-acl-policy, see Chapter 9, AUTO- PROVISIONING-POLICY.
  • 181. GLOBAL CONFIGURATION COMMANDS 4 - 17 4.1.12 captive portal Global Configuration Commands The captive portal mode configures a hotspot. Table 4.2 lists the command to enter the captive portal configuration mode. Table 4.2 Captive-Portal Commands Command Description Reference captive-portal Configures captive portal Web page parameters page 4-18
  • 182. 4 - 18 WiNG CLI Reference Guide 4.1.12.1 captive-portal captive portal Configures a captive portal. A captive portal is a hotspot type guest WLAN where users access wireless controller resources. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax captive-portal <CAPTIVE-PORTAL> Parameters • captive-portal <CAPTIVE-PORTAL> <CAPTIVE-PORTAL> Specify the captive portal name. If the captive portal does not exist, it is created. Examples rfs7000-37FABE(config)#captive-portal testportal rfs7000-37FABE(config-captive-portal-testportal)# Related Commands no Resets values or disables commands
  • 183. GLOBAL CONFIGURATION COMMANDS 4 - 19 4.1.12.2 captive-portal-mode commands Table 4.3 summarizes captive portal mode commands Table 4.3 Captive-Portal-Mode Commands Command Description Reference access-time Defines a client’s access time. It is used when no session time is defined in the page 4-20 RADIUS response access-type Configures a captive portal’s access type page 4-21 accounting Enables a captive portal’s accounting records page 4-22 connection-mode Configures a captive portal’s connection mode page 4-23 custom-auth Configures custom user information page 4-24 inactivity-timeout Defines an inactivity timeout in seconds page 4-25 no Resets or disables captive portal commands page 4-26 server Configures the captive portal server parameter page 4-30 simultaneous- Specifies a username used by a MAC address pool page 4-31 users terms-agreement Enforces the user to agree to terms and conditions (included in login page) for page 4-32 captive portal access use Defines captive portal configuration settings page 4-33 webpage-location Specifies the location of Web pages used for captive portal authentication page 4-34 webpage Configures captive portal Web page parameters page 4-35 clrscr Clears the display screen page 5-3 commit Commits (saves) changes made in the current session page 5-4 do Runs commands from EXEC mode page 4-66 end Ends and exits the current mode and moves to the PRIV EXEC mode page 5-5 exit Ends the current mode and moves to the previous mode page 5-6 help Displays the interactive help system page 5-7 revert Reverts changes to their last saved configuration page 5-13 service Invokes service commands to troubleshoot or debug (config-if) instance page 5-14 configurations show Displays running system information page 6-4 write Writes information to memory or terminal page 5-42
  • 184. 4 - 20 WiNG CLI Reference Guide 4.1.12.2.1 access-time captive-portal-mode commands Defines the permitted access time for a client. It is used when no session time is defined in the RADIUS response. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax access-time <30-10080> Parameters • access-time <30-10080> <30-10080> Defines the access time allowed for a wireless client from 30 - 10080 minutes Examples rfs7000-37FABE(config-captive-portal-test)#access-time 35 rfs7000-37FABE(config-captive-portal-test)# Related Commands no Resets or disables captive portal commands
  • 185. GLOBAL CONFIGURATION COMMANDS 4 - 21 4.1.12.2.2 access-type captive-portal-mode commands Defines the captive portal access type Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax access-type [custom-auth-radius|logging|no-auth|radius] Parameters • access-type [custom-auth-radius|logging|no-auth|radius] custom-auth-radius Verifies custom user information for authentication logging Generates a logging record of users and allowed access no-auth Configures a no authentication required for a guest (redirected to welcome message) radius Enables RADIUS authentication for wireless clients Examples rfs7000-37FABEE(config-captive-portal-test)#access-type radius rfs7000-37FABE(config-captive-portal-test)# rfs7000-37FABE(config-captive-portal-testportal)#access-type logging rfs7000-37FABE(config-captive-portal-testportal)# Related Commands no Resets or disables captive portal commands
  • 186. 4 - 22 WiNG CLI Reference Guide 4.1.12.2.3 accounting captive-portal-mode commands Enables accounting records for a captive portal Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax accounting [radius|syslog] accounting radius accounting syslog host <IP/HOSTNAME> {port <1-65535>} Parameters • accounting radius radius Enables support for RADIUS accounting messages • accounting syslog host <IP/HOSTNAME> {port <1-65535>} syslog Enables support for syslog accounting messages host <IP/HOSTNAME> • host <IP/HOSTNAME> – Specifies the syslog server host address. Specify the IP address or hostname of the syslog server. port <1-65535> Optional. Specifies the syslog server’s listener port • <1-65535> – Specify the UDP port from 1- 65535. Examples rfs7000-37FABE(config-captive-portal-test)#accounting syslog host 172.16.10.13 port 1 rfs7000-37FABE(config-captive-portal-test)# Related Commands no Resets or disables captive portal commands
  • 187. GLOBAL CONFIGURATION COMMANDS 4 - 23 4.1.12.2.4 connection-mode captive-portal-mode commands Configures a captive portal’s connection mode. HTTP uses plain unsecured connection for user requests. HTTPS uses encrypted connection to support user requests. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax connection-mode [http|https] Parameters connection-mode [http|https] http Sets HHTP as the default connection mode https Sets HHTPS as the default connection mode HTTPS is a more secure version of HTTP, and uses encryption while sending and receiving requests Examples rfs7000-37FABE(config-captive-portal-test)#connection-mode https rfs7000-37FABE(config-captive-portal-test)# Related Commands no Resets or disables captive portal commands
  • 188. 4 - 24 WiNG CLI Reference Guide 4.1.12.2.5 custom-auth captive-portal-mode commands Configures custom user information when authenticating with the RADIUS server Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax custom-auth info <LINE> Parameters • custom-auth info <LINE> info <LINE> Configures information used for RADIUS lookup when custom auth radius access type is configured • <LINE> – Guest data needs to be provided. Specify the name, e-mail address and telephone number of the user. Examples rfs7000-37FABE(config-captive-portal-test)#custom-auth info testuser robert@symbol.com rfs7000-37FABE(config-captive-portal-test)# rfs7000-37FABE(config-captive-portal-testportal)#custom-auth info bob, bob@symbol.com, 9902833119 rfs7000-37FABE(config-captive-portal-testportal)#show context captive-portal testportal access-type logging custom-auth info bob, bob@symbol.com, 9902833119 rfs7000-37FABE(config-captive-portal-testportal)# Related Commands no Resets or disables captive portal commands
  • 189. GLOBAL CONFIGURATION COMMANDS 4 - 25 4.1.12.2.6 inactivity-timeout captive-portal-mode commands Defines an inactivity timeout in seconds. If a frame is not received from a client for the specified time interval, the current session is terminated. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax inactivity-timeout <300-1800> Parameters • inactivity-timeout <300-1800> <300-1800> Defines the duration of inactivity after which a captive portal session is automatically terminated. Set a timeout interval from 300 - 1800 seconds. Examples rfs7000-37FABE(config-captive-portal-test)#inactivity-timeout 750 rfs7000-37FABE(config-captive-portal-test)# Related Commands no Resets or disables captive portal commands
  • 190. 4 - 26 WiNG CLI Reference Guide 4.1.12.2.7 no captive-portal-mode commands The no command disables captive portal mode commands or resets parameters to their default. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax no [access-time|access-type|accounting|connection-mode|custom-auth| inactivity-timeout|server|simultaneous-users|terms-agreement|use|webpage| webpage-location] no [access-time|access-type|connection-mode|inactivity-timeout|simultaneous-users| terms-agreement|webpage-location] no accounting [radius|syslog] no custom-auth info no server host no server mode {centralized-controller hosting-vlan-interface} no use [aaa-policy|dns-whitelist no webpage external [agreement|fail|login|welcome] no webpage internal [org-name|org-signature] no webpage internal [agreement|fail|login|welcome] [description|footer|header| main-logo|small-logo|title] Parameters • no [access-time|access-type|connection-mode|inactivity-timeout| simultaneous-users|terms-agreement|webpage-location] no access-time Resets client access time no access-type Resets the client access type no connection-mode Resets the connection mode to HTTP no inactivity-timeout Resets the inactivity timeout interval no simultaneous-users Resets the number of MAC addresses that can use a single user name, to its default of 1
  • 191. GLOBAL CONFIGURATION COMMANDS 4 - 27 no terms-agreement Resets the terms agreement requirement for logging in. The user no longer has to agree to terms & conditions before connecting to a captive portal. no webpage-location Resets the use of custom Web pages for login, welcome, terms, and failure page. The default of automatically created Web pages is used. • no accounting [radius|syslog] no accounting Disables accounting configurations radius Disables support for sending RADIUS accounting messages syslog Disables support for sending syslog messages to remote syslog servers • no custom-auth info no custom-auth Resets custom authentication information info Resets the configuration of custom user information sent to the RADIUS server (for custom-auth-radius access type) • no server host no server host Clears captive portal server address • no server mode {centralized-controller hosting-vlan-interface} no server mode Configures the captive portal server mode centralized-controller Optional. Resets the hosting VLAN interface for centralized captive portal server to its hosting-vlan-interface default value of zero (0) • no use [aaa-policy|dns-whitelist no use Resets profiles used with a captive portal policy aaa-policy Removes the AAA policy used with a captive portal policy dns-whitelist Removes the DNS whitelist used with a captive portal policy • no webpage external [agreement|fail|login|welcome] no webpage external Resets the configuration of external Web pages displayed when a user interacts with the captive portal agreement Resets the agreement page fail Resets the fail page login Resets the login page welcome Resets the welcome page • no webpage internal [org-name|org-signature] no webpage external Resets the configuration of internal Web pages displayed when a user interacts with the captive portal
  • 192. 4 - 28 WiNG CLI Reference Guide org-name Resets the organization name that is included at the top of Web pages org-signature Resets the organization signature (email, addresses, phone numbers) included at the bottom of Web pages • no webpage internal [agreement|fail|login|welcome] [description|footer|header|main-logo|small-logo|title] no webpage external Resets the configuration of internal Web pages displayed when a user interacts with the captive portal agreement Resets the agreement page fail Resets the fail page login Resets the login page welcome Resets the welcome page description Resets the description part of each Web page. This is the area where information about the captive portal and user state is displayed to the user. footer Resets the footer portion of each Web page. A footer can contain the organization signature header Resets the header portion of each Web page main-logo Resets the main logo of each Web page small-logo Resets the small logo of each Web page title Resets the title of each Web page Examples rfs7000-37FABE(config-captive-portal-testportal)#no webpage internal login header rfs7000-37FABE(config-captive-portal-testportal)#no use aaa-policy rfs7000-37FABE(config-captive-portal-testportal)#no custom-auth info rfs7000-37FABE(config-captive-portal-testportal)#no accounting radius
  • 193. GLOBAL CONFIGURATION COMMANDS 4 - 29 Related Commands access-time Configures the allowed access time for each captive portal client access-type Configures a captive portal authentication and logging information accounting Configures a captive portal accounting information connection-mode Configures how clients connect to a captive portal custom-auth Configures the captive portal parameters required for client access inactivity-timeout Configures the client inactivity timeout interval server Configures the captive portal server parameters simultaneous-users Configures the maximum number of clients that can use a single captive portal user name terms-agreement Configures if a client has to accept terms and conditions before logging to the captive portal use Configures a AAA policy and DNS whitelist with this captive portal policy webpage-location Configures the location of Web pages displayed when the user interacts with the captive portal webpage Configures Web pages used by the captive portal to interact with users aaa-policy Configures a AAA policy dns-whitelist Configures a DNS whitelist
  • 194. 4 - 30 WiNG CLI Reference Guide 4.1.12.2.8 server captive-portal-mode commands Configures captive portal server parameters, such as the hostname, IP, and mode of operation Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax server [host <WORD|mode] server host <IP/HOSTNAME> server mode [centralized|centralized-controller|self] Parameters • server host <IP/HOSTNAME> host <IP/HOSTNAME> Configures the captive portal authentication server • <IP/HOSTNAME> – Specify the IP address or hostname of the captive portal server. • server mode [centralized|centralized-controller|self] mode Configures the captive portal server mode centralized Considers the configured server hostname or IP address as the centralized captive portal server centralized-controller Uses the configured hostname as the virtual captive portal server name across the wireless controller self Selects the captive portal server as the same device supporting the WLAN Examples rfs7000-37FABE(config-captive-portal-test)#server mode self rfs7000-37FABE(config-captive-portal-test)# rfs7000-37FABE(config-captive-portal-test)#server host 172.16.10.9 rfs7000-37FABE(config-captive-portal-test)# Related Commands no Resets or disables captive portal commands
  • 195. GLOBAL CONFIGURATION COMMANDS 4 - 31 4.1.12.2.9 simultaneous-users captive-portal-mode commands Specifies the number of MAC addresses that can simultaneously use a particular username Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax simultaneous-users <1-8192> Parameters • simultaneous-users <1-8192> <1-8192> Specifies the number of MAC addresses that can simultaneously use a particular username. Select a number from 1 - 8192. Examples rfs7000-37FABE(config-captive-portal-test)#simultaneous-users 5 rfs7000-37FABE(config-captive-portal-test)# Related Commands no Resets or disables captive portal commands
  • 196. 4 - 32 WiNG CLI Reference Guide 4.1.12.2.10 terms-agreement captive-portal-mode commands Enforces the user to agree to terms and conditions (included in the login page) for captive portal guest access Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax terms-agreement Parameters None Examples rfs7000-37FABE(config-captive-portal-test)#terms-agreement rfs7000-37FABE(config-captive-portal-test)# Related Commands no Resets or disables captive portal commands
  • 197. GLOBAL CONFIGURATION COMMANDS 4 - 33 4.1.12.2.11 use captive-portal-mode commands Configures a AAA policy and DNS whitelist with this captive portal policy. AAA policies are used to configure servers for this captive portal. DNS whitelists provide a method to restrict users to a set of configurable domains on the internet accessed through the captive portal. For more information on AAA policy, see Chapter 8, AAA-POLICY. For more information on DNS whitelists, see Chapter 4, GLOBAL CONFIGURATION COMMANDS. Defines captive portal configuration settings Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax use [aaa-policy <AAA-POLICY>|dns-whitelist <DNS-WHITELIST>] Parameters • use [aaa-policy <AAA-POLICY>|dns-whitelist <DNS-WHITELIST>] aaa-policy <AAA-POLICY> Configures a AAA policy with this captive portal policy. AAA policies configure servers for the captive portal. • <AAA-POLICY> – Specify the AAA policy name. dns-whitelist <DNS- Configures a DNS whitelist to use with this captive portal policy. DNS whitelists WHITELIST> restrict access of URLs from a captive portal. • <DNS-WHITELIST> – Specify the DNS whitelist name. Examples rfs7000-37FABE(config-captive-portal-test)#use aaa-policy test rfs7000-37FABE(config-captive-portal-test)#use dns-whitelist Captive_Portal_Allowed_URL_list Related Commands no Resets or disables captive portal commands dns-whitelist Configures a DNS whitelist aaa-policy Configures a AAA policy
  • 198. 4 - 34 WiNG CLI Reference Guide 4.1.12.2.12 webpage-location captive-portal-mode commands Specifies the location of the Web pages used for authentication. These pages can either be hosted on the system or on an external Web server. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax webpage-location [advanced|external|internal] Parameters webpage-location [advanced|external|internal] advanced Uses Web pages for login, welcome, failure, and terms created and stored on the wireless controller external Uses Web pages for login, welcome, failure, and terms located on an external server. Provide the URL for each of these pages internal Uses Web pages for login, welcome, and failure that are automatically generated Examples rfs7000-37FABE(config-captive-portal-test)#webpage-location internal rfs7000-37FABE(config-captive-portal-test)# rfs7000-37FABE(config-captive-portal-test)#webpage internal agreement title test123 rfs7000-37FABE(config-captive-portal-test)# Related Commands no Resets or disables captive portal commands webpage Configures Web pages displayed for the login, welcome, fail, and terms pages for a captive portal
  • 199. GLOBAL CONFIGURATION COMMANDS 4 - 35 4.1.12.2.13 webpage captive-portal-mode commands Configures Web pages displayed when interacting with a captive portal. There are four (4) different pages. • agreement – This page displays “Terms and Conditions” that a user needs to accept before allowed access to the captive portal. • fail – This page is displayed when the user is not authenticated to use the captive portal. • login – This page is displayed when the user connects to the captive portal. Use this page to fetch login credentials from the user. • welcome – This page is displayed to welcome an authenticated user to the captive portal. The Web pages for interacting with the users of a captive portal can be located either on the wireless controller or an external location. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax webpage [external|internal] webpage external [agreement|fail|login|welcome] <URL> webpage internal [agreement|fail|login|org-name|org-signature|welcome] webpage internal [agreement|fail|login|welcome] [description|footer| header|title] <CONTENT> webpage internal [agreement|fail|login|welcome] [main-logo|small-logo] <URL> Parameters • webpage external [agreement|fail|login|welcome] <URL> external Indicates the Web pages being served are external to the captive portal agreement Indicates the page is displayed for “Terms & Conditions” fail Indicates the page is displayed for login failure login Indicates the page is displayed for getting user credentials for log in to the captive portal welcome Indicates the page is displayed after a user has successfully logged in to the captive portal <URL> Indicates the URL to the Web page displayed
  • 200. 4 - 36 WiNG CLI Reference Guide • webpage internal [agreement|fail|login|welcome] description|footer|header|title] <CONTENT> internal Indicates the Web pages being served are internal agreement Indicates the page is displayed for “Terms & Conditions” fail Indicates the page is displayed for login failure login Indicates the page is displayed for getting user credentials for log in to the captive portal welcome Indicates the page is displayed after a user has successfully logged in to the captive portal description Indicates the content is the description portion of each internal, agreement, fail, and welcome page footer Indicates the content is the footer portion of each internal, agreement, fail, and welcome page. The footer portion contains the signature of the organization that hosts the captive portal. header Indicates the content is the header portion of each internal, agreement, fail, and welcome page. The header portion contains the heading information for each of these pages. title Indicates the content is the title of each internal, agreement, fail, and welcome page. The title for each of these pages is configured here. <CONTENT> Specify the content displayed for each of the different components of the Web page. You can enter 900 characters for the description and 256 characters each for header, footer, and title. • webpage internal [agreement|fail|login|welcome] [main-logo|small-logo] <URL> internal Indicates the Web pages being served are internal agreement Indicates the page is displayed for “Terms & Conditions” fail Indicates the page is displayed for login failure login Indicates the page is displayed for getting user credentials for log in to the captive portal welcome Indicates the page is displayed after a user has successfully logged in to the captive portal main-logo Indicates the main logo displayed in the header portion of each Web page small-logo Indicates the logo image displayed in the footer portion of each Web page, and constitutes the organization’s signature <URL> Indicates the complete URL of the main-log and small-logo files Examples rfs7000-37FABE(config-captive-portal-test)#webpage external fail www.symbol.com rfs7000-37FABE(config-captive-portal-test)# Related Commands no Resets or disables captive portal commands
  • 201. GLOBAL CONFIGURATION COMMANDS 4 - 37 4.1.13 clear Global Configuration Commands Clears parameters, cache entries, table entries, and other similar entries. The clear command is available for specific commands only. The information cleared using this command varies depending on the mode where executed. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax clear event-history Parameters • clear event-history event-history Clears the event history file Examples rfs7000-37FABE(config)#clear event-history rfs7000-37FABE(config)#
  • 202. 4 - 38 WiNG CLI Reference Guide 4.1.14 critical-resource-policy Global Configuration Commands Creates a critical resource monitoring policy. A critical resource is a device (wireless controller, router, gateway, etc.) considered critical to the health of the wireless controller. This is a list of IP addresses pinged regularly by the wireless controller. If there is a connectivity issue with a device on the critical resource list, an event is generated stating a critical resource is unavailable. The wireless controller does not attempt to restore connection to a critical resource. All critical devices are listed in a critical resource policy. Table 4.4 Critical Resource Policy Commands Command Description Reference critical-resource-policy Configures captive portal Web page parameters page 4-39
  • 203. GLOBAL CONFIGURATION COMMANDS 4 - 39 4.1.14.1 critical-resource-policy critical-resource-policy Creates or enters a Critical-resource Monitoring (CRM) policy. If the defined policy is not present, it is created. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax critical-resource-policy <CRITICAL-RESOURCE-POLICY> Parameters • critical-resource-policy <CRITICAL-RESOURCE-POLICY> <CRITICAL-RESOURCE- Specify the critical resource monitoring policy name. If the policy does not exist, it is POLICY> created. Examples rfs7000-37FABE(config)#critical-resource-policy test rfs7000-37FABE(config-critical-resource-policy-test)#? rfs7000-37FABE(config-critical-resource-policy-test)#? commands: monitor Critical resource monitoring no Negate a command or set its defaults clrscr Clears the display screen commit Commit all changes made in this session do Run commands from Exec mode end End current mode and change to EXEC mode exit End current mode and down to previous mode help Description of the interactive help system revert Revert changes service Service Commands show Show running system information write Write running configuration to memory or terminal rfs7000-37FABE(config-critical-resource-policy-test)# Related Commands no Disables a critical resource policy
  • 204. 4 - 40 WiNG CLI Reference Guide 4.1.14.2 critical-resource-policy-mode Table 4.5 summarizes critical resource monitoring policy commands Table 4.5 critical-resource-policy Command Description Reference monitor Performs critical resource monitoring page 4-41 no Cancels the monitoring of a critical resource page 4-43 clrscr Clears the display screen page 5-3 commit Commits (saves) changes made in the current session page 5-4 do Runs commands from the EXEC mode page 4-66 end Ends and exits the current mode and moves to the PRIV EXEC mode page 5-5 exit Ends the current mode and moves to the previous mode page 5-6 help Displays the interactive help system page 5-7 revert Reverts changes to their last saved configuration page 5-13 service Invokes service commands to troubleshoot or debug (config-if) instance page 5-14 configurations show Displays running system information page 6-4 write Writes information to memory or terminal page 5-42
  • 205. GLOBAL CONFIGURATION COMMANDS 4 - 41 4.1.14.2.1 monitor critical-resource-policy-mode Monitors critical resources. Use this command to configure a critical policy and set the interval the availability of the critical resource is checked. • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax monitor [<IP>|ping-interval monitor [ping-interval <5-86400>] monitor <IP> ping-mode [arp-icmp|arp-only vlan <1-4094>] Parameters • monitor ping-interval <5-86400> ping-interval <5-86400> Configures the ping interval. This is the duration between two successive pings to a critical resource. • <5-86400> – Specify the ping interval from 5 - 86400 seconds. • monitor <IP> ping-mode [arp-icmp|arp-only vlan <1-4094>] <IP> Specify the IP address of the critical resource. ping-mode Configures the type of ping packets to use. For pinging critical resources that do not have an IP address, use the arp-only mode. arp-icmp Use Address Resolution Protocol (ARP) requests or Internet Control Message Protocol (ICMP) echo requests to monitor a critical resource. To use this ping mode, an IP address must be configured for each device in the critical resource list. arp-only vlan <1-4094> Uses ARP requests to monitor a critical resource. This mode can be used for devices that do not have a configured IP address. • vlan – Configures the VLAN to ping for the critical resource • <1-4094> – Specify a VLAN ID from 1 - 4094
  • 206. 4 - 42 WiNG CLI Reference Guide Examples rfs7000-37FABE(config-critical-resource-policy-test)#monitor ping-interval 10 rfs7000-37FABE(config-critical-resource-policy-test)# rfs7000-37FABE(config-critical-resource-policy-test)#monitor 172.16.10.2 ping-mode arp-only vlan 1 rfs7000-37FABE(config-critical-resource-policy-test)# Related Commands no Resets or disables critical resource policy commands
  • 207. GLOBAL CONFIGURATION COMMANDS 4 - 43 4.1.14.2.2 no critical-resource-policy-mode Removes a device from the critical resource list. This command also resets the ping interval to its default. • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax no monitor [<IP>|ping-interval] Parameters • no monitor [<IP>|ping-interval] monitor Configures critical resource monitoring parameters <IP> Removes a specified device from the list of monitored devices ping-interval Resets the ping interval for pinging critical resources Examples rfs7000-37FABE(config-critical-resource-policy-test)#no monitor 172.16.10.2 rfs7000-37FABE(config-critical-resource-policy-test)# Related Commands monitor Adds a device to the critical resource policy list
  • 208. 4 - 44 WiNG CLI Reference Guide 4.1.15 customize Global Configuration Commands Customizes the output of the summary CLI commands. Use this command to define the data displayed as a result of various show commands. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax customize [hostname-column-width|show-wireless-client|show-wireless-client-stats| show-wireless-client-stats-rf|show-wireless-radio|show-wireless-radio-stats| show-wireless-radio-stats-rf] customize hostname-column-width <1-64> customize show-wireless-client (ap-name <1-64>,auth,bss,enc,hostname <1-64>,ip, last-active,location <1-64>,mac,radio-alias <3-67>,radio-id,radio-type,state, username <1-64>,vendor,vlan,wlan) customize show-wireless-client-stats (hostname <1-64>,mac,rx-bytes,rx-errors, rx-packets,rx-throughput,tx-bytes,tx-dropped,tx-packets,tx-throughput) customize show-wireless-client-stats-rf (average-retry-number,error-rate, hostname <1-64>,mac,noise,q-index,rx-rate,signal,snr,t-index,tx-rate) customize show-wireless-radio (adopt-to,ap-name <1-64>,channel,location <1-64>, num-clients,power,radio-alias <3-67>,radio-id,radio-mac,rf-mode,state) customize show-wireless-radio-stats (radio-alias <3-67>,radio-id,radio-mac, rx-bytes,rx-errors,rx-packets,rx-throughput,tx-bytes,tx-dropped,tx-packets, tx-throughput) customize show-wireless-radio-stats-rf (average-retry-number,error-rate,noise, q-index,radio-alias <3-67>,radio-id,radio-mac,rx-rate,signal,snr,t-index, tx-rate) Parameters • customize hostname-column-width <1-64> hostname-column-width Configures the default width of the hostname column in all show commands <1-64> • <1-64> – Specify the hostname column width from 1 - 64 characters.
  • 209. GLOBAL CONFIGURATION COMMANDS 4 - 45 • customize show-wireless-client (ap-name <1-64>,auth,bss,enc,hostname <1-64>,ip, last-active,location <1-64>,mac,radio-alias <3-67>,radio-id,radio-type,state, username <1-64>,vendor,vlan,wlan) show-wireless-client Customizes the columns displayed for the show wireless client command ap-name <1-64> Includes the ap-name column in the show wireless client command. • <1-64> – Specify the ap-name column width from 1 - 64 characters. auth Includes the auth column in the show wireless client command. The auth column displays the authorization protocol used by the wireless client. bss Includes the BSS column in the show wireless client command. The BSS column displays the BSSID the wireless client is associated with. enc Includes the enc column in the show wireless client command. The enc column displays the encryption suite used by the wireless client. hostname <1-64> Includes the hostname column in the show wireless client command. The hostname column displays the hostname of the wireless client. • <1-64> – Specify the hostname column width from 1 - 64 characters. ip Includes the IP column in the show wireless client command. The IP column displays the current IP address of the wireless client. last-active Includes the last-active column in the show wireless client command. The last-active column displays the time of the last activity seen from the wireless client. location <1-64> Includes the location column in the show wireless client command. The location column displays the location of the AP the wireless client is associated with. • <1-64> – Specify the location column width from 1 - 64 characters. mac Includes the MAC column in the show wireless client command. The MAC column displays the MAC address of the wireless client. radio-alias <3-67> Includes the radio-alias column in the show wireless client command. The radio-alias column displays the radio alias with the AP's hostname and the radio interface number in the “HOSTNAME:RX” format. • <1-64> – Specify the radio-alias column width from 3 - 67 characters. radio-id Includes the radio-id column in the show wireless client command. The radio-id column displays the radio ID with the AP’s MAC address and the radio interface number in the “AA-BB-CC-DD-EE-FF:RX” format. radio-type Includes the radio-type column in the show wireless client command. The radio-type column displays the radio type of the wireless client. state Includes the state column in the show wireless client command. The state column displays the current availability state of the wireless client. username <1-64> Includes the username column in the show wireless client command. The username column displays the username used to logon by the wireless client. • <1-64> – Specify the username column width from 1 - 64 characters. vendor Includes the vendor column in the show wireless client command. The vendor column displays the vendor ID of the wireless client.
  • 210. 4 - 46 WiNG CLI Reference Guide vlan Includes the VLAN column in the show wireless client command. The VLAN column displays the VLAN assigned to the wireless client. wlan Includes the WLAN column in the show wireless client command. The WLAN column displays the WLAN assigned to the wireless client. • customize show-wireless-client-stats (hostname <1-64>,mac,rx-bytes,rx-errors, rx-packets,rx-throughput,tx-bytes,tx-dropped,tx-packets,tx-throughput) show-wireless-client- Customizes the columns displayed for the show wireless client statistics command stats hostname <1-64> Includes the hostname column in the show wireless client statistics command. The hostname column displays the hostname of the wireless client. • <1-64> – Sets the hostname column width from 1 - 64 characters mac Includes the MAC column in the show wireless client statistics command. The MAC column displays the MAC address of the wireless client. rx-bytes Includes the rx-bytes column in the show wireless client statistics command. The rx-bytes column displays the total number of bytes received by the wireless client. rx-errors Includes the rx-error column in the show wireless client statistics command. The rx-error column displays the total number of receive errors received by the wireless client. rx-packets Includes the rx-packets column in the show wireless client statistics command. The rx-packets column displays the total number of packets received by the wireless client. rx-throughput Includes the rx-throughput column in the show wireless client statistics command. The rx-throughput column displays the receive throughput at the wireless client. tx-bytes Includes the tx-bytes column in the show wireless client statistics command. The tx-bytes column displays the total number of bytes transmitted by the wireless client. tx-dropped Includes the tx-dropped column in the show wireless client statistics command. The tx-dropped column displays the total number of dropped packets by the wireless client. tx-packets Includes the tx-packets column in the show wireless client statistics command. The tx-packets column displays the total number of packets transmitted by the wireless client. tx-throughput Includes the tx-throughput column in the show wireless client statistics command. The tx-throughput column displays the transmission throughput at the wireless client. • customize show-wireless-client-stats-rf (average-retry-number,error-rate, hostname <1-64>,mac,noise,q-index,rx-rate,signal,snr,t-index,tx-rate) show-wireless-client- Customizes the columns displayed for the show wireless client stats rf command stats-rf average-retry-number Includes the average-retry-number column in the show wireless client statistics RF command. The average-retry-number column displays the average number of retransmissions per packet. error-rate Includes the error-rate column in the show wireless client statistics rf command. The error-rate column displays the error rate information for the wireless client.
  • 211. GLOBAL CONFIGURATION COMMANDS 4 - 47 hostname <1-64> Includes the hostname column in the show wireless client statistics RF command. The hostname column displays the hostname of the wireless client. • <1-64> – Specify the hostname column width from 1 - 64 characters. mac Includes the MAC column in the show wireless client statistics RF command. The MAC column displays the MAC address of the wireless client. noise Includes the noise column in the show wireless client statistics RF command. The MAC column displays the noise as detected by the wireless client. q-index Includes the q-index column in the show wireless client statistics RF command. The q- index column displays the RF quality index where a higher value indicates better RF quality. rx-rate Includes the rx-rate column in the show wireless client statistics RF command. The rx-rate column displays the receive rate at the particular wireless client. signal Includes the signal column in the show wireless client statistics RF command. The signal column displays the signal strength at the particular wireless client. snr Includes the snr column in the show wireless client statistics RF command. The snr column displays the signal to noise ratio at the particular wireless client. t-index Includes the t-index column in the show wireless client statistics RF command. The t-index column displays the traffic utilization index at the wireless controller. tx-rate Includes the tx-rate column in the show wireless client statistics RF command. The tx-rate column displays the packet transmission rate at the particular wireless client. • customize show-wireless-radio (adopt-to,ap-name <1-64>,channel,location <1-64>, num-clients,power,radio-alias <3-67>,radio-id,radio-mac,rf-mode,state) show-wireless-radio Customizes the columns displayed for the show wireless radio command. adopt-to Includes the adopt-to column in the show wireless radio command. The adopt-to column displays information about the wireless controller adopting this AP. ap-name <1-64> Includes the ap-name column in the show wireless radio command. The adopt-to column displays information about the AP this radio belongs. • <1-64> – Specify the ap-name column width from 1 - 64 characters. channel Includes the channel column in the show wireless radio command. The channel column displays information about the configured and current channel of operation for this radio. location <1-64> Includes the location column in the show wireless radio command. The location column displays the location of the AP this radio belongs. • <1-64> – Specify the location column width from 1 - 64 characters. num-clients Includes the num-clients column in the show wireless radio command. The num-clients column displays the number of clients associated with this radio. power Includes the power column in the show wireless radio command. The power column displays the configured and current transmit power of the radio.
  • 212. 4 - 48 WiNG CLI Reference Guide radio-alias <3-67> Includes the radio-alias column in the show wireless radio command. The radio-alias column displays the radio alias along with the AP's hostname and the radio interface number in the “HOSTNAME:RX” formate. • <3-67> – Specify the radio-alias column width from 3 - 67 characters. radio-id Includes the radio-id column in the show wireless radio command. The radio-id column displays the Radio ID along with the AP’s MAC address and the radio interface number in the “AA-BB-CC-DD-EE-FF:RX” format. radio-mac Includes the radio-mac column in the show wireless radio command. The radio-mac column displays the base MAC address of the radio. rf-mode Includes the rf-mode column in the show wireless radio command. The rf-mode column displays the mode in which the radio operates. The radio mode can be 2.4GHz, 4.9GHz, 5GHz, or sensor. state Includes the state column in the show wireless radio command. The state column displays the current operational state of the radio. • customize show-wireless-radio-stats (radio-alias <3-67>,radio-id,radio-mac, rx-bytes,rx-errors,rx-packets,rx-throughput,tx-bytes,tx-dropped,tx-packets, tx-throughput) show-wireless-radio-stats Customizes the columns displayed for the show wireless radio statistics command. radio-alias <3-67> Includes the radio-alias column in the show wireless radio statistics command. The radio-alias column displays the radio alias along with the AP's hostname and the radio interface number in the “HOSTNAME:RX” format. • <3-67> – Specify the radio-alias column width from 3 - 67 characters. radio-id Includes the radio-id column in the show wireless radio statistics command. The radio-id column displays the Radio ID along with the AP’s MAC address and the radio interface number in the “AA-BB-CC-DD-EE-FF:RX” format. radio-mac Includes the radio-mac column in the show wireless radio statistics command. The radio-mac column displays the base MAC address of the radio. rx-bytes Includes the rx-bytes column in the show wireless radio statistics command. The rx-bytes column displays the total number of bytes received by the wireless radio. rx-errors Includes the rx-error column in the show wireless radio statistics command. The rx-error column displays the total number of receive errors received by the wireless radio. rx-packets Includes the rx-packets column in the show wireless radio statistics command. The rx-packets column displays the total number of packets received by the wireless radio. rx-throughput Includes the rx-throughput column in the show wireless radio statistics command. The rx-throughput column displays the receive throughput at the wireless radio. tx-bytes Includes the tx-bytes column in the show wireless radio statistics command. The tx-bytes column displays the total number of bytes transmitted by the wireless radio. tx-dropped Includes the tx-dropped column in the show wireless radio statistics command. The tx-dropped column displays the total number of dropped packets by the wireless radio.
  • 213. GLOBAL CONFIGURATION COMMANDS 4 - 49 tx-packets Includes the tx-packets column in the show wireless radio statistics command. The tx-packets column displays the total number of packets transmitted by the wireless radio. tx-throughput Includes the tx-throughput column in the show wireless radio statistics command. The tx-throughput column displays the transmission throughput at the wireless radio. • customize show-wireless-radio-stats-rf (average-retry-number,error-rate,noise, q-index,radio-alias <3-67>,radio-id,radio-mac,rx-rate,signal,snr,t-index, tx-rate) show-wireless-radio-stats- Customizes the columns displayed for the show wireless radio stats RF command rf average-retry-number Includes the average-retry-number column in the show wireless radio statistics RF command. The average-retry-number column displays the average number of retransmissions per packet. error-rate Includes the error-rate column in the show wireless radio statistics RF command. The error-rate column displays the error rate information for the wireless radio. noise Includes the noise column in the show wireless radio statistics RF command. The mac column displays the noise as detected by the wireless radio. q-index Includes the q-index column in the show wireless client statistics RF command. The q-index column displays the RF quality index where a higher value indicates better RF quality. radio-alias <3-67> Includes the radio-alias column in the show wireless radio statistics RF command. The radio-alias column displays the radio alias along with AP's hostname and the radio interface number in the “HOSTNAME:RX” format. • <3-67> – Specify the radio-alias width column from 3 - 67 characters. radio-id Includes the radio-id column in the show wireless radio statistics rf command. The radio- id column displays the Radio ID along with the AP’s MAC address and the radio interface number in the “AA-BB-CC-DD-EE-FF:RX” format. radio-mac Includes the radio-mac column in the show wireless radio statistics RF command. The radio-mac column displays the base MAC address of the radio. rx-rate Includes the rx-rate column in the show wireless radio statistics RF command. The rx-rate column displays the receive rate at the particular wireless radio. signal Includes the signal column in the show wireless radio statistics RF command. The signal column displays the signal strength at the particular wireless radio. snr Includes the snr column in the show wireless radio statistics RF command. The snr column displays the signal to noise ratio at the particular wireless radio. t-index Includes the t-index column in the show wireless radio statistics RF command. The t-index column displays the traffic utilization index at the wireless controller. tx-rate Includes the tx-rate column in the show wireless radio statistics RF command. The tx-rate column displays the packet transmission rate at the particular wireless radio.
  • 214. 4 - 50 WiNG CLI Reference Guide Examples rfs7000-37FABE(config)*#customize show-wireless-client ap-name auth rfs7000-37FABE(config)*#commit rfs7000-37FABE(config)*#show wireless client ----------------------- AP-NAME AUTH ----------------------- ----------------------- Total number of wireless clients displayed: 0 rfs7000-37FABE(config)*# Related Commands no Resets values or disables commands wireless Displays wireless configuration and other information
  • 215. GLOBAL CONFIGURATION COMMANDS 4 - 51 4.1.16 device Global Configuration Commands Enables simultaneous configuration of multiple devices Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax device {containing|filter} device device containing <STRING> {filter type [ap621|ap650|ap6511|ap6521|ap6532|ap71xx| rfs4000|rfs6000|rfs7000]} device filter type [ap621|ap650|ap6511|ap6521|ap6532|ap71xx|rfs4000|rfs6000| rfs7000] Parameters • device device Configures a basic device profile • device containing <STRING> {filter type [ap621|ap650|ap6511|ap6521|ap6532|ap71xx| rfs4000|rfs6000|rfs7000]} containing <STRING> Configures the search string to search for in the device’s hostname. Only those devices that have the search string in their hostname can be configured. • <STRING> – Specify the string to search for in the hostname of the devices filter type Optional. Filters out a specific device type ap621 Optional. Filters out all devices other than AP621s ap650 Optional. Filters out devices other than AP650s ap6511 Optional. Filters out devices other than AP6511s ap6521 Optional. Filters out devices other than AP6521s ap6532 Optional. Filters out devices other than AP6532s ap71xx Optional. Filters out devices other than AP71XXs rfs4000 Optional. Filters out devices other than RFS4000s
  • 216. 4 - 52 WiNG CLI Reference Guide rfs6000 Optional. Filters out devices other than RFS6000s rfs7000 Optional. Filters out devices other than RFS7000s • device filter type [ap621|ap650|ap6511|ap6521|ap6532|ap71xx|rfs4000|rfs6000| rfs7000] filter type Filters out a specific device type ap621 Filters out all devices other than AP621s ap650 Filters out devices other than AP650s ap6511 Filters out devices other than AP6511s ap6521 Filters out devices other than AP6521s ap6532 Filters out devices other than AP6532s ap71xx Filters out devices other than AP71XXs rfs4000 Filters out devices other than RFS4000s rfs6000 Filters out devices other than RFS6000s rfs7000 Filters out devices other than RFS7000s rfs7000-37FABE(config)#device containing ap filter type AP71XX % Error: Parsing cmd line (1) rfs7000-37FABE(config)# rfs7000-37FABE(config)#device containing ap filter type ap650 rfs7000-37FABE(config-device-{'type': 'ap650', 'con)# Related Commands no Resets values or disables commands
  • 217. GLOBAL CONFIGURATION COMMANDS 4 - 53 4.1.17 device-categorization Global Configuration Commands Categorizes devices as sanctioned or neighboring. Categorization of devices enables quick identification and blocking of rogue/unsanctioned devices in the wireless controller managed network. Table 4.6 Critical Resource Policy Commands Command Description Reference device-categorization Configures a device categorization list page 4-54
  • 218. 4 - 54 WiNG CLI Reference Guide 4.1.17.1 device-categorization device-categorization Configures a device categorization list. This list categorizes devices as sanctioned or neighboring. This information determines which devices are allowed access to the wireless controller managed network and which are rogue devices. If a device categorization list does not exist, it is created. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax device-categorization <DEVICE-CATEGORIZATION-LIST-NAME> Parameters device-categorization <DEVICE-CATEGORIZATION-LIST-NAME> <DEVICE-CATEGORIZATION- Specify the device categorization list name. If a list with the same name does not LIST-NAME> exist, it is created. Examples rfs7000-37FABE(config)#device-categorization RFS7000 rfs7000-37FABE(config-device-categorization-RFS7000)#? Device Category Mode commands: mark-device Add a device no Negate a command or set its defaults clrscr Clears the display screen commit Commit all changes made in this session do Run commands from Exec mode end End current mode and change to EXEC mode exit End current mode and down to previous mode help Description of the interactive help system revert Revert changes service Service Commands show Show running system information write Write running configuration to memory or terminal rfs7000-37FABE(config-device-categorization-RFS7000)# Related Commands no Resets values or disables commands
  • 219. GLOBAL CONFIGURATION COMMANDS 4 - 55 4.1.17.2 device-categorization-mode commands device-categorization Table 4.7 summarizes device categorization mode commands Table 4.7 device-categorization-mode commands Command Description Reference mark-device Adds a device to the device categorization list page 4-56 no Removes a device from the device categorization list page 4-58 clrscr Clears the display screen page 5-3 commit Commits (saves) changes made in the current session page 5-4 do Runs commands from EXEC mode page 4-66 end Ends and exits the current mode and moves to the PRIV EXEC mode page 5-5 exit Ends the current mode and moves to the previous mode page 5-6 help Displays the interactive help system page 5-7 revert Reverts changes to their last saved configuration page 5-13 service Invokes service commands to troubleshoot or debug (config-if) instance page 5-14 configurations show Displays running system information page 6-4 write Writes information to memory or terminal page 5-42
  • 220. 4 - 56 WiNG CLI Reference Guide 4.1.17.2.1 mark-device device-categorization-mode commands Adds a device to the device categorization list as sanctioned or neighboring. Devices are further classified as AP or client. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax mark-device [sanctioned|neighboring] [ap|client] mark-device [sanctioned|neighboring] ap [<MAC>|any] ssid [<SSID>|any] mark-device [sanctioned|neighboring] client [<MAC>|any] Parameters • mark-device [sanctioned|neighboring] ap [<MAC>|any] ssid [<SSID>|any] sanctioned Marks a device as sanctioned. A sanctioned device is authorized to use network resources by providing correct credentials. neighboring Marks a device as neighboring. A neighboring device is a neighbor in the same network as this device. ap [<MAC>|any] Marks all or a specified AP as sanctioned or neighboring based on their MAC addresses • <MAC> – Specify the MAC address of the AP. • any – Indicates all APs are marked ssid [<SSID>|any] Configures the SSID for the AP. Any AP with the configured SSID is automatically marked. When the ‘any’ parameter is used, any AP with any SSID is automatically marked. • <SSID> – Specify the SSID. • any – Indicates any SSID to match • mark-device [sanctioned|neighboring] client [<MAC>|any] sanctioned Marks the wireless client as sanctioned. A sanctioned device is authorized to use network resources by providing correct credentials.
  • 221. GLOBAL CONFIGURATION COMMANDS 4 - 57 neighboring Marks the wireless client as neighboring. A neighboring device is a neighbor in the same network as this device. client [<MAC>|any] Marks all or a specified wireless client as sanctioned or neighboring based on the MAC address • <MAC> – Specify the MAC address of the wireless client. • any – Indicates all wireless clients are marked Examples rfs7000-37FABE(config-device-categorization-RFS7000)#mark-device sanctioned ap any ssid any rfs7000-37FABE(config-device-categorization-RFS7000)# rfs7000-37FABE(config-device-categorization-RFS7000)#mark-device neighboring client 11-22-33-44-55-66 rfs7000-37FABE(config-device-categorization-RFS7000)# Related Commands no Resets or disables mark device commands
  • 222. 4 - 58 WiNG CLI Reference Guide 4.1.17.2.2 no device-categorization-mode commands Removes a device from the device categorization list Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax no mark-device [neighboring|sanctioned] [ap|client] [<MAC>|any] mark-device [sanctioned|neighboring] client [<MAC>|any] mark-device [sanctioned|neighboring] ap [<MAC>|any] ssid [<SSID>|any] Parameters • no mark-device [sanctioned|neighboring] ap [<MAC>|any] ssid [<SSID>|any] no mark-device Removes a device from the marked device list sanctioned Removes a device marked as sanctioned. A sanctioned device is authorized to use network resources by providing correct credentials. neighboring Removes a device marked as neighboring. A neighboring device is a neighbor in the same network as this device. ap [<MAC>|any] Removes all or a specified AP as sanctioned or neighboring • <MAC> – Specify the MAC address of the AP. • any – Indicates all APs are marked ssid [<SSID>|any] Configures the AP’s SSID. Any AP with the configured SSID is removed from the marked list. When the ‘any’ parameter is used, any AP with any SSID is removed from the marked list. • <SSID> – Specify the SSID. • any – Indicates any SSID to match • no mark-device [sanctioned|neighboring] client [<MAC>|any] no mark-device Removes a device from the marked device list sanctioned Marks the wireless client as sanctioned. A sanctioned device is authorized to use network resources by providing correct credentials.
  • 223. GLOBAL CONFIGURATION COMMANDS 4 - 59 neighboring Removes a wireless client marked as neighboring. A neighboring device is a neighbor in the same network as this device. client [<MAC>|any] Removes all or a specified wireless client marked as sanctioned or neighboring • <MAC> – Specify the MAC address of the wireless client. • any – Indicates all wireless clients are removed from the marked list Examples rfs7000-37FABE(config-device-categorization-RFS7000)#no mark-device authorized ap any ssid 1 %% Error: Parsing cmd line rfs7000-37FABE(config-device-categorization-RFS7000)# Related Commands mark-device Adds a device to a list of sanctioned or neighboring devices
  • 224. 4 - 60 WiNG CLI Reference Guide 4.1.18 dhcp-server-policy Global Configuration Commands Configures DHCP server policy parameters, such as class, address range, and options. A new policy is created if it does not exist. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax dhcp-server-policy <DHCP-POLICY-NAME> Parameters • dhcp-server-policy <DHCP-POLICY-NAME> <DHCP-POLICY-NAME> Specify the DHCP policy name. If the policy does not exist, it is created. Examples rfs7000-37FABE(config)#dhcp-policy test rfs7000-37FABE(config)#? Related Commands no Resets values or disables commands NOTE: For more information on DHCP policy, see Chapter 13, DHCP-SERVER-POLICY.
  • 225. GLOBAL CONFIGURATION COMMANDS 4 - 61 4.1.19 dns-whitelist Global Configuration Commands Configures a whitelist of devices permitted to access the wireless controller managed network or a hotspot Table 4.8 Critical Resource Policy Commands Command Description Reference dns-whitelist Configures the DNS whitelist page 4-62
  • 226. 4 - 62 WiNG CLI Reference Guide 4.1.19.1 dns-whitelist dns-whitelist Configures a DNS whitelist. A DNS whitelist is a list of domains allowed access to the wireless controller managed network. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax dns-whitelist <DNS-WHITELIST> Parameters dns-whitelist <DNS-WHITELIST> <DNS-WHITELIST> Specify the DNS whitelist name. If the whitelist does not exist, it is created. Examples rfs7000-37FABE(config-dns-whitelist-test)#? DNS Whitelist Mode commands: no Negate a command or set its defaults permit Match a host clrscr Clears the display screen commit Commit all changes made in this session end End current mode and change to EXEC mode exit End current mode and down to previous mode help Description of the interactive help system revert Revert changes service Service Commands show Show running system information write Write running configuration to memory or terminal rfs7000-37FABE(config-dns-whitelist-test)# Related Commands no Resets values or disables commands
  • 227. GLOBAL CONFIGURATION COMMANDS 4 - 63 4.1.19.2 dns-whitelist mode commands dns-whitelist Table 4.9 summarizes DNS white list mode commands Table 4.9 dns-whitelist commands Command Description Reference permit Matches a host page 4-64 no Negates a command or sets its default values page 4-65 clrscr Clears the display screen page 5-3 commit Commits (saves) changes made in the current session page 5-4 do Runs commands from EXEC mode page 4-66 end Ends and exits the current mode and moves to the PRIV EXEC mode page 5-5 exit Ends the current mode and moves to the previous mode page 5-6 help Displays the interactive help system page 5-7 revert Reverts changes to their last saved configuration page 5-13 service Invokes service commands to troubleshoot or debug (config-if) instance page 5-14 configurations show Displays running system information page 6-4 write Writes information to memory or terminal page 5-42
  • 228. 4 - 64 WiNG CLI Reference Guide 4.1.19.2.1 permit dns-whitelist mode commands A whitelist is a list of host names and IP addresses permitted access to the wireless controller managed network or captive portal. This command adds a device by its hostname or IP address to the DNS whitelist. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax permit <IP/HOSTNAME> {suffix} Parameters • permit <IP/HOSTNAME> {suffix} <IP/HOSTNAME> Specify the IP address or hostname of the device, to add to the DNS whitelist. suffix Optional. Matches any hostname including the specified name as suffix Examples rfs7000-37FABE(config-dns-whitelist-test)#permit motorolasolutions.com suffix rfs7000-37FABE(config-dns-whitelist-test)#show context dns-whitelist test permit motorolasolutions.com suffix rfs7000-37FABE(config-dns-whitelist-test)# Related Commands no Resets or disables DNS whitelist commands
  • 229. GLOBAL CONFIGURATION COMMANDS 4 - 65 4.1.19.2.2 no dns-whitelist mode commands Removes a specified host or IP address from the DNS whitelist, and prevents it from accessing network resources Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax no permit <IP/HOSTNAME> Parameters • no permit <IP/HOSTNAME> <IP/HOSTNAME> Specify the device’s IP address or hostname to remove from the DNS whitelist. Examples rfs7000-37FABE(config-dns-whitelist-test)#no permit joysportsview.com rfs7000-37FABE(config-dns-whitelist-test)# Related Commands permit Adds a device to the DNS whitelist
  • 230. 4 - 66 WiNG CLI Reference Guide 4.1.20 do Global Configuration Commands Use the do command to run commands from the EXEC mode. These commands perform tasks, such as clearing caches, setting device clock, upgrades etc. Generally use the do command to execute commands from the Privilege Executable or User Executable modes. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax do [ap-upgrade|archive|boot|cd|change-passwd|clear|clock|clrscr|cluster|commit| configure|connect|copy|crypto|debug|delete|diff|dir|disable|edit|enable| erase|exit|format|halt|help|logging|mint|mkdir|more|no|page|ping|pwd|reload| remote-debug|rename|revert|rmdir|self|service|show|telnet|terminal|time-it| traceroute|upgrade|upgrade-abort|watch|write|ssh do ap-upgrade [<DEVICE-NAME>|all|all|ap621|ap650|ap6511|ap6521|ap6532|ap71xx|load- image|rf-domain|cancel-upgrade] do archive tar [/create|/table|/xtract] [<FILE>|<URL>] do boot system [primary|secondary] {on <DEVICE-NAME>} do cd {<DIR>} do change-passwd {<OLD-PASSWORD>} {<NEW-PASSWORD>} do clear [arp-cache|cdp|counters|event-history|firewall|ip|lldp|spanning-tree| crypto] do clock set <TIME> <DAY> <MONTH> <YEAR> do clrscr do cluster start-election do commit write memory do configure [terminal|self] do connect [<REMOTE-DEVICE>|mint-id <DEVICE-MINT-ID>] do copy [<SOURCE-FILE>|<SOURCE-URL>] [<DESTINATION-FILE>|<DESTINATION-URL>] do crypto [key|pki] do delete /force /recursive <FILE>
  • 231. GLOBAL CONFIGURATION COMMANDS 4 - 67 do diff [<FILE1>|<URL1>] [<FILE2>|<URL2>] do dir {/all} {/recursive} {<DIR>} {all-filesystems} do disable do edit <FILE> do enable do erase [cf:|flash:|nvram:|startup-config|usb1] do exit do format cf: do halt {on <DEVICE>} do help {[search|show]} do logging monitor {[<0-7>|alerts|critical|debugging|emergencies|errors| informational|notification|warnings]} do mint [ping|traceroute] <MINT-DEVICE-ID> do mkdir <DIR> do more <FILE> do no [adoption|captive-portal|crypto|debug|page|service|terminal|upgrade| wireless|logging] do page do ping <IP> do pwd do reload {[cancel|force|in|on]} do rename <FILE> do revert do rmdir <DIR> do self do service [advanced-wips|ap300|clear|cli-tables-expand|cli-tables-skin|cluster| copy|force-send-config|locator|mint|noc|pktcap|pm|radio|radius|set|show| smart-rf|start-shell|wireless|signal do show [adoption|advanced-wips|ap-upgrade|boot|captive-portal|cdp|clock|cluster| commands|critical-resources|crypto|debug|debugging|device-categorization| event-history|event-system-policy|file|firewall|interface|ip| ip-access-list-stats|licenses|lldp|logging|mac-access-list-stats| mac-address-table|mint|noc|ntp|password-encryption|power|reload|remote-debug| rf-domain-manager|role|running-config session-changes|session-config| sessions smart-rf|spanning-tree|startup-config|terminal|timezone|upgrade-status| version|wireless|wwan|context] do ssh <IP> do telnet <IP/HOSTNAME> do terminal [length <LINES>|width <CHARACTERS>] do time-it <CLI-COMMAND> do traceroute <ARGS>
  • 232. 4 - 68 WiNG CLI Reference Guide do upgrade [<FILE>|<URL> do upgrade-abort {on <DEVICE>} do watch <TIME> <CLI-COMMAND> do write [memory|terminal] Parameters • do ap-upgrade [<DEVICE-NAME>|all|all|ap621|ap650|ap6511|ap6521|ap6532|ap71xx| load-image|rf-domain|cancel-upgrade] ap-upgrade Runs the ap-upgrade command For more information on the AP upgrade command, see ap-upgrade. • do archive tar [/create|/table|/xtract] [<FILE>|<URL>] archive Runs the archive command For more information on the archive command, see archive. • do boot system [primary|secondary] {on <DEVICE-NAME>} boot Configures the image used for the next boot For more information on the boot command, see boot. • do cd {<DIR>} cd <DIR> Runs the command to change the present working directory For more information on the cd command see dir. • do change-passwd {<OLD-PASSWORD>} {<NEW-PASSWORD>} change-passwd Changes password of the logged user {<OLD-PASSWORD>} For more information on the clear command, see change-passwd. {<NEW-PASSWORD>} • do clear [arp-cache|cdp|counters|event-history|firewall|ip|lldp|spanning-tree| crypto] clear Clears some configurations For more information on the clear command, see clear. • do clock set <TIME> <DAY> <MONTH> <YEAR> clock set <TIME> <DAY> Sets the device’s time and date <MONTH> <YEAR> For more information on the clock command, see clock. • do clrscr clrscr Clears the current screen For more information on the clrscr command, see clrscr. • do cluster start-election cluster start-election Starts the configuration for creating a cluster of servers For more information on the cluster command, see cluster.
  • 233. GLOBAL CONFIGURATION COMMANDS 4 - 69 • do commit writer memory commit write memory Commits the changes made in the current CLI session For more information on the commit command, see commit. • do configure [terminal|self] configure [terminal|self] Changes the configuration mode For more information on the configure command, see configure. • do connect [<REMOTE-DEVICE>|mint-id <DEVICE-MINT-ID>] connect [<REMOTE-DEVICE>| Connects to a remote device to configure it. This command uses a device’s hostname or mint-id <DEVICE-MINT-ID>] its MiNT ID to connect. For more information on the connect command, see connect. • do copy [<SOURCE-FILE>|<SOURCE-URL>] [<DESTINATION-FILE>|<DESTINATION-URL>] copy [<SOURCE-FILE>| Copies a file from one location to another <SOURCE-URL>] For more information on the copy command, see copy. [<DESTINATION-FILE>| <DESTINATION-URL>] • do crypto [key|pki] crypto [key|pki] Configures the crypto command For more information on the crypto command, see crypto. • do delete /force /recursive <FILE> delete /force /recursive <FILE> Deletes a file from the device’s file system For more information on the delete command, see disable. • do diff [<FILE1>|<URL1>] [<FILE2>|<URL2>] diff [<FILE1>|<URL1>] Compares two files and displays the difference between them [<FILE2>|<URL2>] For more information on the diff command, see diff. • do dir {/all} {/recursive} {<DIR>} {all-filesystems} dir {/all} {/recursive} {<DIR>} Displays the content of a directory in the device’s file system {all-filesystems} For more information on the dir command, see dir. • do disable disable Moves the control to the User Exec mode For more information on the disable command, see disable. • do edit <FILE> edit <FILE> Edits a file For more information on the edit command, see edit.
  • 234. 4 - 70 WiNG CLI Reference Guide • do enable enable Moves the mode to Privilege Exec mode For more information on the enable command, see enable. • do erase [cf:|flash:|nvram:|startup-config|usb1] do erase [cf:|flash:|nvram:| Erases the content of the specified storage device. Also erases the startup startup-config|usb1] configuration to restore the device to its default. For more information on the erase command, see erase. • do exit exit Exits the CLI For more information on the exit command, see exit. • do format cf: format cf: Formats the CF card installed on the device For more information on the format command, see format. • do halt {on <DEVICE-NAME>} halt {on <DEVICE-NAME>} Stops the device For more information on the halt command, see halt. • do help {[search|show]} help {[search|show]} Displays the command line interface help For more information on the help command, see help. • do logging monitor {[<0-7>|alerts|critical|debugging|emergencies|errors| informational|notification|warnings]} logging monitor Configures the logging level for the device {<0-7>|alerts|critical| For more information on the logging command, see logging. debugging|emergencies| errors|informational| notification|warnings} • do mint [ping|traceroute] <MINT-DEVICE-ID> mint [ping|traceroute] Performs MiNT operations such as ping and traceroute <MINT-DEVICE-ID> For more information on the mint command, see mint. • do mkdir <DIR> mkdir <DIR> Creates a directory in the device’s file structure For more information on the dir command, see mkdir. • do more <FILE> more <FILE> Displays a file in the console window For more information on the more command, see more.
  • 235. GLOBAL CONFIGURATION COMMANDS 4 - 71 • do no [adoption|captive-portal|crypto|debug|page|service|terminal| upgrade|wireless|logging] no [adoption| Reverts or negates a command captive-portal| For more information on the no command, see the respective profiles and modes. crypto|debug|page| service| terminal|upgrade| wireless|logging] • do page page Toggles paging of the command line interface For more information on the page command, see page. • do ping <IP> ping <IP> Pings a device to check its availability For more information on the ping command, see ping. • do pwd pwd Displays the current working directory For more information on the pwd command, see pwd. • do reload {[cancel|force|in|on]} reload {[cancel|force|in|on]} Halts the device and performs a warm reboot For more information on the reload command, see reload. • do rename <FILE> rename <FILE> Renames a file on the device’s file system For more information on the rename command, see rename. • do revert revert Reverts the changes made to the system during the current CLI session For more information on the revert command, see revert. • do rmdir <DIR> rmdir <DIR> Removes a directory in the device’s file system For more information on the rmdir command, see rmdir. • do self self Loads the configuration context of the device currently logged into For more information on the self command, see self.
  • 236. 4 - 72 WiNG CLI Reference Guide • do service [advanced-wips|ap300|clear|cli-tables-expand|cli-tables-skin|cluster| copy|force-send-config|locator|mint|noc|pktcap|pm|radio|radius|set|show| smart-rf|start-shell|wireless|signal service [advanced-wips| Performs the different service commands ap300|clear|cli-tables-expand| For more information on the service commands, see service. cli-tables-skin|cluster| copy|force-send-config| locator|mint|noc|pktcap|pm| radio|radius|set|show| smart-rf|start-shell| wireless|signal • do show [adoption|advanced-wips|ap-upgrade|boot|captive-portal|cdp|clock| cluster|commands|critical-resources|crypto|debug|debugging|device-categorization| event-history|event-system-policy|file|firewall|interface|ip| ip-access-list-stats|licenses|lldp|logging|mac-access-list-stats| mac-address-table|mint|noc|ntp|password-encryption|power|reload|remote-debug| rf-domain-manager|role|running-config session-changes|session-config| sessions-smart-rf|spanning-tree|startup-config|terminal|timezone|upgrade-status| version|wireless|wwan|context] show [adoption| Displays information about the state of device, its configuration, its current status, and advanced-wips|ap-upgrade| statistics boot|captive-portal| For more information on the show command, see show. cdp|clock|cluster|commands| critical-resources| crypto|debug| debugging| device-categorization| event-history| event-system-policy| file|firewall|interface|ip| ip-access-list-stats| licenses|lldp|logging| mac-access-list-stats| mac-address-table|mint|noc| ntp|password-encryption| power|reload|remote-debug| rf-domain-manager|role| running-config| session-changes| session-config| sessions-smart-rf| spanning-tree|startup-config| terminal|timezone| upgrade-status|version| wireless|wwan|context] • do ssh <IP> ssh <IP> Connects to a device using the SSH protocol For more information on the SSH command, see ssh.
  • 237. GLOBAL CONFIGURATION COMMANDS 4 - 73 • do telnet <IP/HOSTNAME> telnet <IP/HOSTNAME> Connects to a device using the Telnet protocol For more information on the Telnet command, see telnet. • do terminal [length <LINES>|width <CHARACTERS>] do terminal [length <LINES>| Configures the CLI display characteristics width <CHARACTERS>] For more information on the terminal command, see terminal. • do time-it <CLI-COMMAND> time-it <CLI-COMMAND> Captures the time required to execute a command in the CLI For more information on the time-it command, see time-it. • do traceroute <ARGS> traceroute <ARGS> Traces the path to the target devices through the network For more information on the traceroute command, see traceroute. • do upgrade [<FILE>|<URL> upgrade [<FILE>|<URL> Upgrades the device’s firmware from a file or a location For more information on the upgrade command, see upgrade. • do upgrade-abort {on <DEVICE>} upgrade-abort {on <DEVICE- Aborts an upgrade in progress on the logged device or remote device NAME>} For more information on the upgrade abort command, see upgrade-abort. • do watch <TIME> <CLI-COMMAND> watch <TIME> Repeats a CLI command at a periodic interval <CLI-COMMAND> For more information on the watch command, see watch. • do write [memory|terminal] write [memory|terminal] Writes the changes made to the running configuration to the memory or to the terminal For more information on the write command, see write.
  • 238. 4 - 74 WiNG CLI Reference Guide Examples rfs7000-37FABE(config)#do ? ap-upgrade AP firmware upgrade archive Manage archive files boot Boot commands cd Change current directory change-passwd Change password clear Clear clock Configure software system clock cluster Cluster commands commit Commit all changes made in this session configure Enter configuration mode connect Open a console connection to a remote device copy Copy from one file to another crypto Encryption related commands debug Debugging functions delete Deletes specified file from the system. diff Display differences between two files dir List files on a filesystem disable Turn off privileged mode command edit Edit a text file enable Turn on privileged mode command erase Erase a filesystem format Format file system halt Halt the system help Description of the interactive help system logging Modify message logging facilities mint MiNT protocol mkdir Create a directory more Display the contents of a file no Negate a command or set its defaults page Toggle paging ping Send ICMP echo messages pwd Display current directory reload Halt and perform a warm reboot remote-debug Troubleshoot remote system(s) rename Rename a file revert Revert changes rmdir Delete a directory self Config context of the device currently logged into ssh Open an ssh connection telnet Open a telnet connection terminal Set terminal line parameters time-it Check how long a particular command took between request and completion of response traceroute Trace route to destination upgrade Upgrade software image upgrade-abort Abort an ongoing upgrade watch Repeat the specific CLI command at a periodic interval write Write running configuration to memory or terminal clrscr Clears the display screen exit Exit from the CLI service Service Commands show Show running system information rfs7000-37FABE(config)# Related Commands ap-upgrade Runs the ap update command archive Runs the archive command boot Configures the image used for the next boot cd Runs the command to change the present working directory
  • 239. GLOBAL CONFIGURATION COMMANDS 4 - 75 change-passwd Changes the password for the current login user clear Clears some configurations clock Configures a device’s time and date clrscr Clears the current screen cluster Starts the configuration for creating a cluster of servers commit Commits changes made in the current CLI session configure Changes the configuration mode connect Configures a remote device. This command uses a device’s hostname or MiNT ID to connect. copy Copies a file from one location to another crypto Configures the crypto command delete Deletes a file from a device’s filesystem diff Compares two files and displays the difference dir Displays the content of a directory in the device’s file system disable Moves the control to the User Exec mode edit Edits a file enable Moves the mode to Privilege Exec mode enable Erases the content of the specified storage device. Also erases the startup configuration to restore the device to its default. exit Exits from the CLI format Formats the CF card installed on a device halt Stops a device help Displays the CLI help logging Configures a device’s logging mint Performs MiNT operations such as ping and traceroute mkdir Creates a directory in the device’s file structure more Displays a file in the console window no Reverts or negates a command page Toggles paging of the command line interface ping Pings a device to check its availability pwd Displays the current working directory reload Halts a device and performs a warm reboot rename Renames a file on a device’s file system
  • 240. 4 - 76 WiNG CLI Reference Guide revert Reverts changes made to the system during the current CLI session rmdir Removes a directory in a device’s file system self Loads a device’s configuration context service Executes service commands ssh Connects to a device using SSH show Displays a device’s state, configuration, and statistics telnet Uses Telnet to connect to a device terminal Configures the CLI display characteristics time-it Captures the time required to execute a command in the CLI traceroute Traces the path to target devices upgrade Upgrades a device’s firmware from a file or a location upgrade-abort Aborts an upgrade in progress on a logged or a remote device watch Repeats a CLI command at a periodic interval write Writes the changes made in the current session to the memory
  • 241. GLOBAL CONFIGURATION COMMANDS 4 - 77 4.1.21 end Global Configuration Commands Ends and exits the current mode and moves to the PRIV EXEC mode The prompt changes to the PRIV EXEC mode. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax end Parameters None Examples rfs7000-37FABE(config)#end rfs7000-37FABE#
  • 242. 4 - 78 WiNG CLI Reference Guide 4.1.22 event-system-policy Global Configuration Commands Configures how events are supported by the wireless controller. Each event can be configured individually to perform an action such as sending an e-mail or forwarding a notification to its parent wireless controller etc. Table 4.10 Event System Policy Commands Command Description Reference event-system-policy Configures the event system policy page 4-79
  • 243. GLOBAL CONFIGURATION COMMANDS 4 - 79 4.1.22.1 event-system-policy event-system-policy Configures a system wide events handling policy Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax event-system-policy <EVENT-SYSTEM-POLICY> Parameters • event-system-policy <EVENT-SYSTEM-POLICY> <EVENT-SYSTEM-POLICY> Specify the event system policy name. If the policy does not exist, it is created. Examples rfs7000-37FABE(config)#event-system-policy event-testpolicy rfs7000-37FABE(config-event-system-policy-event-testpolicy)#? rfs7000-37FABE(config-event-system-policy-event-testpolicy)#? Event System Policy Mode commands: event Configure an event no Negate a command or set its defaults clrscr Clears the display screen commit Commit all changes made in this session do Run commands from Exec mode end End current mode and change to EXEC mode exit End current mode and down to previous mode help Description of the interactive help system revert Revert changes service Service Commands show Show running system information write Write running configuration to memory or terminal rfs7000-37FABE(config-event-system-policy-event-testpolicy)# Related Commands no Removes an event system policy
  • 244. 4 - 80 WiNG CLI Reference Guide 4.1.22.2 event-system-policy mode commands event-system-policy Table 4.11 summarizes event system policy mode commands Table 4.11 event-system-policy mode commands Command Description Reference event Configures an event page 4-81 no Negates a command or sets its default values page 4-91 clrscr Clears the display screen page 5-3 commit Commits (saves) changes made in the current session page 5-4 do Runs commands from EXEC mode page 4-66 end Ends and exits the current mode and moves to the PRIV EXEC mode page 5-5 exit Ends the current mode and moves to the previous mode page 5-6 help Displays the interactive help system page 5-7 revert Reverts changes to their last saved configuration page 5-13 service Invokes service commands to troubleshoot or debug (config-if) instance page 5-14 configurations show Displays running system information page 6-4 write Writes information to memory or terminal page 5-42
  • 245. GLOBAL CONFIGURATION COMMANDS 4 - 81 4.1.22.2.1 event event-system-policy mode commands Configures an event and sets the action performed when the event happens Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax event <EVENT-TYPE> <EVENT> (email,forward-to-switch,snmp,syslog) [default|on|off] NOTE: The parameter values for <event type> and <event name> are summarized in the table under the Parameters section.
  • 246. 4 - 82 WiNG CLI Reference Guide Parameters • event <EVENT-TYPE> <EVENT> (email,forward-to-switch,snmp,syslog) [default|on|off] <event type> <event name> aaa Configures authentication, authorization, and accounting related event messages • radius-discon-msg – RADIUS disconnection message • radius-session-expired – RADIUS session expired message • radius-session-not-started – RADIUS session not started message • radius-vlan-update – RADIUS VLAN update message adv-wips Configures advanced WIPS related event messages • adv-wips-event-1 – Event adv-wips-event-1 message • adv-wips-event-10 – Event adv-wips-event-10 message • adv-wips-event-105 – Event adv-wips-event-105 message • adv-wips-event-109 – Event adv-wips-event-109 message • adv-wips-event-11 – Event adv-wips-event-11 message • adv-wips-event-110 – Event adv-wips-event-110 message • adv-wips-event-111 – Event adv-wips-event-111 message • adv-wips-event-112 – Event adv-wips-event-112 message • adv-wips-event-113 – Event adv-wips-event-113 message • adv-wips-event-114 – Event adv-wips-event-114 message • adv-wips-event-115 – Event adv-wips-event-115 message • adv-wips-event-116 – Event adv-wips-event-116 message • adv-wips-event-117 – Event adv-wips-event-117 message • adv-wips-event-118 – Event adv-wips-event-118 message • adv-wips-event-119 – Event adv-wips-event-119 message • adv-wips-event-12 – Event adv-wips-event-12 message • adv-wips-event-120 – Event adv-wips-event-120 message • adv-wips-event-121 – Event adv-wips-event-121 message • adv-wips-event-13 – Event adv-wips-event-13 message • adv-wips-event-14 – Event adv-wips-event-14 message • adv-wips-event-142 – Event adv-wips-event-142 message • adv-wips-event-16 – Event adv-wips-event-16 message • adv-wips-event-19 – Event adv-wips-event-19 message • adv-wips-event-2 – Event adv-wips-event-2 message • adv-wips-event-21 – Event adv-wips-event-21message • adv-wips-event-220 – Event adv-wips-event-220 message
  • 247. GLOBAL CONFIGURATION COMMANDS 4 - 83 <event type> <event name> • adv-wips-event-221 – Event adv-wips-event-221 message • adv-wips-event-222 – Event adv-wips-event-222 message • adv-wips-event-25 – Event adv-wips-event-25 message • adv-wips-event-26 – Event adv-wips-event-26 message • adv-wips-event-29 – Event adv-wips-event-29 message • adv-wips-event-3 – Event adv-wips-event-3 message • adv-wips-event-47 – Event adv-wips-event-47 message • adv-wips-event-63 – Event adv-wips-event-63 message • adv-wips-event-87 – Event adv-wips-event-87 message ap Configures AP event messages • adopted – Event AP adopted message • adopted-to-controller – Event AP adopted to wireless controller message • ap-adopted – Event access port adopted message • ap-autoup-done – Event AP autoup done message • ap-autoup-fail – Event AP autoup fail message • ap-autoup-needed – Event AP autoup needed message • ap-autoup-no-need – Event AP autoup not needed message • ap-autoup-reboot – Event AP autoup reboot message • ap-autoup-timeout – Event AP autoup timeout message • ap-autoup-ver – Event AP autoup version message • image-parse-failure – Event image parse failure message • legacy-auto-update – Event legacy auto update message • no-image-file – Event no image file message • reset – Event reset message • sw-conn-lost – Event software connection lost message • unadopted – Event unadopted message captive-portal Configures captive portal (hotspot) related event messages • allow-access – Event client allowed access message • auth-failed – Event authentication failed message • auth-success – Event authentication success message • client-disconnect – Event client disconnected message • client-removed – Event client removed message • flex-log-access – Event flexible log access granted to client message • inactivity-timeout – Event client time-out due to inactivity message • purge-client – Event client purged message • session-timeout – Event session timeout message
  • 248. 4 - 84 WiNG CLI Reference Guide <event type> <event name> certmgr Configures certificate manager related event messages • ca-cert-actions-failure – Event CA certificate actions failure message • ca-cert-actions-success – Event CA certificate actions success message • ca-key-actions-failure – Event CA key actions failure message • ca-key-actions-success – Event CA key actions success message • cert-expiry – Event certificate expiry message • crl-actions-failure – Event Certificate Revocation List (CRL) actions failure message • crl-actions-success – Event CRL actions success message • csr-export-failure – Event CSR export failure message • csr-export-success – Event CSR export success message • delete-trustpoint-action – Event delete trustpoint action message • export-trustpoint – Event export trustpoint message • import-trustpoint – Event import trustpoint message • rsa-key-actions-failure – Event RSA key actions failure message • rsa-key-actions-success – Event RSA key actions success message • svr-cert-actions-success – Event server certificate actions success message • svr-cert-actions-failure – Event server certificate actions failure message cfgd Configures configuration daemon module related event messages • acl-attached-altered – Event Access List (ACL) attached altered message • acl-rule-altered – Event ACL rule altered message cluster Configures cluster module related messages • max-exceeded – Event maximum cluster count exceeded message crm Configures Critical Resource Monitoring related event messages • critical-resource-down – Event Critical Resource Down message • critical-resource-up – Event Critical Resource Up message dhcpsvr Configures DHCP server related event messages • dhcp-start – Event DHCP server started message • dhcpsvr-stop – Event DHCP sever stopped message • relay-iface-no-ip – Event no IP address on DHCP relay interface message • relay-no-iface – Event no interface for DHCP relay message • relay-start – Event relay agent started • relay-stop – Event DHCP relay agent stopped
  • 249. GLOBAL CONFIGURATION COMMANDS 4 - 85 <event type> <event name> diag Configures diagnostics module related event messages • autogen-tech-sprt – Event autogen technical support message • buf-usage – Event buffer usage message • cpu-load – Event CPU load message • disk-usage – Event disk usage message • elapsed-time – Event elapsed time message • fan-underspeed – Event fan underspeed message • fd-count – Event forward count message • free-flash-disk – Event free flash disk message • free-flash-inodes – Event free flash inodes message • free-nvram-disk – Event free nvram disk message • free-nvram-inodes – Event free nvram inodes message • free-ram – Event free ram message • free-ram-disk – Event free ram disk message • free-ram-inodes – Event free ram inodes message • head-cache-usage – Event head cache usage message • high-temp – Event high temp message • ip-dest-usage – Event ip destination usage message • led-identify – Event led identify message • low-temp – Event low temp message • new-led-state – Event new led state message • over-temp – Event over temp message • over-voltage – Event over voltage message • poe-init-fail – Event PoE init fail message • poe-power-level – Event PoE power level message • poe-read-fail – Event PoE read fail message • poe-state-change – Event PoE state change message • ram-usage – Event ram usage message • under-voltage – Event under voltage message • wd-reset-sys – Event wd reset system message • wd-state-change – Event wd state change message
  • 250. 4 - 86 WiNG CLI Reference Guide <event type> <event name> dot11 Configures 802.11 management module related event messages • client-associated – Wireless client associated event message • client-denied-assoc – Event client denied association message • client-disassociated – Wireless client disassociated message • country-code – Event country code message • country-code-error – Event country code error message • eap-cached-keys – Event EAP cached keys message • eap-client-timeout – Event EAP client timeout message • eap-failed – Event EAP failed message • eap-opp-cached-keys – Event EAP opp cached keys message • eap-preauth-client-timeout – Event EAP pre authentication client timeout message • eap-preauth-failed – Event EAP pre authentication failed message • eap-preauth-server-timeout – Event EAP pre authentication server timeout message • eap-preauth-success – Event EAP pre authentication success message • eap-server-timeout – Event EAP server timeout message • eap-success – Event EAP success message • kerberos-client-failed – Event Kerberos client failed message • kerberos-client-success – Event Kerberos client success message • kerberos-wlan-failed – Event Kerberos WLAN failed message • kerberos-wlan-success – Event Kerberos WLAN success message • kerberos-wlan-timeout – Event Kerberos WLAN timeout message • tkip-cntrmeas-end – Event TKIP cntrmeas end message • tkip-cntrmeas-start – Event TKIP cntrmeas start message • tkip-mic-fail-report – Event TKIP mic fail report message • tkip-mic-failure – Event TKIP mic failure message • unsanctioned-ap-active – Event unsanctioned AP active message • unsanctioned-ap-inactive – Event unsanctioned AP inactive message • unsanctioned-ap-status-change – Event unsanctioned AP status change • voice-call-completed – Event voice call completed message • voice-call-failed – Event voice call failed message • wpa-wpa2-failed – Event WPA-WPA2 failed message • wpa-wpa2-key-rotn – Event WPA-WPA2 key rotn message • wpa-wpa2-success – Event WPA-WPA2 success message
  • 251. GLOBAL CONFIGURATION COMMANDS 4 - 87 <event type> <event name> filemgmt Configures file management module related event messages • http – Event HTTP message • httplocal – Event HTTP local message • https-start – Event HTTPS start message • https-wait – Event HTTPS wait message • httpstart – Event HTTP start message • keyadded – Event key added message • keydeleted – Event key deleted message • trustpointdeleted – Event trustpoint deleted message fwu Configures firmware update related event messages • fwuaborted – Event fwu aborted message • fwubadconfig – Event fwu bad config message • fwucorruptedfile – Event fwu corrupted file message • fwucouldntgetfile – Event fwu could not get file message • fwudone – Event fwu done message • fwufileundef – Event fwu file undefined message • fwunoneed – Event fwu no need message • fwuprodmismatch – Event fwu prod mismatch message • fwuserverundef – Event fwu server undefined message • fwuserverunreachable – Event fwu server unreachable message • fwusignmismatch – Event fwu signature mismatch message • fwusyserr – Event fwu system error message • fwuunsupportedhw – Event fwu unsupported hardware message • fwuvermismatch – Event fwu version mismatch message licmgr Configures license manager module related event messages • lic-installed-count – Event total number of license installed count message • lic-installed-default – Event default license installation message • lic-installed – Event license installed message • lic-invalid – Event license installation failed message • lic-removed – Event license removed message mesh Configures mesh module related event messages • mesh-link-down – Event mesh link down message • mesh-link-up – Event mesh link up message
  • 252. 4 - 88 WiNG CLI Reference Guide <event type> <event name> nsm Configures Network Service Module (NSM) related event message • dhcpc-err – Event DHCP certification error message • dhcpdefrt – Event DHCP defrt message • dhcpip – Event DHCP IP message • dhcpipchg – Event DHCP IP change message • dhcpipnoadd – Event DHCP IP overlaps static IP address message • dhcplsexp – Event DHCP lease expiry message • dhcpnak – Event DHCP server returned DHCP NAK response • ifdown – Event interface down message • ifipcfg – Event interface IP config message • ifup – Event interface up message pm Configures process monitor module related event messages • procid – Event proc ID message • procmaxrstrt – Event proc max restart message • procnoresp – Event proc no response message • procrstrt – Event proc restart message • procstart – Event proc start message • procstop – Event proc stop message • procsysrstrt – Event proc system restart message • startupcomplete – Event startup complete message radconf Configures RADIUS configuration daemon related event messages • could-not-stop-radius – Event could not stop RADIUS server message • radiusdstart – Event RADIUS server started message • radiusdstop – Event RADIUS server stopped message radio Configures radio module related event messages • acs-scan-complete – Event ACS scan completed • acs-scan-started – Event ACS scan started • radar-detected – Event radar detected message • radar-scan-completed – Event radar scan completed message • radar-scan-started – Event radar scan started message • radio-state-change – Event radio state change message • resume-home-channel – Event resume home channel message securitymgr Configures the security manager module related event messages • deprecatedcli – Event deprecated CLI message • fatal-hit – Event fatal hit message • log-cli-error – Event log CLI error message • userpassstrength – Event user pass strength message
  • 253. GLOBAL CONFIGURATION COMMANDS 4 - 89 <event type> <event name> smrt Configures SMART RF module related event messages • calibration-done – Event calibration done message • calibration-started – Event calibration started message • config-cleared – Configuration cleared event message • cov-hole-recovery – Event coverage hole recovery message • cov-hole-recovery-done – Event coverage hole recovery done message • interference-recovery – Event interference recovery message • neighbor-recovery – Event neighbor recovery message • power-adjustment – Event power adjustment message smtpnot Configures SMTP module related event messages • cfg – Event cfg message • cfginc – Event cfg inc message • net – Event net message • proto – Event proto message • smtpauth – Event SMTP authentication message • smtperr – Event SMTP error message • smtpinfo – Event SMTP information message system Configures system module related event messages • clock-reset – Event clock reset message • http – Event HTTP message • login – Event successful login message • login-fail – Event login fail message. Occurs when user authentication fails. • login-fail-access – Event login fail access message.Occurs in case of access violation. • login-fail-bad-role – Event login fail bad role message. Occurs when user uses an invalid role to logon. • logout – Event logout message • panic – Event panic message • procstop – Event proc stop message • system-autoup-disable – Event system autoup disable message • system-autoup-enable – Event system autoup enable message • ui-user-auth-fail – Event user authentication fail message • ui-user-auth-success – Event user authentication success message
  • 254. 4 - 90 WiNG CLI Reference Guide <event type> <event name> test Configures the test module related event messages • testalert – Event test alert message • testargs – Event test arguments message • testcrit – Event test critical message • testdebug – Event test debug message • testemerg – Event test emergency message • testerr – Event test error message • testinfo – Event test information message • testnotice – Event test notice message • testwarn – Event test warning message wips Configures the Wireless IPS module related event messages • wips-client-blacklisted – Event WIPS client blacklisted message • wips-client-rem-blacklist – Event WIPS client rem blacklist message • wips-event – Event WIPS event triggered message email Sends e-mail notifications to a pre configured e-mail ID forward-to-switch Forwards the messages to an external server snmp Logs an SNMP event syslog Logs event to syslog default Performs the default action for the event off Switches the event off, when the event happens, no action is performed on Switches the event on, when the event happens, the configured action is taken Examples rfs7000-37FABE(config-event-system-policy-event-testpolicy)#event aaa radius-discon- msg email on forward-to-switch default snmp default syslog default rfs7000-37FABE(config-event-system-policy-event-testpolicy)# rfs7000-37FABE(config-event-system-policy-adv-wips)# rfs7000-37FABE(config-event-system-policy-testpolicy)#show context event-system-policy testpolicy event sole adaptererr syslog off snmp off forward-to-switch off rfs7000-37FABE(config-event-system-policy-testpolicy)# Related Commands no Resets or disables events commands
  • 255. GLOBAL CONFIGURATION COMMANDS 4 - 91 4.1.22.2.2 no event-system-policy mode commands Negates an event configuration Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax no [<event type>] [<event name>] [email|forward-to-switch|snmp|syslog] [default|on|off]
  • 256. 4 - 92 WiNG CLI Reference Guide Parameters • no event <EVENT-TYPE> <EVENT> (email,forward-to-switch,snmp,syslog) [default|on|off] <event type> <event name> aaa Resets authentication, authorization, and accounting related event messages • radius-discon-msg – RADIUS disconnection message • radius-session-expired – RADIUS session expired message • radius-session-not-started – RADIUS session not started message • radius-vlan-update – RADIUS VLAN update message adv-wips Resets advanced WIPS related event messages • adv-wips-event-1 – Event adv-wips-event-1 message • adv-wips-event-10 – Event adv-wips-event-10 message • adv-wips-event-105 – Event adv-wips-event-105 message • adv-wips-event-109 – Event adv-wips-event-109 message • adv-wips-event-11 – Event adv-wips-event-11 message • adv-wips-event-110 – Event adv-wips-event-110 message • adv-wips-event-111 – Event adv-wips-event-111 message • adv-wips-event-112 – Event adv-wips-event-112 message • adv-wips-event-113 – Event adv-wips-event-113 message • adv-wips-event-114 – Event adv-wips-event-114 message • adv-wips-event-115 – Event adv-wips-event-115 message • adv-wips-event-116 – Event adv-wips-event-116 message • adv-wips-event-117 – Event adv-wips-event-117 message • adv-wips-event-118 – Event adv-wips-event-118 message • adv-wips-event-119 – Event adv-wips-event-119 message • adv-wips-event-12 – Event adv-wips-event-12 message • adv-wips-event-120 – Event adv-wips-event-120 message • adv-wips-event-121 – Event adv-wips-event-121 message • adv-wips-event-13 – Event adv-wips-event-13 message • adv-wips-event-14 – Event adv-wips-event-14 message • adv-wips-event-142 – Event adv-wips-event-142 message • adv-wips-event-16 – Event adv-wips-event-16 message • adv-wips-event-19 – Event adv-wips-event-19 message • adv-wips-event-2 – Event adv-wips-event-2 message • adv-wips-event-21 – Event adv-wips-event-21message • adv-wips-event-220 – Event adv-wips-event-220 message
  • 257. GLOBAL CONFIGURATION COMMANDS 4 - 93 <event type> <event name> • adv-wips-event-221 – Event adv-wips-event-221 message • adv-wips-event-222 – Event adv-wips-event-222 message • adv-wips-event-25 – Event adv-wips-event-25 message • adv-wips-event-26 – Event adv-wips-event-26 message • adv-wips-event-29 – Event adv-wips-event-29 message • adv-wips-event-3 – Event adv-wips-event-3 message • adv-wips-event-47 – Event adv-wips-event-47 message • adv-wips-event-63 – Event adv-wips-event-63 message • adv-wips-event-87 – Event adv-wips-event-87 message ap Resets AP event messages • adopted – Event AP adopted message • adopted-to-controller – Event AP adopted to wireless controller message • ap-adopted – Event access port adopted message • ap-autoup-done – Event AP autoup done message • ap-autoup-fail – Event AP autoup fail message • ap-autoup-needed – Event AP autoup needed message • ap-autoup-no-need – Event AP autoup not needed message • ap-autoup-reboot – Event AP autoup reboot message • ap-autoup-timeout – Event AP autoup timeout message • ap-autoup-ver – Event AP autoup version message • image-parse-failure – Event image parse failure message • legacy-auto-update – Event legacy auto update message • no-image-file – Event no image file message • reset – Event reset message • sw-conn-lost – Event software connection lost message • unadopted – Event unadopted message captive-portal Resets captive portal (hotspot) related event messages • allow-access – Event client allowed access message • auth-failed – Event authentication failed message • auth-success – Event authentication success message • client-disconnect – Event client disconnected message • client-removed – Event client removed message • flex-log-access – Event flexible log access granted to client message • inactivity-timeout – Event client timed out due to inactivity message • purge-client – Event client purged message • session-timeout – Event session timeout message
  • 258. 4 - 94 WiNG CLI Reference Guide <event type> <event name> certmgr Resets certificate manager related event messages • ca-cert-actions-failure – Event CA certificate actions failure message • ca-cert-actions-success – Event CA certificate actions success message • ca-key-actions-failure – Event CA key actions failure message • ca-key-actions-success – Event CA key actions success message • cert-expiry – Event certificate expiry message • crl-actions-failure – Event CRL actions failure message • crl-actions-success – Event CRL actions success message • csr-export-failure – Event CSR export failure message • csr-export-success – Event CSR export success message • delete-trustpoint-action – Event delete trustpoint action message • export-trustpoint – Event export trustpoint message • import-trustpoint – Event import trustpoint message • rsa-key-actions-failure – Event RSA key actions failure message • rsa-key-actions-success – Event RSA key actions success message • srv-cert-actions-success – Event server certificate actions success message • svr-cert-actions-failure – Event server certificate actions failure message cfgd Resets configuration daemon module related event messages • acl-attached-altered – Event ACL attached altered message • acl-rule-altered – Event ACL rule altered message cluster Resets cluster module related messages • max-exceeded – Event maximum cluster count exceeded message crm Resets Critical Resource Monitoring related event messages • critical-resource-down – Event Critical Resource Down message • critical-resource-up – Event Critical Resource Up message dhcpsvr Resets DHCP server related event messages • dhcp-start – Event DHCP server started message • dhcpsvr-stop – Event DHCP sever stopped message • relay-iface-no-ip – Event no IP address on DHCP relay interface message • relay-no-iface – Event no interface for DHCP relay message • relay-start – Event relay agent started • relay-stop – Event DHCP relay agent stopped
  • 259. GLOBAL CONFIGURATION COMMANDS 4 - 95 <event type> <event name> diag Resets diagnostics module related event messages • autogen-tech-sprt – Event autogen technical support message • buf-usage – Event buffer usage message • cpu-load – Event CPU load message • disk-usage – Event disk usage message • elapsed-time – Event elapsed time message • fan-underspeed – Event fan underspeed message • fd-count – Event forward count message • free-flash-disk – Event free flash disk message • free-flash-inodes – Event free flash inodes message • free-nvram-disk – Event free nvram disk message • free-nvram-inodes – Event free nvram inodes message • free-ram – Event free ram message • free-ram-disk – Event free ram disk message • free-ram-inodes – Event free ram inodes message • head-cache-usage – Event head cache usage message • high-temp – Event high temp message • ip-dest-usage – Event ip destination usage message • led-identify – Event led identify message • low-temp – Event low temp message • new-led-state – Event new led state message • over-temp – Event over temp message • over-voltage – Event over voltage message • poe-init-fail – Event PoE init fail message • poe-power-level – Event PoE power level message • poe-read-fail – Event PoE read fail message • poe-state-change – Event PoE state change message • ram-usage – Event ram usage message • under-voltage – Event under voltage message • wd-reset-sys – Event wd reset system message • wd-state-change – Event wd state change message
  • 260. 4 - 96 WiNG CLI Reference Guide <event type> <event name> dot11 Resets 802.11 management module related event messages • client-associated – Wireless client associated event message • client-denied-assoc – Event client denied association message • client-disassociated – Wireless client disassociated message • country-code – Event country code message • country-code-error – Event country code error message • eap-cached-keys – Event EAP cached keys message • eap-client-timeout – Event EAP client timeout message • eap-failed – Event EAP failed message • eap-opp-cached-keys – Event EAP opp cached keys message • eap-preauth-client-timeout – Event EAP pre authentication client timeout message • eap-preauth-failed – Event EAP pre authentication failed message • eap-preauth-server-timeout – Event EAP pre authentication server timeout message • eap-preauth-success – Event EAP pre authentication success message • eap-server-timeout – Event EAP server timeout message • eap-success – Event EAP success message • kerberos-client-failed – Event Kerberos client failed message • kerberos-client-success – Event Kerberos client success message • kerberos-wlan-failed – Event Kerberos WLAN failed message • kerberos-wlan-success – Event Kerberos WLAN success message • kerberos-wlan-timeout – Event Kerberos WLAN timeout message • tkip-cntrmeas-end – Event TKIP cntrmeas end message • tkip-cntrmeas-start – Event TKIP cntrmeas start message • tkip-mic-fail-report – Event TKIP mic fail report message • tkip-mic-failure – Event TKIP mic failure message • unsanctioned-ap-active – Event unsanctioned AP active message • unsanctioned-ap-inactive – Event unsanctioned AP inactive message • unsanctioned-ap-status-change – Event unsanctioned AP status change • voice-call-completed – Event voice call completed message • voice-call-failed – Event voice call failed message • wpa-wpa2-failed – Event WPA-WPA2 failed message • wpa-wpa2-key-rotn – Event WPA-WPA2 key rotn message • wpa-wpa2-success – Event WPA-WPA2 success message
  • 261. GLOBAL CONFIGURATION COMMANDS 4 - 97 <event type> <event name> filemgmt Resets file management module related event messages • http – Event HTTP message • httplocal – Event HTTP local message • https-start – Event HTTPS start message • https-wait – Event HTTPS wait message • httpstart – Event HTTP start message • keyadded – Event key added message • keydeleted – Event key deleted message • trustpointdeleted – Event trustpoint deleted message fwu Resets firmware update related event messages • fwuaborted – Event aborted message • fwubadconfig – Event bad config message • fwucorruptedfile – Event corrupted file message • fwucouldntgetfile – Event could not get file message • fwudone – Event done message • fwufileundef – Event file undefined message • fwunoneed – Event no need message • fwuprodmismatch – Event prod mismatch message • fwuserverundef – Event server undefined message • fwuserverunreachable – Event server unreachable message • fwusignmismatch – Event signature mismatch message • fwusyserr – Event system error message • fwuunsupportedhw – Event unsupported hardware message • fwuvermismatch – Event version mismatch message licmgr Resets license manager module related event messages • lic-installed-count – Event total number of license installed count message • lic-installed-default – Event default license installation message • lic-installed – Event license installed message • lic-invalid – Event license installation failed message • lic-removed – Event license removed message mesh Resets mesh module related event messages • mesh-link-down – Event mesh link down message • mesh-link-up – Event mesh link up message
  • 262. 4 - 98 WiNG CLI Reference Guide <event type> <event name> nsm Resets NSM related event messages • dhcpc-err – Event DHCP certification error message • dhcpdefrt – Event DHCP defrt message • dhcpip – Event DHCP IP message • dhcpipchg – Event DHCP IP change message • dhcpipnoadd – Event DHCP IP overlaps static IP address message • dhcplsexp – Event DHCP lease expiry message • dhcpnak – Event DHCP server returned DHCP NAK response • ifdown – Event interface down message • ifipcfg – Event interface IP config message • ifup – Event interface up message pm Resets process monitor module related event messages • procid – Event proc ID message • procmaxrstrt – Event proc max restart message • procnoresp – Event proc no response message • procrstrt – Event proc restart message • procstart – Event proc start message • procstop – Event proc stop message • procsysrstrt – Event proc system restart message • startupcomplete – Event startup complete message radconf Resets RADIUS configuration daemon related event messages • could-not-stop-radius – Event could not stop RADIUS server message • radiusdstart – Event RADIUS server started message • radiusdstop – Event RADIUS server stopped message radio Resets radio module related event messages • acs-scan-complete – Event ACS scan completed • acs-scan-started – Event ACS scan started • radar-detected – Event radar detected message • radar-scan-completed – Event radar scan completed message • radar-scan-started – Event radar scan started message • radio-state-change – Event radio state change message • resume-home-channel – Event resume home channel message securitymgr Resets the security manager module related event messages • deprecatedcli – Event deprecated CLI message • fatal-hit – Event fatal hit message • log-cli-error – Event log CLI error message • userpassstrength – Event user pass strength message
  • 263. GLOBAL CONFIGURATION COMMANDS 4 - 99 <event type> <event name> smrt Resets SMART RF module related event messages • calibration-done – Event calibration done message • calibration-started – Event calibration started message • config-cleared – Configuration cleared event message • cov-hole-recovery – Event coverage hole recovery message • cov-hole-recovery-done – Event coverage hole recovery done message • interference-recovery – Event interference recovery message • neighbor-recovery – Event neighbor recovery message • power-adjustment – Event power adjustment message smtpnot Resets SMTP module related event messages • cfg – Event cfg message • cfginc – Event cfg inc message • net – Event net message • proto – Event proto message • smtpauth – Event SMTP authentication message • smtperr – Event SMTP error message • smtpinfo – Event SMTP information message system Resets system module related event messages • clock-reset – Event clock reset message • http – Event HTTP message • login – Event successful login message • login-fail – Event login fail message. Occurs when user authentication fails. • login-fail-access – Event login fail access message.Occurs in case of access violation. • login-fail-bad-role – Event login fail bad role message. Occurs when user uses an invalid role to logon. • logout – Event logout message • panic – Event panic message • procstop – Event proc stop message • system-autoup-disable – Event system autoup disable message • system-autoup-enable – Event system autoup enable message • ui-user-auth-fail – Event ui user authentication fail message • ui-user-auth-success – Event ui user authentication success message
  • 264. 4 - 100 WiNG CLI Reference Guide <event type> <event name> test Resets the test module related event messages • testalert – Event test alert message • testargs – Event test arguments message • testcrit – Event test critical message • testdebug – Event test debug message • testemerg – Event test emergency message • testerr – Event test error message • testinfo – Event test information message • testnotice – Event test notice message • testwarn – Event test warning message wips Resets the Wireless IPS module related event messages • wips-client-blacklisted – Event WIPS client blacklisted message • wips-client-rem-blacklist – Event WIPS client rem blacklist message • wips-event – Event WIPS event triggered message Examples rfs7000-37FABE(config-event-system-policy-testpolicy)# rfs7000-37FABE(config-event-system-policy-testpolicy)#no event aaa % Error: event_system_policy[aaa] does not exist, unable to delete rfs7000-37FABE(config)# Related Commands event Configures the action taken for each event
  • 265. GLOBAL CONFIGURATION COMMANDS 4 - 101 4.1.23 firewall-policy Global Configuration Commands Configures a firewall policy. This policy defines a set of rules for managing network traffic and prevent unauthorized access to the network behind the firewall while allowing authorized devices access. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax firewall-policy <FIREWALL-POLICY-NAME> Parameters • firewall-policy <FIREWALL-POLICY-NAME> <FIREWALL-POLICY-NAME> Specify the firewall policy name. If a firewall policy does not exist, it is created. Examples rfs7000-37FABE(config)#firewall-policy test rfs7000-37FABE(config-fw-policy-test)# Related Commands no Removes an existing firewall policy NOTE: For more information on Firewall policy, see Chapter 14, FIREWALL-POLICY.
  • 266. 4 - 102 WiNG CLI Reference Guide 4.1.24 host Global Configuration Commands Enters the configuration context of a remote device using its hostname Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax host <DEVICE-NAME> Parameters • host <DEVICE-NAME> <DEVICE-NAME> Specify the device’s hostname. All discovered devices are displayed when ‘Tab’ is pressed to auto complete this command. Examples rfs7000-37FABE(config)#host rfs7000-37FABE rfs7000-37FABE(config-device-00-04-96-42-14-79)#
  • 267. GLOBAL CONFIGURATION COMMANDS 4 - 103 4.1.25 igmp-snoop-policy Global Configuration Commands Configures an IGMP snoop policy. IGMP snooping filters out multicast IGMP packets for those clients not subscribed to the IGMP multicast group. A wireless controller floods all ports in a IGMP broadcast domain by default. This can cause unnecessary load on host devices that have not subscribed to these streams, requiring them to process these unwanted packets. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 • RFS7000 Syntax igmp-snoop-policy <IGMP-SNOOP-POLICY-NAME> Parameters • igmp-snoop-policy <IGMP-SNOOP-POLICY-NAME> <IGMP-SNOOP-POLICY- Specify the IGMP snoop policy name. This policy is created if it does not exist. NAME> Examples rfs7000-37FABE(config)#igmp-snoop-policy test rfs7000-37FABE(config-igmp-snoop-policy-test)# rfs7000-37FABE(config-igmp-snoop-policy-test)#? commands: igmp-snooping Enable IGMP snooping no Negate a command or set its defaults querier Configure IGMP querier robustness-variable Configure IGMP Robustness Variable unknown-multicast-fwd Forward Unknown Multicast Packet clrscr Clears the display screen commit Commit all changes made in this session do Run commands from Exec mode end End current mode and change to EXEC mode exit End current mode and down to previous mode help Description of the interactive help system revert Revert changes service Service Commands show Show running system information write Write running configuration to memory or terminal rfs7000-37FABE(config-igmp-snoop-policy-test)#
  • 268. 4 - 104 WiNG CLI Reference Guide Related Commands no Removes an IGMP snoop policy NOTE: For more information on IGMP snooping and how to configure an IGMP snooping policy, see Chapter 15, IGMP-SNOOP-POLICY.
  • 269. GLOBAL CONFIGURATION COMMANDS 4 - 105 4.1.26 ip Global Configuration Commands Configures IP access control lists Access lists define access to the wireless controller managed network using a set of rules. Each rule specifies an action taken when a packet matches a given set of rules. If the action is deny, the packet is dropped. If the action is permit, the packet is allowed. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ip access-list <IP-ACCESS-LIST-NAME> Parameters • ip access-list <IP-ACCESS-LIST-NAME> access-list Configures an IP access list <IP-ACCESS-LIST-NAME> • <IP-ACCESS-LIST-NAME> – Specify the ACL name. If the access list does not exist, it is created.
  • 270. 4 - 106 WiNG CLI Reference Guide Examples rfs7000-37FABE(config)#ip access-list test rfs7000-37FABE(config-ip-acl-test)# rfs7000-37FABE(config-ip-acl-test)#? ACL Configuration commands: deny Specify packets to reject no Negate a command or set its defaults permit Specify packets to forward clrscr Clears the display screen commit Commit all changes made in this session end End current mode and change to EXEC mode exit End current mode and down to previous mode help Description of the interactive help system revert Revert changes service Service Commands show Show running system information write Write running configuration to memory or terminal rfs7000-37FABE(config-ip-acl-test)# Related Commands no Removes an IP access control list NOTE: For more information on Access Control Lists, see Chapter 12, ACCESS-LIST.
  • 271. GLOBAL CONFIGURATION COMMANDS 4 - 107 4.1.27 mac Global Configuration Commands Configures MAC access control lists Access lists define access to the wireless controller managed network using a set of rules. Each rule specifies an action taken when a packet matches a given set of rules. If the action is deny, the packet is dropped. If the action is permit, the packet is allowed. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax mac access-list <MAC-ACCESS-LIST-NAME> Parameters • mac access-list <MAC-ACCESS-LIST-NAME> access-list Configures a MAC access control list <IP-ACCESS-LIST-NAME> • <MAC-ACCESS-LIST-NAME> – Specify the ACL name. If the access control list does not exist, it is created.
  • 272. 4 - 108 WiNG CLI Reference Guide Examples rfs7000-37FABE(config)#mac access-list test rfs7000-37FABE(config-mac-acl-test)# rfs7000-37FABE(config-mac-acl-test)#? MAC Extended ACL Configuration commands: deny Specify packets to reject no Negate a command or set its defaults permit Specify packets to forward clrscr Clears the display screen commit Commit all changes made in this session end End current mode and change to EXEC mode exit End current mode and down to previous mode help Description of the interactive help system revert Revert changes service Service Commands show Show running system information write Write running configuration to memory or terminal rfs7000-37FABE(config-mac-acl-test)# Related Commands no Removes a MAC access control list NOTE: For more information on Access Control Lists, see Chapter 12, ACCESS-LIST.
  • 273. GLOBAL CONFIGURATION COMMANDS 4 - 109 4.1.28 management-policy Global Configuration Commands Configures a management policy. This policy configures parameters, such as services that run on a device, welcome messages, banners, and others. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax management-policy <MANAGEMENT-POLICY-NAME> Parameters • management-policy <MANAGEMENT-POLICY-NAME> <MANAGEMENT-POLICY- Specify the management policy name. If the policy does not exist, it is created. NAME> Examples rfs7000-37FABE(config)#management-policy test rfs7000-37FABE(config-management-policy-test)# Related Commands no Removes an existing management policy NOTE: For more information on the parameters that can be configured in a management policy, see Chapter 17, MANAGEMENT-POLICY.
  • 274. 4 - 110 WiNG CLI Reference Guide 4.1.29 mint-policy Global Configuration Commands Configures the global MiNT policy Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax mint-policy global-default Parameters • mint-policy global-default global-default Uses the global default policy Examples rfs7000-37FABE(config)#mint-policy global-default rfs7000-37FABE(config-mint-policy-global-default)# Related Commands no Removes an existing MiNT policy NOTE: For more information on MiNT policy, see Chapter 16, MINT-POLICY.
  • 275. GLOBAL CONFIGURATION COMMANDS 4 - 111 4.1.30 nac-list Global Configuration Commands Configures a policy, which configures a list of devices that can access a managed network based on their MAC addresses. Table 4.12 NAC List Commands Command Description Reference nac-list Creates a NAC list policy page 4-112
  • 276. 4 - 112 WiNG CLI Reference Guide 4.1.30.1 nac-list Global Configuration Commands Configures a Network Access Control (NAC) list that controls access to the wireless controller managed network Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax nac-list <NAC-LIST-NAME> Parameters • nac-list <NAC-LIST-NAME> <NAC-LIST-NAME> Specify the NAC list name. If the NAC list does not exist, it is created. Examples rfs7000-37FABE(config)#nac-list test rfs7000-37FABE(config-nac-list-test)# rfs7000-37FABE(config-nac-list-test)#? NAC List Mode commands: exclude Specify MAC addresses to be excluded from the NAC enforcement list include Specify MAC addresses to be included in the NAC enforcement list no Negate a command or set its defaults clrscr Clears the display screen commit Commit all changes made in this session do Run commands from Exec mode end End current mode and change to EXEC mode exit End current mode and down to previous mode help Description of the interactive help system revert Revert changes service Service Commands show Show running system information write Write running configuration to memory or terminal rfs7000-37FABE(config-nac-list-test)# Related Commands no Removes a NAC list
  • 277. GLOBAL CONFIGURATION COMMANDS 4 - 113 4.1.30.2 nac-list-mode Table 4.13 summarizes NAC list mode commands Table 4.13 nac-list-mode commands Command Description Reference exclude Specifies the MAC addresses excluded from the NAC enforcement list page 4-114 include Specifies the MAC addresses included in the NAC enforcement list page 4-115 no Cancels an exclude or an include NAC list rule page 4-116 clrscr Clears the display screen page 5-3 commit Commits (saves) changes made in the current session page 5-4 do Runs commands from EXEC mode page 4-66 end Ends and exits the current mode and moves to the PRIV EXEC mode page 5-5 exit Ends the current mode and moves to the previous mode page 5-6 help Displays the interactive help system page 5-7 revert Reverts changes to their last saved configuration page 5-13 service Invokes service commands to troubleshoot or debug (config-if) page 5-14 instance configurations show Displays running system information page 6-4 write Writes information to memory or terminal page 5-42
  • 278. 4 - 114 WiNG CLI Reference Guide 4.1.30.2.1exclude nac-list-mode Specifies the MAC addresses excluded from the NAC enforcement list Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax exclude <START-MAC> [<END-MAC> precedence <1-1000>|precedence <1-1000>] Parameters • exclude <START-MAC> [<END-MAC> precedence <1-1000>|precedence <1-1000>] <START-MAC> Specifies a range of MAC addresses or a single MAC address to exclude from the NAC enforcement list Specify the first MAC address in the range. Use this parameter to specify a single MAC address. <END-MAC> Specify the last MAC address in the range. precedence <1-1000> Sets the rule precedence. Exclude entries are checked in the order of their rule precedence. • <1-1000> – Specify a value from 1 - 1000. Examples rfs7000-37FABE(config-nac-list-test)#exclude 00-40-96-B0-BA-2A precedence 1 rfs7000-37FABE(config-nac-list-test)#
  • 279. GLOBAL CONFIGURATION COMMANDS 4 - 115 4.1.30.2.2include nac-list-mode Specifies the MAC addresses included in the NAC enforcement list Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax include <START-MAC> [<END-MAC> precedence <1-1000>|precedence <1-1000>] Parameters • include <START-MAC> [<END-MAC> precedence <1-1000>|precedence <1-1000>] <START-MAC> Specifies a range of MAC addresses or a single MAC address to include in the NAC enforcement list Specify the first MAC address in the range. Use this parameter to specify a single MAC address <END-MAC> Specify the last MAC address in the range. precedence <1-1000> Sets the rule precedence. Exclude entries are checked in the order of their rule precedence. • <1-1000> – Specify a value from 1 - 1000. Examples rfs7000-37FABE(config-nac-list-test)#include 00-40-96-B0-BA-2A precedence 1 rfs7000-37FABE(config-nac-list-test)#
  • 280. 4 - 116 WiNG CLI Reference Guide 4.1.30.2.3no nac-list-mode Cancels an exclude or an include NAC list rule Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax no [exclude|include] no [exclude|include] <START-MAC> [<END-MAC> precedence <1-1000>| precedence <1-1000>] Parameters • no [exclude|include] <START-MAC> [<END-MAC> precedence <1-1000>| precedence <1-1000>] no exclude Removes an exclude rule no include Removes an include rule <START-MAC> Specifies a range of MACs included in/removed from the NAC enforcement list Specify the first MAC address in the range. Use this parameter to specify a single MAC address. <END-MAC> Specify the last MAC address in the range. precedence <1-1000> Sets the rule precedence for this rule. Exclude entries are checked in the order of their rule precedence. • <1-1000> – Specify a value from 1 - 1000. Examples rfs7000-37FABE(config-nac-list-test)#no include 00-40-96-B0-BA-2A precedence 1 rrfs7000-37FABE(config-nac-list-test)#show context nac-list test rfs7000-37FABE(config-nac-list-test)# Related Commands exclude Specifies MAC addresses excluded from the NAC enforcement list include Specifies MAC addresses included in the NAC enforcement list
  • 281. GLOBAL CONFIGURATION COMMANDS 4 - 117 4.1.31 no Global Configuration Commands Negates a command, or reverts configured settings to their default values Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax no <parameter> Parameters None Examples rfs7000-37FABE(config)#no ? aaa-policy Delete a aaa policy advanced-wips-policy Delete an advanced-wips policy ap300 Delete an AP300 ap621 Delete an AP621 access point ap650 Delete an AP650 access point ap6511 Delete an AP6511 access point ap6521 Delete an AP6521 access point ap6532 Delete an AP6532 access point ap71xx Delete an AP71XX access point association-acl-policy Delete an association-acl policy auto-provisioning-policy Delete an auto-provisioning policy captive-portal Delete a captive portal critical-resource-policy Remove device onboard critical resource policy customize Restore the custom cli commands to default device Delete multiple devices device-categorization Delete device categorization object dhcp-server-policy DHCP server policy dns-whitelist Delete a whitelist object event-system-policy Delete a event system policy firewall-policy Configure firewall policy igmp-snoop-policy Remove device onboard igmp snoop policy ip Internet Protocol (IP) mac MAC configuration management-policy Delete a management policy nac-list Delete an network access control list password-encryption Disable password encryption in configuration profile Delete a profile and all its associated configuration radio-qos-policy Delete a radio QoS configuration policy radius-group Local radius server group configuration radius-server-policy Remove device onboard radius policy radius-user-pool-policy Configure Radius User Pool rf-domain Delete one or more RF-domains and all their associated configurations
  • 282. 4 - 118 WiNG CLI Reference Guide RFS4000 Delete an RFS4000 wireless controller RFS6000 Delete an RFS6000 wireless controller RFS7000 Delete an RFS7000 wireless controller role-policy Role based firewall policy smart-rf-policy Delete a smart-rf-policy wips-policy Delete a wips policy wlan Delete a wlan object wlan-qos-policy Delete a wireless lan QoS configuration policy service Service Commands rfs7000-37FABE(config)#
  • 283. GLOBAL CONFIGURATION COMMANDS 4 - 119 4.1.32 password-encryption Global Configuration Commands Enables password encryption within a configuration Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax password-encryption secret 2 <LINE> Parameters • password-encryption secret 2 <LINE> secret 2 <LINE> Encrypts passwords with a secret phrase • 2 – Specifies the encryption type as either SHA256 or AES256 • <LINE> – Specify the encryption passphrase. Examples rfs7000-37FABE(config)#password-encryption secret 2 symbol rfs7000-37FABE(config)#
  • 284. 4 - 120 WiNG CLI Reference Guide 4.1.33 profile Global Configuration Commands Configures profile related commands. If no parameters are given, all profiles are selected. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax profile {ap621|ap650|ap6511|ap6521|ap6532|ap71xx|containing|filter| rfs4000|rfs6000|rfs7000} profile {ap621|ap650|ap6511|ap6521|ap6532|ap71xx|rfs4000|rfs6000|rfs7000} [<DEVICE-PROFILE-NAME>] profile {containing [<DEVICE-PROFILE-NAME>] {filter [type [ap621|ap650|ap6511| ap6521|ap6532|ap71xx|rfs4000|rfs6000|rfs7000]]}} profile {filter [type [ap621|ap650|ap6511|ap6521|ap6532|ap71xx|rfs4000| rfs6000|rfs7000]]} Parameters • profile {ap621|ap650|ap6511|ap6521|ap6532|ap71xx|containing|filter| rfs4000|rfs6000|rfs7000} [<DEVICE-PROFILE-NAME>] profile Configures device profile commands. If no device profile is specified, the system configures all device profiles. ap621 Optional. Configures AP621 profile commands ap650 Optional. Configures AP650 profile commands ap6511 Optional. Configures AP6511 profile commands ap6521 Optional. Configures AP6521 profile commands ap6532 Optional. Configures AP6532 profile commands ap71xx Optional. Configures AP71XX profile commands rfs4000 Optional. Configures RFS4000 profile commands rfs6000 Optional. Configures RFS6000 profile commands
  • 285. GLOBAL CONFIGURATION COMMANDS 4 - 121 rfs7000 Optional. Configures RFS7000 profile commands <DEVICE-PROFILE- After specifying the profile type, specify a substring in the profile name to filter profiles NAME> • profile {containing [<DEVICE-PROFILE-NAME>] {filter [type [ap621|ap650|ap6511| ap6521|ap6532|ap71xx|rfs4000|rfs6000|rfs7000]]}} profile Configures device profile commands containing Optional. Configures profiles that contain a specified sub-string in the hostname <DEVICE-PROFILE- • <DEVICE-PROFILE-NAME> – Specify a substring in the profile name to filter profiles. NAME> filter type Optional. An additional filter used to configure a specific type of device profile. If no device type is specified, the system configures all device profiles. • type – Filters profiles by the device type. Select a device type from the following options: ap621 Selects a AP621 profile ap650 Selects a AP650 profile ap6511 Selects a AP6511 profile ap6521 Selects a AP6511 profile ap6532 Selects a AP6532 profile ap71xx Selects a AP71XX profile rfs4000 Selects a RFS4000 profile rfs6000 Selects a RFS6000 profile rfs7000 Selects a RFS7000 profile • profile {filter [type [ap621|ap650|ap6511|ap6521|ap6532|ap71xx|rfs4000| rfs6000|rfs7000]]} profile Configures device profile commands filter type Optional. An additional filter used to configure a specific type of device profile. If no device type is specified, the system configures all device profiles. • type – Filters profiles by the device type. Select a device type from the following options: ap621 Selects a AP621 profile ap650 Selects a AP650 profile ap6511 Selects a AP6511 profile ap6521 Selects a AP6521 profile ap6532 Selects a AP6532 profile ap71xx Selects a AP71XX profile rfs4000 Selects a RFS4000 profile
  • 286. 4 - 122 WiNG CLI Reference Guide rfs6000 Selects a RFS6000 profile rfs7000 Selects a RFS7000 profile Examples rfs7000-37FABE(config)#profile RFS7000 test1 rfs7000-37FABE(config-profile-test1)#? Profile Mode commands: aaa VPN AAA authentication settings adopted-mode Set Device Running in Adopted Mode ap-upgrade AP firmware upgrade ap300 Adopt/unadopt AP300 device to this profile/device arp Address Resolution Protocol (ARP) auto-learn-staging-config Enable learning network configuration of the devices that come for adoption autoinstall Autoinstall Configuration commands bridge Ethernet bridge cdp Cisco Discovery Protocol cluster Cluster configuration configuration-persistence Enable persistence of configuration across reloads (startup config file) controller WLAN controller configuration crypto Encryption related commands dscp-mapping Configure IP DSCP to 802.1p priority mapping for untagged frames email-notification Email notification configuration enforce-version Check the firmware versions of devices before interoperating events System event messages interface Select an interface to configure ip Internet Protocol (IP) led Turn LEDs on/off on the device legacy-auto-downgrade Enable device firmware to auto downgrade when other legacy devices are detected legacy-auto-update Enable legacy device firmware auto update lldp Link Layer Discovery Protocol load-balancing Configure load balancing parameter local Local user authentication database for VPN logging Modify message logging facilities mac-address-table MAC Address Table mint MiNT protocol misconfiguration-recovery-time Check controller connectivity after configuration is received monitor Critical resource monitoring neighbor-inactivity-timeout Configure neighbor inactivity timeout neighbor-info-interval Configure neighbor information exchange interval no Negate a command or set its defaults noc Configure the noc related setting ntp Ntp server A.B.C.D power-config Configure power mode preferred-controller-group Controller group this system will prefer for adoption radius Configure device-level radius authentication parameters rf-domain-manager RF Domain Manager spanning-tree Spanning tree use Set setting to use vpn Vpn configuration wep-shared-key-auth Enable support for 802.11 WEP shared key authentication clrscr Clears the display screen commit Commit all changes made in this session do Run commands from Exec mode end End current mode and change to EXEC mode exit End current mode and down to previous mode
  • 287. GLOBAL CONFIGURATION COMMANDS 4 - 123 help Description of the interactive help system revert Revert changes service Service Commands show Show running system information write Write running configuration to memory or terminal rfs7000-37FABE(config-profile-test1)# NOTE: For more information on profiles and how to configure profiles, see Chapter 7, PROFILES.
  • 288. 4 - 124 WiNG CLI Reference Guide 4.1.34 radio-qos-policy Global Configuration Commands Configures a radio quality-of-service (QoS) policy Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax radio-qos-policy <RADIO-QOS-POLICY-NAME> Parameters • radio-qos-policy <RADIO-QOS-POLICY-NAME> <RADIO-QOS-POLICY- Specify the radio QoS policy name. If the policy does not exist, it is created. NAME> Examples rfs7000-37FABE(config)#radio-qos-policy test rfs7000-37FABE(config)# NOTE: For more information on radio qos policy, see Chapter 19, RADIO-QOS-POLICY.
  • 289. GLOBAL CONFIGURATION COMMANDS 4 - 125 4.1.35 radius-group Global Configuration Commands Configures RADIUS user group parameters Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax radius-group <RADIUS-GROUP-NAME> Parameters • radius-group <RADIUS-GROUP-NAME> <RADIUS-GROUP-NAME> Specify a RADIUS user group name. The name should not exceed 64 characters. If the RADIUS user group does not exist, it is created. Examples rfs7000-37FABE(config)#radius-group testgroup rfs7000-37FABE(config)# NOTE: For more information on RADIUS user group commands, see Chapter 18, RADIUS-POLICY.
  • 290. 4 - 126 WiNG CLI Reference Guide 4.1.36 radius-server-policy Global Configuration Commands Creates an onboard device RADIUS policy Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax radius-server-policy <RADIUS-SERVER-POLICY-NAME> Parameters • radius-server-policy <RADIUS-SERVER-POLICY-NAME> <RADIUS-SERVER-POLICY- Specify the RADIUS server policy name. If the policy does not exist, it is created. NAME> Examples rfs7000-37FABE(config)#radius-server-policy testpolicy rfs7000-37FABE(config)# NOTE: For more information on RADIUS user group commands, see Chapter 18, RADIUS-POLICY.
  • 291. GLOBAL CONFIGURATION COMMANDS 4 - 127 4.1.37 radius-user-pool-policy Global Configuration Commands Configures a RADIUS user pool Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax radius-user-pool-policy <RADIUS-USER-POOL-POLICY-NAME> Parameters • radius-user-pool-policy <RADIUS-USER-POOL-POLICY-NAME> <RADIUS-USER-POOL- Specify the RADIUS user pool policy name. If the policy does not exist, it is created. POLICY-NAME> Examples rfs7000-37FABE(config)#radius-user-pool-policy testpool rfs7000-37FABE(config)# NOTE: For more information on RADIUS user group commands, see Chapter 18, RADIUS-POLICY.
  • 292. 4 - 128 WiNG CLI Reference Guide 4.1.38 rf-domain Global Configuration Commands An RF Domain groups devices that can logically belong to one network. The RF Domain policy configures a set of parameters that enable devices configured quickly as belonging to a particular RF Domain. Table 4.14 RF Domain Commands Command Description Reference rf-domain Creates a RF Domain policy page 4-129
  • 293. GLOBAL CONFIGURATION COMMANDS 4 - 129 4.1.38.1 rf-domain rf-domain Creates a RF Domain or enters RF Domain context for one or more RF Domains. If the policy does not exist, it creates a new policy. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax rf-domain {<RF-DOMAIN-NAME>|containing <DOMAIN-NAME>} Parameters • rf-domain {<RF-DOMAIN-NAME>|containing <DOMAIN-NAME>} rf-domain Creates a new RF Domain or enters RF Domain context for one or more existing RF Domains <RF-DOMAIN-NAME> Specify the RF Domain name. The name should not exceed 32 characters and should represent the intended purpose. Once created, the name cannot be edited. containing Specify an existing RF Domain that contains a specified sub-string in the domain name <DOMAIN-NAME> • <DOMAIN-NAME> – Specify a sub-string of the RF Domain name.
  • 294. 4 - 130 WiNG CLI Reference Guide Examples rfs7000-37FABE(config)#rf-domain RFS7000 rfs7000-37FABE(config-rf-domain-RFS7000)# RFS4000-880DA7(config)#rf-domain default RFS4000-880DA7(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-RFS7000)#? RF Domain Mode commands: channel-list Configure channel list to be advertised to wireless clients contact Configure the contact control-vlan VLAN for control traffic on this RF Domain country-code Configure the country of operation dhcp-redundancy Enable DHCP redundancy layout Configure layout location Configure the location mac-name Configure MAC address to name mappings no Negate a command or set its defaults override-smartrf Configured RF Domain level overrides for smart-rf override-wlan Configure RF Domain level overrides for wlan sensor-server Motorola AirDefense sensor server configuration stats Configure the stats related setting timezone Configure the timezone use Set setting to use clrscr Clears the display screen commit Commit all changes made in this session do Run commands from Exec mode end End current mode and change to EXEC mode exit End current mode and down to previous mode help Description of the interactive help system revert Revert changes service Service Commands show Show running system information write Write running configuration to memory or terminal rfs7000-37FABE(config-rf-domain-RFS7000)#
  • 295. GLOBAL CONFIGURATION COMMANDS 4 - 131 4.1.38.2 rf-domain-mode rf-domain This section describes the default commands under RF Domain. Table 4.15 summarises RF Domain commands Table 4.15 rf-domain Commands Command Description Reference channel-list Configures the channel list advertised by radios page 4-133 contact Configures details of the person to contact (the network administrator) in page 4-134 case of any problems impacting the RF Domain control-vlan Configures VLAN for traffic control on a RF Domain page 4-135 country-code Configures the country of operation page 4-136 dhcp-redundancy Enables DHCP redundancy on a RF Domain page 4-137 layout Configures layout information page 4-138 location Configures the physical location of a RF Domain page 4-140 mac-name Maps MAC addresses to names page 4-141 no Negates a command or reverts configured settings to their default values page 4-142 override-smart-rf Configures RF Domain level overrides for Smart RF page 4-144 override-wlan Configures RF Domain level overrides for WLAN page 4-145 sensor-server Configures a AirDefense sensor server on this RF Domain page 4-147 stats Configures stats related settings on this RF Domain. These settings define page 4-149 how RF Domain statistics are updated timezone Configures a RF Domain’s geographic time zone page 4-151 use Enables the use of a specified Smart RF and/or WIPS policy page 4-152 clrscr Clears the display screen page 5-3 commit Commits (saves) changes made in the current session page 5-4 do Runs commands from EXEC mode page 4-66 end Ends and exits the current mode and moves to the PRIV EXEC mode page 5-5 exit Ends the current mode and moves to the previous mode page 5-6 help Displays the interactive help system page 5-7 revert Reverts changes to their last saved configuration page 5-13 service Invokes service commands to troubleshoot or debug (config-if) page 5-14 instance configurations
  • 296. 4 - 132 WiNG CLI Reference Guide Table 4.15 rf-domain Commands Command Description Reference show Displays running system information page 6-4 write Writes information to memory or terminal page 5-42
  • 297. GLOBAL CONFIGURATION COMMANDS 4 - 133 4.1.38.2.1 channel-list rf-domain-mode Configures the channel list advertised by radios. This command also enables dynamic update of a channel list Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax channel-list [2.4GHz|5GHz|dynamic] channel-list dynamic channel-list [2.4GHz|5GHz] <CHANNEL-LIST> Parameters • channel-list dynamic dynamic Enables dynamic update of a channel list • channel-list [2.4GHz|5GHz] <CHANNEL-LIST> 2.4GHz <CHANNEL-LIST> Configures the channel list advertised by radios operating in the 2.4GHz mode • <CHANNLE-LIST> – Specify the list of channels separated by commas or hyphens. 5GHz <CHANNEL-LIST> Configures the channel list advertised by radios operating in the 5GHz mode • <CHANNLE-LIST> – Specify the list of channels separated by commas or hyphens. Examples rfs7000-37FABE(config-rf-domain-default)#channel-list 2.4GHz 1-10 rfs7000-37FABE(config-rf-domain-default)#show context rf-domain RFDOMAIN_UseCase1 location SanJose contact txyr399@motorola-solutions.com timezone America/Los_Angeles country-code us channel-list 2.4GHz 1,2,3,4,5,6,7,8,9,10 rfs7000-37FABE(config-rf-domain-default)# Related Commands no Removes the list of channels configured on the selected RF Domain for 2.4GHz and 5GHz bands. Also disables dynamic update of a channel list.
  • 298. 4 - 134 WiNG CLI Reference Guide 4.1.38.2.2 contact rf-domain-mode Configures the contact (the network administrator) in case of problems or issues impacting the RF Domain Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax contact <WORD> Parameters • contact <WORD> contact <WORD> Specify contact details, such as name and number. Examples rfs7000-37FABE(config-rf-domain-default)#contact Bob+919620011529 rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#show context rf-domain default contact Bob+919620011529 stats update-interval 200 no country-code use smart-rf-policy Smart-RF1 use wips-policy WIPS1 sensor-server 2 ip 172.16.10.3 override-wlan test vlan-pool 2 limit 20 rfs7000-37FABE(config-rf-domain-default)# Related Commands no Removes contact details configured for a RF Domain
  • 299. GLOBAL CONFIGURATION COMMANDS 4 - 135 4.1.38.2.3 control-vlan rf-domain-mode Configures VLAN for traffic control in this RF Domain Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax control-vlan <1-4094> Parameters • control-vlan <1-4094> <1-4094> Specify the VLAN ID from 1 - 4094. Examples rfs7000-37FABE(config-rf-domain-default)#control-vlan 1 rfs7000-37FABE(config-rf-domain-default)#show context rf-domain RFDOMAIN_UseCase1 location SanJose contact txyr399@motorola-solutions.com timezone America/Los_Angeles country-code us channel-list 2.4GHz 1,2,3,4,5,6,7,8,9,10 control-vlan 1 rfs7000-37FABE(config-rf-domain-default)# Related Commands no Disables the VLAN for controlling traffic in a RF Domain
  • 300. 4 - 136 WiNG CLI Reference Guide 4.1.38.2.4 country-code rf-domain-mode Configures a RF Domain’s country of operation. Since device channels transmit in specific channels unique to the country of operation, it is essential to configure the country code correctly or risk using the access point illegally. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax country-code [<WORD>] Parameters • country-code [<WORD>] country-code Configures the RF Domain’s country of operation <WORD> Specify the 2 letter ISO-3166 country code. Examples rfs7000-37FABE(config-rf-domain-default)#country-code in rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#show context rf-domain default country-code in rfs7000-37FABE(config-rf-domain-default)# Related Commands no Removes the country of operation configured on a RF Domain
  • 301. GLOBAL CONFIGURATION COMMANDS 4 - 137 4.1.38.2.5 dhcp-redundancy rf-domain-mode Enables DHCP redundancy in this RF Domain Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax dhcp-redundancy Parameters None Examples rfs7000-37FABE(config-rf-domain-default)#dhcp-redundancy rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#show context rf-domain default country-code in dhcp-redundancy rfs7000-37FABE(config-rf-domain-default)# Related Commands no Removes RF Domain DHCP redundancy
  • 302. 4 - 138 WiNG CLI Reference Guide 4.1.38.2.6 layout rf-domain-mode Configures the RF Domain layout in terms of area, floor, and location on a map. It allows users to place APs across the deployment map. A maximum of 256 layouts is permitted. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax layout [area|floor|map-location] layout [area|floor|map-location] {(area [<AREA-NAME>]|floor [<FLOOR-NAME>]| map-location [<URL> units [feet|meters] {area [<AREA-NAME>]|floor [<FLOOR- NAME>]}} Parameters • layout [area|floor|map-location] {(area [<AREA-NAME>]|floor [<FLOOR-NAME>]| map-location [<URL> units [feet|meters] {area [<AREA-NAME>]|floor [<FLOOR-NAME>]}} layout Configures the RF Domain layout in terms of area, floor, and location on a map area <AREA-NAME> Configures the RF Domain area name • <AREA-NAME> – Specify the area name. floor <FLOOR-NAME> Configures the RF Domain floor name • <FLOOR-NAME> – Specify the floor name. map-location <URL> units Configures the location of the RF Domain on the map [feet|meters] • <URL> – Specify the URL to configure the map location. • units – Configures the map units in terms of feet or meters • feet – Selects the unit of measurement as feet • meters – Selects the unit of measurement as meters
  • 303. GLOBAL CONFIGURATION COMMANDS 4 - 139 Examples rfs7000-37FABE(config-rf-domain-default)#layout map-location www.firstfloor.com units meters area Ecospace floor Floor5 rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#show context rf-domain default country-code us sensor-server 1 ip 172.16.10.14 port 1 channel-list dynamic channel-list 2.4GHz 1,2,3,4,5,6,7,8,9,10 layout map-location www.firstfloor.com units meters area Ecospace floor Floor5 rfs7000-37FABE(config-rf-domain-default)# Related Commands no Removes the RF Domain layout details
  • 304. 4 - 140 WiNG CLI Reference Guide 4.1.38.2.7 location rf-domain-mode Configures the physical location of the wireless controller RF Domain. The location could be as specific as the building name or floor number. Or it could be generic and include an entire site. The location defines the physical area where a common set of device configurations are deployed and managed by a RF Domain policy. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax location <WORD> Parameters • location <WORD> location <WORD> Configures the RF Domain location by specifying the area or building name • <WORD> – Specify the location. Examples rfs7000-37FABE(config-rf-domain-default)#location SanJose rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#show context rf-domain default location SanJose no country-code rfs7000-37FABE(config-rf-domain-default)# Related Commands no Removes the RF Domain location
  • 305. GLOBAL CONFIGURATION COMMANDS 4 - 141 4.1.38.2.8 mac-name rf-domain-mode Configures a relevant name for each MAC address Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax mac-name <MAC> <NAME> Parameters • mac-name <MAC> <NAME> mac-name Configures a relevant name for each MAC address <MAC> <NAME> Specifies the MAC address • <NAME> – Specify a friendly name for this MAC address to use in events and statistics. Examples rfs7000-37FABE(config-rf-domain-default)#mac-name 11-22-33-44-55-66 TestDevice rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#show context rf-domain default location SanJose no country-code mac-name 11-22-33-44-55-66 TestDevice rfs7000-37FABE(config-rf-domain-default)# Related Commands no Removes the MAC address to name mapping
  • 306. 4 - 142 WiNG CLI Reference Guide 4.1.38.2.9 no rf-domain-mode Negates a command or reverts configured settings to their default. When used in the config RF Domain mode, the no command negates or reverts RF Domain settings. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax no [channel-list|contact|control-vlan|country-code|dhcp-redundancy|layout|location| mac-name|override-smartrf|override-wlan|sensor-server|stats|timezone|use] Parameters • no [channel-list|contact|control-vlan|country-code|dhcp-redundancy|layout| location|mac-name|override-smartrf|override-wlan|sensor-server|stats|timezone| use] no channel-list Removes the channel list for 2.4GHz and 5GHz bands. Also disables dynamic update of a channel list no contact Removes contact details configured no control-vlan Removes VLAN configured for controlling traffic no country-code Removes the country of operation configured no dhcp-redundancy Removes DHCP redundancy no layout Removes the RF Domain layout details no location Removes the RF Domain location details no mac-name Removes the MAC address to name mapping no override-smartrf Resets the override Smart RF settings to default no override-wlan Resets the override WLAN settings to default no sensor-server Disables a AirDefense sensor server details no stats Resets RF Domain stats settings no timezone Removes the RF Domain’s time zone no use Resets RF Domain profile settings
  • 307. GLOBAL CONFIGURATION COMMANDS 4 - 143 Examples rfs7000-37FABE(config-rf-domain-default)#mac-name 11-22-33-44-55-66 TestDevice rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#show context rf-domain default location SanJose no country-code mac-name 11-22-33-44-55-66 TestDevice rfs7000-37FABE(config-rf-domain-default)# Related Commands channel-list Configures the channel list advertised by radios, and enables dynamic update of channel lists contact Configures details of the person to contact (or the administrator) in case of any problems or issues impacting the RF Domain control-vlan Configures a VLAN for traffic control country-code Configures a RF Domain’s country of operation dhcp-redundancy Enables a RF Domain’s DHCP redundancy layout Configures a RF Domain’s layout maps location Configures a RF Domain’s deployment location mac-name Configures a relevant name for each MAC address override-smart-rf Configures RF Domain level overrides for Smart RF override-wlan Configures RF Domain level overrides for WLAN sensor-server Configures a AirDefense sensor server stats Configures RF Domain stats settings timezone Configures a RF Domain’s geographic time zone use Enables the use of a Smart RF and/or WIPS policy
  • 308. 4 - 144 WiNG CLI Reference Guide 4.1.38.2.10 override-smart-rf rf-domain-mode Configures RF Domain level overrides for a Smart RF policy Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax override-smartrf channel-list [2.4GHz|5GHZ] <WORD> Parameters • override-smartrf channel-list [2.4GHz|5GHZ] <WORD> override-smartrf Configures RF Domain level overrides for a Smart RF policy channel-list Enables the selection of a channel list for a Smart RF policy 2.4GHz <WORD> Selects the 2.4GHz band • <WORD> – Specify a list of channels separated by commas. 5GHz <WORD> Selects the 5GHz band • <WORD> – Specify a list of channels separated by commas. Examples rfs7000-37FABE(config-rf-domain-default)#override-smartrf channel-list 2.4GHz 1 ,2,3 rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#show context rf-domain default location SanJose no country-code override-smartrf channel-list 2.4GHz 1,2,3 mac-name 11-22-33-44-55-66 TestDevice rfs7000-37FABE(config-rf-domain-default)# Related Commands no Resets the override Smart RF settings its default
  • 309. GLOBAL CONFIGURATION COMMANDS 4 - 145 4.1.38.2.11 override-wlan rf-domain-mode Configures RF Domain level overrides for a WLAN Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax overrides-wlan <WLAN> [ssid|vlan-pool|wpa-wpa2-psk] overrides-wlan <WLAN> [ssid <SSID>|vlan-pool <1-4094> {limit}|wpa-wpa2-psk <WORD>] Parameters • overrides-wlan <WLAN> [ssid <SSID>|vlan-pool <1-4094> {limit}|wpa-wpa2-psk <WORD>] <WLAN> Configures the WLAN name The name should not exceed 32 characters and should represent the WLAN coverage area. After creating the WLAN, configure its override parameters. ssid <SSID> Configures a override Service Set Identifier (SSID) associated with this WLAN The SSID should not exceed 32 characters. vlan-pool <1-4094> limit Configures the override VLANs available to this WLAN • <1-4094> – Specify the VLAN ID from 1 - 4094. • limit – Optional. Sets a limit to the number of users on this VLAN. The maximum client limit is 8192 per VLAN. The default is 0. wpa-wpa2-psk <WORD> Configures the WPA-WPA2 key or passphrase for this WLAN • <WORD> – Specify a WPA-WPA2 key or passphrase.
  • 310. 4 - 146 WiNG CLI Reference Guide Examples rfs7000-37FABE(config-rf-domain-default)#override-wlan test vlan-pool 2 limit 2 0 rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#show context rf-domain default no country-code override-wlan test vlan-pool 2 limit 20 rfs7000-37FABE(config-rf-domain-default)# Related Commands no Resets the override WLAN settings its default
  • 311. GLOBAL CONFIGURATION COMMANDS 4 - 147 4.1.38.2.12 sensor-server rf-domain-mode Configures a AirDefense sensor server on this RF Domain. Sensor servers allow network administrators to monitor and download data from multiple sensors remote locations using Ethernet TCP/IP or serial communications. This enables administrators to respond quickly to interferences and coverage problems. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax sensor-server <1-3> ip <IP> port [443|8443|<1-65535>] Parameters • sensor-server <1-3> ip <IP> port [443|8443|<1-65535>] Sensor-server <1-3> Configures a AirDefense sensor server parameters • <1-3> – Select the server ID from 1 - 3. The server with the lowest defined ID is reached first by the wireless controller. The default is 1. ip <IP> Configures the (non DNS) IP address of the sensor server • <IP> – Specify the IP address of the sensor server. port [443|8443|<1-65535>] Configures the sensor server port. The options are: • 443 – Configures port 443, the default port used by the AirDefense server • 8843 – Configures port 883, the default port used by advanced WIPS on a wireless controller • <1-6553> – Allows you to select a WIPS/AirDefense sensor server port from 1 - 65535
  • 312. 4 - 148 WiNG CLI Reference Guide Examples rfs7000-37FABE(config-rf-domain-default)#sensor-server 2 ip 172.16.10.3 port 44 3 rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#show context rf-domain default no country-code sensor-server 2 ip 172.16.10.3 override-wlan test vlan-pool 2 limit 20 rfs7000-37FABE(config-rf-domain-default)# Related Commands no Disables a AirDefense sensor server parameters
  • 313. GLOBAL CONFIGURATION COMMANDS 4 - 149 4.1.38.2.13 stats rf-domain-mode Configures stats settings that define how RF Domain statistics are updated Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax stats [open-window|update-interval stats open-window <1-2> {sample-interval [<5-86640>] {size [<3-100>]}} stats update-interval [<5-300>|auto]] Parameters • stats open-window <1-2> {sample-interval [<5-86640>] {size [<3-100>]}} stats Configures stats related settings on this RF Domain open-window <1-2> Opens a stats window to get trending data • <1-2> – Configures a numerical index ID for this RF Domain statistics sample-interval <5-86640> Optional. Configures the interval at which the wireless controller captures statistics supporting this RF Domain • <5-86640> – Specify the sample interval from 5 - 86640 seconds. The default is 5 seconds. size <3-100> Optional. After specifying the interval time you might specify the number of samples used by the wireless controller to define RF Domain statistics. • <3-100> – Specify the number of samples from 3 - 100. The default is 6 samples. • stats update-interval [<5-300>|auto] stats Configures stats related settings on this RF Domain update-interval Configures the interval at which RF Domain statistics are updated. The options are: [<5-300>|auto] • <5-300> – Specify an update interval from 5 - 300 seconds. • auto – The RF Domain manager automatically adjusts the update interval based on the load.
  • 314. 4 - 150 WiNG CLI Reference Guide Examples rfs7000-37FABE(config-rf-domain-default)#stats update-interval 200 rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)*#show context rf-domain default stats update-interval 200 no country-code sensor-server 2 ip 172.16.10.3 override-wlan test vlan-pool 2 limit 20 rfs7000-37FABE(config-rf-domain-default)*# Related Commands no Resets stats related settings
  • 315. GLOBAL CONFIGURATION COMMANDS 4 - 151 4.1.38.2.14 timezone rf-domain-mode Configures the RF Domain’s geographic time zone. Configuring the time zone is essential for RF Domains deployed across different geographical locations. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax timezone <TIMEZONE> Parameters • timezone <TIMEZONE> time <TIMEZONE> Specify the RF Domain’s time zone. Examples rfs7000-37FABE(config-rf-domain-default)#timezone America/Los_Angeles rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#show context rf-domain default timezone America/Los_Angeles stats update-interval 200 no country-code use wips-policy WIPS1 sensor-server 2 ip 172.16.10.3 override-wlan test vlan-pool 2 limit 20 rfs7000-37FABE(config-rf-domain-default)# Related Commands no Removes a RF Domain’s time zone
  • 316. 4 - 152 WiNG CLI Reference Guide 4.1.38.2.15 use rf-domain-mode Enables the use of Smart RF and WIPS with this RF Domain Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax use [smart-rf-policy|wips-policy] use [smart-rf-policy <SMART-RF-POLICY-NAME>|wips-policy <WIPS-POLICY-NAME>] Parameters • use [smart-rf-policy <SMART-RF-POLICY-NAME>|wips-policy <WIPS-POLICY-NAME>] use Uses a Smart RF policy with this RF Domain smart-rf-policy Specifies a Smart RF policy <SMART-RF-POLICY-NAME> • <SMART-RF-POLICY-NAME> – Specify the Smart RF policy name. wips-policy Specifies a WIPS policy <WIPS-POLICY-NAME> <WIPS-POLICY-NAME> – Specify the WIPS policy name. Examples rfs7000-37FABE(config-rf-domain-default)#use smart-rf-policy Smart-RF1 rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#use wips-policy WIPS1 rfs7000-37FABE(config-rf-domain-default)# rfs7000-37FABE(config-rf-domain-default)#show context rf-domain default stats update-interval 200 no country-code use smart-rf-policy Smart-RF1 use wips-policy WIPS1 sensor-server 2 ip 172.16.10.3 override-wlan test vlan-pool 2 limit 20 rfs7000-37FABE(config-rf-domain-default)# Related Commands no Resets profiles used with this RF Domain
  • 317. GLOBAL CONFIGURATION COMMANDS 4 - 153 4.1.39 rfs4000 Global Configuration Commands Adds an RFS4000 wireless controller to the network Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax rfs4000 <DEVICE-RFS4000> Parameters • rfs4000 <DEVICE-RFS4000> <DEVICE-RFS4000> Specify the MAC address of the RFS4000. Examples rfs7000-37FABEconfig)#RFS4000 10-20-30-40-50-60 rfs7000-37FABE(config-device-10-20-30-40-50-60)#
  • 318. 4 - 154 WiNG CLI Reference Guide 4.1.40 rfs6000 Global Configuration Commands Adds an RFS6000 wireless controller to the network Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax rfs6000 <DEVICE-RFS6000> Parameters • rfs6000 <DEVICE-RFS6000> <DEVICE-RFS6000> Specify the MAC address of a RFS6000. Examples rfs7000-37FABE(config)#RFS6000 11-20-30-40-50-61 rfs7000-37FABE(config-device-11-20-30-40-50-61)#
  • 319. GLOBAL CONFIGURATION COMMANDS 4 - 155 4.1.41 rfs7000 Global Configuration Commands Adds an RFS7000 wireless controller to the network Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax rfs7000 <DEVICE-RFS7000> Parameters • rfs7000 <DEVICE-RFS7000> <DEVICE-RFS7000> Specify the MAC address of a RFS7000. Examples rfs7000-37FABE(config)#RFS7000 12-20-30-40-50-62 rfs7000-37FABE(config-device-12-20-30-40-50-62)#
  • 320. 4 - 156 WiNG CLI Reference Guide 4.1.42 role-policy Global Configuration Commands Configures a role-based firewall policy Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax role-policy <ROLE-POLICY-NAME> Parameters • role-policy <ROLE-POLICY-NAME> <ROLE-POLICY-NAME> Specify the role policy name. If the policy does not exist, it is created. Examples rfs7000-37FABE(config)#role-policy role1 rfs7000-37FABE(config)# NOTE: For more information on Role policy commands, see Chapter 20, ROLE-POLICY.
  • 321. GLOBAL CONFIGURATION COMMANDS 4 - 157 4.1.43 self Global Configuration Commands Displays the device’s configuration context Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax self Parameters None Examples rfs7000-37FABE(config)#self rfs7000-37FABE(config-device-00-15-70-37-FA-BE)#
  • 322. 4 - 158 WiNG CLI Reference Guide 4.1.44 smart-rf-policy Global Configuration Commands Configures a Smart RF policy Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax smart-rf-policy <SMART-RF-POLICY-NAME> Parameters • smart-rf-policy <SMART-RF-POLICY-NAME> <SMART-RF-POLICY- Specify the Smart RF policy name. If the policy does not exist, it is created. NAME> Examples rfs7000-37FABE(config)#smart-rf-policy test rfs7000-37FABE(config-smart-rf-policy-test)# NOTE: For more information on smart-rf policy commands, see Chapter 21, SMART-RF- POLICY.
  • 323. GLOBAL CONFIGURATION COMMANDS 4 - 159 4.1.45 wips-policy Global Configuration Commands Configures a WIPS policy Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax wips-policy <WIPS-POLICY-NAME> Parameters • wips-policy <WIPS-POLICY-NAME> <WIPS-POLICY-NAME> Specify the WIPS policy name. If the policy does not exist, it is created. Examples rfs7000-37FABE(config)#wips-policy test rfs7000-37FABE(config-wips-policy-test)# NOTE: For more information on WIPS policy commands, see Chapter 22, WIPS-POLICY.
  • 324. 4 - 160 WiNG CLI Reference Guide 4.1.46 wlan Global Configuration Commands Configures a wireless LAN Table 4.16 WLAN Commands Command Description Reference wlan Configures a wireless LAN page 4-129
  • 325. GLOBAL CONFIGURATION COMMANDS 4 - 161 4.1.46.1 wlan wlan Configures a WLAN or enters WLAN configuration context for one or more WLANs Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax wlan {<WLAN-NAME>|containing <WLAN-NAME>} Parameters • wlan {<WLAN-NAME>|containing <WLAN-NAME>} wlan <WLAN-NAME> Configures a new wireless LAN • <WLAN-NAME> – Optional. Specify the WLAN name. containing <WLAN-NAME> Optional. Configures an existing WLAN’s configuration context • <WLAN-NAME> – Specify a sub-string in the WLAN name. Use this parameter to filter a WLAN Examples rfs7000-37FABE(config)#wlan 1 rfs7000-37FABE(config-wlan-1)# rfs7000-37FABE(config)#wlan containing wlan1 rfs7000-37FABE(config-wlan-{'containing': 'wlan1'})#
  • 326. 4 - 162 WiNG CLI Reference Guide 4.1.46.2 wlan-mode commands wlan Configures WLAN mode commands. Manual WLAN mappings are erased when the actual WLAN is disabled and then enabled immediately Use the (config) instance to configure WLAN related parameters. To navigate to this instance, use the following commands: rfs7000-37FABE(config)#wlan <WLAN> Table 4.17 summarizes WLAN mode commands Table 4.17 wlan-mode commands Command Description Reference 802.11w Enables support for Protected Management Frame (IEEE 802.11w) settings page 4-164 accounting Defines WLAN accounting configuration page 4-165 acl Defines the actions based on an ACL rule configuration page 4-166 answer- Allows a WLAN to respond to probes for broadcast ESS page 4-167 broadcast-probes authentication- Sets a WLAN’s authentication type page 4-168 type bridging-mode Configures how packets to/from this WLAN are bridged page 4-170 broadcast-dhcp Configures broadcast DHCP packet handling page 4-171 broadcast-ssid Advertises a WLAN’s SSID in beacons page 4-172 captive-portal- Configures a WLAN’s captive portal enforcement page 4-173 enforcement client-access Enables WLAN client access (normal data operations) page 4-174 client-client- Allows the switching of frames from one wireless client to another on a WLAN page 4-175 communication client-load- Enables load balancing of WLAN clients page 4-176 balancing data-rates Specifies the 802.11 rates supported on the WLAN page 4-178 description Sets a WLAN’s description page 4-182 encryption-type Sets a WLAN’s encryption type page 4-183 enforce-dhcp Drops packets from clients with a static IP address page 4-185 ip Configures IP settings page 4-186 kerberos Configures Kerberos authentication parameters page 4-188 motorola- Enables support for Motorola Solutions specific extensions to 802.11 page 4-190 extensions
  • 327. GLOBAL CONFIGURATION COMMANDS 4 - 163 Table 4.17 wlan-mode commands Command Description Reference no Negates a command or sets its default value page 4-192 proxy-arp-mode Enables the proxy ARP mode for ARP requests page 4-195 radius Configures the RADIUS related parameters page 4-196 shutdown Closes a WLAN page 4-197 ssid Configures a WLAN’s SSID page 4-198 use Defines WLAN mode configuration settings page 4-199 vlan Sets VLAN assignment for a WLAN page 4-201 vlan-pool-member Adds a member VLAN to the pool of VLANs for a WLAN page 4-202 wep128 Configures WEP128 parameters page 4-204 wep64 Configures WEP64 parameters page 4-206 wireless-client Configures the transmit power for wireless clients transmission page 4-208 wpa-wpa2 Modifies TKIP and CCMP (WPA/WPA2) related parameters page 4-210
  • 328. 4 - 164 WiNG CLI Reference Guide 4.1.46.2.1 802.11w wlan-mode commands Enables support for Protected Management Frames (PMF) (IEEE 802.11w) settings Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax 802.11w [mandatory|optional|sa-query] 802.11w [mandatory|optional] 802.11w sa-query [attempts <1-15>|timeout <100-6000>] Parameters • 802.11w [mandatory|optional] 802.11w mandatory Enforces WLAN PMF settings 802.11w optional Advertises support for PMF, but it is enforced only for clients that indicate their support • 802.11w sa-query [attempts <1-15>|timeout <100-6000>] 802.11w sa-query Enables security association (SA) query settings attempts <1-15> Sets the number of times an SA query message is attempted time-out <100-600> Sets the timeout period, when waiting for a response to an sa query, before re-sending Examples rfs7000-37FABE(config-wlan-wlan1)#802.11w sa-query timeout 110 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#802.11w sa-query attempts 1 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode tunnel encryption-type none authentication-type none 802.11w sa-query timeout 110 802.11w sa-query attempts 1 rfs7000-37FABE(config-wlan-wlan1)#
  • 329. GLOBAL CONFIGURATION COMMANDS 4 - 165 4.1.46.2.2 accounting wlan-mode commands Defines the WLAN’s accounting configuration Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax accounting [radius|syslog] accounting radius accounting [syslog host <IP/HOSTNAME> {port [<1-65535>]}] Parameters • accounting radius accounting radius Enables support for WLAN RADIUS accounting messages • accounting [radius|syslog host <IP/HOSTNAME> {port [<1-65535>]}] accounting syslog Enables support for WLAN syslog accounting messages host <IP/HOSTNAME> Configures a syslog destination hostname or IP address for accounting records • <IP/HOSTNAME> – Specify the IP address or name of the destination host. port <1-65535> Optional. Configures the syslog server’s UDP port (this port is used to connect to the server) • <1-65535> – Specify the port from 1 - 65535. Examples rfs7000-37FABE(config-wlan-wlan1)#accounting syslog host 172.16.10.12 port 2 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode tunnel encryption-type none authentication-type none 802.11w sa-query timeout 110 802.11w sa-query attempts 1 accounting syslog host 172.16.10.12 port 2 rfs7000-37FABE(config-wlan-wlan1)#
  • 330. 4 - 166 WiNG CLI Reference Guide 4.1.46.2.3 acl wlan-mode commands Defines the actions taken based on an ACL rule configuration Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax acl exceed-rate wireless-client-denied-traffic <0-1000000> {blacklist |disassociate} acl exceed-rate wireless-client-denied-traffic <0-1000000> {blacklist <0-86400>|disassociate} Parameters • acl exceed-rate wireless-client-denied-traffic <0-1000000> {blacklist <0-86400>|disassociate} acl exceed-rate Sets the actions taken based on an ACL rule configuration (for example, drop a packet) • exceed-rate – Action is taken when the rate exceeds a specified value wireless-client-denied- Sets the action to deny traffic to the wireless client, when the rate exceeds the specified traffic <0-1000000> value • <0-1000000> – Specify a allowed rate threshold of disallowed traffic in packets/sec. blacklist <0-86400> Optional. When enabled, sets the time interval to blacklist a wireless client disassociate Optional. When enabled, disassociates a wireless client Examples rfs7000-37FABE(config-wlan-wlan1)#acl exceed-rate wireless-client-denied-traffic 20 disassociate rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode tunnel encryption-type none authentication-type none 802.11w sa-query timeout 110 802.11w sa-query attempts 1 accounting syslog host 172.16.10.12 port 2 acl exceed-rate wireless-client-denied-traffic 20 disassociate rfs7000-37FABE(config-wlan-wlan1)#
  • 331. GLOBAL CONFIGURATION COMMANDS 4 - 167 4.1.46.2.4 answer-broadcast-probes wlan-mode commands Allows the WLAN to respond to probe requests that do not specify an SSID. These probes are for broadcast ESS. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax answer-broadcast-probes Parameters None Examples rfs7000-37FABE(config-wlan-wlan1)#answer-broadcast-probes rfs7000-37FABE(config-wlan-wlan1)#
  • 332. 4 - 168 WiNG CLI Reference Guide 4.1.46.2.5 authentication-type wlan-mode commands Sets the WLAN’s authentication type Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax authentication-type [eap|eap-mac|eap-psk|kerberos|mac|none] Parameters • authentication-type [eap|eap-mac|eap-psk|kerberos|mac|none] authentication-type Configures a WLAN’s authentication type The authentication types are: EAP, EAP-MAC, EAP-PSK, Kerberos, MAC, and none. eap Configures Extensible Authentication Protocol (EAP) authentication (802.1X) eap-mac Configures EAP or MAC authentication depending on client eap-psk Configures EAP authentication or pre-shared keys depending on client (This setting is only valid with Temporal Key Integrity Protocol (TKIP) or Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)) kerberos Configures Kerberos authentication (encryption will change to WEP128 if it’s not already WEP128 or Keyguard) mac Configures MAC authentication (RADIUS lookup of MAC address) none No authentication is used or the client uses pre-shared keys
  • 333. GLOBAL CONFIGURATION COMMANDS 4 - 169 Examples rfs7000-37FABE(config-wlan-wlan1)#authentication-type eap rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode tunnel encryption-type none authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 accounting syslog host 172.16.10.12 port 2 acl exceed-rate wireless-client-denied-traffic 20 disassociate rfs7000-37FABE(config-wlan-wlan1)#
  • 334. 4 - 170 WiNG CLI Reference Guide 4.1.46.2.6 bridging-mode wlan-mode commands Configures how packets are bridged to and from a WLAN Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax bridging-mode [local|tunnel] Parameters • bridging-mode [local|tunnel] bridging-mode Configures how packets are bridged to and from a WLAN. The options available are local and tunnel. local Bridges packets between WLAN and local ethernet ports tunnel Tunnels packets to other devices (typically a wireless controller) Examples rfs7000-37FABE(config-wlan-wlan1)#bridging-mode local rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode local encryption-type none authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 accounting syslog host 172.16.10.12 port 2 acl exceed-rate wireless-client-denied-traffic 20 disassociate rfs7000-37FABE(config-wlan-wlan1)#
  • 335. GLOBAL CONFIGURATION COMMANDS 4 - 171 4.1.46.2.7 broadcast-dhcp wlan-mode commands Configures the broadcast DHCP packet handling parameters Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax broadcast-dhcp validate-offer Parameters • broadcast-dhcp validate-offer validate-offer Validates the broadcast DHCP packet destination (a wireless client associated to the radio) before forwarding over the air Examples rfs7000-37FABE(config-wlan-wlan1)#broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode local encryption-type none authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 accounting syslog host 172.16.10.12 port 2 acl exceed-rate wireless-client-denied-traffic 20 disassociate broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)#
  • 336. 4 - 172 WiNG CLI Reference Guide 4.1.46.2.8 broadcast-ssid wlan-mode commands Advertises the WLAN SSID in beacons Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax broadcast-ssid Parameters None Examples rfs7000-37FABE(config-wlan-wlan1)#broadcast-ssid rfs7000-37FABE(config-wlan-wlan1)#
  • 337. GLOBAL CONFIGURATION COMMANDS 4 - 173 4.1.46.2.9 captive-portal-enforcement wlan-mode commands Configures the WLAN’s captive portal enforcement Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax captive-portal-enforcement {fall-back} Parameters • captive-portal-enforcement {fall-back} captive-portal-enforcement Enables captive portal enforcement on a WLAN fall-back Optional. Enforces captive portal validation if WLAN authentication fails (applicable to EAP or MAC authentication only) Examples rfs7000-37FABE(config-wlan-wlan1)#captive-portal-enforcement fall-back rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode local encryption-type none authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 accounting syslog host 172.16.10.12 port 2 captive-portal-enforcement fall-back acl exceed-rate wireless-client-denied-traffic 20 disassociate broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)#
  • 338. 4 - 174 WiNG CLI Reference Guide 4.1.46.2.10 client-access wlan-mode commands Enables WLAN client access (for normal data operations) Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax client-access Parameters None Examples rfs7000-37FABE(config-wlan-wlan1)#client-access rfs7000-37FABE(config-wlan-wlan1)#
  • 339. GLOBAL CONFIGURATION COMMANDS 4 - 175 4.1.46.2.11 client-client-communication wlan-mode commands Allows frame switching from one client to another on a WLAN Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax client-client-communication Parameters None Examples rfs7000-37FABE(config-wlan-wlan1)#client-client-communication rfs7000-37FABE(config-wlan-wlan1)#s
  • 340. 4 - 176 WiNG CLI Reference Guide 4.1.46.2.12 client-load-balancing wlan-mode commands Configures client load balancing on a WLAN Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax client-load-balancing {allow-single-band-clients|band-discovery-intvl| capability-ageout-time|max-probe-req|probe-req-invl} client-load-balancing {allow-single-band-clients [2.4Ghz|5Ghz]| band-discovery-intvl [<0-10000>]|capability-ageout-time [<0-10000>]} client-load-balancing {{max-probe-req|probe-req-intvl} [2.4Ghz|5Ghz] [<0-10000>]} Parameters • client-load-balancing {allow-single-band-clients [2.4Ghz|5Ghz]| band-discovery-intvl [<0-10000>]|capability-ageout-time [<0-10000>]} client-load-balancing Configures client load balancing on a WLAN allow-single-band-clients Optional. Allows single band clients to associate even during load balancing [2.4GHz|5GHz] • 2.4GHz – Enables load balancing across 2.4GHz channels • 5GHz – Enables load balancing across 5GHz channels band-discovery-intvl Optional. Configures time interval to discover a client's band capability before <0-10000> associating it • <0-10000> – Specify a value from 0 - 10000 seconds. capability-ageout-time Optional. Configures a client's capability ageout interval <0-10000> • <0-10000> – Specify a value from 0 - 10000 seconds. • client-load-balancing {{max-probe-req|probe-req-intvl} [2.4Ghz|5Ghz] [<0-10000>]} client-load-balancing Configures load balancing of clients on a WLAN
  • 341. GLOBAL CONFIGURATION COMMANDS 4 - 177 max-probe-req Optional. Configures client probe request interval limits for association [2.4GHz|5GHz] <0-10000> • 2.4GHz – Configures maximum client probe requests on 2.4GHz radios • 5GHz – Configures maximum client probe requests on 5GHz radios • <0-10000> – Specify a client probe request threshold from 0 - 100000. probe-req-intvl Optional. Configures client probe request interval limits for association 2.4GHz|5GHz] <0-10000> • 2.4GHz – Configures client probe request interval on 2.4GHz radios • 5GHz – Configures client probe request interval on 5GHz radios • <0-10000> – Specify a value from 0 - 100000. Examples rfs7000-37FABE(config-wlan-wlan1)#client-load-balancing allow-single-band-clients 2.4ghz rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#client-load-balancing band-discovery-intvl 2 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABEconfig-wlan-wlan1)#client-load-balancing probe-req-intvl 5ghz 5 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode local encryption-type none authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 accounting syslog host 172.16.10.12 port 2 client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 captive-portal-enforcement fall-back acl exceed-rate wireless-client-denied-traffic 20 disassociate broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)#
  • 342. 4 - 178 WiNG CLI Reference Guide 4.1.46.2.13 data-rates wlan-mode commands Specifies the 802.11 rates supported on a WLAN Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax data-rates [2.4GHz|5GHz] data-rates 2.4GHz [b-only|bg|bgn|custom|default|g-only|gn] data-rates 2.4GHz [b-only|bg|bgn|default|g-only|gn] data-rates 2.4GHz custom [1|11|12|18|2|24|36|48|5.5|54|6|9| basic-1|basic-11|basic-12|basic-18|basci-2|basic-24|basic-36| basic-48|basic-5.5|basic-54|basic-6|basic-9|basic-mcs0-7|mcs0-15| mcs0-7|mcs8-15] data-rates 5GHz [a-only|an|custom|default] data-rates 5GHz [a-only|an|default] data-rates 5GHz custom [12|18|24|36|48|54|6|9|basic-1|basi-11| basic-12|basic-18|basic-2|basic-24|basic-36|basic-48|basic-5.5|basic-54| basic-6|basic-9|basic-mcs0-7|mcs0-15|mcs0-7|mcs8-15] Parameters • data-rates 2.4GHz [b-only|bg|bgn|default|g-only|gn] data-rates Specifies the 802.11 rates supported when mapped to a 2.4GHz radio b-only Uses rates that support only 11b clients bg Uses rates that support both 11b and 11g clients bgn Uses rates that support 11b, 11g and 11n clients default Uses the default rates configured for a 2.4GHz radio g-only Uses rates that support operation in the 11g only mode gn Uses rates that support 11g and 11n clients
  • 343. GLOBAL CONFIGURATION COMMANDS 4 - 179 • data-rates 5GHz [a-only|an|default] data-rates Specifies the 802.11 rates supported when mapped to a 5GHz radio a-only Uses rates that support operation in 11a only an Uses rates that support 11a and 11n clients default Uses default rates configured for a 5GHz • data-rates [2.4GHz|5GHz] custom [1|11|12|18|2|24|36|48|5.5|54|6|9| basic-1|basic-11|basic-12|basic-18|basic-2|basic-24|basic-36| basic-48|basic-5.5|basic-54|basic-6|basic-9|basic-mcs0-7|mcs0-15| mcs0-7|mcs8-15] data-rates [2.4GHz|5GHz] Specifies the 802.11 rates supported when mapped to a 2.4GHz or 5GHz radio custom Configures a data rates list by specifying each rate individually. Use 'basic-' prefix before a rate to indicate it is used as a basic rate (For example, 'data-rates custom basic-1 basic- 2 5.5 11'). The data-rates for 2.4GHz and 5GHz channels are the same with a few exceptions. The 2.4GHz channel has a few extra data rates: 1, 11, 2, and 5.5.
  • 344. 4 - 180 WiNG CLI Reference Guide 1,11,2,5.5 The following data rates are specific to the 2.4GHz channel: • 1 – 1-Mbps • 11 – 11-Mbps • 2 – 2-Mbps • 5.5 – 5.5-Mbps 12,18,24,36,48,54,6,9, The following data rates are common to both the 2.4Ghz and 5GHz channels: basic-1,basic-11, • 12 – 12 Mbps basic-12,basic-18,basic-2, • 18 – 18-Mbps basic-36,basic-48,basic- 5.5, • 24 – 24 Mbps basic-54,basic-6,basic-9, • 36 – 36-Mbps basic-mcs0-7,mcs0-15, • 48 – 48-Mbps mcs0-7,mcs8-15 • 54 – 54-Mbps • 6 – 6-Mbps • 9 – 9-Mbps • basic-1 – basic 1-Mbps • basic-11 – basic 11-Mbps • basic-12 – basic 12-Mbps • basic-18 – basic 18-Mbps • basic-2 – basic 2-Mbps • basic-36 – basic 36-Mbps • basic-48 – basic 48-Mbps • basic-5.5 – basic 5.5-Mbps • basic-54 – basic 54-Mbps • basic-6 – basic 6-Mbps • basic-9 – basic 9-Mbps • basic-mcs0-7 – Modulation and coding scheme 0-7 as a basic rate • mcs0-15 – Modulation and coding scheme 0-15 • mcs0-7 – Modulation and coding scheme 0-7 • mcs8-15 – Modulation and coding scheme 8-15
  • 345. GLOBAL CONFIGURATION COMMANDS 4 - 181 Examples rfs7000-37FABE(config-wlan-wlan1)#data-rates 2.4GHz gn rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode local encryption-type none authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 accounting syslog host 172.16.10.12 port 2 data-rates 2.4GHz gn client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 captive-portal-enforcement fall-back acl exceed-rate wireless-client-denied-traffic 20 disassociate broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)#
  • 346. 4 - 182 WiNG CLI Reference Guide 4.1.46.2.14 description wlan-mode commands Defines the WLAN description Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax description <LINE> Parameters • description <LINE> <LINE> Specify a WLAN description Examples rfs7000-37FABE(config-wlan-wlan1)#description testwlan rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 description testwlan ssid wlan1 bridging-mode local encryption-type none authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 accounting syslog host 172.16.10.12 port 2 data-rates 2.4GHz gn client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 captive-portal-enforcement fall-back acl exceed-rate wireless-client-denied-traffic 20 disassociate broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)#
  • 347. GLOBAL CONFIGURATION COMMANDS 4 - 183 4.1.46.2.15 encryption-type wlan-mode commands Sets a WLAN’s encryption type Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax encryption-type [ccmp|keyguard|none|tkip|tkip-ccmp|wep128| web128-keyguard|wep64] Parameters • encryption-type [ccmp|keyguard|none|tkip|tkip-ccmp|wep128| web128-keyguard|wep64] encryption-type Configures the WLAN’s data encryption parameters ccmp Configures Advanced Encryption Standard (AES) Counter Mode CBC-MAC Protocol (AES-CCM/CCMP) keyguard Configures Keyguard-MCM (Mobile Computing Mode) tkip Configures TKIP tkip-ccmp Configures the TKIP and AES-CCM/CCMP encryption modes wep128 Configures WEP with 128 bit keys wep128-keyguard Configures WEP128 as well as Keyguard-MCM encryption modes wep64 Configures WEP with 64 bit keys. A WEP64 configuration is insecure when two WLANs are mapped to the same VLAN, and one uses no encryption while the other uses WEP.
  • 348. 4 - 184 WiNG CLI Reference Guide Examples rfs7000-37FABEconfig-wlan-wlan1)#encryption-type tkip-ccmp rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 description testwlan ssid wlan1 bridging-mode local encryption-type tkip-ccmp authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 accounting syslog host 172.16.10.12 port 2 data-rates 2.4GHz gn client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 captive-portal-enforcement fall-back acl exceed-rate wireless-client-denied-traffic 20 disassociate broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)#
  • 349. GLOBAL CONFIGURATION COMMANDS 4 - 185 4.1.46.2.16 enforce-dhcp wlan-mode commands Drops packets from clients with a static IP address Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax enforce-dhcp Parameters None Examples rfs7000-37FABE(config-wlan-wlan1)#enforce-dhcp rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 description testwlan ssid wlan1 bridging-mode local encryption-type tkip-ccmp authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 accounting syslog host 172.16.10.12 port 2 data-rates 2.4GHz gn client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 captive-portal-enforcement fall-back acl exceed-rate wireless-client-denied-traffic 20 disassociate enforce-dhcp broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)#
  • 350. 4 - 186 WiNG CLI Reference Guide 4.1.46.2.17 ip wlan-mode commands Configures Internet Protocol (IP) settings Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ip [arp|dhcp] ip arp [header-mismatch-validation|trust] ip dhcp trust Parameters • ip arp [header-mismatch-validation|trust] ip arp Configures the IP settings for ARP packets header-mismatch- Verifies mismatch of source MAC address in the ARP and Ethernet headers validation trust Sets ARP responses as trusted for a WLAN/range • ip dhcp trust ip dhcp Configures the IP settings for DHCP packets trust Sets DHCP responses as trusted for a WLAN/range
  • 351. GLOBAL CONFIGURATION COMMANDS 4 - 187 Examples rfs7000-37FABE(config-wlan-wlan1)#ip dhcp trust rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 description testwlan ssid wlan1 bridging-mode local encryption-type tkip-ccmp authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 accounting syslog host 172.16.10.12 port 2 data-rates 2.4GHz gn client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 captive-portal-enforcement fall-back ip dhcp trust acl exceed-rate wireless-client-denied-traffic 20 disassociate enforce-dhcp broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)#
  • 352. 4 - 188 WiNG CLI Reference Guide 4.1.46.2.18 kerberos wlan-mode commands Configures Kerberos authentication parameters on a WLAN Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax kerberos [password|realm|server] kerberos password [0 <LINE>|2 <LINE>|<LINE>] kerberos realm <REALM> kerberos server [primary|secondary|timeout] kerberos server [primary|secondary] host <IP/HOSTNAME> {port [<1-65535>]} keberos server timeout <1-60> Parameters • kerberos password [0 <LINE>|2 <LINE>|<LINE>] kerberos Configures a WLAN’s Kerberos authentication parameters The parameters are: password, realm, and server. password Configures a Kerberos Key Distribution Center (KDC) server password. The password should not exceed 127 characters. The password options are: • 0 <LINE> – Configures a clear text password • 2 <LINE> – Configures an encrypted password • <LINE> – Specify the password. • kerberos realm <REALM> kerberos Configures a WLAN’s Kerberos authentication parameters The parameters are: password, realm, and server. realm <REALM> Configures a Kerberos KDC server realm. The REALM should not exceed 127 characters.
  • 353. GLOBAL CONFIGURATION COMMANDS 4 - 189 • kerberos server [primary|secondary] host <IP/HOSTNAME> {port [<1-65535>]} kerberos Configures a WLAN’s Kerberos authentication parameters The parameters are: password, realm, and server. server Configures the primary and secondary KDC server parameters [primary|secondary] • primary – Configures the primary KDC server parameters • secondary – Configures the secondary KDC server parameters host <IP/HOSTNAME> Sets the primary or secondary KDC server address • <IP/HOSTNAME> – Specify the IP address or name of the KDC server. port <1-65535> Optional. Configures the UDP port used to connect to the KDC server • <1-65535> – Specify the port from 1 - 65535. The default is 88. • keberos server timeout <1-60> kerberos Configures a WLAN’s Kerberos authentication parameters The parameters are: password, realm, and server. timeout <1-60> Modifies the Kerberos KDC server‘s timeout parameters • <1-60> – Specifies the time the wireless controller waits for a response from the Kerberos KDC server before retrying. Specify a value from 1 - 60 seconds. Examples rfs7000-37FABE(config-wlan-wlan1)#kerberos server timeout 12 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#kerberos server primary host 172.16.10.9 port 88 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 description testwlan ssid wlan1 bridging-mode local encryption-type tkip-ccmp authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 kerberos server timeout 12 kerberos server primary host 172.16.10.9 accounting syslog host 172.16.10.12 port 2 data-rates 2.4GHz gn client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 captive-portal-enforcement fall-back ip dhcp trust acl exceed-rate wireless-client-denied-traffic 20 disassociate enforce-dhcp broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)#
  • 354. 4 - 190 WiNG CLI Reference Guide 4.1.46.2.19 motorola-extensions wlan-mode commands Enables support for Motorola Solutions specific extensions to 802.11 Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax motorola-extensions [move-command|smart-scan|symbol-load-information| wmm-load-information] Parameters • otorola-extensions [move-command|smart-scan|symbol-load-information| wmm-load-information] motorola-extensions Enables support for Motorola Solutions specific extensions to 802.11 move-command Enables support for Motorola move (fast roaming) feature smart-scan Enables support for smart scanning feature symbol-load-information Enables support for the Symbol Technologies load information element (Element ID 173) wmm-load-information Enables support for the Motorola Solutions WMM load information element
  • 355. GLOBAL CONFIGURATION COMMANDS 4 - 191 Examples rfs7000-37FABE(config-wlan-wlan1)#motorola-extensions wmm-load-information rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 description testwlan ssid wlan1 bridging-mode local encryption-type tkip-ccmp authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 kerberos server timeout 12 kerberos server primary host 172.16.10.9 accounting syslog host 172.16.10.12 port 2 data-rates 2.4GHz gn motorola-extensions wmm-load-information client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 captive-portal-enforcement fall-back ip dhcp trust acl exceed-rate wireless-client-denied-traffic 20 disassociate enforce-dhcp broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)#
  • 356. 4 - 192 WiNG CLI Reference Guide 4.1.46.2.20 no wlan-mode commands Negates WLAN mode commands and reverts values to their default Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax no <parameter> Parameters None Usage Guidelines The no command negates any command associated with it. Wherever required, use the same parameters associated with the command getting negated. Examples rfs7000-37FABE(config-wlan-wlan1)#no ? 802.11w Disable support for Protected Management Frames (IEEE 802.11w) accounting Configure how accounting records are created for this wlan acl Actions taken based on ACL configuration [ packet drop being one of them] answer-broadcast-probes Do not Include this wlan when responding to probe requests that do not specify an SSID authentication-type Reset the authentication to use on this wlan to default (none/Pre-shared keys) broadcast-dhcp Configure broadcast DHCP packet handling broadcast-ssid Do not advertise the SSID of the WLAN in beacons captive-portal-enforcement Configure how captive-portal is enforced on the wlan client-access Disallow client access on this wlan (no data operations) client-client-communication Disallow switching of frames from one wireless client to another on this wlan client-load-balancing Disable load-balancing of clients on this wlan data-rates Reset data rate configuration to default description Reset the description of the wlan encryption-type Reset the encryption to use on this wlan to default (none) enforce-dhcp Drop packets from Wireless Clients with static IP address ip Internet Protocol (IP) kerberos Configure kerberos authentication parameters motorola-extensions Disable support for Motorola-Specific
  • 357. GLOBAL CONFIGURATION COMMANDS 4 - 193 extensions to 802.11 proxy-arp-mode Configure handling of ARP requests with proxy-arp is enabled radius Configure RADIUS related parameters shutdown Enable the use of this wlan ssid Configure ssid use Set setting to use vlan Map the default vlan (vlan-id 1) to the wlan vlan-pool-member Delete a mapped vlan from this wlan wep128 Reset WEP128 parameters wep64 Reset WEP64 parameters wireless-client Configure wireless-client specific parameters wpa-wpa2 Modify tkip-ccmp (wpa/wpa2) related parameters service Service Commands rfs7000-37FABE(config-wlan-wlan1)# The wlan1 settings before the execution of the no command: rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 description testwlan ssid wlan1 bridging-mode local encryption-type tkip-ccmp authentication-type eap 802.11w sa-query timeout 110 802.11w sa-query attempts 1 kerberos server timeout 12 kerberos server primary host 172.16.10.9 accounting syslog host 172.16.10.12 port 2 data-rates 2.4GHz gn motorola-extensions wmm-load-information client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 captive-portal-enforcement fall-back ip dhcp trust acl exceed-rate wireless-client-denied-traffic 20 disassociate enforce-dhcp broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#no accounting syslog rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#no description rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#no authentication-type rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#no encryption-type rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#no enforce-dhcp rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#no kerberos server primary host rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#no kerberos server timeout rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#no data-rates 2.4GHz rfs7000-37FABE(config-wlan-wlan1)# The wlan1 settings after the execution of the no command:
  • 358. 4 - 194 WiNG CLI Reference Guide rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode local encryption-type none authentication-type none 802.11w sa-query timeout 110 802.11w sa-query attempts 1 motorola-extensions wmm-load-information client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 captive-portal-enforcement fall-back ip dhcp trust acl exceed-rate wireless-client-denied-traffic 20 disassociate broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)#
  • 359. GLOBAL CONFIGURATION COMMANDS 4 - 195 4.1.46.2.21 proxy-arp-mode wlan-mode commands Enables proxy ARP mode for handling ARP requests Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax proxy-arp-mode [dynamic|strict] Parameters • proxy-arp-mode [dynamic|strict] proxy-arp-mode Enables proxy ARP mode for handling ARP requests. The options available are dynamic and strict. dynamic Forwards ARP requests to the wireless side (for which a response could not be proxied) strict Does not forward ARP requests to the wireless side Examples rfs7000-37FABE(config-wlan-wlan1)#proxy-arp-mode strict rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode local encryption-type none authentication-type none 802.11w sa-query timeout 110 802.11w sa-query attempts 1 motorola-extensions wmm-load-information client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 captive-portal-enforcement fall-back ip dhcp trust acl exceed-rate wireless-client-denied-traffic 20 disassociate proxy-arp-mode strict broadcast-dhcp validate-offer rfs7000-37FABE(config-wlan-wlan1)#
  • 360. 4 - 196 WiNG CLI Reference Guide 4.1.46.2.22 radius wlan-mode commands Configures RADIUS related parameters Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax radius [dynamic-authorization|nas-identifier|nas-port-id|vlan-assignment] radius [dynamic-authorization|nas-identifier <NAS-ID>| nas-port-id <NAS-PORT-ID>|vlan-assignment] Parameters • radius [dynamic-authorization|nas-identifier <NAS-ID>| nas-port-id <NAS-PORT-ID>|vlan-assignment] dynamic-authorization Enables support for disconnect and change of authorization messages (RFC5176) nas-identifier <NAS-ID> Configures the WLAN NAS identifier sent to the RADIUS server. The NAS identifier should not exceed 256 characters. nas-port-id Configures the WLAN NAS port ID sent to the RADIUS server. The NAS port identifier <NAS-PORT-ID> should not exceed 256 characters. vlan-assignment Configures the VLAN assignment of a WLAN Examples rfs7000-37FABE(config-wlan-wlan1)#radius vlan-assignment rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode local encryption-type none authentication-type none 802.11w sa-query timeout 110 802.11w sa-query attempts 1 radius vlan-assignment motorola-extensions wmm-load-information client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 proxy-arp-mode strict rfs7000-37FABE(config-wlan-wlan1)#
  • 361. GLOBAL CONFIGURATION COMMANDS 4 - 197 4.1.46.2.23 shutdown wlan-mode commands Shuts down a WLAN Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax shutdown Parameters None Examples rfs7000-37FABE(config-wlan-1)#shutdown
  • 362. 4 - 198 WiNG CLI Reference Guide 4.1.46.2.24 ssid wlan-mode commands Configures a WLAN’s SSID Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax ssid <SSID> Parameters • ssid <SSID> <SSID> Specify the WLAN’s SSID. The WLAN SSID is case sensitive and alphanumeric. It’s length should not exceed 32 characters. Examples rfs7000-37FABE(config-wlan-wlan1)#ssid test1 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid test1 bridging-mode local encryption-type none authentication-type none 802.11w sa-query timeout 110 802.11w sa-query attempts 1 radius vlan-assignment motorola-extensions wmm-load-information client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 proxy-arp-mode strict rfs7000-37FABE(config-wlan-wlan1)#
  • 363. GLOBAL CONFIGURATION COMMANDS 4 - 199 4.1.46.2.25 use wlan-mode commands This command associates an existing captive portal with a WLAN. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax use [aaa-policy|association-acl-policy|captive-portal|ip-access-list| mac-access-list|wlan-qos-policy] use [aaa-policy <AAA-POLICY-NAME>|association-acl-policy <ASSOCIATION-POLICY- NAME>|captive-portal <CAPTIVE-PORTAL-NAME>|wlan-qos-policy <WLAN-QOS-POLICY- NAME>] use ip-access-list [in|out] <IP-ACCESS-LIST-NAME> use mac-access-list [in|out] <MAC-ACCESS-LIST-NAME> Parameters • use [aaa-policy <AAA-POLICY-NAME>|association-acl-policy <ASSOCIATION-POLICY- NAME>|captive-portal <CAPTIVE-PORTAL-NAME>|wlan-qos-policy <WLAN-QOS-POLICY-NAME>] aaa-policy Uses a specified AAA policy with a WLAN <AAA-POLICY-NAME> • <AAA-POLICY-NAME> – Specify the name of the AAA policy. association-acl Uses a specified association ACL policy with a WLAN <ASSOCIATION-POLICY- • <ASSOCIATION-POLICY-NAME> – Specify the name of the association ACL policy. NAME> captive-portal Enables a WLAN’s captive portal authentication <CAPTIVE-PORTAL-NAME> • <CAPTIVE-PORTAL-NAME> – Specify the name of the captive portal. wlan-qos-policy Uses a specified WLAN QoS policy with a WLAN <WLAN-QOS-POLICY- • <wlan-qos-policy-name> – Specify the name of the WLAN QoS policy. NAME> • use ip-access-list [in|out] <IP-ACCESS-LIST-NAME>] ip-access-list [in|out] <IP- Specifies the IP access list for incoming and outgoing packets ACCESS-LIST-NAME> • in – Incoming packets • out – Outgoing packets • <IP-ACCESS-LIST-NAME> – Specify the name of the IP access list.
  • 364. 4 - 200 WiNG CLI Reference Guide • use mac-access-list [in|out] <MAC-ACCESS-LIST-NAME> mac-access-list [in|out] Specifies the MAC access list for incoming and outgoing packets. <MAC-ACCESS-LIST- • in – Incoming packets NAME> • out – Outgoing packets • <MAC-ACCESS-LIST-NAME> – Specify the name of the MAC access list. Examples rfs7000-37FABE(config-wlan-wlan1)#use ip-access-list in symbol rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid test1 bridging-mode local encryption-type none authentication-type none 802.11w sa-query timeout 110 802.11w sa-query attempts 1 radius vlan-assignment motorola-extensions wmm-load-information client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 use ip-access-list in symbol proxy-arp-mode strict rfs7000-37FABE(config-wlan-wlan1)#
  • 365. GLOBAL CONFIGURATION COMMANDS 4 - 201 4.1.46.2.26 vlan wlan-mode commands Sets the VLAN where traffic from a WLAN is mapped Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax vlan <1-4094> Parameters • vlan <1-4094> <1-4094> Sets a WLAN’s VLAN ID. This command starts a new VLAN assignment for a WLAN index. All prior VLAN settings are erased. Examples rfs7000-37FABE(config-wlan-wlan1)#vlan 4 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid test1 vlan 4 bridging-mode local encryption-type none authentication-type none 802.11w sa-query timeout 110 802.11w sa-query attempts 1 radius vlan-assignment motorola-extensions wmm-load-information client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 use ip-access-list in symbol proxy-arp-mode strict rfs7000-37FABE(config-wlan-wlan1)#
  • 366. 4 - 202 WiNG CLI Reference Guide 4.1.46.2.27 vlan-pool-member wlan-mode commands Adds a member VLAN to a WLAN’s VLAN pool NOTE: Configuration of a VLAN pool overrides the 'vlan' configuration. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax vlan-pool-member <WORD> {limit [<0-8192>]} Parameters • vlan-pool-member <WORD> {limit [<0-8192>]} vlan-pool-member Adds a member VLAN to a WLAN’s VLAN pool <WORD> Defines the VLAN configuration. It is either a single index, or a list of VLAN IDs (For example, 1,3,7) limit <0-8192> Optional. Is ignored if the number of clients are limited and well within the limits of the DHCP pool on the VLAN • <0-8192> – Specifies the number of users allowed
  • 367. GLOBAL CONFIGURATION COMMANDS 4 - 203 Examples rfs7000-37FABE(config-wlan-wlan1)#vlan-pool-member 1-10 limit 1 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid test1 vlan-pool-member 1 limit 1 vlan-pool-member 2 limit 1 vlan-pool-member 3 limit 1 vlan-pool-member 4 limit 1 vlan-pool-member 5 limit 1 vlan-pool-member 6 limit 1 vlan-pool-member 7 limit 1 vlan-pool-member 8 limit 1 vlan-pool-member 9 limit 1 vlan-pool-member 10 limit 1 bridging-mode local encryption-type none authentication-type none 802.11w sa-query timeout 110 802.11w sa-query attempts 1 radius vlan-assignment motorola-extensions wmm-load-information client-load-balancing probe-req-intvl 5ghz 5 client-load-balancing band-discovery-intvl 2 use ip-access-list in symbol proxy-arp-mode strict rfs7000-37FABE(config-wlan-wlan1)#
  • 368. 4 - 204 WiNG CLI Reference Guide 4.1.46.2.28 wep128 wlan-mode commands Configures WEP128 parameters Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax wep128 [key|keys-from-passkey|transmit-key] wep128 key <1-4> [ascii|hex] [0 <WORD>|2 <WORD>|<WORD>] wep128 keys-from-passkey <WORD> wep128 transmit-key <1-4> Parameters • wep128 key <1-4> [ascii|hex] [0 <WORD>|2 <WORD>|<WORD>] wep128 Configures WEP128 parameters. The parameters are: key, key-from-passkey, and transmit-key. key <1-4>] Configures pre-shared hex keys • <1-4> – Configures a maximum of four key indexes. Select the key index from 1 - 4. ascii Sets keys as ASCII characters (5 characters for WEP64, 13 for WEP128) [0 <WORD>| • 0 <WORD> – Configures a clear text key 2 <WORD>|<WORD>] • 2 <WORD> – Configures an encrypted key • <WORD> – Configures keys as 13 ASCII characters converted to hex, or 26 hexadecimal characters hex Sets keys as hexadecimal characters (10 characters for WEP64, 26 for WEP128). [0 <WORD>| • 0 <WORD> – Configures a clear text key 2 <WORD>|<WORD>] • 2 <WORD> – Configures an encrypted key • <WORD> – Configures keys as 13 ASCII characters converted to hex, or 26 hexadecimal characters
  • 369. GLOBAL CONFIGURATION COMMANDS 4 - 205 • wep128 keys-from-passkey <WORD>] keys-from-passkey Specifies a passphrase from which keys are derived <WORD> • <WORD> – Specify a passphrase from 4 - 32 characters. • wep128 transmit-key <1-4>] transmit-key <1-4> Configures the key index used for transmission from an AP to a wireless client • <1-4> – Specify a key index from 1 - 4. Examples rfs7000-37FABE(config-wlan-wlan1)#wep128 transmit-key 1 rfs7000-37FABE(config-wlan-wlan1)#
  • 370. 4 - 206 WiNG CLI Reference Guide 4.1.46.2.29 wep64 wlan-mode commands Configures WEP64 parameters Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax wep64 [key|keys-from-passkey|transmit-key] wep64 key <1-4> [ascii|hex] [0 <WORD>|2 <WORD>|<WORD>] wep64 keys-from-passkey <WORD> wep64 transmit-key <1-4>] Parameters • wep64 key <1-4> [ascii|hex] [0 <WORD>|2 <WORD>|<WORD>] wep64 Configures WEP64 parameters The parameters are: key, key-from-passkey, and transmit-key. key <1-4>] Configures pre-shared hex keys • <1-4> – Configures a maximum of four key indexes. Select a key index from 1 - 4. ascii Sets keys as ASCII characters (5 characters for WEP64, 13 for WEP128) [0 <WORD>| • 0 <WORD> – Configures a clear text key 2 <WORD>|<WORD>] • 2 <WORD> – Configures an encrypted key • <WORD> – Configures key (10 hex or 5 ASCII characters for WEP64, 26 hex or 13 ASCII characters for WEP128). hex Sets keys as hexadecimal characters (10 characters for WEP64, 26 for WEP128). [0 <WORD>| • 0 <WORD> – Configures a clear text key 2 <WORD>|<WORD>] • 2 <WORD> – Configures an encrypted key • <WORD> – Configures the key (10 hex or 5 ASCII characters for WEP64, 26 hex or 13 ASCII characters for WEP128) • wep64 keys-from-passkey <WORD>] keys-from-passkey Specifies a passphrase from which keys are derived <WORD> • <WORD> – Specify a passphrase from 4 - 32 characters.
  • 371. GLOBAL CONFIGURATION COMMANDS 4 - 207 • wep64 transmit-key <1-4>] transmit-key <1-4> Configures the key index used for transmission from an AP to a wireless client • <1-4> – Specify a key index from 1 - 4. Examples rfs7000-37FABE(config-wlan-wlan1)#wep64 key 1 ascii symbo rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#wep64 transmit-key 1 rfs7000-37FABE(config-wlan-wlan1)#
  • 372. 4 - 208 WiNG CLI Reference Guide 4.1.46.2.30 wireless-client wlan-mode commands Configures the transmit power indicated to clients Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax wireless-client [cred-cache-ageout|hold-time |inactivity-timeout| max-firewall-sessions|reauthentication|tx-power|vlan-cache-out] wireless-client [cred-cache-ageout <60-86400>|hold-time <1-300>| inactivity-timeout <60-86400>|max-firewall-sessions <10-10000>| reauthentication <30-86400>|tx-power <0-20>|vlan-cache-out <60-86400>] Parameters • wireless-client [cred-cache-ageout <60-86400>|hold-time <1-300>| inactivity-timeout <60-86400>|max-firewall-sessions <10-10000>| reauthentication <30-86400>|tx-power <0-20>|vlan-cache-out <60-86400>] wireless-client Configures the transmit power indicated to wireless clients for transmission cred-cache-ageout Configures the timeout period for which client credentials (For example, encryption keys) <60-86400> are cached across associations • <60-86400> – Specify a value from 60 - 86400 seconds. hold-time <1-300> Configures the time period for which wireless client state information is cached post roaming • <1-300> – Specify a value from 1 - 300 seconds. inactivity-timeout Configures an inactivity timeout period in seconds. If a frame is not received from a <60-86400> wireless client for this period of time, the client is disassociated. • <60-86400> – Specify a value from 60 - 86400 seconds. max-firewall-sessions Configures the maximum firewall sessions allowed per client on a WLAN <10-10000> • <10-10000> – Specify the maximum number of firewall sessions allowed from 10 - 10000. reauthentication Configures periodic reauthentication of associated clients <30-86400> • <30-86400> – Specify the client reauthentication interval from 30 - 86400 seconds.
  • 373. GLOBAL CONFIGURATION COMMANDS 4 - 209 tx-power <0-20> Configures the transmit power indicated to clients • <0-20> – Specify a value from 0 - 20 dBm. vlan-cache-ageout Configures the timeout period for which client VLAN information is cached across <60-86400> associations. • <60-86400> – Specify a value from 60 - 86400 seconds. Examples rfs7000-37FABE(config-wlan-wlan1)#wireless-client cred-cache-ageout 65 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#wireless-client hold-time 10 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#wireless-client max-firewall-sessions 100 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#wireless-client reauthentication 35 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#wireless-client tx-power 12 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode tunnel encryption-type none authentication-type none wireless-client hold-time 10 wireless-client cred-cache-ageout 65 wireless-client max-firewall-sessions 100 wireless-client reauthentication 35 wep64 key 1 hex 0 73796d626f wireless-client tx-power 12 rfs7000-37FABE(config-wlan-wlan1)#
  • 374. 4 - 210 WiNG CLI Reference Guide 4.1.46.2.31 wpa-wpa2 wlan-mode commands Modifies TKIP-CCMP (WPA/WPA2) related parameters Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax wpa-wpa2 [exclude-wpa2-tkip|handshake|key-rotation|opp-pmk-caching| pmk-caching|preauthentication|psk|tkip-countermeasures|use-sha256-akm] wpa-wpa2 [exclude-wpa2-tkip|opp-pmk-caching|pmk-caching|preauthentication| use-sha256-akm] wpa-wpa2 handshake [attempts|init-wait|priority|timeout] wpa-wpa2 handshake [attempts <1-5>|init-wait <5-1000000>|priority [high|normal]| timeout <10-5000>] wpa-wpa2 key-rotation [broadcast|unicast] <30-86400>] wpa-wpa2 psk [0 <LINE>|2 <LINE>|<LINE>] wpa-wpa2 tkip-countermeasures holdtime <0-65535> Parameters • wpa-wpa2 [exclude-wpa2-tkip|opp-pmk-caching|pmk-caching|preauthentication| use-sha256-akm] wpa-wpa2 Modifies TKIP-CCMP (WPA/WPA2) related parameters exclude-wpa2-tkip Excludes the Wi-Fi Protected Access II (WPA2) version of TKIP. It supports the WPA version of TKIP only. opp-pmk-caching Uses opportunistic key caching (same Pairwise Master Key (PMK) across APs for fast roaming with EAP.802.1x). pmk-caching Uses cached pair-wise master keys (fast roaming with eap/802.1x) preauthentication Uses pre-authentication mode (WPA2 fast roaming) use-sha256-akm Uses sha256 authentication key management suite
  • 375. GLOBAL CONFIGURATION COMMANDS 4 - 211 • wpa-wpa2 handshake [attempts <1-5>|init-wait <5-1000000>| priority [high|normal]|timeout <10-5000>] wpa-wpa2 Modifies TKIP-CCMP (WPA/WPA2) related parameters handshake Configures WPA/WPA2 handshake parameters attempts <1-5> Configures the total number of times a message is transmitted towards a non-responsive client • <1-5> – Specify a value from 1 - 5. init-wait <5-1000000> Configures a minimum wait-time period before the first handshake message is transmitted from the AP • <5-1000000> – Specify a value from 5 - 1000000 microseconds. priority [high|normal] Configures the relative priority of handshake messages compared to other data traffic • high – Treats handshake messages as high priority packets on a radio • normal – Treats handshake messages as normal priority packets on a radio timeout <10-5000> Configures the timeout period for a handshake message to retire. Once this timeout period is over, the handshake message is retired. • <10-5000> – Specify a value from 10 - 5000 milliseconds. • wpa-wpa2 key-rotation [broadcast|unicast] <30-86400> wpa-wpa2 Modifies TKIP-CCMP (WPA/WPA2) related parameters key-rotation Configures parameters related to periodic rotation of encryption keys. The parameters are periodic rotation of keys for broadcast, multicast, and unicast traffic. broadcast <30-86400> Configures the periodic rotation of keys used for broadcast and multicast traffic. This parameter specifies the interval at which keys are rotated • <30-86400> – Specify a value from 30 - 86400 seconds. unicast <30-86400> Configures a periodic interval for the rotation of keys, used for unicast traffic • <30-86400> – Specify a value from 30 - 86400 seconds. • wpa-wpa2 psk [0 <LINE>|2 <LINE>|<LINE>] wpa-wpa2 Modifies TKIP-CCMP (WPA/WPA2) related parameters psk Configures a pre-shared key. The key options are: 0, 2, and LINE 0 <LINE> Configures a clear text key 2 <LINE> Configures an encrypted key <LINE> Enter the pre-shared key either as a passphrase not exceeding 8 - 63 characters, or as a 64 character (256bit) hexadecimal value • wpa-wpa2 tkip-countermeasures holdtime <0-65535>] wpa-wpa2 Modifies TKIP-CCMP (WPA/WPA2) parameters
  • 376. 4 - 212 WiNG CLI Reference Guide tkip-countermeasures Configures a hold time period for implementation of TKIP counter measures holdtime <0-65535> Configures the amount of time a WLAN is disabled when TKIP counter measures are invoked • <0-65535> – Specify a value from 0 - 65536 seconds. Examples rfs7000-37FABE(config-wlan-wlan1)#wpa-wpa2 tkip-countermeasures hold-time 2 rfs7000-37FABE(config-wlan-wlan1)# rfs7000-37FABE(config-wlan-wlan1)#show context wlan wlan1 ssid wlan1 bridging-mode tunnel encryption-type none authentication-type none wireless-client hold-time 10 wireless-client cred-cache-ageout 65 wireless-client max-firewall-sessions 100 wireless-client reauthentication 35 wpa-wpa2 tkip-countermeasures hold-time 2 wep64 key 1 hex 0 73796d626f wireless-client tx-power 12 rfs7000-37FABE(config-wlan-wlan1)#
  • 377. GLOBAL CONFIGURATION COMMANDS 4 - 213 4.1.47 wlan-qos-policy Global Configuration Commands Configures a WLAN QoS policy Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax wlan-qos-policy <WLAN-QOS-POLICY-NAME> Parameters • wlan-qos-policy <WLAN-QOS-POLICY-NAME> <WLAN-QOS-POLICY- Specify the WLAN QoS policy name. If the policy does not exist, it is created. NAME> Examples rfs7000-37FABE(config)#wlan-qos-policy test rfs7000-37FABE(config-wlan-qos-test)# NOTE: For more information on WLAN QoS policy commands, see Chapter 23, WLAN- QOS-POLICY.
  • 378. 4 - 214 WiNG CLI Reference Guide
  • 379. CHAPTER 5 COMMON COMMANDS This chapter describes the CLI commands used in the USER EXEC, PRIV EXEC, and GLOBAL CONFIG modes. The PRIV EXEC command set contains commands available within the USER EXEC mode. Some commands can be entered in either mode. Commands entered in either the USER EXEC or PRIV EXEC mode are referred to as EXEC mode commands. If a user or privilege is not specified, the referenced command can be entered in either mode.
  • 380. 5-2 WiNG CLI Reference Guide 5.1 Common Commands Table 5.1 summarizes common commands Table 5.1 Common Commands in Controller Command Description Reference clrscr Clears the display screen page 5-3 commit Commits (saves) changes made in the current session page 5-4 end Ends and exits the current mode and moves to the PRIV EXEC mode page 5-5 exit Ends the current mode and moves to the previous mode page 5-6 help Displays the interactive help system page 5-7 no Negates a command or reverts values to their default settings page 5-11 revert Reverts changes to their last saved configuration page 5-13 service Invokes service commands to troubleshoot or debug (config-if) instance page 5-14 configurations. show Displays running system information page 5-40 write Writes the system’s running configuration to memory or terminal page 5-42
  • 381. COMMON COMMANDS 5-3 5.1.1 clrscr Common Commands Clears the screen and refreshes the prompt, irrespective of the mode you are in Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax clrscr Parameters None Examples The terminal window or screen before the clrscr command is executed: rfs7000-37FABE#ap-upgrade ? DEVICE-NAME Name/MAC address of AP all Upgrade all access points AP621 Upgrade an AP621 device AP650 Upgrade an AP650 device AP6511 Upgrade an AP6511 device AP6521 Upgrade an AP6521 device AP6532 Upgrade an AP6532 device AP71XX Upgrade an AP71XX device cancel-upgrade Cancel upgrading the AP load-image Load the AP images to controller for ap-upgrades rf-domain Upgrade all access points belonging to an RF Domain rfs7000-37FABE#clrscr The terminal window or screen after the clrscr command is executed: rfs7000-37FABE#
  • 382. 5-4 WiNG CLI Reference Guide 5.1.2 commit Common Commands Commits all changes made in the active session. Use the commit command to save and invoke settings entered during the current transaction. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax commit {write}{memory} Parameters • commit {write}{memory} write Optional. If a commit succeeds, the configuration is written to memory memory Optional. Writes to memory Examples rfs7000-37FABE#commit write memory [OK] rfs7000-37FABE#
  • 383. COMMON COMMANDS 5-5 5.1.3 end Common Commands in Controller Ends and exits the current mode and moves to the PRIV EXEC mode. The prompt changes to rfs7000-37FABE#. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax end Parameters None Examples rfs7000-37FABE(config)#end rfs7000-37FABE#
  • 384. 5-6 WiNG CLI Reference Guide 5.1.4 exit Common Commands The exit command works differently in its three supported modes. In the Global Config mode, it ends the current mode and moves to the previous mode, which is the Priv Exec mode. The prompt changes from (config)# to #. When used in the Priv Exec and User Exec modes, the exit command ends the current session and connection to the terminal device. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax exit Parameters None Examples rfs7000-37FABE(config)#exit rfs7000-37FABE#
  • 385. COMMON COMMANDS 5-7 5.1.5 help Common Commands Describes the interactive help system Use this command to access the advanced help feature. Use “?” anytime at the command prompt to access the help topic Two kinds of help are provided: • Full help is available when ready to enter a command argument • Partial help is provided when an abbreviated argument is entered and you want to know what arguments match the input (for example 'show ve?'). Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax help {search|show} help {show [configuration-tree]} help {search [<WORD>] {detailed|only-show|skip-no|skip-show}} NOTE: The show configuration-tree option is not available in the Global Config mode. Parameters • help {show [configuration-tree]} show configuration-tree Optional. Displays the running system information • configuration-tree – Displays relationship amongst configuration objects
  • 386. 5-8 WiNG CLI Reference Guide • help {search [<WORD>] {detailed|only-show|skip-no|skip-show}} search <WORD> Optional. Searches for CLI commands related to a specific target term • <WORD> – Specify a target term (for example, a feature, or configuration parameter). After specifying the term, select one of the following options: detailed, only-show, skip-no, or skip-show. The system displays information based on the option selected. detailed Optional. Searches and displays help strings in addition to mode and commands only-show Optional. Displays only “show” commands. Does not display configuration commands skip-no Optional. Displays only configuration commands. Does not display “no” commands skip-show Optional. Displays only configuration commands. Does not display “show” commands Examples rfs7000-37FABE>help search crypto detailed Found 29 references for “crypto” Found 113 references for “crypto” Mode : User Exec Command : show crypto key rsa (|public-key-detail) (|(on DEVICE-NAME)) Show running system information Encryption related commands Key management operations Show RSA public Keys Show the public key in PEM format On AP/Controller AP / Controller name : show crypto pki trustpoints (WORD|all|)(|(on DEVICE-NAME)) Show running system information Encryption related commands Public Key Infrastructure related commands Display the configured trustpoints Display a particular trustpoint's details Display details for all trustpoints On AP/Controller AP / Controller name : show crypto isakmp sa (|(on DEVICE-NAME)) Show running system information Encryption Module Show ISAKMP related statistics Show all ISAKMP Security Associations On AP/Controller AP / Controller name : show crypto ipsec sa (|(on DEVICE-NAME)) Show running system information Encryption Module Show IPSec related statistics IPSec security association On AP/Controller AP / Controller name : crypto key generate rsa WORD <1024-2048> (|(on DEVICE-NAME)) Encryption related commands Key management operations Generate a keypair Generate a RSA keypair Keypair name .................................................................................... ................................................................rfs7000-37FABE> rfs7000-37FABE>help show configuration-tree
  • 387. COMMON COMMANDS 5-9 ## ACCESS-POINT / SWITCH ## ---+ | +--> [[ RF-DOMAIN ]] | +--> [[ PROFILE ]] | +--> Device specific parameters (license, serial number, hostname) | +--> Configuration Overrides of rf-domain and profile ## RF-DOMAIN ## ---+ | +--> RF parameters, WIPS server parameters | +--> [[ SMART-RF-POLICY ]] | +--> [[ WIPS POLICY ]] ## PROFILE ## ---+ | +--> Physical interface (interface GE,ME,UP etc) | | | +--> [[ RATE-LIMIT-TRUST-POLICY ]] | +--> Vlan interface (interface VLAN1/VLAN36 etc) | +--> Radio interface (interface RADIO1, RADIO2 etc) | | | +--> Radio specific Configuration | | | +--> [[ RADIO-QOS-POLICY ]] | | | +--> [[ ASSOC-ACL-POLICY ]] | | | +--> [[ WLAN ]] | +--> [[ MANAGEMENT-POLICY ]] | +--> [[ DHCP-SERVER-POLICY ]] | +--> [[ FIREWALL-POLICY ]] | +--> [[ NAT-POLICY ]] | +--> [[ VPN-POLICY ]] | +--> [[ ADVANCED-WIPS-POLICY ]] | +--> [[ CAPTIVE-PORTAL ]] | +--> [[ ROLE-POLICY ]] | +--> [[ RADIUS-SERVER-POLICY ]] | +--> [[ ADOPTION-POLICY ]] ## MESHPOINT ## ---+ | +--> [[ MESHPOINT-QOS-POLICY ]] .................................................................................... ................................................................rfs7000-37FABE> rfs7000-37FABE>help search clrscr only-show found no commands containing "clrscr" rfs7000-37FABE> rfs7000-37FABE>help search service skip-show
  • 388. 5 - 10 WiNG CLI Reference Guide Found 32 references for "service" Mode : User Exec Command : service show cli : service show rim config (|include-factory) : service show wireless credential-cache : service show wireless neighbors : service show general stats(|(on DEVICE-OR-DOMAIN-NAME)) : service show process(|(on DEVICE-OR-DOMAIN-NAME)) : service show mem(|(on DEVICE-OR-DOMAIN-NAME)) : service show top(|(on DEVICE-OR-DOMAIN-NAME)) : service show crash-info (|(on DEVICE-OR-DOMAIN-NAME)) : service cli-tables-skin (none|minimal|thin|thick|stars|hashes|percent|ansi|utf-8) (grid|) : service cli-tables-expand (|left|right) : service wireless clear unauthorized aps (|(on DEVICE-OR-DOMAIN-NAME)) : service wireless qos delete-tspec AA-BB-CC-DD-EE-FF tid <0-7> : service wireless wips clear-event-history : service wireless wips clear-mu-blacklist (all|(mac AA-BB-CC-DD-EE-FF)) : service radio <1-3> dfs simulate-radar (primary|extension) : service smart-rf run-calibration : service smart-rf stop-calibration : service cluster manual-revert : service advanced-wips clear-event-history : service advanced-wips clear-event-history (dos-eap-failure-spoof|id-theft- out-of-sequence|id-theft-eapol-success-spoof-detected|wlan-jack-attack- detected|essid-jack-attack-detected|monkey-jack-attack-detected|null-probe-response- detected|fata-jack-detected|fake-dhcp-server-detected|crackable-wep-iv-used|windows- zero-config-memory-leak|multicast-all-systems-on-subnet|multicast-all-routers-on- subnet|multicast-ospf-all-routers-detection|multicast-ospf-designated-routers- detection|multicast-rip2-routers-detection|multicast-igmp-routers- detection|multicast-vrrp-agent|multicast-hsrp-agent|multicast-dhcp-server-relay- agent|multicast-igmp-detection|netbios-detection|stp-detection|ipx- detection|invalid-management-frame|invalid-channel-advertized|dos-deauthentication- detection|dos-disassociation-detection|dos-rts-flood|rogue-ap-detection|accidental- association|probe-response-flood|dos-cts-flood|dos-eapol-logoff-storm|unauthorized- bridge) : service start-shell : service pktcap on(bridge|drop|deny|router|wireless|vpn|radio (all|<1-3>) (|promiscuous)|rim|interface `WORD|ge <1-4>|me1|pc <1-4>|vlan <1-4094>')(|{direction (any|inbound|outbound)|acl-name WORD|verbose|hex|count <1-1000000>|snap <1- 2048>|write (FILE|URL|tzsp WORD)|tcpdump})(|filter LINE) Mode : Profile Mode Command : service watchdog Mode : Radio Mode Command : service antenna-type (default|dual- band|omni|yagi|embedded|panel|patch|sector|out-omni|in-patch|AP650-int) : service disable-erp : service disable-ht-protection : service recalibration-interval <0-65535> .................................................................................... rfs7000-37FABE> rfs7000-37FABE>help search mint only-show Found 8 references for "mint" Mode : User Exec Command : show mint neighbors (|details)(|(on DEVICE-NAME)) : show mint links (|details)(|(on DEVICE-NAME)) : show mint id(|(on DEVICE-NAME)) : show mint stats(|(on DEVICE-NAME)) : show mint route(|(on DEVICE-NAME)) : show mint lsp : show mint lsp-db (|details)(|(on DEVICE-NAME)) : show mint mlcp(|(on DEVICE-NAME)) rfs7000-37FABE>
  • 389. COMMON COMMANDS 5 - 11 5.1.6 no Common Commands Negates a command or sets its default. Though the no command is common to the User Exec, Priv Exec, and Global Config modes, it negates a different set of commands in each mode. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax no <PARAMETER> Parameters None Usage Guidelines The no command negates any command associated with it. Wherever required, use the same parameters associated with the command getting negated. Examples Global Config mode: No command options rfs7000-37FABE(config)#no ? aaa-policy Delete a aaa policy advanced-wips-policy Delete an advanced-wips policy AP300 Delete an AP300 AP621 Delete an AP621 access point AP650 Delete an AP650 access point AP6511 Delete an AP6511 access point AP6521 Delete an AP6521 access point AP6532 Delete an AP6532 access point AP71XX Delete an AP71XX access point association-acl-policy Delete an association-acl policy auto-provisioning-policy Delete an auto-provisioning policy captive-portal Delete a captive portal critical-resource-policy Remove device onboard critical resource policy customize Restore the custom cli commands to default device Delete multiple devices device-categorization Delete device categorization object dhcp-server-policy DHCP server policy dns-whitelist Delete a whitelist object event-system-policy Delete a event system policy firewall-policy Configure firewall policy igmp-snoop-policy Remove device onboard igmp snoop policy ip Internet Protocol (IP) mac MAC configuration management-policy Delete a management policy nac-list Delete an network access control list password-encryption Disable password encryption in configuration profile Delete a profile and all its associated
  • 390. 5 - 12 WiNG CLI Reference Guide configuration radio-qos-policy Delete a radio QoS configuration policy radius-group Local radius server group configuration radius-server-policy Remove device onboard radius policy radius-user-pool-policy Configure Radius User Pool rf-domain Delete one or more RF-domains and all their associated configurations RFS4000 Delete an RFS4000 wireless controller RFS6000 Delete an RFS6000 wireless controller RFS7000 Delete an RFS7000 wireless controller role-policy Role based firewall policy smart-rf-policy Delete a smart-rf-policy wips-policy Delete a wips policy wlan Delete a wlan object wlan-qos-policy Delete a wireless lan QoS configuration policy service Service Commands rfs7000-37FABE(config)# Priv Exec mode: No command options rfs7000-37FABE#no ? adoption Reset adoption state of the device (& all devices adopted to it) captive-portal Captive portal commands crypto Encryption related commands debug Debugging functions logging Modify message logging facilities page Toggle paging service Service Commands terminal Set terminal line parameters upgrade Remove a patch wireless Wireless Configuration/Statistics commands rfs7000-37FABE# user Exec mode: No command options rfs7000-37FABE>no ? adoption Reset adoption state of the device (& all devices adopted to it) captive-portal Captive portal commands crypto Encryption related commands debug Debugging functions logging Modify message logging facilities page Toggle paging service Service Commands terminal Set terminal line parameters wireless Wireless Configuration/Statistics commands rfs7000-37FABE> Related Commands no User Exec Commands mode no Priv Exec Commands mode no Global Config Commands mode
  • 391. COMMON COMMANDS 5 - 13 5.1.7 revert Common Commands Reverts changes made to their last saved configuration Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax revert Parameters None Examples rfs7000-37FABE>revert rfs7000-37FABE>
  • 392. 5 - 14 WiNG CLI Reference Guide 5.1.8 service Common Commands Service commands are used to view and manage wireless controller configurations in all modes. The service commands and their corresponding parameters vary from mode to mode. The User Exec Mode and Priv Exec Mode commands provide same functionalities with a few minor changes. The Global Config service command sets the size of history files. It also enables viewing of CLI tree of the current mode. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax (User Exec Mode) service [advanced-wips|ap300|clear|cli-tables-expand|cli-tables-skin|cluster force-send-config|locator|noc|pktcap|radio|radius|set|show|smart-rf|wireless] service advanced-wips [clear-event-history|terminate-device <MAC>] service advanced-wips clear-event-history {accidental-association| crackable-wep-iv-used|dos-cts-flood|dos-deauthentication-detection| dos-disassociation-detection|dos-eap-failure-spoof|dos-eapol-logoff-storm| dos-rts-flood|essid-jack-attack-detected|fake-dhcp-server-detected| fata-jack-detected|id-theft-eapol-success-spoof-detected| id-theft-out-of-sequence|invalid-channel-advertized|invalid-management-frame| ipx-detection|monkey-jack-attack-detected|multicast-all-routers-on-subnet| multicast-all-systems-on-subnet|multicast-dhcp-server-relay-agent| multicast-hsrp-agent|multicast-igmp-detection|multicast-igrp-routers-detection| multicast-ospf-all-routers-detection|multicast-ospf-designated-routers-detection| multicast-rip2-routers-detection|multicast-vrrp-agent|netbios-detection| null-probe-response-detected|probe-response-flood|rogue-ap-detection| stp-detection|unauthorized-bridge|windows-zero-config-memory-leak| wlan-jack-attack-detected} service ap300 [dns-name|dot1x|locator|reload] service ap300 dot1x username <USERNAME> password <PASSWORD> on [all|ap-mac <MAC>] service ap300 dns-name <DNS> on [all|ap-mac <MAC>] service ap300 [locator|reload] <MAC> service clear [ap-upgrade|command-history|noc|reboot-history|unsanctioned| upgrade-history|wireless] service clear ap-ugrade history {on <DOMAIN-NAME>} service clear [command-history|reboot-history|upgrade-history]{on <DEVICE-NAME>} service clear noc statistics service clear unsanctioned aps {on <DEVICE-OR-DOMAIN-NAME>}] service clear wireless [ap|client|radio|wlan] service clear wireless [ap|client] statistics {<MAC> {(on <DEVICE-OR-DOMAIN-NAME>)} service clear wireless radio statistics {<MAC/HOSTNAME> <1-3> {(on <DEVICE-OR-DOMAIN- NAME>)} service clear wireless wlan statistics {<WLAN> {(on <DEVICE-OR-DOMAIN-NAME)} service cli-tables-expand {left|right}
  • 393. COMMON COMMANDS 5 - 15 service cli-tables-skin [ansi|hashes|minimal|none|percent|stars|thick|thin| utf-8] {grid} service cluster force [active|configured-state|standby] service force-send-config {on <DEVICE-OR-DOMAIN-NAME>} service locator {on <DEVICE-NAME>} service noc parallel-updates <1-1024> service pktcap on [bridge|deny|drop|ext-vlan|interface|radio|rim|router| vpn|wireless] service pktcap on [bridge|deny|drop|ext-vlan|rim|router|vpn|wireless] {(acl-name <ACL>,count <1-1000000>,direction [any|inbound|outbound], filter <LINE>,hex,rate <1-100>,snap <1-2048>,tcpdump|verbose, write [file|url|tzsp [<IP/TZSP HOSTNAME>]])} service pktcap on interface [<INTERFACE>|ge <1-4>|me1|port-channel <1-2>| vlan <1-4094>] {(acl-name <ACL>,count <1-1000000>, direction [any|inbound|outbound],filter <LINE>,hex,rate <1-100>, snap <1-2048>,tcpdump|verbose,write [file|url|tzsp [<IP/TZSP HOSTNAME>]])} service pktcap on radio [<1-3>|all] {(acl-name <ACL>,count <1-1000000>, direction [any|inbound|outbound],filter <LINE>,hex,rate <1-100>, snap <1-2048>,tcpdump|verbose,write [file|url|tzsp [<IP/TZSP HOSTNAME>]])} service radio <1-3> dfs simulator-radar [extension|primary] service radius test [<IP>|<HOSTNAME>] [<WORD>|<PORT>] service radius test [<IP>|<HOSTNAME>] <WORD> <USERNAME> <PASSWORD> {wlan <WLAN> ssid <SSID> {(on <DEVICE-NAME>)}} service radius test [<IP>|<HOSTNAME>] <PORT> <1024-65535> <WORD> <USERNAME> <PASSWORD> {wlan <WLAN> ssid <SSID> {(on <DEVICE-NAME>)} service set validation-mode [full|partial] {on <DEVICE-NAME>} service show [advanced-wips|captive-portal|cli|command-history| configuration-revision|crash-info|dhcp-lease|diag|info|mac-vendor|mem| mint|noc|pm|process|reboot-history|rf-domain-manager|snmp|startup-log|sysinfo| top|upgrade-history|watch-dog|wireless|xpath-history] service show advanced-wips stats [ap-table|client-table|connected-sensors-status| termination-entries] service show captive-portal [servers|user-cache] {on <DEVICE-NAME>} service show [cli|configuration-revision|mac-vendor <OUI/MAC>|noc diag| snmp session|xpath-history| service show [command-history|crash-info|info|mem|process|reboot-history| startup-log|sysinfo|top|upgrade-history|watchdog] {on <DEVICE-NAME>} service show dhcp-lease {<INTERFACE>|on|vlan <1-4094>} {(on <DEVICE-NAME>)} service show diag [led-status|stats] {on <DEVICE-NAME>} service show mint adopted-devices {on <DEVICE_NAME>} service show pm {history {(on <DEVICE-NAME>)}} service show rf-domain-manager diag {<MAC/HOSTNAME> {(on <DEVICE-OR-DOMAIN- NAME>)} service show wireless [aaa-stats|ap300|client|config-internal|credential-cache| dns-cache|neighbors|stats-client|vlan-usage|meshpoint]] service show wireless [aaa-stats|credential-cache|dns-cache] {on <DEVICE-NAME>} service show wireless [ap300 <MAC>|neighbors|vlan-usage] service show wireless client proc [info|stats] {<MAC> {{on <DEVICE-OR-DOMAIN- NAME>)}} service show wireless config-internal {include-factory}] service show wireless stats-client diag {<MAC/HOSTNAME> {(on <DEVICE-OR- DOMAIN-NAME>)}}
  • 394. 5 - 16 WiNG CLI Reference Guide service show wireless meshpoint neighbor proc [info|stats] {<MAC>|on <DEVICE-OR- DOMAIN-NAME>} service smart-rf [clear-config|clear-history|interactive-calibration| interactive-calibration-result|run-calibration|save-config|stop-calibration] service smart-rf [clear-config|clear-history|interactive-calibration| run-calibration|save-config|stop-calibration]{on <DOMAIN-NAME>} service smart-rf interactive-calibration-result [discard|replace-current-config| write-to-configuration]{on <DOMAIN-NAME>} service wireless [client|dump-core-snapshot|qos|wips] service wireless client beacon-request <MAC> mode [active|passive|table] ssid [<SSID>|any] channel-report [<CHANNEL-LIST>|none] {on <DEVICE-NAME>} service wireless qos delete-tspec <MAC> tid <0-7> service wireless wips [clear-client-blacklist|clear-event-history] service wireless wips clear-client-blacklist [all|mac <MAC> service wireless wips clear-event-history {on <DEVICE-OR-DOMAIN-NAME>} Parameters (User Exec Mode) • service advanced-wips clear-event-history {accidental-association| crackable-wep-iv-used|dos-cts-flood|dos-deauthentication-detection| dos-disassociation-detection|dos-eap-failure-spoof|dos-eapol-logoff-storm| dos-rts-flood|essid-jack-attack-detected|fake-dhcp-server-detected| fata-jack-detected|id-theft-eapol-success-spoof-detected| id-theft-out-of-sequence|invalid-channel-advertized|invalid-management-frame| ipx-detection|monkey-jack-attack-detected|multicast-all-routers-on-subnet| multicast-all-systems-on-subnet|multicast-dhcp-server-relay-agent| multicast-hsrp-agent|multicast-igmp-detection|multicast-igrp-routers-detection| multicast-ospf-all-routers-detection|multicast-ospf-designated-routers-detection| multicast-rip2-routers-detection|multicast-vrrp-agent|netbios-detection| null-probe-response-detected|probe-response-flood|rogue-ap-detection| stp-detection|unathorized-bridge|windows-zero-config-memory-leak| wlan-jack-attack-detected} advanced-wips clear-event- The advanced Wireless Intrusion Prevention System (WIPS) service command clears history event history and terminates a device. • clear-event-history – Clears event history based on the parameters passed accidental-association Optional. Clears accidental wireless client association event history crackable-wep-iv-used Optional. Clears crackable Wired Equivalent Privacy (WEP) IV used event history dos-cts-flood Optional. Clears DoS Clear-To-Send (CTS) flood event history dos-deauthentication- Optional. Clears DoS de-authentication detection event history detection dos-disassociation-detection Optional. Clears DoS disassociation detection event history dos-eap-failure-spoof Optional. Clears DoS Extensible Authentication Protocol (EAP) failure spoof detection event history dos-eapol-logoff-storm Optional. Clears DoS Extensible Authentication Protocol over LAN (EAPoL) logoff storm detection event history dos-rts-flood Optional. Clears DoS request-to-send (RTS) flood detection event history essid-jack-attack-detected Optional. Clears Extended Service Set ID (ESSID) jack attacks detection event history fake-dhcp-server-detected Optional. Clears fake DHCP server detection event history fata-jack-detected Optional. Clears fata-jack attacks detection event history
  • 395. COMMON COMMANDS 5 - 17 id-theft-eapol-success- Optional. Clears IDs theft - EAPOL success spoof detection event history spoof-detected id-theft-out-of-sequence Optional. Clears IDs theft-out-of-sequence detection event history invalid-channel-advertized Optional. Clears invalid channel advertizement detection event history invalid-management-frame Optional. Clears invalid management frames detection event history ipx-detection Optional. Clears automatic IPX interface detection event history monkey-jack-attack- Optional. Detects monkey-jack attacks detection event history detected multicast-all-routers-on- Optional. Clears all multicast routers on the subnet detection event history subnet multicast-all-systems-on- Optional. Clears all multicast systems on the subnet detection event history subnet multicast-dhcp-server-relay- Optional. Clears multicast DHCP server relay agents detection event history agent multicast-hsrp-agent Optional. Clears multicast Hot Standby Router Policy (HSRP) agents detection event history multicast-igmp-detection Optional. Clears multicast Internet Group Management Protocol (IGMP) detection event history multicast-igrp-routers- Optional. Clears multicast Interior Gateway Router Protocol (IGRP) routers detection detection event history multicast-ospf-all-routers- Optional. Clears multicast Open Shortest Path First (OSPF) all routers detection event detection history multicast-ospf-designated- Optional. Clears multicast OSPF designated routers detection event history routers-detection multicast-rip2-routers- Optional. Clears multicast RIP2 routers detection event history detection multicast-vrrp-agent Optional. Clears multicast Virtual Router Redundancy Protocol (VRRP) agents detection event history netbios-detection Optional. Clears NetBIOS detection event history null-probe-response- Optional. Clears null probe response detection event history detected probe-response-flood Optional. Clears probe response flood detection event history rogue-ap-detection Optional. Clears rogue AP detection event history stp-detection Optional. Clears Spanning Tree Protocol (STP) detection event history unauthorized-bridge Optional. Clears unauthorized bridge detection event history
  • 396. 5 - 18 WiNG CLI Reference Guide windows-zero-config- Optional. Clears Windows zero configuration memory leak detection event history memory-leak wlan-jack-attack-detected Optional. Clears WLAN jack attack detection event history • service advanced-wips terminate-device <MAC>] advanced-wips terminate- The advanced WIPS service command clears event history details, and terminates a device <MAC> device. • terminate-device – Terminates a specified device • <MAC> – Specify the MAC address of the AP or wireless client. • service ap300 [dot1x username <USERNAME> password <PASSWORD> on [all|ap-mac <MAC>] ap300 Sets global AP300 configuration parameters dot1x Sets 802.1x authentication parameters username <USERNAME> Authenticates user before providing access • <USERNAME> – Specify the username. password <PASSWORD> Authenticates password before providing access • <PASSWORD> – Specify the password. on [all| Sets global AP300 parameters on a specified AP300 or all AP300s ap-mac <MAC>] • all – Sets global parameters on all AP300s • AP300 <MAC> – Sets global parameters on a specified AP300 • <MAC> – Specify the MAC address of the AP300. • service ap300 dns-name <DNS> on [all|ap-mac <MAC>] ap300 Sets global AP300 configuration parameters dns-name <DNS> Authenticates DNS server name • <DNS> – Specify the DNS sever name. on [all|ap-mac <MAC>] Adopts a specified AP300 or al AP300s • all – Adopts all AP300s • AP300 <MAC> – Adopts a specified AP300 • <MAC> – Specify the MAC address of the AP300. • service ap300 [locator|reload] <MAC> ap300 Sets global AP300 configuration parameters locator Enables AP300 LEDs reload Resets an AP300 <MAC> Provides the MAC address of the AP300 • <MAC> – Specify the MAC address of the AP300.
  • 397. COMMON COMMANDS 5 - 19 • service clear ap-upgrade history {on <DOMAIN-NAME>}] clear ap-upgrade history Clears firmware upgrade history on <DOMAIN-NAME> Optional. Clears firmware upgrade details in a specified RF Domain • <DOMAIN-NAME> – Specify the RF Domain name. • service clear [command-history|reboot-history|upgrade-history] {on <DEVICE-NAME>} clear [command-history| Clears command history, reboot history, or device upgrade history reboot-history| upgrade-history] on <DEVICE-NAME> Optional. Clears history on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service clear noc statistics] clear noc statistics Clears Network Operations Center (NOC) applicable statistics counters • service clear unsanctioned aps {on <DEVICE-OR-DOMAIN-NAME>}] clear unsanctioned aps Clears the unsanctioned APs list on Optional. Clears the list on a specified device or RF Domain <DEVICE-OR-DOMAIN- • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or NAME> RF Domain. • service clear wireless [ap|client] {<MAC> {on <DEVICE-OR-DOMAIN-NAME>}| on <DEVICE-OR-DOMAIN-NAME>} clear wireless [ap|client] Clears applicable statistics counters • AP – Clears AP statistics counters • client – Clears wireless client statistics counters <MAC> Optional. Specify the MAC address of the AP. {on <DEVICE-OR-DOMAIN- • on <DEVICE-OR-DOMAIN-NAME> – Optional. Specify the name of the AP, wireless NAME>} controller, or RF Domain. • service clear wireless radio statistics {<MAC/HOSTNAME> <1-3> {(on <DEVICE-OR- DOMAIN-NAME>)} clear wireless radio statistics Clears applicable wireless radio statistics counters <MAC/HOSTNAME> Optional. Specify the MAC address or hostname of the radio, or append the interface <1-3> number to form the radio ID in the AA-BB-CC-DD-EE-FF:RX or HOSTNAME:RX format. • <1-3> – Specify the radio interface index, if not specified as part of the radio ID. on <DEVICE-OR-DOMAIN- Optional. Specify the name of the AP, wireless controller, or RF Domain. NAME> • service clear wireless wlan statistics {<WLAN> {(on <DEVICE-OR-DOMAIN-NAME>)} clear wireless wlan statistics Clears WLAN statistics counters
  • 398. 5 - 20 WiNG CLI Reference Guide <WLAN> Clears statistics counters on a specified WLAN on <DEVICE-OR-DOMAIN- Optional. Specify the name of the AP, wireless controller, or RF Domain. NAME> • service cli-tables-expand {left|right} cli-tables-expand Displays the CLI table in a drop-down format left Optional. Displays the output in a left-justified format right Optional. Displays the output in a right-justified format • service cli-tables-skin [ansi|hashes|minimal|none|percent|stars|thick|thin|utf-8] {grid} cli-tables-skin Selects a formatting layout or skin for CLI tabular outputs [ansi|hashes|minimal| • ansi – Uses ANSI characters for borders none|percent| • hashes – Uses hashes (#) for borders stars|thick| thin|uf-8] • minimal – Uses one horizontal line between title and data rows • none – Displays space separated items with no decoration • percent – Uses the percent sign (%) for borders • stars – Uses asterisks (*) for borders • thick – Uses thick lines for borders • thin – Uses thin lines for borders • utf-8 – Uses UTF-8 characters for borders grid Optional. Uses a complete grid instead of title lines • service cluster force [active|configured-state|standby] cluster Enables cluster protocol management force Forces action commands on a cluster active Changes the cluster run status to active configured-state Restores a cluster to the configured state standby Changes the cluster run status to standby • service force-send-config {on <DEVICE-OR-DOMAIN-NAME>} force-send-config Resends configuration details on <DEVICE-OR-DOMAIN- Optional. Resends configuration details to a device NAME> • <DEVICE-OR-DOMAIN-NAME> – Optional. Specify the name of the AP, wireless controller, or RF Domain. • service locator {on <DEVICE-NAME>} locator Enables LEDs on <DEVICE-NAME> Optional. Enables LEDs on a device • <DEVICE-NAME> – Specify name of the AP or wireless controller.
  • 399. COMMON COMMANDS 5 - 21 • service noc parallel-updates <1-1024> noc Configures NOC wireless controller serviceability commands parallel-updates Sets a limit to the number of parallel threads <1-1024> • <1-1024> – Specify a value from 1 - 1024. • service pktcap on [bridge|deny|drop|ext-vlan|rim|router|vpn|wireless] {(acl-name <ACL>|count <1-1000000>|direction [any|inbound|outbound]| filter|hex|rate <1-100>|snap <1-2048>|tcpdump|verbose| write [file|url|tzsp <IP/TZSP HOSTNAME>])} pktcap on Captures data packets crossing at a specified location • on – Defines the packet capture location bridge Captures packets transiting through the Ethernet bridge deny Captures packets denied by an Access Control List (ACL) drop Captures packets at the drop locations ext-vlan Captures packets forwarded to or from an extended VLAN rim Captures packets at the Radio Interface Module (RIM) router Captures packets transiting through an IP router vpn Captures packets forwarded to or from a VPN link wireless Captures packets forwarded to or from a wireless device acl-name <ACL> Optional. Specify the ACL that matches the acl-name for the 'deny' location count <1-1000000> Optional. Limits the captured packet count. Specify a value from 1 -1000000. direction Optional. Changes the packet direction with respect to a device. The direction can be [any|inbound|outbound] set as any, inbound, or outbound.
  • 400. 5 - 22 WiNG CLI Reference Guide filter Optional. Filters packets based on the option selected (must be used as a last option) [<LINE>|arp|capwap|cdp|dot1 The filter options are: 1|dropreason|dst|ether| • <LINE> – Defines user defined packet capture filter host|icmp|igmp|ip|ipv6|l2|l3|l4 • arp – Matches ARP packets |lldp|mint|net|not|port|priority| radio|src|tcp|udp|vlan|wlan] • capwap – Matches CAPWAP packets • cdp – Matches CDP packets • dot11 – Matches 802.11 packets • dropreason – Matches packet drop reason • dst – Matches IP destination • ether – Matches Ethernet packets • host – Matches host destination • icmp – Matches ICMP packets • igmp – Matches IGMP packets • ip – Matches IPV4 packets • ipv6 – Matches IPV6 packets • l2 – Matches L2 header • l3 – Matches L3 header • l4 – Matches L4 header • lldp – Matches LLDP packets • mint – Matches MiNT packets • net – Matches IP in subnet • not – Filters out any packet that matches the filter criteria (For example, if not TCP is used, all tcp packets are filtered out) • port – Matches TCP or UDP port • priority – Matches packet priority • radio – Matches radio • src – Matches IP source • stp – Matches STP packets • tcp – Matches TCP packets • udp – Match UDP packets • vlan – Matches VLAN • wlan – Matches WLAN hex Optional. Provides binary output of the captured packets rate <1-100> Optional. Specifies the packet capture rate • <1-100> – Specify a value from 1 - 100 seconds. snap <1-2048> Optional. Captures the data length • <1-2048> – Specify a value from 1 - 2048 characters. tcpdump Optional. Decodes tcpdump. The tcpdump analyzes network behavior, performance, and infrastructure. It also analyzes applications that generate or receive traffic.
  • 401. COMMON COMMANDS 5 - 23 verbose Optional. Displays full packet body write Captures packets to a specified file. Provide the file name and location in the following format: FILE – flash:/path/file cf:/path/file usb1:/path/file usb2:/path/file vram:startup-config URL – tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file tzsp – Tazman Sniffer Protocol (TZSP) host. Specify the TZSP host’s IP address or hostname. • service pktcap on radio [<1-3>|all] {(acl-name <ACL>|count <1-1000000>| direction [any|inbound|outbound]|filter <LINE>|hex|promiscuous|rate <1-100>| snap <1-2048>|tcpdump|verbose|write [file|url|tzsp <IP/TZSP HOSTNAME>])} pktcap on radio Captures data packets on a specified radio or on all radios (802.11) [<1-3>|all] • <1-3> – Specify the radio index from 1 - 3. • all – Captures data packets on all radios (802.11) acl-name <ACL> Optional. Specify the ACL name. count <1-1000000> Optional. Sets a specified number of packets to capture • <1-1000000> – Specify a value from 1 -1000000. direction Optional. Changes the packet direction with respect to a device. The direction can be [any|inbound|outbound] set as any, inbound, or outbound. filter <LINE> Optional. Filters packets based on the option selected (must be used as a last option) • <LINE> – Define a packet capture filter or select any one of the available options. The options are: arp, capwap, cdp, dot11, dropreason, dst, ether, host, icmp, igmp, ip, ipv6, 12, 13, 14, lldp, mint, net, not, port, priority, radio, src, stp, tcp, udp, vlan, and wlan. hex Optional. Provides binary output of the captured packets promiscuous Optional. Enables limited promiscuous mode capture on the current channel (disables normal operation during the capture) rate <1-100> Optional. Specifies the packet capture rate • <1-100> – Specify a value from 1 - 100 seconds. snap <1-2048> Optional. Captures the data length • <1-2048> – Specify a value from 1 - 2048 characters. tcpdump Optional. Decodes the TCP dump
  • 402. 5 - 24 WiNG CLI Reference Guide verbose Optional. Provides verbose output write Captures packets to a specified file. Provide the file name and location in the following format: FILE – flash:/path/file cf:/path/file usb1:/path/file usb2:/path/file nvram:startup-config URL – tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file tzsp – The TZSP host. Specify the TZSP host’s IP address or hostname. • service pktcap on interface [<INTERFACE>|ge <1-4>|me|port-channel <1-2>| vlan <1-4094] {(acl-name <ACL>|count <1-1000000>|direction [any|inbound|outbound]| filter <LINE>|hex|rate <1-100>|snap <1-2048>|tcpdump|verbose| write [file|url|tzsp <IP/TZSP HOSTNAME>])} pktcap on Captures data packets at a specified interface • on – Specify the capture location. interface [<INTERFACE>| Captures packets at a specified interface. The options are: ge <1-4>|me1| • <INTERFACE> – Specify the interface name. port-channel <1-2| • ge <1-4> – Selects a GigabitEthernet interface index from 1 - 4 vlan <1-4094>] • me1 – Selects the FastEthernet interface • port-channel <1-2> – Selects a port-channel interface index from 1- 2 • vlan <1-4094> – Selects a VLAN ID from 1 - 4094 acl-name <ACL> Optional. Specify the ACL that matches the ACL name for the 'deny' location count <1-1000000> Optional. Sets a specified number of packets to capture • <1-1000000> – Specify a value from 1 - 1000000. direction Optional. Changes the packet direction with respect to a device. The direction can be [any|inbound|outbound] set as any, inbound, or outbound. filter <LINE> Optional. Filters packets based on the option selected (must be used as a last option) • <LINE> – Define a packet capture filter or select any one of the available options. hex Optional. Provides binary output of the captured packets rate <1-100> Optional. Specifies the packet capture rate • <1-100> – Specify a value from 1 - 100 seconds. snap <1-2048> Optional. Captures the data length • <1-2048> – Specify a value from 1 - 2048 characters. tcpdump Optional. Decodes the TCP dump
  • 403. COMMON COMMANDS 5 - 25 verbose Optional. Provides verbose output write Captures packets to a specified file. Provide the file name and location in the following format: FILE – flash:/path/file cf:/path/file usb1:/path/file usb2:/path/file nvram:startup-config URL – tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>@<hostname|IP>[:port]>/path/file tzsp – The TZSP host. Specify the TZSP host’s IP address or hostname. • service radio <1-3> dfs simulate-radar [extension|primary] radio <1-3> Configures radio’s parameters • <1-3> – Specify the radio index from 1 - 3. dfs Enables Dynamic Frequency Selection (DFS) simulate-radar Simulates the presence of a radar on a channel. Select the channel type from the [extension|primary] following options: • extension – Simulates a radar on the radio’s current extension channel • primary – Simulates a radar on the radio’s current primary channel • service radius test [<IP>|<HOSTNAME>] <WORD> <USERNAME> <PASSWORD> {wlan <WLAN> ssid <SSID> {(on <DEVICE-NAME>)}} radius test Tests a RADIUS server account • test – Tests the RADIUS server account with user parameters [<IP>|<HOSTNAME>] Sets the IP address or hostname of the RADIUS server • <IP> – Specify the RADIUS server’s IP address. • <HOSTNAME> – Specify the RADIUS server’s hostname. <WORD> Specify the shared secret to logon to the RADIUS server. <USERNAME> Specify the name of the user for authentication. <PASSWORD> Specify the password. wlan <WLAN> Tests the local RADIUS WLAN. Specify the local RADIUS WLAN name. ssid <SSID> • ssid <SSID> – Specify the local RADIUS server’s SSID. on <DEVICE-NAME> Optional. Performs the tests on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 404. 5 - 26 WiNG CLI Reference Guide • service radius test [<IP>|<HOSTNAME>] <PORT> <1024-65535> <WORD> <USERNAME> <PASSWORD> {wlan <WLAN> ssid <SSID> {(on <DEVICE-NAME>)}} radius test Tests a RADIUS server account • test – Tests the RADIUS server account with user parameters [<IP>|<HOSTNAME>] Sets the IP address or hostname of the RADIUS server • <IP> – Specify the RADIUS server’s IP address. • <HOSTNAME> – Specify the RADIUS server’s hostname. <PORT> <1024-65535> Specify the RADIUS server port from 1024 - 65535. The default port is 1812. <WORD> Specify the shared secret to logon to the RADIUS server. <USERNAME> Specify the name of the user for authentication. <PASSWORD> Specify the password. wlan <WLAN> Tests the RADIUS server on the local WLAN. Specify the local WLAN name. ssid <SSID> • ssid <SSID> – Specify the RADIUS server’s SSID. on <DEVICE-NAME> Optional. Performs the tests on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service set validation-mode [full|partial] {on <DEVICE-NAME>} set Sets the validation mode for running configuration validation validation-mode [full|partial] Sets the validation mode • full – Performs a full configuration validation • partial – Performs a partial configuration validation on <DEVICE-NAME> Optional. Performs configuration validation on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service show advanced-wips stats [ap-table|client-table| connected-sensors-status|termination-entries] show Displays running system statistics based on the parameters passed advanced-wips stats Displays advanced WIPS statistics ap-table Displays AP table statistics client-table Displays client table statistics connected-sensors-status Displays connected sensors statistics termination-entries Displays termination entries statistics • service show captive-portal [servers|user-cache] {on <DEVICE-NAME>} show Displays running system statistics based on the parameters passed captive-portal Displays captive portal information servers Displays server information for active captive portals
  • 405. COMMON COMMANDS 5 - 27 user-cache Displays cached user details for a captive portal on <DEVICE-NAME> Optional. Displays server information or cached user details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service show [cli|configuration-revision|mac-vendor <OUI/MAC>|noc diag| snmp session|xpath-history] show Displays running system statistics based on the parameters passed cli Displays CLI tree of the current mode configuration-revision Displays current configuration revision number mac-vendor Displays vendor name for a specified MAC address or Organizationally Unique Identifier <OUI/MAC> (OUI) part of the MAC address • <OUI/MAC> – Specify the MAC address or its OUI. The first six digits of the MAC address is the OUI. Use the AABBCC or AA-BB-CC format to provide the OUI. noc diag Displays NOC diagnostic details snmp session Displays SNMP session details xpath-history Displays XPath history • service show [command-history|crash-info|info|mem|process|reboot-histroy| startup-log|sysinfo|top|upgrade-history|watchdog] {on <DEVICE-NAME>} show Displays running system statistics based on the parameters passed command-history Displays command history (lists all commands executed) crash-info Displays information about core, panic, and AP dump files info Displays snapshot of available support information mem Displays a system’s current memory usage (displays the total memory and available memory) process Displays active system process information (displays all processes currently running on the system) reboot-history Displays the device’s reboot history startup-log Displays the device’s startup log sysinfo Displays a system’s memory usage top Displays system resource information upgrade-history Displays the device’s upgrade history (displays details, such as date, time, and status of the upgrade, old version, new version etc.)
  • 406. 5 - 28 WiNG CLI Reference Guide watchdog Displays the device’s watchdog status on <DEVICE-NAME> The following parameters are common to all of the above: • on <DEVICE-NAME> – Optional. Displays information for a specified device. If no device is specified, the system displays information for the logged device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service show dhcp-lease {<INTERFACE>|on|vlan <1-4094>} {(on <DEVICE-NAME>)} show Displays running system statistics based on the parameters passed dhcp-lease Displays DHCP lease information received from the server <INTERFACE> Displays DHCP lease information for a specified router interface • <INTERFACE> – Specify the router interface name. on Displays DHCP lease information for a specified device vlan <1-4094> Displays DHCP lease information for a VLAN • <1-4094> – Specify a VLAN index from 1 - 4094. on <DEVICE-NAME> Optional. Displays DHCP lease information for a specified device. If no device is specified, the system displays information for the logged device. • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service show diag [led-staus|stats] {(on <DEVICE-NAME>)}] show Displays running system statistics based on the parameters passed diag Displays diagnostic statistics, such as LED status, fan speed, and sensor temperature led-status Displays LED state variables and the current state stats Displays fan speed and sensor temperature statistics on <DEVICE-NAME> Optional. Displays diagnostic statistics for a specified device. If no device is specified, the system displays information for the logged device. • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service show mint adopted-devices {(on <DEVICE-NAME>)}] show Displays running system statistics based on the parameters passed mint Displays MiNT protocol details adopted-devices Displays adopted devices status in dpd2 on <DEVICE-NAME> Optional. Displays MiNT protocol details for a specified device. If no device is specified, the system displays information for the logged device. • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service show pm {history {(on <DEVICE-NAME>)}}] show Displays running system statistics based on the parameters passed pm Displays the Process Monitor (PM) controlled process details
  • 407. COMMON COMMANDS 5 - 29 history Optional. Displays process change history (the time at which the change was implemented, and the events that triggered the change) on <DEVICE-NAME> Optional. Displays process change history for a specified device. If no device is specified, the system displays information for the logged device. • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service show rf-domain-manager diag {(<MAC/HOSTNAME> {(on <DEVICE-OR-DOMAIN- NAME>)}}] show Displays running system statistics based on the parameters passed rf-domain-manager Displays RF Domain manager information diag Displays RF Domain manager related diagnostics statistics <MAC/HOSTNAME> Optional. Specify the MAC address or hostname of the RF Domain manager. on <DEVICE-OR-DOMAIN- Optional. Displays diagnostics statistics on a specified device or domain NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • service show wireless [aaa-stats|credential-cache|dns-cache] {on <DEVICE-NAME>}] show Displays running system statistics based on the parameters passed wireless Displays WLAN statistics (WLAN AAA policy, configuration parameters, VLAN usage etc.) aaa-stats Displays AAA policy statistics credential-cache Displays clients cached credentials statistics (VLAN, keys etc.) dns-cache Displays cache of resolved names of servers related to wireless networking on <DEVICE-NAME> Optional. Displays WLAN statistics for a specified device. If no device is specified, the system displays information for the logged device. • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service show wireless [ap300 <MAC>|neighbors|vlan-usage] {on <DEVICE-NAME>}] show Displays running system statistics based on the parameters passed wireless Displays WLAN statistics (WLAN AAA policy, configuration parameters, VLAN usage etc.) ap300 <MAC> Displays WLAN AP300 statistics • <MAC> – Specify the MAC address of the AP300. neighbors Displays neighboring device statistics for roaming and flow migration vlan-usage Displays VLAN statistics across WLANs on <DEVICE-NAME> Optional. Displays WLAN statistics for a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 408. 5 - 30 WiNG CLI Reference Guide • service show wireless client proc [info|stats] {<MAC> {(on <DEVICE-OR-DOMAIN- NAME)}}] show Displays running system statistics based on the parameters passed wireless Displays WLAN statistics (WLAN AAA policy, configuration parameters, VLAN usage etc.) client Displays WLAN client statistics proc Displays dataplane proc entries These proc entries provide statistics on each wireless client on the WLAN. info Displays information of a specified wireless client stats Displays statistical data of a specified wireless client <MAC> Optional. Specify the MAC address of the wireless client. on <DEVICE-OR-DOMAIN- Optional. Displays information on a specified device or domain. NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • service show wireless config-internal {include-factory}] show Displays running system statistics based on the parameters passed wireless Displays WLAN statistics (WLAN AAA policy, configuration parameters, VLAN usage etc.) config-internal Displays internal configuration parameters include-factory Optional. Displays factory default settings • service show wireless stats-client diag {<MAC/HOSTNAME> {(on <DEVICE-OR-DOMAIN- NAME)}}] show Displays running system statistics based on the parameters passed wireless Displays WLAN statistics (WLAN AAA policy, configuration parameters, VLAN usage etc.) stats-client Displays managed AP statistics <MAC/HOSTNAME> Optional. Specify the MAC address or hostname of the AP. on <DEVICE-OR-DOMAIN- Optional. Displays statistics on a specified AP, or all APs on a specified domain. NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • service show wireless meshpoint neighbor proc [info|stats] {<MAC>|on <DEVICE-OR- DOMAIN-NAME>} show Displays running system statistics based on the parameters passed wireless Displays WLAN statistics (WLAN AAA policy, configuration parameters, VLAN usage etc.) meshpoint Displays mesh point information
  • 409. COMMON COMMANDS 5 - 31 neighbor Displays proc entries about neighbor devices proc Displays proc entries info Displays information about neigbor devices stats Displays staticstics about neighbor devices <MAC> Optional. Specify the MAC address of the neighbor device. on <DEVICE-OR-DOMAIN- Optional. Displays statistics or neighbor information on a specified AP, or all APs on a NAME> specified domain. • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • service smart-rf [clear-config|clear-history|interactive-calibration| run-calibration|save-config|stop-calibration] {on <DOMAIN-NAME>}] smart-rf Enables Smart RF management clear-config Clears WLAN Smart RF configuration on all devices clear-history Clears WLAN Smart RF history on all devices interactive-calibration Enables interactive Smart RF calibration run-calibration Starts a new Smart RF calibration process save-config Saves Smart RF configuration on all device, and also saves the history on the domain manager stop-calibration Stops Smart RF configuration, currently in progress on <DOMAIN-NAME> Optional. Enables Smart RF management on a specified RF Domain • <DOMAIN-NAME> – Specify the RF Domain name. • service smart-rf interactive-calibration-result [discard|replace-current- config|write-to-configuration] {on <DOMAIN-NAME>}] smart-rf Enables Smart RF management interactive-calibration- Displays interactive Smart RF calibration results result discard Discards interactive Smart RF calibration results replace-current-config Replaces current radio configuration write-to-configuration Writes and saves radio settings to configuration on <DOMAIN-NAME> Optional. Displays interactive Smart RF calibration results on a specified RF Domain • <DOMAIN-NAME> – Specify the RF Domain name.
  • 410. 5 - 32 WiNG CLI Reference Guide • service wireless client beacon-request <MAC> mode [active|passive|table] ssid [<SSID>|any] channel-report [<CHANNEL-LIST>|none] {on <DEVICE-NAME>}] wireless client beacon- Sends beacon measurement requests to a wireless client requests <MAC> Specify the MAC address of the wireless client. mode [active|passive|table] Specifies the beacon measurements mode • Active – Requests beacon measurements in the active mode • Passive – Requests beacon measurements in the passive mode • Table – Requests beacon measurements in the table mode ssid [<SSID>|any] Specifies if the measurements have to be made for a specified SSID or for any SSID • <SSID> – Requests beacon measurement for a specified SSID • any – Requests beacon measurement for any SSID channel-report [<CHANNEL- Configures channel report in the request. The request can include a list of channels or LIST>| can apply to all channels none] • <CHANNEL-LIST> – Request includes a list of channels. The client has to send beacon measurements only for those channels included in the request • none – Request applies to all channels on <DEVICE-NAME> Optional. Sends requests on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service wireless qos delete-tspec <MAC> tid <0-7> wireless qos delete-tspec Sends a delete TSPEC request to a wireless client <MAC> Specify the MAC address of the wireless client. tid <0-7> Deletes the Traffic Identifier (TID) • <0-7> – Select the TID from 0 - 7. • service wireless wips clear-client-blacklist [all|mac <MAC>] wireless wips Enables management of WIPS parameters clear-client-blacklist Removes a specified client or all clients from the blacklist [all|mac <MAC>] • all – Removes all clients from the blacklist • mac <MAC> – Removes a specified client form the blacklist • <MAC> – Specify the MAC address of the wireless client. • service wireless wips clear-event-history {on <DEVICE-OR-DOMAIN-NAME}] wireless wips Enables WIPS management clear-event-history Clears event history on <DEVICE-OR-DOMAIN- Optional. Clears event history on a device or RF Domain NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain.
  • 411. COMMON COMMANDS 5 - 33 Syntax (Privilege Exec Mode) NOTE: The “service” command of the Priv Exec Mode is the same as the service command in the User Exec Mode. There a few modifications that have been documented in this section. For the syntax and parameters of the other commands refer to the (User Exec Mode) syntax and (User Exec Mode) parameters sections of this chapter. service [advanced-wips|clear|cli-tables-expand|cli-tables-skin|cluster|copy| locator|mint|noc|pktcap|pm|radio|set|show|signal|smart-rf|start-shell||wireless] service copy tech-support [FILE|URL] service clear [ap-upgrade|command-history|crash-info|noc|reboot-history| unsanctioned|upgrade-history|wireless] service mint [clear [lsp-db|mlcp ]|debug-log [flash-and-syslog|flash-only]| expire [lsp|spf]|flood [csnp|lsp]|silence] service signal [abort <PROCESS>|kill <PROCESS>] service pm stop{on <DEVICE-NAME>} service show [advanced-wips|captive-portal|cli|command-history|crash-info| dhcp-lease|diag|info|last-passwd|mac-vendor|mem|noc|pm|process|reboot-history| rf-domain-manager|snmp|startup-log|sysinfo||top|upgrade-history|watchdog| wireless|xpath-history] service start-shell Parameters (Privilege Exec Mode) • service copy tech-support <FILE> <URL> copy tech-support Copies files for technical support • tech-support – Copies extensive system information useful for troubleshooting <FILE> Specify the file name in the following format: cf:/path/file usb1:/path/file usb2:/path/file <URL> Specify the file location in the following format: tftp://<hostname|IP>[:port]/path/file ftp://<user>:<passwd>@<hostname|IP>[:port]/path/file sftp://<user>:<passwd>@<hostname|IP>[:port]>/path/file • service clear crash-info {on <DEVICE-NAME>} clear crash-info Clears all crash files on <DEVICE-NAME> Optional. Clears crash files on a specified device. These crash files are core, panic, and AP dump • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service mint [clear [lsp-dp|mlcp]|debug-log [flash-and-syslog|flash-only]|expire [lsp|spf]|flood [csnp|lsp]|silence] mint Enables MiNT protocol management (clears LSP database, enables debug logging, enables running silence etc.) clear [lsp-dp|mlcp] Clears LSP database and MiNT Link Control Protocol (MLCP) links • lsp-dp – Clears MiNT Label Switched Path (LSP) database • mlcp – Clears MLCP links
  • 412. 5 - 34 WiNG CLI Reference Guide debug-log Enables debug message logging [flash-and-syslog| • flash-and-syslog – Logs debug messages to the flash and syslog files flash-only] • flash-only – Logs debug messages to the flash file only expire [lsp|spf] Forces expiration of LSP and recalculation of Shortest Path First (SPF) • lsp – Forces expiration of LSP • spf – Forces recalculation of SPF flood [csnp|lsp] Floods control packets • csnp – Floods our Complete Sequence Number Packets (CSNP) • lsp – Floods our LSP silence Run silent • service pm stop {on <DEVICE-NAME>} pm Stops the Process Monitor (PM) stops Stops the PM from monitoring all daemons on <DEVICE-NAME> Optional. Stops the PM on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service show last-passwd show Displays running system statistics based on the parameters passed last-passwd Displays the last password used to enter shell • service signal [abort <PROCESS>|kill <PROCESS>] signal Sends a signal to a process • tech-support – Copies extensive system information useful for troubleshooting abort Sends an abort signal to a process, and forces it to dump to core • <PROCESS> – Specify the process name. kill Sends a kill signal to a process, and forces it to terminate without a core • <PROCESS> – Specify the process name. • service start-shell start-shell Provides shell access
  • 413. COMMON COMMANDS 5 - 35 Syntax (Global Config Mode) service [set|show cli] service set [command-history <10-300>|upgrade-history <10-100>| reboot-history <10-100>] {on <DEVICE-NAME>} Parameters (Global Config Mode) • service set [command-history <10-300>|upgrade-history <10-300>|reboot-history <10- 300>] {on <DEVICE-NAME>} set Sets the size of history files command-history Sets the size of the command history file <10-300> • <10-300> – Specify a value from 10 - 300. The default is 200. upgrade-history Sets the size of the upgrade history file <10-100> • <10-100> – Specify a value from 10 - 100. The default is 50. reboot-history Sets the size of the reboot history file <10-100> • <10-100> – Specify a value from 10 - 100. The default is 50. on <DEVICE-NAME> Optional. Sets the size of history files on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • service show cli show cli Displays running system configuration details • cli – Displays the CLI tree of the current mode Examples rfs7000-37FABE>service cli-tables-skin stars rfs7000-37FABE> rfs7000-37FABE>service pktcap on interface vlan 2 Capturing up to 50 packets. Use Ctrl-C to abort. rfs7000-37FABE>service show cli User Exec mode: +-do +-help [help] +-show +-configuration-tree [help show configuration-tree] +-search +-WORD [help search WORD (|detailed|only-show|skip-show)] +-detailed [help search WORD (|detailed|only-show|skip-show)] +-only-show [help search WORD (|detailed|only-show|skip-show)] +-skip-show [help search WORD (|detailed|only-show|skip-show)] +-show +-commands [show commands] +-running-config [show (running-config|session-config) (|include-factory)] +-include-factory [show (running-config|session-config) (|include-factory)] +-interface [show running-config interface (|`WORD|ge <1-4>|me1|pc <1-4>|vlan <1- 4094>') (|include-factory)] +-WORD [show running-config interface (|`WORD|ge <1-4>|me1|pc <1-4>|vlan <1- 4094>') (|include-factory)] +-include-factory [show running-config interface (|`WORD|ge <1-4>|me1|pc <1- 4>|vlan <1-4094>') (|include-factory)] +-ge +-<1-4> [show running-config interface (|`WORD|ge <1-4>|me1|pc <1-4>|vlan <1- 4094>') (|include-factory)] +-include-factory [show running-config interface (|`WORD|ge <1-4>|me1|pc <1- 4>|vlan <1-4094>') (|include- factory)].................................................................rfs7000- 37FABE
  • 414. 5 - 36 WiNG CLI Reference Guide rfs7000-37FABE>service show general stats on rfs7000-37FABE Current Fan Speed: 6540 Minimum Fan Speed: TBD Hysteresis: TBD Sensor 1 Temperature: 31C Sensor 2 Temperature: 55C Sensor 3 Temperature: 29C Sensor 4 Temperature: 28C Sensor 5 Temperature: 26C Sensor 6 Temperature: 28C rfs7000-37FABE> rfs7000-37FABE>service wireless wips clear-mu-blacklist mac 11-22-33-44-55-66 rfs7000-37FABE> rfs7000-37FABE#service signal kill testp Sending a kill signal to testp rfs7000-37FABE# rfs7000-37FABE#service signal abort testprocess Sending an abort signal to testprocess rfs7000-37FABE# rfs7000-37FABE#service mint clear lsp-db rfs7000-37FABE# rfs7000-37FABE#service mint silence rfs7000-37FABE# rfs7000-37FABE#service pm stop on rfs7000-37FABE rfs7000-37FABE# rfs7000-37FABE(config)#service show cli Global Config mode: +-help [help] +-search +-WORD [help search WORD (|detailed|only-show|skip-show)] +-detailed [help search WORD (|detailed|only-show|skip-show)] +-only-show [help search WORD (|detailed|only-show|skip-show)] +-skip-show [help search WORD (|detailed|only-show|skip-show)] +-show +-commands [show commands] +-eval +-LINE [show eval LINE] +-debugging [show debugging (|(on DEVICE-OR-DOMAIN-NAME))] +-cfgd [show debugging cfgd] +-on +-DEVICE-OR-DOMAIN-NAME [show debugging (|(on DEVICE-OR-DOMAIN-NAME))] +-wireless [show debugging wireless (|(on DEVICE-OR-DOMAIN-NAME))] +-on +-DEVICE-OR-DOMAIN-NAME [show debugging wireless (|(on DEVICE-OR-DOMAIN-NAME))] +-voice [show debugging voice (|(on DEVICE-OR-DOMAIN-NAME))] +-on +-DEVICE-OR-DOMAIN-NAME [show debugging voice (|(on DEVICE-OR-DOMAIN-NAME))] +-captive-portal [show debugging captive-portal (|(on DEVICE-OR-DOMAIN-NAME))] +-on +-DEVICE-OR-DOMAIN-NAME [show debugging captive-portal (|(on DEVICE-OR-DOMAIN- NAME))] +-dhcpsvr [show debugging dhcpsvr (|(on DEVICE-NAME))] +-on.............................................................. rfs7000-37FABE(config)# rfs7000-37FABE#service traceroute -h traceroute: invalid option -- h BusyBox v1.14.1 () multi-call binary Usage: traceroute [-FIldnrv] [-f 1st_ttl] [-m max_ttl] [-p port#] [-q nqueries] [-s src_addr] [-t tos] [-w wait] [-g gateway] [-i iface] [-z pausemsecs] HOST [data size]
  • 415. COMMON COMMANDS 5 - 37 Trace the route to HOST Options: -F Set the don't fragment bit -I Use ICMP ECHO instead of UDP datagrams -l Display the ttl value of the returned packet -d Set SO_DEBUG options to socket -n Print hop addresses numerically rather than symbolically -r Bypass the normal routing tables and send directly to a host -v Verbose -m max_ttl Max time-to-live (max number of hops) -p port# Base UDP port number used in probes (default is 33434) -q nqueries Number of probes per 'ttl' (default 3) -s src_addr IP address to use as the source address -t tos Type-of-service in probe packets (default 0) -w wait Time in seconds to wait for a response (default 3 sec) -g Loose source route gateway (8 max) rfs7000-37FABE# rfs7000-37FABE>ser show ap configured -------------------------------------------------------------------------- IDX NAME MAC PROFILE RF-DOMAIN ADOPTED-BY -------------------------------------------------------------------------- 1 ap7131-889EC4 00-15-70-88-9E-C4 default-AP7131 default un-adopted 2 AP650-445566 11-22-33-44-55-66 default-AP650 default un-adopted 3 AP650-000000 00-A0-F8-00-00-00 default-AP650 default 00-15-70-37-FA-BE -------------------------------------------------------------------------- rfs7000-37FABE> rfs7000-37FABE>service show command-history on rfs7000-37FABE Configured size of command history is 200 Date & Time User Location Command ===================================================================== Jul 28 16:39:34 2010 admin 172.16.10.10 17 service locator on rfs7000-37FABE Jul 28 16:39:13 2010 admin 172.16.10.10 17 exit Jul 28 16:17:51 2010 admin 172.16.10.10 17 exit Jul 28 16:15:58 2010 admin 172.16.10.10 17 exit Jul 28 16:15:53 2010 admin 172.16.10.10 17 advanced-wips-policy test Jul 28 16:08:13 2010 admin 172.16.10.10 17 exit Jul 28 15:24:25 2010 admin 172.16.10.10 16 firewall-policy test Jul 28 13:51:59 2010 admin 172.16.10.10 15 exit Jul 28 13:51:47 2010 admin 172.16.10.10 15 exit Jul 28 13:51:44 2010 admin 172.16.10.10 15 exit Jul 28 13:51:43 2010 admin 172.16.10.10 15 exit Jul 28 13:21:17 2010 admin 172.16.10.10 15 aaa-policy test Jul 28 13:20:35 2010 admin 172.16.10.10 15 exit Jul 28 13:09:14 2010 admin 172.16.10.10 15 exit Jul 28 13:08:44 2010 admin 172.16.10.10 15 aaa-policy test Jul 27 13:46:46 2010 admin 172.16.10.10 6 ip nat pool pool1 prefix-length 1 Jul 27 13:44:46 2010 admin 172.16.10.10 6 profile RFS7000 default-RFS7000 Jul 27 12:39:29 2010 admin 172.16.10.12 5 reload force Jul 27 12:28:41 2010 admin 172.16.10.12 20 reload force Jul 27 12:28:39 2010 admin 172.16.10.12 20 write memory .................................................................. rfs7000-37FABE> rfs7000-37FABE>service show diag stats on rfs7000-37FABE fan 1 current speed: 6660 min_speed: 2000 hysteresis: 250 fan 2 current speed: 6720 min_speed: 2000 hysteresis: 250 fan 3 current speed: 6540 min_speed: 2000 hysteresis: 250 Sensor 1 Temperature 32.0 C Sensor 2 Temperature 58.0 C Sensor 3 Temperature 29.0 C Sensor 4 Temperature 28.0 C
  • 416. 5 - 38 WiNG CLI Reference Guide Sensor 5 Temperature 26.0 C Sensor 6 Temperature 28.0 C rfs7000-37FABE>service show info on rrfs7000-37FABE 7.7M out of 8.0M available for logs. 9.4M out of 10.0M available for history. 19.2M out of 20.0M available for crashinfo. List of Files: cfgd.log 5.7K Jul 28 17:17 fmgr.log 221 Jul 27 12:40 messages.log 1.0K Jul 27 12:41 startup.log 52.3K Jul 27 12:40 command.history 903 Jul 28 16:39 reboot.history 1.6K Jul 27 12:40 ugrade.history 698 Jul 27 12:39 Please export these files or delete them for more space. rfs7000-37FABE> rfs7000-37FABEE>service show upgrade-history on rfs7000-37FABE Configured size of upgrade history is 50 Date & Time Old Version New Version Status ===================================================================== Jul 27 12:37:30 2010 5.2.2.0-098D 5.2.2.0-097B Successful Jul 27 12:26:34 2010 5.2.2.0-097B 5.2.2.0-098D Successful Jul 22 16:33:04 2010 5.2.2.0-096B 5.2.2.0-097B Successful Jul 22 16:32:15 2010 5.2.2.0-096B 5.2.2.0-096B Unable to get update file. ftpget: cannot connect to remote host (172.16.10.1): Connection refused Jul 19 17:51:29 2010 5.2.2.0-090D 5.2.2.0-096B Successful Jul 12 12:41:12 2010 5.2.2.0-088D 5.2.2.0-090D Successful Jul 06 12:38:49 2010 5.2.2.0-086D 5.2.2.0-088D Successful Jun 29 13:06:50 2010 5.2.2.0-084D 5.2.2.0-086D Successful .......................................................... rfs7000-37FABE rfs7000-37FABE>service show watchdog watchdog is enabled countdown: 255 seconds of 260 remain until reset rfs7000-37FABE> rfs7000-37FABE>service show xpath-history ------------------------------------------------------------------------------------ DATE&TIME USER XPATH DURATION(MS) ------------------------------------------------------------------------------------ Wed Jul 28 17:29:49 2010 [system] /wing-stats/device/00-A0-F8-00-00-00/_internal/ adjust_stats_interval 40 Wed Jul 28 17:29:49 2010 [system] /wing-stats/device/00-15-70-37-FA-BE/_internal/ adjust_stats_interval 16 Wed Jul 28 17:29:43 2010 [system] /wing-stats/device/00-A0-F8-00-00-00/_internal/ adjust_stats_interval 39 Wed Jul 28 17:29:43 2010 [system] /wing-stats/device/00-15-70-37-FA-BE/_internal/ adjust_stats_interval 16 Wed Jul 28 17:29:37 2010 [system] /wing-stats/device/00-A0-F8-00-00-00/_internal/ adjust_stats_interval 40 Wed Jul 28 17:29:37 2010 [system] /wing-stats/device/00-15-70-37-FA-BE/_internal/ adjust_stats_interval 17 Wed Jul 28 17:29:31 2010 [system] /wing-stats/device/00-A0-F8-00-00-00/_internal/ adjust_stats_interval 40 Wed Jul 28 17:29:31 2010 [system] /wing-stats/device/00-15-70-37-FA-BE/_internal/ adjust_stats_interval 16 Wed Jul 28 17:29:30 2010 [system] /wing-stats/device/00-15-70-37-FA-BE/watchdog- status 6 rfs7000-37FABE#service show last-passwd Last password used: password with MAC 00:15:70:37:fa:be rfs7000-37FABE# rfs7000-37FABE>service show wireless ap diag on rfs7000-37FABE
  • 417. COMMON COMMANDS 5 - 39 -------------------------------------------------------------------------------- AP-MAC FIELD VALUE -------------------------------------------------------------------------------- 00-15-70-37-FA-BE is_manager True 00-15-70-37-FA-BE last_stats_upload 107802.617188 00-15-70-37-FA-BE manager_mint_id 70.37.FA.BE 00-15-70-37-FA-BE max_pull_time 2.80668640137 00-15-70-37-FA-BE num_adoptions 0 00-15-70-37-FA-BE num_config_failed 0 00-15-70-37-FA-BE num_config_received 0 00-15-70-37-FA-BE num_stats_pulled 17951 00-15-70-37-FA-BE num_stats_pushed 0 00-15-70-37-FA-BE upload_state master ------------------------------------------------------------------------------------ AP-MAC FIELD VALUE -------------------------------------------------------------------------- 00-A0-F8-00-00-00 is_manager False 00-A0-F8-00-00-00 last_stats_upload 449767.65625 00-A0-F8-00-00-00 manager_mint_id 70.37.FA.BE 00-A0-F8-00-00-00 max_pull_time 0 00-A0-F8-00-00-00 num_adoptions 2 00-A0-F8-00-00-00 num_config_applied 2 00-A0-F8-00-00-00 num_config_failed 0 00-A0-F8-00-00-00 num_config_received 2 00-A0-F8-00-00-00 num_stats_pulled 74796 00-A0-F8-00-00-00 num_stats_pushed 3 00-A0-F8-00-00-00 upload_state connected -------------------------------------------------------------------------- Total number of APs displayed: 2 rfs7000-37FABE> rfs7000-37FABE>service show wireless config-internal ! Startup-Config-Playback Completed: Yes no debug wireless no country-code ! wlan-qos-policy default no rate-limit wlan to-air no rate-limit wlan from-air no rate-limit client to-air no rate-limit client from-air ! wlan wlan1 ssid wlan1 vlan 1 qos-policy default encryption-type none authentication-type none no accounting radius no accounting syslog rfs7000-37FABE> System Information: Free RAM: 68.0% (169 of 249) Min: 10.0% File Descriptors: free: 24198 used: 960 max: 25500 CPU load averages: 1 min: 0.0% 5 min: 0.0% 15 min: 0.0% Kernel Buffers: Size: 32 64 128 256 512 1k 2k 4k 8k 16k 32k 64k 128k Usage: 2761 2965 927 201 549 107 141 25 68 0 1 2 0 Limit: 32768 8192 4096 4096 8192 8192 16384 16384 1024 512 256 64 64 rfs7000-37FABE# rfs7000-37FABE>service clear wireless radio statistics on rfs7000-37FABE clear radio stats on *: o.k. rfs7000-37FABE#service show dhcp-lease vlan 1 on rfs7000-37FABE No dhcp lease information available rfs7000-37FABE#
  • 418. 5 - 40 WiNG CLI Reference Guide 5.1.9 show Common Commands Displays specified system component settings. There are a number of ways to invoke the show command: • When invoked without any arguments, it displays information about the current context. If the current context contains instances, the show command (usually) displays a list of these instances. • When invoked with the display parameter, it displays information about that component. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show <parameter> Parameters None
  • 419. COMMON COMMANDS 5 - 41 Examples rfs7000-37FABE#show ? adoption Display information related to adoption to wireless controller advanced-wips Advanced WIPS ap-upgrade AP Upgrade boot Display boot configuration. captive-portal Captive portal commands cdp Cisco Discovery Protocol clock Display system clock cluster Cluster Protocol commands Show command lists context Information about current context critical-resources Critical Resources crypto Encryption related commands debug Show Debugging status debugging Debugging functions device-categorization Device Categorization event-history Display event history event-system-policy Display event system policy file Display filesystem information firewall Wireless Firewall interface Interface Configuration/Statistics commands ip Internet Protocol (IP) ip-access-list-stats IP Access list stats licenses Show installed licenses and usage lldp Link Layer Discovery Protocol logging Show logging information mac-access-list-stats MAC Access list stats mac-address-table Display MAC address table mint MiNT protocol noc Noc-level information ntp Network time protocol password-encryption Pasword encryption power Show power over ethernet command reload Scheduled reload information remote-debug Show details of remote debug sessions rf-domain-manager Show RF Domain Manager selection details role Role based firewall running-config Current operating configuration session-changes Configuration changes made in this session session-config This session configuration sessions Display CLI sessions smart-rf Smart-RF Management Commands spanning-tree Display spanning tree information startup-config Startup configuration terminal Display terminal configuration parameters timezone The timezone upgrade-status Display last image upgrade status version Display software & hardware version wireless Wireless commands wwan Display wireless WAN Status rfs7000-37FABE# NOTE: For more information on the show command, see Chapter 6, SHOW COMMANDS.
  • 420. 5 - 42 WiNG CLI Reference Guide 5.1.10 write Common Commands Writes the system running configuration to memory or terminal Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax write [memory|terminal] Parameters • write [memory|terminal] memory Writes to the non-volatile (NV) memory terminal Writes to terminal Examples rfs7000-37FABE>write memory [OK] rfs7000-37FABE> rfs7000-37FABE>write terminal ! ! Configuration of RFS7000 version 5.2.2.0-048B ! ! version 2.1 ! ! smart-rf-policy default ! smart-rf-policy test enable calibration wait-time 4 ! wlan-qos-policy default ! wlan-qos-policy test voice-prioritization svp-prioritization wmm background cw-max 8 wmm video txop-limit 9 ..........................................................................rfs7000- 37FABE>
  • 421. CHAPTER 6 SHOW COMMANDS Show commands display information about a configuration setting or display statistical information. Use this command to see the current running configuration as well as the start-up configuration. The show command also displays the configuration of the current context. This chapter describes the ‘show’ CLI commands used in the USER EXEC, PRIV EXEC, and GLOBAL CONFIG modes. Commands entered in either USER EXEC mode or PRIV EXEC mode are referred to as EXEC mode commands. If a user or privilege is not specified, the referenced command can be entered in either mode. This chapter also describes the ‘show’ commands in the ‘GLOBAL CONFIG’ mode. The commands can be entered in all three modes, except commands like file, IP access list stats, MAC access list stats, and upgrade stats, which cannot be entered in the User Executable Mode.
  • 422. 6-2 WiNG CLI Reference Guide 6.1 show commands Table 6.1 summarizes show commands Command Description Reference show Displays settings for the specified system component page 6-4 adoption Displays information related to wireless controller adoption page 6-8 advanced-wips Displays advanced WIPS settings page 6-10 ap-upgrade Displays access point software image upgrade information page 6-12 boot Displays a device boot configuration page 6-14 captive-portal Displays WLAN hotspot functions page 6-15 cdp Displays a Cisco Discovery Protocol (CDP) neighbor table page 6-18 clock Displays the software system clock page 6-20 cluster Displays cluster commands page 6-21 commands Displays command list page 6-23 context Displays information about the current context page 6-25 critical-resources Displays critical resource information page 6-26 crypto Displays encryption mode information page 6-27 debug Displays debugging configuration information page 6-30 debugging Displays debugging configuration information page 6-33 device- Displays device categorization details page 6-33 categorization event-history Displays event history page 6-37 event-system- Displays event system policy configuration information page 6-38 policy file Displays file system information page 6-39 firewall Displays wireless firewall information page 6-40 interface Displays wireless controller interface status page 6-44 ip Displays Internet Protocol (IP) related information page 6-47 ip-access-list-stats Displays IP access list statistics page 6-52 licenses Displays installed licenses and usage information page 6-53 lldp Displays Link Layer Discovery Protocol (LLDP) information page 6-54 logging Displays logging information page 6-55
  • 423. SHOW COMMANDS 6-3 Command Description Reference mac-access-list- Displays MAC access list statistics page 6-56 stats mac-address-table Displays MAC address table entries page 6-57 mint Displays MiNT protocol configuration commands page 6-58 noc Displays Noc-level information page 6-61 ntp Displays Network Time Protocol (NTP) information page 6-64 password- Displays password encryption status page 6-65 encryption power Displays Power over Ethernet (PoE) information page 6-66 remote-debug Displays remote debug session data page 6-67 rf-domain- Displays RF Domain manager selection details page 6-68 manager role Displays role-based firewall information page 6-69 running-config Displays contents of configuration files page 6-70 session-changes Displays configuration changes made in this session page 6-74 session-config Displays a list of currently active open sessions on the device page 6-75 sessions Displays CLI sessions page 6-76 smart-rf Displays Smart RF management commands page 6-77 spanning-tree Displays spanning tree information page 6-80 startup-config Displays complete startup configuration script on the console page 6-83 terminal Displays terminal configuration parameters page 6-84 timezone Displays timezone page 6-85 upgrade-status Displays image upgrade status page 6-86 version Displays a device’s software and hardware version page 6-88 wireless Displays wireless configuration parameters page 6-89 wwan Displays wireless WAN status page 6-106
  • 424. 6-4 WiNG CLI Reference Guide 6.1.1 show show commands The show command displays the following information: • A device’s current configuration • A device’s start up configuration • A device’s current context configuration, such as profiles and policies Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show <parameter> Parameters None Examples The following examples list the show commands in the different modes: GLOBAL CONFIG Mode rfs7000-37FABE(config)#show ? adoption Display information related to adoption to wireless controller advanced-wips Advanced WIPS ap-upgrade AP Upgrade boot Display boot configuration. captive-portal Captive portal commands cdp Cisco Discovery Protocol clock Display system clock cluster Cluster Protocol commands Show command lists context Information about current context critical-resources Critical Resources crypto Encryption related commands debug Show Debugging status debugging Debugging functions device-categorization Device Categorization event-history Display event history event-system-policy Display event system policy file Display filesystem information firewall Wireless Firewall interface Interface Configuration/Statistics commands ip Internet Protocol (IP) ip-access-list-stats IP Access list stats licenses Show installed licenses and usage lldp Link Layer Discovery Protocol
  • 425. SHOW COMMANDS 6-5 logging Show logging information mac-access-list-stats MAC Access list stats mac-address-table Display MAC address table mint MiNT protocol noc Noc-level information ntp Network time protocol password-encryption Pasword encryption power Show power over ethernet command reload Scheduled reload information remote-debug Show details of remote debug sessions rf-domain-manager Show RF Domain Manager selection details role Role based firewall running-config Current operating configuration session-changes Configuration changes made in this session session-config This session configuration sessions Display CLI sessions smart-rf Smart-RF Management Commands spanning-tree Display spanning tree information startup-config Startup configuration terminal Display terminal configuration parameters timezone The timezone upgrade-status Display last image upgrade status version Display software & hardware version wireless Wireless commands wwan Display wireless WAN Status rfs7000-37FABE(config)# rfs7000-37FABE(config)# rfs7000-37FABE(config)#show clock 2011-04-30 09:28:29 GMT PRIVILEGE EXEC Mode rfs7000-37FABE#show ? adoption Display information related to adoption to wireless controller advanced-wips Advanced WIPS ap-upgrade AP Upgrade boot Display boot configuration. captive-portal Captive portal commands cdp Cisco Discovery Protocol clock Display system clock cluster Cluster Protocol commands Show command lists context Information about current context critical-resources Critical Resources crypto Encryption related commands debug Show Debugging status debugging Debugging functions device-categorization Device Categorization event-history Display event history event-system-policy Display event system policy file Display filesystem information firewall Wireless Firewall interface Interface Configuration/Statistics commands ip Internet Protocol (IP) ip-access-list-stats IP Access list stats licenses Show installed licenses and usage lldp Link Layer Discovery Protocol logging Show logging information mac-access-list-stats MAC Access list stats mac-address-table Display MAC address table mint MiNT protocol noc Noc-level information ntp Network time protocol password-encryption Pasword encryption power Show power over ethernet command reload Scheduled reload information remote-debug Show details of remote debug sessions
  • 426. 6-6 WiNG CLI Reference Guide rf-domain-manager Show RF Domain Manager selection details role Role based firewall running-config Current operating configuration session-changes Configuration changes made in this session session-config This session configuration sessions Display CLI sessions smart-rf Smart-RF Management Commands spanning-tree Display spanning tree information startup-config Startup configuration terminal Display terminal configuration parameters timezone The timezone upgrade-status Display last image upgrade status version Display software & hardware version wireless Wireless commands wwan Display wireless WAN Status rfs7000-37FABE# rfs7000-37FABE#show terminal rfs7000-37FABE#show terminal Terminal Type: xterm Length: 24 Width: 80 USER EXEC Mode rfs7000-37FABE>show ? adoption Display information related to adoption to wireless controller advanced-wips Advanced WIPS ap-upgrade AP Upgrade captive-portal Captive portal commands cdp Cisco Discovery Protocol clock Display system clock cluster Cluster Protocol commands Show command lists context Information about current context critical-resources Critical Resources crypto Encryption related commands debug Show Debugging status debugging Debugging functions device-categorization Device Categorization event-history Display event history event-system-policy Display event system policy firewall Wireless Firewall interface Interface Configuration/Statistics commands ip Internet Protocol (IP) licenses Show installed licenses and usage lldp Link Layer Discovery Protocol logging Show logging information mac-address-table Display MAC address table mint MiNT protocol noc Noc-level information ntp Network time protocol password-encryption Pasword encryption power Show power over ethernet command remote-debug Show details of remote debug sessions rf-domain-manager Show RF Domain Manager selection details role Role based firewall running-config Current operating configuration session-changes Configuration changes made in this session session-config This session configuration sessions Display CLI sessions smart-rf Smart-RF Management Commands spanning-tree Display spanning tree information startup-config Startup configuration terminal Display terminal configuration parameters timezone The timezone version Display software & hardware version wireless Wireless commands wwan Display wireless WAN Status
  • 427. SHOW COMMANDS 6-7 rfs7000-37FABE> rfs7000-37FABE>show wireless ap configured -------------------------------------------------------------------------- IDX NAME MAC PROFILE RF-DOMAIN ADOPTED-BY -------------------------------------------------------------------------- 1 AP7131-889EC4 00-15-70-88-9E-C4 default-AP7131 default un-adopted 2 AP650-445566 11-22-33-44-55-66 default-AP650 default un-adopted -------------------------------------------------------------------------- rfs7000-37FABE>
  • 428. 6-8 WiNG CLI Reference Guide 6.1.2 adoption show commands The adoption command is common to all three modes. It displays information related to APs adopted by a wireless controller. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show adoption [config-errors|history|info|offline|pending|status] show adoption [config-errors <DEVICE-NAME>|history {on <DEVICE-NAME>}| info {on <DEVICE-NAME>}|offline|pending {on <DEVICE-NAME>}| status {on <DEVICE-NAME>}] Parameters • show adoption [config-errors <DEVICE-NAME>|history {on <DEVICE-NAME>}|info {on <DEVICE-NAME>}|offline|pending {on <DEVICE-NAME>}|status {on-<DEVICE-NAME>}] adoption Displays an AP adoption history and status. It also displays adopted device configuration errors. config-errors Displays configuration errors of an AP or all APs adopted by a wireless controller <DEVICE-NAME> • <DEVICE-NAME> – Specify the name of the AP or wireless controller. history Displays adoption history status {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays adoption history status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. info Displays adopted device details {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays adoption details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. offline Displays device’s non-adopted status and its adopted access points pending Displays details for access points pending adoption, but have to actually connect to {on <DEVICE-NAME>} wireless controller • on <DEVICE-NAME> – Optional. Displays information on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. status Displays a device’s adoption status {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller.
  • 429. SHOW COMMANDS 6-9 Examples rfs7000-37FABE(config-device-00-15-70-37-FA-BE)#show adoption offline -------------------------------------------------------------------------- MAC HOST-NAME TYPE RF-DOMAIN -------------------------------------------------------------------------- 00-15-70-88-9E-C4 AP7131-889EC4 AP7131 default 11-22-33-44-55-66 AP650-445566 AP650 default -------------------------------------------------------------------------- Total number of APs displayed: 2 rfs7000-37FABE(config-device-00-15-70-37-FA-BE)# rfs7000-37FABE(config-adoption-policy-test)#show adoption info Number of APs adopted : 1 Number of AAPs adopted : 0 Available AP licenses : 49 Available AAP licenses : 50 Device in cluster : No Cluster state : active -------------------------------------------------------------------------- MAC HOST-NAME TYPE VERSION ADOPTED-BY LAST-ADOPTION -------------------------------------------------------------------------- 00-A0-F8-00-00-00 AP650-000000 AP650 5.2.2.0-048B 00-15-70-37-FA-BE 2010-08-17 23:48:48 -------------------------------------------------------------------------- Total number of APs displayed: 1 rfs7000-37FABE(config-adoption-policy-test)# rfs7000-37FABE(config)#show adoption history -------------------------------------------------------------------------- MAC TYPE EVENT REASON TIME-STAMP -------------------------------------------------------------------------- 00-23-68-13-9B-34 AP7131 adopted N.A. 2011-01-01 05:28:14 -------------------------------------------------------------------------- rfs7000-37FABE(config)#
  • 430. 6 - 10 WiNG CLI Reference Guide 6.1.3 advanced-wips show commands Displays advanced Wireless Intrusion Prevention Policy (WIPS) settings Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show advanced-wips [configuration|stats] show advanced-wips configuration [events {thresholds}|terminate-list] show advanced-wips stats [ap-table|client-table|connected-sensors| event-history|server-listening-port] show advanced-wips stats [detected-aps|detected-clients-for AP <MAC>] {[neighboring|sanstioned|unsanctioned]} Parameters • show advanced-wips configuration [events {thresholds}|terminate-list] configuration Displays advanced WIPS settings events thresholds Displays events summary Advanced WIPS policies are assigned to wireless controllers and support various events depending on the configuration. These events are individually triggered against authorized, unauthorized, and neighboring devices. • thresholds – Optional. Displays threshold values for each event configured in the advanced WIPS policy terminate-list Displays the terminate list • show advanced-wips stats [ap-table|client-table|connected-sensors|event- history|server-listening-port] stats Displays advanced WIPS statistics ap-table Displays AP table statistics client-table Displays station table statistics connected-sensors Displays connected sensors statistics
  • 431. SHOW COMMANDS 6 - 11 event-history Displays advanced WIPS event history server-listening-port Displays advanced WIPS server listening port statistics • show advanced-wips stats [detected-aps|detected-clients-for AP <MAC>] {[neighboring|sanstioned|unsanctioned]} stats Displays advanced WIPS statistics detected-aps Displays AP details based on the parameters passed {neighboring|sanctioned|un • neighboring – Optional. Displays neighboring AP statistics sanctioned} • sanctioned – Optional. Displays sanctioned AP statistics • unsanctioned – Optional. Displays unsanctioned AP statistics detected-clients-for-ap Displays clients statistics for APs <MAC> • <MAC> – Displays clients for a specified AP. Enter the MAC address (BSS-ID) of the AP. {neighboring|sanctioned| • neighboring – Optional. Displays neighboring client information unsanctioned} • sanctioned – Optional. Displays sanctioned client information • unsanctioned – Optional. Displays unsanctioned client information Examples rfs7000-37FABE(config)#show advanced-wips configuration events +------+----+---------------------------------------------+----------+---- |POLICY|SLNO|NAME|AUTHORIZED|UNAUTHORIZED|NEIGHBORING| +------+----+---------------------------------------------+----------+---- Trigger-S: Trigger against Sanctioned devices enabled(Y)/disabled(N) Trigger-U: Trigger against Unsanctioned devices enabled(Y)/disabled(N) Trigger-N: Trigger against Neighboring devices enabled(Y)/disabled(N) | - | - | - | +------+----+---------------------------------------------+----------+---- rfs7000-37FABE(config)# rfs7000-37FABE(config)#show advanced-wips configuration events thresholds +--------+-----+--------------------------+--------------------------+---- | POLICY | # | EVENT | THRESHOLD | VALUE | +--------+-----+--------------------------+--------------------------+---- | test | 1 | dos-eapol-logoff-storm | eapol-start-frames-ap | 9 | | test | 2 | dos-eapol-logoff-storm | eapol-start-frames-mu | 99 | | test | 3 | dos-cts-flood | cts-frames-ratio | 8 | | test | 4 | dos-cts-flood | mu-rx-cts-frames | 20 | +--------+-----+--------------------------+--------------------------+---- rfs7000-37FABE(config)# rfs7000-37FABE(config)#show advanced-wips stats detected-stations-for-ap 11-22-33-44- 55-66 authorized Number of stations associated to the AP 11-22-33-44-55-66: 0 rfs7000-37FABE(config)# rfs7000-37FABE(config)#show advanced-wips stats client-table Number of clients: 2 rfs7000-37FABE(config)# rfs7000-37FABE(config)#show advanced-wips configuration events thresholds -------------------------------------------------------------------------- POLICY # EVENT THRESHOLD VALUE -------------------------------------------------------------------------- test 1 probe-response-flood probe-rsp-frames-count 50 test 2 dos-cts-flood cts-frames-ratio 70 test 3 dos-cts-flood mu-rx-cts-frames 20 test 4 dos-eapol-logoff-storm eapol-start-frames-ap 10 ------------------------------------------------------------------------ rfs7000-37FABE(config)#
  • 432. 6 - 12 WiNG CLI Reference Guide 6.1.4 ap-upgrade show commands Displays AP firmware image upgrade information Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show ap-upgrade [history {on <RF-DOMAIN-NAME>}|load-image-status|status {on [<RF-DOMAIN-NAME>|<RF-DOMAIN-MANAGER>]}|versions {on <RF-DOMAIN-MANAGER>}] Parameters • show ap-upgrade [history {on <RF-DOMAIN-NAME>}|load-image-status|status {on [<RF-DOMAIN-NAME>|<RF-DOMAIN-MANAGER>]|versions {<RF-DOMAIN-MANAGER>}] ap-upgrade Displays AP firmware upgrade details history Displays AP firmware upgrade history (AP address, upgrade result, time of upgrade, {on <RF-DOMAIN-NAME>} number of retries, upgrade by etc.) • on <RF-DOMAIN-NAME> – Optional. Displays device firmware upgrade history in a RF Domain • <RF-DOMAIN-NAME> – Specify the RF Domain name. load-image-status Displays firmware image download status on a device status Displays AP firmware upgrade status on {<RF-DOMAIN-NAME>| • on – Optional. Displays firmware upgrade status on a RF Domain or RF Domain <RF-DOMAIN-MANAGER>} manager • <RF-DOMAIN-NAME> – Optional. Specify the RF Domain name. • <RF-DOMAIN MANAGER> – Optional. Specify the RF Domain manager name. versions Displays upgrade image versions {on <RF-DOMAIN- • on <RF-DOMAIN-MANAGER> – Optional. Displays upgrade image versions on MANAGER>} devices adopted by a RF Domain manager
  • 433. SHOW COMMANDS 6 - 13 Examples rfs7000-37FABE(config)#show ap-upgrade history ------------------------------------------------------------------------------------ AP RESULT TIME RETRIES UPGRADED-BY LAST-UPDATE-ERROR ------------------------------------------------------------------------------------ 00-04-96-44-54-C0 done 2011-03-31 02:06:39 0 00-04-96- 42-14-79 - 00-04-96-44-54-C0 done 2011-04-14 00:46:52 0 00-04-96- 42-14-79 - 00-04-96-44-54-C0 done 2011-04-25 00:12:00 0 00-04-96- 42-14-79 - 00-04-96-44-54-C0 done 2011-04-28 07:17:38 0 00-04-96- 42-14-79 - 00-04-96-44-54-C0 done 2011-05-04 12:15:31 0 00-04-96- 42-14-79 - Total number of entries displayed: 5
  • 434. 6 - 14 WiNG CLI Reference Guide 6.1.5 boot show commands Displays a device’s boot configuration. Use the on command to view a remote device’s boot configuration. NOTE: This command is not present in the USER EXEC Mode. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show boot {on <DEVICE-NAME>} Parameters • show boot {on <DEVICE-NAME>} boot Displays primary and secondary image boot configuration details (build date, install date, version, and the image used to boot the current session) on <DEVICE-NAME> Optional. Displays boot configuration information on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE(config)#show boot on rfs7000-37FABE -------------------------------------------------------------------------- IMAGE BUILD DATE INSTALL DATE VERSION -------------------------------------------------------------------------- Primary 2011-05-10 09:58:17 2010-02-07 10:33:55 5.2.0.0-026D Secondary 2011-06-10 21:29:31 2011-06-15 14:21:17 5.2.0.0-033D -------------------------------------------------------------------------- Current Boot : Secondary Next Boot : Secondary Software Fallback : Enabled rfs7000-37FABE(config)#
  • 435. SHOW COMMANDS 6 - 15 6.1.6 captive-portal show commands Displays WLAN hotspot information Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show captive-portal client {filter|on} show captive-portal client {filter [captive-portal|ip|state|vlan|wlan]} show captive-portal client {filter captive-portal [<CAPTIVE-PORTAL>| not <CAPTIVE-PORTAL>]}] show captive-portal client {filter ip [<IP>|not <IP>]} show captive-portal client {filter state [not[pending|success] |pending|success]} show captive-portal client {filter vlan [<VLAN>|not <VLAN>]} show captive-portal client {filter wlan [<WLAN>|not <WLAN>]} show captive-portal client {on <DEVICE-OR-DOMAIN-NAME> {filter {captive-portal| ip|state|vlan|wlan}} Parameters • show captive-portal client {filter captive-portal [<CAPTIVE-PORTAL>| not <CAPTIVE-PORTAL>]} captive-portal client Displays captive portal client information filter Optional. Defines additional filters captive-portal Optional. Displays a specified captive portal client information [<CAPTIVE-PORTAL>| • <CAPTIVE-PORTAL> – Specify the captive portal name. not <CAPTIVE-PORTAL>] • not <CAPTIVE-PORTAL> – Inverts the match selection • show captive-portal client {filter ip [<IP>|not <IP>]} captive-portal client Displays captive portal client information filter Optional. Defines additional filters ip [<IP>|not <IP>] Displays captive portal client information based on the IP address passed • <IP> – Specify the IP address. • not <IP> – Inverts the match selection
  • 436. 6 - 16 WiNG CLI Reference Guide • show captive-portal client {filter state [not [pending|success]| pending|success]} captive-portal client Displays captive portal client information filter Optional. Defines additional filters state not [pending|success]] Optional. Filters clients based on their authentication state • not – Inverts match selection • pending – Displays clients successfully authenticated (Opposite of pending authen- tication) • success – Displays clients redirected for authentication (Opposite of successful au- thentication) state [pending|success]] Optional. Filters clients based on their authentication state • pending – Displays clients redirected for authentication • success – Displays clients successfully authenticated • show captive-portal client {filter vlan [<VALN-ID>|not <VLAN-ID>]} captive-portal client Displays captive portal client information filter Optional. Defines additional filters vlan [<VLAN>| Optional. Displays clients on a specified VLAN not <VLAN>] • <VLAN> – Specify the VLAN ID. • not <VLAN> – Inverts match selection • show captive-portal client {filter wlan [<WALN-ID>|not <WLAN-ID>]} captive-portal client Displays captive portal client information filter Optional. Defines additional filters wlan [<WLAN>| Optional. Displays clients on a specified WLAN not <WLAN>] • <WLAN> – Specify the WLAN ID. • not <WLAN> – Inverts match selection • show captive-portal client {on <DEVICE-OR-DMAIN-NAME> filter [captive- portal|ip|state|vlan|wlan]} captive-portal client Displays captive portal client information on <DEVICE-OR-DOMAIN- Optional. Displays captive portal clients on a specified device or RF Domain NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. filter Optional. Defines additional filters • captive-portal – Optional. Displays client information for a specified captive portal • ip – Optional. Displays captive portal client information based on the IP address passed • state – Optional. Displays client information based on the their authentication state • vlan – Displays clients on a specified VLAN • wlan – Optional. Displays clients on a specified WLAN
  • 437. SHOW COMMANDS 6 - 17 Examples rfs7000-37FABE(config)#show captive-portal client on RFS7000-421479 ------------------------------------------------------------------------------------ CLIENT IP CAPTIVE-PORTAL WLAN VLAN STATE SESSION TIME ------------------------------------------------------------------------------------ ------------------------------------------------------------------------------------ Total number of captive portal clients displayed: 0
  • 438. 6 - 18 WiNG CLI Reference Guide 6.1.7 cdp show commands Displays the Cisco Discovery Protocol (CDP) neighbor table Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show cdp [neighbors|report] {detail {on <DEVICE-OR-DOMAIN-NAME>}| on <DEVICE-OR-DOMAIN-NAME>} Parameters • show cdp [neighbors|report] {detail {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-OR- DOMAIN-NAME>} cdp [neighbors|report] Displays CDP neighbors table or aggregated CDP neighbors table detail Optional. Displays CDP neighbors table or aggregated CDP neighbors table details {on <DEVICE-OR- • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays table details on a specified DOMAIN-NAME>} device or RF Domain • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. on <DEVICE-OR- Optional. Displays table details on a specified device or domain (This option does not DOMAIN-NAME> display detailed information) • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain.
  • 439. SHOW COMMANDS 6 - 19 Examples The following example displays CDP neighbors table in detail. rfs7000-37FABE(config)#show cdp neighbors detail on rfs7000-37FABE ------------------------- Device ID: RFS4000-229D58 Entry address(es): IP Address: 172.16.10.6 IP Address: 169.254.157.88 Platform: RFS-4010-00010-WR, Capabilites: Router Switch Interface: ge1, Port ID (outgoing port): ge1 Hold Time: 173 sec advertisement version: 2 Native VLAN: 1 Duplex: full Version : 5.2.2.0-048B ------------------------- Device ID: rfs6000-380649 Entry address(es): IP Address: 2.2.2.2 IP Address: 172.16.10.4 Platform: RFS6000, Capabilites: Router Switch Interface: ge1, Port ID (outgoing port): ge1 Hold Time: 173 sec advertisement version: 2 --More-- rfs7000-37FABE(config)# The following example shows a non-detailed CDP neighbors table. rfs7000-37FABE(config)#show cdp neighbors on rfs7000-37FABE -------------------------------------------------------------------------- Device ID Neighbor IP Platform Local Intrfce Port ID Duplex -------------------------------------------------------------------------- rfs4000-229D58 172.16.10.6 RFS-4010-00010-WR ge1 ge1 full rfs6000-380649 2.2.2.2 RFS6000 ge1 ge1 full -------------------------------------------------------------------------- rfs7000-37FABE(config)# rfs7000-37FABE(config)#show cdp neighbors on rfs7000-37FABE -------------------------------------------------------------------------------- Device ID Neighbor IP Platform Local Intrfce Port ID Duplex -------------------------------------------------------------------------------- ap650-4454C0 169.254.84.192 AP650-ROW ge8 ge1 full --------------------------------------------------------------------------------
  • 440. 6 - 20 WiNG CLI Reference Guide 6.1.8 clock show commands Displays a system’s clock Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show clock {on <DEVICE-NAME>} Parameters • show clock {on <DEVICE-NAME>} clock Displays a system’s clock on <DEVICE-NAME> Optional. Displays system clock on a specified device • <DEVICE-NAME> – Specify the name of the AP, wireless controller, or RF Domain. Examples rfs7000-37FABE(config)#show clock 2011-06-21 14:14:49 IST rfs7000-37FABE(config)#
  • 441. SHOW COMMANDS 6 - 21 6.1.9 cluster show commands Displays cluster information (cluster configuration parameters, members, status etc.) Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show cluster [configuration|members {detail}|status] Parameters • show cluster [configuration|members {detail}|status] cluster Displays cluster information configuration Displays cluster configuration parameters members {detail} Displays cluster members configured on the logged device • detail – Optional. Displays detailed information of known cluster members status Displays cluster status
  • 442. 6 - 22 WiNG CLI Reference Guide Examples rfs7000-37FABE(config)#show cluster configuration Cluster Configuration Information Mode : Active Number of peer(s) : 0 Auto revert : Disabled Auto revert interval (Mins) : 5 Controller AP license : 0 Controller AAP license : 0 Controller max AP adoption capacity : 1024 Cluster Runtime Information Cluster protocol version : 1 Cluster run state : active Cluster AP license : 0 Cluster AAP license : 0 Controller AP count : 0 Controller AAP count : 0 Cluster AP count : 0 Cluster AAP count : 0 Cluster max AP adoption capacity : 1024 Number of connected peer(s) : 0 rfs7000-37FABE(config)#show cluster members detail +-------------+-------------------+--------+--------+---------+----------| ID | MAC | MODE |AP COUNT|AAP COUNT|AP LICENSE|AAP LICENSE| VERSION | +-------------+-------------------+--------+--------+---------+----------| 70.37.fa.be | 00-15-70-37-FA-BE | Active | 0 | 0 | 0 | 0 | Unknown | +-------------+-------------------+--------+--------+---------+----------+
  • 443. SHOW COMMANDS 6 - 23 6.1.10 commands show commands Displays commands available for the current mode Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show commands Parameters None Examples rfs7000-37FABE(config)#show commands help help search WORD (|detailed|only-show|skip-show) show commands show debugging (|(on DEVICE-OR-DOMAIN-NAME)) show debugging cfgd show debugging wireless (|(on DEVICE-OR-DOMAIN-NAME)) show debugging voice (|(on DEVICE-OR-DOMAIN-NAME)) show debugging captive-portal (|(on DEVICE-OR-DOMAIN-NAME)) show debugging dhcpsvr (|(on DEVICE-NAME)) show debugging mstp (|(on DEVICE-OR-DOMAIN-NAME)) show debugging advanced-wips show debugging vpn (|(on DEVICE-NAME)) show debugging radius (|(on DEVICE-NAME)) show (running-config|session-config) (|include-factory) show running-config interface (|`WORD|ge <1-4>|me1|pc <1-4>|vlan <1-4094>') (|include-factory) show running-config wlan WLAN (|include-factory) show (running-config) device (self|DEVICE-NAME) (|include-factory) show session-changes show startup-config (|include-factory) show adoption info (|(on DEVICE-NAME)) show adoption offline show licenses show password-encryption status show debug xpath get WORD (|WORD) show debug xpath count WORD show debug xpath list WORD show rf-domain-manager show timezone show event-history show ntp status show ntp associations (|detail) show device-categorization summary show wireless ap (|(on DEVICE-OR-DOMAIN-NAME))
  • 444. 6 - 24 WiNG CLI Reference Guide show wireless ap configured show wireless ap detail (|WORD) show wireless unsanctioned aps (|(on DEVICE-OR-DOMAIN-NAME)) show wireless unsanctioned aps detailed (|(on DEVICE-OR-DOMAIN-NAME)) show wireless unsanctioned aps statistics (|(on DEVICE-OR-DOMAIN-NAME)) show wireless client (|(on DEVICE-OR-DOMAIN-NAME)) (|(filter {|(state (|not) (data- ready|roaming))|(wlan (|not) WLAN)|(ip (|not) A.B.C.D)})) show wireless client detail AA-BB-CC-DD-EE-FF (|(on DEVICE-OR-DOMAIN-NAME)) show wireless client statistics (|traffic) (|(on DEVICE-OR-DOMAIN-NAME)) show wireless client statistics rf (|(on DEVICE-OR-DOMAIN-NAME)) ............................................... rfs7000-37FABE(config)#
  • 445. SHOW COMMANDS 6 - 25 6.1.11 context show commands Displays the current context details Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show context {include-factory|session-config {include-factory}} Parameters • show context {include-factory|session-config {include-factory}} include-factory Optional. Includes factory defaults session-config Optional. Displays running system information in the current context include-factory • include-factory – Optional. Includes factory defaults Examples rfs7000-37FABE>show context include-factory ! ! Configuration of RFS7000 version 5.2.2.0-048B ! ! version 2.1 ! ! firewall-policy default ip dos smurf log-and-drop log-level warnings ip dos twinge log-and-drop log-level warnings ip dos invalid-protocol log-and-drop log-level warnings ip dos router-advt log-and-drop log-level warnings ip dos router-solicit log-and-drop log-level warnings ip dos option-route log-and-drop log-level warnings ip dos ascend log-and-drop log-level warnings ip dos chargen log-and-drop log-level warnings ip dos fraggle log-and-drop log-level warnings ip dos snork log-and-drop log-level warnings ip dos ftp-bounce log-and-drop log-level warnings ip dos tcp-intercept log-and-drop log-level warnings ip dos broadcast-multicast-icmp log-and-drop log-level warnings ip dos land log-and-drop log-level warnings ip dos tcp-xmas-scan log-and-drop log-level warnings --More-- rfs7000-37FABE>
  • 446. 6 - 26 WiNG CLI Reference Guide 6.1.12 critical-resources show commands Displays critical resource information. Critical resources are resources vital to the wireless controller managed network. Some critical resources are security spanning routers, switches, firewalls, VPNs, VLANs, WiFi access points etc. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show critical-resources {on <DEVICE-NAME>} Parameters • show critical-resources {on <DEVICE-NAME>} critical-resources Displays critical resource information on <DEVICE-NAME> Optional. Displays critical resource information on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples RFS4000-22CDAA(config)#sh critical-resources on RFS4000-22CDAA -------------------------------------------------------------------------- CRITICAL RESOURCE IP VLAN PING-MODE STATE -------------------------------------------------------------------------- 172.168.1.103 1 arp-icmp up
  • 447. SHOW COMMANDS 6 - 27 6.1.13 crypto show commands Displays encryption mode information Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show crypto [ipsec|isakmp|key|pki] show crypto [ipsec|isakmp] sa {on <DEVICE-NAME>} show crypto key rsa {on <DEVICE-NAME>|public-key-detail {on <DEVICE- NAME>} show crypto pki trustpoints {<TRUSTPOINT> {on <DEVICE-NAME>}| all {on <DEVICE-NAME>}|on <DEVICE-NAME>} Parameters • show crypto [ipsec|isakmp] sa {on <DEVICE-NAME>} crypto [ipsec|isakmp] sa Displays encryption information • ipsec – Displays Internet Protocol Security (IPSec) statistics. The IPSec encryption authenticates and encrypts each IP packet in a communication session. • isakmp – Displays Internet Security Association and Key Management Protocol (ISAKMP) statistics. The ISAKMP protocol provides a means of authentication and key exchange. The following is common to the IPSec and ISAKMP parameters: • sa – Displays all IPSec or ISAKMP Security Associations (SA) on <DEVICE-NAME> Optional. Displays IPSec or ISAKMP SAs on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show crypto key rsa {on <DEVICE-NAME>|public-key-detail {on <DEVICE-NAME>}} crypto key Displays key management operations
  • 448. 6 - 28 WiNG CLI Reference Guide rsa {on <DEVICE-NAME>} Displays RSA public keys • on <DEVICE-NAME> – Optional. Displays RSA public keys on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. public-key-detail Displays public key in the Privacy Enhanced Mail (PEM) format {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays public key on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show crypto pki trustpoints {<TRUSTPOINT> {on <DEVICE-NAME>}|all {on <DEVICE- NAME>}|on <DEVICE-NAME>} crypto pki Displays Public Key Infrastructure (PKI) commands trustpoints Displays WLAN trustpoints <TRUSTPOINT> Optional. Displays a specified trustpoint. Specify the trustpoint name. {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays trustpoint details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. all {on <DEVICE-NAME>} Optional. Displays all trustpoints • on <DEVICE-NAME> – Optional. Displays all trustpoints configured on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Displays trustpoints configured on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE(config)#show crypto key rsa public-key-detail on rfs7000-37FABE RSA key name: default-trustpoint-srvr-priv-key Key-length: 1024 -----BEGIN PUBLIC KEY----- MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDGHBR2bxLeRZ4G6hm7jHJRSaeE A216r4s4qptiSld+rKeMiHPtFbyELedk3dITkzF1EU7Ov0vKzant0pyAmdJ8ci// wSQMmZjX3RwF9OFBRp2C09LFj?1VX2fsoD6xXhJHBLieJ9qzF+ZQ2CYG7+r29P/o 3rfr/GLaTN3C6RIWvQIDAQAB -----END PUBLIC KEY----- RSA key name: default_rsa_key Key-length: 1024 -----BEGIN PUBLIC KEY----- MIGdMA0GCSqGSIb3DQEBAQUAA4GLADCBhwKBgQCwXXWGE9j/i3EiSjnY9x1Ktsbt rzgqB1KhlShWIgnWqlxjzvO6S?GmBPG5XqBS3rKqIzrgh6fXF2cNJZweWgc1QktL AoZN/MeCiGVGiJZmtmyKlHPMgyyLGqm6krvWFfOdqlA85+WdQyvDsevTVVp/OiEB al4SsIvMG+U/UQaI1wIBIw== -----END PUBLIC KEY----- rfs7000-37FABE(config)# rfs7000-37FABE(config)#show crypto key rsa on rfs7000-37FABE +------------+-------------------------------------------+---------------- | # | KEY NAME | KEY LENGTH | +------------+-------------------------------------------+---------------- | 1 | default-trustpoint-srvr-priv-key | 1024 | | 2 | default_rsa_key | 1024 | +------------+-------------------------------------------+---------------------+ rfs7000-37FABE(config)# rfs7000-37FABEconfig)#show crypto pki trustpoints all on rfs7000-37FABE Trustpoint Name: default-trustpoint (self signed)
  • 449. SHOW COMMANDS 6 - 29 -------------------------------------------------------------------------- CRL present: no Server Certificate details: Key used: default-trustpoint-srvr-priv-key Serial Number: 0671 Subject Name: C=US, ST=CA, L=San Jose, O=Enterprise Mobility, OU=EWLAN, CN=Motorola Issuer Name: C=US, ST=CA, L=San Jose, O=Enterprise Mobility, OU=EWLAN, CN=Motorola Valid From : Tue Sep 22 16:19:51 2009 UTC Valid Until: Wed Sep 22 16:19:51 2010 UTC rfs7000-37FABE(config)# rfs7000-37FABE(config)#show crypto pki trustpoints all Trustpoint Name: default-trustpoint (self signed) -------------------------------------------------------------------------- CRL present: no Server Certificate details: Key used: default-trustpoint-srvr-priv-key Serial Number: 0671 Subject Name: C=US, ST=CA, L=San Jose, O=Enterprise Mobility, OU=EWLAN, CN=Motorola Issuer Name: C=US, ST=CA, L=San Jose, O=Enterprise Mobility, OU=EWLAN, CN=Motorola Valid From : Tue Sep 22 16:19:51 2009 UTC Valid Until: Wed Sep 22 16:19:51 2010 UTC rfs7000-37FABE(config)#
  • 450. 6 - 30 WiNG CLI Reference Guide 6.1.14 debug show commands Displays debugging status of the DPD2 module, profile functions, and XPath operations Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show debug [dpd2|profile|xpath] show debug dpd2 {on <DEVICE-NAME>} show debug profile <WORD> {arg <WORD>} show debug xpath [count|get|list] show debug xpath [count|list] <WORD> show debug xpath get <WORD> {option|param <WORD> option} [do-profiling| no-pretty|show-tail-only|use-generator|use-streaming] Parameters • show debug dpd2 {on <DEVICE-NAME>} debug dpd2 Displays DPD2 module debugging status on <DEVICE-NAME> Optional. Displays the debugging status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show debug profile <WORD> {arg <WORD>} debug profile <WORD> Displays profile function debugging status {arg <WORD>} • <WORD> – Specify the name of the profile function. • arg <WORD> – Optional. Specify arguments for the function in a single word, separated by a coma (for example. cli,[3,4]). • show debug xpath [count|list] <WORD> debug xpath Displays XPath-based operation debugging status
  • 451. SHOW COMMANDS 6 - 31 count <WORD> Prints the number of items under an XPath node • <WORD> – Specify the XPath node. (for example, /wing-stats/device/self/interface) list <WORD> Lists the names (keys) under an XPath node • <WORD> – Specify the XPath node. (for example, /wing-stats/device/self/interface) • show debug xpath get <WORD> {option|param <WORD> option} [do-profiling| no-pretty|show-tail-only|use-generator|use-streaming] debug xpath Displays XPath-based operation debugging status get <WORD> Prints the XPath node value based on the options passed • <WORD> – Specify the XPath node. (for example, /wing-stats/device/self/interface) option Optional. Prints the XPath node value based on the options passed Select one of the following options: • do-profiling – Performs profiling • no-pretty – Disables pretty for speed • show-tail-only – Displays only the tail of the result • use-generator – Performs streaming using generator interface • use-streaming – Uses streaming interface param <WORD> option Optional. Prints the XPath node value based on the options passed • <WORD> – Specify the parameter in the dictionary format (for example, rf_domain_name:a_name,dummy_name:dummy_value) • option – After entering the parameter, select one of the following options: • do-profiling – Performs profiling • no-pretty – Disables pretty for speed • show-tail-only – Displays only the tail of the result • use-generator – Performs streaming using generator interface • use-streaming – Uses streaming interface
  • 452. 6 - 32 WiNG CLI Reference Guide Examples rfs7000-37FABE(config)#show debug xpath count /wing-stats Success: 4 rfs7000-37FABE(config)# rfs7000-37FABE(config)#show debug xpath get word option do-profiling no-pretty Wed Jun 22 09:28:34 2011 /var/profile 26 function calls in 0.001 CPU seconds Ordered by: standard name ncalls tottime percall cumtime percall filename:lineno(function) 1 0.000 0.000 0.001 0.001 <string>:1(<module>) 1 0.000 0.000 0.001 0.001 cluster_db_api.py:36(cluster_db_get_api) 1 0.000 0.000 0.001 0.001 debugcli.py:163(debug_xpath_get_stats_body) 2 0.000 0.000 0.000 0.000 log.py:133(dlog) 1 0.000 0.000 0.000 0.000 re.py:144(sub) 1 0.000 0.000 0.000 0.000 re.py:227(_compile) 1 0.000 0.000 0.000 0.000 utils.py:174(dlog_stats) 1 0.000 0.000 0.000 0.000 utils.py:186(dlog_snmp) 1 0.000 0.000 0.000 0.000 xpath_parser.py:104(__init__) 1 0.000 0.000 0.000 0.000 xpath_parser.py:124(splitsegments) 1 0.000 0.000 0.000 0.000 xpath_parser.py:194(stripFilters) 1 0.000 0.000 0.000 0.000 xpath_parser.py:6(__init__) 1 0.000 0.000 0.000 0.000 {built-in method sub} 1 0.000 0.000 0.000 0.000 {isinstance} 2 0.000 0.000 0.000 0.000 {len} 2 0.000 0.000 0.000 0.000 {method 'append' of 'list' objects} 1 0.000 0.000 0.000 0.000 {method 'disable' of '_lsprof.Profiler' objects} 1 0.000 0.000 0.000 0.000 {method 'find' of 'str' objects} 3 0.000 0.000 0.000 0.000 {method 'get' of 'dict' objects} 2 0.000 0.000 0.000 0.000 {method 'startswith' of 'str' objects} done profiling rfs7000-37FABE(config)# rfs7000-37FABEconfig)#show debug xpath list /wing-stats Success: ['device', 'rf_domain', 'noc'] rfs7000-37FABE(config)#
  • 453. SHOW COMMANDS 6 - 33 6.1.15 debugging show commands Displays debugging information Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show debugging {advanced-wips|captive-portal|cfgd|dhcpsvr|mint|mstp| nsm|on|radius|snmp|voice|vpn|wireless} show debugging {[advanced-wips|cfgd]} show debugging {[captive-portal|mint|mstp|nsm|voice|wireless]} {on <DEVICE-OR-DOMAIN-NAME>} show debugging {on <DEVICE-OR-DOMAIN-NAME>} show debugging {dhcpsvr|radius|snmp|vpn} {on <DEVICE-NAME>} Parameters • show debugging {advanced-wips|cfgd} debugging Displays debugging processes in progress based on the parameters passed {advanced-wips|cfgd} • advanced-wips – Optional. Displays the advanced WIPS module’s debugging configuration • cfgd – Optional. Displays the cfgd process debugging configuration
  • 454. 6 - 34 WiNG CLI Reference Guide • show debugging {captive-portal|mint|mstp|nsm|voice|wireless} {on <DEVICE-OR-DOMAIN- NAME>} debugging Displays debugging processes in progress based on the parameters passed {captive-portal| • captive-portal – Optional. Displays the hotspot (HSD) module’s debugging mint|mstp|nsm|voice| configuration wireless} • mint – Optional. Displays the MiNT module’s debugging configuration • mstp – Optional. Displays the Multiple Spanning Tree (MST) module’s debugging configuration • nsm – Optional. Displays Network Service Module (NSM) debugging configuration • voice – Optional. Displays the voice module’s debugging configuration • wireless – Optional. Displays the wireless module’s debugging configuration on <DEVICE-OR-DOMAIN- The following are common to all of the above options: NAME> • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays debugging processes on a device or RF Domain. • <DEVICE-OR-DOMAIN-NAME> – The name of the AP, wireless controller, or RF Domain. • show debugging {dhcpsvr|radius|snmp|vpn} {on <DEVICE-NAME>} debugging Displays debugging processes in progress based on the parameters passed {dhcpsvr|radius|snmp| • dhcpsvr – Optional. Displays the DHCP server configuration module’s debugging vpn} information • radius – Optional. Displays the RADIUS server configuration module’s debugging information • snmp – Optional. Displays the Simple Network Management Protocol (SNMP) module’s debugging information • vpn – Optional. Displays the VPN module’s debugging information • snmp – Optional. Displays the SNMP module’s debugging information on <DEVICE-NAME> The following are common to all of the above options: • on <DEVICE-NAME> – Optional. Displays debugging processes on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show debugging {on <DEVICE-OR-DOMAIN-NAME>} debugging {on <DEVICE-OR- Displays all debugging processes in progress on a specified device or RF Domain. DMAIN-NAME>} • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays debugging processes in progress, on a device or RF Domain • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain.
  • 455. SHOW COMMANDS 6 - 35 Examples rfs7000-37FABE(config)#show debugging cfgd cfgd: config debugging is on cluster debugging is on rfs7000-37FABE(config)#
  • 456. 6 - 36 WiNG CLI Reference Guide 6.1.16 device-categorization show commands Displays device categorization summary Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show device-categorization summary Parameters • show device-categorization summary device-categorization Displays device categorization summary summary Examples rfs7000-37FABE(config)#show device-categorization summary -------------------------------------------------------------------------- POLICY # A/N AP/CLIENT MAC SSID -------------------------------------------------------------------------- DEVICE-CATEGORIZATION 1 sanctioned client 00-40-96-B0-BA-2D - DEVICE-CATEGORIZATION 2 neighboring client 00-40-96-B0-BA-2A - DEVICE-CATEGORIZATION 3 sanctioned ap 00-23-68-31-12-65 ASDF -------------------------------------------------------------------------- rfs7000-37FABE(config)#
  • 457. SHOW COMMANDS 6 - 37 6.1.17 event-history show commands Displays event history report Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show event-history {on <DEVICE-OR-DOMAIN-NAME>} Parameters • show event-history {on <DEVICE-OR-DOMAIN-NAME>} event-history Displays event history report on <DEVICE-OR-DOMAIN- Optional. Displays event history report on a device or RF Domain NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. Examples rfs7000-37FABE(config)#show event-history EVENT HISTORY REPORT Generated on '2011-06-22 12:50:10 IST' by 'admin' 2011-06-22 10:28:22 00-15-70-37-FA-BE SYSTEM LOGIN Successfully logged in User: 'admin' with privilege 'superuser' from 'ssh' 2011-06-22 10:25:01 00-15-70-37-FA-BE SYSTEM LOGOUT Logged out User: 'admin' with privilege 'superuser' from '172.16.10.10' 2011-06-22 09:39:35 00-15-70-37-FA-BE NSM IFUP Interface ge3 is up 2011-06-22 09:39:34 00-15-70-37-FA-BE NSM IFUP Interface ge3 is up 2011-06-22 09:37:16 00-15-70-37-FA-BE NSM IFDOWN Interface ge3 is down 2011-06-22 07:24:21 00-15-70-37-FA-BE SYSTEM LOGIN Successfully logged in User: 'admin' with privilege 'superuser' from 'ssh' 2011-06-22 07:01:54 00-15-70-37-FA-BE NSM IFUP Interface ge3 is up 2011-06-22 07:01:53 00-15-70-37-FA-BE NSM IFUP Interface ge3 is up 2011-06-22 07:01:35 00-15-70-37-FA-BE NSM IFDOWN Interface ge3 is down 2011-06-22 07:01:18 00-15-70-37-FA-BE NSM IFUP Interface ge3 is up --More-- rfs7000-37FABE(config)#
  • 458. 6 - 38 WiNG CLI Reference Guide 6.1.18 event-system-policy show commands Displays detailed event system policy configuration Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show event-system-policy [config|detail] <EVENT-SYSTEM-POLICY> Parameters • show event-system-policy [config|detail] <EVENT-SYSTEM-POLICY> event-system-policy Displays event system policy configuration config Displays configuration for a specified policy detail Displays detailed configuration for a specified policy <EVENT-SYSTEM-POLICY> Specify the event system policy name. Examples rfs7000-37FABE(config)#show event-system-policy config testpolicy -------------------------------------------------------------------------- MODULE EVENT SYSLOG SNMP FORWARD EMAIL -------------------------------------------------------------------------- aaa radius-discon-msg on on on default -------------------------------------------------------------------------- rfs7000-37FABE(config)# rfs7000-37FABE
  • 459. SHOW COMMANDS 6 - 39 6.1.19 file show commands Displays file system information NOTE: This command is not available in the USER EXEC Mode. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show file [information <FILE>|systems] Parameters • show file [information <FILE>|systems] information <FILE> Displays file information • <FILE> – Specify the file name. systems Lists all file systems present in the system Examples rfs7000-37FABE(config)#show file systems File Systems: Size(b) Free(b) Type Prefix - - opaque system: 10485760 9916416 flash nvram: 20971520 20131840 flash flash: - - network (null) - - network rdp: - - network sftp: - - network http: - - network ftp: - - network tftp: 20971520 20131840 - hotspot: rfs7000-37FABE(config)# rfs7000-37FABE(config)#show file information flash flash:: type is directory rfs7000-37FABE(config)#
  • 460. 6 - 40 WiNG CLI Reference Guide 6.1.20 firewall show commands Displays wireless firewall information, such as DHCP snoop table entries, denial of service statistics, active session summaries etc. Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show firewall [dhcp|dos|flows] show firewall [dhcp snoop-table|dos stats] {on <DEVICE-NAME>}] show firewall flows {[filter|management|on|stats|wireless-client <MAC>]} show firewall flows {filter [dir|dst port <1-65535>|ether|flow-type|icmp| igmp|ip|max-idle|min-bytes|min-idle|min-pkts|not|port|src|tcp|udp]} show firewall flows {management {on <DEVICE-NAME>}|stats {on <DEVICE- NAME>}|wireless-client <MAC>|on <DEVICE-NAME>} Parameters • show firewall [dhcp snoop-table|dos stats] dhcp snoop-table Displays Dynamic Host Configuration Protocol (DHCP) snoop table entries • snoop-table – Displays DHCP snoop table entries DHCP snooping acts as a firewall between non-trusted hosts and the DHCP server. Snoop table entries contain MAC address, IP address, lease time, binding type, and interface information of non-trusted interfaces. dos stats Displays Denial of Service (DoS) statistics on <DEVICE-NAME> The following are common to the DHCP snoop table and DoS stats parameters: • on <DEVICE-NAME> – Optional. Displays snoop table entries, or DoS stats on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 461. SHOW COMMANDS 6 - 41 • show firewall flows {management {on <DEVICE-NAME>}|stats {on <DEVICE- NAME>}|wireless-client <MAC>|on <DEVICE-NAME>} firewall flows Notifies a session has been established management Optional. Displays management traffic firewall flows {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays firewall flows on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. stats Optional. Displays active session summary {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays active session summary on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. wireless-client <MAC> Optional. Displays wireless clients firewall flows • <MAC> – Specify the MAC address of the wireless client. on <DEVICE-NAME> Optional. Displays all firewall flows on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show firewall flows filter [(dir|dst|ether|flow-type|icmp|igmp|ip| max-idle|min-bytes|min-idle|min-pkts|not|port|src|tcp|udp)] {(dir|dst|ether| flow-type|ip|max-idle|min-bytes|min-idle|min-pkts|port|src)} firewall filter Defines additional firewall flow filter parameters dir [wired-wired|wired- Matches the packet flow direction wireless|wireless- • wired-wired – Wired to wired flows wired|wireless-wireless] • wired-wireless – Wired to wireless flows • wireless-wired – Wireless to wired flows • wireless-wireless – Wireless to wireless flows dst <PORT> <1-65535> Matches the destination port with the specified port • <PORT> – Specifies the destination port • <1-65535> – Specify the destination port number from 1 - 65535. ether Displays Ethernet filter options [dst <MAC>|host <MAC>| • dst <MAC> – Matches the destination MAC address src|vlan] • host <MAC> – Matches flows containing the specified MAC address • src <MAC> – Matches only the source MAC address • vlan <1-4094> – Matches the VLAN number of the traffic with the specified value. Specify a value from 1- 4094. flow-type Matches the traffic flow type [bridged|natted|routed| • bridged – Bridged flows wired|wireless] • natted – Natted flows • routed – Routed flows • wired – Flows belonging to wired hosts • wireless – Flows containing a mobile unit
  • 462. 6 - 42 WiNG CLI Reference Guide icmp {code|type} Matches flows with the specified Internet Control Message Protocol (ICMP) code and type • code – Matches flows with the specified ICMP code • type – Matches flows with the specified ICMP type igmp Matches Internet Group Management Protocol (IGMP) flows ip [dst <IPv4>|host Filters firewall flows based on the IPv4 parameters passed <IPv4>|proto <0-254>| • dst <IPv4> – Matches destination IP address src <IPv4>] • host <IPv4> – Matches flows containing IPv4 address • proto <0-254> – Matches the IPv4 protocol • src <IPv4> – Matches source IP address max-idle Filters firewall flows idle for at least the specified duration. Specify a max-idle value from 1 - 4294967295 bytes. min-bytes Filters firewall flows seen at least the specified number of bytes. Specify a min-bytes value from 1 - 4294967295 bytes. min-idle Filters firewall flows idle for at least the specified duration. Specify a min-idle value from 1 - 4294967295 bytes. min-pkts Filters firewall flows with at least the given number of packets. Specify a min-bytes value from 1 - 4294967295 bytes. not Negates the filter expression selected port <1-65535> Matches either the source or destination port. Specify a port from 1 - 65535. src <1-65535> Matches the source port with the specified port. Specify a port from 1 - 65535. tcp Matches TCP flows udp Matches UDP flows
  • 463. SHOW COMMANDS 6 - 43 Examples rfs7000-37FABE(config)#show firewall dhcp snoop-table on rfs7000-37FABE Snoop Binding <157.235.208.252, 00-15-70-37-FA-BE, Vlan 4> Type Controller-SVI, Touched 32 seconds ago -------------------------------------------------------------------------- Snoop Binding <172.16.10.2, 00-15-70-37-FA-BE, Vlan 1> Type Controller-SVI, Touched 1 seconds ago -------------------------------------------------------------------------- rfs7000-37FABE(config)# rfs7000-37FABE(config)#show firewall flows management on rfs7000-37FABE ========== Flow# 1 Summary ========== Forward: Vlan 1, TCP 172.16.10.10 port 3995 > 172.16.10.1 port 22 00-02-B3-28-D1-55 > 00-15-70-37-FA-BE, ingress port ge1 Egress port: <local>, Egress interface: vlan1, Next hop: <local> (00-15-70-37-FA-BE) 573 packets, 49202 bytes, last packet 0 seconds ago Reverse: Vlan 1, TCP 172.16.10.1 port 22 > 172.16.10.10 port 3995 00-15-70-37-FA-BE > 00-02-B3-28-D1-55, ingress port local Egress port: ge1, Egress interface: vlan1, Next hop: 172.16.10.10 (00-02-B3-28-D1-55) 552 packets, 63541 bytes, last packet 0 seconds ago TCP state: Established Flow times out in 1 hour 30 minutes rfs7000-37FABE(config)# rfs7000-37FABE(config)#show firewall flows stats on rfs7000-37FABE Active Flows 2 TCP flows 1 UDP flows 0 DHCP flows 1 ICMP flows 0 IPsec flows 0 L3/Unknown flows 0 rfs7000-37FABE(config)#
  • 464. 6 - 44 WiNG CLI Reference Guide 6.1.21 interface show commands Displays wireless controller interface status Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show interfaces {<INTERFACE>|brief|counters|ge <1-4>|me1|on| port-channel {<1-2>|switchport|vlan <1-4094>} {on <DEVICE-NAME>} Parameters • show interfaces {<INTERFACE>|brief|counters|ge <1-4>|me1|on| port-cahnnel <1-2>|switchport|vlan <1-4094>} {on <DEVICE-NAME>} interfaces Displays wireless controller interface status based on the parameters passed <INTERFACE> Displays status of the interface specified by the <INTERFACE> parameter. Specify the {on <DEVICE-NAME>} interface name. • on <DEVICE-NAME> – Optional. Displays interface status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. brief Displays a brief summary of the interface status and configuration {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays a brief summary on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. counters Displays interface Tx or Rx counters {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays interface Tx or Rx counters on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. ge <1-4> Displays Gigabit Ethernet interface status and configuration • <1-4> – Select the Gigabit Ethernet interface index from 1 - 4. me1 Displays Fast Ethernet interface status and configuration {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays Fast Ethernet interface status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 465. SHOW COMMANDS 6 - 45 on <DEVICE-NAME> Displays interface status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. port-channel <1-2> Displays port channel interface status and configuration • <1-2> – Specify the port channel index from 1 - 2. switch port Displays layer 2 interface status {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays interface status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. vlan <1-4094> Displays VLAN interface status and configuration {on <DEVICE-NAME>} • <1-4094> – Specify the Switch Virtual Interface (SVI) VLAN ID from 1 - 4094. • on <DEVICE-NAME> – Optional. Displays interface status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE(config)#show interface switchport on rfs7000-37FABEE -------------------------------------------------------------------------- INTERFACE STATUS MODE VLAN(S) -------------------------------------------------------------------------- ge1 UP access 1 ge2 DOWN access 1 ge3 UP access 1 ge4 DOWN access 1 -------------------------------------------------------------------------- A '*' next to the VLAN ID indicates the native vlan for that trunk port rfs7000-37FABE(config)# rfs7000-37FABE(config)#show interface vlan 1 Interface vlan1 is UP Hardware-type: vlan, Mode: Layer 3, Address: 00-15-70-37-FA-BE Index: 4, Metric: 1, MTU: 1500 IP-Address: 172.16.10.1/24 input packets 587971, bytes 58545041, dropped 0, multicast packets 0 input errors 0, length 0, overrun 0, CRC 0, frame 0, fifo 0, missed 0 output packets 56223, bytes 4995566, dropped 0 output errors 0, aborted 0, carrier 0, fifo 0, heartbeat 0, window 0 collisions 0 rfs7000-37FABE(config)# rfs7000-37FABE(config)#show interface ge 2 on rfs7000-37FABE Interface ge2 is DOWN Hardware-type: ethernet, Mode: Layer 2, Address: 00-15-70-37-FA-C0 Index: 2002, Metric: 1, MTU: 1500 Speed: Admin Auto, Operational n/a, Maximum 1G Duplex: Admin Auto, Operational n/a Active-medium: n/a Switchport settings: access, access-vlan: 1 Input packets 0, bytes 0, dropped 0 Received 0 unicasts, 0 broadcasts, 0 multicasts Input errors 0, runts 0, giants 0 CRC 0, frame 0, fragment 0, jabber 0 Output packets 501587, bytes 60935912, dropped 0 Sent 3 unicasts, 4613 broadcasts, 496971 multicasts Output errors 0, collisions 0, late collisions 0 Excessive collisions 0 rfs7000-37FABE(config)#
  • 466. 6 - 46 WiNG CLI Reference Guide rfs7000-37FABE(config)#show interface counters -------------------------------------------------------------------------- # MAC RX-PKTS RX-BYTES RX-DROP TX-PKTS TX- BYTES TX-DROP -------------------------------------------------------------------------- me1 00-...-F7 0 0 0 0 0 0 vlan1 00-...-BE 588384 58580154 0 56435 5013682 0 ge1 00-...-BF 1906950 175560930 0 1402226 589235764 0 ge2 00-...-C0 0 0 0 501615 60939303 0 ge3 00-...-C1 1354163 581149840 0 1877890 175646105 0 ge4 00-...-C2 0 0 0 501615 60939303 0 -------------------------------------------------------------------------- rfs7000-37FABE(config)#
  • 467. SHOW COMMANDS 6 - 47 6.1.22 ip show commands Displays IP related information Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show ip [arp|ddns|dhcp|dhcp-vendor-options|domain-name|igmp|interface| name-server|nat|route|routing] show ip arp {<VLAN-NAME> {on <DEVICE-NAME>}|on <DEVICE-NAME>} show ip ddns bindings {on <DEVICE-NAME>} show ip dhcp [binding|networks|status] show ip dhcp [networks|status] {on <DEVICE-NAME>}] show ip dhcp binding {manual <DEVICE-NAME>|on <DEVICE-NAME>} show ip [dhcp-vendor-options|domain-name|name-server|routing] {on <DEVICE- NAME>} show ip igmp snooping [mrouter|vlan] show ip igmp snooping mrouter vlan <1-4095> {on <DEVICE-NAME>} show ip igmp snooping vlan <1-4095> {<IP> {on <DEVICE-NAME>}| on <DEVICE-NAME>} show ip interface {<INTERFACE> {on <DEVICE-NAME>}|brief {on <DEVICE-NAME>}| on <DEVICE-NAME>} show ip nat translations verbose {on <DEVICE-NAME>} show ip route {<INTERFACE>|ge <1-4>|me1|port-channel <1-2>|vlan <1-4094>} {on <DEVICE-NAME>} show ip route {on <DEVICE-NAME>} Parameters • show ip arp {<VLAN-NAME> {on <DEVICE-NAME>}|on <DEVICE-NAME>} ip arp Displays Address Resolution Protocol (ARP) configuration details <VLAN-NAME> Optional. Displays ARP configuration on a specified VLAN. Specify the VLAN name. {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays VLAN ARP configuration on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Displays VLAN ARP configuration details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 468. 6 - 48 WiNG CLI Reference Guide • show ip ddns bindings {on <DEVICE-NAME>} ip ddns Displays Dynamic Domain Name Server (DDNS) configuration details bindings Displays DDNS address bindings {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays address bindings on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show ip dhcp [networks|status] {on <DEVICE-NAME>} ip dhcp Displays the DHCP server configuration details networks Displays the DHCP server network details {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays server network details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. status {on <DEVICE- Displays the DHCP server status NAME>} • on <DEVICE-NAME> – Optional. Displays server status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show ip dhcp binding {manual {on <DEVICE-NAME>}|on <DEVICE-NAME>} ip dhcp Displays the DHCP server configuration details bindings Displays DHCP address bindings manual {on <DEVICE- Displays static DHCP address bindings NAME>} • on <DEVICE-NAME> – Optional. Displays address bindings on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Displays DHCP address bindings on a specified device • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller. • show ip [dhcp-vendor-options|domain-name|name-server|routing] {on <DEVICE-NAME>} ip dhcp-vendor-options Displays DHCP 43 parameters received from the DHCP server {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays DHCP 43 parameters received from a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. ip domain-name Displays DNS default domain {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays the default domain on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. ip name-server Display the DNS name server details {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays server details on a specified device • <DEVICE-NAME> – Specify the name of the AP or the wireless controller. ip routing Displays the routing status {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays routing details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 469. SHOW COMMANDS 6 - 49 • show ip igmp snooping mrouter vlan <1-4095> {on <DEVICE-NAME>} ip igmp Displays IGMP configuration details snooping Displays IGMP snooping configuration details mrouter vlan <1-4095> Displays VALN IGMP snooping mrouter configuration {on <DEVICE-NAME>} • <1-4095> – Specify the VLAN ID from 1 - 4095. • on <DEVICE-NAME> – Optional. Displays details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show ip igmp snooping vlan <1-4095> {<IP> {on <DEVICE-NAME>}|on <DEVICE-NAME>} ip igmp Displays IGMP configuration details snooping Displays IGMP snooping configuration details vlan <1-4095> Displays VLAN IGMP snooping configuration • <1-4095> – Specify the VLAN ID from 1 - 4095. <IP> {on <DEVICE-NAME>} Optional. Specify the multicast group IP address. • on <DEVICE-NAME> – Optional. Displays configuration details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show ip interface {<INTERFACE> {on <DEVICE-NAME>}|brief {on <DEVICE-NAME>}} ip interface Displays administrative and operational status of all layer 3 interfaces or a specified layer 3 interface <INTERFACE> Displays a specified interface status. Specify the interface name. {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays interface status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. brief Displays a brief summary of interface status and configuration • on <DEVICE-NAME> – Optional. Displays a brief summary on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show ip nat translations verbose {on <DEVICE-NAME>} ip nat translations Displays Network Address Translation (NAT) translations verbose Displays detailed NAT translations • on <DEVICE-NAME> – Optional.Displays NAT translations on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show ip route {<INTERFACE>|ge <1-4>|me1|port-channel <1-2>|vlan <1-4095>} {on <DEVICE-NAME>} ip route Displays route table details <INTERFACE> Displays route table details for a specified interface {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays route table details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 470. 6 - 50 WiNG CLI Reference Guide ge <1-4> Displays GigabitEthernet interface route table details {on <DEVICE-NAME>} • <1-4> – Specify the GigabitEthernet interface index from 1 - 4. • on <DEVICE-NAME> – Optional. Displays route table details on a specified de- vice • <DEVICE-NAME> – Specify the name of the AP or wireless controller. me1 {on <DEVICE-NAME>} Displays FastEthernet interface route table details • on <DEVICE-NAME> – Optional. Displays route table details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. port-channel <1-2> Displays port channel interface route table details {on <DEVICE-NAME>} • on <DEVICE_NAME> – Optional. Displays route table details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. vlan <1-4095> Displays VLAN interface route table details {on <DEVICE-NAME>} • on <DEVICE_NAME> – Optional. Displays route table details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE(config)#show ip arp test on rfs7000-37FABEE +--------------------+-------------------------+---------------+---------- | IP | MAC | INTERFACE | TYPE | +--------------------+-------------------------+---------------+---------- | 172.16.10.11 | 00-50-DA-95-11-13 | vlan1 | dynamic | | 172.16.10.10 | 00-02-B3-28-D1-55 | vlan1 | dynamic | +--------------------+-------------------------+---------------+---------- rfs7000-37FABE(config)# rfs7000-37FABE(config)#show ip interface brief on rfs7000-37FABE +-----------------+----------------------------+--------------+----------- | INTERFACE | IP-ADDRESS/MASK | STATUS | PROTOCOL | +-----------------+----------------------------+--------------+----------- | me1 | unassigned | DOWN | down | | vlan44 | unassigned | UP | up | | vlan1 | 172.16.10.2/24 | UP | up | | vlan4 | 157.235.208.252/24 | UP | up | +-----------------+----------------------------+--------------+----------- rfs7000-37FABE(config)# rfs7000-37FABE(config)#show ip nat translations verbose on rfs7000-37FABE PROTO ACTUAL SOURCE ACTUAL DESTINATION NATTED SOURCE NATTED DESTINATION -------------------------------------------------------------------------- rfs7000-37FABE(config)# rfs7000-37FABE(config)#show ip route test on rfs7000-37FABE +-------------------------+--------------------+------------+------------- | DESTINATION | GATEWAY | FLAGS | INTERFACE | +-------------------------+--------------------+------------+------------- | 157.235.208.0/24 | direct | C | vlan4 | | 172.16.10.0/24 | direct | C | vlan1 | | default | 172.16.10.9 | CG | vlan1 | +-------------------------+--------------------+------------+------------- Flags: C - Connected G - Gateway rfs7000-37FABE(config)# rfs7000-37FABE(config)#show ip route pc 2 +-------------------------+--------------------+------------+------------- | DESTINATION | GATEWAY | FLAGS | INTERFACE | +-------------------------+--------------------+------------+------------- | 157.235.208.0/24 | direct | C | vlan4 |
  • 471. SHOW COMMANDS 6 - 51 | 172.16.10.0/24 | direct | C | vlan1 | | default | 172.16.10.9 | CG | vlan1 | +-------------------------+--------------------+------------+------------- Flags: C - Connected G - Gateway rfs7000-37FABEconfig)# rfs7000-37FABE(config)#show ip route vlan 1 on rfs7000-37FABE +------------------------+---------------------+-------------+------------ | DESTINATION | GATEWAY | FLAGS | INTERFACE | +------------------------+---------------------+-------------+------------ | 172.16.10.0/24 | direct | C | vlan1 | | default | 172.16.10.9 | CG | vlan1 | +------------------------+---------------------+-------------+------------ Flags: C - Connected G - Gateway rfs7000-37FABE(config)# rfs7000-37FABE(config)#show ip route ge 1 on rfs7000-37FABE------------------------- ------------------------------------------------- DESTINATION GATEWAY FLAGS INTERFACE -------------------------------------------------------------------------- 172.16.12.0/24 direct C vlan3 172.16.11.0/24 direct C vlan2 172.16.10.0/24 direct C vlan1 -------------------------------------------------------------------------- Flags: C - Connected G - Gateway rfs7000-37FABE(config)# rfs7000-37FABE(config)#show ip routing on rfs7000-37FABE IP routing is enabled. rfs7000-37FABE(config)# rfs7000-37FABE(config)#show ip dhcp status on rfs7000-37FABE State of DHCP server: running Interfaces: vlan2, vlan3 rfs7000-37FABE(config)#
  • 472. 6 - 52 WiNG CLI Reference Guide 6.1.23 ip-access-list-stats show commands Displays IP access list statistics NOTE: This command is not available in the USER EXEC Mode Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show ip-access-list-stats {<IP-ACCESS-LIST> {on <DEVICE-NAME>}|on <DEVICE- NAME>} Parameters • show ip-access-list-stats {<IP-ACCESS-LIST> {on <DEVICE-NAME>}| on <DEVICE-NAME>} ip-access-list-stats Displays IP access list statistics <IP-ACCESS-LIST> Displays statistics for a specified IP access list {on <DEVICE-NAME>} • <IP-ACCESS-LIST> – Optional. Specify the IP access list name. • on <DEVICE-NAME> – Optional. Displays statistics on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Displays all IP access list statistics on a specified device • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller. Examples rfs7000-37FABE(config)#show ip-access-list-stats IP Access-list: # Restrict Management ACL # permit tcp any any eq ftp rule-precedence 1 Hitcount: 0 permit tcp any any eq www rule-precedence 2 Hitcount: 41 permit tcp any any eq ssh rule-precedence 3 Hitcount: 448 permit tcp any any eq https rule-precedence 4 Hitcount: 0 permit udp any any eq snmp rule-precedence 5 Hitcount: 0 permit tcp any any eq telnet rule-precedence 6 Hitcount: 4
  • 473. SHOW COMMANDS 6 - 53 6.1.24 licenses show commands Displays installed licenses and usage information Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show licenses Parameters None Examples rfs7000-37FABE(config)#show licenses Serial Number : 6268529900014 Device Licenses: AP-LICENSE String : 8088bb045018988b85bcd575d0ab7dbc802885bcc680a96194dfbeedc28d4117058eb53bd8b Value : 50 Used : 0 AAP-LICENSE String : 8088bb045018988bf98ff7127cda1d354bc689885fcc6b625b695384946d4117058eb53bd8b Value : 50 Used : 0 rfs7000-37FABE(config)#
  • 474. 6 - 54 WiNG CLI Reference Guide 6.1.25 lldp show commands Displays Link Layer Discovery Protocol (LLDP) information Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show lldp neighbors {on <DEVICE-NAME>} Parameters • show lldp neighbors {on <DEVICE-NAME>} lldp Displays LLDP neighbor table on <DEVICE-NAME> Optional. Displays LLDP neighbor table on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE(config)#show lldp neighbors rfs7000-37FABE(config)# rfs7000-37FABE(config)#show lldp neighbors on rfs7000-37FABE rfs7000-37FABE(config)#
  • 475. SHOW COMMANDS 6 - 55 6.1.26 logging show commands Displays network activity log Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show logging {on <DEVICE-NAME>} Parameters • show logging {on <DEVICE-NAME>} logging Displays logging information on a specified device {on <DEVICE-NAME>} • <DEVICE-NAME> – Optional. Specify the name of the AP or wireless controller. Examples rfs7000-37FABE(config)#show logging on rfs7000-37FABE Logging module: enabled Aggregation time: disabled Console logging: level warnings Monitor logging: disabled Buffered logging: level warnings Syslog logging: level warnings Facility: local7 Log Buffer (2294 bytes): Jul 08 16:44:26 2011: %CERTMGR-4-CERT_EXPIRY: server certificate for trustpoint mint_security_trustpoint has expired Jul 08 16:44:26 2011: %CERTMGR-4-CERT_EXPIRY: ca certificate for trustpoint mint_security_trustpoint has expired Jul 08 15:44:26 2011: %CERTMGR-4-CERT_EXPIRY: server certificate for trustpoint mint_security_trustpoint has expired Jul 08 15:44:26 2011: %CERTMGR-4-CERT_EXPIRY: ca certificate for trustpoint mint_security_trustpoint has expired Jul 08 14:44:26 2011: %CERTMGR-4-CERT_EXPIRY: server certificate for trustpoint mint_security_trustpoint has expired Jul 08 14:44:26 2011: %CERTMGR-4-CERT_EXPIRY: ca certificate for trustpoint mint-- More-- rfs7000-37FABE(config)#
  • 476. 6 - 56 WiNG CLI Reference Guide 6.1.27 mac-access-list-stats show commands Displays MAC access list statistics NOTE: This command is not present in USER EXEC Mode Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show mac-access-list-stats {<MAC-ACCESS-LIST> {on <DEVICE-NAME>}| on <DEVICE-NAME>} Parameters • show mac-access-list-stats {<MAC-ACCESS-LIST> {on <DEVICE-NAME>}|on <DEVICE-NAME>} mac-access-list-stats Displays MAC access list statistics <MAC-ACCESS-LIST> Displays statistics for a specified MAC access list {on <DEVICE-NAME>} • <MAC-ACCESS-LIST> – Optional. Specify the MAC access list name. • on <DEVICE-NAME> – Optional. Displays statistics on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Displays MAC access list statistics on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE(config)#show mac-access-list-stats on rfs7000-37FABEE rfs7000-37FABE(config)#
  • 477. SHOW COMMANDS 6 - 57 6.1.28 mac-address-table show commands Displays MAC address table entries Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show mac-address-table {on <DEVICE-NAME>} Parameters • show mac-address-table {on <DEVICE-NAME>} mac-address-table Displays MAC address table entries on <DEVICE-NAME> Optional. Displays MAC address table entries on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE(config)#show mac-address-table on rfs7000-37FABE +------------+----------+-----------+-------------------------+----------- | BRIDGE | VLAN | PORT | MAC | STATE | +------------+----------+-----------+-------------------------+----------- | 1 | 1 | ge1 | 00-50-DA-EE-B5-5C | forward | | 1 | 1 | ge1 | 00-A0-F8-00-00-00 | forward | | 1 | 1 | ge1 | 00-02-B3-28-D1-55 | forward | | 1 | 1 | ge1 | 00-A0-F8-68-D5-5D | forward | | 1 | 1 | ge1 | 00-50-DA-95-11-13 | forward | | 1 | 1 | ge1 | 00-15-70-38-06-53 | forward | | 1 | 1 | ge1 | 00-15-70-41-9F-7F | forward | | 1 | 1 | ge1 | 00-15-70-88-9E-C4 | forward | +------------+----------+-----------+-------------------------+----------- rfs7000-37FABE(config)#
  • 478. 6 - 58 WiNG CLI Reference Guide 6.1.29 mint show commands Displays MiNT protocol configuration commands Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show mint [config|dis|id|info|known-adopters|links|lsp|lsp-db|mlcp| neighbors|route|stats|tunneled-vlans] show mint [config|id|info|known-adopters|route|stats|tunneled-vlans] {on <DEVICE-NAME>} show mint [dis|links|neighbors] {details {on <DEVICE-NAME>}| on <DEVICE-NAME>} show mint lsp-db {details <AA.BB.CC.DD> {on <DEVICE-NAME>}|on <DEVICE-NAME> show mint mlcp {history {on <DEVICE-NAME>}|on <DEVICE-NAME>} Parameters • show mint [config|id|info|known-adopters|route|stats|tunneled-vlans] {on <DEVICE-NAME>} mint Displays MiNT protocol information based on the parameters passed config Displays MiNT related configuration details id Displays local MiNT ID known-adopters Displays known, possible, or reachable adopters route Displays MiNT route table details stats Displays MiNT related statistics tunneled-vlans Displays MiNT tunneled VLAN details on <DEVICE-NAME> The following are common to all of the above: • on <DEVICE-NAME> – Optional. Displays MiNT protocol details on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 479. SHOW COMMANDS 6 - 59 • show mint [dis|links|neighbors] {details {on <DEVICE-NAME>}|on <DEVICE-NAME>} mint Displays MiNT protocol information based on the parameters passed dis Displays MiNT network Designated Intermediate Systems (DISes) links Displays MiNT networking link details neighbors Displays adjacent MiNT peer details details The following are common to the dis, links, and neighbors parameters: {on <DEVICE-NAME>}I • details – Optional. Displays detailed MiNT information on <DEVICE-NAME> • on <DEVICE-NAME> – Optional. Displays MiNT information on a specified de- vice • show mint lsp-db {details <AA.BB.CC.DD> {on <DEVICE-NAME>}|on <DEVICE-NAME>} mint Displays MiNT protocol information based on the parameters passed lsp-db Displays MiNT LSP database entries details <AA.BB.CC.DD> Optional. Displays detailed MiNT LSP database entries {on <DEVICE-NAME>} • <AA.BB.CC.DD> – Specify the MiNT address in the <AA.BB.CC.DD> format. • on <DEVICE-NAME> – Optional. Displays MiNT LSP database entries on a spec- ified device • show mint mlcp {history {on <DEVICE-NAME>}|on <DEVICE-NAME>} mint Displays MiNT protocol information based on the parameters passed mlcp Displays MiNT Link Creation Protocol (MLCP) status history {on <DEVICE-NAME>} Optional. Displays MLCP client history • on <DEVICE-NAME> – Optional. Displays MLCP client history on a specified device
  • 480. 6 - 60 WiNG CLI Reference Guide Examples rfs7000-37FABE(config)#show mint stats 0 L1 neighbors L1 LSP DB size 1 LSPs (0 KB) 1 L1 routes Last SPFs took 0s SPF (re)calculated 1 times. levels 1 base priority 180 dis priority 180 rfs7000-37FABE(config)# rfs7000-37FABE(config)#show mint lsp id 70.37.fa.be, level 1, seqnum 18640, 0 adjacencies, 0 extended-vlans, expires in 1145 seconds, republish in 722 seconds, changed True, ext-vlan FDB pri 0, 180 bytes rfs7000-37FABE(config)#show mint lsp-db Level 1 LSPs 70.37.fa.be: seqnum 18640, 0 adjacencies, 0 extended-vlans, expires in 1138 seconds 1 LSPs in level 1 database rfs7000-37FABE(config)#show mint route on rfs7000-37FABE Destination : Next-Hop(s) 70.37.FA.BE : 70.37.FA.BE via self rfs7000-37FABE(config)# rfs7000-37FABE(config)#show mint known-adopters on rfs7000-37FABE 70.37.FA.BE rfs7000-37FABE(config)#
  • 481. SHOW COMMANDS 6 - 61 6.1.30 noc show commands Displays Network Operations Center (NOC) level information Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show noc [client-list|device|domain] show noc device {filter {offline|online|rf-domain {<DOMAIN-NAME>| not <DOMAIN-NAME>]} show noc domain [managers|statistics {details}] Parameters • show noc client-list noc client-list Displays a list of clients at the NOC level • show noc device {filter {offline|online|rf-domain {<DOMAIN-NAME>|not <DOMAIN- NAME>}} noc device filter Displays devices in a network • filter – Optional. Displays network devices Use additional filters to view specific details offline Displays offline devices online Displays online devices rf-domain Displays devices on a specified RF Domain {<DOMAIN-NAME>| • <DOMAIN-NAME> – Optional. Specify the name of the RF Domain. not <DOMAIN-NAME>} • not <DOMAIN-NAME> – Inverts the selection • show noc domain [managers|statistics {details}] noc domain Displays RF Domain information Use this command to view all domain managers and get RF Domain statistics
  • 482. 6 - 62 WiNG CLI Reference Guide managers Lists RF Domains and managers statistics {details} Displays RF Domains statistics • details – Optional. Provides detailed RF Domain statistics Examples rfs7000-37FABE(config)#show noc device +-----------------+----------------+--------+----------------+------------ | MAC| HOST-NAME | TYPE| CLUSTER| RF-DOMAIN |ADOPTED-BY| ONLINE | +-----------------+----------------+--------+----------------+------------ |99-88-77-66-55-44| ap7131-665544| ap7131| | default| | offline | |00-15-70-88-9E-C4| ap7131-889EC4| ap7131| | default| | offline | |11-22-33-44-55-66| ap650-445566| ap650| | default| | offline | |00-15-70-37-FA-BE| rfs7000-37FABE| RFS7000| | default| | online | +-----------------+----------------+--------+----------------+------------ Total number of clients displayed: 4 rfs7000-37FABE(config)# rfs7000-37FABE(config)#show noc domain statistics details ========================================================================== RF-Domain RFDOMAIN_UseCase1 Note: TX = AP->Client, RX = Client->AP -------------------------------------------------------------------------- Data bytes : ( TX + RX = Total ), 0 + 0 = 0 bytes Data throughput : ( TX + RX = Total ), 0 Kbps + 0 Kbps = 0 Kbps Data packets : ( TX + RX = Total ), 0 + 0 = 0 pkts Data pkts/sec : ( TX + RX = Total ), 0 + 0 = 0 pps BCMC Packets : ( TX + RX = Total ), 0 + 0 = 0 pkts Management Packets : ( TX + RX = Total ), 0 + 0 = 0 pkts Packets Discarded : 0 - Tx Dropped, 0 - Rx Errors Indicators : T = 0 @ Max user rate of 0 Kbps Distribution : 0 Clients, 0 radios Client count Detais : 0/0/0 (b/bg/bgn); 0/0 (a/an) Stats Update Info : 6 seconds - update interval, mode is auto Threat Level : 0 Cause of concern : Remedy : Last update : 2010-01-31 10:30:22 by 00-15-70-37-FA-BE -------------------------------------------------------------------------- Total number of RF-domain displayed: 1 rfs7000-37FABE(config-rf-domain-RFDOMAIN_UseCase1)# rfs7000-37FABE(config)#show noc device filter online -------------------------------------------------------------------------- MAC HOST-NAME TYPE CLUSTER RF-DOMAIN ADOPTED-BY ONLINE -------------------------------------------------------------------------- 00-15-70- 37-FA-BE rfs7000-37FABE RFS7000 RFDOMAI..echPubs online --------------------------------------------------------------------------Total number of clients displayed: 1 rfs7000-37FABE(config)# rfs7000-37FABE(config)#show noc domain statistics details ==========================================================================RF-Domain RFDOMAIN_TechPubs Note: TX = AP->Client, RX = Client->AP -------------------------------------------------------------------------- Data bytes : ( TX + RX = Total ), 0 + 0 = 0 bytes Data throughput : ( TX + RX = Total ), 0 Kbps + 0 Kbps = 0 Kbps Data packets : ( TX + RX = Total ), 0 + 0 = 0 pkts Data pkts/sec : ( TX + RX = Total ), 0 + 0 = 0 pps BCMC Packets : ( TX + RX = Total ), 0 + 0 = 0 pkts Management Packets : ( TX + RX = Total ), 0 + 0 = 0 pkts Packets Discarded : 0 - Tx Dropped, 0 - Rx Errors Indicators : T = 0 @ Max user rate of 0 Kbps Distribution : 0 Clients, 0 radios Client count Detais : 0/0/0 (b/bg/bgn); 0/0 (a/an)
  • 483. SHOW COMMANDS 6 - 63 Stats Update Info : 6 seconds - update interval, mode is auto Threat Level : 1 Cause of concern : no sensors enabled in RF-domain RFDOMAIN_TechPubs Remedy : enable AP detection Last update : 2011-01-09 08:44:15 by 00-15-70-37-FA-BE -------------------------------------------------------------------------- Total number of RF-domain displayed: 1 rfs7000-37FABE(config)#
  • 484. 6 - 64 WiNG CLI Reference Guide 6.1.31 ntp show commands Displays Network Time Protocol (NTP) information Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show ntp [associations|status] show ntp [associations {detail|on}|status {on <DEVICE-NAME>} Parameters • show ntp [associations {detail|on}|status {on <DEVICE-NAME>}] ntp associations {detail|on} Displays existing NTP associations • detail – Optional. Displays detailed NTP associations • on <DEVICE-NAME> – Optional. Displays NTP associations on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. ntp status Displays NTP association status {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays NTP association status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE>show ntp associations address ref clock st when poll reach delay offset disp * master (synced), # master (unsynced), + selected, - candidate, ~ configured rfs7000-37FABE> rfs7000-37FABE>show ntp status Clock is synchronized, stratum 0, actual frequency is 0.0000 Hz, precision is 2**0 reference time is 00000000.00000000 (Feb 07 06:28:16 UTC 2036) clock offset is 0.000 msec, root delay is 0.000 msec root dispersion is 0.000 msec rfs7000-37FABE> rfs7000-37FABE>show ntp status Clock is synchronized, stratum 0, actual frequency is 0.0000 Hz, precision is 2^0 reference time is 00000000.00000000 (Feb 07 06:28:16 UTC 2036) clock offset is 0.000 msec, root delay is 0.000 msec root dispersion is 0.000 msec, rfs7000-37FABE>
  • 485. SHOW COMMANDS 6 - 65 6.1.32 password-encryption show commands Displays password encryption status (enabled/disabled) Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show password-encryption status Parameters • show password-encryption status password-encryption status Displays password encryption status (enabled/disabled) Examples rfs7000-37FABE(config)#show password-encryption status Password encryption is disabled rfs7000-37FABE(config)#
  • 486. 6 - 66 WiNG CLI Reference Guide 6.1.33 power show commands Displays Power Over Ethernet (PoE) information Supported in the following platforms: • RFS4000 • RFS6000 Syntax show power [configuration|status] {on <DEVICE-NAME>} Parameters • show power [configuration|status] {on <DEVICE-NAME>} power Displays PoE information (PoE configuration and status) configuration Displays detailed PoE configuration {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays configuration on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. status Displays PoE status {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE(config)#show power status on rfs6000-37FAAA System Voltage: 53.4 volts Guard Band: 32 watts Power Budget: 190 watts Power Consumption: 0 watts poe device 1 temperature 35C poe device 2 temperature 38C -------------------------------------------------------------------------------- PORT VOLTS mA WATTS CLASS STATUS -------------------------------------------------------------------------------- ge1 0.0 0 0.0 0 Off ge2 0.0 0 0.0 0 Off ge3 0.0 0 0.0 0 Off ge4 0.0 0 0.0 0 Off ge5 0.0 0 0.0 0 Off ge6 0.0 0 0.0 0 Off ge7 0.0 0 0.0 0 Off ge8 0.0 0 0.0 0 Off -------------------------------------------------------------------------------- RFS6000-37FAAA(config)#show power configuration -------------------------------------------------------------------------------- PORT PRIORITY POWER LIMIT ENABLED -------------------------------------------------------------------------------- ge1 low 30.0W yes ge2 low 30.0W yes ge3 low 30.0W yes ge4 low 30.0W yes ge5 low 30.0W yes ge6 low 30.0W yes ge7 low 30.0W yes ge8 low 30.0W yes --------------------------------------------------------------------------------
  • 487. SHOW COMMANDS 6 - 67 6.1.34 remote-debug show commands Displays remote debug session information Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show remote-debugging Parameters None Examples rfs7000-37FABE(config)#show remote-debug live-pktcap Not running wireless Not running copy-crashinfo Not running offline-pktcap Not running copy-techsupport Not running more Not running rfs7000-37FABE(config)#
  • 488. 6 - 68 WiNG CLI Reference Guide 6.1.35 rf-domain-manager show commands Displays RF Domain manager selection details Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show rf-domain-manager Parameters None Examples rfs7000-37FABE(config)#show rf-domain-manager RF Domain default RF Domain Manager: ID: 70.37.fa.be Priority: 9 Has IP connectivity Has non-mesh links Last change 12265 seconds ago This device: Priority: 9 Has IP connectivity Has non-mesh links rfs7000-37FABE(config)#
  • 489. SHOW COMMANDS 6 - 69 6.1.36 role show commands Displays role based firewall information Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show role wireless-clients {on <DEVICE-NAME>} Parameters • show role wireless-clients {on <DEVICE-NAME>} role wireless-clients Displays clients associated with roles • on <DEVICE-NAME> – Optional. Displays clients associated with roles on a specified device Examples rfs7000-37FABE(config)#show role wireless-clients on rfs7000-37FABEE No ROLE statistics found. rfs7000-37FABE(config)#
  • 490. 6 - 70 WiNG CLI Reference Guide 6.1.37 running-config show commands Displays configuration files (where all configured MAC and IP access lists are applied to an interface) Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show running-config {aaa-policy|association-acl-policy|auto-provisioning- policy|captive-portal-policy|device|dhcp-server-policy|firewall-policy| include-factory|interface|management-policy|profile|radio-qos-policy| rf-domain|smart-rf-policy|wlan|wlan-qos-policy} show running-config {aaa-policy|association-acl-policy|auto-provisioning- policy|captive-portal-policy|dhcp-server-policy|firewall-policy| management-policy|radio-qos-policy|smart-rf-policy|wlan-qos-policy} <POLICY-NAME> {include-factory}} show running-config {device [<MAC>|self] {include-factory}} show running-config {include-factory} show running-config {interface {<INTERFACE>|ge <1-4>|include-factory| me1|port-channel <1-2>|vlan <1-4095>} {include-factory}} show running-config {profile [ap621|ap650|ap6511|ap6521|ap6532|ap71xx| rfs4000|rfs6000|rfs7000] <PROFILE-NAME> {include-factory}} show running-config {rf-domain <DOMAIN-NAME> {include-factory}} show running-config {wlan <WLAN-NAME> {include-factory}} Parameters • show running-config {aaa-policy|association-acl-policy| auto-provisioning-policy|captive-portal-policy|dhcp-server-policy| firewall-policy|management-policy|radio-qos-policy|smart-rf-policy|wlan-qos-policy} <PLOICY-NAME> {include-factory} running-config Optional. Displays current configuration details aaa-policy Optional. Displays AAA policy configuration details association-acl-policy Optional. Displays association ACL policy configuration details auto-provisioning-policy Optional. Displays auto provisioning policy configuration details captive-portal-policy Optional. Displays captive portal policy configuration details
  • 491. SHOW COMMANDS 6 - 71 dhcp-server-policy Optional. Displays the DHCP server policy configuration details firewall-policy Optional. Displays firewall policy configuration details management-policy Optional. Displays management policy configuration details radio-qos-policy Optional. Displays radio QoS policy configuration details smart-rf-policy Optional. Displays Smart RF policy configuration details wlan-qos-policy Optional. Displays WLAN QoS policy configuration details <POLICY-NAME> The following is common to all policies listed above: • <POLICY-NAME> – Specify the name of the policy. include-factory This parameter is common to all policies listed above. • Optional. Includes factory defaults • show running-config {device [<MAC>|self] {include-factory}} running-config Displays current configuration details device {<MAC>|self} Optional. Displays device configuration details • <MAC> – Optional. Displays configuration of a specified device. Specify the MAC address of the device. • self – Optional. Displays the logged device’s configuration include-factory The following is common to the <MAC> and self parameters: • Optional. Displays factory default values • show running-config {include-factory}} running-config Displays current configuration details include-factory Optional. Includes factory default values • show running-config {interface {<INTERFACE>|ge <1-4>|include-factory|me1|port- channel <1-2>|vlan <1-4095>} {include-factory}} running-config Displays current configuration details interface Optional. Displays interface configuration <INTERFACE> Displays a specified interface configuration. Specify the interface name. ge <1-4> Displays GigabitEthernet interface configuration details • <1-4> – Specify a GigabitEthernet interface index from 1 - 4. me1 Displays FastEthernet interface configuration details port-channel <1-2> Displays port channel interface configuration details • <1-2> – Specify a port channel interface index from 1 - 2.
  • 492. 6 - 72 WiNG CLI Reference Guide vlan <1-4095> Displays VLAN interface configuration details • <1-4095> – Specify the VLAN interface number from 1 - 4095. include-factory This parameter is common to all of the interface options. • Optional. Includes factory defaults • show running-config {profile [ap621|ap650|ap6511|ap6521|ap6532| ap71xx|rfs4000|rfs6000|rfs7000] <PROFILE-NAME> {include-factory}} running-config Displays current configuration profile Optional. Displays current configuration for a specified profile ap621 Displays AP621 profile configuration <PROFILE-NAME> • <PROFILE-NAME> – Displays configuration for a specified AP621 profile. Specify the AP621 profile name. ap650 Displays AP650 profile configuration <PROFILE-NAME> • <PROFILE-NAME> – Displays configuration for a specified AP650 profile. Specify the AP650 profile name. ap6511 Displays AP6511 profile <PROFILE-NAME> • <PROFILE-NAME> – Displays configuration for a specified AP6511 profile. Specify the AP6511 profile name. ap6521 Displays AP6521 profile configuration <PROFILE-NAME> • <PROFILE-NAME> – Displays configuration for a specified AP6521 profile. Specify the AP6521 profile name. ap6532 Displays AP6532 profile configuration <PROFILE-NAME> • <PROFILE-NAME> – Displays configuration for a specified AP6532 profile. Specify the AP6532 profile name. ap71xx <PROFILE-NAME> Displays AP71XX profile configuration • <PROFILE-NAME> – Displays configuration for a specified AP71XX profile. Specify the AP71XX profile name. rfs4000 Displays RFS4000 profile configuration <PROFILE-NAME> • <PROFILE-NAME> – Displays configuration for a specified RFS4000 profile. Specify the RFS4000 profile name. rfs6000 Displays RFS6000 profile configuration <PROFILE-NAME> • <PROFILE-NAME> – Displays configuration for a specified RFS6000 profile. Specify the RFS6000 profile name. rfs7000 Displays RFS7000 profile configuration <PROFILE-NAME> • <PROFILE-NAME> – Displays configuration for a specified RFS6000 profile. Specify the RFS6000 profile name. include-factory Optional.This parameter is common to all profiles. It includes factory defaults
  • 493. SHOW COMMANDS 6 - 73 • show running-config {rf-domain <DOMAIN-NAME> {include-factory}} running-config Displays current configuration rf-domain Optional. Displays current configuration for a RF Domain <DOMAIN-NAME> Specify the name of the RF Domain. include-factory Optional. Includes factory defaults • show running-config {wlan <WLAN-NAME> {include-factory}} running-config Displays current configuration wlan Optional. Displays current configuration for a WLAN <DOMAIN-NAME> Displays current configuration for a specified WLAN. Specify the name of the WLAN. include-factory Optional. Includes factory defaults Examples rfs7000-37FABE(config)#show running-config device self ! firewall ratelimit-trust policy default ! management-policy default telnet http server ssh ! firewall-policy default ! mint-security-policy the_policy rejoin-timeout 35 ! device-discover-policy default ! RFS7000 00-15-70-37-FA-BE hostname rfs7000-37FABE no country-code bridge vlan 3 bridge vlan 5 ip dhcp trust ip igmp snooping querier version 2 ip igmp snooping querier max-response-time 3 ip igmp snooping querier timer expiry 89 wep-shared-key-auth radius nas-identifier test --More-- rfs7000-37FABE(config) rfs7000-37FABE(config)#show running-config device 11-22-33-44-55-66 include-factory ! radio-qos-policy default wmm best-effort aifsn 3 wmm video txop-limit 94 wmm video aifsn 1 wmm video cw-min 3 wmm video cw-max 4 wmm voice txop-limit 47 wmm voice aifsn 1 wmm voice cw-min 2 --More--
  • 494. 6 - 74 WiNG CLI Reference Guide 6.1.38 session-changes show commands Displays configuration changes made in the current session Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show session-changes Parameters None Examples rfs7000-37FABE(config)#show session-changes No changes in this session rfs7000-37FABE(config)#
  • 495. SHOW COMMANDS 6 - 75 6.1.39 session-config show commands Lists active open sessions on a device Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show session-config {include-factory} Parameters • show session-config {include-factory} session-config Displays current session configuration include-factory • include-factory – Optional. Includes factory defaults Examples rfs7000-37FABE(config)#show session-config ! ! Configuration of RFS7000 version 5.2.2.0-048B ! ! version 2.1 ! ! ip access-list BROADCAST-MULTICAST-CONTROL permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic" permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP replies" deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny windows netbios" deny ip any 224.0.0.0/4 rule-precedence 21 rule-description "deny IP multicast" deny ip any host 255.255.255.255 rule-precedence 22 rule-description "deny IP local broadcast" permit ip any any rule-precedence 100 rule-description "permit all IP traffic" ! mac access-list PERMIT-ARP-AND-IPv4 permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic" permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic" --More-- rfs7000-37FABE(config)#
  • 496. 6 - 76 WiNG CLI Reference Guide 6.1.40 sessions show commands Displays CLI sessions initiated on a device Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show sessions {on <DEVICE-NAME>} Parameters • show sessions {on <DEVICE-NAME>} sessions Displays CLI sessions initiated on a device on <DEVICE-NAME> Optional. Displays CLI sessions on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE(config)#show sessions on rfs7000-37FABE INDEX COOKIE NAME START TIME FROM 1 4 snmp 2011-06-23 07:59:25 127.0.0.1 2 14 admin 2011-06-24 08:12:44 Console 3 15 admin 2011-06-24 08:42:26 172.16.10.10 rfs7000-37FABE(config)#
  • 497. SHOW COMMANDS 6 - 77 6.1.41 smart-rf show commands Displays Smart RF management commands Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show smart-rf [calibration-status|channel-distribution|history|history-timeline| interactive-calibration-config|radio] show smart-rf [calibration-status|channel-distribution|history|history-timeline| interactive-calibration-config] {on <DOMAIN-NAME>}] show smart-rf radio {<MAC>|activity|all-11an|all-11bgn|energy|neighbors|on <DOMAIN- NAME>] show smart-rf radio {<MAC>|all-11an|all-11bgn|energy <MAC>} {on <DOMAIN-NAME>} show smart-rf radio {activity|neigbors}{<MAC>|all-11an|all-11bgn|on <DOMAIN-NAME>} show smart-rf radio {activity|neigbors}{<MAC>|all-11an|all-11bgn} {on <DOMAIN- NAME>} Parameters • show [calibration-status|channel-distribution|history|history-timeline| interactive-calibration-config] {on <DOMAIN-NAME>} calibration-status Displays Smart RF calibration status {on <DOMAIN-NAME>} • on <DOMAIN-NAME> – Optional. Displays Smart RF calibration status on a specified RF Domain • <DOMAIN-NAME> – Specify the RF Domain name. channel-distribution Displays Smart RF channel distribution {on <DOMAIN-NAME>} • on <DOMAIN-NAME> – Optional. Displays Smart RF channel distribution on a specified RF Domain • <DOMAIN-NAME> – Specify the RF Domain name. history Displays Smart RF calibration history {on <DOMAIN-NAME>} • on <DOMAIN NAME> – Optional. Displays Smart RF calibration history on a specified RF Domain • <DOMAIN NAME> – Specify the RF Domain name.
  • 498. 6 - 78 WiNG CLI Reference Guide history-timeline Displays extended Smart RF calibration history on an hourly or daily timeline {on <DOMAIN-NAME>} • on <DOMAIN-NAME> – Optional. Displays extended timeline on a specified RF Domain • <DOMAIN NAME> – Specify the RF Domain name. interactive-calibration-config Displays simulated calibration configuration {on <DOMAIN-NAME>} • on <DOMAIN-NAME> – Optional. Displays configuration on a specified RF Domain • on <DOMAIN-NAME> – Specify the RF Domain name. • show smart-rf radio {<MAC>|all-11an|all-11bgn|energy <MAC>}{on <DOMAIN-NAME>} radio Displays radio related commands <MAC> Optional. Displays details of a specified radio. Specify the MAC address of the radio in a <AA-BB-CC-DD-EE-FF> format. all-11an Optional. Displays all 11a radios currently in the configuration all-11bgn Optional. Displays all 11bg radios currently in the configuration energy {<MAC>} Optional. Displays radio energy Specify the MAC address of the radio • <MAC> – Optional. Specify the radio’s MAC address in the <AA-BB-CC-DD-EE-FF> format. on <DOMAIN-NAME> The following is common to above parameters: • on <DOMAIN-NAME> – Optional. Displays radio details on a specified RF Domain • <DOMAIN-NAME> – Specify the RF Domain name. • show smart-rf radio {activity|neighbors} {<MAC>|all-11an|all-11bgn} {on <DOMAIN- NAME>} radio Displays radio related commands activity Optional. Displays changes related to radio power, number of radio channels, or coverage holes. Use additional filters to view specific details. <MAC> Optional. Displays radio activity for a specified radio • <MAC> – Specify the MAC address of the radio. all-11an Optional. Displays radio activity of all 11a radios in the configuration all-11bgn Optional.Displays radio activity of all 11bg radios in the configuration on <DOMAIN-NAME> Optional. Displays radio activity of all radios within a specified RF Domain • <DOMAIN-NAME> – Specify the RF Domain name.
  • 499. SHOW COMMANDS 6 - 79 Examples rfs7000-37FABE(config)#show smart-rf calibration-status No calibration currently in progress rfs7000-37FABE(config)# rfs7000-37FABE(config)#show smart-rf history rfs7000-37FABE(config)#
  • 500. 6 - 80 WiNG CLI Reference Guide 6.1.42 spanning-tree show commands Displays spanning tree information Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show spanning-tree mst {configuration|detail|instance|on} show spanning-tree mst {configuration {(on <DEVICE-NAME>)}} show spanning-tree mst {detail interface {<INTERFACE>|ge<1-4>|me1| port-channel<1-2>|vlan <1-4094>} {(on <DEVICE-NAME>)}} show spanning-tree mst {instance <1-15> {interface <INTERFACE>} {(on <DEVICE-NAME>)}} Parameters • show spanning-tree mst {configuration {(on <DEVICE-NAME>)}} spanning-tree Displays spanning tree information mst Displays Multiple Spanning Tree (MST) configuration configuration Optional. Displays MST configuration {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays MST configuration on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show spanning-tree mst {detail interface {<Interfaced <1-4>|me1| port-channel <1-2>|vlan <1-4094>} {(on <DEVICE-NAME>)}} spanning-tree Displays spanning tree information mst Displays MST configuration detail Optional. Displays detailed MST configuration based on the parameters passed
  • 501. SHOW COMMANDS 6 - 81 interface [<INTERFACE>| Displays detailed MST configuration for a specified interface age <1-4>|me1| • <INTERFACE> – Displays detailed MST configuration for a specified interface. Specify port-channel <1-2>| the interface name. van <1-4094>] • age <1-4> – Displays GigabitEthernet interface MST configuration • <1-4> – Select the GigabitEthernet interface index from 1 - 4. • me1 – Displays FastEthernet interface MST configuration • port-channel – Displays port channel interface MST configuration • <1-2> – Select the port channel interface index from 1 - 2. • vlan – Displays VLAN interface MST configuration • <1-4094> – Select the SVI VLAN ID from 1 - 4094. on <DEVICE-NAME> Optional. Displays detailed MST configuration on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show spanning-tree mst {instance <1-15> {interface <INTERFACE>} {(on <DEVICE- NAME>)}} spanning-tree Displays spanning tree information mst Displays MST configuration. Use additional filters to view specific details. instance <1-15> Optional. Displays information for a particular MST instance • <1-15> – Specify the instance ID from 1 - 15. interface [<INTERFACE>| Optional. Displays MST configuration for a specific interface instance. The options are: ge <1-4>|me1| • <INTERFACE> – Displays MST configuration for a specified interface. Specify the port-channel <1-2>| interface name. vlan <1-4094>] • ge – Displays GigabitEthernet interface MST configuration • <1-4> – Select the GigabitEthernet interface index from 1 - 4. • me1 – Displays FastEthernet interface MST configuration • port-channel – Displays port channel interface MST configuration • <1-2> – Select the port channel interface index from 1 - 2. • vlan – Displays VLAN interface MST configuration • <1-4094> – Select the SVI VLAN ID from 1 - 4094. on <DEVICE-NAME> Optional. Displays MST configuration on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 502. 6 - 82 WiNG CLI Reference Guide Examples rfs7000-37FABE(config)#show spanning-tree mst configuration on rfs7000-37FABE %% % MSTP Configuration Information for bridge 1 : %%------------------------------------------------------ % Format Id : 0 % Name : My Name % Revision Level : 0 % Digest : 0xac36177f50283cd4b83821d8ab26de62 %%------------------------------------------------------ rfs7000-37FABE(config)# rfs7000-37FABE(config)#show spanning-tree mst detail interface test on rfs7000-37FABE % Bridge up - Spanning Tree Disabled % CIST Root Path Cost 0 - CIST Root Port 0 - CIST Bridge Priority 32768 % Forward Delay 15 - Hello Time 2 - Max Age 20 - Max hops 20 % 1: CIST Root Id 800000157037fabf % 1: CIST Reg Root Id 800000157037fabf % 1: CIST Bridge Id 800000157037fabf % portfast bpdu-filter disabled % portfast bpdu-guard disabled % portfast portfast errdisable timeout disabled % portfast errdisable timeout interval 300 sec % cisco interoperability not configured - Current cisco interoperability off rfs7000-37FABE(config)# rfs7000-37FABE(config)#show spanning-tree mst detail % Bridge up - Spanning Tree Disabled % CIST Root Path Cost 0 - CIST Root Port 0 - CIST Bridge Priority 32768 % Forward Delay 15 - Hello Time 2 - Max Age 20 - Max hops 20 % 1: CIST Root Id 800000157037fabf % 1: CIST Reg Root Id 800000157037fabf % 1: CIST Bridge Id 800000157037fabf % 1: portfast bpdu-guard disabled % portfast portfast errdisable timeout disabled % portfast errdisable timeout interval 300 sec % cisco interoperability not configured - Current cisco interoperability off % ge4: Port 2004 - Id 87d4 - Role Disabled - State Forwarding % ge4: Designated External Path Cost 0 - Internal Path Cost 0 % ge4: Configured Path Cost 11520 - Add type Implicit - ref count 1 % ge4: Designated Port Id 0 - CST Priority 128 % ge4: ge4: CIST Root 0000000000000000 % ge4: ge4: Regional Root 0000000000000000 % ge4: ge4: Designated Bridge 0000000000000000 % ge4: Message Age 0 - Max Age 0 % ge4: CIST Hello Time 0 - Forward Delay 0 % ge4: CIST Forward Timer 0 - Msg Age Timer 0 - Hello Timer 0 % ge4: Version Multiple Spanning Tree Protocol - Received None - Send MSTP % ge4: Portfast configured - Current portfast on % ge4: portfast bpdu-guard enabled - Current portfast bpdu-guard off % ge4: portfast bpdu-filter enabled - Current portfast bpdu-filter off % ge4: no root guard configured - Current root guard off % ge4: Configured Link Type point-to-point - Current point-to-point % ge3: Port 2003 - Id 87d3 - Role Disabled - State Forwarding % ge3: Designated External Path Cost 0 - Internal Path Cost 0 % ge3: Configured Path Cost 11520 - Add type Implicit - ref count 1 % ge3: Designated Port Id 0 - CST Priority 128 --More-- rfs7000-37FABE(config)# rfs7000-37FABE(config)#show spanning-tree mst instance 1 interface test on rfs7000- 37FABE rfs7000-37FABE(config)#
  • 503. SHOW COMMANDS 6 - 83 6.1.43 startup-config show commands Displays complete startup configuration script Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show startup-config {include-factory} Parameters • show startup-config {include-factory} startup-config Displays startup configuration script include-factory • include-factory – Optional. Includes factory defaults Examples rrfs7000-37FABE(config)#show startup-config include-factory ! ! Configuration of RFS7000 version 5.2.2.0-048B ! ! version 2.1 ! ! ip access-list BROADCAST-MULTICAST-CONTROL permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic" permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP replies" deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny windows netbios" deny ip any 224.0.0.0/4 rule-precedence 21 rule-description "deny IP multicast" deny ip any host 255.255.255.255 rule-precedence 22 rule-description "deny IP local broadcast" permit ip any any rule-precedence 100 rule-description "permit all IP traffic" ! mac access-list PERMIT-ARP-AND-IPv4 permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic" permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic" --More-- rfs7000-37FABE(config)#
  • 504. 6 - 84 WiNG CLI Reference Guide 6.1.44 terminal show commands Displays terminal configuration parameters Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show terminal Parameters None Examples rfs7000-37FABE(config)#show terminal Terminal Type: xterm Length: 45 Width: 126 rfs7000-37FABE(config)#
  • 505. SHOW COMMANDS 6 - 85 6.1.45 timezone show commands Displays a device’s timezone Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show timezone Parameters • show timezone timezone Displays timezone where the AP or wireless controller is deployed Examples rfs7000-37FABE(config)#show timezone Timezone is America/Los_Angeles
  • 506. 6 - 86 WiNG CLI Reference Guide 6.1.46 upgrade-status show commands Displays the last image upgrade status NOTE: This command is not available in the USER EXEC Mode Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show upgrade-status {detail {on <DEVICE-NAME>}|on <DEVICE-NAME>} Parameters • show upgrade-status {detail {on <DEVICE-NAME>}|on <DEVICE-NAME>} detail Displays last image upgrade log {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays last image upgrade log on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. on <DEVICE-NAME> Optional. Displays last image upgrade status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller.
  • 507. SHOW COMMANDS 6 - 87 Examples rfs7000-37FABE(config)#show upgrade-status detail on rfs7000-37FABEE Last Image Upgrade Status : Successful Last Image Upgrade Time : 2011-06-15 08:51:17 UTC rfs7000-37FABE(config)# -------------------------------------------------------- Running from partition /dev/mtdblock6, partition to update is /dev/mtdblock7 var2 is 6 percent full /tmp is 6 percent full Free Memory 155900 kB FWU invoked via Linux shell Validating image file header Making file system Extracting files (this can take some time). Version of firmware update file is 5.2.2.0-033D Successful rfs7000-37FABE(config)# rfs7000-37FABE(config)#show upgrade-status on rfs7000-37FABE Last Image Upgrade Status : Successful Last Image Upgrade Time : 04:12:2010 08:44:00 UTC rfs7000-37FABE(config)#
  • 508. 6 - 88 WiNG CLI Reference Guide 6.1.47 version show commands Displays a device’s software and hardware version Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show version {on <DEVICE-NAME>} Parameters • show version {on <DEVICE-NAME>} version Displays software and hardware versions on all devices or a specified device {on <DEVICE-NAME>} • on <DEVICE-NAME> – Optional. Displays software and hardware versions on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. Examples rfs7000-37FABE(config)#show version on rfs7000-37FABE RFS7000 version 5.2.2.0-048B Copyright (c) 2004-2011 Motorola Solutions, Inc. All rights reserved. Booted from secondary rfs7000-37FABE uptime is 3 days, 19 hours 14 minutes CPU is RMI XLR V0.4 255464 kB of on-board RAM Base ethernet MAC address is 00-15-70-37-FA-BE System serial number is 6268529900014 Model number is RFS-7010-1000-WR FPGA version is 3.41 rfs7000-37FABE(config)#
  • 509. SHOW COMMANDS 6 - 89 6.1.48 wireless show commands Displays wireless configuration parameters Supported in the following platforms: • AP300 • AP621 • AP650 • AP6511 • AP6521 • AP6532 • AP71XX • RFS4000 • RFS6000 • RFS7000 Syntax show wireless [ap|client|domain|mesh|meshpoint|radio|regulatory|sensor-server| unsanctioned|wips|wlan] show wireless ap {configured|detail|load-balancing|on <DEVICE-NAME>} show wireless ap {detail {<MAC/HOST-NAME> {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE- OR-DOMAIN-NAME>} show wireless ap {load-balancing {client-capability|events|neighbors} {(on <DEVICE- NAME>)} show wireless client {associaton-history|detail|filter|on <DEVICE-OR-DOMAIN- NAME>|statistics|tspec} show wireless client {association-history <MAC> {on <DEVICE-OR-DOMAIN-NAME>}} show wireless client {detail <MAC> {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-OR- DOMAIN-NAME> show wireless client {filter {ip|on <DEVICE-OR-DOMAIN-NAME>|state|wlan}} show wireless client {filter ip [<IP>|not <IP>] {on <DEVICE-OR-DOMAIN-NAME>]} show wireless client {filter state [data-ready|not [data-ready|roaming]|roaming] {on <DEVICE-OR-DOMAIN-NAME>]} show wireless client {filter wlan [<WLAN>|not <WLAN>] {on <DEVICE-OR-DOMAIN-NAME>]} show wireless client {statistics {detail <MAC>|rf|window-data <MAC>} {(on <DEVICE-OR- DOMAIN-NAME>)}} show wireless client {tspec <MAC> {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-OR-DOMAIN- NAME>} show wireless domain statistics {detail {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-OR- DOMAIN-NAME>}}] show wireless mesh [detail|links {on <DEVICE-OR-DOMAIN-NAME>}] show wireless mesh detail {<DEVICE-NAME>|filter|on <DEVICE-OR-DOMAIN-NAME>} show wireless mesh detail {<DEVICE-NAME> <1-3> {(filter <RADIO-MAC>)} {(on <DEVICE- OR-DOMAIN-NAME>)} show wireless meshpoint [config|detail|multicast|neighbor|path|proxy|root|security| statistics|usage-mappings|on] show wireless meshpoint config {filter [device <DEVICE-NAME>|rf-domain <RF-DOMAIN>} show wireless meshpoint detail {<MESHPOINT>} show wireless meshpoint multicast [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>} show wireless meshpoint neighbor [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>} show wireless meshpoint path [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>} show wireless meshpoint proxy [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>} show wireless meshpoint root [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>} show wireless meshpoint security [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>}
  • 510. 6 - 90 WiNG CLI Reference Guide show wireless meshpoint statistics [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>} show wireless meshpoint statistics on <DEVICE-OR-DOMAIN-NAME> show wireless meshpoint usage-mappings show wireless radio {detail|on <DEVICE-OR-DOMAIN-NAME>|statistics|tspec} show wireless radio {detail {<DEVICE-NAME> <1-3> (filter {on <DEVICE-OR-DOMAIN- NAME>|<RADIO-MAC>})} show wireless radio {statistics {detail|on|rf|windows-data}} show wireless radio {statistics {on <DEVICE-OR-DOMAIN-NAME>|rf {on <DEVICE- OR-DOMAIN-NAME>}} show wireless radio {statistics {detail|window-data} {<DEVICE-NAME> <1-3>} {(filter <RADIO-MAC>)} {(on <DEVICE-OR-DOMAIN-NAME>)} show wireless regulatory [channel-info <WORD>|country-code <WORD>| device-type] show wireless regulatory device-type [ap650|ap6511|ap7131|rfs4000] <WORD> show wireless sensor-server {on <DEVICE-OR-DOMAIN-NAME>} show wireless unsanctioned aps {detail|statistics} {(on <DEVICE-OR-DOMAIN-NAME>)} show wireless wips [client-blacklist|event-history]{on <DEVICE-OR-DOMAIN-NAME>} show wireless wlan {config|detail <WLAN>|on <DEVICE-OR-DOMAIN-NAME>| policy-mappings|statistics|usage-mappings} show wireless wlan {detail <WLAN>|on <DEVICE-OR-DOMAIN-NAME>|policy-mappings| usage-mappings} show wireless {config filter {device <DEVICE-NAME>|rf-domain <DOMAIN-NAME>}} show wireless wlan statitics {<WLAN>|detail|traffic} {on <DEVICE-OR-DOMAIN-NAME>} Parameters • show wireless ap {configured} wireless Displays wireless configuration parameters ap Displays information on wireless controller managed access points configured Optional. Displays all configured AP information • show wireless ap {detail {<MAC/HOST-NAME> {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE- OR-DOMAIN-NAME>}} wireless Displays wireless configuration parameters ap Displays information on wireless controller managed access points detail Optional. Displays detailed information for all APs or a specified AP {<MAC/HOST-NAME> • <MAC/HOST-NAME> – Optional. Displays information for a specified AP {on <DEVICE-OR-DOMAIN- • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays information on a specified NAME>} device or RF Domain • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless control- ler, or RF Domain. on <DEVICE-OR-DOMAIN- Optional. Displays information on a specified device or RF Domain NAME>} • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • show wireless ap {load-balancing {client-capability|events|neighbors} {(on <DEVICE- NAME>)}} wireless Displays wireless configuration parameters ap Displays information on wireless controller managed access points
  • 511. SHOW COMMANDS 6 - 91 load-balancing Optional. Displays load balancing status. Use additional filters to view specific details. {client-capability| • client capability – Optional. Displays client band capability events|neighbors} • events – Optional. Displays client events • neighbors – Optional. Displays neighboring clients on <DEVICE-NAME> The following are common to the client capability, events, and neighbors parameters: • on – Optional. Displays load balancing status on a specified device • <DEVICE-NAME> – Specify the name of the AP or wireless controller. • show wireless client {association-history <MAC> {on <DEVICE-OR-DOMAIN-NAME>}} wireless Displays wireless configuration parameters client Displays client information based on the parameters passed association-history <MAC> Optional. Displays association history for a specified client • <MAC> – Specify the MAC address of the client. on <DEVICE-OR-DOMAIN- Optional. Displays association history on a specified device or RF Domain NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • show wireless client {detail <MAC> {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-OR- DOMAIN-NAME>} wireless Displays wireless configuration parameters client Displays client information based on the parameters passed detail <MAC> Optional. Displays detailed information for a specified client {on <DEVICE-OR-DOMAIN- • <MAC> – Specify the MAC address of the client. NAME>} • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays detailed information on a specified device or RF Domain • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless control- ler, or RF Domain. on <DEVICE-OR-DOMAIN- Optional. Displays client information on a specified device or RF Domain NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • show wireless client {filter ip {<IP>|not <IP>} {on <DEVICE-OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters client Displays client information based on the parameters passed
  • 512. 6 - 92 WiNG CLI Reference Guide filter IP {<IP>|not <IP>} Optional. Uses IP address to filter clients • <IP> – Optional. Selects clients based on the IP address passed • not <IP> – Optional. Inverts the match selection on <DEVICE-OR-DOMAIN- The following is common to the IP and not IP parameters: NAME> • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays association history on a specified device or RF Domain • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • show wireless client {filter state {data-ready|not {data-ready|roaming}|roaming} {on <DEVICE-OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters client Displays client information based on the parameters passed filter state {data-ready| Optional. Filters clients based on their state not {data-ready|roaming}| • data-ready – Optional. Selects wireless clients in the data-ready state roaming} • not {data-ready|roaming} – Optional. Inverts match selection. Selects wireless clients neither ready nor roaming • Roaming – Optional. Selects roaming clients on <DEVICE-OR-DOMAIN- The following is common to the ready, not, and roaming parameters: NAME> • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays client details on a specified device or RF Domain • show wireless client {filter wlan {<WLAN>|not {WLAN} {on <DEVICE-OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters client Displays client information based on the parameters passed filter wlan {<WLAN>| Optional. Filters clients on a specified WLAN not <WLAN>} • <WLAN> – Specify the WLAN name. • not <WLAN> – Inverts the match selection on <DEVICE-OR-DOMAIN- The following are common to the WLAN and not parameters: NAME> • on <DEVICE-OR-DOMAIN-NAME> – Optional. Filters clients on a specified device or RF Domain • show wireless client {statistics {detail <MAC>|rf|window-data <mac>} {on <DEVICE- OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters client Displays client information based on the parameters passed
  • 513. SHOW COMMANDS 6 - 93 statistics Optional. Displays detailed client statistics. Use additional filters to view specific {detail <MAC>| details. rf|window-data <MAC>} • detail <MAC> – Optional. Displays detailed statistics for a specified client • <MAC> – Specify the MAC address of the client. • rf – Displays detailed client statistics on a specified device or RF Domain • window-data <MAC> – Displays historical data, for a specified client • <MAC> – Specify the MAC address of the client on <DEVICE-OR-DOMAIN- The following are common to the detail <MAC>, RF, and window-data <MAC> NAME> parameters: • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays client statistics on a specified device or RF Domain • show wireless client {tspec {<MAC> {on <DEVICE-OR-DOMAIN-NAME>}|on <DEVICE-OR- DOMAIN-NAME>}} wireless Displays wireless configuration parameters client Displays client information based on the parameters passed tspec <MAC> Optional. Displays detailed TSPEC information for all clients or a specified client {on <DEVICE-OR-DOMAIN- • <MAC> – Optional. Displays detailed TSPEC information for a specified client NAME>} • <MAC> – Specify the MAC address of the client. • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays detailed TSPEC infor- mation on a specified device or RF Domain on <DEVICE-OR-DOMAIN- Optional. Displays detailed TSPEC information for all wireless clients on a specified NAME> device or RF Domain • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • show wireless mesh links {on <DEVICE-OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters mesh Displays information on radio mesh links Optional. Displays active links of a radio mesh {on <DEVICE-OR-DOMAIN- • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays active links of a radio mesh NAME>} on a specified device or RF Domain • show wireless mesh detail {<DEVICE-NAME> <1-3> {(filter <RADIO-MAC>)} {(on <DEVICE- OR-DOMAIN-NAME>)}} wireless Displays wireless configuration parameters mesh Displays radio mesh information detail Optional. Displays detailed radio mesh information <DEVICE-NAME> <1-3> Optional. Specify the MAC address or hostname, or append the interface number to form the mesh ID in the AA-BB-CC-DD-EE-FF:RX or HOSTNAME:RX format. • <1-3> – Optional. Specify the mesh interface index.
  • 514. 6 - 94 WiNG CLI Reference Guide filter <RADIO-MAC> Optional. Provides additional filters • <RADIO-MAC> – Optional. Filters based on the radio MAC address on <DEVICE-OR-DOMAIN- Optional. After specifying the radio MAC address, further refine the search by NAME> specifying a device or RF Domain. • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • show wireless meshpoint {filter [device <DEVICE-NAME>|rf-domain <RF-DOMAIN>} wireless Displays wireless configuration parameters meshpoint Displays mesh point status and other related information filter Optional. Displays mesh point information based on either the device or RF Domain the mesh point is in. device <DEVICE-NAME> Optional. Displays mesh point information on the device identified by <DEVICE-NAME>. rf-domain <RF-DOMAN> Optional. Displays mesh point information for the rf-domain specified by the <RF-DOMAIN> value. • show wireless meshpoint config {filter [device <DEVICE-NAME>|rf-domain <RF-DOMAIN>} wireless Displays wireless configuration parameters meshpoint Displays mesh point status and other related information. config Displays the mesh point configuration details. filter Optional. Displays mesh point configuration details based on either the device or RF Domain the mesh point is in. device <DEVICE-NAME> Optional. Displays mesh point configuration details on the device identified by <DEVICE-NAME> rf-domain <RF-DOMAN> Optional. Displays mesh point configuration details for the rf-domain specified by the <RF-DOMAIN> value. • show wireless meshpoint detail {<MESHPOINT>} wireless Displays wireless configuration parameters meshpoint Displays mesh point status and other related information detail Displays detailed mesh point information <MESHPOINT> Displays detailed information for the mesh point <MESHPOINT> • show wireless meshpoint multicast [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters meshpoint Displays mesh point status and other related information multicast Displays mesh point multicast information
  • 515. SHOW COMMANDS 6 - 95 <MESHPOINT> Displays detailed information for the mesh point <MESHPOINT> detail Displays detailed mesh point multicast information on <DEVICE-OR-DOMAIN- Optional. Displays multicast information for a selected mesh point on a device or NAME> domain specified by <DEVICE-OR-DOMAIN>. • show wireless meshpoint neighbor [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters meshpoint Displays mesh point status and other related information neighbor Displays mesh point neighbor information <MESHPOINT> Displays detailed neighbor information for the mesh point <MESHPOINT> detail Displays detailed neighbor information on <DEVICE-OR-DOMAIN- Optional. Displays neighbor information for a selected mesh point on a device or NAME> domain specified by <DEVICE-OR-DOMAIN>. • show wireless meshpoint path [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters meshpoint Displays mesh point status and other related information path Displays mesh point path information <MESHPOINT> Displays detailed path information for the mesh point <MESHPOINT> detail Displays detailed path information on <DEVICE-OR-DOMAIN- Optional. Displays path information for a selected mesh point on a device or domain NAME> specified by <DEVICE-OR-DOMAIN>. • show wireless meshpoint proxy [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters meshpoint Displays mesh point status and other related information proxy Displays mesh point proxy information <MESHPOINT> Displays detailed proxy information for the mesh point <MESHPOINT> detail Displays detailed proxy information on <DEVICE-OR-DOMAIN- Optional. Displays proxy information for a selected mesh point on a device or domain NAME> specified by <DEVICE-OR-DOMAIN>. • show wireless meshpoint root [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters meshpoint Displays mesh point status and other related information root Displays mesh point root information
  • 516. 6 - 96 WiNG CLI Reference Guide <MESHPOINT> Displays detailed root information for the mesh point <MESHPOINT> detail Displays detailed root information on <DEVICE-OR-DOMAIN- Optional. Displays root information for a selected mesh point on a device or domain NAME> specified by <DEVICE-OR-DOMAIN>. • show wireless meshpoint security [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters meshpoint Displays mesh point status and other related information security Displays mesh point security information <MESHPOINT> Displays detailed security information for the mesh point <MESHPOINT> detail Displays detailed security information on <DEVICE-OR-DOMAIN- Optional. Displays security information for a selected mesh point on a device or domain NAME> specified by <DEVICE-OR-DOMAIN>. • show wireless meshpoint statistics [<MESHPOINT>|detail] {on <DEVICE-OR-DOMAIN- NAME>} wireless Displays wireless configuration parameters meshpoint Displays mesh point status and other related information statistics Displays mesh point statistics <MESHPOINT> Displays detailed statistics for the mesh point <MESHPOINT> detail Displays detailed statistics on <DEVICE-OR-DOMAIN- Optional. Displays statistics for a selected mesh point on a device or domain specified NAME> by <DEVICE-OR-DOMAIN>. • show wireless meshpoint statistics on <DEVICE-OR-DOMAIN-NAME> wireless Displays wireless configuration parameters meshpoint Displays mesh point status and other related information statistics Displays mesh point statistics on <DEVICE-OR-DOMAIN- Displays statistics for a selected mesh point on a device or domain specified by NAME> <DEVICE-OR-DOMAIN> • show wireless meshpoint usage-mappings wireless Displays wireless configuration parameters meshpoint Displays mesh point status and other related information usage-mappings Displays mesh point usage mappings
  • 517. SHOW COMMANDS 6 - 97 • show wireless radio {detail {<DEVICE-NAME> <1-3> {(filter <RADIO-MAC>)} {(on <DEVICE-OR-DOMAIN-NAME>)}} wireless Displays wireless configuration parameters radio Displays radio operation status and other related information detail Optional. Displays detailed radio operation status <DEVICE-NAME> <1-3> Optional. Specify the MAC address or hostname, or append the interface number to form the radio ID in the AA-BB-CC-DD-EE-FF:RX or HOSTNAME:RX format. • <1-3> – Optional. Specify the radio interface index. filter <RADIO-MAC> Optional. Provides additional filters • <RADIO-MAC> – Optional. Filters based on the radio MAC address on <DEVICE-OR-DOMAIN- Optional. After specifying the radio MAC address, further refine the search by NAME> specifying a device or RF Domain. • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • show wireless radio {statistics {on <DEVICE-OR-DOMAIN-NAME>|rf {on <DEVICE-OR- DOMAIN-NAME>}} wireless Displays wireless configuration parameters radio Displays radio operation status and other related information statistics Optional. Displays radio traffic and RF statistics {on <DEVICE-OR-DOMIAN- • on <DEVICE-OR-DOMIAN-NAME> – Optional. Displays traffic and RF related NAME>| statistics on a specified device or RF Domain rf {on <DEVICE-OR-DOMAIN- • <DEVICE-OR-DOMIAN-NAME> – Specify the name of the AP, wireless controller, NAME>}} or RF Domain. • rf – Optional. Displays RF statistics on a specified device or RF Domain • <DEVICE-OR-DOMIAN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • show wireless radio {statistics {detail|window-data} {<DEVICE-NAME> <1-3> {(filter <RADIO-MAC>)} {(on <DEVICE-OR-DOMAIN-NAME>)}} wireless Displays wireless configuration parameters radio Displays radio operation status and other related information statistics Optional. Displays radio traffic and RF statistics. Use additional filters to view specific {detail|window-data} details. The options are: are: • detail – Displays detailed traffic and RF statistics of all radios • window-data – Displays historical data over a time window <DEVICE-NAME> <1-3> The following are common to the detail and window-data parameters: • <DEVICE-NAME> – Optional. Specify the MAC address or hostname, or append the interface number to form the radio ID in the AA-BB-CC-DD-EE-FF:RX or HOSTNAME:RX format. • <1-3> – Optional. Specify the radio interface index.
  • 518. 6 - 98 WiNG CLI Reference Guide filter <RADIO-MAC> Optional. Provides additional filters • <RADIO-MAC> – Optional. Filters based on the radio MAC address on <DEVICE-OR-DOMAIN- Optional. After specifying the radio MAC address, further refine the search by NAME> specifying a device or RF Domain. • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. • show wireless regulatory [channel-info <WORD>|county-code <WORD>] wireless Displays wireless configuration parameters regulatory Displays wireless regulatory information channel-info <WORD> Displays channel information • <WORD> – Specify the channel number. country-code <WORD> Displays country code to country name information • <WORD> – Specify the two letter ISO-3166 country code. • show wireless regulatory device-type [ap650|ap6511|ap71xx|rfs4000] <WORD> wireless Displays wireless configuration parameters regulatory Displays wireless regulatory information device-type Displays regulatory information based on the device type [ap650|ap6511|ap71xx| • ap650 – Displays AP650 information rfs4000] <WORD> • ap6511 – Displays AP6511 information • ap71xx – Displays AP71XX information • rfs4000 – Displays RFS4000 information The following is common to all of the above: • <WORD> – Specify the two letter ISO-3166 country code. • show wireless sensor-server {on <DEVICE-OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters sensor- server Displays AirDefense sensor server configuration details {on <DEVICE-OR-DOMAIN- • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays AirDefense sensor server NAME>} configuration on a specified device or RF Domain • show wireless unsanctioned aps {detailed|statistics} {(on <DEVICE-OR-DOMAIN-NAME>)} wireless Displays wireless configuration parameters unsanctioned aps Displays unauthorized APs. Use additional filters to view specific details. detailed Optional. Displays detailed unauthorized APs information
  • 519. SHOW COMMANDS 6 - 99 statistics Optional. Displays channel statistics on <DEVICE-OR-DOMAIN- The following is common to the detailed and statistics parameters: NAME> • on <DEVICE-OR-DOMAIN-NAME> – Optional. Specify the name of the AP, wireless controller, or RF Domain. • show wireless wips [client-blacklist|event-history] {on <DEVICE-OR-DOMAIN-NAME>} wireless Displays wireless configuration parameters wips [client-blacklist|event- Displays the WIPS details history] • client-blacklist – Displays blacklisted clients • event-history – Displays event history on <DEVICE-OR-DOMAIN- The following are common to the client-blacklist and event-history parameters: NAME> • on <DEVICE-OR-DOMAIN-NAME> – Optional. Specify the name of the AP, wireless controller, or RF Domain. • show wlan {detail <WLAN>|on <DEVICE-OR-DOMAIN-NAME>|policy-mappings|usage-mappings} wireless Displays wireless configuration parameters wlan Displays WLAN related information based on the parameters passed detail <WLAN> Optional. Displays WLAN configuration • <WLAN> – Specify the WLAN name. on <DEVICE-OR-DOMAIN- Optional. Displays WLAN configuration on a specified device or RF Domain NAME> • <DEVICE-OR-DOMAIN-NAME> – Specify the name of the AP, wireless controller, or RF Domain. policy-mappings Optional. Displays WLAN policy mappings usage-mappings Optional. Lists all devices and profiles using the WLAN • show wlan {config filter {device <DEVICE-NAME>|rf-domain <DOMAIN-NAME>} wireless Displays wireless configuration parameters wlan Displays WLAN related information based on the parameters passed config filter Optional. Filters WLAN information based on the device name or RF Domain device <DEVICE-NAME> Optional. Filters WLAN information based on the device name • <DEVICE-NAME> – Specify the device name. rf-domain Optional. Filters WLAN information based on the RF Domain <DOMAIN-NAME> • <DOMAIN-NAME> – Specify the RF Domain name. • show wlan {statistics {<WLAN>|detail} {(on <DEVICE-OR-DOMAIN-NAME>)} wireless Displays wireless configuration parameters wlan Displays WLAN related information based on the parameters passed
  • 520. 6 - 100 WiNG CLI Reference Guide statistics {<WLAN>|detail} Optional. Displays WLAN statistics. Use additional filters to view specific details • <WLAN> – Optional. Displays WLAN statistics. Specify the WLAN name. • detail – Optional. Displays detailed WLAN statistics on <DEVICE-OR-DOMAIN- The following is common to the <WLAN> and detail parameters: NAME> • on <DEVICE-OR-DOMAIN-NAME> – Optional. Displays WLAN statistics on a specified device or RF Domain Examples rfs7000-37FABE(config)#show wireless sensor server status on ap7131-889EC4 rfs7000-37FABE(config)# rfs7000-37FABE(config)#show wireless unauthorized aps detailed Number of APs seen: 1 rfs7000-37FABE(config)# rfs7000-37FABE(config)#show wireless wips mu-blacklist No mobile units blacklisted rfs7000-37FABE(config)# rfs7000-37FABE(config)#show wireless wlan config +-----------+---------+-----------+-------------+-----------------+------- | NAME | ENABLE | SSID | ENCRYPTION | AUTHENTICATION | VLAN | +-----------+---------+-----------+-------------+-----------------+------- | test | Y | test | none | none | 1 | | motorola | Y | motorola | none | none | 1 | | wlan1 | Y | wlan1 | none | none | 1 | rfs7000-37FABE(config)# rfs7000-37FABE(config)#show wireless wlan statistics +---------------------+----------+----------+--------+--------+--------+-- | WLAN | TX BYTES | RX BYTES |TX PKTS |RX PKTS |TX KBPS |RX KBPS |DROPPED | ERRORS | +---------------------+----------+----------+--------+--------+--------+- | motorola | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | | wlan1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | +---------------------+----------+----------+--------+--------+--------+-- Total number of wlan displayed: 2 rfs7000-37FABE(config)# rfs7000-37FABE(config)#show wireless regulatory channel-info 1 Center frequency for channel 1 is 2412MHz rfs7000-37FABE(config)# rfs7000-37FABE(config)#show wireless regulatory country-code ISO CODE NAME ------------------------------------------------------------ al Algeria ai Anguilla ar Argentina au Australia at Austria bs Bahamas bh Bahrain bb Barbados by Belarus be Belgium bm Bermuda bo Bolivia bw Botswana ba Bosnia-Herzegovina br Brazil bg Bulgaria ca Canada ky Cayman Islands ......................................................
  • 521. SHOW COMMANDS 6 - 101 rfs7000-37FABE(config)# rfs7000-37FABE(config)#show wireless regulatory device-type ap650 in -------------------------------------------------------------------------- # Channel Set Power(mW) Power (dBm) Placement DFS CAC(mins) -------------------------------------------------------------------------- 1 1-13 4000 36 Indoor/Outdoor NA NA 2 36-64 200 23 Indoor Not Required 0 3 149-165 1000 30 Outdoor Not Required 0 4 149-165 200 23 Indoor Not Required 0 -------------------------------------------------------------------------- rfs7000-37FABE(config)# RFS4000-880DA7(config)#show wireless ap detail RFS4000-880DA7 on RFS4000-880DA7 AP: 00-23-68-88-0D-A7 AP Name : RFS4000-880DA7 Location : default RF-Domain : default Type : RFS4000 Model : RFS-4011-11110-US Num of radios : 2 Num of clients : 0 Last Smart-RF time : not done Stats update mode : auto Stats interval : 6 Radio Modes : radio-1 : wlan radio-2 : wlan Country-code : not-set Site-Survivable : True Last error : Fault Detected : False RFS4000-880DA7(config)# RFS4000-880DA7(config)#show wireless ap load-balancing on default/RFS4000-880DA7 AP: 00-23-68-88-0D-A7 Client requests on 5ghz : allowed Client requests on 2.4ghz : allowed Average AP load in neighborhood : 0 % Load on this AP : 0 % Total 2.4ghz band load in neighborhood : 0 % Total 5ghz band load in neighborhood : 0 % Configured band ratio 2.4ghz to 5ghz : 1:1 Current band ratio 2.4ghz to 5ghz : 0:0 Average 2.4ghz channel load in neighborhood : 0 % Average 5ghz channel load in neighborhood : 0 % Load on this AP's 2.4ghz channel : 0 % Load on this AP's 5ghz channel : 0 % Total number of APs displayed: 1 RFS4000-880DA7(config)# RFS4000-880DA7(config)#show wireless ap on default -------------------------------------------------------------------------- MODE : radio modes - W = WLAN, S=Sensor, ' ' (Space) = radio not present -------------------------------------------------------------------------- AP-NAME AP-LOCATION RF-DOMAIN AP-MAC #RADIOS MODE #CLIENT LAST-CAL-TIME -------------------------------------------------------------------------- RFS4000-880DA7 default default 00-23-68-88-0D-A7 2 W-W 0 not done -------------------------------------------------------------------------- Total number of APs displayed: 1 RFS4000-880DA7(config)# rfs7000-37FABE(config)#show wireless meshpoint config --------------------------------------------------------------------------------
  • 522. 6 - 102 WiNG CLI Reference Guide NAME ENABLE MESHID -------------------------------------------------------------------------------- test Y TesingMeshPoint -------------------------------------------------------------------------------- rfs7000-37FABE(config)#show wireless meshpoint detail SUMMARY NAME | test [MESHID:TesingMeshP