Hp Wireless Switch Manager Software Command Reference Guide Cmdref
2015-01-05
: Hp Hp-Wireless-Switch-Manager-Software-Command-Reference-Guide-156195 hp-wireless-switch-manager-software-command-reference-guide-156195 hp pdf
Open the PDF directly: View PDF .
Page Count: 616
Download | |
Open PDF In Browser | View PDF |
Wireless LAN Mobility System Wireless LAN Switch and Controller Command Reference 3CRWXR10095A, 3CRWX120695A, 3CRWX440095A http://www.3com.com/ Part No. DUA1009-5CAA01 Published June 2005 3Com Corporation 350 Campus Drive Marlborough, MA USA 01752-3064 Copyright © 2004, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from 3Com Corporation. 3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of 3Com Corporation to provide notification of such revision or change. 3Com Corporation provides this documentation without warranty, term, or condition of any kind, either implied or expressed, including, but not limited to, the implied warranties, terms or conditions of merchantability, satisfactory quality, and fitness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time. If there is any software on removable media described in this documentation, it is furnished under a license agreement included with the product as a separate document, in the hard copy documentation, or on the removable media in a directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will be provided to you. UNITED STATES GOVERNMENT LEGEND If you are a United States government agency, then this documentation and the software described herein are provided to you subject to the following: All technical data and computer software are commercial in nature and developed solely at private expense. Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable. You agree not to remove or deface any portion of any legend provided on any licensed program or documentation contained in, or delivered to you in conjunction with, this User Guide. Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered in other countries. 3Com is a registered trademark of 3Com Corporation. The 3Com logo is a trademark of 3Com Corporation. Mobility Domain, Mobility Point, Mobility Profile, Mobility System, Mobility System Software, MP, MSS, and SentrySweep are trademarks of Trapeze Networks, Inc. Intel and Pentium are registered trademarks of Intel Corporation. Microsoft, MS-DOS, Windows, Windows XP, and Windows NT are registered trademarks of Microsoft Corporation. All other company and product names may be trademarks of the respective companies with which they are associated. ENVIRONMENTAL STATEMENT It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we are committed to: Establishing environmental performance standards that comply with national legislation and regulations. Conserving energy, materials and natural resources in all operations. Reducing the waste generated by all operations. Ensuring that all waste conforms to recognized environmental standards. Maximizing the recyclable and reusable content of all products. Ensuring that all products can be recycled, reused and disposed of safely. Ensuring that all products are labelled according to recognized environmental standards. Improving our environmental record on a continual basis. End of Life Statement 3Com processes allow for the recovery, reclamation and safe disposal of all end-of-life electronic components. Regulated Materials Statement 3Com products do not contain any hazardous or ozone-depleting material. Environmental Statement about the Documentation The documentation for this product is printed on paper that comes from sustainable, managed forests; it is fully biodegradable and recyclable, and is completely chlorine-free. The varnish is environmentally-friendly, and the inks are vegetable-based with a low heavy-metal content. CONTENTS ABOUT THIS GUIDE Conventions 19 Documentation 20 Documentation Comments 1 21 USING THE COMMAND-LINE INTERFACE Overview 23 CLI Conventions 24 Command Prompts 24 Syntax Notation 24 Text Entry Conventions and Allowed Characters 25 MAC Address Notation 25 IP Address and Mask Notation 26 User Globs, MAC Address Globs, and VLAN Globs 26 Port Lists 28 Virtual LAN Identification 29 Command-Line Editing 29 Keyboard Shortcuts 29 History Buffer 30 Tabs 30 Single-Asterisk (*) Wildcard Character 30 Double-Asterisk (**) Wildcard Characters 30 Using CLI Help 31 Understanding Command Descriptions 32 2 ACCESS COMMANDS Commands by Usage disable 33 enable 34 quit 34 set enablepass 35 33 3 SYSTEM SERVICE COMMANDS Commands by Usage 37 clear banner motd 38 clear history 38 clear prompt 39 clear system 39 display banner motd 40 display base-information 41 display license 42 display system 42 help 45 history 46 set auto-config 46 set banner motd 49 set confirm 50 set length 51 set license 52 set prompt 53 set system contact 54 set system countrycode 54 set system ip-address 57 set system location 58 set system name 58 4 PORT COMMANDS Commands by Usage 61 clear dap 62 clear port counters 63 clear port-group 63 clear port name 64 clear port preference 64 clear port type 65 display port counters 66 display port-group 67 display port poe 68 display port preference 69 display port status 70 monitor port counters 72 reset port 77 set dap 77 set port 80 set port-group 81 set port name 82 set port negotiation 83 set port poe 84 set port preference 85 set port speed 85 set port trap 86 set port type ap 87 set port type wired-auth 91 5 VLAN COMMANDS Commands by usage 95 clear fdb 96 clear vlan 97 display fdb 98 display fdb agingtime 101 display fdb count 101 display roaming station 102 display roaming vlan 104 display tunnel 105 display vlan config 106 set fdb 107 set fdb agingtime 108 set vlan name 109 set vlan port 110 set vlan tunnel-affinity 111 6 IP SERVICES COMMANDS Commands by Usage 113 clear interface 115 clear ip alias 116 clear ip dns domain 117 clear ip dns server 117 clear ip route 118 clear ip telnet 119 clear ntp server 119 clear ntp update-interval 120 clear snmp community 121 clear snmp notify target 121 clear snmp profile 122 clear snmp trap receiver 122 clear snmp usm 122 clear summertime 123 clear system ip-address 124 clear timezone 124 display arp 125 display interface 126 display ip alias 127 display ip dns 128 display ip https 129 display ip route 131 display ip telnet 133 display ntp 134 display snmp configuration 136 display summertime 138 display timedate 138 display timezone 139 ping 140 set arp 141 set arp agingtime 142 set interface 143 set interface dhcp-client 144 set interface dhcp-server 145 set interface status 146 set ip alias 147 set ip dns 147 set ip dns domain 148 set ip dns server 149 set ip https server 150 set ip route 150 set ip snmp server 152 set ip ssh 153 set ip ssh absolute-timeout 154 set ip ssh idle-timeout 155 set ip ssh server 155 set ip telnet 156 set ip telnet server 157 set ntp 158 set ntp server 158 set ntp update-interval 159 set snmp community 160 set snmp notify target 162 set snmp profile 167 set snmp protocol 172 set snmp security 173 set snmp trap 174 set snmp trap receiver 174 set snmp usm 174 set summertime 177 set system ip-address 179 set timedate 180 set timezone 181 display dhcp-client 182 display dhcp-server 183 display snmp community 186 display snmp counters 187 display snmp notify profile 188 display snmp notify target 189 display snmp status 191 display snmp usm 193 telnet 195 traceroute 196 7 AAA COMMANDS Commands by Usage 199 clear accounting 201 clear authentication admin 202 clear authentication console 203 clear authentication dot1x 204 clear authentication last-resort 205 clear authentication mac 205 clear authentication proxy 206 clear authentication web 207 clear location policy 208 clear mac-user 209 clear mac-user attr 209 clear mac-user group 210 clear mac-usergroup 211 clear mac-usergroup attr 212 clear mobility-profile 213 clear user 213 clear user attr 214 clear user group 215 clear usergroup 215 clear usergroup attr 216 display aaa 217 display accounting statistics 220 display location policy 222 display mobility-profile 222 set accounting {admin | console} 223 set accounting {dot1x | mac | web} 224 set authentication admin 226 set authentication console 228 set authentication dot1x 230 set authentication last-resort 234 set authentication mac 236 set authentication proxy 238 set authentication web 239 set location policy 241 set mac-user 245 set mac-user attr 246 set mac-usergroup attr 252 set mobility-profile 253 set mobility-profile mode 255 set user 256 set user attr 257 set user group 258 set usergroup 259 set web-aaa 260 8 MOBILITY DOMAIN COMMANDS Commands by Usage 261 clear mobility-domain 262 clear mobility-domain member 262 display mobility-domain config 263 display mobility-domain status 263 set mobility-domain member 265 set mobility-domain mode member seed-ip 266 set mobility-domain mode seed domain-name 267 9 MANAGED ACCESS POINT COMMANDS MAP Access Point Commands by Usage clear {ap | dap} radio 272 clear radio-profile 274 clear service-profile 275 clear service-profile 276 display {ap | dap} config 277 display {ap | dap} counters 280 display {ap | dap} qos-stats 282 display {ap | dap} etherstats 284 display {ap | dap} group 285 display {ap | dap} status 287 display auto-tune attributes 290 display auto-tune neighbors 292 display dap connection 294 display dap global 295 display dap unconfigured 297 display radio-profile 298 display service-profile 302 reset {ap | dap} 305 set dap auto 306 set dap auto mode 308 set dap auto radiotype 309 269 set {ap | dap} bias 310 set {ap | dap} blink 311 set dap fingerprint 312 set {ap | dap} group 313 set {ap | dap} name 315 set {ap | dap} radio antennatype 315 set {ap | dap} radio auto-tune max-power 317 set {ap | dap} radio auto-tune max-retransmissions 318 set {ap | dap} radio channel 320 set {ap | dap} radio auto-tune min-client-rate 321 set {ap | dap} radio mode 323 set {ap | dap} radio radio-profile 324 set {ap | dap} radio tx-power 325 set dap security 326 set {ap | dap} upgrade-firmware 328 set radio-profile 11g-only 329 set radio-profile active-scan 330 set radio-profile auto-tune channel-config 330 set radio-profile auto-tune channel-holddown 331 set radio-profile auto-tune channel-interval 332 set radio-profile auto-tune power-backoff- timer 333 set radio-profile auto-tune power-config 334 set radio-profile auto-tune power-interval 335 set radio-profile beacon-interval 336 set radio-profile countermeasures 337 set radio-profile dtim-interval 338 set radio-profile frag-threshold 339 set radio-profile long-retry 339 set radio-profile max-rx-lifetime 340 set radio-profile max-tx-lifetime 341 set radio-profile mode 342 set radio-profile preamble-length 345 set radio-profile rts-threshold 346 set radio-profile service-profile 346 set radio-profile short-retry 350 set radio-profile wmm 350 set service-profile auth-dot1x 351 set service-profile auth-fallthru 352 set service-profile auth-psk 354 set service-profile beacon 355 set service-profile cipher-ccmp 356 set service-profile cipher-tkip 357 set service-profile cipher-wep104 358 set service-profile cipher-wep40 359 set service-profile psk-phrase 360 set service-profile psk-raw 361 set service-profile rsn-ie 362 set service-profile shared-key-auth 363 set service-profile ssid-name 363 set service-profile ssid-type 364 set service-profile tkip-mc-time 365 set service-profile web-aaa-form 366 set service-profile wep active-multicast-index 367 set service-profile wep active-unicast-index 368 set service-profile wep key-index 369 set service-profile wpa-ie 370 10 STP COMMANDS STP Commands by Usage 371 clear spantree portcost 372 clear spantree portpri 373 clear spantree portvlancost 373 clear spantree portvlanpri 374 clear spantree statistics 375 display spantree 376 display spantree backbonefast 378 display spantree blockedports 379 display spantree portfast 380 display spantree portvlancost 381 display spantree statistics 381 display spantree uplinkfast 387 set spantree 388 set spantree backbonefast 389 set spantree fwddelay 390 set spantree hello 390 set spantree maxage 391 set spantree portcost 392 set spantree portfast 393 set spantree portpri 394 set spantree portvlancost 395 set spantree portvlanpri 396 set spantree priority 397 set spantree uplinkfast 397 11 IGMP SNOOPING COMMANDS Commands by usage 399 clear igmp statistics 400 display igmp 400 display igmp mrouter 404 display igmp querier 405 display igmp receiver-table 407 display igmp statistics 409 set igmp 411 set igmp lmqi 412 set igmp mrouter 413 set igmp mrsol 414 set igmp mrsol mrsi 414 set igmp oqi 415 set igmp proxy-report 416 set igmp qi 417 set igmp qri 418 set igmp querier 419 set igmp receiver 419 set igmp rv 420 12 SECURITY ACL COMMANDS Security ACL Commands by Usage clear security acl 424 clear security acl map 425 commit security acl 427 display security acl dscp 428 display security acl 429 423 display security acl hits 430 display security acl info 431 display security acl map 432 display security acl resource-usage hit-sample-rate 437 rollback security acl 438 set security acl 439 set security acl map 444 13 433 CRYPTOGRAPHY COMMANDS Commands by Usage 447 crypto ca-certificate 448 crypto certificate 449 crypto generate key 451 crypto generate request 452 crypto generate self-signed 454 crypto otp 456 crypto pkcs12 457 display crypto ca-certificate 459 display crypto certificate 460 display crypto key ssh 461 14 RADIUS AND SERVER GROUP COMMANDS Commands by Usage 463 clear radius 464 clear radius client system-ip 465 clear radius proxy client 466 clear radius proxy port 466 clear radius server 467 clear server group 467 set radius 468 set radius client system-ip 469 set radius proxy client 470 set radius proxy port 471 set radius server 472 set server group 474 set server group load-balance 475 15 802.1X MANAGEMENT COMMANDS Commands by Usage 477 clear dot1x bonded-period 478 clear dot1x max-req 479 clear dot1x port-control 479 clear dot1x quiet-period 480 clear dot1x reauth-max 481 clear dot1x reauth-period 481 clear dot1x timeout auth-server 482 clear dot1x timeout supplicant 482 clear dot1x tx-period 483 display dot1x 483 set dot1x authcontrol 486 set dot1x bonded-period 487 set dot1x key-tx 488 set dot1x max-req 489 set dot1x port-control 490 set dot1x quiet-period 491 set dot1x reauth 491 set dot1x reauth-max 492 set dot1x reauth-period 493 set dot1x timeout auth-server 493 set dot1x timeout supplicant 494 set dot1x tx-period 494 set dot1x wep-rekey 495 set dot1x wep-rekey-period 496 16 SESSION MANAGEMENT COMMANDS Commands by Usage 497 clear sessions 497 clear sessions network 498 display sessions 500 display sessions network 503 17 RF DETECTION COMMANDS Commands by Usage 511 clear rfdetect 512 clear rfdetect attack-list 512 clear rfdetect black-list 513 clear rfdetect countermeasures mac 513 clear rfdetect ignore 513 clear rfdetect ssid-list 514 clear rfdetect vendor-list 515 display rfdetect counters 515 display rfdetect countermeasures 517 display rfdetect data 518 display rfdetect ignore 520 display rfdetect mobility-domain 521 display rfdetect ssid-list 525 display rfdetect vendor-list 525 display rfdetect visible 526 set rfdetect active-scan 528 set rfdetect attack-list 528 set rfdetect black-list 529 set rf detect countermeasures 530 set rfdetect countermeasures mac 530 set rfdetect ignore 530 set rfdetect log 531 set rfdetect signature 532 set rfdetect ssid-list 532 set rfdetect vendor-list 533 display rfdetect attack-list 534 display rfdetect black-list 535 display rfdetect clients 535 18 FILE MANAGEMENT COMMANDS Commands by Usage 539 backup 540 clear boot config 541 copy 542 delete 544 dir 545 display boot 547 display config 548 display version 549 load config 551 mkdir 553 reset system 554 restore 555 rmdir 556 save config 557 set boot configuration-file set boot partition 559 19 558 TRACE COMMANDS Commands by Usage 561 clear log trace 562 clear trace 562 display trace 563 save trace 564 set trace authentication 564 set trace authorization 565 set trace dot1x 566 set trace sm 567 SNOOP COMMANDS clear snoop 570 clear snoop map 570 set snoop 571 set snoop map 574 set snoop mode 575 display snoop 576 display snoop info 577 display snoop map 577 display snoop stats 578 21 SYSTEM LOG COMMANDS Commands by Usage 581 clear log 581 display log buffer 582 display log config 584 display log trace 585 set log 586 set log trace mbytes 589 22 BOOT PROMPT COMMANDS Boot Prompt Commands by Usage autoboot 592 boot 593 change 595 create 596 delete 597 diag 598 dir 598 display 599 fver 601 help 602 ls 602 next 603 reset 604 test 605 version 606 A 591 OBTAINING SUPPORT FOR YOUR PRODUCT Register Your Product 607 Purchase Value-Added Services 607 Troubleshoot Online 608 Access Software Downloads 608 Telephone Technical Support and Repair Contact Us 609 INDEX 608 ABOUT THIS GUIDE This command reference explains Mobility System Software (MSS™) command line interface (CLI) that you enter on a 3Com WXR100 Remote Office Wireless LAN Switch, WX1200 Wireless Switch, or WX4400 Wireless LAN Controller to configure and manage the Mobility System™ wireless LAN (WLAN). Read this reference if you are a network administrator responsible for managing WXR100, WX1200, or WX4400 wireless switches and their Managed Access Points (MAPs) in a network. If release notes are shipped with your product and the information there differs from the information in this guide, follow the instructions in the release notes. Most user guides and release notes are available in Adobe Acrobat Reader Portable Document Format (PDF) or HTML on the 3Com World Wide Web site: http://www.3com.com/ Conventions Table 1 and Table 2 list conventions that are used throughout this guide. Table 1 Notice Icons Icon Notice Type Description Information note Information that describes important features or instructions Caution Information that alerts you to potential loss of data or potential damage to an application, system, or device 20 ABOUT THIS GUIDE This manual uses the following text and syntax conventions: Table 2 Text Conventions Convention Description Monospace text Sets off command syntax or sample commands and system responses. Bold text Highlights commands that you enter or items you select. Italic text Designates command variables that you replace with appropriate values, or highlights publication titles or words requiring special emphasis. [ ] (square brackets) Enclose optional parameters in command syntax. { } (curly brackets) Enclose mandatory parameters in command syntax. | (vertical bar) Separates mutually exclusive options in command syntax. Keyboard key names If you must press two or more keys simultaneously, the key names are linked with a plus sign (+). Example: Press Ctrl+Alt+Del Words in italics Documentation Italics are used to: Emphasize a point. Denote a new term at the place where it is defined in the text. Highlight an example string, such as a username or SSID. The MSS documentation set includes the following documents. Wireless LAN Switch Manager (3WXM) Release Notes These notes provide information about the system software release, including new features and bug fixes. Wireless LAN Switch and Controller Release Notes These notes provide information about the system software release, including new features and bug fixes. Wireless LAN Switch and Controller Quick Start Guide This guide provides instructions for performing basic setup of secure (802.1X) and guest (WebAAA™) access, for configuring a Mobility Domain for roaming, and for accessing a sample network plan in 3WXM for advanced configuration and management. Documentation Comments 21 Wireless LAN Switch Manager Reference Manual This manual shows you how to plan, configure, deploy, and manage a Mobility System wireless LAN (WLAN) using the 3Com Wireless LAN Switch Manager (3WXM). Wireless LAN Switch Manager User’s Guide This guide shows you how to plan, configure, deploy, and manage a Mobility System wireless LAN (WLAN) using the 3Com Wireless LAN Switch Manager (3WXM). It contains information about recommended system requirements you should meet for optimum 3WXM performance, installing 3WXM client and 3WXM Services software, and an introduction to using the 3WXM interface. Wireless LAN Switch and Controller Installation and Basic Configuration Guide This guide provides instructions and specifications for installing a WX wireless switch in a Mobility System WLAN, and basic instructions for deploying a secure IEEE 802.11 wireless service. Wireless LAN Switch and Controller Configuration Guide This guide provides instructions for configuring and managing the system through the Mobility System Software (MSS) CLI. Wireless LAN Switch and Controller Command Reference This reference provides syntax information for all MSS commands supported on WX switches. Documentation Comments Your suggestions are very important to us. They will help make our documentation more useful to you. Please e-mail comments about this document to 3Com at: pddtechpubs_comments@3com.com Please include the following information when contacting us: Document title Document part number and revision (on the title page) Page number (if appropriate) 22 ABOUT THIS GUIDE Example: Wireless LAN Switch and Controller Configuration Guide Part number 730-9502-0071, Revision B Page 25 Please note that we can only respond to comments and questions about 3Com product documentation at this e-mail address. Questions related to Technical Support or sales should be directed in the first instance to your network supplier. 1 USING THE COMMAND-LINE INTERFACE This chapter discusses the 3Com Wireless Switch Manager (3WXM) command-line interface (CLI). Described are the CLI conventions (see “CLI Conventions” on page 24), editing on the command line (see “Command-Line Editing” on page 29), using the CLI help feature (see “Using CLI Help” on page 31), and information about the command descriptions in this reference (see “Understanding Command Descriptions” on page 32). Overview Mobility System Software (MSS) operates a 3Com Mobility System wireless LAN (WLAN) consisting of 3Com Wireless Switch Manager (3WXM) software and 3Com Wireless LAN Switch or 3Com Wireless LAN Controller (WX switch) and 3Com Wireless LAN Managed Access Point (MAP) hardware. There is a command-line interface (CLI) on the WX switch that you can use to configure and manage the WX and its attached access points. You configure the wireless LAN switches and access points primarily with set, clear, and display commands. Use set commands to change parameters. Use clear commands to reset parameters to their defaults. In many cases, you can overwrite a parameter with another set command. Use display commands to show the current configuration and monitor the status of network operations. The wireless LAN switches support two connection modes: Administrative access mode, which enables the network administrator to connect to the WX switch and configure the network Network access mode, which enables network users to connect through the WX switch to access the network 24 CHAPTER 1: USING THE COMMAND-LINE INTERFACE CLI Conventions Command Prompts Be aware of the following MSS CLI conventions for command entry: “Command Prompts” on page 24 “Syntax Notation” on page 24 “Text Entry Conventions and Allowed Characters” on page 25 “User Globs, MAC Address Globs, and VLAN Globs” on page 26 “Port Lists” on page 28 “Virtual LAN Identification” on page 29 By default, the MSS CLI provides the following prompt for restricted users. The mmmm portion shows the wireless LAN switch model number (for example, 1200) and the aabbcc portion shows the last three octets of the MAC address of the switch. WXmmmm-aabbcc> After you become enabled as an administrative user by typing enable and supplying a suitable password, MSS displays the following prompt: WXmmmm-aabbcc# For information about changing the CLI prompt on a wireless LAN switch, see “set prompt” on page 53. Syntax Notation The MSS CLI uses standard syntax notation: Bold monospace font identifies the command and keywords you must type. For example: set enablepass Italics indicate a placeholder for a value. For example, you replace vlan-id in the following command with a virtual LAN (VLAN) ID: clear interface vlan-id ip Curly brackets ({ }) indicate a mandatory parameter, and square brackets ([ ]) indicate an optional parameter. For example, you must enter dynamic or port and a port list in the following command, but a VLAN ID is optional: clear fdb {dynamic | port port-list} [vlan vlan-id] CLI Conventions 25 A vertical bar (|) separates mutually exclusive options within a list of possibilities. For example, you enter either enable or disable, not both, in the following command: set port {enable | disable} port-list Text Entry Conventions and Allowed Characters Unless otherwise indicated, the MSS CLI accepts standard ASCII alphanumeric characters, except for tabs and spaces, and is case-insensitive. The CLI has specific notation requirements for MAC addresses, IP addresses, and masks, and allows you to group usernames, MAC addresses, virtual LAN (VLAN) names, and ports in a single command. 3Com recommends that you do not use the same name with different capitalizations for VLANs or access control lists (ACLs). For example, do not configure two separate VLANs with the names red and RED. The CLI does not support the use of special characters including the following in any named elements such as SSIDs and VLANs: ampersand (&), angle brackets (< >), number sign (#), question mark (?), or quotation marks (“”). In addition, the CLI does not support the use of international characters such as the accented É in DÉCOR. MAC Address Notation MSS displays MAC addresses in hexadecimal numbers with a colon (:) delimiter between bytes — for example, 00:01:02:1a:00:01. You can enter MAC addresses with either hyphen (-) or colon (:) delimiters, but colons are preferred. For shortcuts: You can exclude leading zeros when typing a MAC address. MSS displays of MAC addresses include all leading zeros. In some specified commands, you can use the single-asterisk (*) wildcard character to represent from 1 byte to 5 bytes of a MAC address. (For more information, see “MAC Address Globs” on page 27.) 26 CHAPTER 1: USING THE COMMAND-LINE INTERFACE IP Address and Mask Notation MSS displays IP addresses in dotted decimal notation — for example, 192.168.1.111. MSS makes use of both subnet masks and wildcard masks. Subnet Masks Unless otherwise noted, use classless interdomain routing (CIDR) format to express subnet masks — for example, 192.168.1.112/24. You indicate the subnet mask with a forward slash (/) and specify the number of bits in the mask. Wildcard Masks Security access control lists (ACLs) use source and destination IP addresses and wildcard masks to determine whether the wireless LAN switch filters or forwards IP packets. Matching packets are either permitted or denied network access. The ACL checks the bits in IP addresses that correspond to any 0s (zeros) in the mask, but does not check the bits that correspond to 1s (ones) in the mask. You specify the wildcard mask in dotted decimal notation. For example, the address 10.0.0.0 and mask 0.255.255.255 match all IP addresses that begin with 10 in the first octet. User Globs, MAC Address Globs, and VLAN Globs Name “globbing” is a way of using a wildcard pattern to expand a single element into a list of elements that match the pattern. MSS accepts user globs, MAC address globs, and VLAN globs. The order in which globs appear in the configuration is important, because once a glob is matched, processing stops on the list of globs. User Globs A user glob is shorthand method for matching an authentication, authorization, and accounting (AAA) command to either a single user or a set of users. A user glob can be up to 80 characters long and cannot contain spaces or tabs. The double-asterisk (**) wildcard characters with no delimiter characters match all usernames. The single-asterisk (*) wildcard character matches any number of characters up to, but not including, a delimiter character in the glob. Valid user glob delimiter characters are the at (@) sign and the period (.). CLI Conventions 27 Table 3 gives examples of user globs. Table 3 User Globs User Glob User(s) Designated jose@example.com User jose at example.com *@example.com All users at example.com whose usernames do not contain periods — for example, jose@example.com and tamara@example.com, but not nin.wong@example.com, because nin.wong contains a period *@marketing.example.com All marketing users at example.com whose usernames do not contain periods *.*@marketing.example.com All marketing users at example.com whose usernames contain periods * All users with usernames that have no delimiters EXAMPLE\* All users in the Windows Domain EXAMPLE with usernames that have no delimiters EXAMPLE\*.* All users in the Windows Domain EXAMPLE whose usernames contain periods ** All users MAC Address Globs A media access control (MAC) address glob is a similar method for matching some authentication, authorization, and accounting (AAA) and forwarding database (FDB) commands to one or more 6-byte MAC addresses. In a MAC address glob, you can use a single asterisk (*) as a wildcard to match all MAC addresses, or as follows to match from 1 byte to 5 bytes of the MAC address: 00:* 00:01:* 00:01:02:* 00:01:02:03:* 00:01:02:03:04:* For example, the MAC address glob 02:06:8c* represents all MAC addresses starting with 02:06:8c. Specifying only the first 3 bytes of a MAC address allows you to apply commands to MAC addresses based on an organizationally unique identity (OUI). 28 CHAPTER 1: USING THE COMMAND-LINE INTERFACE VLAN Globs A VLAN glob is a method for matching one of a set of local rules on an wireless LAN switch, known as the location policy, to one or more users. MSS compares the VLAN glob, which can optionally contain wildcard characters, against the VLAN-Name attribute returned by AAA, to determine whether to apply the rule. To match all VLANs, use the double-asterisk (**) wildcard characters with no delimiters. To match any number of characters up to, but not including, a delimiter character in the glob, use the single-asterisk (*) wildcard. Valid VLAN glob delimiter characters are the at (@) sign and the period (.). For example, the VLAN glob bldg4.* matches bldg4.security and bldg4.hr and all other VLAN names with bldg4. at the beginning. Matching Order for Globs In general, the order in which you enter AAA commands determines the order in which MSS matches the user, MAC address, or VLAN to a glob. To verify the order, view the output of the display aaa or display config command. MSS checks globs that appear higher in the list before items lower in the list and uses the first successful match. Port Lists The physical Ethernet ports on a WX switch can be set for connection to MAP access points, authenticated wired users, or the network backbone. You can include a single port or multiple ports in one MSS CLI command by using the appropriate list format. The ports on a WX switch are numbered 1 and 2 (for the 3Com Remote Office Wireless LAN Switch WXR100), 1 through 4 (for the 3Com Wireless LAN Controller WX4400), and 1 through 8 (for the 3Com Wireless Lan Switch WX1200). No port 0 exists on the WX switch. You can include a single port or multiple ports in a command that includes port port-list. Use one of the following formats for port-list: A single port number. For example: WX1200# set port enable 6 A comma-separated list of port numbers, with no spaces. For example: WX1200# display port poe 1,2,4 Command-Line Editing 29 A hyphen-separated range of port numbers, with no spaces. For example: WX1200# reset port 1-3 Any combination of single numbers, lists, and ranges. Hyphens take precedence over commas. For example: WX1200# display port status 1-3,6 Virtual LAN Identification Command-Line Editing Keyboard Shortcuts The names of virtual LANs (VLANs), which are used in Mobility Domain™ communications, are set by you and can be changed. In contrast, VLAN ID numbers, which the wireless LAN uses locally, are determined when the VLAN is first configured and cannot be changed. Unless otherwise indicated, you can refer to a VLAN by either its VLAN name or its VLAN number. CLI set and display commands use a VLAN’s name or number to uniquely identify the VLAN within the WX. MSS editing functions are similar to those of many other network operating systems. The following table lists the keyboard shortcuts for entering and editing CLI commands. Table 4 Keyboard Shortcuts Keyboard Shortcut(s) Function Ctrl+A Jumps to the first character of the command line. Ctrl+B or Left Arrow key Moves the cursor back one character. Ctrl+C Escapes and terminates prompts and tasks. Ctrl+D Deletes the character at the cursor. Ctrl+E Jumps to the end of the current command line. Ctrl+F or Right Arrow key Moves the cursor forward one character. Ctrl+K Deletes from the cursor to the end of the command line. Ctrl+L or Ctrl+R Repeats the current command line on a new line. Ctrl+N or Down Arrow key Enters the next command line in the history buffer. Ctrl+P or Up Arrow key Enters the previous command line in the history buffer. 30 CHAPTER 1: USING THE COMMAND-LINE INTERFACE Table 4 Keyboard Shortcuts (continued) History Buffer Tabs Keyboard Shortcut(s) Function Ctrl+U or Ctrl+X Deletes characters from the cursor to the beginning of the command line. Ctrl+W Deletes the last word typed. Esc B Moves the cursor back one word. Esc D Deletes characters from the cursor forward to the end of the word. Delete key or Backspace key Erases mistake made during command entry. Reenter the command after using this key. The history buffer stores the last 63 commands you entered during a terminal session. You can use the Up Arrow and Down Arrow keys to select a command that you want to repeat from the history buffer. The MSS CLI uses the Tab key for command completion. You can type the first few characters of a command and press the Tab key to show the command(s) that begin with those characters. For example: WX1200# display iifm display interfaces maintained by the interface manager igmp display igmp information interface display interfaces ip display ip information Single-Asterisk (*) Wildcard Character Double-Asterisk (**) Wildcard Characters You can use the single-asterisk (*) wildcard character in globbing. (For details, see “User Globs, MAC Address Globs, and VLAN Globs” on page 26.) The double-asterisk (**) wildcard character matches all usernames. For details, see “User Globs” on page 26. Using CLI Help Using CLI Help 31 The CLI provides online help. To see the full range of commands available at your access level, type the help command. For example: WX1200# help Commands: ------------------------------------------------------------------------clear Clear, use 'clear help' for more information commit Commit the content of the ACL table copy Copy from filename (or url) to filename (or url) crypto Crypto, use 'crypto help' for more information delete Delete url dir Show list of files on flash device disable Disable privileged mode display Display, use 'display help' for more information exit Exit from the Admin session help Show this help screen history Show contents of history substitution buffer hit-sample-rate Set NP hit-counter sample rate load Load, use 'load help' for more information logout Exit from the Admin session monitor Monitor, use 'monitor help' for more information ping Send echo packets to hosts quit Exit from the Admin session reset Reset, use 'reset help' for more information rollback Remove changes to the edited ACL table save Save the running configuration to persistent storage set Set, use 'set help' for more information telnet telnet IP address [server port] traceroute Print the route packets take to network host For more information on help, see “help” on page 45. To see a subset of the online help, type the command for which you want more information. For example, to show all the commands that begin with the letter i, type the following command: WX1200# display i? ifm igmp interface ip Show Show Show Show interfaces maintained by the interface manager igmp information interfaces ip information 32 CHAPTER 1: USING THE COMMAND-LINE INTERFACE To see all the variations, type one of the commands followed by a question mark (?). For example: WX1200# display ip ? alias display ip aliases dns display DNS status https display ip https route display ip route table telnet display ip telnet To determine the port on which Telnet is running, type the following command: WX1200# display ip telnet Server Status Port ---------------------------------Enabled 23 Understanding Command Descriptions Each command description in the 3Com Mobility System Software Command Reference contains the following elements: A command name, which shows the keywords but not the variables. For example, the following command name appears at the top of a command description and in the index: set {ap | dap} name The set {ap | dap} name command has the following complete syntax: set {ap port-list | dap dap-num} name name A brief description of the command’s functions. The full command syntax. Any command defaults. The command access, which is either enabled or all. All indicates that anyone can access this command. Enabled indicates that you must enter the enable password before entering the command. The command history, which identifies the MSS version in which the command was introduced and the version numbers of any subsequent updates. Special tips for command usage. These are omitted if the command requires no special usage. One or more examples of the command in context, with the appropriate system prompt and response. One or more related commands. 2 ACCESS COMMANDS This chapter describes access commands used to control access to the Mobility Software System (MSS) command-line interface (CLI). Commands by Usage This chapter presents access services commands alphabetically. Use Table 5 to located commands in this chapter based on their use. Table 5 Access Commands by Usage Type Command Access Privileges “enable” on page 34 “set enablepass” on page 35 “disable” on page 33 “quit” on page 34 disable Changes the CLI session from enabled mode to restricted access. Syntax — disable Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command restricts access to the CLI for the current session: WX1200# disable WX1200> See Also enable on page 34 34 CHAPTER 2: ACCESS COMMANDS enable Places the CLI session in enabled mode, which provides access to all commands required for configuring and monitoring the system. Syntax — enable Access — All. History — Introduced in MSS Version 3.0. Usage — MSS displays a password prompt to challenge you with the enable password. To enable a session, your or another administrator must have configured the enable password to this WX switch with the set enablepass command. Examples — The following command plus the enable password provides enabled access to the CLI for the current sessions: WX1200> enable Enter password: password WX1200# See Also quit set enablepass on page 35 set confirm on page 50 Exit from the CLI session. Syntax — quit Defaults — None. Access — All. History — Introduced in MSS Version 3.0. Examples — To end the administrator’s session, type the following command: WX1200> quit set enablepass set enablepass 35 Sets the password that provides enabled access (for configuration and monitoring) to the WX switch. Syntax — set enablepass Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — After typing the set enablepass command, press Enter. If you are entering the first enable password on this WX switch, press Enter at the Enter old password prompt. Otherwise, type the old password. Then type a password of up to 32 alphanumeric characters with no spaces, and reenter it at the Retype new password prompt. CAUTION: Be sure to use a password that you will remember. If you lose the enable password, the only way to restore it causes the system to return to its default settings and wipes out the configuration. Examples — The following example illustrates the prompts that the system displays when the enable password is changed. The passwords you enter are not displayed. WX1200# set enablepass Enter old password: old-password Enter new password: new-password Retype new password: new-password Password changed See Also disable on page 33 enable on page 34 36 CHAPTER 2: ACCESS COMMANDS 3 SYSTEM SERVICE COMMANDS Use system services commands to configure and monitor system information for a WX switch. Commands by Usage This chapter presents system services commands alphabetically. Use Table 6 to located commands in this chapter based on their use. Table 6 System Services Commands by Usage Type Command Auto-Config set auto-config on page 46 Display clear banner motd on page 38 set banner motd on page 49 display banner motd on page 40 set confirm on page 50 set length on page 51 System Identification set prompt on page 53 set system name on page 58 set system location on page 58 set system contact on page 54 set system countrycode on page 54 set system ip-address on page 57 display system on page 42 clear system on page 39 clear prompt on page 39 Help help on page 45 History history on page 46 38 CHAPTER 3: SYSTEM SERVICE COMMANDS Table 6 System Services Commands by Usage (continued) Type Command clear history on page 38 License display license on page 42 set license on page 52 Technical Support clear banner motd display base-information on page 41 Deletes the message-of-the-day (MOTD) banner that is displayed before the login prompt for each CLI session on the wireless LAN switch. Syntax — clear banner motd Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — To clear a banner, type the following command: WX4400# clear banner motd success: change accepted As an alternative to clearing the banner, you can overwrite the existing banner with an empty banner by typing the following command: set banner motd ^^ See Also clear history display banner motd on page 40 set banner motd on page 49 Deletes the command history buffer for the current CLI session. Syntax — clear history Defaults — None. Access — All. History — Introduced in MSS Version 3.0. clear prompt 39 Examples — To clear the history buffer, type the following command: WX4400# clear history success: command buffer was flushed. See Also clear prompt history on page 46 Resets the system prompt to its previously configured value. If the prompt was not configured previously, this command resets the prompt to its default. Syntax — clear prompt Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — To reset the prompt, type the following command: wildebeest# clear prompt success: change accepted. WX4400-01c840# See Also clear system set prompt on page 53. (For information about default prompts, see “Command Prompts” on page 24.) Clears the system configuration of the specified information. CAUTION: If you change the IP address, any currently configured Mobility Domain operations cease. You must reset the Mobility Domain. Syntax — clear system [contact | countrycode | ip-address | location | name] contact — Resets the name of contact person for the WX switch to null. countrycode — Resets the country code for the WX switch to null. ip-address — Resets the IP address of the WX switch to null. 40 CHAPTER 3: SYSTEM SERVICE COMMANDS location — Resets the location of the WX switch to null. name — Resets the name of the WX switch to the default system name, which is the model number. Defaults — None. Access — Enabled. History — —Introduced in MSS Version 3.0. Examples — To clear the location of the WX switch, type the following command: WX4400# clear system location success: change accepted. See Also display banner motd display config on page 548 display system on page 42 set system contact on page 54 set system countrycode on page 54 set system ip-address on page 57 set system location on page 58 Shows the banner that was configured with the set banner motd command. Syntax — display banner motd Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — To show the banner with the message of the day, type the following command: WX4400# display banner motd hello world display base-information 41 See Also display base-information clear banner motd on page 38 set banner motd on page 49 Provides an in-depth snapshot of the status of the wireless LAN switch, which includes details about the boot image, the version, ports, and other configuration values. This command also displays the last 100 log messages. Syntax — display base-information [file [subdirname/]filename] [subdirname/]filename — Optional subdirectory name, and a string up to 32 alphanumeric characters. The command’s output is saved into a file with the specified name in nonvolatile storage. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — Enter this command before calling for Technical Support. See “Obtaining Support for your Product” on page 607 for more information. See Also display boot on page 547 display config on page 548 display license on page 42 display system on page 42 display version on page 549 42 CHAPTER 3: SYSTEM SERVICE COMMANDS display license Displays information about the license currently installed on the WX switch. Syntax — display license Defaults — None. Access — All. Examples — To view the WX switch license, type the following command: WX4400# display license Serial Number : M8XE4IBB8DB10 License Number License Key Activation key Feature Expires : : : : : 245 WXL-076E-93E9-62DA-54D8 WXA-3E04-4CC2-430D-B508 24 additional ports Never The additional ports refers to the number of additional MAPs the switch can boot and actively manage. See Also display system set license on page 52 Shows system information. Syntax — display system Defaults — None. Access — Enabled. Examples — To show system information, type the following command: WX4400# display system =============================================================================== Product Name: WX4400 System Name: WX-bldg3 System Countrycode: US System Location: first-floor-bldg3 System Contact: tamara@example.com display system 43 System IP: 192.168.12.7 System MAC: 00:0B:0E:00:04:30 =============================================================================== Boot Time: 2003-11-07 15:45:49 Uptime: 13 days 04:29:10 =============================================================================== Fan status: fan1 OK fan2 OK fan3 OK Temperature: temp1 ok temp2 ok temp3 ok PSU Status: Lower Power Supply DC ok AC ok Upper Power Supply missing Memory: 97.04/744.03 (13%) Total Power Over Ethernet : 29.000 =============================================================================== Table 7 describes the fields of display system output. Table 7 display system output Field Description Product Name Switch model number. System Name System name (factory default, or optionally configured with set system name). System Countrycode Country-specific 802.11 code required for MAP operation (configured with set system countrycode). System Location Record of the WX switch’s physical location (optionally configured with set system location). System Contact Contact information about the system administrator or another person to contact about the system (optionally configured with set system contact). System IP Common interface, source, and default IP address for the device, in dotted decimal notation (configured with set system ip-address). System MAC WX switch’s media access control (MAC) machine address set at the factory, in 6-byte hexadecimal format. License License level installed on the WX switch (if applicable). Boot Time Date and time of the last system reboot. Uptime Number of days, hours, minutes, and seconds that the WX has been operating since its last restart. 44 CHAPTER 3: SYSTEM SERVICE COMMANDS Table 7 display system output (continued) Field Description Fan status Operating status of the WX switch’s three cooling fans: OK — Fan is operating. Failed — Fan is not operating. MSS sends an alert to the system log every 5 minutes until this condition is corrected. Fan 1 is located nearest the front of the chassis, and fan 3 is located nearest the back. Temperature PSU Status Memory Status of temperature sensors at three locations in the WX: ok — Temperature is within the acceptable range of 0° C to 50° C (32° F to 122° F). Alarm — Temperature is above or below the acceptable range. MSS sends an alert to the system log every 5 minutes until this condition is corrected. Status of the lower and upper power supply units: missing — Power supply is not installed or is inoperable. DC ok — Power supply is producing DC power. DC output failure — Power supply is not producing DC power. MSS sends an alert to the system log every 5 minutes until this condition is corrected. AC ok — Power supply is receiving AC power. AC not present — Power supply is not receiving AC power. Current size (in megabytes) of nonvolatile memory (NVRAM) and synchronous dynamic RAM (SDRAM), plus the percentage of total memory space in use, in the following format: NVRAM size /SDRAM size (percent of total) Total Power Over Ethernet Total power that the device is currently supplying to its directly connected MAP access points, in watts. See Also clear system on page 39 set system contact on page 54 set system countrycode on page 54 set system ip-address on page 57 set system location on page 58 set system name on page 58 help help 45 Displays a list of commands that can be used to configure and monitor the WX switch. Syntax — help Defaults — None. Access — All. History — Introduced in MSS Version 3.0. Examples — Use this command to see a list of available commands. If you have restricted access, you see fewer commands than if you have enabled access. To show a list of CLI commands available at the enabled access level, type the following command at the enabled access level: WX4400# help Commands: ------------------------------------------------------------------------clear Clear, use 'clear help' for more information commit Commit the content of the ACL table copy Copy from filename (or url) to filename (or url) crypto Crypto, use 'crypto help' for more information delete Delete url dir Show list of files on flash device disable Disable privileged mode display Display, use 'display help' for more information exit Exit from the Admin session help Show this help screen history Show contents of history substitution buffer hit-sample-rate Set NP hit-counter sample rate load Load, use 'load help' for more information logout Exit from the Admin session monitor Monitor, use 'monitor help' for more information ping Send echo packets to hosts quit Exit from the Admin session reset Reset, use 'reset help' for more information rollback Remove changes to the edited ACL table save Save the running configuration to persistent storage set Set, use 'set help' for more information telnet telnet IP address [server port] traceroute Print the route packets take to network host See Also “Using CLI Help” on page 31 46 CHAPTER 3: SYSTEM SERVICE COMMANDS history Displays the command history buffer for the current CLI session. Syntax — history Defaults — None. Access — All. History — Introduced in MSS Version 3.0. Examples — To show the history of your session, type the following command: WX4400> history Show History (most recent first) -------------------------------[00] display config [01] display version [02] enable See Also set auto-config clear history on page 38 Enables a WX switch to contact a 3Com Wireless Switch Manager server for its configuration. Syntax — set auto-config {enable | disable} enable — Enables the switch to contact a 3Com Wireless Switch Manager server to request a configuration. disable — Disables the auto-config option. Defaults — The auto-config option is automatically enabled on an unconfigured WXR100 when the Fn switch is pressed during power on. However, auto-config is disabled by default on other models. Access — Enabled. History — Introduced in MSS Version 4.0. set auto-config 47 Usage — A network administrator at the corporate office can preconfigure the switch in a 3Com Wireless Switch Manager network plan. The switch configuration must have a name for the switch, the model must be WXR100, and the serial number must match the switch’s serial number. The configuration should also include all other settings required for the deployment, including MAP configuration, SSIDs, AAA settings, and so on. When the 3Com Wireless Switch Manager server in the corporate network receives the configuration request, the server looks in the currently open network plan for a switch configuration with the same model and serial number as the one in the configuration request. If the network plan contains a configuration with a matching model and serial number, the 3Com Wireless Switch Manager sends the configuration to the switch and restarts the switch. The switch boots using the configuration it received from the 3Com Wireless Switch Manager. If the network plan does not have a configuration with a matching model and serial number, a verification warning appears in the 3Com Wireless Switch Manager. The warning lists the switch’s serial number and IP address. The network administrator can upload the switch into the network plan, configure switch parameters, and deploy the configuration to the switch. To use the auto-config option with a new (unconfigured) WXR100, insert a paperclip or similar object into the WXR100’s Fn hole to press the switch. The Fn switch must be held for about 3 seconds while the Fn LED (the right LED above port 1) is lit. Normally, this LED remains solidly lit for 3 seconds after power on. However, when the Fn switch is pressed, the LED flashes for 3 seconds instead. If you want another WX switch model to be able to access a 3Com Wireless Switch Manager server for a configuration, you also must preconfigure the WX with the following information: IP address Gateway address Domain name and DNS server address 48 CHAPTER 3: SYSTEM SERVICE COMMANDS You can enable the switch to use the MSS DHCP client to obtain this information from a DHCP server in the local network where the switch will be deployed. Alternatively, you can statically configure the information. The IP address and DNS information are configured independently. You can configure the combination of settings that work with the network resources available at the deployment site. The following examples show some of the combinations you can configure. Examples — The following commands stage a WX-1200 switch to use the auto-config option. The network where the switch is installed has a DHCP server, so the switch is configured to use the MSS DHCP client to obtain an IP address, default gateway address, DNS domain name, and DNS server IP addresses. Configure a VLAN: WX-1200# set vlan 1 port 7 success: change accepted. Enable the DHCP client on VLAN 1: WX-1200# set interface 1 ip dhcp-client enable success: change accepted. Enable the auto-config option: WX-1200# set auto-config enable success: change accepted. Create a self-signed administrative certificate, to enable the WX-1200 to communicate with the 3Com Wireless Switch Manager server. WX-1200# crypto generate key admin 1024 key pair generated WX-1200# crypto generate self-signed admin Country Name: State Name: Locality Name: Organizational Name: Organizational Unit: Common Name: remoteswitch1@example.com Email Address: Unstructured Name: set banner motd 49 Self-signed cert for admin is -----BEGIN CERTIFICATE----MIICUzCCAbygAwIBAgICA+cwDQYJKoZIhvcNAQEEBQAwNjELMAkGA1UEBhMC VVMx CzAJBgNVBAgTAkNBMRowGAYDVQQDFBF0ZWNocHVic0B0cnB6LmNvbTAeFw0w MzA0 ... Lm8wmVYLxP56MpCUAm9O8C2foYgOY40= -----END CERTIFICATE----- Save the configuration changes: WX-1200# save config success: configuration saved. See Also set banner motd crypto generate key on page 451 crypto generate self-signed on page 454 save config on page 557 set interface dhcp-client on page 144 set vlan port on page 110 Configures the banner string that is displayed before the beginning of each login prompt for each CLI session on the WX switch. Syntax — set banner motd ^text^ ^ — Delimiting character that begins and ends the message. text — Up to 2000 alphanumeric characters, including tabs and carriage returns, but not the delimiting character (^). The maximum number of characters is approximately 24 lines by 80 characters. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — Type a caret (^), then the message, then another caret. 50 CHAPTER 3: SYSTEM SERVICE COMMANDS Do not use the following characters with commands in which you set text to be displayed on the WX switch, such as message-of-the-day (MOTD) banners: Ampersand (&) Angle brackets (< >) Double quotation marks (“”) Number sign (#) Question mark (?) Single quotation mark (') Examples — To create a banner that says Update meeting at 3 p.m., type the following command: WX4400# set banner motd ^Update meeting at 3 p.m.^ success: change accepted. See Also set confirm clear banner motd on page 38 display banner motd on page 40 Enables or disables the display of confirmation messages for commands that might have a large impact on the network. Syntax — set confirm {on | off} on — Enables confirmation messages. off — Disables confirmation messages. Defaults — Configuration messages are enabled. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — This command remains in effect for the duration of the session, until you enter a quit command, or until you enter another set confirm command. set length 51 MSS displays a message requiring confirmation when you enter certain commands that can have a potentially large impact on the network. For example: WX4400# clear vlan red This may disrupt user connectivity. Do you wish to continue? (y/n) [n] Examples — To turn off these confirmation messages, type the following command: WX4400# set confirm off success: Confirm state is off set length Defines the number of lines of CLI output to display between paging prompts. MSS displays the set number of lines and waits for you to press any key to display another set, or type q to quit the display. Syntax — set length number-of-lines number-of-lines — Number of lines of text to display between paging prompts. You can specify from 0 to 512. The 0 value disables the paging prompt action entirely. Defaults — MSS displays 24 lines by default. Access — All. History — Introduced in MSS Version 3.0. Usage — Use this command if the output of a CLI command is greater than the number of lines allowed by default for a terminal type. Examples — To set the number of lines displayed to 100, type the following command: WX4400# set length 100 success: screen length for this session set to 100 52 CHAPTER 3: SYSTEM SERVICE COMMANDS set license Installs an upgrade license, for managing more MAPs. Syntax — set license license-key activation-key license-key — License key, starting with WXL. You can enter the key with or without the hyphens. activation-key — Activation key, starting with WXA. You can enter the key with or without the hyphens. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — The license key is shipped with the switch. To obtain the activation key, access the 3Com web site. Each license and activation key pair allows the switch to actively manage an additional 24 MAPs. You can install up to three upgrade license and activation key pairs, to actively manage up to 96 MAPs. Examples — To install an upgrade license and activation key, type the following command: WX4400# set license WXL-076E-93E9-62DA-54D8 WXA-3E04-4CC2-430D-B508 Serial Number : M8XE4IBB8DB10 License Number License Key Activation key Feature Expires : : : : : 245 WXL-076E-93E9-62DA-54D8 WXA-3E04-4CC2-430D-B508 24 additional ports Never 48 ports are enabled success: license was installed The additional ports refers to the number of additional MAPs the switch can boot and actively manage. See Also display license on page 42 set prompt set prompt 53 Changes the CLI prompt for the WX switch to a string you specify. Syntax — set prompt string string — Alphanumeric string up to 32 characters long. To include spaces in the prompt, you must enclose the string in double quotation marks (“”). Defaults — The factory default for the WX switch name is the model number (WX1200 for the 3Com Wireless LAN Switch WX1200, WX4400 for the 3Com Wireless LAN Controller WX4400, WXR100 for the 3Com Remote Office Wireless LAN Switch) followed by the last three octets of the switch’s MAC address. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — When you first log in for the initial configuration of the WX switch, the CLI provides a WXR100>, WX1200> or WX4400> prompt, depending on your model. After you become enabled by typing enable and giving a suitable password, the WXR100#, WX1200# or WX4400# prompt is displayed. If you use the set system name command to change the default system name, MSS uses that name in the prompt, unless you also change the prompt with set prompt. Examples — The following example sets the prompt from WX4400 to happy_days: WX4400# set prompt happy_days success: change accepted. happy_days# See Also clear prompt on page 39 display config on page 548 set system name on page 58 54 CHAPTER 3: SYSTEM SERVICE COMMANDS set system contact Stores a contact name for the WX switch. Syntax — set system contact string string — Alphanumeric string up to 256 characters long, with no blank spaces. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. To view the system contact string, type the display system command. Examples — The following command sets the system contact information to tamara@example.com: WX1200# set system contact tamara@example.com success: change accepted. See Also set system countrycode clear system on page 39 display system on page 42 set system location on page 58 set system name on page 58 Defines the country-specific IEEE 802.11 regulations to enforce on the WX switch. Syntax — set system countrycode code code — Two-letter code for the country of operation for the WX switch. You can specify one of the codes listed in Table 8. Table 8 Country Codes Country Code Argentina AR Australia AU set system countrycode Table 8 Country Codes (continued) Country Code Austria AT Belgium BE Brazil BR Bulgaria BG Canada CA Chile CL China CN Columbia CO Croatia HR Cyprus CY Czech Republic CZ Denmark DK Estonia EE Finland FI France FR Germany DE Greece GR Hong Kong HK Hungary HU Iceland IS India IN Ireland IE Israel IL Italy IT Japan JP Latvia LV Liechtenstein LI Lithuania LT Luxembourg LU Malaysia MY Malta MT Mexico MX 55 56 CHAPTER 3: SYSTEM SERVICE COMMANDS Table 8 Country Codes (continued) Country Code Morocco MA Netherlands NL New Zealand NZ Norway NO Peru PE Philippines PH Poland PL Portugal PT Romania RO Russia RU Saudi Arabia SA Singapore SG Slovakia SK Slovenia SI South Africa ZA South Korea KR Spain ES Sweden SE Switzerland CH Taiwan TW Thailand TH Turkey TR United Arab Emirates AE United Kingdom GB United States US Defaults — The factory default country code is None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — You must set the system county code to a valid value before using any set ap commands to configure a MAP. set system ip-address 57 Examples — To set the country code to Canada, type the following command: WX1200# set system country code CA success: change accepted. See Also set system ip-address display config on page 548 Sets the system IP address so that it can be used by various services in the WX switch. CAUTION: Any currently configured Mobility Domain operations cease if you change the IP address. If you change the address, you must reset the Mobility Domain. Syntax — set system ip-address ip-addr ip-addr — IP address, in dotted decimal notation. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command sets the IP address of the WX switch to 192.168.253.1: WX4400# set system ip-address 192.168.253.1 success: change accepted. See Also clear system on page 39 set interface on page 143 display system on page 42 58 CHAPTER 3: SYSTEM SERVICE COMMANDS set system location Stores location information for the WX switch. Syntax — set system location string string — Alphanumeric string up to 256 characters long, with no blank spaces. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — You cannot include spaces in the system location string. To view the system location string, type the display system command. Examples — To store the location of the WX switch in the WX’s configuration, type the following command: WX4400# set system location first-floor-bldg3 success: change accepted. See Also set system name clear system on page 39 display system on page 42 set system contact on page 54 set system name on page 58 Changes the name of the WX switch from the default system name and also provides content for the CLI prompt, if you do not specify a prompt. Syntax — set system name string string — Alphanumeric string up to 256 characters long, with no blank spaces. Use a unique name for each WX switch. set system name 59 Defaults — By default, the system name and command prompt have the same value. The factory default for both is the model number (WXR100 for the 3Com Remote Office Wireless LAN Switch WXR100, WX1200 for the 3Com Wireless LAN Switch WX1200, WX4400 for the 3Com Wireless LAN Controller WX4400) followed by the last three octets of the switch’s MAC address. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — Entering set system name with no string resets the system name to the factory default. To view the system name string, type the display system command. Examples — The following example sets the system name to a name that identifies the WX switch: WX4400# set system name WX-bldg3 success: change accepted. WX-bldg3# See Also clear system on page 39 display system on page 42 set prompt on page 53 set system contact on page 54 set system location on page 58 60 CHAPTER 3: SYSTEM SERVICE COMMANDS 4 PORT COMMANDS Use port commands to configure and manage individual ports and load-sharing port groups. Commands by Usage This chapter presents port commands alphabetically. Use Table 9 to locate commands in this chapter based on their use. Table 9 Port Commands by Usage Type Command Port Type set port type ap on page 87 set dap on page 77 set port type wired-auth on page 91 clear port type on page 65 clear dap on page 62 Name set port name on page 82 clear port name on page 64 State set port on page 80 reset port on page 77 display port status on page 70 Gigabit Interface Type display port preference on page 69 set port preference on page 85 clear port preference on page 64 Speed set port speed on page 85 Autonegotiation set port negotiation on page 83 PoE set port poe on page 84 display port poe on page 68 SNMP set port trap on page 86 62 CHAPTER 4: PORT COMMANDS Table 9 Port Commands by Usage (continued) Type Command Port Groups set port-group on page 81 display port-group on page 67 clear port-group on page 63 Statistics display port counters on page 66 monitor port counters on page 72 clear port counters on page 63 clear dap Removes a Distributed MAP. CAUTION: When you clear a Distributed MAP, MSS ends user sessions that are using the MAP. Syntax — clear dap dap-num dap-num — Number of the Distributed MAP(s) you want to remove. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command clears Distributed MAP 1: WX4400# clear dap 1 This will clear specified DAP devices. Would you like to continue? (y/n) [n]y See Also set dap on page 77 set port type ap on page 87 clear port counters clear port counters 63 Clears port statistics counters and resets them to 0. Syntax — clear port counters Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command clears all port statistics counters and resets them to 0: WX4400# clear port counters success: cleared port counters See Also clear port-group display port counters on page 66 monitor port counters on page 72 Removes a port group. Syntax — clear port-group name name name name — Name of the port group. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command clears port group server1: WX4400# clear port-group name server1 success: change accepted. See Also set port-group on page 81 display port-group on page 67 64 CHAPTER 4: PORT COMMANDS clear port name Removes the name assigned to a port. Syntax — clear port port-list name port-list — List of physical ports. MSS removes the names from all the specified ports. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command clears the names of ports 1 through 3: WX4400# clear port 1-3 name See Also clear port preference display port status on page 70 set port name on page 82 Resets a gigabit Ethernet port on a WX4400 to use the GBIC (fiber) interface for the active link. Syntax — clear port preference port-list port-list — List of physical ports. MSS clears the preference on all the specified ports. Defaults — When both the copper and fiber interfaces of a gigabit Ethernet port are connected, the GBIC (fiber) interface is the active link. The RJ-45 (copper) link is unused. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — This command applies only to the WX4400. This command does not affect a link that is already active on the port. clear port type 65 Examples — The following command clears the preference set on port 2 on a WX4400 switch: WX4400# clear port preference 2 See Also clear port type display port preference on page 69 set port preference on page 85 Removes all configuration settings from a port and resets the port as a network port. CAUTION: When you clear a port, MSS ends user sessions that are using the port. Syntax — clear port type port-list port-list — List of physical ports. MSS resets and removes the configuration from all the specified ports. Defaults — The cleared port becomes a network port but is not placed in any VLANs. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — Use this command to change a port back to a network port. All configuration settings specific to the port type are removed. For example, if you clear an MAP access point port, all MAP-specific settings are removed. Table 10 lists the default network port settings that MSS applies when you clear a port’s type. Table 10 Network port defaults Port Parameter Setting VLAN membership None. Note: Although the command changes a port to a network port, the command does not place the port in any VLAN. To use the port in a VLAN, you must add the port to the VLAN. 66 CHAPTER 4: PORT COMMANDS Table 10 Network port defaults (continued) Port Parameter Setting Spanning Tree Protocol (STP) Based on the VLAN(s) you add the port to. 802.1X No authorization. Port groups None. Internet Group Management Enabled as port is added to VLANs. Protocol (IGMP) snooping Access point and radio parameters Not applicable Maximum user sessions Not applicable Examples — The following command clears port 5: WX1200# clear port type 5 This may disrupt currently authenticated users. Are you sure? (y/n) [n]y success: change accepted. See Also display port counters set port type ap on page 87 set port type wired-auth on page 91 Displays port statistics. Syntax — display port counters [octets | packets | receive-errors | transmit-errors | collisions | receive-etherstats | transmit-etherstats] [port port-list] octets — Shows octet statistics. packets — Shows packet statistics. receive-errors— Shows errors in received packets. transmit-errors — Shows errors in transmitted packets. collisions — Shows collision statistics. receive-etherstats — Shows Ethernet statistics for received packets. transmit-etherstats — Shows Ethernet statistics for transmitted packets. display port-group 67 port port-list — List of physical ports. If you do not specify a port list, MSS shows statistics for all ports. Defaults — None. Access — All. History — Introduced in MSS Version 3.0. Usage — You can specify one statistic type with the command. Examples — The following command shows octet statistics for port 3: WX1200> display port counters octets port 3 Port Status Rx Octets Tx Octets ============================================================================= 3 Up 27965420 34886544 This command’s output has the same fields as the monitor port counters command. For descriptions of the fields, see Table 16 on page 74. See Also display port-group clear port counters on page 63 monitor port counters on page 72 Shows port group information. Syntax — display port-group [all | name group-name] all — Shows information for all port groups. name group-name — Shows information for the specified port group. Defaults — None. Access — All. History — Introduced in MSS Version 3.0. Examples — The following command displays the configuration of port group server2: WX1200# display port-group name server2 Port group: server2 is up Ports: 5, 7 68 CHAPTER 4: PORT COMMANDS Table 11 describes the fields in the display port-group output. Table 11 Output for display port-group Field Description Port group Name and state (enabled or disabled) of the port group. Ports Ports contained in the port group. See Also display port poe clear port-group on page 63 set port-group on page 81 Displays status information for ports on which Power over Ethernet (PoE) is enabled. Syntax — display port poe [port-list] port-list — List of physical ports. If you do not specify a port list, PoE information is displayed for all ports. Defaults — None. Access — All. History — Introduced in MSS Version 3.0. Examples — The following command displays PoE information for all ports on a WX1200 switch: WX1200# display port poe Link Port PoE PoE Port Name Status Type config Draw ============================================================ 1 1 up disabled off 2 2 down disabled off 3 3 down disabled off 4 4 down MAP enabled 1.44 5 5 down disabled off 6 6 down disabled off Table 12 describes the fields in this display. display port preference 69 Table 12 Output for display port poe Field Description Port Port number. Name Port name. If the port does not have a name, the port number is listed. Link status Link status of the port: Port type PoE config PoE Draw up—The port is connected. down—The port is not connected. Port type: MAP —The port is an MAP access port. - (The port is not an MAP access port.) PoE state: enabled disabled Power draw on the port, in watts. For 10/100 Ethernet ports on which PoE is disabled, this field displays off. For gigabit Ethernet ports, this field displays invalid, because PoE is not supported on gigabit Ethernet ports. The value overcurrent indicates a PoE problem such as a short in the cable. See Also display port preference set port poe on page 84 Displays the interface preferences set on WX4400 gigabit Ethernet ports. Syntax — display port preference [port-list] port-list — List of physical ports. MSS displays the preference for all the specified ports. Defaults — None. Access — All. History — Introduced in MSS Version 3.0. Usage — This command applies only to the WX4400. 70 CHAPTER 4: PORT COMMANDS Examples — The following command displays the preference settings on all four ports of a WX4400 switch: WX4400# display port preference Port Preference =========================================================== 1 GBIC 2 RJ45 3 GBIC 4 GBIC Table 13 describes the fields in this display. Table 13 Output for display port preference Field Description Port Port number. Preference Preference setting: GBIC — The GBIC (fiber) interface is selected as the active interface. RJ45 — The RJ-45 (copper) interface is selected as the active interface. See Also display port status clear port preference on page 64 set port preference on page 85 Displays configuration and status information for ports. Syntax — display port status [port-list] port-list — List of physical ports. If you do not specify a port list, information is displayed for all ports. Defaults — None. Access — All. History — Introduced in MSS Version 3.0. display port status 71 Examples — The following command displays information for all ports on a WX1200 switch: WX1200# display port status Port Name Admin Oper Config Actual Type Media =============================================================================== 1 1 up up auto 100/full network 10/100BaseTx 2 2 up up auto 100/full ap 10/100BaseTx 3 3 up up auto 100/full network 10/100BaseTx 4 4 up down auto network 10/100BaseTx 5 5 up down auto network 10/100BaseTx 6 6 up down auto network 10/100BaseTx 7 7 up down auto network 10/100BaseTx 8 8 up down auto network 10/100BaseTx Table 14 describes the fields in this display. Table 14 Output for display port status Field Description Port Port number. Name Port name. If the port does not have a name, the port number is listed. Admin Administrative status of the port: Oper Config up — The port is enabled. down — The port is disabled. Operational status of the port: up — The port is operational. down — The port is not operational. Port speed configured on the port: 10 — 10 Mbps. 100 — 100 Mbps. 1000 — 1000 Mbps. auto — The port sets its own speed. Actual Speed and operating mode in effect on the port. Type Port type: ap — MAP access point port network — Network port wa — Wired authentication port 72 CHAPTER 4: PORT COMMANDS Table 14 Output for display port status (continued) Field Description Media Link type: 10/100BaseTX — 10/100BASE-T. GBIC — 1000BASE-SX or 1000BASE-LX GBIC. 1000BaseT — 1000BASE-T. No connector — GBIC slot is empty. See Also monitor port counters clear port type on page 65 set port on page 80 set port name on page 82 set port negotiation on page 83 set port speed on page 85 set port type ap on page 87 set port type wired-auth on page 91 Displays and continually updates port statistics. Syntax — monitor port counters [octets | packets | receive-errors | transmit-errors | collisions | receive-etherstats | transmit-etherstats] octets — Displays octet statistics first. packets — Displays packet statistics first. receive-errors — Displays errors in received packets first. transmit-errors — Displays errors in transmitted packets first. collisions — Displays collision statistics first. receive-etherstats — Displays Ethernet statistics for received packets first. transmit-etherstats — Displays Ethernet statistics for transmitted packets first. monitor port counters 73 Defaults — All types of statistics are displayed for all ports. MSS refreshes the statistics every 5 seconds. This interval cannot be configured. Statistics types are displayed in the following order by default: Octets Packets Receive errors Transmit errors Collisions Receive Ethernet statistics Transmit Ethernet statistics Access — All. History—Introduced in MSS Version 3.0. Usage — Each type of statistic is displayed separately. Press the Spacebar to cycle through the displays for each type. If you use an option to specify a statistic type, the display begins with that statistic type. You can use one statistic option with the command. Use the keys listed in Table 15 to control the monitor display. Table 15 Key Controls for Monitor Port Counters Display Field Description Spacebar Advances to the next statistic type. Esc Exits the monitor. MSS stops displaying the statistics and displays a new command prompt. c Clears the statistics counters for the currently displayed statistics type. The counters begin incrementing again. For error reporting, the cyclic redundancy check (CRC) errors include misalignment errors. Jumbo packets with valid CRCs are not counted. A short packet can be reported as a short packet, a CRC error, or an overrun. In some circumstances, the transmitted octets counter might increment a small amount for a port with nothing attached. 74 CHAPTER 4: PORT COMMANDS Examples — The following command starts the port statistics monitor beginning with octet statistics (the default): WX4400# monitor port counters As soon as you press Enter, MSS clears the window and displays statistics at the top of the window. Port Status Rx Octets Tx Octets =============================================================================== 1 Up 27965420 34886544 ... To cycle the display to the next set of statistics, press the Spacebar. In this example, packet statistics are displayed next: Port Status Rx Unicast Rx NonUnicast Tx Unicast Tx NonUnicast =============================================================================== 1 Up 54620 62144 68318 62556 ... Table 16 describes the port statistics displayed by each statistics option. The Port and Status fields are displayed for each option. Table 16 Output for monitor port counters Statistics Option Field Description Displayed for All Options Port Port the statistics are displayed for. Status Port status. The status can be Up or Down. Rx Octets Total number of octets received by the port. octets This number includes octets received in frames that contained errors. Tx Octets Total number of octets received. This number includes octets received in frames that contained errors. monitor port counters 75 Table 16 Output for monitor port counters (continued) Statistics Option Field Description packets Number of unicast packets received. Rx Unicast This number does not include packets that contain errors. Rx NonUnicast Number of broadcast and multicast packets received. This number does not include packets that contain errors. Tx Unicast Number of unicast packets transmitted. This number does not include packets that contain errors. Tx NonUnicast Number of broadcast and multicast packets transmitted. This number does not include packets that contain errors. receive-errors transmit-errors Rx Crc Number of frames received by the port that had the correct length but contained an invalid frame check sequence (FCS) value. This statistic includes frames with misalignment errors. Rx Error Total number of frames received in which the Physical layer (PHY) detected an error. Rx Short Number of frames received by the port that were fewer than 64 bytes long. Rx Overrun Number of frames received by the port that were valid but were longer than 1518 bytes. This statistic does not include jumbo packets with valid CRCs. Tx Crc Number of frames transmitted by the port that had the correct length but contained an invalid FCS value. Tx Short Number of frames transmitted by the port that were fewer than 64 bytes long. Tx Fragment Total number of frames transmitted that were less than 64 octets long and had invalid CRCs. Tx Abort Total number of frames that had a link pointer parity error. 76 CHAPTER 4: PORT COMMANDS Table 16 Output for monitor port counters (continued) Statistics Option Field Description collisions Single Coll Total number of frames transmitted that experienced one collision before 64 bytes of the frame were transmitted on the network. Multiple Coll Total number of frames transmitted that experienced more than one collision before 64 bytes of the frame were transmitted on the network. Excessive Coll Total number of frames that experienced more than 16 collisions during transmit attempts. These frames are dropped and not transmitted. receive-etherstats Total Coll Best estimate of the total number of collisions on this Ethernet segment. Rx 64 Number of packets received that were 64 bytes long. Rx 127 Number of packets received that were from 65 through 127 bytes long. Rx 255 Number of packets received that were from 128 through 255 bytes long. Rx 511 Number of packets received that were from 256 through 511 bytes long. Rx 1023 Number of packets received that were from 512 through 1023 bytes long. Rx 1518 Number of packets received that were from 1024 through 1518 bytes long. transmit-etherstats Tx 64 Number of packets transmitted that were 64 bytes long. Tx 127 Number of packets transmitted that were from 65 through 127 bytes long. Tx 255 Number of packets transmitted that were from 128 through 255 bytes long. Tx 511 Number of packets transmitted that were from 256 through 511 bytes long. Tx 1023 Number of packets transmitted that were from 512 through 1023 bytes long. Tx 1518 Number of packets transmitted that were from 1024 through 1518 bytes long. See Also display port counters on page 66 reset port reset port 77 Resets a port by toggling its link state and Power over Ethernet (PoE) state. Syntax — reset port port-list port-list — List of physical ports. MSS resets all the specified ports. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — The reset command disables the port’s link and PoE (if applicable) for at least 1 second, then reenables them. This behavior is useful for forcing an MAP access point that is connected to two WX switches to reboot over the link to the other switch. Examples — The following command resets port 5: WX1200# reset port 5 See Also set dap set port on page 80 Configures a Distributed MAP for an MAP access point that is indirectly connected to the WX switch through an intermediate Layer 2 or Layer 3 network. Before configuring a Distributed MAP, you must use the set system countrycode command to set the IEEE 802.11 country-specific regulations on the WX switch. See “set system countrycode” on page 54. For an MAP that is directly connected to the WX switch, use the set port type ap command to configure an MAP access port. Syntax — set dap dap-num serial-id serial-ID model {ap2750 | ap3750 | ap7250 | ap8250 | ap8750 | mp-52 | mp-101 | mp-122 | mp-241 | mp-252 | mp-262 | mp-341 | mp-352} [radiotype {11a | 11b | 11g}] 78 CHAPTER 4: PORT COMMANDS dap-num — Number for the Distributed MAP. The range of valid connection numbers depends on the WX switch model: For a WX4400, you can specify a number from 1 to 256. For a WX1200, you can specify a number from 1 to 30. For a WXR100, you can specify a number from 1 to 8. serial-id serial-ID — MAP access point serial ID. The serial ID is listed on the MAP case. To show the serial ID using the CLI, use the display version details command. The serial ID of the AP2750, AP3750, AP7250, AP8250, or AP8750 might be preceded by 4 digits and a slash (example: 0100/). Do not enter these digits or the slash. model {ap2750 | ap3750 | ap7250 | ap8250 | ap8750 | mp-52 | mp-101 | mp-122 | mp-241 | mp-252 | mp-262 | mp-341 | mp-352 | mp-372} — MAP access point model: ap2750 — Contains one radio that can be configured through software for 802.11a or 802.11b/g. An external dual-mode antenna may be used in place of the supplied antenna. ap3750 — Contains one 802.11b/g radio and one 802.11a radio with connectors for optional external antennas for each radio. ap7250 — Contains one 802.11b/g radio. An external antenna may be used in place of the supplied antenna. ap8250 — Contains one 802.11b/g radio. It also has the ability to have an additional 802.11a radio installed in it. An external dual-mode antenna may be used in place of the supplied antenna. ap8750 — Contains one 802.11a radio and one 802.11b/g radio. An external dual-mode antenna may be used in place of the supplied antenna for the 802.11b/g radio. mp-52 — Contains one 802.11a radio and one 802.11b radio, with adjustable external antennas. mp-101 — Contains one radio that can be configured through software for 802.11a or 802.11b. mp-122 — Contains one 802.11a radio and one 802.11b/g radio. mp-241 — Contains one radio that can be configured through software for 802.11a or 802.11b/g. mp-252 — Contains one 802.11a radio and one 802.11b radio. set dap 79 mp-262 — Contains one 802.11a radio and one 802.11b radio, and a connector for an external antenna for the 802.11b/g radio. mp-341 — Contains one radio that can be configured through software for 802.11a or 802.11b/g, and a connector for an external antenna for the 802.11b/g radio. mp-352 — Contains one 802.11a radio and one 802.11b radio, and a connector for an external antenna for the 802.11b/g radio. mp-372 — Contains one 802.11b/g radio and one 802.11a radio with connectors for optional external antennas for each radio. radiotype 11a|11b|11g — Radio type: 11a — 802.11a 11b — 802.11b 11g — 802.11g This option applies only to single-radio models. The value 11g does not apply to model MP-101. Defaults — The default radio type for model MP-101 is 802.11b. The default radio type for model AP2750, AP7250, AP8250, MP-241, and MP-341, and for the 802.11b/g radios in models AP3750, AP8250, AP8750, MP-52, MP-252, and MP-262, and MP-352, is 802.11g in regulatory domains that support 802.11g, or 802.11b in regulatory domains that do not support 802.11g. MAP radios configured for 802.11g also allow associations from 802.11b clients by default. To disable support for 802.11b associations, use the set radio-profile 11g-only command on the radio profile that contains the radio. MAP model MP-262 requires an external antenna for the 802.11b/g radio. You must specify the antenna model. The AP3750 and MAP-3xx models have an internal 802.1b/g antenna as well as a connector for an external antenna, so use of an external antenna is optional on these models. The AP3750 and MAP-372 also have a connector for an optional external 802.11a antenna. MAP models MP-341 and MP-352 have an internal 802.1b/g antenna as well as a connector for an external antenna, so use of an external antenna is optional on these models. The AP2750, AP7250, AP8250, and AP8750 models are supplied with detachable antennas which may be replaced by an external dual-mode antenna. To 80 CHAPTER 4: PORT COMMANDS specify the external antenna fitted, use the set {ap | dap} radio antennatype command. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command configures Distributed MAP 1 for MAP model AP3750 with serial-ID M9DE48B012F00: WX4400# set dap 1 serial-id M9DE48B012F00 model ap3750 success: change accepted. The following command removes Distributed MAP 1: WX4400# clear dap 1 This will clear specified DAP devices. Would you like to continue? (y/n) [n]y See Also set port clear dap on page 62 clear port type on page 65 set port type ap on page 87 set radio-profile 11g-only on page 329 set system countrycode on page 54 Administratively disables or reenables a port. Syntax — set port {enable | disable} port-list enable — Enables the specified ports. disable — Disables the specified ports. port-list — List of physical ports. MSS disables or reenables all the specified ports. Defaults — All ports are enabled. Access — Enabled. History — Introduced in MSS Version 3.0. set port-group 81 Usage — A port that is administratively disabled cannot send or receive packets. This command does not affect the link state of the port. Examples — The following command disables port 6: WX1200# set port disable 6 success: set "disable" on port 6 The fol1owing command reenables the port: WX1200# set port enable 6 success: set "enable" on port 6 See Also set port-group reset port on page 77 Configures a load-sharing port group. All ports in the group function as a single logical link. Syntax — set port-group name mode {on | off} group-name port-list name group-name — Alphanumeric string of up to 255 characters, with no spaces. port-list — List of physical ports. All the ports you specify are configured together as a single logical link. mode {on | off} — State of the group. Use on to enable the group or off to disable the group. The group is enabled by default. Defaults — Once configured, a group is enabled by default. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — You can configure up to 8 ports in a port group, in any combination of ports. The port numbers do not need to be contiguous and you can use 10/100 Ethernet ports and gigabit Ethernet ports in the same port group. After you add a port to a port group, you cannot configure port parameters on the individual port. Instead, change port parameters on the entire group. Specify the group name instead of an individual port name or number in port configuration commands. 82 CHAPTER 4: PORT COMMANDS To add or remove ports in a group that is already configured, change the mode to off, add or remove the ports, then change the mode to on. Examples — The following command configures a port group named server1 containing ports 1 through 5, and enables the link: WX1200# set port-group name server1 1-5 mode on success: change accepted. The following commands disable the link for port group server1, change the list of ports in the group, and reenable the link: WX1200# set port-group name server1 1-5 mode off success: change accepted. WX1200# set port-group name server1 1-4,7 mode on success: change accepted. See Also set port name clear port-group on page 63 display port-group on page 67 Assigns a name to a port. After naming a port, you can use the port name or number in other CLI commands. Syntax — set port port name name port — Number of a physical port. You can specify only one port. name name — Alphanumeric string of up to 16 characters, with no spaces. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — To simplify configuration and avoid confusion between a port’s number and its name, 3Com recommends that you do not use numbers as port names. set port negotiation 83 Examples — The following command sets the name of port 7 to adminpool: WX1200# set port 7 name adminpool success: change accepted. See Also set port negotiation clear port name on page 64 display port status on page 70 Disables or reenables autonegotiation on gigabit Ethernet or 10/100 Ethernet ports. Syntax — set port negotiation port-list {enable | disable} port-list — List of physical ports. MSS disables or reenables autonegotiation on all the specified ports. enable — Enables autonegotiation on the specified ports. disable — Disables autonegotiation on the specified ports. Defaults — Autonegotiation is enabled on all Ethernet ports by default. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — WX1200 10/100 Ethernet ports support half-duplex and full-duplex operation. Examples — The following command disables autonegotiation on ports 3 and 5: WX1200# set port negotiation 3,5 disable The following command enables autonegotiation on port 2: WX1200# set port negotiation 2 enable 84 CHAPTER 4: PORT COMMANDS set port poe Enables or disables Power over Ethernet (PoE) on ports connected to MAP access points. CAUTION: When you set the port type for MAP use, you can enable PoE on the port. Use the WX switch’s PoE to power 3Com MAP access points only. If you enable PoE on ports connected to other devices, damage can result. Syntax — set port poe port-list enable | disable port-list — List of physical ports. MSS disables or reenables PoE on all the specified ports. enable — Enables PoE on the specified ports. disable — Disables PoE on the specified ports. Defaults — PoE is disabled on network and wired authentication ports. The state on MAP access point ports depends on whether you enabled or disabled PoE when setting the port type. See set port type ap on page 87. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — This command does not apply to any gigabit Ethernet ports or to ports 7 and 8 on the WX1200 switch. Examples — The following command disables PoE on ports 4 and 5, which are connected to an MAP access point: WX1200# set port poe 4,5 disable If you are enabling power on these ports, they must be connected only to approved PoE devices with the correct wiring. Do you wish to continue? (y/n) [n]y The following command enables PoE on ports 4 and 5: WX1200# set port poe 4,5 enable If you are enabling power on these ports, they must be connected only to approved PoE devices with the correct wiring. Do you wish to continue? (y/n) [n]y See Also set port type ap on page 87 set port type wired-auth on page 91 set port preference set port preference 85 Configures a gigabit Ethernet port on a WX4400 to use the RJ-45 (copper) interface, when available, as the active link instead of the fiber interface. Syntax — set port preference port-list rj45 port-list — List of physical ports. MSS sets the preference on all the specified ports. rj45 — Prefers the copper interface. Defaults — When both the copper and fiber interfaces of a gigabit Ethernet port are connected, the GBIC (fiber) interface is the active link. The RJ-45 (copper) link is unused. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — This command applies only to the WX4400. If you set the preference to RJ-45 (copper) on a port that already has an active fiber link, MSS immediately changes the link to the copper interface. Examples — The following command sets the preference of port 2 on a WX4400 to RJ-45 (copper): WX4400# set port preference 2 rj45 See Also set port speed clear port preference on page 64 display port preference on page 69 Changes the speed of a port. Syntax — set port speed port-list {10 | 100 | 1000 | auto} port-list — List of physical ports. MSS sets the port speed on all the specified ports. 10 — Sets the port speed of a 10/100 Ethernet port to 10 Mbps and sets the operating mode to full-duplex. 86 CHAPTER 4: PORT COMMANDS 100 — Sets the port speed of a 10/100 Ethernet port to 100 Mbps and sets the operating mode to full-duplex. 1000 — Sets the port speed of a gigabit Ethernet port to 1000 Mbps and sets the operating mode to full-duplex. auto — Enables a port to detect the speed and operating mode of the traffic on the link and set itself accordingly. Defaults — All ports are set to auto. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command sets the port speed on ports 1 and 3 through 4 to 10 Mbps and sets the operating mode to full-duplex: WX1200# set port speed 1,3-4 10 set port trap Enables or disables Simple Network Management Protocol (SNMP) linkup and linkdown traps on an individual port. Syntax — set port trap port-list {enable | disable} port-list — List of physical ports. enable — Enables the Telnet server. disable — Disables the Telnet server. Defaults — SNMP linkup and linkdown traps are disabled by default. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — The set port trap command overrides the global setting of the set snmp profile command. The set port type command does not affect the global trap information displayed by the display snmp configuration command. For example, if you globally enable linkup and linkdown traps but then disable the traps on a single port, the display snmp configuration command still indicates that the traps are globally enabled. set port type ap 87 Examples — The following command enables SNMP linkup and linkdown traps on ports 3 and 4: WX1200# set port trap 3-4 enable See Also set port type ap display snmp configuration on page 136 set ip snmp server on page 152 set snmp community on page 160 set snmp profile on page 167 set snmp notify target on page 162 Configures an WX switch port for an MAP access point. CAUTION: When you set the port type for MAP use, you must specify the PoE state (enable or disable) of the port. Use the WX switch’s PoE to power 3Com MAP access points only. If you enable PoE on a port connected to another device, physical damage to the device can result. Before configuring a port as an MAP access point port, you must use the set system countrycode command to set the IEEE 802.11 country-specific regulations on the WX switch. See “set system countrycode” on page 54. For an MAP that is indirectly connected to the WX switch through an intermediate Layer 2 or Layer 3 network, use the set dap command to configure a Distributed MAP. Before changing the port type from ap to wired-auth or from wired-auth to ap, you must reset the port with the clear port type command. Syntax — set port type ap port-list model {ap2750 | ap3750 | ap7250 | ap8250 | ap8750 | mp-52 | mp-101 | mp-122 | mp-241 | mp-252 | mp-262 | mp-341 | mp-352| mp-372} poe {enable | disable} [radiotype {11a | 11b | 11g}] port-list — List of physical ports. model {ap2750 | ap3750 | ap7250 | ap8250 | ap8750 | mp-52 | mp-101 | mp-122 | mp-241 | mp-252 | mp-262 | mp-341 | mp-352| mp-372} — MAP access point model: 88 CHAPTER 4: PORT COMMANDS ap2750 — Contains one radio that can be configured through software for 802.11a or 802.11b/g. An external dual-mode antenna may be used in place of the supplied antenna. ap3750 — Contains one 802.11b/g radio and one 802.11a radio with connectors for optional external antennas for each radio. ap7250 — Contains one 802.11b/g radio. An external antenna may be used in place of the supplied antenna. ap8250 — Contains one 802.11b/g radio. It also has the ability to have an additional 802.11a radio installed in it. An external dual-mode antenna may be used in place of the supplied antenna. ap8750 — Contains one 802.11a radio and one 802.11b/g radio. An external dual-mode antenna may be used in place of the supplied antenna for the 802.11b/g radio. mp-52 — Contains one 802.11a radio and one 802.11b radio, with adjustable external antennas. mp-101 — Contains one radio that can be configured through software for 802.11a or 802.11b. mp-122 — Contains one 802.11a radio and one 802.11b/g radio. mp-241 — Contains one radio that can be configured through software for 802.11a or 802.11b/g. mp-252 — Contains one 802.11a radio and one 802.11b radio. mp-262 — Contains one 802.11a radio and one 802.11b radio, and a connector for an external antenna for the 802.11b/g radio. mp-341 — Contains one radio that can be configured through software for 802.11a or 802.11b/g, and a connector for an external antenna for the 802.11b/g radio. mp-352 — Contains one 802.11a radio and one 802.11b radio, and a connector for an external antenna for the 802.11b/g radio. mp-372 — Contains one 802.11b/g radio and one 802.11a radio with connectors for optional external antennas for each radio. poe enable | disable — Power over Ethernet (PoE) state. radiotype 11a | 11b | 11g — Radio type: 11a — 802.11a 11b — 802.11b 11g — 802.11g set port type ap 89 This option does not apply to single-radio models. The value 11g does not apply to model MP-101. Defaults — All WX ports are network ports by default. The default radio type for model MP-101 is 802.11b. The default radio type for model AP2750, AP7250, MP-241, and MP-341, and for the 802.11b/g radios in models AP3750, AP8250, AP8750, MP-52, MP-252, MP-262, and MP-352 is 802.11g in regulatory domains that support 802.11g, or 802.11b in regulatory domains that do not support 802.11g. MAP radios configured for 802.11g also allow associations from 802.11b clients by default. To disable support for 802.11b associations, use the set radio-profile 11g-only command on the radio profile that contains the radio. MAP model MP-262 requires an external antenna for the 802.11b/g radio. You must specify the antenna model. The AP3750 and MAP-3xx models have an internal 802.1b/g antenna as well as a connector for an external antenna, so use of an external antenna is optional on these models. The AP3750 and MAP-372 also have a connector for an optional external 802.11a antenna. MAP models MP-341 and MP-352 have an internal 802.1b/g antenna as well as a connector for an external antenna, so use of an external antenna is optional on these models. The AP2750, AP7250, AP8250, and AP8750 models are supplied with detachable antennas which may be replaced by an external dual-mode antenna. To specify the external antenna fitted, use the set {ap | dap} radio antennatype command. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — You cannot set a port’s type if the port is a member of a port VLAN. To remove a port from a VLAN, use the clear vlan command. To reset a port as a network port, use the clear port type command. When you change port type, MSS applies default settings appropriate for the port type. Table 17 lists the default settings that MSS applies when you set a port’s type to ap. 90 CHAPTER 4: PORT COMMANDS Table 17 MAP Access Port Defaults Port Parameter Setting VLAN membership Removed from all VLANs. You cannot assign an MAP access port to a VLAN. MSS automatically assigns MAP access ports to VLANs based on user traffic. Spanning Tree Protocol Not applicable (STP) 802.1X Uses authentication parameters configured for users. Port groups Not applicable IGMP snooping Enabled as users are authenticated and join VLANs. Maximum user sessions Not applicable This command does not apply to any gigabit Ethernet ports or to ports 7 and 8 on the WX1200 switch. To manage a MAP access point on a WX4400 switch, use the set dap command to configure a Distributed MAP connection on the switch. Examples — The following command sets ports 1 through 3 and port 5 for MAP access point model AP3750 and enables PoE on the ports: WX1200# set port type ap 1-3,5 model ap3750 poe enable This may affect the power applied on the configured ports. Would you like to continue? (y/n) [n]y The following command sets ports 1 through 3 and port 5 for MAP access point model AP3750 and enables PoE on the ports: WX1200# set port type ap 1-3,5 model ap3750 poe enable This may affect the power applied on the configured ports. Would you like to continue? (y/n) [n]y The following command sets ports 1 through 3 and port 5 for MAP access point model AP8250 and enables PoE on the ports: WX1200# set port type ap 1-3,5 model ap8250 poe enable This may affect the power applied on the configured ports. Would you like to continue? (y/n) [n]y The following command sets ports 1 through 3 and port 5 for MAP access point model AP8750 and enables PoE on the ports: WX1200# set port type ap 1-3,5 model ap8750 poe enable This may affect the power applied on the configured ports. Would you like to continue? (y/n) [n]y set port type wired-auth 91 The following command resets port 5 by clearing it: WX1200# clear port type 5 This may disrupt currently authenticated users. Are you sure? (y/n) [n]y success: change accepted. See Also set port type wired-auth clear dap on page 62 clear port type on page 65 set {ap | dap} radio antennatype on page 315 set dap on page 77 set port type wired-auth on page 91 set radio-profile 11g-only on page 329 set system countrycode on page 54 Configures a WX switch port for a wired authentication user. Before changing the port type from ap to wired-auth or from wired-auth to ap, you must reset the port with the clear port type command. Syntax — set port type wired-auth port-list [tag tag-list] [max-sessions num] [auth-fall-thru {last-resort | none | web portal}] port-list — List of physical ports. tag-list — One or more numbers between 1 and 4094 that subdivide a wired authentication port into virtual ports. num — Maximum number of simultaneous user sessions supported. last resort — Automatically authenticates the user, without requiring a username and password. none— Denies authentication and prohibits the user from accessing the network over this port. web portal — Serves the user a web page from the WX switch’s nonvolatile storage for secure login to the network. 92 CHAPTER 4: PORT COMMANDS Defaults — The default tag-list is null (no tag values). The default number of sessions is 1. The default fallthru authentication type is none. Access — Enabled. History—Version 3.0: Options added to change the fallthru authentication type. This is the authentication type that MSS uses is the user does not support 802.1X and is not authenticated by MAC authentication. Version 4.0: Option for WebAAA fallthru authentication type changed from web-auth to web-portal. Usage — You cannot set a port’s type if the port is a member of a port VLAN. To remove a port from a VLAN, use the clear vlan command. To reset a port as a network port, use the clear port type command. When you change port type, MSS applies default settings appropriate for the port type. Table 18 lists the default settings that MSS applies when you set a port’s type to ap. Table 18 Wired Authentication Port Details Port Parameter Setting VLAN membership Removed from all VLANs. You cannot assign an MAP access port to a VLAN. MSS automatically assigns MAP access ports to VLANs based on user traffic. Spanning Tree Protocol (STP) Not applicable 802.1X Uses authentication parameters configured for users. Port groups Not applicable IGMP snooping Enabled as users are authenticated and join VLANs. Maximum user sessions 1 (one). Fallthru authentication type None. Examples — The following command sets port 2 for a wired authentication user: WX1200# set port type wired-auth 2 success: change accepted set port type wired-auth 93 The following command sets port 7 for a wired authentication user and subdivides the port into three virtual ports to support three simultaneous user sessions: WX1200# set port type wired-auth 7 1,2,3 success: change accepted See Also clear port type on page 65 set port type ap on page 87 94 CHAPTER 4: PORT COMMANDS 5 VLAN COMMANDS Use virtual LAN (VLAN) commands to configure and manage parameters for individual port VLANs on network ports, and to display information about clients roaming within a mobility domain. Commands by usage This chapter presents VLAN commands alphabetically. Use Table 19 to locate commands in this chapter based on their use. Table 19 VLAN Commands by Usage Type Command Creation set vlan name on page 109 Ports set vlan port on page 110 clear vlan on page 97 display vlan config on page 106 Roaming and Tunnels display roaming station on page 102 display roaming vlan on page 104 display tunnel on page 105 Tunnel Affinity set vlan tunnel-affinity on page 111 FDB Entries set fdb on page 107 display fdb on page 98 display fdb count on page 101 clear fdb on page 96 FDB Aging Timeout set fdb agingtime on page 108 display fdb agingtime on page 101 96 CHAPTER 5: VLAN COMMANDS clear fdb Deletes an entry from the forwarding database (FDB). Syntax — clear fdb {perm | static | dynamic | port port-list} [vlan vlan-id] [tag tag-value] perm — Clears permanent entries. A permanent entry does not age out and remains in the database even after a reboot, reset, or power cycle. You must specify a VLAN name or number with this option. static — Clears static entries. A static entry does not age out, but is removed from the database after a reboot, reset, or power cycle. You must specify a VLAN name or number with this option. dynamic — Clears dynamic entries. A dynamic entry is automatically removed through aging or after a reboot, reset, or power cycle. You are not required to specify a VLAN name or number with this option. port port-list — Clears dynamic entries that match destination ports in the port list. You are not required to specify a VLAN name or number with this option. vlan vlan-id — VLAN name or number—required for removing permanent and static entries. For dynamic entries, specifying a VLAN removes entries that match only that VLAN. Otherwise, dynamic entries that match all VLANs are removed. tag tag-value — VLAN tag value that identifies a virtual port. If you do not specify a tag value, MSS deletes only entries that match untagged interfaces. Specifying a tag value deletes entries that match only the specified tagged interfaces Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You can delete forwarding database entries based on entry type, port, or VLAN. A VLAN name or number is required for deleting permanent or static entries. Examples — The following command clears all static forwarding database entries that match VLAN blue: WX4400# clear fdb static vlan blue success: change accepted. clear vlan 97 The following command clears all dynamic forwarding database entries that match all VLANs: WX4400# clear fdb dynamic success: change accepted. The following command clears all dynamic forwarding database entries that match ports 3 and 5: WX4400# clear fdb port 3,5 success: change accepted. See Also clear vlan display fdb on page 98 set fdb on page 107 Removes physical or virtual ports from a VLAN or removes a VLAN entirely. CAUTION: When you remove a VLAN, MSS completely removes the VLAN from the configuration and also removes all configuration information that uses the VLAN. If you want to remove only a specific port from the VLAN, make sure you specify the port number in the command. Syntax — clear vlan vlan-id [port port-list [tag tag-value]] vlan-id — VLAN name or number. port port-list — List of physical ports. MSS removes the specified ports from the VLAN. If you do not specify a list of ports, MSS removes the VLAN entirely. tag tag-value — Tag number that identifies a virtual port. MSS removes only the specified virtual port from the specified physical ports. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. 98 CHAPTER 5: VLAN COMMANDS Usage — If you do not specify a port-list, the entire VLAN is removed from the configuration. You cannot delete the default VLAN but you can remove ports from it. To remove ports from the default VLAN, use the port port-list option. Examples — The following command removes port 1 from VLAN green: WX4400# clear vlan green port 1 This may disrupt user connectivity. Do you wish to continue? (y/n) [n]y success: change accepted. The following command removes port 4, which uses tag value 69, from VLAN red: WX1200# clear vlan red port 4 tag 69 This may disrupt user connectivity. Do you wish to continue? (y/n) [n]y success: change accepted. The following command completely removes VLAN marigold: WX4400# clear vlan marigold This may disrupt user connectivity. Do you wish to continue? (y/n) [n]y success: change accepted. See Also display fdb set vlan port on page 110 display vlan config on page 106 Displays entries in the forwarding database. Syntax — display fdb [mac-addr-glob [vlan vlan-id ]] display fdb {perm | static | dynamic | system | all} [port port-list | vlan vlan-id] mac-addr-glob — A single MAC address or set of MAC addresses. Specify a MAC address, or use the wildcard character (*) to specify a set of MAC addresses. (For details, see “MAC Address Globs” on page 27.) vlan vlan-id — Name or number of a VLAN for which to display entries. display fdb 99 perm — Displays permanent entries. A permanent entry does not age out and remains in the database even after a reboot, reset, or power cycle. static — Displays static entries. A static entry does not age out, but is removed from the database after a reboot, reset, or power cycle. dynamic — Displays dynamic entries. A dynamic entry is automatically removed through aging or after a reboot, reset, or power cycle. system — Displays system entries. A system entry is added by MSS. For example, the authentication protocols can add entries for wired and wireless authentication users. all — Displays all entries in the database, or all the entries that match a particular port or ports or a particular VLAN. port port-list — Destination port(s) for which to display entries. Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Usage — To display the entire forwarding database, enter the display fdb command without options. To display only a portion of the database, use optional parameters to specify the types of entries you want to display. Examples — The following command displays all entries in the forwarding database: WX4400# display fdb all * = Static Entry. + = Permanent Entry. # = System Entry. VLAN TAG Dest MAC/Route Des [CoS] Destination Ports [Protocol Type] ---- ---- ------------------ ----- ----------------------------------------1 00:01:97:13:0b:1f 1 [ALL] 1 aa:bb:cc:dd:ee:ff * 3 [ALL] 1 00:0b:0e:02:76:f5 1 [ALL] Total Matching FDB Entries Displayed = 3 The top line of the display identifies the characters to distinguish among the entry types. 100 CHAPTER 5: VLAN COMMANDS The following command displays all entries that begin with the MAC address glob 00: WX4400# display fdb 00:* * = Static Entry. + = Permanent Entry. # = System Entry. VLAN TAG Dest MAC/Route Des [CoS] Destination Ports [Protocol Type] ---- ---- ------------------ ----- ----------------------------------------1 00:01:97:13:0b:1f 1 [ALL] 1 00:0b:0e:02:76:f5 1 [ALL] Total Matching FDB Entries Displayed = 2 Table 20 describes the fields in the display fdb output. Table 20 Output for display fdb Field Description VLAN VLAN number. TAG VLAN tag value. If the interface is untagged, the TAG field is blank. Dest MAC/Route Des MAC address of this forwarding entry’s destination. CoS Type of entry. The entry types are explained in the first row of the command output. Note: This Class of Service (CoS) value is not associated with MSS quality of service (QoS) features. Destination Ports Wireless LAN switch port associated with the entry. A WX switch sends traffic to the destination MAC address through this port. Protocol Type Layer 3 protocol address types that can be mapped to this entry. Total Matching FDB Entries Displayed Number of entries displayed by the command. See Also clear fdb on page 96 set fdb on page 107 display fdb agingtime display fdb agingtime 101 Displays the aging timeout period for forwarding database entries. Syntax — display fdb agingtime [vlan vlan-id] vlan vlan-id — VLAN name or number. If you do not specify a VLAN, the aging timeout period for each VLAN is displayed. Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Examples — The following command displays the aging timeout period for all VLANs: WX1200# display fdb agingtime VLAN 2 aging time = 600 sec VLAN 1 aging time = 300 sec Because the forwarding database aging timeout period can be configured only on an individual VLAN basis, the command lists the aging timeout period for each VLAN separately. See Also display fdb count set fdb agingtime on page 108 Lists the number of entries in the forwarding database. Syntax — display fdb count {perm | static | dynamic} [vlan vlan-id] perm — Lists the number of permanent entries. A permanent entry does not age out and remains in the database even after a reboot, reset, or power cycle. static — Lists the number of static entries. A static entry does not age out, but is removed from the database after a reboot, reset, or power cycle. dynamic — Lists the number of dynamic entries. A dynamic entry is automatically removed through aging or after a reboot, reset, or power cycle. 102 CHAPTER 5: VLAN COMMANDS vlan vlan-id — VLAN name or number. Entries are listed for only the specified VLAN. Defaults — None. Access — All. History —Introduced in MSS Version 3.0. The following command lists the number of dynamic entries that the forwarding database contains: WX1200# display fdb count dynamic Total Matching Entries = 2 See Also display roaming station display fdb on page 98 Shows a list of the stations roaming to the wireless LAN switch through a VLAN tunnel. Syntax — display roaming station [vlan vlan-id] [peer ip-addr] vlan vlan-id — Output is restricted to stations using this VLAN. peer ip-addr — Output is restricted to stations tunnelling through this peer WX switch in the Mobility Domain. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — The output displays roaming stations within the previous 1 second. Examples — To display all stations roaming to the WX switch, type the following command: WX4400# display roaming User Name ----------------------redsqa station Station IP Addr Old AP MAC VLAN State --------------- ----------------- -------------- -----0.0.0.0 00:00:00:00:00:00 violet Up display roaming station 103 Table 21 describes the fields in the display. Table 21 Output for display roaming station Field Description User Name Name of the user. This is the name used for authentication. The name resides in a RADIUS server database or the local user database on a wireless LAN switch. Station IP Addr IP address of the user WX switch. Old AP MAC MAC address of the access point from which the station is roaming or attempting to roam. Note: This field is applicable only for clients that reassociate with this WX switch from another WX switch. VLAN Name of the VLAN to which the RADIUS server or WX switch local user database assigned the user. State State of the session: Setup — Station is attempting to roam to this WX switch. This switch has asked the WX from which the station is roaming for the station’s session information and is waiting for a reply. Up — MSS has established a tunnel between the WX switches and the station has successfully roamed to this WX over the tunnel. Chck — This WX switch is in the process of accepting a reassociation request from the roaming peer WX switch for a station currently roaming to the peer switch. TChck — This WX switch is in the process of accepting a reassociation request from the roaming peer WX switch for a station currently roaming to this switch. WInd — This WX switch is waiting for network congestion to clear before sending the roaming indication to the roaming peer WX switch. WResp — This WX switch is waiting for network congestion to clear before sending the roaming response to the roaming peer WX switch. See Also display roaming vlan on page 104 104 CHAPTER 5: VLAN COMMANDS display roaming vlan Shows all VLANs in the mobility domain, the WX switches servicing the VLANs, and their tunnel affinity values configured on each switch for the VLANs. Syntax — display roaming vlan Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command shows the current roaming VLANs: WX4400# display roaming vlan VLAN WX Affinity ---------------- --------------- -------vlan-cs 192.168.14.2 5 vlan-eng 192.168.14.4 5 vlan-fin 192.168.14.2 5 vlan-it 192.168.14.4 5 vlan-it 192.168.14.2 5 vlan-pm 192.168.14.2 5 vlan-sm 192.168.14.2 5 vlan-tp 192.168.14.4 5 vlan-tp 192.168.14.2 5 Table 22 describes the fields in the display. Table 22 Output for display roaming vlan Field Description VLAN VLAN name. WX System IP address of the wireless LAN switch on which the VLAN is configured. Affinity Preference of this WX switch for forwarding user traffic for the VLAN. A higher number indicates a greater preference. See Also display roaming station on page 102 display vlan config on page 106 display tunnel display tunnel 105 Shows the tunnels from the wireless LAN switch where you type the command. Syntax — display tunnel Defaults — None. Access — Enabled History —Introduced in MSS Version 3.0. Examples — To display all tunnels from a WX switch to other WX switches in the Mobility Domain, type the following command. WX4400# display VLAN --------------vlan-eng tunnel Local Address Remote Address State Port LVID RVID --------------- --------------- ------- ----- ----- ----192.168.14.2 192.168.14.4 DORMANT 1024 4096 130 Table 23 describes the fields in the display. Table 23 Output for display tunnel Field Description VLAN VLAN name. Local Address IP address of the local end of the tunnel. This is the system IP address of the wireless access switch where you enter the command. Remote Address IP address of the remote end of the tunnel. This is the system IP address of another WX switch in the mobility domain. State Tunnel state: Up Dormant Port Tunnel port ID. LVID Local VLAN ID. RVID Remote VLAN ID. See Also display vlan config on page 106 106 CHAPTER 5: VLAN COMMANDS display vlan config Shows VLAN information. Syntax — display vlan config [vlan-id] vlan-id — VLAN name or number. If you do not specify a VLAN, information for all VLANs is displayed. Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Examples — The following command displays information for VLAN burgundy: WX1200# display vlan config burgundy Admin VLAN Tunl VLAN Name Status State Affin Port Tag ---- ---------------- ------ ----- ----- ---------------- ----2 burgundy Up Up 5 2 none 3 none 4 none 6 none t:10.10.40.4 none Table 24 describes the fields in this display. Table 24 Output for display vlan config Field Description VLAN VLAN number. Name VLAN name. Admin Status Administrative status of the VLAN: VLAN State Down — The VLAN is disabled. Up — The VLAN is enabled. Link status of the VLAN: Down — The VLAN is not connected. Up — The VLAN is connected. Port State ----Up Up Up Up Up set fdb 107 Table 24 Output for display vlan config (continued) Field Description Tunl Affin Tunnel affinity value assigned to the VLAN. Port Member port of the VLAN. The port can be a physical port or a virtual port. Physical ports are 10/100 Ethernet or gigabit Ethernet ports on the WX switch, and are listed by port number. Virtual ports are tunnels to other WX switches in a mobility domain, and are listed as follows: t:ip-addr, where ip-addr is the system IP address of the WX switch at the other end of the tunnel. Note: This field can include MAP access ports and wired authentication ports, because MSS dynamically adds these ports to a VLAN when handling user traffic for the VLAN. Tag Tag value assigned to the port. Port State Link state of the port: Down — The port is not connected. Up — The port is connected. See Also set fdb clear vlan on page 97 set vlan name on page 109 set vlan port on page 110 set vlan tunnel-affinity on page 111 Adds a permanent or static entry to the forwarding database. Syntax — set fdb {perm | static} mac-addr port port-list vlan vlan-id [tag tag-value] perm — Adds a permanent entry. A permanent entry does not age out and remains in the database even after a reboot, reset, or power cycle. static — Adds a static entry. A static entry does not age out, but is removed from the database after a reboot, reset, or power cycle. mac-addr — Destination MAC address of the entry. Use colons to separate the octets (for example, 00:11:22:aa:bb:cc). port port-list — List of physical destination ports for which to add the entry. A separate entry is added for each port you specify. 108 CHAPTER 5: VLAN COMMANDS vlan vlan-id — Name or number of a VLAN of which the port is a member. The entry is added only for the specified VLAN. tag tag-value — VLAN tag value that identifies a virtual port. You can specify a number from 1 through 4095. If you do not specify a tag value, an entry is created for an untagged interface only. If you specify a tag value, an entry is created only for the specified tagged interface. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You cannot add a multicast or broadcast address as a permanent or static FDB entry. Examples — The following command adds a permanent entry for MAC address 00:11:22:aa:bb:cc on ports 3 and 5 in VLAN blue: WX1200# set fdb perm 00:11:22:aa:bb:cc port 3,5 vlan blue success: change accepted. The following command adds a static entry for MAC address 00:2b:3c:4d:5e:6f on port 1 in the default VLAN: WX4400# set fdb static 00:2b:3c:4d:5e:6f port 1 vlan default success: change accepted. See Also set fdb agingtime clear fdb on page 96 display fdb on page 98 Changes the aging timeout period for dynamic entries in the forwarding database. Syntax — set fdb agingtime vlan-id age seconds vlan-id — VLAN name or number. The timeout period change applies only to entries that match the specified VLAN. age seconds — Value for the timeout period, in seconds. You can specify a value from 0 through 1,000,000. If you change the timeout period to 0, aging is disabled. set vlan name 109 Defaults — The aging timeout period is 300 seconds (5 minutes). Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command changes the aging timeout period to 600 seconds for entries that match VLAN orange: WX4400# set fdb agingtime orange age 600 success: change accepted. See Also set vlan name display fdb agingtime on page 101 Creates a VLAN and assigns a number and name to it. Syntax — set vlan vlan-num name name vlan-num — VLAN number. You can specify a number from 2 through 4095. name — String up to 16 alphabetic characters long. Defaults — VLAN 1 is named default by default. No other VLANs have default names. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must assign a name to a VLAN (other than the default VLAN) before you can add ports to the VLAN. 3Com recommends that you do not use the name default. This name is already used for VLAN 1. 3Com also recommends that you do not rename the default VLAN. You cannot use a number as the first character in a VLAN name. 3Com recommends that you do not use the same name with different capitalizations for VLANs. For example, do not configure two separate VLANs with the names red and RED. 110 CHAPTER 5: VLAN COMMANDS VLAN names are case-sensitive for RADIUS authorization when a client roams to a wireless LAN switch. If the WX switch is not configured with the VLAN the client is on, but is configured with a VLAN that has the same spelling but different capitalization, authorization for the client fails. For example, if the client is on VLAN red but the WX switch to which the client roams has VLAN RED instead, RADIUS authorization fails. Examples — The following command assigns the name marigold to VLAN 3: WX4400# set vlan 3 name marigold success: change accepted. See Also set vlan port set vlan port on page 110 Assigns one or more network ports to a VLAN. You also can add a virtual port to each network port by adding a tag value to the network port. Syntax — set vlan vlan-id port port-list [tag tag-value] vlan-id — VLAN name or number. port port-list — List of physical ports. tag tag-value — Tag value that identifies a virtual port. You can specify a value from 1 through 4095. By default, no ports are members of any VLANs. A wireless LAN switch cannot forward traffic on the network until you configure VLANs and add network ports to the VLANs. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You can combine this command with the set port name command to assign the name and add the ports at the same time. If you do not specify a tag value, the WX switch sends untagged frames for the VLAN. If you do specify a tag value, the WX sends tagged frames only for the VLAN. set vlan tunnel-affinity 111 If you do specify a tag value, 3Com recommends that you use the same value as the VLAN number. MSS does not require the VLAN number and tag value to be the same but some other switches do. Examples — The following command assigns the name beige to VLAN 11 and adds ports 1 through 3 to the VLAN: WX1200# set vlan 11 name beige port 1-3 success: change accepted. The following command adds port 6 to VLAN beige and assigns tag value 86 to the port: WX1200# set vlan beige port 6 tag 86 success: change accepted. See Also set vlan tunnel-affinity clear vlan on page 97 display vlan config on page 106 set vlan name on page 109 Changes a wireless LAN switch’s preferability within a mobility domain for tunneling user traffic for a VLAN. When a user roams to a WX switch that is not a member of the user’s VLAN, the WX can forward the user traffic by tunneling to another WX switch that is a member of the VLAN. Syntax — set vlan vlan-id tunnel-affinity num vlan-id — VLAN name or number. num — Preference of this switch for forwarding user traffic for the VLAN. You can specify a value from 1 through 10. A higher number indicates a greater preference. Defaults — Each VLAN on a WX switch’s network ports has an affinity value of 5 by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Increasing a WX switch’s affinity value increases the WX’s preferability for forwarding user traffic for the VLAN. 112 CHAPTER 5: VLAN COMMANDS If more than one WX switch has the highest affinity value, MSS randomly selects one of the WX switches for the tunnel. Examples — The following command changes the VLAN affinity for VLAN beige to 10: WX4400# set vlan beige tunnel-affinity 10 success: change accepted. See Also display roaming vlan on page 104 display vlan config on page 106 6 IP SERVICES COMMANDS Use IP services commands to configure and manage IP interfaces, management services, the Domain Name Service (DNS), Network Time Protocol (NTP), and aliases, and to ping a host or trace a route. Commands by Usage This chapter presents IP services commands alphabetically. Use Table 25 to locate commands in this chapter based on their use. Table 25 IP Services Commands by Usage Type Command IP Interface set interface on page 143 set interface dhcp-client on page 144 set interface status on page 146 display interface on page 126 display dhcp-client on page 182 clear interface on page 115 System IP Address set system ip-address on page 179 clear system ip-address on page 124 IP Route set ip route on page 150 display ip route on page 131 clear ip route on page 118 SSH Management set ip ssh server on page 155 set ip ssh on page 153 set ip ssh idle-timeout on page 155 set ip ssh absolute-timeout on page 154 Telnet Management set ip telnet on page 156 set ip telnet server on page 157 114 CHAPTER 6: IP SERVICES COMMANDS Table 25 IP Services Commands by Usage (continued) Type Command display ip telnet on page 133 clear ip telnet on page 119 HTTPS Management set ip https server on page 150 display ip https on page 129 DNS set ip dns on page 147 set ip dns domain on page 148 set ip dns server on page 149 display ip dns on page 128 clear ip dns domain on page 117 clear ip dns server on page 117 IP Alias set ip alias on page 147 display ip alias on page 127 clear ip alias on page 116 Time and Date set timedate on page 180 set timezone on page 181 set summertime on page 177 display timedate on page 138 display timezone on page 139 display summertime on page 138 clear timezone on page 124 clear snmp usm on page 122 NTP set ntp on page 158 set ntp server on page 158 set ntp update-interval on page 159 display ntp on page 134 clear ntp server on page 119 clear ntp update-interval on page 120 ARP set arp on page 141 set arp agingtime on page 142 telnet on page 195 SNMP set snmp protocol on page 172 set snmp security on page 173 clear interface Table 25 IP Services Commands by Usage (continued) Type Command set snmp community on page 160 set snmp usm on page 174 set snmp profile on page 167 set snmp notify target on page 162 set ip snmp server on page 152 display snmp status on page 191 display snmp community on page 186 display snmp usm on page 193 display snmp notify profile on page 188 display snmp notify target on page 189 display snmp counters on page 187 clear snmp community on page 121 clear snmp usm on page 122 clear snmp profile on page 122 clear snmp notify target on page 121 Ping ping on page 140 Telnet Client telnet on page 195 Traceroute traceroute on page 196 DHCP server set interface dhcp-server on page 145 display dhcp-server on page 183 clear interface Removes an IP interface. Syntax — clear interface vlan-id ip vlan-id — VLAN name or number Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. 115 116 CHAPTER 6: IP SERVICES COMMANDS Usage — If the interface you want to remove is configured as the system IP address, removing the address can interfere with system tasks that use the system IP address, including the following: Mobility domain operations Topology reporting for dual-homed MAP access points Default source IP address used in unsolicited communications such as AAA accounting reports and SNMP traps Examples — The following command removes the IP interface configured on VLAN mauve: WX1200# clear interface mauve ip success: cleared ip on vlan mauve See Also clear ip alias set interface on page 143 set interface status on page 146 display interface on page 126 Removes an alias, which is a string that represents an IP address. Syntax — clear ip alias name name — Alias name Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command removes the alias server1: WX1200# clear ip alias server1 success: change accepted. See Also display ip alias on page 127 clear ip dns domain clear ip dns domain 117 Removes the default DNS domain name. Syntax — clear ip dns domain Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command removes the default DNS domain name from a WX switch: WX1200# clear ip dns domain Default DNS domain name cleared. See Also clear ip dns server clear ip dns server on page 117 display ip dns on page 128 set ip dns on page 147 set ip dns domain on page 148 set ip dns server on page 149 Removes a DNS server from a WX switch configuration. Syntax — clear ip dns server ip-addr ip-addr — IP address of a DNS server. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command removes DNS server 10.10.10.69 from a WX switch’s configuration: WX4400# clear ip dns server 10.10.10.69 success: change accepted. 118 CHAPTER 6: IP SERVICES COMMANDS See Also clear ip route clear ip dns domain on page 117 display ip dns on page 128 set ip dns on page 147 set ip dns domain on page 148 set ip dns server on page 149 Removes a route from the IP route table. Syntax — clear ip route {default | ip-addr mask | ip-addr/mask-length} gateway default — Default route. default is an alias for IP address 0.0.0.0/0. ip-addr mask — IP address and subnet mask for the route destination, in dotted decimal notation (for example, 10.10.10.10 255.255.255.0). ip-addr/mask-length — IP address and subnet mask length in CIDR format (for example, 10.10.10.10/24). gateway — IP address, DNS hostname, or alias of the next-hop router. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command removes the route to destination 10.10.10.68/24 through gateway router 10.10.10.1: WX1200# clear ip route 10.10.10.68/24 10.10.10.1 success: change accepted. See Also display ip route on page 131 set ip route on page 150 clear ip telnet clear ip telnet 119 Resets the Telnet server’s TCP port number to its default value. A WX switch listens for Telnet management traffic on the Telnet server port. Syntax — clear ip telnet Defaults — The default Telnet port number is 23. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command resets the TCP port number for Telnet management traffic to its default: WX4400# clear ip telnet success: change accepted. See Also clear ntp server display ip https on page 129 display ip telnet on page 133 set ip https server on page 150 set ip telnet on page 156 set ip telnet server on page 157 Removes an NTP server from a WX switch configuration. Syntax — clear ntp server {ip-addr | all} ip-addr — IP address of the server to remove, in dotted decimal notation. all — Removes all NTP servers from the configuration. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. 120 CHAPTER 6: IP SERVICES COMMANDS Examples — The following command removes NTP server 192.168.40.240 from a WX switch configuration: WX4400# clear ntp server 192.168.40.240 success: change accepted. See Also clear ntp update-interval clear ntp update-interval on page 120 display ntp on page 134 set ntp on page 158 set ntp server on page 158 set ntp update-interval on page 159 Resets the NTP update interval to the default value. Syntax — clear ntp update-interval Defaults — The default NTP update interval is 64 seconds. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — To reset the NTP interval to the default value, type the following command: WX4400# clear ntp update-interval success: change accepted. See Also clear ntp server on page 119 display ntp on page 134 set ntp on page 158 set ntp server on page 158 set ntp update-interval on page 159 clear snmp community clear snmp community 121 Clears an SNMP community string. Syntax — clear snmp community name comm-string comm-string — Name of the SNMP community you want to clear. Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command clears community string setswitch2: WX-1200# clear snmp community name setswitch2 success: change accepted. See Also clear snmp notify target set snmp community on page 160 display snmp community on page 186 Clears an SNMP notification target. Syntax — clear snmp notify target target-num target-num — ID of the target. Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command clears notification target 3: WX-1200# clear snmp notify target 3 success: change accepted. 122 CHAPTER 6: IP SERVICES COMMANDS See Also clear snmp profile set snmp notify target on page 162 display snmp notify target on page 189 Clears an SNMP notification profile. Syntax — clear snmp profile profile-name profile-name — Name of the notification profile you are clearing. Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command clears notification profile snmpprof_rfdetect: WX-1200# clear snmp profile snmpprof_rfdetect success: change accepted. See Also set snmp profile on page 167 display snmp notify profile on page 188 clear snmp trap receiver This command is deprecated in MSS Version 4.0. To clear an SNMP notification target (also called trap receiver), see clear snmp notify target on page 121. clear snmp usm Clears an SNMPv3 user. Syntax — clear snmp usm usm-username usm-username — Name of the SNMPv3 user you want to clear. Defaults — None. clear summertime 123 Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command clears SNMPv3 user snmpmgr1: WX-1200# clear snmp usm snmpmgr1 success: change accepted. See Also clear summertime set snmp usm on page 174 display snmp usm on page 193 Clears the summertime setting from a wireless LAN switch. Syntax — clear summertime Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — To clear the summertime setting from a WX switch, type the following command: WX1200# clear summertime success: change accepted. See Also clear timezone on page 124 display summertime on page 138 display timedate on page 138 display timezone on page 139 set summertime on page 177 set timedate on page 180 set timezone on page 181 124 CHAPTER 6: IP SERVICES COMMANDS clear system ip-address Clears the system IP address. CAUTION: Clearing the system IP address disrupts the system tasks that use the address. Syntax — clear system ip-address Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — Clearing the system IP address can interfere with system tasks that use the system IP address, including the following: Mobility Domain operations Topology reporting for dual-homed MAP access points Default source IP address used in unsolicited communications such as AAA accounting reports and SNMP traps Examples — To clear the system IP address, type the following command: WX1200# clear system ip-address success: change accepted. See Also clear timezone display system on page 42 set system ip-address on page 179 Clears the time offset for the wireless LAN switch’s real-time clock from Coordinated Universal Time (UTC). UTC is also know as Greenwich Mean Time (GMT). Syntax — clear timezone Defaults — None. Access — Enabled. display arp 125 History — Introduced in MSS Version 3.0. Examples — To return the WX switch’s real-time clock to UTC, type the following command: WX4400# clear timezone success: change accepted. See Also display arp clear snmp usm on page 122 set summertime on page 177 set timedate on page 180 set timezone on page 181 display summertime on page 138 display timedate on page 138 display timezone on page 139 Shows the ARP table. Syntax — display arp [ip-addr] ip-addr — IP address. Defaults — If you do not specify an IP address, the whole ARP table is displayed. Usage — All. History —Introduced in MSS Version 3.0. Examples — The following command displays ARP entries: WX4400# display arp ARP aging time: 1200 seconds Host -----------------------------10.5.4.51 10.5.4.53 HW Address VLAN ----------------- ----00:0b:0e:02:76:f5 1 00:0b:0e:02:76:f7 1 Table 26 describes the fields in this display. Type ------DYNAMIC LOCAL State -------RESOLVED RESOLVED 126 CHAPTER 6: IP SERVICES COMMANDS Table 26 Output for display arp Field Description ARP aging time Number of seconds a dynamic entry can remain unused before MSS removes the entry from the ARP table. Host IP address, hostname, or alias. HW Address MAC address mapped to the IP address, hostname, or alias. VLAN VLAN the entry is for. Type Entry type: State DYNAMIC — Entry was learned from network traffic and ages out if unused for longer than the ARP aging timeout. LOCAL — Entry for the WX switch’s MAC address. Each VLAN has one local entry for the WX switch’s MAC address. PERMANENT — Entry does not age out and remains in the configuration even following a reboot. STATIC — Entry does not age out but is removed after a reboot. Entry state: RESOLVING — MSS sent an ARP request for the entry and is waiting for the reply. RESOLVED — Entry is resolved. See Also display interface set arp on page 141 set arp agingtime on page 142 Shows the IP interfaces configured on the wireless LAN switch. Syntax — display interface [vlan-id] vlan-id — VLAN name or number. Defaults — If you do not specify a VLAN ID, interfaces for all VLANs are displayed. Usage — All. History —Introduced in MSS Version 3.0. display ip alias 127 Examples — The following command displays all the IP interfaces configured on a WX switch: WX4400# display interface VLAN Name Address ---- --------------- --------------1 default 10.10.10.10 2 mauve 10.10.20.10 Mask --------------255.255.255.0 255.255.255.0 Enabled ------YES NO State ----Up Down Table 27 describes the fields in this display. Table 27 Output for display interface Field Description VLAN VLAN number Name VLAN name Address IP address Mask Subnet mask Enabled Administrative state: State YES (enabled) NO (disabled) Link state: Up (operational) Down (unavailable) See Also display ip alias set interface on page 143 set interface status on page 146 Shows the IP aliases configured on the wireless LAN switch. Syntax — display ip alias [name] name — Alias string. Defaults — If you do not specify an alias name, all aliases are displayed. Access — Enabled. History —Introduced in MSS Version 3.0. 128 CHAPTER 6: IP SERVICES COMMANDS Examples — The following command displays all the aliases configured on a WX switch: WX4400# display ip alias Name IP Address --------------------------------------HR1 192.168.1.2 payroll 192.168.1.3 radius1 192.168.7.2 Table 28 describes the fields in this display. Table 28 Output for display ip alias Field Description Name Alias string. IP Address IP address associated with the alias. See Also display ip dns clear ip alias on page 116 set ip alias on page 147 Shows the DNS servers the wireless LAN switch is configured to use. Syntax — display ip dns Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Examples — The following command displays the DNS information: WX4400# display ip dns Domain Name: example.com DNS Status: enabled IP Address Type ----------------------------------10.1.1.1 PRIMARY 10.1.1.2 SECONDARY 10.1.2.1 SECONDARY display ip https Table 29 describes the fields in this display. Table 29 Output for display ip dns Field Description Domain Name Default domain name configured on the WX switch DNS Status Status of the WX switch’s DNS client: Enabled Disabled IP Address IP address of the DNS server Type Server type: PRIMARY SECONDARY See Also display ip https clear ip dns domain on page 117 clear ip dns server on page 117 set ip dns on page 147 set ip dns domain on page 148 set ip dns server on page 149 Shows information about the HTTPS management port. Syntax — display ip https Defaults — None. Access — All. History —Introduced in MSS Version 3.0. 129 130 CHAPTER 6: IP SERVICES COMMANDS Examples — The following command shows the status and port number for the HTTPS management interface to the WX switch: WX4400# display ip https HTTPS is enabled HTTPS is set to use port 443 Last 10 Connections: IP Address Last Connected Time Ago (s) ---------------------------------- -----------10.10.10.56 2003/05/09 15:51:26 pst 349 Table 30 describes the fields in this display. Table 30 Output for display ip https Field Description HTTPS is enabled/disabled State of the HTTPS server: Enabled Disabled HTTPS is set to use port TCP port number on which the WX switch listens for HTTPS connections. Last 10 connections List of the last 10 devices to establish connections to the WX switch’s HTTPS server. IP Address IP address of the device that established the connection. If a browser connects to a WX switch from behind a proxy, then only the proxy IP address is shown. If multiple browsers connect using the same proxy, the proxy address appears only once in the output. Last Connected Time when the WX switch established the HTTPS connection to the WX switch. Time Ago (s) Number of seconds since the device established the HTTPS connection to the WX switch. See Also clear ip telnet on page 119 display ip telnet on page 133 set ip https server on page 150 set ip telnet on page 156 set ip telnet server on page 157 display ip route display ip route 131 Shows the IP route table. Syntax — display ip route [destination] destination — Route destination IP address, in dotted decimal notation. Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Usage — When you add an IP interface to a VLAN that is up, MSS adds direct and local routes for the interface to the route table. If the VLAN is down, MSS does not add the routes. If you add an interface to a VLAN but the routes for that interface do not appear in the route table, use the display vlan config command to check the VLAN state. If you add a static route and the route’s state is shown as Down, use the display interface command to verify that the route has an IP interface in the gateway router’s subnet. MSS cannot resolve a static route unless one of the WX switch’s VLANs has an interface in the gateway router’s subnet. If the WX switch has such an interface but the static route is still down, use the display vlan config command to check the state of the VLAN’s ports. Examples — The following command shows all routes in a WX switch’s IP route table: WX4400# display ip route Router table for IPv4 Destination/Mask Proto Metric NH-Type Gateway VLAN:Interface __________________ _______ ______ _______ _______________ _______________ 0.0.0.0/ 0 0.0.0.0/ 0 10.0.2.1/24 10.0.2.1/32 10.0.2.255/32 224.0.0.0/ 4 Static Static IP IP IP IP 1 2 0 0 0 0 Router Router Direct Direct Direct Local 10.0.1.17 10.0.2.17 Table 31 describes the fields in this display. Down vlan:2:ip vlan:2:ip vlan:2:ip:10.0.1.1/24 vlan:2:ip:10.0.1.1/24 MULTICAST 132 CHAPTER 6: IP SERVICES COMMANDS Table 31 Output of display ip route Field Description Destination/Mask IP address and subnet mask of the route destination. The 244.0.0.0 route is automatically added by MSS and supports the IGMP snooping feature. Proto Protocol that added the route to the IP route table. The protocol can be one of the following: IP — MSS added the route. Static — An administrator added the route. Metric Cost for using the route. NH-Type Next-hop type: Gateway Local — Route is for a local interface. MSS adds the route when you configure an IP address on the WX switch. Direct — Route is for a locally attached subnet. MSS adds the route when you add an interface in the same subnet to the WX switch. Router — Route is for a remote destination. A WX switch forwards traffic for the destination to the gateway router. Next-hop router for reaching the route destination. This field applies only to static routes. VLAN:Interface Destination VLAN, protocol type, and IP address of the route. Because direct routes are for local interfaces, a destination IP address is not listed. The destination for the IP multicast route is MULTICAST. For static routes, the value Down means the WX switch does not have an interface to the destination’s next-hop router. To provide an interface, configure an IP interface that is in the same IP subnet as the next-hop router. The IP interface must be on a VLAN containing the port that is attached to the gateway router. See Also clear ip route on page 118 display interface on page 126 display vlan config on page 106 set interface on page 143 set ip route on page 150 display ip telnet display ip telnet 133 Shows information about the Telnet management port. Syntax — display ip telnet Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Examples — The following command shows the status and port number for the Telnet management interface to the WX switch: WX4400> display ip telnet Server Status Port ---------------------------------Enabled 23 Table 32 describes the fields in this display. Table 32 Output for display ip telnet Field Description Server Status State of the HTTPS server: Port Enabled Disabled TCP port number on which the WX switch listens for Telnet management traffic. See Also clear ip telnet on page 119 display ip https on page 129 set ip https server on page 150 set ip telnet on page 156 set ip telnet server on page 157 134 CHAPTER 6: IP SERVICES COMMANDS display ntp Shows NTP client information. Syntax — display ntp Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Examples — To display NTP information for a WX switch, type the following command: WX4400> display ntp NTP client: enabled Current update-interval: 20(secs) Current time: Fri Feb 06 2004, 12:02:57 Timezone is set to 'PST', offset from UTC is -8:0 hours. Summertime is enabled. Last NTP update: Fri Feb 06 2004, 12:02:46 NTP Server Peer state Local State --------------------------------------------------192.168.1.5 SYSPEER SYNCED Table 33 describes the fields in this display. Table 33 Output for display ntp Field Description NTP client State of the NTP client. The state can be one of the following: Enabled Disabled Current update-interval Number of seconds between queries sent by the WX switch to the NTP servers for updates. Current time System time that was current on the WX switch when you pressed Enter after typing the display ntp command. Timezone Time zone configured on the WX switch. MSS offsets the time reported by the NTP server based on the time zone. This field is displayed only if you change the time zone. display ntp 135 Table 33 Output for display ntp (continued) Field Description Summertime Summertime period configured on the WX switch. MSS offsets the system time +1 hour and returns it to standard time for daylight savings time or a similar summertime period that you set. This field is displayed only if you enable summertime. Last NTP update Time when the WX switch received the most recent update from an NTP server. NTP Server IP address of the NTP server. Peer state State of the NTP session from the point of view of the NTP server: Local state CORRECT REJECT SELCAND SYNCCAND SYSPEER State of the NTP session from the point of view of the WX switch’s NTP client: INITED START SYNCED See Also clear ntp server on page 119 clear snmp usm on page 122 clear timezone on page 124 display timezone on page 139 set ntp on page 158 set ntp server on page 158 set summertime on page 177 set timezone on page 181 136 CHAPTER 6: IP SERVICES COMMANDS display snmp configuration Shows SNMP settings on a wireless LAN switch. Syntax — display snmp configuration Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Examples — To display SNMP settings on a WX switch, type the following command: WX1200# display snmp configuration Snmp agent is enabled System Name: WX1200 System location: System contact: Trap Name ---------------------------------LinkDownTraps LinkUpTraps AuthenTraps DeviceFailTraps DeviceOkayTraps PoEFailTraps MAPTimeoutTraps MAPBootTraps MobilityDomainJoinTraps MobilityDomainTimeoutTraps MichaelMICFailureTraps RFDetectRogueAPTraps RFDetectAdhocUserTraps RFDetectRogueDisappearTraps ClientAuthenticationFailureTraps ClientAuthorizationFailureTraps ClientAssociationFailureTraps ClientAuthorizationSuccessTraps ClientClearedTraps ClientDeAssociationTraps ClientRoamingTraps AutoTuneRadioPowerChangeTraps AutoTuneRadioChannelChangeTraps CounterMeasureStartTraps Enabled ------YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES YES display snmp configuration CounterMeasureStopTraps ClientDot1xFailureTraps Community Access ---------------read-only read-write YES YES Community Name -------------public private Table 34 describes the fields in this display. Table 34 Output of display snmp configuration Field Description Snmp agent is State of the SNMP agent on the WX switch: Enabled Disabled System Name String configured by the set system name command. System location String configured by the set system location command. System contact String configured by the set system contact command. System description WX switch model. Trap Receiver IP address of each trap receiver. Trap Name SNMP traps supported by MSS. Enabled State of each trap: Yes No Community Access Type of access for an SNMP community. See Also set ip snmp server on page 152 set port trap on page 86 set snmp community on page 160 set snmp profile on page 167 set snmp notify target on page 162 set system contact on page 54 set system location on page 58 set system name on page 58 137 138 CHAPTER 6: IP SERVICES COMMANDS display summertime Shows a wireless LAN switch’s offset from its real-time clock. Syntax — display summertime Defaults — There is no summertime offset by default. Access — All. History —Introduced in MSS Version 3.0. Examples — To display the summertime setting on a WX switch, type the following command: WX1200# display summertime Summertime is enabled, and set to 'PDT'. Start : Sun Apr 04 2004, 02:00:00 End : Sun Oct 31 2004, 02:00:00 Offset : 60 minutes Recurring : yes, starting at 2:00 am of first Sunday of April and ending at 2:00 am on last Sunday of October. See Also display timedate clear snmp usm on page 122 clear timezone on page 124 display timedate on page 138 display timezone on page 139 set summertime on page 177 set timedate on page 180 set timezone on page 181 Shows the date and time of day currently set on a wireless LAN switch’s real-time clock. Syntax — display timedate Defaults — None. Access — All. History —Introduced in MSS Version 3.0. display timezone 139 Examples — To display the time and date set on a WX switch’s real-time clock, type the following command: WX1200# display timedate Sun Feb 29 2004, 23:59:02 PST See Also display timezone clear snmp usm on page 122 clear timezone on page 124 display summertime on page 138 display timezone on page 139 set summertime on page 177 set timedate on page 180 set timezone on page 181 Shows the time offset for the real-time clock from UTC on a wireless LAN switch. Syntax — display timezone Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Examples — To display the offset from UTC, type the following command: WX4400# display timezone Timezone set to 'pst', offset from UTC is -8 hours See Also clear snmp usm on page 122 clear timezone on page 124 display summertime on page 138 display timedate on page 138 set summertime on page 177 140 ping CHAPTER 6: IP SERVICES COMMANDS set timedate on page 180 set timezone on page 181 Tests IP connectivity between a wireless LAN switch and another device. MSS sends an Internet Control Message Protocol (ICMP) echo packet to the specified WX switch and listens for a reply packet. Syntax — ping host [count num-packets ] [dnf] [flood] [interval time] [size size] [source-ip ip-addr | vlan-name] host — IP address, MAC address, hostname, alias, or user to ping. count num-packets — Number of ping packets to send. You can specify from 0 through 2,147,483,647. If you enter 0, MSS pings continuously until you interrupt the command. dnf — Enables the Do Not Fragment bit in the ping packet to prevent the packet from being fragmented. flood — Sends new ping packets as quickly as replies are received, or 100 times per second, whichever is greater. Use the flood option sparingly. This option creates a lot of traffic and can affect other traffic on the network. interval time — Time interval between ping packets, in milliseconds. You can specify from 100 through 10,000. size size — Packet size, in bytes. You can specify from 56 through 65,507. Because the WX switch adds header information, the ICMP packet size is 8 bytes larger than the size you specify. source-ip ip-addr — IP address, in dotted decimal notation, to use as the source IP address in the ping packets. source-ip vlan-name — VLAN name to use as the ping source. MSS uses the IP address configured on the VLAN as the source IP address in the ping packets. Defaults count — 5. dnf — Disabled. interval — 100 (one tenth of a second) set arp 141 size — 56. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — To stop a ping command that is in progress, press Ctrl+C. Examples — The following command pings a WX switch that has IP address 10.1.1.1: WX1200# ping 10.1.1.1 PING 10.1.1.1 (10.1.1.1) from 10.9.4.34 : 56(84) bytes of data. 64 bytes from 10.1.1.1: icmp_seq=1 ttl=255 time=0.769 ms 64 bytes from 10.1.1.1: icmp_seq=2 ttl=255 time=0.628 ms 64 bytes from 10.1.1.1: icmp_seq=3 ttl=255 time=0.676 ms 64 bytes from 10.1.1.1: icmp_seq=4 ttl=255 time=0.619 ms 64 bytes from 10.1.1.1: icmp_seq=5 ttl=255 time=0.608 ms --- 10.1.1.1 ping statistics --5 packets transmitted, 5 packets received, 0 errors, 0% packet loss See Also set arp traceroute on page 196 Adds an ARP entry to the ARP table. Syntax — set arp {permanent | static | dynamic } ip-addr mac-addr permanent — Adds a permanent entry. A permanent entry does not age out and remains in the database even after a reboot, reset, or power cycle. static — Adds a static entry. A static entry does not age out, but the entry does not remain in the database after a reboot, reset, or power cycle. dynamic — Adds a dynamic entry. A dynamic entry is automatically removed if the entry ages out, or after a reboot, reset, or power cycle. ip-addr — IP address of the entry, in dotted decimal notation. mac-addr — MAC address to map to the IP address. Use colons to separate the octets (for example, 00:11:22:aa:bb:cc). Defaults — The default aging timeout is 1200 seconds. 142 CHAPTER 6: IP SERVICES COMMANDS Access — Enabled. History— Introduced in MSS Version 3.0. Examples — The following command adds a static ARP entry that maps IP address 10.10.10.1 to MAC address 00:bb:cc:dd:ee:ff: WX1200# set arp static 10.10.10.1 00:bb:cc:dd:ee:ff success: added arp 10.10.10.1 at 00:bb:cc:dd:ee:ff on VLAN 1 See Also set arp agingtime set arp agingtime on page 142 telnet on page 195 Changes the aging timeout for dynamic ARP entries. Syntax — set arp agingtime seconds seconds — Number of seconds an entry can remain unused before MSS removes the entry. You can specify from 0 through 1,000,000. To disable aging, specify 0. Defaults — None. Access — Enabled. History— Introduced in MSS Version 3.0. Usage — Aging applies only to dynamic entries. To reset the ARP aging timeout to its default value, use the set arp agingtime 1200 command. Examples — The following command changes the ARP aging timeout to 1800 seconds: WX1200# set arp agingtime 1800 success: set arp aging time to 1800 seconds The following command disables ARP aging: WX1200# set arp agingtime 0 success: set arp aging time to 0 seconds set interface 143 See Also set interface set arp on page 141 telnet on page 195 Configures an IP interface on a VLAN. Syntax — set interface vlan-id ip {ip-addr mask | ip-addr/mask-length} vlan-id — VLAN name or number. ip-addr mask — IP address and subnet mask in dotted decimal notation (for example, 10.10.10.10 255.255.255.0). ip-addr/mask-length — IP address and subnet mask length in CIDR format (for example, 10.10.10.10/24). Defaults — None. Access — Enabled. History— Introduced in MSS Version 3.0. Usage — You can assign one IP interface to each VLAN. If an interface is already configured on the VLAN you specify, this command replaces the interface. If you replace an interface that is in use as the system IP address, replacing the interface can interfere with system tasks that use the system IP address, including the following: Mobility domain operations Topology reporting for dual-homed MAP access points Default source IP address used in unsolicited communications such as AAA accounting reports and SNMP traps Examples — The following command configures IP interface 10.10.10.10/24 on VLAN default: WX1200# set interface default ip 10.10.10.10/24 success: set ip address 10.10.10.10 netmask 255.255.255.0 on vlan default 144 CHAPTER 6: IP SERVICES COMMANDS The following command configures IP interface 10.10.20.10 255.255.255.0 on VLAN mauve: WX1200# set interface mauve ip 10.10.20.10 255.255.255.0 success: set ip address 10.10.20.10 netmask 255.255.255.0 on vlan mauve See Also set interface dhcp-client clear interface on page 115 display interface on page 126 set interface status on page 146 Configures the DHCP client on a VLAN, to allow the VLAN to obtain its IP interface from a DHCP server. Syntax — set interface vlan-id ip dhcp-client {enable | disable} vlan-id — VLAN name or number. enable — Enables the DHCP client on the VLAN. disable — Disables the DHCP client on the VLAN. Defaults — The DHCP client is enabled by default on an unconfigured WXR100 when the Fn switch is pressed and held during power on. The DHCP client is disabled by default on all other switch models, and is disabled on an WXR100 if the switch is already configured or the Fn switch is not pressed and held during power on. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — You can enable the DHCP client on one VLAN only. You can configure the DHCP client on more than one VLAN, but the client can be active on only one VLAN. MSS also has a configurable DHCP server. (See set interface dhcp-server on page 145.) You can configure a DHCP client and DHCP server on the same VLAN, but only the client or the server can be enabled. The DHCP client and DHCP server cannot both be enabled on the same VLAN at the same time. set interface dhcp-server 145 Examples — The following command enables the DHCP client on VLAN corpvlan: WX-1200# set interface corpvlan ip dhcp-client enable success: change accepted. See Also set interface dhcp-server clear interface on page 115 display dhcp-client on page 182 display interface on page 126 Configures the MSS DHCP server. Use of the MSS DHCP server to allocate client addresses is intended for temporary, demonstration deployments and not for production networks. 3Com recommends that you do not use the MSS DHCP server to allocate client addresses in a production network. Syntax — set interface vlan-id ip dhcp-server [enable | disable] [start ip-addr1 stop ip-addr2] vlan-id — VLAN name or number. enable — Enables the DHCP server. disable — Disables the DHCP server. start ip-addr1 — Specifies the beginning address of the address range (also called the address pool). stop ip-addr2 — Specifies the ending address of the address range. Defaults — The DHCP server is enabled by default on a new (unconfigured) WXR100 or WX1200, in order to provide an IP address to the host connected to the switch for access to the Web Quick Start. On all switch models, the DHCP server is enabled and cannot be disabled for directly connected MAPs. The DHCP server is disabled by default for any other use. Access — Enabled. History —Introduced in MSS Version 4.0. 146 CHAPTER 6: IP SERVICES COMMANDS Usage — By default, all addresses except the host address of the VLAN, the network broadcast address, and the subnet broadcast address are included in the range. If you specify the range, the start address must be lower than the stop address, and all addresses must be in the same subnet. The IP interface of the VLAN must be within the same subnet but is not required to be within the range. Examples — The following command enables the DHCP server on VLAN red-vlan to serve addresses from the 192.168.1.5 to 192.168.1.25 range: WX-1200# set interface red-vlan ip dhcp-server enable start 192.168.1.5 stop 192.168.1.25 success: change accepted. See Also set interface status display dhcp-server on page 183 Administratively disables or reenables an IP interface. Syntax — set interface vlan-id status {up | down} vlan-id — VLAN name or number. up — Enables the interface. down — Disables the interface. Defaults — IP interfaces are enabled by default. Access — Enabled. History— Introduced in MSS Version 3.0. Examples — The following command disables the IP interface on VLAN mauve: WX4400# set interface mauve status down success: set interface mauve to down See Also clear interface on page 115 display interface on page 126 set interface on page 143 set ip alias set ip alias 147 Configures an alias, which maps a name to an IP address. You can use aliases as shortcuts in CLI commands. Syntax — set ip alias name ip-addr name — String of up to 32 alphanumeric characters, with no spaces. ip-addr — IP address in dotted decimal notation. Defaults — None. Access — Enabled. History— Introduced in MSS Version 3.0. Examples — The following command configures the alias HR1 for IP address 192.168.1.2: WX4400# set ip alias HR1 192.168.1.2 success: change accepted. See Also set ip dns clear ip alias on page 116 display ip alias on page 127 Enables or disables DNS on a wireless LAN switch. Syntax — set ip dns {enable | disable} enable — Enables DNS. disable — Disables DNS. Defaults — DNS is disabled by default. Access — Enabled. History— Introduced in MSS Version 3.0. Examples — The following command enables DNS on a WX switch: WX1200# set ip dns enable Start DNS Client 148 CHAPTER 6: IP SERVICES COMMANDS See Also set ip dns domain clear ip dns domain on page 117 clear ip dns server on page 117 display ip dns on page 128 set ip dns domain on page 148 set ip dns server on page 149 Configures a default domain name for DNS queries. The wireless LAN switch appends the default domain name to domain names or hostnames you enter in commands. Syntax — set ip dns domain name name — Domain name of between 1 and 64 alphanumeric characters with no spaces (for example, example.org). Defaults — None. Access — Enabled. Usage — To override the default domain name when entering a hostname in a CLI command, enter a period at the end of the hostname. For example, if the default domain name is example.com, enter chris. if the fully qualified hostname is chris and not chris.example.com. Aliases take precedence over DNS. When you enter a hostname, MSS checks for an alias with that name first, before using DNS to resolve the name. Examples — The following command configures the default domain name example.com: WX1200# set ip dns domain example.com Domain name changed See Also clear ip dns domain on page 117 clear ip dns server on page 117 display ip dns on page 128 set ip dns on page 147 set ip dns server on page 149 set ip dns server set ip dns server 149 Specifies a DNS server to use for resolving hostnames you enter in CLI commands. Syntax — set ip dns server ip-addr {primary | secondary} ip-addr — IP address of a DNS server, in dotted decimal or CIDR notation. primary — Makes the server the primary server, which MSS always consults first for resolving DNS queries. secondary — Makes the server a secondary server. MSS consults a secondary server only if the primary server does not reply. Defaults — None. Access — Enabled. Usage — You can configure a WX switch to use one primary DNS server and up to five secondary DNS servers. Examples — The following commands configure a WX switch to use a primary DNS server and two secondary DNS servers: WX1200# set ip dns server 10.10.10.50/24 primary success: change accepted. WX1200# set ip dns server 10.10.20.69/24 secondary success: change accepted. WX1200# set ip dns server 10.10.30.69/24 secondary success: change accepted. See Also clear ip dns domain on page 117 clear ip dns server on page 117 display ip dns on page 128 set ip dns on page 147 set ip dns domain on page 148 150 CHAPTER 6: IP SERVICES COMMANDS set ip https server Enables the HTTPS server on a WX switch. The HTTPS server is required for Web Manager access to the switch. CAUTION: If you disable the HTTPS server, Web Manager access to the WX switch is disabled. Syntax — set ip https server {enable | disable} enable — Enables the HTTPS server. disable — Disables the HTTPS server. Defaults — The HTTPS server is disabled by default. Access — Enabled. History — The default is changed to disabled in 3.1. In addition, the HTTPS server is no longer required for WebAAA. Examples — The following command enables the HTTPS server on a WX switch: WX1200# set ip https server enable success: change accepted. See Also set ip route clear ip telnet on page 119 display ip https on page 129 display ip telnet on page 133 set ip telnet on page 156 set ip telnet server on page 157 Adds a static route to the IP route table. Syntax — set ip route {default | ip-addr mask | ip-addr/mask-length} gateway metric default — Default route. A WX switch uses the default route if an explicit route is not available for the destination. Default is an alias for IP address 0.0.0.0/0. set ip route 151 ip-addr mask — IP address and subnet mask for the route destination, in dotted decimal notation (for example, 10.10.10.10 255.255.255.0). ip-addr/mask-length — IP address and subnet mask length in CIDR format (for example, 10.10.10.10/24). gateway — IP address, DNS hostname, or alias of the next-hop router. metric — Cost for using the route. You can specify a value from 0 through 2,147,483,647. Lower-cost routes are preferred over higher-cost routes. Defaults — The HTTPS server is enabled by default. Access — Enabled. Usage — MSS can use a static route only if a direct route in the route table resolves the static route. MSS adds routes with next-hop types Local and Direct when you add an IP interface to a VLAN, if the VLAN is up. If one of these added routes can resolve the static route, MSS can use the static route. Before you add a static route, use the display interface command to verify that the WX switch has an IP interface in the same subnet as the route’s next-hop router. If not, the VLAN:Interface field of the display ip route command output shows that the route is down. You can configure a maximum of 4 routes per destination. This includes default routes, which have destination 0.0.0.0/0. Each route to a given destination must have a unique gateway address. When the route table contains multiple default or explicit routes to the same destination, MSS uses the route with the lowest cost. If two or more routes to the same destination have the lowest cost, MSS selects the first route in the route table. When you add multiple routes to the same destination, MSS groups the routes and orders them from lowest cost at the top of the group to highest cost at the bottom of the group. If you add a new route that has the same destination and cost as a route already in the table, MSS places the new route at the top of the group of routes with the same cost. 152 CHAPTER 6: IP SERVICES COMMANDS Examples — The following command adds a default route that uses gateway 10.5.4.1 and gives the route a cost of 1: WX4400# set ip route default 10.5.4.1 1 success: change accepted. The following commands add two default routes, and configure MSS to always use the route through 10.2.4.69 when the interface to that gateway router is up: WX4400# set ip route default 10.2.4.69 1 success: change accepted. WX4400# set ip route default 10.2.4.17 2 success: change accepted. The following command adds an explicit route from a WX switch to any host on the 192.168.4.x subnet through the local router 10.5.4.2, and gives the route a cost of 1: WX4400# set ip route 192.168.4.0 255.255.255.0 10.5.4.2 1 success: change accepted. The following command adds another explicit route, using CIDR notation to specify the subnet mask: WX4400# set ip route 192.168.5.0/24 10.5.5.2 1 success: change accepted. See Also set ip snmp server clear ip route on page 118 display interface on page 126 display ip route on page 131 Enables or disables the SNMP service on the wireless LAN switch. Syntax — set ip snmp server {enable | disable} enable — Enables the SNMP service. disable — Disables the SNMP service. Defaults — The SNMP service is disabled by default. Access — Enabled. set ip ssh 153 History — Introduced in MSS Version 3.0. Examples — The following command enables the SNMP server on a WX switch: WX4400# set ip snmp server enable success: change accepted. See Also — set ip ssh clear snmp notify target on page 121 display snmp configuration on page 136 set port trap on page 86 set snmp community on page 160 set snmp profile on page 167 set snmp notify target on page 162 Changes the TCP port number on which a wireless LAN switch listens for Secure Shell (SSH) management traffic. CAUTION: If you change the SSH port number from an SSH session, MSS immediately ends the session. To open a new management session, you must configure the SSH client to use the new TCP port number. Syntax — set ip ssh port port-num port-num — TCP port number. Defaults — The default SSH port number is 22. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command changes the SSH port number on a WX switch to 6000: WX4400# set ip ssh port 6000 success: change accepted. 154 CHAPTER 6: IP SERVICES COMMANDS See Also set ip ssh absolute-timeout set ip ssh absolute-timeout on page 154 set ip ssh idle-timeout on page 155 set ip ssh server on page 155 Changes the number of minutes an SSH session can remain open. The absolute-timeout value applies regardless of whether the session is active or idle. Syntax — set ip ssh absolute-timeout minutes minutes — Number of minutes an SSH session can remain open. You can set the absolute timeout to a value from 0 (disabled) to 2,147,483,647 minutes Defaults — The absolute timeout is disabled by default. 3Com recommends using the idle timeout instead to close unused sessions. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — If the idle timeout is disabled, MSS changes the default absolute timeout from 0 (disabled) to 60 minutes to prevent an abandoned session from remaining open indefinitely. Examples — The following command changes the absolute timeout value to 30 minutes: WX4400# set ip ssh absolute-timeout 30 success: absolute timeout set to 30 minutes See Also set ip ssh on page 153 set ip ssh idle-timeout on page 155 set ip ssh server on page 155 set ip ssh idle-timeout set ip ssh idle-timeout 155 Changes the number of minutes an SSH session can remain idle. Syntax — set ip ssh idle-timeout minutes minutes — Number of minutes an SSH session can remain idle. You can set the idle timeout to a value from 0 (disabled) to 2,147,483,647 minutes. Defaults — The default idle timeout is 30 minutes. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — If the idle timeout is disabled, MSS changes the default absolute timeout from 0 (disabled) to 60 minutes to prevent an abandoned session from remaining open indefinitely. 3Com recommends using the idle timeout instead to close unused sessions. Examples — The following command changes the idle timeout value to 20 minutes: WX4400# set ip ssh idle-timeout 20 success: idle timeout set to 20 minutes See Also set ip ssh server set ip ssh on page 153 set ip ssh absolute-timeout on page 154 set ip ssh server on page 155 Disables or reenables the SSH server on a wireless LAN switch. CAUTION: If you disable the SSH server, SSH access to the WX switch is also disabled. Syntax — set ip ssh server {enable | disable} enable — Enables the SSH server. disable — Disables the SSH server. Defaults — The SSH server is enabled by default. 156 CHAPTER 6: IP SERVICES COMMANDS Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must generate an SSH authentication key to use SSH. The maximum number of SSH sessions supported on a WX switch is eight. If Telnet is also enabled, the WX switch can have up to eight Telnet or SSH sessions, in any combination, and one Console session. See Also set ip telnet crypto generate key on page 451 set ip ssh on page 153 set ip ssh absolute-timeout on page 154 set ip ssh idle-timeout on page 155 Changes the TCP port number on which a wireless LAN switch listens for Telnet management traffic. CAUTION: f you change the Telnet port number from a Telnet session, MSS immediately ends the session. To open a new management session, you must Telnet to the WX switch with the new Telnet port number. Syntax — set ip telnet port-num port-num — TCP port number. Defaults — The default Telnet port number is 23. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command changes the Telnet port number on a WX switch to 5000: WX4400# set ip telnet 5000 success: change accepted. set ip telnet server 157 See Also set ip telnet server clear ip telnet on page 119 display ip https on page 129 display ip telnet on page 133 set ip https server on page 150 set ip telnet server on page 157 Enables the Telnet server on a wireless LAN switch. CAUTION: If you disable the Telnet server, Telnet access to the WX switch is also disabled. Syntax — set ip telnet server {enable | disable} enable — Enables the Telnet server. disable — Disables the Telnet server. Defaults — The Telnet server is disabled by default. Access — Enabled. Usage — The maximum number of Telnet sessions supported on a WX switch is eight. If SSH is also enabled, the WX switch can have up to eight Telnet or SSH sessions, in any combination, and one console session. Examples — The following command enables the Telnet server on a WX switch: WX4400# set ip telnet server enable success: change accepted. See Also clear ip telnet on page 119 display ip https on page 129 display ip telnet on page 133 set ip https server on page 150 set ip telnet on page 156 158 CHAPTER 6: IP SERVICES COMMANDS set ntp Enables or disables the NTP client on a wireless LAN switch. Syntax — set ntp {enable | disable} enable — Enables the NTP client. disable — Disables the NTP client. Defaults — The NTP client is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — If NTP is configured on a system whose current time differs from the NTP server time by more than 10 minutes, convergence of the WX time can take many NTP update intervals. 3Com recommends that you set the time manually to the NTP server time before enabling NTP to avoid a significant delay in convergence. Examples — The following command enables the NTP client: WX4400# set ntp enable success: NTP Client enabled See Also set ntp server clear ntp server on page 119 clear ntp update-interval on page 120 display ntp on page 134 set ntp server on page 158 set ntp update-interval on page 159 Configures a wireless LAN switch to use an NTP server. Syntax — set ntp server ip-addr ip-addr — IP address of the NTP server, in dotted decimal notation. Defaults — None. Access — Enabled. set ntp update-interval 159 History —Introduced in MSS Version 3.0. Usage — You can configure up to three NTP servers. MSS queries all the servers and selects the best response based on the method described in RFC 1305, Network Time Protocol (Version 3) Specification, Implementation and Analysis. To use NTP, you also must enable the NTP client with the set ntp command. Examples — The following command configures a WX switch to use NTP server 192.168.1.5: WX4400# set ntp server 192.168.1.5 See Also set ntp update-interval clear ntp server on page 119 clear ntp update-interval on page 120 display ntp on page 134 set ntp on page 158 set ntp update-interval on page 159 Changes how often MSS sends queries to the NTP servers for updates. Syntax — set ntp update-interval seconds seconds — Number of seconds between queries. You can specify from 16 through 1,024 seconds. Defaults — The default NTP update interval is 64 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command changes the NTP update interval to 128 seconds: WX4400# set ntp update-interval 128 success: change accepted. 160 CHAPTER 6: IP SERVICES COMMANDS See Also set snmp community clear ntp server on page 119 clear ntp update-interval on page 120 display ntp on page 134 set ntp on page 158 set ntp server on page 158 Configures a community string for SNMPv1 or SNMPv2c. For SNMPv3, use the set snmp usm command to configure an SNMPv3 user. SNMPv3 does not use community strings. Syntax — set snmp community name comm-string access {read-only | read-notify | notify-only | read-write | notify-read-write} comm-string — Name of the SNMP community. Specify between 1 and 32 alphanumeric characters, with no spaces. read-only — Allows an SNMP management application using the string to get (read) object values on the switch but not to set (write) them. read-notify — Allows an SNMP management application using the string to get object values on the switch but not to set them. The switch can use the string to send notifications. notify-only — Allows the switch to use the string to send notifications. read-write — Allows an SNMP management application using the string to get and set object values on the switch. notify-read-write — Allows an SNMP management application using the string to get and set object values on the switch. The switch also can use the string to send notifications. Defaults — None. Access — Enabled. set snmp community 161 History — Introduced in MSS Version 3.0. In Version 4.0, new access types were added for SNMPv3:read-notify, notify-only, notify-read-write SNMP community strings are passed as clear text in SNMPv1 and SNMPv2c. 3Com recommends that you use strings that cannot easily be guessed by unauthorized users. For example, do not use the well-known strings public and private. If you are using SNMPv3, you can configure SNMPv3 users to use authentication and to encrypt SNMP data. Examples — The following command configures the read-write community good_community: WX-1200# set snmp community read-write good_community success: change accepted. The following command configures community string switchmgr1 with access level notify-read-write: WX-1200# set snmp community name switchmgr1 notify-read-write success: change accepted. See Also clear snmp community on page 121 set ip snmp server on page 152 set snmp notify target on page 162 set snmp profile on page 167 set snmp protocol on page 172 set snmp security on page 173 set snmp usm on page 174 display snmp community on page 186 162 CHAPTER 6: IP SERVICES COMMANDS set snmp notify target Configures a notification target for informs from SNMP. A notification target is a remote device to which MSS sends SNMP notifications. You can configure the MSS SNMP engine to send confirmed notifications (informs) or unconfirmed notifications (traps). Some of the command options differ depending on the SNMP version and the type of notification you specify. You can configure up to 10 notification targets. SNMPv3 with Informs To configure a notification target for informs from SNMPv3, use the following command: Syntax — set snmp notify target target-num ip-addr[:udp-port-number] usm inform user username snmp-engine-id {ip | hex hex-string} [profile profile-name] [security {unsecured | authenticated | encrypted}] [retries num] [timeout num] target-num — ID for the target. This ID is local to the WX switch and does not need to correspond to a value on the target itself. You can specify a number from 1 to 10. ip-addr[:udp-port-number] — IP address of the server. You also can specify the UDP port number to send notifications to. username — USM username. This option is applicable only when the SNMP version is usm. If the user will send informs rather than traps, you also must specify the snmp-engine-id of the target. snmp-engine-id {ip | hex hex-string} — SNMP engine ID of the target. Specify ip if the target’s SNMP engine ID is based on its IP address. If the target’s SNMP engine ID is a hexadecimal value, use hex hex-string to specify the value. profile profile-name — Notification profile this SNMP user will use to specify the notification types to send or drop. set snmp notify target 163 security — Specifies the security level, and is applicable only when the SNMP version is usm: unsecured — Message exchanges are not authenticated, nor are they encrypted. This is the default. authenticated — Message exchanges are authenticated, but are not encrypted. encrypted — Message exchanges are authenticated and encrypted. retries num — Specifies the number of times the MSS SNMP engine will resend a notification that has not been acknowledged by the target. You can specify from 0 to 3 retries. timeout num — Specifies the number of seconds MSS waits for acknowledgement of a notification. You can specify from 1 to 5 seconds. SNMPv3 with Traps To configure a notification target for traps from SNMPv3, use the following command: Syntax — set snmp notify target target-num ip-addr[:udp-port-number] usm trap user username [profile profile-name] [security {unsecured | authenticated | encrypted}] target-num — ID for the target. This ID is local to the WX switch and does not need to correspond to a value on the target itself. You can specify a number from 1 to 10. ip-addr[:udp-port-number] — IP address of the server. You also can specify the UDP port number to send notifications to. username — USM username. This option is applicable only when the SNMP version is usm. profile profile-name — Notification profile this SNMP user will use to specify the notification types to send or drop. security {unsecured | authenticated | encrypted} — Specifies the security level, and is applicable only when the SNMP version is usm: 164 CHAPTER 6: IP SERVICES COMMANDS unsecured — Message exchanges are not authenticated, nor are they encrypted. This is the default. authenticated — Message exchanges are authenticated, but are not encrypted. encrypted — Message exchanges are authenticated and encrypted. SNMPv2c with Informs To configure a notification target for informs from SNMPv2c, use the following command: Syntax — set snmp notify target target-num ip-addr[:udp-port-number] v2c community-string inform [profile profile-name] [retries num] [timeout num] target-num — ID for the target. This ID is local to the WX switch and does not need to correspond to a value on the target itself. You can specify a number from 1 to 10. ip-addr[:udp-port-number] — IP address of the server. You also can specify the UDP port number to send notifications to. community-string — Community string. profile profile-name — Notification profile this SNMP user will use to specify the notification types to send or drop. retries num — Specifies the number of times the MSS SNMP engine will resend a notification that has not been acknowledged by the target. You can specify from 0 to 3 retries. timeout num — Specifies the number of seconds MSS waits for acknowledgement of a notification. You can specify from 1 to 5 seconds. set snmp notify target 165 SNMPv2c with Traps To configure a notification target for traps from SNMPv2c, use the following command: Syntax — set snmp notify target target-num ip-addr[:udp-port-number] v2c community-string trap [profile profile-name] target-num — ID for the target. This ID is local to the WX switch and does not need to correspond to a value on the target itself. You can specify a number from 1 to 10. ip-addr[:udp-port-number] — IP address of the server. You also can specify the UDP port number to send notifications to. community-string — Community string. profile profile-name — Notification profile this SNMP user will use to specify the notification types to send or drop. SNMPv1 with Traps To configure a notification target for traps from SNMPv1, use the following command: Syntax — set snmp notify target target-num ip-addr[:udp-port-number] v1 community-string [profile profile-name] target-num — ID for the target. This ID is local to the WX switch and does not need to correspond to a value on the target itself. You can specify a number from 1 to 10. ip-addr[:udp-port-number] — IP address of the server. You also can specify the UDP port number to send notifications to. community-string — Community string. profile profile-name — Notification profile this SNMP user will use to specify the notification types to send or drop. 166 CHAPTER 6: IP SERVICES COMMANDS Defaults — The default UDP port number on the target is 162. The default minimum required security level is unsecured. The default number of retries is 0 and the default timeout is 2 seconds. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — The inform or trap option specifies whether the MSS SNMP engine expects the target to acknowledge notifications sent to the target by the WX switch. Use inform if you want acknowledgements. Use trap if you do not want acknowledgements. The inform option is applicable to SNMP version v2c or usm only. Examples — The following command configures a notification target for acknowledged notifications: WX-1200# set snmp notify target 1 10.10.40.9 usm inform user securesnmpmgr1 snmp-engine-id ip success: change accepted. This command configures target 1 at IP address 10.10.40.9. The target’s SNMP engine ID is based on its address. The MSS SNMP engine will send notifications based on the default profile, and will require the target to acknowledge receiving them. The following command configures a notification target for unacknowledged notifications: WX-1200# set snmp notify target 2 10.10.40.10 v1 trap success: change accepted. See Also clear snmp notify target on page 121 set ip snmp server on page 152 set snmp community on page 160 set snmp profile on page 167 set snmp protocol on page 172 set snmp security on page 173 set snmp usm on page 174 display snmp notify target on page 189 set snmp profile set snmp profile 167 Configures an SNMP notification profile. A notification profile is a named list of all the notification types that can be generated by a switch, and for each notification type, the action to take (drop or send) when an event occurs. You can configure up to 10 notification profiles. Syntax — set snmp profile {default | profile-name} {drop | send} {notification-type | all} default | profile-name — Name of the notification profile you are creating or modifying. The profile-name can be up to 32 alphanumeric characters long, with no spaces. To modify the default notification profile, specify default. drop | send —Specifies the action that the SNMP engine takes with regard to the notifications you specify with notification-type or all. notification-type — Any of the items in Table 35. Table 35 SNMP notification types AuthenTraps Generated when the WX switch’s SNMP engine receives a bad community string. AutoTuneRadioChannelChangeTraps Generated when the RF Auto-Tuning feature changes the channel on a radio. AutoTuneRadioPowerChangeTraps Generated when the RF Auto-Tuning feature changes the power setting on a radio. ClientAssociationFailureTraps Generated when a client’s attempt to associate with a radio fails. ClientAuthorizationSuccessTraps Generated when a client is successfully authorized. ClientAuthenticationFailureTraps Generated when authentication fails for a client. ClientAuthorizationFailureTraps Generated when authorization fails for a client. ClientClearedTraps Generated when a client’s session is cleared. ClientDeAssociationTraps Generated when a client is dissociated from a radio. 168 CHAPTER 6: IP SERVICES COMMANDS Table 35 SNMP notification types (continued) ClientDot1xFailureTraps Generated when a client experiences an 802.1X failure. ClientRoamingTraps Generated when a client roams. CounterMeasureStartTraps Generated when MSS begins countermeasures against a rogue access point. CounterMeasureStopTraps Generated when MSS stops countermeasures against a rogue access point. DAPConnectWarningTraps Generated when a Distributed MAP whose fingerprint has not been configured in MSS establishes a management session with the switch. DeviceFailTraps Generated when an event with an Alert severity occurs. DeviceOkayTraps Generated when a device returns to its normal state. LinkDownTraps Generated when the link is lost on a port. LinkUpTraps Generated when the link is detected on a port. MichaelMICFailureTraps Generated when two Michael message integrity code (MIC) failures occur within 60 seconds, triggering Wi-Fi Protected Access (WPA) countermeasures. MobilityDomainJoinTraps Generated when the WX switch is initially able to contact a mobility domain seed member, or can contact the seed member after a timeout. MobilityDomainTimeoutTraps Generated when a timeout occurs after an WX switch has unsuccessfully tried to communicate with a seed member. MPBootTraps Generated when an MAP access point boots. MPTimeoutTraps Generated when an MAP access point fails to respond to the WX switch. PoEFailTraps Generated when a serious PoE problem, such as a short circuit, occurs. RFDetectAdhocUserTraps Generated when MSS detects an ad-hoc user. RFDetectRogueAPTraps Generated when MSS detects a rogue access point. set snmp profile 169 Table 35 SNMP notification types (continued) RFDetectRogueDisappearTraps Generated when a rogue access point is no longer being detected. RFDetectClientViaRogueWiredAPTraps Generated when MSS detects, on the wired part of the network, the MAC address of a wireless client associated with a third-party AP. RFDetectDoSPortTraps Generated when MSS detects an associate request flood, reassociate request flood, or disassociate request flood. RFDetectDoSTraps Generated when MSS detects a DoS attack other than an associate request flood, reassociate request flood, or disassociate request flood. RFDetectInterferingRogueAPTraps Generated when an interfering device is detected. RFDetectInterferingRogueDisappearTr aps Generated when an interfering device is no longer detected. RFDetectClientViaRogueWiredAPTraps Generated when MSS detects, on the wired part of the network, the MAC address of a wireless client associated with a third-party AP. RFDetectDoSPortTraps Generated when MSS detects an associate request flood, reassociate request flood, or disassociate request flood. RFDetectDoSTraps Generated when MSS detects a DoS attack other than an associate request flood, reassociate request flood, or disassociate request flood. RFDetectInterferingRogueAPTraps Generated when an interfering device is detected. RFDetectInterferingRogueDisappearTr aps Generated when an interfering device is no longer detected. RFDetectSpoofedMacAPTraps Generated when MSS detects a wireless packet with the source MAC address of a 3Com MAP, but without the spoofed MAP’s signature (fingerprint). RFDetectSpoofedSsidAPTraps Generated when MSS detects beacon frames for a valid SSID, but sent by a rogue AP. RFDetectUnAuthorizedAPTraps Generated when MSS detects the MAC address of an AP that is on the attack list. 170 CHAPTER 6: IP SERVICES COMMANDS Table 35 SNMP notification types (continued) RFDetectUnAuthorizedOuiTraps Generated when a wireless device that is not on the list of permitted vendors is detected. RFDetectUnAuthorizedSsidTraps Generated when an SSID that is not on the permitted SSID list is detected. all — Sends or drops all notifications. Defaults — A default notification profile (named default) is already configured in MSS. All notifications in the default profile are dropped by default. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command changes the action in the default notification profile from drop to send for all notification types: WX-1200# set snmp notify profile default send all success: change accepted. The following commands create notification profile snmpprof_rfdetect, and change the action to send for all RF detection notification types: WX-1200# set snmp notify profile snmpprof_rfdetect RFDetectAdhocUserTraps success: change accepted. WX-1200# set snmp notify profile snmpprof_rfdetect RFDetectClientViaRogueWiredAPTraps success: change accepted. WX-1200# set snmp notify profile snmpprof_rfdetect RFDetectDoSTraps success: change accepted. WX-1200# set snmp notify profile snmpprof_rfdetect RFDetectAdhocUserTraps success: change accepted. WX-1200# set snmp notify profile snmpprof_rfdetect RFDetectInterferingRogueAPTraps success: change accepted. WX-1200# set snmp notify profile snmpprof_rfdetect RFDetectInterferingRogueDisappearTraps success: change accepted. send send send send send send set snmp profile WX-1200# set snmp notify profile RFDetectRogueAPTraps success: change accepted. WX-1200# set snmp notify profile RFDetectRogueDisappearTraps success: change accepted. WX-1200# set snmp notify profile RFDetectSpoofedMacAPTraps success: change accepted. WX-1200# set snmp notify profile RFDetectSpoofedSsidAPTraps success: change accepted. WX-1200# set snmp notify profile RFDetectUnAuthorizedAPTraps success: change accepted. WX-1200# set snmp notify profile RFDetectUnAuthorizedOuiTraps success: change accepted. WX-1200# set snmp notify profile RFDetectUnAuthorizedSsidTraps success: change accepted. snmpprof_rfdetect send snmpprof_rfdetect send snmpprof_rfdetect send snmpprof_rfdetect send snmpprof_rfdetect send snmpprof_rfdetect send snmpprof_rfdetect send See Also clear snmp profile on page 122 set ip snmp server on page 152 set snmp community on page 160 set snmp notify target on page 162 set snmp protocol on page 172 set snmp security on page 173 set snmp usm on page 174 display snmp notify profile on page 188 171 172 CHAPTER 6: IP SERVICES COMMANDS set snmp protocol Enables an SNMP protocol. MSS supports SNMPv1, SNMPv2c, and SNMPv3. Syntax — set snmp protocol {v1 | v2c | usm | all} {enable | disable} v1 — SNMPv1 v2c — SNMPv2c usm — SNMPv3 (with the user security model) all — Enables all supported versions of SNMP. enable — Enables the specified SNMP version(s). disable — Disables the specified SNMP version(s). Defaults — All SNMP versions are disabled by default. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — SNMP requires the switch’s system IP address to be set. SNMP will not work without the system IP address. You also must enable the SNMP service using the set ip snmp server command. Examples — The following command enables all SNMP versions: WX-1200# set snmp protocol all enable success: change accepted. See Also set ip snmp server on page 152 set snmp community on page 160 set snmp notify target on page 162 set snmp profile on page 167 set snmp security on page 173 set snmp usm on page 174 display snmp status on page 191 set snmp security set snmp security 173 Sets the minimum level of security MSS requires for SNMP message exchanges. Syntax — set snmp security {unsecured | authenticated | encrypted | auth-req-unsec-notify} unsecured — SNMP message exchanges are not secure. This is the only value supported for SNMPv1 and SNMPv2c. authenticated — SNMP message exchanges are authenticated but are not encrypted. encrypted — SNMP message exchanges are authenticated and encrypted. auth-req-unsec-notify — SNMP message exchanges are authenticated but are not encrypted, and notifications are neither authenticated nor encrypted. Defaults — By default, MSS allows nonsecure (unsecured) SNMP message exchanges. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — SNMPv1 and SNMPv2c do not support authentication or encryption. If you plan to use SNMPv1 or SNMPv2c, leave the minimum level of SNMP security set to unsecured. Examples — The following command sets the minimum level of SNMP security allowed to authentication and encryption: WX-1200# set snmp security encrypted success: change accepted. See Also set ip snmp server on page 152 set snmp community on page 160 set snmp notify target on page 162 set snmp profile on page 167 174 CHAPTER 6: IP SERVICES COMMANDS set snmp protocol on page 172 set snmp usm on page 174 display snmp status on page 191 set snmp trap This command is deprecated in MSS Version 4.0. To enable or disable SNMP notifications, configure a notification profile. See set snmp profile on page 167. set snmp trap receiver This command is deprecated in MSS Version 4.0. To configure an SNMP notification target (also called trap receiver), see set snmp notify target on page 162. set snmp usm Creates a USM user for SNMPv3. This command does not apply to SNMPv1 or SNMPv2c. For these SNMP versions, use the set snmp community command to configure community strings. Syntax — set snmp usm usm-username snmp-engine-id {ip ip-addr | local | hex hex-string} access {read-only | read-notify | notify-only | read-write | notify-read-write} auth-type {none | md5 | sha} {auth-pass-phrase string | auth-key hex-string} encrypt-type {none | des | 3des | aes} {encrypt-pass-phrase string | encrypt-key hex-string} usm-username — Name of the SNMPv3 user. Specify between 1 and 32 alphanumeric characters, with no spaces. snmp-engine-id {ip ip-addr | local | hex hex-string} — Specifies a unique identifier for the SNMP engine. To send informs, you must specify the engine ID of the inform receiver. To send traps and to allow get and set operations and so on, specify local as the engine ID. hex hex-string — ID is a hexadecimal string. set snmp usm 175 ip ip-addr — ID is based on the IP address of the station running the management application. Enter the IP address of the station. MSS calculates the engine ID based on the address. local — Uses the value computed from the switch’s system IP address. access {read-only | read-notify | notify-only | read-write | notify-read-write} Specifies the access level of the user: read-only — An SNMP management application using the string can get (read) object values on the switch but cannot set (write) them. read-notify — An SNMP management application using the string can get object values on the switch but cannot set them. The switch can use the string to send notifications. notify-only — The switch can use the string to send notifications. read-write — An SNMP management application using the string can get and set object values on the switch. notify-read-write — An SNMP management application using the string can get and set object values on the switch. The switch can use the string to send notifications. auth-type {none | md5 | sha} {auth-pass-phrase string | auth-key hex-string} Specifies the authentication type used to authenticate communications with the remote SNMP engine. You can specify one of the following: none—No authentication is used. md5—Message-digest algorithm 5 is used. sha—Secure Hashing Algorithm (SHA) is used. If the authentication type is md5 or sha, you can specify a passphrase or a hexadecimal key. 176 CHAPTER 6: IP SERVICES COMMANDS To specify a passphrase, use the auth-pass-phrase string option. The string can be from 8 to 32 alphanumeric characters long, with no spaces. To specify a key, use the auth-key hex-string option. encrypt-type {none | des | 3des | aes} {encrypt-pass-phrase string | encrypt-key hex-string} — Specifies the encryption type used for SNMP traffic. You can specify one of the following: none—No encryption is used. This is the default. des—Data Encryption Standard (DES) encryption is used. 3des—Triple DES encryption is used. aes—Advanced Encryption Standard (AES) encryption is used. If the encryption type is des, 3des, or aes, you can specify a passphrase or a hexadecimal key. To specify a passphrase, use the encrypt-pass-phrase string option. The string can be from 8 to 32 alphanumeric characters long, with no spaces. To specify a key, use the encrypt-key hex-string option. Defaults — No SNMPv3 users are configured by default. When you configure an SNMPv3 user, the default access is read-only, and the default authentication and encryption types are both none. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command creates USM user snmpmgr1, associated with the local SNMP engine ID. This user can send traps to notification receivers. WX-1200# set snmp usm snmpmgr1 snmp-engine-id local success: change accepted. The following command creates USM user securesnmpmgr1, which uses SHA authentication and 3DES encryption with passphrases. This user can send informs to the notification receiver that has engine ID 192.168.40.2. set summertime 177 WX-1200# set snmp usm securesnmpmgr1 snmp-engine-id ip 192.168.40.2 auth-type sha auth-pass-phrase myauthpword encrypt-type 3des encrypt-pass-phrase mycryptpword success: change accepted. See Also set summertime clear snmp usm on page 122 set ip snmp server on page 152 set snmp community on page 160 set snmp notify target on page 162 set snmp profile on page 167 set snmp protocol on page 172 set snmp security on page 173 display snmp usm on page 193 Offsets the real-time clock of a wireless LAN switch by +1 hour and returns it to standard time for daylight savings time or a similar summertime period that you set. Syntax — set summertime summer-name [start week weekday month hour min end week weekday month hour min] summer-name — Name of up to 32 alphanumeric characters that describes the summertime offset. You can use a standard name or any name you like. start — Start of the time change period. week — Week of the month to start or end the time change. Valid values are first, second, third, fourth, or last. weekday — Day of the week to start or end the time change. Valid values are sun, mon, tue, wed, thu, fri, and sat. month — Month of the year to start or end the time change. Valid values are jan, feb, mar, apr, may, jun, jul, aug, sep, oct, nov, and dec. hour — Hour to start or end the time change — a value between 0 and 23 on the 24-hour clock. 178 CHAPTER 6: IP SERVICES COMMANDS min — Minute to start or end the time change — a value between 0 and 59. end — End of the time change period. Defaults — If you do not specify a start and end time, the system implements the time change starting at 2:00 a.m. on the first Sunday in April and ending at 2:00 a.m. on the last Sunday in October, according to the North American standard. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must first set the time zone with the set timezone command for the offset to work properly without the start and end values. Configure summertime before you set the time and date. Otherwise, summertime’s adjustment of the time will make the time incorrect, if the date is within the summertime period. Examples — To enable summertime and set the summertime time zone to PDT (Pacific Daylight Time), type the following command: WX1200# set summertime PDT success: change accepted See Also clear snmp usm on page 122 clear timezone on page 124 display summertime on page 138 display timedate on page 138 display timezone on page 139 set timedate on page 180 set timezone on page 181 set system ip-address set system ip-address 179 Configures the system IP address. The system IP address determines the interface or source IP address MSS uses for system tasks, including the following: Mobility domain operations Topology reporting for dual-homed MAP access points Default source IP address used in unsolicited communications such as AAA accounting reports and SNMP traps Syntax — set system ip-address ip-addr ip-addr — IP address, in dotted decimal notation. The address must be configured on one of the WX switch’s VLANs. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must use an address that is configured on one of the WX switch’s VLANs. To display the system IP address, use the display system command. Examples — The following commands configure an IP interface on VLAN taupe and configure the interface to be the system IP address: WX4400# set interface taupe ip 10.10.20.20/24 success: set ip address 10.10.20.20 netmask 255.255.255.0 on vlan taupe WX4400# set system ip-address 10.10.20.20 success: change accepted. See Also clear system ip-address on page 124 display system on page 42 set interface on page 143 180 CHAPTER 6: IP SERVICES COMMANDS set timedate Sets the time of day and date on the wireless LAN switch. Syntax — set timedate {date mmm dd yyyy [time hh:mm:ss]} date mmm dd yyyy — System date: mmm — month dd — day yyyy — year time hh:mm:ss — System time, in hours, minutes, and seconds. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — The day of week is automatically calculated from the day you set. The time displayed by the CLI after you type the command might be slightly later than the time you enter due to the interval between when you press Enter and when the CLI reads and displays the new time and date. Configure summertime before you set the time and date. Otherwise, summertime’s adjustment of the time will make the time incorrect, if the date is within the summertime period. Examples — The following command sets the date to March 13, 2003 and time to 11:11:12: WX4400# set timedate date feb 29 2004 time 23:58:00 Time now is: Sun Feb 29 2004, 23:58:02 PST See Also clear snmp usm on page 122 clear timezone on page 124 display summertime on page 138 display timedate on page 138 display timezone on page 139 set summertime on page 177 set timezone on page 181 set timezone set timezone 181 Sets the number of hours, and optionally the number of minutes, that the wireless LAN switch’s real-time clock is offset from Coordinated Universal Time (UTC). These values are also used by Network Time Protocol (NTP), if it is enabled. Syntax — set timezone zone-name {-hours [minutes]} zone-name — Time zone name of up to 32 alphabetic characters. You can use a standard name or any name you like. - (minus sign) — Minus time to indicate hours (and minutes) to be subtracted from UTC. Otherwise, hours and minutes are added by default. hours — Number of hours to add or subtract from UTC. minutes — Number of minutes to add or subtract from UTC. Defaults — If this command is not used, then the default time zone is UTC. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To set the time zone for Pacific Standard Time (PST), type the following command: WX1200# set timezone PST -8 Timezone is set to 'PST', offset from UTC is -8:0 hours. See Also clear snmp usm on page 122 clear timezone on page 124 display summertime on page 138 display timedate on page 138 display timezone on page 139 set summertime on page 177 set timedate on page 180 182 CHAPTER 6: IP SERVICES COMMANDS display dhcp-client Displays DHCP client information for all VLANs. Syntax — display dhcp-client Defaults — None. Access — All. History —Introduced in MSS Version 4.0. Examples — The following command displays DHCP client information: WX-1200# display dhcp-client Interface: corpvlan(4) Configuration Status: Enabled DHCP State: IF_UP Lease Allocation: 65535 seconds Lease Remaining: 65532 seconds IP Address: 10.3.1.110 Subnet Mask: 255.255.255.0 Default Gateway: 10.3.1.1 DHCP Server: 10.3.1.4 DNS Servers: 10.3.1.29 DNS Domain Name: mycorp.com Table 36 describes the fields in this display. Table 36 Output for display dhcp-client Field Description Interface VLAN name and number. Configuration Status Status of the DHCP client on this VLAN: DHCP State Enabled Disabled State of the IP interface: IF_UP IF_DOWN Lease Allocation Duration of the address lease. Lease Remaining Number of seconds remaining before the address lease expires. IP Address IP address received from the DHCP server. display dhcp-server 183 Table 36 Output for display dhcp-client (continued) Field Description Subnet Mask Network mask of the IP address received from the DHCP server. Default Gateway Default gateway IP address received from the DHCP server. If the address is 0.0.0.0, the server did not provide an address. DHCP Server IP address of the DHCP server. DNS Servers DNS server IP address(es) received from the DHCP server. DNS Domain Name Default DNS domain name received from the DHCP server. See Also display dhcp-server set interface dhcp-client on page 144 Displays MSS DHCP server information. Syntax — display dhcp-server [interface vlan-id] [verbose] interface vlan-id — Displays the IP addresses leased by the specified VLAN. verbose — Displays configuration and status information for the MSS DHCP server. Defaults — None. Access — All. History —Introduced in MSS Version 4.0. Examples — The following command displays the addresses leased by the MSS DHCP server: WX-1200# display dhcp-server VLAN Name Address ---- -------------- --------------1 default 10.10.20.2 1 default 10.10.20.3 2 red-vlan 192.168.1.5 2 red-vlan 192.168.1.7 MAC Lease Remaining (sec) ----------------- -------------------00:01:02:03:04:05 12345 00:01:03:04:06:07 2103 00:01:03:04:06:08 102 00:01:03:04:06:09 16789 184 CHAPTER 6: IP SERVICES COMMANDS The following command displays configuration and status information for each VLAN on which the DHCP server is configured: WX-1200# display dhcp-server Interface: 0 (Direct AP) Status: UP Address Range: 10.0.0.1-10.0.0.253 Interface: Status: Address Range: DHCP Clients: Hardware Address: State: Lease Allocation: Lease Remaining: IP Address: Subnet Mask: Default Gateway: DNS Servers: DNS Domain Name: default(1) UP 10.10.20.2-10.10.20.254 00:01:02:03:04:05 BOUND 43200 seconds 12345 seconds 10.10.20.2 255.255.255.0 10.10.20.1 10.10.20.4 10.10.20.5 mycorp.com Table 37 and Table 38 describe the fields in these displays. Table 37 Output for display dhcp-server Field Description VLAN VLAN number. Name VLAN name. Address IP address leased by the server. MAC Address MAC address of the device that holds the lease for the address. Lease Remaining Number of seconds remaining before the address lease expires. display dhcp-server 185 Table 38 Output for display dhcp-client verbose Field Description Interface VLAN name and number. Status Status of the interface: UP DOWN Address Range Range from which the server can lease addresses. Hardware Address MAC address of the DHCP client. State State of the address lease: SUSPEND—MSS is checking for the presence of another DHCP server on the subnet. This is the initial state of the MSS DHCP server. The MSS DHCP server remains in this state if another DHCP server is detected. CHECKING—MSS is using ARP to verify whether the address is available. OFFERING—MSS offered the address to the client and is waiting for the client to send a DHCPREQUEST for the address. BOUND—The client accepted the address. HOLDING—The address is already in use and is therefore unavailable. Lease Allocation Duration of the address lease, in seconds. Lease Remaining Number of seconds remaining before the address lease expires. IP Address IP address leased to the client. Subnet Mask Network mask of the IP address leased to the client. Default Gateway Default gateway IP address included in the DHCP Offer to the client. DNS Servers DNS server IP address(es) included in the DHCP Offer to the client. DNS Domain Name Default DNS domain name included in the DHCP Offer to the client. See Also set interface dhcp-server on page 145 186 CHAPTER 6: IP SERVICES COMMANDS display snmp community Displays the configured SNMP community strings. Syntax — display snmp community Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — To display the configured SNMP community strings, use the following command: WX-1200# display snmp community Communities: "wireless_switch", access=read-write-notify, notify target use cnt=0 Table 39 describes the fields in this display. Table 39 Outpot for display snmp community Field Description Community string Community string. access Access settings for the string: notify target use cnt notify-only—An SNMP management application using the string can receive notifications from the switch, but cannot get or set object values. notify-read-write—An SNMP management application using the string can get and set object values on the switch. The application can also receive notifications from the switch. read-notify—An SNMP management application using the string can get object values on the switch but cannot set them. The application can also receive notifications from the switch. read-only—An SNMP management application using the string can get (read) object values on the switch but cannot set (write) them. read-write—An SNMP management application using the string can get and set object values on the switch. Number of times this community is specified in a notification target entry. display snmp counters See Also display snmp counters clear snmp community on page 121 set snmp community on page 160 Displays SNMP statistics counters. Syntax — display snmp counters Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — To display SNMP statistics counters, use the following command: WX-1200# display snmp counters Base SNMP Stats: input packets: 0 output packets: 0 output notifys(traps & informs): 0 input packets with bad version: 0 input packets with ASN.1 parse errs: 0 input packets silently dropped: 0 Community Stats: input packets with bad community names: 0 input packets with bad community uses: 0 SNMPv3 Stats: input packets with unknown security models: 0 input packets that are invalid: 0 input packets without PDU handlers: 0 input packets specifying an unavailable context: 0 input packets specifying an unknown context: 0 SNMPv3/USM Stats: input packets with unsupported security level: 0 input packets not in time window: 0 input packets with an unknown user name: 0 input packets with an unknown engineID: 0 input packets with an authentication failure: 0 input packets with a decryption failure: 0 187 188 CHAPTER 6: IP SERVICES COMMANDS display snmp notify profile Displays SNMP notification profiles. Syntax — display snmp notify profile Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — To display notification profiles, use the following command: WX-1200# display snmp notify profile Notify profiles: default notify profile use cnt=0 notify status for profile: LINKDOWN, drop LINKUP, drop AUTHENTICATION, drop DEVFAIL, drop DEVOKAY, drop POEFAIL, drop MPTIMEOUT, drop MPBOOT, drop MOBDOMJOIN, drop MOBDOMTIMEOUT, drop MIKEMICFAIL, drop ROGUEDETECT, drop RFDETECTADHOCUSER, drop RFDETECTROGUEDISAPPEAR, drop CLIENTAUTHENFAIL, drop CLIENTAUTHORFAIL, drop CLIENTASSOCFAIL, drop CLIENTDEASSOC, drop CLIENTROAMING, drop AUTOTUNERADIOPOWERCHANGE, drop AUTOTUNERADIOCHANNELCHANGE, drop COUNTERMEASURESTART, drop COUNTERMEASURESTOP, drop CLIENTDOT1XFAIL, drop CLIENTCLEARED, drop CLIENTAUTHORSUC, drop RFDSPOOFMACAP, drop display snmp notify target 189 RFDSPOOFSSIDAP, drop RFDDETECTDOS, drop RFDCLNTROGUEWAP, drop RFDINTROGUEAP, drop RFDINTROGUEDISAP, drop RFDUNAUTHORSSID, drop RFDUNAUTHOROUI, drop RFDUNAUTHORAP, drop DAPCONNWARN, drop RFDDETECTDOSPORT, drop The command lists settings separately for each notification profile. The use count indicates how many notification targets use the profile. For each notification type, the command lists whether MSS sends notifications of that type to the targets that use the notification profile. See Also display snmp notify target clear snmp profile on page 122 set snmp profile on page 167 Displays SNMP notification targets. Syntax — display snmp notify target Defaults — None. Access — Enabled. ‘History —Introduced in MSS Version 4.0. Examples — To display a list of the SNMP notification targets, use the following command: WX-1200# display snmp notification target Notify targets: 1: 10.10.40.99:162 user="remote-nmsuser", exists=no engineID=ip notify profile=default, exists=yes security model=USM security type=notify notify type=INFORM 190 CHAPTER 6: IP SERVICES COMMANDS retry count=snmp-engine-id timeout=1 Table 40 describes the fields in this display. Table 40 Output for display snmp notification target Field Description user Name of the SNMP user. engineID SNMP engine ID associated with the user. For traps, the engine ID is local. For informs, the engine ID is that of the notification receiver. notify profile Name of the notification profile used by the target. security model SNMP security model: security type notify type v1 v2c usm Security requirements for exchanging messages with the target: unsecured—SNMP message exchanges are not secure. authenticated—SNMP message exchanges are authenticated but are not encrypted. encrypted—SNMP message exchanges are authenticated and encrypted. Type of notification sent to the target: inform trap retry count Number of times MSS will resend an unacknowledged inform. timeout Number of seconds MSS waits for acknowledgement of an inform before resending the inform (if retries are available). See Also clear snmp notify target on page 121 set snmp notify target on page 162 display snmp status display snmp status 191 Displays SNMP version and status information. Syntax — display snmp status Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — To display SNMP version and status information, use the following command: WX-1200# display snmp status Server: SNMP agent (server) is enabled SNMPv1 is enabled SNMPv2c is disabled SNMPv3/USM is disabled SNMP minimum security is unsecured System name: pubs System location: -- not set -System contact: -- not set -SNMP engine ID: 00000063000000a1c0a80142 (IP 192.168.1.66:161) SNMP engine boots: 1 SNMP engine time: 19410 SNMP max message size: 2048 Table 41 describes the fields in this display. Table 41 Output for display SNMP status Field Description SNMP agent (server) is State of the SNMP service on the switch: Enabled Disabled SNMPv1 is ... State of each supported protocol version of SNMP: SNMPv2c is ... Enabled SNMPv3 is ... Disabled 192 CHAPTER 6: IP SERVICES COMMANDS Table 41 Output for display SNMP status (continued) Field Description SNMP minimum security Lowest (least secure) security level set on the switch: authenticated—SNMP message exchanges are authenticated but are not encrypted. auth-req-unsec-notify—SNMP message exchanges are authenticated but are not encrypted, and notifications are neither authenticated nor encrypted. encrypted—SNMP message exchanges are authenticated and encrypted. unsecured—SNMP message exchanges are not secure. System Name String configured by the set system name command. System location String configured by the set system location command. System contact String configured by the set system contact command. SNMP engine ID Unique ID of this SNMP engine. SNMP engine boots Number of times the SNMP engine has booted. This number is at least as great as the number of times the switch has booted. SNMP engine time Number of seconds since the SNMP engine was rebooted. SNMP max message size Maximum length, in bytes, of SNMP messages sent by this SNMP engine. See Also set snmp community on page 160 set snmp notify target on page 162 set snmp profile on page 167 set snmp protocol on page 172 set snmp security on page 173 set snmp usm on page 174 display snmp community on page 186 display snmp counters on page 187 display snmp notify profile on page 188 display snmp usm display snmp usm display snmp notify target on page 189 display snmp usm on page 193 193 Displays information about SNMPv3 users. Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — To display USM settings, use the following command: WX-1200# display snmp usm USM users: "nmsuser", engineID=localSnmpID access=read-notify auth=NONE encrypt=NONE notify target use cnt=0 Table 42 describes the fields in this display. Table 42 Output for display snmp usm Field Description USM name Name of the SNMPv3 user. engineID Engine ID for the USM name, which is either the local switch or the notification target where informs are to be sent. 194 CHAPTER 6: IP SERVICES COMMANDS Table 42 Output for display snmp usm (continued) Field Description access Access settings for the string: auth encrypt notify target use cnt read-only—An SNMP management application using the string can get (read) object values on the switch but cannot set (write) them. read-notify—An SNMP management application using the string can get object values on the switch but cannot set them. The switch can use the string to send notifications. notify-only—The switch can use the string to send notifications. read-write—An SNMP management application using the string can get and set object values on the switch. notify-read-write—An SNMP management application using the string can get and set object values on the switch. The switch can use the string to send notifications. Authentication type: md5 sha none Encryption (privacy) setting: des 3des aes none Number of times this community is specified in a notification target entry. See Also clear snmp usm on page 122 display snmp usm on page 193 telnet telnet 195 Opens a Telnet client session with a remote device. Syntax — telnet {ip-addr | hostname} [port port-num] ip-addr — IP address of the remote device. hostname — Hostname of the remote device. port port-num — TCP port number on which the TCP server on the remote device listens for Telnet connections. Defaults — MSS attempts to establish Telnet connections with TCP port 23 by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To end a Telnet session from the remote device, press Ctrl+t or type quit or logout in the management session on the remote device. To end a client session from the local WX switch, use the clear sessions telnet client command. If the configuration of the WX switch from which you enter the telnet command has an ACL that denies Telnet client traffic, the ACL also denies access by the telnet command. Examples — In the following example, an administrator establishes a Telnet session with another device and enters a command on the remote device: WX4400# telnet 10.10.10.90 Session 0 pty tty2.d Trying 10.10.10.90... Connected to 10.10.10.90 Disconnect character is '^t' Copyright (c) 2004 3Com Corporation. All rights reserved. Username: username Password: password WX1200-remote> display vlan Admin VLAN Name Status ---- ---------------- -----1 default Up VLAN Tunl State Affin Port Tag ----- ----- ---------------- ----Up 5 3 none Port State ----Up 196 CHAPTER 6: IP SERVICES COMMANDS 3 red 10 backbone Up Up Up Up 5 5 1 2 none Up none Up When the administrator presses Ctrl+t to end the Telnet connection, the management session returns to the local prompt: WX1200-remote> Session 0 pty tty2.d terminated tt name tty2.d WX1200# See Also traceroute clear sessions on page 497 display sessions on page 500 Traces the route to an IP host. Syntax — traceroute host [dnf] [no-dns] [port port-num] [queries num] [size size] [ttl hops] [wait ms] host — IP address, hostname, or alias of the destination host. Specify the IP address in dotted decimal notation. dnf — Sets the Do Not Fragment bit in the ping packet to prevent the packet from being fragmented. no-dns — Prevents MSS from performing a DNS lookup for each hop to the destination host. port port-num — TCP port number listening for the traceroute probes. queries num — Number of probes per hop. size size — Probe packet size in bytes. You can specify from 40 through 1,460. ttl hops — Maximum number of hops, which can be from 1 through 255. wait ms — Probe wait in milliseconds. You can specify from 1 through 100,000. Defaults dnf — Disabled traceroute no-dns — Disabled port — 33434 queries — 3 size — 38 ttl — 30 wait — 5000 197 Access — All. History —Introduced in MSS Version 3.0. Usage — To stop a traceroute command that is in progress, press Ctrl+C. Examples — The following example traces the route to host server1: WX4400# traceroute server1 traceroute to server1.example.com (192.168.22.7), 30 hops max, 38 byte packets 1 engineering-1.example.com (192.168.192.206) 2 ms 1 ms 1 ms 2 engineering-2.example.com (192.168.196.204) 2 ms 3 ms 2 ms 3 gateway_a.example.com (192.168.1.201) 6 ms 3 ms 3 ms 4 server1.example.com (192.168.22.7) 3 ms * 2 ms The first row of the display indicates the target host, the maximum number of hops, and the packet size. Each numbered row displays information about one hop. The rows are displayed in the order in which the hops occur, beginning with the hop closest to the WX switch. The row for a hop lists the total time in milliseconds for each ICMP packet to reach the router or host, plus the time for the ICMP Time Exceeded message to return to the host. An exclamation point (!) following any of these values indicates that the Port Unreachable message returned by the destination has a maximum hop count of 0 or 1. This can occur if the destination uses the maximum hop count value from the arriving packet as the maximum hop count in its ICMP reply. The reply does not arrive at the source until the destination receives a traceroute packet with a maximum hop count equal to the number of hops between the source and destination. An asterisk (*) indicates that the timeout period expired before MSS received a Time Exceeded message for the packet. 198 CHAPTER 6: IP SERVICES COMMANDS If Traceroute receives an ICMP error message other than a Time Exceeded or Port Unreachable message, MSS displays one of the error codes described in Table 43 instead of displaying the round-trip time or an asterisk (*). Table 43 describes the traceroute error messages. Table 43 Error messages for traceroute Field Description !N No route to host. The network is unreachable. !H No route to host. The host is unreachable. !P Connection refused. The protocol is unreachable. !F Fragmentation needed but Do Not Fragment (DNF) bit was set. !S Source route failed. !A Communication administratively prohibited. ? Unknown error occurred. See Also ping on page 140 7 AAA COMMANDS Use authentication, authorization, and accounting (AAA) commands to provide a secure network connection and a record of user activity. Location policy commands override any virtual LAN (VLAN) or security ACL assignment by AAA or the local WX database to help you control access locally. (Security ACLs are packet filters. For command descriptions, see Chapter 12.) Commands by Usage This chapter presents AAA commands alphabetically. Use Table 44 to locate commands in this chapter based on their use. Table 44 AAA Commands by Usage Type Command Authentication set authentication console on page 228 set authentication admin on page 226 set authentication dot1x on page 230 set authentication mac on page 236 set authentication last-resort on page 234 set authentication web on page 239 set authentication proxy on page 238 clear authentication admin on page 202 clear authentication console on page 203 clear authentication dot1x on page 204 clear authentication last-resort on page 205 clear authentication mac on page 205 clear authentication proxy on page 206 200 CHAPTER 7: AAA COMMANDS Table 44 AAA Commands by Usage (continued) Type Command clear authentication web on page 207 Local Authorization set user on page 256 for Password Users clear user on page 213 set user attr on page 257 clear user attr on page 214 set usergroup on page 259 clear usergroup on page 215 set user group on page 258 clear user group on page 215 clear usergroup attr on page 216 Local Authorization set mac-user on page 245 for MAC Users clear mac-user on page 209 set mac-user attr on page 246 clear mac-user attr on page 209 set mac-usergroup attr on page 252 clear mac-usergroup attr on page 212 clear mac-user group on page 210 clear mac-usergroup on page 211 Web authorization set web-aaa on page 260 Accounting set accounting {admin | console} on page 223 set accounting {dot1x | mac | web} on page 224 display accounting statistics on page 220 clear accounting on page 201 AAA information display aaa on page 217 Mobility Profiles set mobility-profile on page 253 set mobility-profile mode on page 255 display mobility-profile on page 222 clear mobility-profile on page 213 Location Policy set location policy on page 241 display location policy on page 222 clear location policy on page 208 clear accounting clear accounting 201 Removes accounting services for specified wireless users with administrative access or network access. Syntax — clear accounting {admin | dot1x} {user-glob} admin — Users with administrative access to the WX switch through a console connection or through a Telnet or Web Manager connection. dot1x — Users with network access through the WX switch. Users with network access are authorized to use the network through either an IEEE 802.1X method or their media access control (MAC) address. user-glob — Single user or set of users with administrative access or network access. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character—either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command removes accounting services for authorized network user Nin: WX4400# clear accounting dot1x Nin success: change accepted. See Also set accounting {admin | console} on page 223 display accounting statistics on page 220 202 CHAPTER 7: AAA COMMANDS clear authentication admin Removes an authentication rule for administrative access through Telnet or Web Manager. Syntax — clear authentication admin user-glob user-glob — A single user or set of users. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character, either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command clears authentication for administrator Jose: WX4400# clear authentication admin Jose success: change accepted. See Also clear authentication console on page 203 clear authentication dot1x on page 204 clear authentication last-resort on page 205 clear authentication mac on page 205 clear authentication web on page 207 display aaa on page 217 set authentication admin on page 226 clear authentication console clear authentication console 203 Removes an authentication rule for administrative access through the Console. Syntax — clear authentication console user-glob user-glob — A single user or set of users. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character, either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. The syntax descriptions for the clear authentication commands have been separated for clarity. However, the options and behavior for the clear authentication console command are the same as in previous releases. Examples — The following command clears authentication for administrator Regina: WX4400# clear authentication console Regina success: change accepted. See Also clear authentication admin on page 202 display aaa on page 217 clear authentication dot1x on page 204 clear authentication last-resort on page 205 clear authentication mac on page 205 clear authentication web on page 207 set authentication console on page 228 204 CHAPTER 7: AAA COMMANDS clear authentication dot1x Removes an 802.1X authentication rule. Syntax — clear authentication dot1x {ssid ssid-name | wired} user-glob ssid ssid-name — SSID name to which this authentication rule applies. wired — Clears a rule used for access over an WX switch’s wired-authentication port. user-glob — User-glob associated with the rule you are removing. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character, either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command removes 802.1X authentication for network users with usernames ending in @thiscorp.com who try to access SSID finance: WX4400# clear authentication dot1x ssid finance *@thiscorp.com See Also clear authentication admin on page 202 clear authentication console on page 203 clear authentication last-resort on page 205 clear authentication mac on page 205 clear authentication web on page 207 display aaa on page 217 set authentication dot1x on page 230 clear authentication last-resort clear authentication last-resort 205 Removes a last-resort authentication rule. Syntax — clear authentication last-resort {ssid ssid-name | wired} ssid ssid-name —SSID name to which this authentication rule applies. wired — Clears a rule used for access over an WX switch’s wired-authentication port. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command removes a last-resort authentication rule for wired-authentication access: WX4400# clear authentication last-resort wired See Also clear authentication mac clear authentication admin on page 202 clear authentication console on page 203 clear authentication dot1x on page 204 clear authentication mac on page 205 clear authentication web on page 207 display aaa on page 217 set authentication last-resort on page 234 Removes a MAC authentication rule. Syntax — clear authentication mac {ssid ssid-name | wired} mac-addr-glob ssid ssid-name — SSID name to which this authentication rule applies. wired — Clears a rule used for access over an WX switch’s wired-authentication port. 206 CHAPTER 7: AAA COMMANDS mac-addr-glob — MAC address glob associated with the rule you are removing. Specify a MAC address, or use the wildcard (*) character to specify a set of MAC addresses. (For details, see “MAC Address Globs” on page 27.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command removes a MAC authentication rule for access to SSID thatcorp by MAC addresses beginning with aa:bb:cc: WX4400# clear authentication mac ssid thatcorp aa:bb:cc:* See Also clear authentication proxy clear authentication admin on page 202 clear authentication console on page 203 clear authentication dot1x on page 204 clear authentication last-resort on page 205 clear authentication web on page 207 display aaa on page 217 set authentication mac on page 236 Removes a proxy rule for third-party AP users. Syntax — clear authentication proxy ssid ssid-name user-glob ssid-name — SSID name to which this authentication rule applies. user-glob — User-glob associated with the rule you are removing. Defaults — None. Access — Enabled. History —Introduced in MSS 4.0. clear authentication web 207 Examples — The following command removes the proxy rule for SSID mycorp and userglob **: WX-1200# clear authentication proxy ssid mycorp ** See Also clear authentication web set authentication proxy on page 238 on page 260 Removes a WebAAA rule. Syntax — clear authentication web {ssid ssid-name | wired} user-glob ssid ssid-name — SSID name to which this authentication rule applies. wired — Clears a rule used for access over an WX switch’s wired-authentication port. user-glob — User-glob associated with the rule you are removing. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character—either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command removes WebAAA for SSID research and userglob temp*@thiscorp.com: WX4400# clear authentication web ssid research temp*@thiscorp.com See Also clear authentication admin on page 202 clear authentication console on page 203 208 CHAPTER 7: AAA COMMANDS clear location policy clear authentication dot1x on page 204 clear authentication last-resort on page 205 clear authentication mac on page 205 display aaa on page 217 set authentication web on page 239 Removes a rule from the location policy on a WX switch. Syntax — clear location policy rule-number rule-number — Index number of a location policy rule to remove from the location policy. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To determine the index numbers of location policy rules, use the display location policy command. Removing all the ACEs from the location policy disables this function on the WX switch. Examples — The following command removes location policy rule 4 from an WX switch’s location policy: WX4400# clear location policy 4 success: clause 4 is removed. See Also display location policy on page 222 set location policy on page 241 clear mac-user clear mac-user 209 Removes a user profile from the local database on the WX switch, for a user who is authenticated by a MAC address. (To remove a user profile in RADIUS, see the documentation for your RADIUS server.) Syntax — clear mac-user mac-addr mac-addr — MAC address of the user, in hexadecimal numbers separated by colons (:). You can omit leading zeros. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Deleting a MAC user’s profile from the database deletes the assignment of any attributes in the profile to the user. Examples — The following command removes the user profile for a user at MAC address 01:02:03:04:05:06: WX4400# clear mac-user 01:02:03:04:05:06 success: change accepted. See Also clear mac-user attr display aaa on page 217 set mac-usergroup attr on page 252 set mac-user attr on page 246 Removes an authorization attribute from the user profile in the local database on the WX switch, for a user who is authenticated by a MAC address. (To remove an authorization attribute in RADIUS, see the documentation for your RADIUS server.) Syntax — clear mac-user mac-addr attr attribute-name mac-addr — MAC address of the user, in hexadecimal numbers separated by colons (:). You can omit leading zeros. 210 CHAPTER 7: AAA COMMANDS attribute-name — Name of an attribute used to authorize the MAC user for a particular service or session characteristic. (For a list of authorization attributes, see Table 47 on page 247.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command removes an access control list (ACL) from the profile of a user at MAC address 01:02:03:04:05:06: WX4400# clear mac-user 01:02:03:04:05:06 attr filter-id success: change accepted. See Also clear mac-user group display aaa on page 217 set mac-user attr on page 246 Removes a user profile from a MAC user group in the local database on the WX switch, for a user who is authenticated by a MAC address. (To remove a MAC user group profile in RADIUS, see the documentation for your RADIUS server.) Syntax — clear mac-user mac-addr group mac-addr — MAC address of the user, in hexadecimal numbers separated by colons (:). You can omit leading zeros. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Removing a MAC user from a MAC user group removes the group name from the user’s profile, but does not delete the user group from the local WX database. To remove the group, use clear mac-usergroup. clear mac-usergroup 211 Examples — The following command deletes the user profile for a user at MAC address 01:02:03:04:05:06 from its user group: WX4400# clear mac-user 01:02:03:04:05:06 group success: change accepted. See Also clear mac-usergroup clear mac-usergroup on page 211 display aaa on page 217 set mac-user on page 245 Removes a user group from the local database on the WX switch, for a group of users who are authenticated by a MAC address. (To delete a MAC user group in RADIUS, see the documentation for your RADIUS server.) Syntax — clear mac-usergroup group-name group-name — Name of an existing MAC user group. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To remove a user from a MAC user group, use the clear mac-user group command. Examples — The following command deletes the MAC user group eastcoasters from the local database: WX4400# clear mac-usergroup eastcoasters success: change accepted. See Also clear mac-usergroup attr on page 212 display aaa on page 217 set mac-usergroup attr on page 252 212 CHAPTER 7: AAA COMMANDS clear mac-usergroup attr Removes an authorization attribute from a MAC user group in the local database on the WX switch, for a group of users who are authenticated by a MAC address. (To unconfigure an authorization attribute in RADIUS, see the documentation for your RADIUS server.) Syntax — clear mac-usergroup group-name attr attribute-name group-name — Name of an existing MAC user group. attribute-name — Name of an attribute used to authorize the MAC users in the user group for a particular service or session characteristic. (For a list of authorization attributes, see Table 47 on page 247.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To remove the group itself, use the clear mac-usergroup command. Examples — The following command removes the members of the MAC user group eastcoasters from a VLAN assignment by deleting the VLAN-Name attribute from the group: WX4400# clear mac-usergroup eastcoasters attr vlan-name success: change accepted. See Also clear mac-usergroup on page 211 display aaa on page 217 set mac-usergroup attr on page 252 clear mobility-profile clear mobility-profile 213 Removes a Mobility Profile entirely. Syntax — clear mobility-profile name name — Name of an existing Mobility Profile. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command removes the Mobility Profile for user Nin: WX1200# clear mobility-profile Nin success: change accepted. See Also clear user set mobility-profile on page 253 set mobility-profile mode on page 255 display mobility-profile on page 222 Removes a user profile from the local database on the WX switch, for a user with a password. (To remove a user profile in RADIUS, see the documentation for your RADIUS server.) Syntax — clear user username username — Username of a user with a password. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Deleting the user’s profile from the database deletes the assignment of any attributes in the profile to the user. 214 CHAPTER 7: AAA COMMANDS Examples — The following command deletes the user profile for user Nin: WX4400# clear user Nin success: change accepted. See Also clear user attr display aaa on page 217 set user on page 256 Removes an authorization attribute from the user profile in the local database on the WX switch, for a user with a password. (To remove an authorization attribute from a RADIUS user profile, see the documentation for your RADIUS server.) Syntax — clear user username attr attribute-name username — Username of a user with a password. attribute-name — Name of an attribute used to authorize the user for a particular service or session characteristic. (For a list of authorization attributes, see Table 47 on page 247.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command removes the Session-Timeout attribute from Hosni’s user profile: WX4400# clear user Hosni attr session-timeout success: change accepted. See Also display aaa on page 217 set user attr on page 257 clear user group clear user group 215 Removes a user with a password from membership in a user group in the local database on the WX switch. (To remove a user from a user group in RADIUS, see the documentation for your RADIUS server.) Syntax — clear user username group username — Username of a user with a password. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Removing the user from the group removes the group name from the user’s profile, but does not delete either the user or the user group from the local WX database. To remove the group, use clear usergroup. Examples — The following command removes the user Nin from a user group: WX4400# clear user Nin group success: change accepted. See Also clear usergroup clear usergroup on page 215 display aaa on page 217 set user group on page 258 Removes a user group and its attributes from the local database on the WX switch, for users with passwords. (To delete a user group in RADIUS, see the documentation for your RADIUS server.) Syntax — clear usergroup group-name group-name — Name of an existing user group. 216 CHAPTER 7: AAA COMMANDS Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Removing a user group from the local WX database does not remove the user profiles of the group’s members from the database. Examples — The following command deletes the cardiology user group from the local database: WX4400# clear usergroup cardiology success: change accepted. See Also clear usergroup attr clear usergroup attr on page 216 display aaa on page 217 set usergroup on page 259 Removes an authorization attribute from a user group in the local database on the WX switch. (To remove an authorization attribute in RADIUS, see the documentation for your RADIUS server.) Syntax — clear usergroup group-name attr attribute-name group-name — Name of an existing user group. attribute-name — Name of an attribute used to authorize all the users in the group for a particular service or session characteristic. (For a list of authorization attributes, see Table 47 on page 247.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. display aaa 217 Examples — The following command removes the members of the user group cardiology from a network access time restriction by deleting the Time-Of-Day attribute from the group: WX4400# clear usergroup cardiology attr time-of-day success: change accepted. See Also display aaa clear usergroup on page 215 display aaa on page 217 set usergroup on page 259 Displays all current AAA settings. Syntax — display aaa Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. In Version 4.0, Web Portal secion added to indicate the state of the WebAAA feature. Examples — To display all current AAA settings, type the following command: WX4400# display aaa Default Values authport=1812 acctport=1813 timeout=5 acct-timeout=5 retrans=3 deadtime=0 key=(null) author-pass=(null) Radius Servers Server Addr Ports T/o Tries Dead State -------------------------------------------------------------------rs-3 198.162.1.1 1821 1813 5 3 0 UP rs-4 198.168.1.2 1821 1813 77 11 2 UP rs-5 198.162.1.3 1821 1813 42 23 0 UP Server groups sg1: rs-3 sg2: rs-4 sg3: rs-5 Web Portal enabled 218 CHAPTER 7: AAA COMMANDS set set set set set set set set set authentication admin Jose sg3 authentication console * none authentication mac ssid mycorp * local authentication dot1x ssid mycorp Geetha eap-tls authentication dot1x ssid mycorp * peap-mschapv2 sg1 sg2 sg3 authentication dot1x ssid any ** peap-mschapv2 sg1 sg2 sg3 accounting dot1x Nin ssid mycorp stop-only sg2 accounting admin Natasha start-stop local authentication last-resort ssid guestssid local user Nin Password = 082c6c64060b (encrypted) Filter-Id = acl-999.in Filter-Id = acl-999.out user last-resort-guestssid Vlan-Name = k2 user last-resort-any Vlan-Name = foo mac-user 01:02:03:04:05:06 usergroup eastcoasters session-timeout = 99 Table 45 describes the fields that can appear in display aaa output. Table 45 display aaa Output Field Description Default Values RADIUS default values for all parameters. authport UDP port on the WX switch for transmission of RADIUS authorization and authentication messages. The default port is 1812. acctport UDP port on the WX switch for transmission of RADIUS accounting records. The default is port 1813. timeout Number of seconds the WX switch waits for a RADIUS server to respond before retransmitting. The default is 5 seconds. acct-timeout Number of seconds the WX switch waits for a RADIUS server to respond to an accounting request before retransmitting. The default is 5 seconds. retrans Number of times the WX switch retransmits a message before determining a RADIUS server unresponsive. The default is 3 times. display aaa 219 Table 45 display aaa Output (continued) deadtime Number of minutes the WX switch waits after determining a RADIUS server is unresponsive before trying to reconnect with this server. During the dead time, the RADIUS server is ignored by the WX switch. The default is 0 minutes. key Shared secret key, or password, used to authenticate to a RADIUS server. The default is no key. author-pass Password used for outbound authentication to a RADIUS server, used in conjunction with a last-resort username. By default, a MAC user’s MAC address is also used as that user’s password, and no global password is set. Radius Servers Information about active RADIUS servers. Server Name of each RADIUS server currently active. Addr IP address of each RADIUS server currently active. Ports UDP ports that the WX switch uses for authentication messages and for accounting records. T/o Setting of timeouts on each RADIUS server currently active. Tries Number of retransmissions configured for each RADIUS server currently active. The default is 3 times. Dead Length of time until the server is considered responsive again. State Current state of each RADIUS server currently active: UP (operating) DOWN (unavailable) Server groups Names of RADIUS server groups and member servers configured on the WX switch. Web Portal State of the WebAAA feature: enabled disabled set commands List of commands used to configure AAA on the WX switch. user and user group profiles List of user and user group profiles stored in the local database on the WX switch. See Also set accounting {admin | console} on page 223 set authentication admin on page 226 set authentication console on page 228 set authentication dot1x on page 230 220 CHAPTER 7: AAA COMMANDS display accounting statistics set authentication last-resort on page 234 set authentication mac on page 236 set authentication web on page 239 Displays the AAA accounting records for wireless users. The records are stored in the local database on the WX switch. (To display RADIUS accounting records, see the documentation for your RADIUS server.) Syntax — display accounting statistics Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To display the locally stored accounting records, type the following command: WX4400# display accounting statistics Sep 26 11:01:48 Acct-Status-Type=START Acct-Authentic=2 User-Name=geetha AAA_TTY_ATTR=2 Event-Timestamp=1064599308 Sept 26 12:50:21 Acct-Status-Type=STOP Acct-Authentic=2 User-Name=geetha AAA_TTY_ATTR=2 Acct-Session-Time=6513 Event-Timestamp=1064605821 Acct-Output-Octets=332 Acct-Input-Octets=61 Sep 26 12:50:33 Acct-Status-Type=START Acct-Authentic=2 User-Name=geetha AAA_TTY_ATTR=2 Event-Timestamp=1064605833 Table 46 describes the fields that can appear in display accounting statistics output. Table 46 display accounting statistics Output Field Description Date and time Date and time of the accounting record. display accounting statistics 221 Table 46 display accounting statistics Output (continued) Acct-Status-Type Acct-Authentic User-Name Type of accounting record: START STOP UPDATE Location where the user was authenticated (if authentication took place) for the session: 1 — RADIUS server 2 — Local WX database Username of a user with a password. Acct-Multi-Session-Id Unique accounting ID for multiple related sessions in a log file. AAA_TTY_ATTR For sessions conducted through a console or administrative Telnet connection, the Telnet terminal number. Event-Timestamp Time (in seconds since January 1, 1970) at which the event was triggered. (See RFC 2869 for more information.) Acct-Session-Time Number of seconds that the session has been online. Acct-Output-Octets Number of octets the WX switch has sent during the session. Acct-Input-Octets Number of octets the WX switch has received during the session. Acct-Output-Packets Number of packets the WX switch has sent during the session. Acct-Input-Packets Number of packets the WX switch has received during the session. Vlan-Name Name of the client’s VLAN. Calling-Station-Id MAC address of the supplicant (client). Nas-Port-Id Number of the port and radio on the MAP access point through which the session was conducted. Called-Station-Id MAC address of the MAP access point through which the client reached the network. See Also clear accounting on page 201 display aaa on page 217 set accounting {admin | console} on page 223 222 CHAPTER 7: AAA COMMANDS display location policy Displays the list of location policy rules that make up the location policy on an WX switch. Syntax — display location policy Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command displays the list of location policy rules in the location policy on an WX switch: WX4400 display location policy Id Clauses ---------------------------------------------------------------1) deny if user eq *.theirfirm.com 2) permit vlan guest_1 if vlan neq *.wodefirm.com 3) permit vlan bld4.tac inacl tac_24.in if user eq *.ny.wodefirm.com See Also display mobility-profile clear location policy on page 208 set location policy on page 241 Displays the named Mobility Profile. If you do not specify a Mobility Profile name, this command shows all Mobility Profile names and port lists on the WX. Syntax — display mobility-profile [name] name — Name of an existing Mobility Profile. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command displays the Mobility Profile magnolia: WX1200# display mobility-profile magnolia set accounting {admin | console} 223 Mobility Profiles Name Ports ========================= magnolia AP 2 See Also set accounting {admin | console} clear mobility-profile on page 213 set mobility-profile on page 253 Sets up accounting services for specified wireless users with administrative access, and defines the accounting records and where they are sent. Syntax — set accounting {admin | console} {user-glob} {start-stop | stop-only} method1 [method2] [method3] [method4] admin — Users with administrative access to the WX switch through Telnet or Web Manager. console — Users with administrative access to the WX switch through a console connection. user-glob — Single user or set of users with administrative access or network access. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character—either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) This option does not apply if mac is specified. For mac, specify a mac-addr-glob. (See “MAC Address Globs” on page 27.) start-stop — Sends accounting records at the start and end of a network session. stop-only — Sends accounting records only at the end of a network session. method1, method2, method3, method4 — At least one of up to four methods that MSS uses to process accounting records. Specify one or more of the following methods in priority order. If the first method does not succeed, MSS tries the second method, and so on. 224 CHAPTER 7: AAA COMMANDS A method can be one of the following: local — Stores accounting records in the local database on the WX switch. When the local accounting storage space is full, MSS overwrites older records with new ones. server-group-name — Stores accounting records on one or more Remote Authentication Dial-In User Service (RADIUS) servers. You can also enter the names of existing RADIUS server groups as methods. Defaults — Accounting is disabled for all users by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — For network users with start-stop accounting whose records are sent to a RADIUS server, MSS sends interim updates to the RADIUS server when the user roams. Examples — The following command issues start-and-stop accounting records at the local WX database for administrator Natasha, when she accesses the switch using Telnet or Web Manager: WX4400# set accounting admin Natasha start-stop local success: change accepted. See Also set accounting {dot1x | mac | web} clear accounting on page 201 display accounting statistics on page 220 Sets up accounting services for specified wireless users with network access, and defines the accounting records and where they are sent. Syntax — set accounting {dot1x | mac | web} {ssid ssid-name | wired} {user-glob | mac-addr-glob} {start-stop | stop-only} method1 [method2] [method3] [method4] dot1x — Users with network access through the WX switch who are authenticated by 802.1X. mac — Users with network access through the WX switch who are authenticated by MAC authentication set accounting {dot1x | mac | web} 225 web — Users with network access through the WX switch who are authenticated by WebAAA ssid ssid-name — SSID name to which this accounting rule applies. To apply the rule to all SSIDs, type any. wired — Applies this accounting rule specifically to users who are authenticated on a wired authentication port. user-glob — Single user or set of users with administrative access or network access. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character — either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) This option does not apply if mac is specified. For mac, specify a mac-addr-glob. (See “MAC Address Globs” on page 27.) mac-addr-glob — A single user or set of users with access via a MAC address. Specify a MAC address, or use the wildcard (*) character to specify a set of MAC addresses. (For details, see “MAC Address Globs” on page 27.) This option applies only when mac is specified. start-stop — Sends accounting records at the start and end of a network session. stop-only — Sends accounting records only at the end of a network session. method1, method2, method3, method4 — At least one of up to four methods that MSS uses to process accounting records. Specify one or more of the following methods in priority order. If the first method does not succeed, MSS tries the second method, and so on. A method can be one of the following: local — Stores accounting records in the local database on the WX switch. When the local accounting storage space is full, MSS overwrites older records with new ones. server-group-name — Stores accounting records on one or more Remote Authentication Dial-In User Service (RADIUS) servers. You can also enter the names of existing RADIUS server groups as methods. 226 CHAPTER 7: AAA COMMANDS Defaults — Accounting is disabled for all users by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — For network users with start-stop accounting whose records are sent to a RADIUS server, MSS sends interim updates to the RADIUS server when the user roams. Examples — The following command issues stop-only records to the RADIUS server group sg2 for network user Nin, who is authenticated by 802.1X: WX4400# set accounting dot1x Nin stop-only sg2 success: change accepted. See Also set authentication admin clear accounting on page 201 display accounting statistics on page 220 Configures authentication and defines where it is performed for specified users with administrative access through Telnet or Web Manager. Syntax — set authentication admin user-glob method1 [method2] [method3] [method4] user-glob — Single user or set of users with administrative access over the network through Telnet or Web Manager. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character—either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) method1, method2, method3, method4 — At least one of up to four methods that MSS uses to handle authentication. Specify one or more of the following methods in priority order. MSS applies multiple methods in the order you enter them. A method can be one of the following: local — Uses the local database of usernames and user groups on the WX switch for authentication. set authentication admin 227 server-group-name — Uses the defined group of RADIUS servers for authentication. You can enter up to four names of existing RADIUS server groups as methods. none — For users with administrative access only, MSS performs no authentication, but prompts for a username and password and accepts any combination of entries, including blanks. The authentication method none you can specify for administrative access is different from the fallthru authentication type none, which applies only to network access. The authentication method none allows access to the WX switch by an administrator. The fallthru authentication type none denies access to a network user. (See “set service-profile auth-fallthru” on page 352.) For more information, see “Usage.” Defaults — By default, authentication is deactivated for all admin users. The default authentication method in an admin authentication rule is local. MSS checks the local WX database for authentication. Access — Enabled. History —Introduced in MSS Version 3.0. The syntax descriptions for the set authentication commands have been separated for clarity. However, the options and behavior for the set authentication admin command are the same as in previous releases. Usage — You can configure different authentication methods for different groups of users. (For details, see “User Globs, MAC Address Globs, and VLAN Globs” on page 26.) If you specify multiple authentication methods in the set authentication console command, MSS applies them in the order in which they appear in the command, with these results: If the first method responds with pass or fail, the evaluation is final. If the first method does not respond, MSS tries the second method, and so on. However, if local appears first, followed by a RADIUS server group, MSS ignores any failed searches in the local WX database and sends an authentication request to the RADIUS server group. 228 CHAPTER 7: AAA COMMANDS If a AAA rule specifies local as a secondary AAA method, to be used if the RADIUS servers are unavailable, and MSS authenticates a client with the local method, MSS starts again at the beginning of the method list when attempting to authorize the client. This can cause unexpected delays during client processing and can cause the client to time out before completing logon. Examples — The following command configures administrator Jose, who connects via Telnet, for authentication on RADIUS server group sg3: WX4400# set authentication admin Jose sg3 success: change accepted. See Also set authentication console clear authentication admin on page 202 display aaa on page 217 set authentication console on page 228 set authentication dot1x on page 230 set authentication last-resort on page 234 set authentication mac on page 236 set authentication web on page 239 Configures authentication and defines where it is performed for specified users with administrative access through a console connection. Syntax — set authentication console user-glob method1 [method2] [method3] [method4] user-glob — Single user or set of users with administrative access through the switch’s console. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character—either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) method1, method2, method3, method4 — At least one of up to four methods that MSS uses to handle authentication. Specify one or more of the following methods in priority order. MSS applies multiple methods in the order you enter them. set authentication console 229 A method can be one of the following: local — Uses the local database of usernames and user groups on the WX switch for authentication. server-group-name — Uses the defined group of RADIUS servers for authentication. You can enter up to four names of existing RADIUS server groups as methods. none — For users with administrative access only, MSS performs no authentication, but prompts for a username and password and accepts any combination of entries, including blanks. The authentication method none you can specify for administrative access is different from the fallthru authentication type none, which applies only to network access. The authentication method none allows access to the WX switch by an administrator. The fallthru authentication type none denies access to a network user. (See “set service-profile auth-fallthru” on page 352.) For more information, see “Usage.” Defaults — By default, authentication is deactivated for all console users, and the default authentication method in a console authentication rule is none. MSS requires no username or password, by default. These users can press Enter at the prompts for administrative access. 3Com recommends that you change the default setting unless the WX switch is in a secure physical location. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You can configure different authentication methods for different groups of users. (For details, see “User Globs, MAC Address Globs, and VLAN Globs” on page 26.) If you specify multiple authentication methods in the set authentication console command, MSS applies them in the order in which they appear in the command, with these results: If the first method responds with pass or fail, the evaluation is final. If the first method does not respond, MSS tries the second method, and so on. 230 CHAPTER 7: AAA COMMANDS However, if local appears first, followed by a RADIUS server group, MSS ignores any failed searches in the local WX database and sends an authentication request to the RADIUS server group. Examples — To set the console port so that it does not enforce username-password authentication for administrators, type the following command: WX4400# set authentication console * none success: change accepted. See Also set authentication dot1x clear authentication console on page 203 display aaa on page 217 set authentication admin on page 226 set authentication dot1x on page 230 set authentication last-resort on page 234 set authentication mac on page 236 set authentication web on page 239 Configures authentication and defines how and where it is performed for specified wireless or wired authentication clients who use an IEEE 802.1X authentication protocol to access the network through the WX switch. Syntax — set authentication dot1x {ssid ssid-name | wired} user-glob [bonded] protocol method1 [method2] [method3] [method4] ssid ssid-name — SSID name to which this authentication rule applies. To apply the rule to all SSIDs, type any. wired — Applies this authentication rule specifically to users connected to a wired authentication port. user-glob — A single user or a set of users with 802.1X network access. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character — either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) set authentication dot1x 231 bonded — Enables Bonded Auth™ (bonded authentication). When this feature is enabled, MSS authenticates the user only if the machine the user is on has already been authenticated. protocol — Protocol used for authentication. Specify one of the following: eap-md5 — Extensible Authentication Protocol (EAP) with message-digest algorithm 5. For wired authentication clients: Uses challenge-response to compare hashes Provides no encryption or integrity checking for the connection eap-tls — EAP with Transport Layer Security (TLS): Provides mutual authentication, integrity-protected negotiation, and key exchange Requires X.509 public key certificates on both sides of the connection Provides encryption and integrity checking for the connection Cannot be used with RADIUS server authentication peap-mschapv2 — Protected EAP (PEAP) with Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAP-V2). For wireless clients: Uses TLS for encryption and data integrity checking and server-side authentication Provides MS-CHAP-V2 mutual authentication Only the server side of the connection needs a certificate. The wireless client authenticates using TLS to set up an encrypted session. Then MS-CHAP-V2 performs mutual authentication using the specified AAA method. pass-through — MSS sends all the EAP protocol processing to a RADIUS server. EAP-MD5 does not work with Microsoft wired authentication clients. method1, method2, method3, method4 — At least one and up to four methods that MSS uses to handle authentication. Specify one or more of the following methods in priority order. MSS applies multiple methods in the order you enter them. 232 CHAPTER 7: AAA COMMANDS A method can be one of the following: local — Uses the local database of usernames and user groups on the WX switch for authentication. server-group-name — Uses the defined group of RADIUS servers for authentication. You can enter up to four names of existing RADIUS server groups as methods. RADIUS servers cannot be used with the EAP-TLS protocol. For more information, see “Usage.” Defaults — By default, authentication is unconfigured for all clients with network access through MAP ports or wired authentication ports on the WX switch. Connection, authorization, and accounting are also disabled for these users. Bonded authentication is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You can configure different authentication methods for different groups of users by “globbing.” (For details, see “User Globs” on page 26.) You can configure a rule either for wireless access to an SSID, or for wired access through a WX switch’s wired authentication port. If the rule is for wireless access to an SSID, specify the SSID name or specify any to match on all SSID names. If the rule is for wired access, specify wired instead of an SSID name. You cannot configure client authentication that uses both the EAP-TLS protocol and one or more RADIUS servers. EAP-TLS authentication is supported only on the local WX database. If you specify multiple authentication methods in the set authentication dot1x command, MSS applies them in the order in which they appear in the command, with these results: If the first method responds with pass or fail, the evaluation is final. If the first method does not respond, MSS tries the second method, and so on. set authentication dot1x 233 However, if local appears first, followed by a RADIUS server group, MSS overrides any failed searches in the local WX database and sends an authentication request to the server group. If the user does not support 802.1X, MSS attempts to perform MAC authentication for the user. In this case, if the switch’s configuration contains a set authentication mac command that matches the SSID the user is attempting to access and the user’s MAC address, MSS uses the method specified by the command. Otherwise, MSS uses local MAC authentication by default. If the username does not match an authentication rule for the SSID the user is attempting to access, MSS uses the fallthru authentication type configured for the SSID, which can be last-resort, web (for WebAAA), or none. Examples — The following command configures EAP-TLS authentication in the local WX database for SSID mycorp and 802.1X client Geetha: WX4400# set authentication dot1x ssid mycorp Geetha eap-tls local success: change accepted. The following command configures PEAP-MS-CHAP-V2 authentication at RADIUS server groups sg1 through sg3 for all 802.1X clients at example.com who want to access SSID examplecorp: WX4400# set authentication dot1x ssid examplecorp *@example.com peap-mschapv2 sg1 sg2 sg3 success: change accepted. See Also clear authentication dot1x on page 204 display aaa on page 217 set authentication admin on page 226 set authentication console on page 228 set authentication last-resort on page 234 set authentication mac on page 236 set authentication web on page 239 set service-profile auth-fallthru on page 352 234 CHAPTER 7: AAA COMMANDS set authentication last-resort Configures an authentication rule to grant network access to a user who is not otherwise granted or denied access by 802.1X, or granted access by MAC authentication. Syntax — set authentication last-resort {ssid ssid-name | wired} method1 [method2] [method3] [method4] ssid ssid-name — SSID name to which this authentication rule applies. To apply the rule to all SSIDs, type any. wired — Applies this authentication rule specifically to users connected to a wired authentication port. method1, method2, method3, method4 — At least one of up to four methods that MSS uses to handle authentication. Specify one or more of the following methods in priority order. MSS applies multiple methods in the order you enter them. A method can be one of the following: local — Uses the local database of usernames and user groups on the WX switch for authentication. server-group-name — Uses the defined group of RADIUS servers for authentication. You can enter up to four names of existing RADIUS server groups as methods. For more information, see “Usage.” Defaults — By default, authentication is unconfigured for all clients with network access through MAP ports or wired authentication ports on the WX switch. Connection, authorization, and accounting are also disabled for these users. When using RADIUS for authentication, a last-resort user’s default authorization password is 3Com. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You can configure different authentication methods for different groups of users by “globbing.” (For details, see “User Globs” on page 26.) set authentication last-resort 235 You can configure a rule either for wireless access to an SSID, or for wired access through a WX switch’s wired authentication port. If the rule is for wireless access to an SSID, specify the SSID name or specify any to match on all SSID names. If the rule is for wired access, specify wired instead of an SSID name. If you specify multiple authentication methods in the set authentication last-resort command, MSS applies them in the order in which they appear in the command, with these results: If the first method responds with pass or fail, the evaluation is final. If the first method does not respond, MSS tries the second method, and so on. However, if local appears first, followed by a RADIUS server group, MSS overrides any failed searches in the local WX database and sends an authentication request to the server group. MSS uses a last-resort authentication rule under the following conditions: The client is not denied access by 802.1X or does not support 802.1X. The client’s MAC address does not match a MAC authentication rule. The fallthru method is last-resort. (For a wireless authentication rule, the fallthru method is specified by the set service-profile auth-fallthru command. For a wired authentication rule, the fallthru method is specified by the auth-fall-thru option of the set port type wired-auth command.) For wireless access, MSS appends the requested SSID name to the user name last-resort. For example, if the requested SSID is mycorp, MSS attempts to authenticate the user last-resort-mycorp. If the RADIUS server or local database used as the authentication method has the user last-resort-mycorp, access is granted. Otherwise, access is denied. If the SSID specified in the last-resort authentication rule is any, MSS searches for user last-resort-any. The any in the username is not a wildcard. The username must be last-resort-any, exactly as spelled here. Examples — The following command configures a last-resort authentication rule in the local WX database for SSID mycorp: WX4400# set authentication last-resort ssid mycorp local success: change accepted. 236 CHAPTER 7: AAA COMMANDS See Also set authentication mac clear authentication last-resort on page 205 display aaa on page 217 set authentication admin on page 226 set authentication console on page 228 set authentication dot1x on page 230 set authentication mac on page 236 set authentication web on page 239 Configures authentication and defines where it is performed for specified non-802.1X users with network access through a media access control (MAC) address. Syntax — set authentication mac {ssid ssid-name | wired} mac-addr-glob method1 [method2] [method3] [method4] ssid ssid-name — SSID name to which this authentication rule applies. To apply the rule to all SSIDs, type any. wired — Applies this authentication rule specifically to users connected to a wired authentication port. mac-addr-glob — A single user or set of users with access via a MAC address. Specify a MAC address, or use the wildcard (*) character to specify a set of MAC addresses. (For details, see “MAC Address Globs” on page 27.) method1, method2, method3, method4 — At least one of up to four methods that MSS uses to handle authentication. Specify one or more of the following methods in priority order. MSS applies multiple methods in the order you enter them. A method can be one of the following: local — Uses the local database of usernames and user groups on the WX switch for authentication. server-group-name — Uses the defined group of RADIUS servers for authentication. You can enter up to four names of existing RADIUS server groups as methods. For more information, see “Usage.” set authentication mac 237 Defaults — By default, authentication is deactivated for all MAC users, which means MAC address authentication fails by default. When using RADIUS for authentication, a MAC user’s MAC address is also used as the authorization password for that user, and no global authorization password is set. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You can configure different authentication methods for different groups of MAC addresses by “globbing.” (For details, see “User Globs, MAC Address Globs, and VLAN Globs” on page 26.) If you specify multiple authentication methods in the set authentication mac command, MSS applies them in the order in which they appear in the command, with these results: If the first method responds with pass or fail, the evaluation is final. If the first method does not respond, MSS tries the second method, and so on. However, if local appears first, followed by a RADIUS server group, MSS ignores any failed searches in the local WX database and sends an authentication request to the RADIUS server group. If the switch’s configuration contains a set authentication mac command that matches the SSID the user is attempting to access and the user’s MAC address, MSS uses the method specified by the command. Otherwise, MSS uses local MAC authentication by default. If the username does not match an authentication rule for the SSID the user is attempting to access, MSS uses the fallthru authentication type configured for the SSID, which can be last-resort, web (for WebAAA), or none. Examples — To use the local WX database to authenticate all users who access the mycorp2 SSID by their MAC address, type the following command: WX4400# set authentication ssid mycorp2 mac ** local success: change accepted. 238 CHAPTER 7: AAA COMMANDS See Also set authentication proxy clear authentication mac on page 205 display aaa on page 217 set authentication admin on page 226 set authentication console on page 228 set authentication dot1x on page 230 set authentication last-resort on page 234 set authentication web on page 239 Configures a proxy authentication rule for a third-party AP’s wireless users. Syntax — set authentication proxy ssid ssid-name user-glob radius-server-group ssid-name — SSID name to which this authentication rule applies. user-glob — A single user or a set of users. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character—either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) radius-server-group — A group of RADIUS servers used for authentication. Defaults — None. Access — Enabled. History —Introduced in MSS 4.0. Usage — AAA for third-party AP users has additional configuration requirements. See the “Configuring AAA for Users of Third-Party APs” section in the “Configuring AAA for Network Users” chapter of the Wireless LAN Switch and Controller Configuration Guide. set authentication web 239 Examples — The following command configures a proxy authentication rule that matches on all usernames associated with SSID mycorp. MSS uses RADIUS server group srvrgrp1 to proxy RADIUS requests and hence to authenticate and authorize the users. WX-1200# set authentication proxy ssid mycorp ** srvrgrp1 See Also clear authentication proxy on page 206 set radius proxy client on page 470 set radius proxy port on page 471 set authentication web Configures an authentication rule to allow a user to log in to the network using a web page served by the WX switch. The rule can be activated if the user is not otherwise granted or denied access by 802.1X, or granted access by MAC authentication. Syntax — set authentication web {ssid ssid-name | wired} user-glob method1 [method2] [method3] [method4] user-glob — A single user or a set of users. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character—either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) ssid ssid-name — SSID name to which this authentication rule applies. To apply the rule to all SSIDs, type any. wired — Applies this authentication rule specifically to users connected to a wired authentication port. method1, method2, method3, method4 — At least one and up to four methods that MSS uses to handle authentication. Specify one or more of the following methods in priority order. MSS applies multiple methods in the order you enter them. A method can be one of the following: local — Uses the local database of usernames and user groups on the WX switch for authentication. 240 CHAPTER 7: AAA COMMANDS server-group-name — Uses the defined group of RADIUS servers for authentication. You can enter up to four names of existing RADIUS server groups as methods. RADIUS servers cannot be used with the EAP-TLS protocol. For more information, see “Usage.” Defaults — By default, authentication is unconfigured for all clients with network access through MAP ports or wired authentication ports on the WX switch. Connection, authorization, and accounting are also disabled for these users. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You can configure different authentication methods for different groups of users by “globbing.” (For details, see “User Globs” on page 26.) You can configure a rule either for wireless access to an SSID, or for wired access through a WX switch’s wired authentication port. If the rule is for wireless access to an SSID, specify the SSID name or specify any to match on all SSID names. If the rule is for wired access, specify wired instead of an SSID name. If you specify multiple authentication methods in the set authentication web command, MSS applies them in the order in which they appear in the command, with these results: If the first method responds with pass or fail, the evaluation is final. If the first method does not respond, MSS tries the second method, and so on. However, if local appears first, followed by a RADIUS server group, MSS overrides any failed searches in the local WX database and sends an authentication request to the server group. MSS uses a WebAAA rule only under the following conditions: The client is not denied access by 802.1X or does not support 802.1X. The client’s MAC address does not match a MAC authentication rule. set location policy 241 The fallthru method is web. (For a wireless authentication rule, the fallthru method is specified by the set service-profile auth-fallthru command. For a wired authentication rule, the fallthru method is specified by the auth-fall-thru option of the set port type wired-auth command.) Examples — The following command configures a WebAAA rule in the local WX database for SSID ourcorp and userglob rnd*: WX4400# set authentication web ssid ourcorp rnd* local success: change accepted. See Also set location policy clear authentication web on page 207 display aaa on page 217 set authentication admin on page 226 set authentication console on page 228 set authentication dot1x on page 230 set authentication last-resort on page 234 Creates and enables a location policy on an WX switch. A location policy enables you to locally set or change authorization attributes for a user afer the user is authorized by AAA, without making changes to the AAA server. Syntax — set location policy deny if {ssid operator ssid-name | vlan operator vlan-glob | user operator user-glob | port port-list | dap dap-num} [before rule-number | modify rule-number ] Syntax — set location policy permit {vlan vlan-name | inacl inacl-name | outacl outacl-name} if {ssid operator ssid-name | vlan operator vlan-glob | user operator user-glob | port port-list | dap dap-num} [before rule-number | modify rule-number] deny — Denies access to the network to users with characteristics that match the location policy rule. 242 CHAPTER 7: AAA COMMANDS permit — Allows access to the network or to a specified VLAN, and/or assigns a particular security ACL to users with characteristics that match the location policy rule. Action options — For a permit rule, MSS changes the attributes assigned to the user to the values specified by the following options: vlan vlan-name — Name of an existing VLAN to assign to users with characteristics that match the location policy rule. inacl inacl-name — Name of an existing security ACL to apply to packets sent to the WX switch with characteristics that match the location policy rule. Optionally, you can add the suffix .in to the name. outacl outacl-name — Name of an existing security ACL to apply to packets sent from the WX switch with characteristics that match the location policy rule. Optionally, you can add the suffix .out to the name. Condition options — MSS takes the action specified by the rule if all conditions in the rule are met. You can specify one or more of the following conditions: ssid operator ssid-name — SSID with which the user is associated. The operator must be eq, which applies the location policy rule to all users associated with the SSID. Asterisks (wildcards) are not supported in SSID names. You must specify the complete SSID name. vlan operator vlan-glob — VLAN-Name attribute assigned by AAA and condition by which to determine if the location policy rule applies. Replace operator with one of the following operands: eq — Applies the location policy rule to all users assigned VLAN names matching vlan-glob. neq — Applies the location policy rule to all users assigned VLAN names not matching vlan-glob. For vlan-glob, specify a VLAN name, use the double-asterisk wildcard character (**) to specify all VLAN names, or use the single-asterisk wildcard character (*) to specify a set of VLAN names up to or following the first delimiter character, either an at sign (@) or a period (.). (For details, see “VLAN Globs” on page 28.) set location policy 243 user operator user-glob — Username and condition by which to determine if the location policy rule applies. Replace operator with one of the following operands: eq — Applies the location policy rule to all usernames matching user-glob. neq — Applies the location policy rule to all usernames not matching user-glob. For user-glob, specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character, either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) before rule-number — Inserts the new location policy rule in front of another rule in the location policy. Specify the number of the existing location policy rule. (To determine the number, use the display location policy command.) modify rule-number — Replaces the rule in the location policy with the new rule. Specify the number of the existing location policy rule. (To determine the number, use the display location policy command.) port port-list — List of physical port(s) by which to determine if the location policy rule applies. Defaults — By default, users are permitted VLAN access and assigned security ACLs according to the VLAN-Name and Filter-Id attributes applied to the users during normal authentication and authorization. Access — Enabled. History —Introduced in MSS Version 3.0. SSID option added in MSS Version 3.2. Usage — Only a single location policy is allowed per WX switch. Once configured, the location policy becomes effective immediately. To disable location policy operation, use the clear location policy command. 244 CHAPTER 7: AAA COMMANDS Conditions within a rule are ANDed. All conditions in the rule must match for MSS to take the specified action. If the location policy contains multiple rules, MSS compares the user information to the rules one at a time, in the order the rules appear in the switch’s configuration file, beginning with the rule at the top of the list. MSS continues comparing until a user matches all conditions in a rule or until there are no more rules. The order of rules in the location policy is important to ensure users are properly granted or denied access. To position rules within the location policy, use before rule-number and modify rule-number in the set location policy command, and the clear location policy rule-number command. When applying security ACLs: Use inacl inacl-name to filter traffic that enters the switch from users via an MAP access port or wired authentication port, or from the network via a network port. Use outacl outacl-name to filter traffic sent from the switch to users via an MAP access port or wired authentication port, or from the network via a network port. You can optionally add the suffixes .in and .out to inacl-name and outacl-name so that they match the names of security ACLs stored in the local WX database. Examples — The following command denies network access to all users at *.theirfirm.com, causing them to fail authorization: WX4400# set location policy deny if user eq *.theirfirm.com The following command authorizes access to the guest_1 VLAN for all users who are not at *.wodefirm.com: WX4400# set location policy permit vlan guest_1 if user neq *.wodefirm.com The following command authorizes users at *.ny.ourfirm.com to access the bld4.tac VLAN instead, and applies the security ACL tac_24 to the traffic they receive: WX4400# set location policy permit vlan bld4.tac outacl tac_24 if user eq *.ny.ourfirm.com set mac-user 245 The following command authorizes access to users on VLANs with names matching bld4.* and applies security ACLs svcs_2 to the traffic they send and svcs_3 to the traffic they receive: WX4400# set location policy permit inacl svcs_2 outacl svcs_3 if vlan eq bldg4.* The following command authorizes users entering the network on WX ports 1 and 2 to use the floor2 VLAN, overriding any settings from AAA: WX4400# set location policy permit vlan floor2 if port 1-2 The following command places all users who are authorized for SSID tempvendor_a into VLAN kiosk_1: WX1200# set location policy permit vlan kiosk_1 iff ssid eq tempvendor_a success: change accepted See Also set mac-user clear location policy on page 208 display location policy on page 222 Configures a user profile in the local database on the WX switch for a user who can be authenticated by a MAC address, and optionally adds the user to a MAC user group. (To configure a MAC user profile in RADIUS, see the documentation for your RADIUS server.) Syntax — set mac-user mac-addr [group group-name] mac-addr — MAC address of the user, in hexadecimal numbers separated by colons (:). You can omit leading zeros. group-name — Name of an existing MAC user group. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — MSS does not require MAC users to belong to user groups. 246 CHAPTER 7: AAA COMMANDS Users authenticated by MAC address can be authenticated only for network access through the WX switch. MSS does not support passwords for MAC users. Examples — The following command creates a user profile for a user at MAC address 01:02:03:04:05:06 and assigns the user to the eastcoasters user group: WX4400# set mac-user 01:02:03:04:05:06 group eastcoasters success: change accepted. See Also set mac-user attr clear mac-user on page 209 display aaa on page 217 Assigns an authorization attribute in the local database on the WX switch to a user who is authenticated by a MAC address. (To assign authorization attributes through RADIUS, see the documentation for your RADIUS server.) Syntax — set mac-user mac-addr attr attribute-name value mac-addr — MAC address of the user, in hexadecimal numbers separated by colons (:). You can omit leading zeros. attribute-name value — Name and value of an attribute you are using to authorize the MAC user for a particular service or session characteristic. For a list of authorization attributes and values that you can assign to local users, see Table 47. set mac-user attr 247 Table 47 Authentication Attributes for Local Users Attribute Description Valid Value(s) encryption-type Type of encryption One of the following numbers that required for access by identifies an encryption algorithm: the client. Clients who 1—AES_CCM (Advanced attempt to use an Encryption Standard using Counter unauthorized encryption with CBC-MAC) method are rejected. 2—Reserved 4—TKIP (Temporal Key Integrity Protocol) 8—WEP_104 (the default) (Wired-Equivalent Privacy protocol using 104 bits of key strength) 16—WEP_40 (Wired-Equivalent Privacy protocol using 40 bits of key strength) 32—NONE (no encryption) 64—Static WEP In addition to these values, you can specify a sum of them for a combination of allowed encryption types. For example, to specify WEP_104 and WEP_40, use 24. end-date Date and time after Date and time, in the following which the user is no format: longer allowed to be on YY/MM/DD-HH:MM the network. You can use end-date alone or with start-date. You also can use start-date, end-date, or both in conjunction with time-of-day. 248 CHAPTER 7: AAA COMMANDS Table 47 Authentication Attributes for Local Users (continued) filter-id Inbound or outbound ACL to apply to the user. If configured in the WX switch’s local database, this attribute can be an access control list (ACL) to filter outbound or inbound traffic. Use the following format: filter-id inboundacl.in or filter-id outboundacl.out If you are configuring the attribute on a RADIUS server, the value field of filter-id can specify up to two ACLs. Any of the following are valid: filter-id = "Profile=acl1" filter-id = "OutboundACL=acl2" filter-id = "Profile=acl1 OutboundACL=acl2" (Each example goes on a single line on the server.) The format in which to specify the values depends on the RADIUS server. Regardless of whether the attributes are defined locally or on a RADIUS server, the ACLs must already be configured on the WX switch. idle-timeout This option is not implemented in the current MSS version. mobility-profile Mobility Profile attribute for the user. (For more information, see set mobility-profile on page 253.) (network access mode only) Name of an existing Mobility Profile, which can be up to 32 alphanumeric characters, with no tabs or spaces. If the Mobility Profile feature is enabled, and a user is assigned the name of a Mobility Profile that does not exist on the WX switch, the user is denied access. set mac-user attr 249 Table 47 Authentication Attributes for Local Users (continued) service-type Type of access the user is requesting. One of the following numbers: 2—Framed; for network user access 6—Administrative; for administrative access to the WX switch, with authorization to access the enabled (configuration) mode. The user must enter the enable command to access the enabled mode. 7—NAS-Prompt; for administrative access to the nonenabled mode only. In this mode, the enable command is not available and the user cannot log in to the enabled mode. For administrative sessions, the WX switch will send 7 (NAS-Prompt) unless the service-type attribute has been configured for the user. The RADIUS server can reply with one of the values listed above. If the service-type is not set on the RADIUS server, administrative users receive NAS-Prompt access, and network users receive Framed access. session-timeout (network access mode only) ssid (network access mode only) start-date Maximum number of seconds for the user’s session. Number between 0 and 4,294,967,296 seconds (approximately 136.2 years). SSID the user is allowed to access after authentication. Name of the SSID you want the user to use. The SSID must be configured in a service profile, and the service profile must be used by a radio profile assigned to MAP radios in the Mobility Domain. Date and time at which the user becomes eligible to access the network. Date and time, in the following format: YY/MM/DD-HH:MM You can use start-date alone or with MSS does not end-date. You also can use authenticate the user start-date, end-date, or both in unless the attempt to conjunction with time-of-day. access the network occurs at or after the specified date and time, but before the end-date (if specified). 250 CHAPTER 7: AAA COMMANDS Table 47 Authentication Attributes for Local Users (continued) time-of-day (network access mode only) Day(s) and time(s) One of the following: during which the user is never—Access is always denied. permitted to log into the network. any—Access is always allowed. After authorization, the user’s session can last until either the Time-Of-Day range or the Session-Timeout duration (if set) expires, whichever is shorter. al—Access is always allowed. One or more ranges of values that consist of one of the following day designations (required), and a time range in hhmm-hhmm 4-digit 24-hour format (optional): mo—Monday tu—Tuesday we—Wednesday th—Thursday fr—Friday sa—Saturday su—Sunday wk—Any day between Monday and Friday Separate values or a series of ranges (except time ranges) with commas (,) or a vertical bar (|). Do not use spaces. The maximum number of characters is 253. You can use time-of-day in conjunction with start-date, end-date, or both. set mac-user attr 251 Table 47 Authentication Attributes for Local Users (continued) url (network access mode only) URL to which the user is Web URL, in standard format. For redirected after example: successful WebAAA. http://www.example.com You must include the http:// portion. You can dynamically include any of the variables in hte URL string: $u—Username $v—VLAN $s—SSID $p—Service profile name To use the literal character $ or ?, use the following: vlan-name (network access mode only) Virtual LAN (VLAN) assignment. On some RADIUS servers, you might need to use the standard RADIUS attribute Tunnel-Pvt-Group-ID, instead of VLAN-Name. $$ $q Name of a VLAN that you want the user to use. The VLAN must be configured on an WX switch within the Mobility Domain to which this WX switch belongs. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To change the value of an attribute, enter set mac-user attr with the new value. To delete an attribute, use clear mac-user attr. You cannot set the Filter-ID attribute in the local database. Examples — The following command assigns input access control list (ACL) acl-03 to filter the packets from a user at MAC address 01:02:03:04:05:06: WX4400# set mac-user 01:02:03:04:05:06 attr filter-id acl-03.in success: change accepted. 252 CHAPTER 7: AAA COMMANDS The following command restricts a user at MAC address 06:05:04:03:02:01 to network access between 7 p.m. on Mondays and Wednesdays and 7 a.m. on Tuesdays and Thursdays: WX4400# set mac-user 06:05:04:03:02:01 attr time-of-day mo1900-1159,tu0000-0700,we1900-1159,th0000-0700 success: change accepted. See Also set mac-usergroup attr clear mac-user attr on page 209 display aaa on page 217 Creates a user group in the local database on the WX switch for users who are authenticated by a MAC address, and assigns authorization attributes for the group. (To configure a user group and assign authorization attributes through RADIUS, see the documentation for your RADIUS server.) Syntax — set mac-usergroup group-name attr attribute-name value group-name — Name of a MAC user group. Specify a name of up to 32 alphanumeric characters, with no spaces. attribute-name value — Name and value of an attribute you are using to authorize all MAC users in the group for a particular service or session characteristic. (For a list of authorization attributes, see Table 47 on page 247.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To change the value of an attribute, enter set mac-usergroup attr with the new value. To delete an attribute, use clear mac-usergroup attr. set mobility-profile 253 Examples — The following command creates the MAC user group eastcoasters and assigns the group members to VLAN orange: WX4400# set mac-usergroup eastcoasters attr vlan-name orange success: change accepted. See Also set mobility-profile clear mac-usergroup attr on page 212 display aaa on page 217 Creates a Mobility Profile and specifies the MAP access point and/or wired authentication ports on the WX switch through which any user assigned to the profile is allowed access. Syntax — set mobility-profile name name {port {none | all | port-list}} | {dap {none | all | dap-num}} name — Name of the Mobility Profile. Specify up to 32 alphanumeric characters, with no spaces. none — Prevents any user to whom this profile is assigned from accessing any MAP access point or wired authentication port on the WX switch. all — Allows any user to whom this profile is assigned to access all MAP access ports and wired authentication port on the WX switch. port-list — List of MAP access ports or wired authentication ports through which any user assigned this profile is allowed access. The same port can be used in multiple Mobility Profile port lists. dap-num — List of Distributed MAP connections through which any user assigned this profile is allowed access. The same Distributed MAP can be used in multiple Mobility Profile port lists. Defaults — No default Mobility Profile exists on the WX switch. If you do not assign Mobility Profile attributes, all users have access through all ports, unless denied access by other AAA servers or by access control lists (ACLs). Access — Enabled. History —Introduced in MSS Version 3.0. 254 CHAPTER 7: AAA COMMANDS Usage — To assign a Mobility Profile to a user or group, specify it as an authorization attribute in one of the following commands: set set set set user attr mobility-profile name usergroup attr mobility-profile name mac-user attr mobility-profile name mac-usergroup attr mobility-profile name To enable the use of the Mobility Profile feature on the WX switch, use the set mobility-profile mode command. CAUTION: When the Mobility Profile feature is enabled, a user is denied access if assigned a Mobility-Profile attribute in the local WX switch database or RADIUS server when no Mobility Profile of that name exists on the WX switch. To change the ports in a profile, use set mobility-profile again with the updated port list. Examples — The following commands create the Mobility Profile magnolia, which restricts user access to port 2; enable the Mobility Profile feature on the WX switch; and assign the magnolia Mobility Profile to user Jose. WX1200# set mobility-profile name magnolia port 2 success: change accepted. WX1200# set mobility-profile mode enable success: change accepted. WX1200# set user Jose attr mobility-profile magnolia success: change accepted. The following command adds port 3 to the magnolia Mobility Profile (which is already assigned to port 2): WX1200# set mobility-profile name magnolia port 3 success: change accepted. See Also clear mobility-profile on page 213 display mobility-profile on page 222 set mac-user attr on page 246 set mac-usergroup attr on page 252 set mobility-profile mode on page 255 set mobility-profile mode set mobility-profile mode set user attr on page 257 set usergroup on page 259 255 Enables or disables the Mobility Profile feature on the WX switch. CAUTION: When the Mobility Profile feature is enabled, a user is denied access if assigned a Mobility-Profile attribute in the local WX switch database or RADIUS server when no Mobility Profile of that name exists on the WX switch. Syntax — set mobility-profile mode {enable | disable} enable — Enables the use of the Mobility Profile feature on the WX switch. disable — Specifies that all Mobility Profile attributes are ignored by the WX switch. Defaults — The Mobility Profile feature is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To enable the use of the Mobility Profile feature, type the following command: WX1200# set mobility-profile mode enable success: change accepted. See Also clear mobility-profile on page 213 display mobility-profile on page 222 set mobility-profile on page 253 256 CHAPTER 7: AAA COMMANDS set user Configures a user profile in the local database on the WX switch for a user with a password. (To configure a user profile in RADIUS, see the documentation for your RADIUS server.) Syntax — set user username password string (encrypted) username — Username of a user with a password. password string — Password of up to 32 alphanumeric characters, with no spaces. encrypted — Indicates that the password string you entered is already in its encrypted form. If you use this option, MSS does not encrypt the displayed form of the password string, and instead displays the string exactly as you entered it. If you omit this option, MSS does encrypt the displayed form of the string Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — The display config command shows the encrypted option with this command, even when you omit the option. The encrypted option appears in the configuration because MSS automatically encrypts the password when you create the user (unless you use the encrypted option when you enter the password) Although MSS allows you to configure a user password for the special “last-resort” guest user, the password has no effect. Last-resort users can never access a WX in administrative mode and never require a password. Examples — The following command creates a user profile for user Nin in the local database, and assigns the password goody: WX4400# set user Nin password goody success: User Nin created The following command assigns the password chey3nne to the admin user: WX4400# set user admin password chey3nne set user attr 257 success: User admin created The following command changes Nin’s password from goody to 29Jan04: WX4400# set user Nin password 29Jan04 See Also set user attr clear user on page 213 display aaa on page 217 Configures an authorization attribute in the local database on the WX switch for a user with a password. (To assign authorization attributes in RADIUS, see the documentation for your RADIUS server.) Syntax — set user username attr attribute-name value username — Username of a user with a password. attribute-name value — Name and value of an attribute you are using to authorize the user for a particular service or session characteristic. For a list of authorization attributes and values that you can assign to network users, see Table 47 on page 247. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To change the value of an attribute, enter set user attr with the new value. To delete an attribute, use clear user attr. Examples — The following command assigns user Tamara to VLAN orange: WX4400# set user Tamara attr vlan-name orange success: change accepted. 258 CHAPTER 7: AAA COMMANDS The following command assigns Tamara to the Mobility Profile tulip. WX4400# set user Tamara attr mobility-profile tulip success: change accepted. See Also set user group clear user attr on page 214 display aaa on page 217 Adds a user to a user group. The user must have a password and a profile that exists in the local database on the WX switch. (To configure a user in RADIUS, see the documentation for your RADIUS server.) Syntax — set user username group group-name username — Username of a user with a password. group-name — Name of an existing user group for password users. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — MSS does not require users to belong to user groups. To create a user group, user the command set usergroup. Examples — The following command adds user Hosni to the cardiology user group: WX4400# set user Hosni group cardiology success: change accepted. See Also clear user group on page 215 display aaa on page 217 set usergroup set usergroup 259 Creates a user group in the local database on the WX switch for users and assigns authorization attributes for the group. (To create user groups and assign authorization attributes in RADIUS, see the documentation for your RADIUS server.) Syntax — set usergroup group-name attr attribute-name value group-name — Name of a group for password users. Specify a name of up to 32 alphanumeric characters, with no spaces. attribute-name value — Name and value of an attribute you are using to authorize all users in the group for a particular service or session characteristic. For a list of authorization attributes and values that you can assign to users, see Table 47 on page 247. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To change the value of an attribute, enter set usergroup attr with the new value. To delete an attribute, use clear usergroup attr. To add a user to a group, user the command set user group. Examples — The following command adds the user group cardiology to the local database and assigns all the group members to VLAN crimson: WX4400# set usergroup cardiology vlan-name crimson success: change accepted. See Also clear usergroup on page 215 clear usergroup attr on page 216 display aaa on page 217 260 CHAPTER 7: AAA COMMANDS set web-aaa Globally enables or disables WebAAA on an WX switch. Syntax — set web-aaa {enable | disable} enable — Enables WebAAA on the switch. disable — Disables WebAAA on the switch. Defaults — Enabled. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command disables or reenables support for WebAAA. However, WebAAA has additional configuration requirements. For information, see the “Configuring AAA for Network Users” chapter in the Wireless LAN Switch and Controller Configuration Guide. Examples — To disable WebAAA, type the following command: WX4400# set web-aaa disable success: change accepted. See Also clear authentication web on page 207 set service-profile auth-fallthru on page 352 set user on page 256 8 MOBILITY DOMAIN COMMANDS Use Mobility Domain commands to configure and manage Mobility Domain groups. A Mobility Domain is a system of WX switches and MAP access points working together to support a roaming user (client). One WX switch acts as a seed switch, which maintains and distributes a list of IP addresses of the domain members. 3Com recommends that you run the same MSS version on all the WX switches in a Mobility Domain. Commands by Usage This chapter presents Mobility Domain commands alphabetically. Use Table 48 to locate commands in this chapter based on their use. Table 48 Mobility Domain Commands by Usage Type Command Mobility Domain set mobility-domain mode seed domain-name on page 267 set mobility-domain member on page 265 set mobility-domain mode member seed-ip on page 266 display mobility-domain status on page 263 display mobility-domain config on page 263 clear mobility-domain member on page 262 clear mobility-domain on page 262 262 CHAPTER 8: MOBILITY DOMAIN COMMANDS clear mobility-domain Clears all Mobility Domain configuration and information from a WX switch, regardless of whether the WX switch is a seed or a member of a Mobility Domain. Syntax — clear mobility-domain Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command has no effect if the WX switch is not configured as part of a Mobility Domain. Examples — To clear a Mobility Domain from a WX switch within the domain, type the following command: WX1200# clear mobility-domain success: change accepted. See Also clear mobility-domain member clear mobility-domain member on page 262 set mobility-domain member on page 265 set mobility-domain mode member seed-ip on page 266 set mobility-domain mode seed domain-name on page 267 On the seed WX switch, removes the identified member from the Mobility Domain. Syntax — clear mobility-domain member ip-addr ip-addr — IP address of the Mobility Domain member, in dotted decimal notation. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. display mobility-domain config 263 Usage — This command has no effect if the WX switch member is not configured as part of a Mobility Domain or the current WX switch is not the seed. Examples — The following command clears a Mobility Domain member with the IP address 192.168.0.1: WX1200# clear mobility-domain member 192.168.0.1 See Also display mobility-domain config set mobility-domain member on page 265 Displays the configuration of the Mobility Domain. Syntax — display mobility-domain config Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command displays the Mobility Domain configuration: WX4400# display mobility-domain config This WX is a member, with seed 192.168.14.6 See Also display mobility-domain status clear mobility-domain on page 262 set mobility-domain member on page 265 display mobility-domain status on page 263 On the seed WX, displays the Mobility Domain status and members. Syntax — display mobility-domain status Defaults — None. Access — Enabled. 264 CHAPTER 8: MOBILITY DOMAIN COMMANDS History —Introduced in MSS Version 3.0. Examples — To display Mobility Domain status, type the following command: WX4400# display mobility-domain status Mobility Domain name: Pleasanton Member State Status ---------------------------------------192.168.253.11 STATE_UP MEMBER 192.168.253.12 STATE_DOWN MEMBER 192.168.253.14 STATE_UP SEED Table 49 describes the fields in the display. Table 49 display mobility-domain Output Field Description Mobility Domain name Name of the Mobility Domain Member IP addresses of the seed WX switch and members in the Mobility Domain State State of the WX switch in the Mobility Domain: Status STATE_UP STATE_DOWN Role of the WX switch in the Mobility Domain: MEMBER SEED See Also clear mobility-domain on page 262 set mobility-domain member on page 265 set mobility-domain mode member seed-ip on page 266 set mobility-domain member set mobility-domain member 265 On the seed WX switch, adds a member to the list of Mobility Domain members. If the current WX switch is not configured as a seed, this command is rejected. Syntax — set mobility-domain member ip-addr ip-addr — IP address of the Mobility Domain member in dotted decimal notation. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command must be entered from the seed WX switch. Examples — The following commands add three WX switches with the IP addresses 192.168.1.8, 192.168.1.9, and 192.168.1.10 as members of a Mobility Domain whose seed is the current WX switch: WX4400# set mobility-domain member 192.168.1.8 success: change accepted. WX4400# set mobility-domain member 192.168.1.9 success: change accepted. WX4400# set mobility-domain member 192.168.1.10 success: change accepted. See Also clear mobility-domain member on page 262 display mobility-domain config on page 263 set mobility-domain mode seed domain-name on page 267 266 CHAPTER 8: MOBILITY DOMAIN COMMANDS set mobility-domain mode member seed-ip On a nonseed WX switch, sets the IP address of the seed WX switch. This command is used on a member WX to configure it as a member. If the WX switch is currently part of another Mobility Domain or using another seed, this command overwrites that configuration. Syntax — set mobility-domain mode member seed-ip ip-addr ip-addr — IP address of the Mobility Domain member, in dotted decimal notation. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command sets the current WX switch as a nonseed member of the Mobility Domain whose seed has the IP address 192.168.1.8: WX4400# set mobility-domain mode member seed-ip 192.168.1.8 mode is: member seed IP is: 192.168.1.8 See Also clear mobility-domain on page 262 display mobility-domain config on page 263 set mobility-domain mode seed domain-name set mobility-domain mode seed domain-name 267 Creates a Mobility Domain by setting the current WX switch as the seed device and naming the Mobility Domain. Syntax — set mobility-domain mode seed domain-name mob-domain-name mob-domain-name — Name of the Mobility Domain. Specify between 1 and 16 characters with no spaces. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Before you use this command, the current WX switch must have its IP address set with the set system ip-address command. After you enter this command, all Mobility Domain traffic is sent and received from the specified IP address. You must explicitly configure only one WX switch per domain as the seed. All other WX switches in the domain receive their Mobility Domain information from the seed. Examples — The following command creates a Mobility Domain named Pleasanton with the current WX switch as the seed: WX4400# set mobility-domain mode seed domain-name Pleasanton mode is: seed domain name is: Pleasanton See Also clear mobility-domain member on page 262 display mobility-domain status on page 263 268 CHAPTER 8: MOBILITY DOMAIN COMMANDS 9 MANAGED ACCESS POINT COMMANDS Use MAP access point commands to configure and manage MAP access points. Be sure to do the following before using the commands: Define the country-specific IEEE 802.11 regulations on the WX switch. (See set system countrycode on page 54.) Install the MAP access point and connect it to a port on the WX switch. Configure a MAP access port (for a directly connected MAP) or a Distributed MAP. (See set port type ap on page 87 and set dap on page 77.) CAUTION: Changing the system country code after MAP configuration disables MAP access points and deletes their configuration. If you change the country code on a WX switch, you must reconfigure all MAP access points. MAP Access Point Commands by Usage This chapter presents MAP access point commands alphabetically. Use Table 50 to locate commands in this chapter based on their use. Table 50 Map Access Point Commands by Usage Type Command Automatic Configuration of Distributed MAPs set dap auto on page 306 set dap auto mode on page 308 set {ap | dap} bias on page 310 set {ap | dap} blink on page 311 set {ap | dap} group on page 313 270 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Table 50 Map Access Point Commands by Usage (continued) Type Command set {ap | dap} radio auto-tune max-power on page 317 set {ap | dap} radio auto-tune max- retransmissions on page 318 set {ap | dap} radio auto-tune min-client-rate on page 321 set {ap | dap} radio mode on page 323 set {ap | dap} radio radio-profile on page 324 set dap auto radiotype on page 309 set {ap | dap} upgrade-firmware on page 328 External Antenna set {ap | dap} radio antennatype on page 315 Radio Profile Assignment set {ap | dap} radio radio-profile on page 324 set radio-profile mode on page 342 clear radio-profile on page 274 set radio-profile service-profile on page 346 display radio-profile on page 298 SSID Assignment set service-profile ssid-name on page 363 set service-profile ssid-type on page 364 set service-profile beacon on page 355 Radio Properties set radio-profile 11g-only on page 329 set radio-profile beacon-interval on page 336 set radio-profile rts-threshold on page 346 set radio-profile frag-threshold on page 339 set radio-profile short-retry on page 350 set radio-profile long-retry on page 339 set radio-profile max-rx-lifetime on page 340 set radio-profile max-tx-lifetime on page 341 set radio-profile preamble-length on page 345 set radio-profile countermeasures on page 337 set radio-profile active-scan on page 330 set radio-profile wmm on page 350 Authentication and set service-profile auth-dot1x on page 351 Encryption set service-profile auth-fallthru on page 352 MAP Access Point Commands by Usage 271 Table 50 Map Access Point Commands by Usage (continued) Type Command set service-profile web-aaa-form on page 366 set service-profile auth-psk on page 354 set service-profile wpa-ie on page 370 set service-profile rsn-ie on page 362 set service-profile cipher-ccmp on page 356 set service-profile cipher-tkip on page 357 set service-profile cipher-wep104 on page 358 set service-profile cipher-wep40 on page 359 set service-profile psk-phrase on page 360 set service-profile psk-raw on page 361 set service-profile tkip-mc-time on page 365 set service-profile wep active-multicast- index on page 367 set service-profile wep active-unicast- index on page 368 set service-profile wep key-index on page 369 set service-profile shared-key-auth on page 363 display service-profile on page 302 clear service-profile on page 275 RF Auto-Tuning set radio-profile auto-tune channel-config on page 330 set radio-profile auto-tune channel-holddown on page 331 set radio-profile auto-tune channel-interval on page 332 set radio-profile auto-tune power-backoff- timer on page 333 set radio-profile auto-tune power-config on page 334 set radio-profile auto-tune power-interval on page 335 set {ap | dap} radio auto-tune max-power on page 317 set {ap | dap} radio auto-tune max- retransmissions on page 318 set {ap | dap} radio auto-tune min-client-rate on page 321 272 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Table 50 Map Access Point Commands by Usage (continued) Type Command display auto-tune neighbors on page 292 display auto-tune attributes on page 290 MAP-WX security set dap fingerprint on page 312 set dap security on page 326 Radio State set {ap | dap} radio mode on page 323 Dual Homing set {ap | dap} bias on page 310 Load Balancing set {ap | dap} group on page 313 display {ap | dap} group on page 285 MAP set {ap | dap} name on page 315 Administration and set {ap | dap} blink on page 311 Maintenance set {ap | dap} upgrade-firmware on page 328 reset {ap | dap} on page 305 set {ap | dap} radio channel on page 320 set {ap | dap} radio tx-power on page 325 clear {ap | dap} radio on page 272 display {ap | dap} group on page 285 display {ap | dap} status on page 287 display {ap | dap} counters on page 280 display dap global on page 295 display dap connection on page 294 display dap unconfigured on page 297 display {ap | dap} qos-stats on page 282 display {ap | dap} etherstats on page 284 clear {ap | dap} radio Disables a MAP radio and resets it to its factory default settings. Syntax — clear {ap port-list | dap dap-num } radio {1 | 2 | all} ap port-list — List of ports connected to the MAP access point(s) on which to reset a radio. dap dap-num — Number of a Distributed MAP on which to reset a radio. clear {ap | dap} radio 273 radio 1 — Radio 1 of the MAP. radio 2 — Radio 2 of the MAP. (This option does not apply to single-radio models.) radio all — All radios on the MAP. Defaults — The clear ap radio command resets the radio to the default settings listed in Table 51 and in Table 66 on page 342. Table 51 Radio-Specific Parameters Parameter Default Value channel 802.11b — 6 802.11a — Lowest valid channel number for the country of operation Description Number of the channel in which a radio transmits and receives traffic tx-power Highest setting allowed for Transmit power of a radio, in the country of operation decibels referred to or highest setting 1 milliwatt (dBm) supported on the hardware, whichever is lower. antennatype internal (The default for model MAP-262 is ANT1060.) External antenna model Note: This parameter applies only to MAPs that support external antennas. Access — Enabled History —Introduced in MSS Version 3.0. Usage — When you clear a radio, MSS performs the following actions: Clears the transmit power, channel, and external antenna setting from the radio. Removes the radio from its radio profile and places the radio in the default radio profile. This command does not affect the PoE setting. Examples — The following command disables and resets radio 2 on the MAP access point connected to port 3: WX1200# clear ap 3 radio 2 274 CHAPTER 9: MANAGED ACCESS POINT COMMANDS See Also clear radio-profile set {ap | dap} radio mode on page 323 set {ap | dap} radio radio-profile on page 324 set port type ap on page 87 Removes a radio profile or resets one of the profile’s parameters to its default value. Syntax — clear radio-profile name [parameter] name — Radio profile name. parameter — Radio profile parameter: beacon-interval dtim-interval frag-threshold long-retry max-rx-lifetime max-tx-lifetime preamble-length rts-threshold service-profile short-retry (For information about these parameters, see the set radio-profile commands that use them.) Defaults — If you reset an individual parameter, the parameter is returned to the default value listed in Table 66 on page 342. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — If you specify a parameter, the setting for the parameter is reset to its default value. The settings of the other parameters are unchanged and the radio profile remains in the configuration. If you do not specify a parameter, the entire radio profile is deleted from the configuration. All radios that use this profile must be disabled before you can delete the profile. clear service-profile 275 Examples — The following commands disable the radios that are using radio profile rp1 and reset the beaconed-interval parameter to its default value: WX4400# set radio-profile rp1 mode disable WX4400# clear radio-profile rp1 beacon-interval success: change accepted. The following commands disable the radios that are using radio profile rptest and remove the profile: WX4400# set radio-profile rptest mode disable WX4400# clear radio-profile rptest success: change accepted. See Also clear service-profile display radio-profile on page 298 set {ap | dap} radio radio-profile on page 324 set radio-profile mode on page 342 Removes a service profile or resets one of the profile’s parameters to its default value. Syntax — clear service-profile name name — Service profile name. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — If the service profile is mapped to a radio profile, you must remove it from the radio profile first. (After disabling all radios that use the radio profile, use the clear radio-profile name service-profile name command.) Examples — The following commands disable the radios that are using radio profile rp6, remove service-profile svcprof6 from rp6, then clear svcprof6 from the configuration. WX4400# set radio-profile rp6 mode disable WX4400# clear radio-profile rp6 service-profile svcprof6 276 CHAPTER 9: MANAGED ACCESS POINT COMMANDS success: change accepted. WX4400# clear service-profile svcprof6 success: change accepted. See Also clear service-profile clear radio-profile on page 274 set radio-profile mode on page 342 Removes a service profile or resets one of the profile’s parameters to its default value. Syntax — clear service-profile name name — Service profile name. Defaults — None. Access — Enabled. History —Introduced in MSS 3.0. Usage — If the service profile is mapped to a radio profile, you must remove it from the radio profile first. (After disabling all radios that use the radio profile, use the clear radio-profile name service-profile name command.) Examples — The following commands disable the radios that are using radio profile rp6, remove service-profile svcprof6 from rp6, then clear svcprof6 from the configuration. WX1200# set radio-profile rp6 mode disable WX1200# clear radio-profile rp6 service-profile svcprof6 success: change accepted. WX1200# clear service-profile svcprof6 success: change accepted. See Also clear radio-profile on page 274 set radio-profile mode on page 342 display {ap | dap} config display {ap | dap} config 277 Displays global and radio-specific settings for an MAP access point. Syntax — display ap config [port-list [radio {1 | 2}]] Syntax — display dap config [dap-num [radio {1 | 2}]] port-list — List of ports connected to the MAP access point(s) for which to display configuration settings. dap-num — Number of a Distributed MAP for which to display configuration settings. radio 1 — Shows configuration information for radio 1. radio 2 — Shows configuration information for radio 2. (This option does not apply to single-radio models.) Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Usage — MSS lists information separately for each MAP access point. Examples — The following example shows configuration information for an MAP access point on WX port 2: WX1200# display ap config 2 Port 1: AP model: AP2750, POE: enable, bias: high, name: MAP01 boot-download-enable: YES load balancing group: none Radio 1: type: 802.11g, mode: enabled, channel: dynamic tx pwr: dynamic, profile: default auto-tune max-power: default, min-client-rate: 5.5, max-retransmissions: 10 The following example shows configuration information for a Distributed MAP access point configured on connection 1: WX4400# display dap config 1 Dap 1: Serial-Id: M9DE48B012F00, MAP model: AP2750, bias: high, name: DAP1 boot-download-enable: YES Radio 1: type: 802.11a, mode: disabled, channel: dynamic tx pwr: 11, profile: default auto-tune max-power: default, min-client-rate: 24, max-retransmissions: 10 Table 52 describes the fields in this display. 278 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Table 52 Output for display ap config Field Description Port WX port number. Note: This field is applicable only if the MAP is directly connected to the WX switch and the WX switch’s port is configured as a MAP access port. DAP Connection ID for the Distributed MAP. Note: This field is applicable only if the MAP is configured on the WX switch as a Distributed MAP. Serial-Id Serial ID of the MAP access point. Note: This field is displayed only for Distributed MAPs. AP model MAP access point model number. POE PoE state on the WX port: bias Enable Disable Bias of the WX connection to the MAP: High Low name MAP access point name. fingerprint Hexadecimal fingerprint of the MAP’s public encryption key. This field is displayed only for Distributed MAPs. If the field is blank, the key has not been verified yet by an administrator. boot-downloadenable State of the firmware upgrade option: YES (automatic upgrades are enabled) NO (automatic upgrades are disabled) load balancing group Names of the MAP load-balancing groups to which the MAP access point belongs. If the value is None, the access point does not belong to any load balancing groups. Note: This field is displayed only if the MAP is a member of a group. Radio Radio number. The information listed below this field applies specifically to the radio. type Radio type: 802.11a 802.11b 802.11g display {ap | dap} config 279 Table 52 Output for display ap config (continued) Field Description mode Radio state: Enabled Disabled channel Channel number. antennatype External antenna model, if applicable. tx pwr Transmit power, in dBm. profile Radio profile that manages the radio. Until you assign the radio to a radio profile, MSS assigns the radio to the default radio profile. auto-tune max-power Maximum power level the RF Auto-Tuning feature can set on the radio. The value default means RF Auto-Tuning can set the power up to the maximum level allowed for the country of operation. A specific numeric value means you or another administrator set the maximum value. auto-tune min-client-rate Minimum data rate the radio must maintain for associated clients. When RF Auto-Tuning is enabled, the radio can temporarily increase its power to maintain the data rate with an associated client. auto-tune max-retransmissions Maximum percentage of packets that can be retransmitted by a client before RF Auto-Tuning increases power. Note: Only packets that are received twice by the MAP are counted as retransmissions. If a client retransmits a packet but the MAP receives only a single copy of the packet, the packet is not counted as a retransmission. See Also display dap connection on page 294 display dap global on page 295 display dap unconfigured on page 297 display radio-profile on page 298 set dap on page 77 set port type ap on page 87 set {ap | dap} bias on page 310 280 CHAPTER 9: MANAGED ACCESS POINT COMMANDS display {ap | dap} counters set {ap | dap} group on page 313 set {ap | dap} name on page 315 set {ap | dap} upgrade-firmware on page 328 set {ap | dap} radio mode on page 323 set {ap | dap} radio antennatype on page 315 set {ap | dap} radio channel on page 320 set {ap | dap} radio radio-profile on page 324 set {ap | dap} radio tx-power on page 325 Displays MAP access point and radio statistics counters. Syntax — display ap counters [port-list [radio {1 | 2}]] Syntax — display dap counters [dap-num [radio {1 | 2}]] port-list — List of ports connected to the MAP access point(s) for which to display statistics counters. dap-num — Number of a Distributed MAP for which to display statistics counters. radio 1 — Shows statistics counters for radio 1. radio 2 — Shows statistics counters for radio 2. (This option does not apply to single-radio models.) Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Usage — To display statistics counters and other information for individual user sessions, use the display sessions network command. Examples — The following command shows statistics counters for an MAP access point on port 6: WX1200# display ap counters 6 Port: 6 radio: 1 ================================= LastPktXferRate 2 PktTxCount 91594255 display {ap | dap} counters NumCntInPwrSave LastPktRxSigStrength LastPktSigNoiseRatio TKIP Pkt Transfer Ct TKIP Pkt Replays CCMP Pkt Decrypt Err CCMP Pkt Transfer Ct 4294966683MultiPktDrop -54 MultiBytDrop 40 User Sessions 0 MIC Error Ct 0 TKIP Decrypt Err 0 CCMP Pkt Replays 0 RadioResets TxUniPkt TxUniByte RxPkt TxMultiPkt TxMultiByte 281 0 0 5 0 0 0 0 RxByte 1.0: 164492 0 9631741 0 405041 2.0: 603 0 248716 0 191103 5.5: 370594 52742 27616521 4445625 2427 11.0: 8016 0 2590353 0 85479 TOTL: 543705 52742 40087331 4445625 684050 UndcrptPkt UndcrptByte PhyError 8913512 0 0 13963 4608065 0 0 30547 133217 0 0 723 3897587 0 0 1195 17552381 0 0 46441 Table 53 describes the fields in this display. Table 53 Output for display ap counters Field Description Port WX port number. radio Radio number. LastPktXferRate Data transmit rate, in Mbps, of the last packet received by the MAP access point. NumCntInPwrSave Number of clients currently in power save mode. LastPktRxSigStrength Signal strength, in dBm, of the last packet received by the MAP access point. LastPktSigNoiseRatio Signal-to-noise ratio, in decibels (dB), of the last packet received by the MAP access point. TKIP Pkt Transfer Ct Total number of TKIP packets sent and received by the radio. TKIP Pkt Replays Number of packets dropped because they were detected as TKIP replays. TKIP replays are packets received outside the TKIP sequence counter window. CCMP Pkt Decrypt Err Number of times a decryption error occurred with a packet encrypted with CCMP. CCMP Pkt Transfer Ct Total number of CCMP packets sent and received by the radio. PktTxCount Number of packets transmitted by the radio. 282 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Table 53 Output for display ap counters (continued) Field Description MultiPktDrop Number of multicast packets dropped by the radio. MultiBytDrop Number of multicast bytes dropped by the radio. User Sessions Number of users currently associated with the radio. MIC Error Ct Number of times the radio received a TKIP-encrypted frame with an invalid MIC. TKIP Decrypt Err Number of times a decryption error occurred with a packet encrypted with TKIP. CCMP Pkt Replays Number of packets dropped because they were detected as CCMP replays. CCMP replays are packets received outside the CCMP sequence counter window. RadioResets Number of times the radio has been reset. TxUniPkt Number of unicast packets transmitted by the radio. Note: This and the following statistics are listed separately for each data rate. TxMultiPkt Number of multicast packets transmitted by the radio. TxUniByte Number of unicast bytes transmitted by the radio. TxMultiByte Number of multicast bytes transmitted by the radio. RxPkt Number of packets received by the radio. RxByte Number of bytes received by the radio. UndcrptPkt Number of undecryptable packets received by the radio. UndcrptByte Number of undecryptable bytes received by the radio. PhyError Number of packets received by the radio that contained Physical layer (PHY) errors. See Also display {ap | dap} qos-stats display sessions network on page 503 Displays statistics for MAP forwarding queues. Syntax — display dap qos-stats [dap-num] Syntax — display ap qos-stats [port-list] dap-num — Number of a Distributed MAP for which to display QoS statistics counters. display {ap | dap} qos-stats 283 port-list — List of ports connected to the MAP access point(s) for which to display QoS statistics counters. Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command shows statistics for the MAP forwarding queues on a Distributed MAP: WX-1200# display dap qos-stats 4 CoS Queue Tx =========================== DAP: 4 radio: 1 1,2 Background 19 0,3 BestEffort 437 4,5 Video 3034 6,7 Voice 3068 CoS Queue Tx =========================== DAP: 4 radio: 2 1,2 Background 11 0,3 BestEffort 221 4,5 Video 3631 6,7 Voice 7892 Table 54 describes the fields in this display. Table 54 Output for display {ap | dap} qos-stats Field Description CoS CoS value associated with the forwarding queues. Queue Forwarding queue. DAP Distributed MAP number or MAP port number. or Port radio Radio number. Tx Number of packets transmitted to the air from the queue. 284 CHAPTER 9: MANAGED ACCESS POINT COMMANDS display {ap | dap} etherstats Displays Ethernet statistics for a MAP’s Ethernet ports. Syntax — display {ap | dap} etherstats [port-list | dap-num] port-list — List of WX switch ports directly connected to the MAPs for which to display counters. dap-num — Number of a Distributed MAP for which to display counters. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command displays Ethernet statistics for the Ethernet ports on Distributed MAP 1: WX4400# display dap etherstats 1 DAP: 1 ether: 1 ================================= RxUnicast: 75432 TxGoodFrames: RxMulticast: 18789 TxSingleColl: RxBroadcast: 8 TxLateColl: RxGoodFrames: 94229 TxMaxColl: RxAlignErrs: 0 TxMultiColl: RxShortFrames: 0 TxUnderruns: RxCrcErrors: 0 TxCarrierLoss: RxOverruns: 0 TxDeferred: RxDiscards: 0 55210 32 0 0 47 0 0 150 Table 55 describes the fields in this display. Table 55 Output of display ap etherstats Field Description RxUnicast Number of unicast frames received. RxMulticast Number of multicast frames received. RxBroadcast Number of broadcast frames received. RxGoodFrames Number of frames received properly from the link. RxAlignErrs Number of received frames that were both misaligned and contained a CRC error. display {ap | dap} group 285 Table 55 Output of display ap etherstats (continued) display {ap | dap} group Field Description RxShortFrames Number of received frames that were shorter than the minimum frame length. RxCrcErrors Number of received frames that were discarded due to CRC errors. RxOverruns Number of frames known to be lost due to a temporary lack of hardware resources. RxDiscards Number of frames known to be lost due to a temporary lack of software resources. TxGoodFrames Number of frames transmitted properly on the link. TxSingleColl Number of transmitted frames that encountered a single collision. TxLateColl Number of frames that were not transmitted because they encountered a collision outside the normal collision window. TxMaxColl Number of frames that were not transmitted because they encountered the maximum allowed number of collisions. Typically, this occurs only during periods of heavy traffic on the network. TxMultiColl Number of transmitted frames that encountered more than one collision. TxUnderruns Number of frames that were not transmitted or retransmitted due to temporary lack of hardware resources. TxCarrierLoss Number of frames transmitted despite the detection of a deassertion of CRS during the transmission. TxDeferred Number of frames deferred before transmission due to activity on the link. Displays configuration information and load-balancing status for MAP access point groups. Syntax — display {ap | dap} group [name] name — Name of an MAP group or Distributed MAP group. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. 286 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Examples — The following command displays information for MAP access point group loadbalance1: WX1200# display ap group loadbalance1 Load Balance Grp Port Clients ---------------- ---- ------loadbalance1 1 1 loadbalance1 6 6 Status Refused --------- ------Accepting 0 Refusing 2 Table 56 describes the fields in this display. Table 56 Output for display ap group Field Description Load Balance Grp Name of the MAP access point group. Port WX port number. Clients Number of active client sessions on the MAP access point. Status Association status of the MAP access point: Refused Accepting — The MAP access point is accepting new associations. Refusing — The MAP access point is refusing new associations. Number of association requests refused by the MAP access point due to load balancing. MSS resets this counter to 0 when the WX switch is restarted, MSS is reloaded, or the access point is removed from the group. See Also “set {ap | dap} group” on page 313 display {ap | dap} status display {ap | dap} status 287 Displays MAP access point and radio status information. Syntax — display ap status [terse] [port-list | all [radio {1 | 2}]] Syntax — display dap status [terse] [dap-num [radio {1 | 2}]] terse — Displays a brief line of essential status information for each MAP. port-list — List of ports connected to the MAP access point(s) for which to display status. dap-num — Number of a Distributed MAP for which to display status. all — Shows status information for all directly attached MAP access points and all Distributed MAP access points configured on the switch. radio 1 — Shows status information for radio 1. radio 2 — Shows status information for radio 2. (This option does not apply to single-radio models.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. True base MAC addresses of radios are displayed in MSS Version 3.2. Previously, the base MAC address displayed for a radio was the true base MAC address plus 2. Note that a radio’s base MAC address is also used as the BSSID of the first SSID configured on the radio. In Version 4.0, added terse, display dap status: all, new field for fingerprint, and added MAP-WX security status to State field. Note: the fingerprint field and security state apply to the display for Distributed MAPs only. Examples — The following command displays the status of a Distributed MAP: WX4400# display dap status 1 Dap: 1, IP-addr: 10.2.34.56 (vlan 'default'), MAP model: AP2750, manufacturer: 3Com, name: DAP1 fingerprint: b4:f9:2a52:37:58:f4:d0:10:75:43:2f:45:c9:52:c3 ==================================================== State: operational (not encrypted) CPU info: IBM:PPC speed=266666664 Hz version=405GPr 288 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Uptime: id=0x28f10158a47f0408 ram=33554432 s/n=0332600444 hw_rev=A3 21 hours, 27 minutes, 51 seconds Radio 1 type: 802.11a, state: configure succeed [Enabled] operational channel: 64 operational power: 14 base mac: 00:0b:0e:00:d2:c1 bssid1: 00:0b:0e:00:d2:94, ssid: private The following command displays the status of a directly connected MAP: WX1200# display ap status 1 Port: 1, AP model: AP2750, manufacturer 3Com, name: MAP01 ==================================================== State: operational CPU info: IBM:PPC speed=266666664 Hz version=405GPr id=0x28b08a1e047f1d0f ram=33554432 s/n=0333000288 hw_rev=A3 Uptime: 3 hours, 44 minutes, 28 seconds Radio 1 type: 802.11g, state: configure succeed [Enabled] (802.11b protect) operational channel: 1 operational power: 15 base mac: 00:0b:0e:00:d1:00 bssid1: 00:0b:0e:00:d1:00, ssid: public bssid2: 00:0b:0e:00:d1:02, ssid: employee-net bssid3: 00:0b:0e:00:d1:04, ssid: mycorp-tkip Table 57 describes the fields in this display. Table 57 Output for display ap status Field Description DAP Connection ID for the Distributed MAP. Note: This field is applicable only if the MAP is configured on the WX switch as a Distributed MAP. Port WX port number. Note: This field is applicable only if the MAP is directly connected to the WX switch and the WX switch’s port is configured as an MAP access port. IP-addr IP address of the MAP. The address is assigned to the MAP by a DHCP server. Note: This field is applicable only if the MAP is configured on the WX switch as a Distributed MAP. display {ap | dap} status 289 Table 57 Output for display ap status (continued) Field Description AP model MAP access point model number. manufacturer Company that made the MAP access point. name MAP access point name. Link Status of this link with the MAP access point and the MAP port at the other end of the link. The status can be up or down. MAP port MAP port number connected to this WX port. State State of the MAP: init — The MAP has been recognized by the WX but has not yet begun booting. booting — The MAP has asked the WX for a boot image. image downloading — The MAP is receiving a boot image from the WX. image downloaded — The MAP has received a boot image from the WX and is booting. configuring — The MAP has booted and is ready to receive or is already receiving configuration parameters from the WX. operational — The MAP has received configuration parameters for one or more radios and is ready to accept client connections. configure failure — One or more of the radio parameters received from the WX is invalid. For Distributed MAPs, this field also indicates whether the MAP’s management traffic with the WX is encrypted, and whether the MAP’s fingerprint has been verified on the WX: not encrypted—The management session is not encrypted. encrypted but fingerprint not verified—The MAP’s management traffic is encrypted, but the MAP’s fingerprint has not been verified in MSS. encrypted and verified—The MAP’s management traffic is encrypted and the MAP’s fingerprint has been verified in MSS. 290 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Table 57 Output for display ap status (continued) Field Description CPU info Specifications and identification of the CPU. For MAP models MAP-352, MAP-341, and MAP-52, the ID portion of this field is not applicable. Uptime Amount of time since the MAP last rebooted using this link. Note: This field is displayed only when this link is the MAP access point’s primary link. display auto-tune attributes Radio 1 type 802.11 type and configuration state of the radio. Radio 2 type The configure succeed state indicates that the MAP has received configuration parameters for the radio and the radio is ready to accept client connections. For 802.11b/g radios, 802.11b protect indicates that the radio is in 802.11b protection mode and is therefore operating only at 802.11b rates. Sweep Mode indicates that a disabled radio is nonetheless participating in rogue detection scans. Even though this message appears only for disabled radios, all radios, enabled or disabled, participate in rogue detection. Countermeasures Enabled indicates that the radio is sending countermeasures packets to combat a rogue. operational channel The channel on which the radio is currently operating. operational power The power level at which the radio is currently operating. base mac Base MAC address of the radio. bssid, ssid SSIDs configured on the radio and their BSSIDs. Displays the current values of the RF attributes RF Auto-Tuning uses to decide whether to change channel or power settings. Syntax — display auto-tune attributes [ap map-num [radio {1 | 2 | all}]] Syntax — display auto-tune attributes [dap dap-num [radio {1 | 2 | all}]] map-num — MAP port connected to the MAP access point for which to display RF attributes. dap-num — Number of a Distributed MAP for which to display RF attributes. display auto-tune attributes 291 radio 1 — Shows RF attribute information for radio 1. radio 2 — Shows RF attribute information for radio 2. (This option does not apply to single-radio models.) radio all — Shows RF attribute information for both radios. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command displays RF attribute information for radio 1 on the directly connected MAP access point on port 2: WX1200# display auto-tune attributes ap 2 radio 1 Auto-tune attributes for port 2 radio 1: Noise: -92 Packet Retransmission Count: Utilization: 0 Phy Errors Count: CRC Errors count: 122 0 0 Table 58 describes the fields in this display. Table 58 Output for display auto-tune attributes Field Description Noise Noise threshold on the active channel. RF Auto-Tuning prefers channels with low noise levels over channels with higher noise levels. Utilization Number of multicast packets per second that a radio can send on a channel while continuously sending fixed size frames over a period of time. The number of packets that are successfully transmitted indicates how busy the channel is. CRC Errors count Number of frames received by the radio on that active channel that had CRC errors. A high CRC error count can indicate a hidden node or co-channel interference. Packet Retransmission Count Number of retransmitted packets sent from the client to the radio on the active channel. Retransmissions can indicate that the client is not receiving ACKs from the MAP radio. Phy Errors Count Number of frames received by the MAP radio that had physical layer errors on the active channel. Phy errors can indicate interference from a non-802.11 device. See Also display auto-tune neighbors on page 292 292 CHAPTER 9: MANAGED ACCESS POINT COMMANDS display auto-tune neighbors display radio-profile on page 298 set {ap | dap} radio auto-tune max-power on page 317 set {ap | dap} radio auto-tune max- retransmissions on page 318 set radio-profile auto-tune channel-config on page 330 set radio-profile auto-tune channel-holddown on page 331 set radio-profile auto-tune channel-interval on page 332 set radio-profile auto-tune power-backoff- timer on page 333 set radio-profile auto-tune power-config on page 334 set radio-profile auto-tune power-interval on page 335 Displays the other 3Com radios and third-party 802.11 radios that a 3Com radio can hear. Syntax — display auto-tune neighbors [ap map-num [radio {1 | 2| all}]] Syntax — display auto-tune neighbors [dap dap-num [radio {1 | 2| all}]] map-num — MAP port connected to the MAP access point for which to display neighbors. dap-num — Number of a Distributed MAP for which to display neighbors. radio 1 — Shows neighbor information for radio 1. radio 2 — Shows neighbor information for radio 2. (This option does not apply to single-radio models.) radio all — Shows neighbor information for both radios. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. display auto-tune neighbors 293 Usage — For simplicity, this command displays a single entry for each 3Com radio, even if the radio is supporting multiple BSSIDs. However, BSSIDs for third-party 802.11 radios are listed separately, even if a radio is supporting more than one BSSID. Information is displayed for a radio if the radio sends beacon frames or responds to probe requests. Even if a radio’s SSIDs are unadvertised, 3Com radios detect the empty beacon frames (beacon frames without SSIDs) sent by the radio, and include the radio in the neighbor list. Examples — The following command displays neighbor information for radio 1 on the directly connected MAP access point on port 2: WX1200# display auto-tune neighbors ap 2 radio 1 Total number of entries for port 2 radio 1: 5 Channel Neighbor BSS/MAC RSSI ------- ----------------- ---1 00:0b:85:06:e3:60 -46 1 00:0b:0e:00:0a:80 -78 1 00:0b:0e:00:d2:c0 -74 1 00:0b:85:06:dd:00 -50 1 00:0b:0e:00:05:c1 -72 Table 59 describes the fields in this display. Table 59 Output for display auto-tune neighbors Field Description Channel Channel on which the BSSID is detected. Neighbor BSS/MAC BSSID detected by the radio. RSSI Received signal strength indication (RSSI), in decibels referred to 1 milliwatt (dBm). A higher value indicates a stronger signal. See Also display auto-tune attributes on page 290 display radio-profile on page 298 set {ap | dap} radio auto-tune max-power on page 317 set {ap | dap} radio auto-tune max- retransmissions on page 318 set radio-profile auto-tune channel-config on page 330 set radio-profile auto-tune channel-holddown on page 331 294 CHAPTER 9: MANAGED ACCESS POINT COMMANDS display dap connection set radio-profile auto-tune channel-interval on page 332 set radio-profile auto-tune power-backoff- timer on page 333 set radio-profile auto-tune power-config on page 334 set radio-profile auto-tune power-interval on page 335 Displays the system IP address of the WX switch that has the active data connection for a Distributed MAP. Syntax — display dap connection [dap-num | serial-id serial-ID] dap-num — Number of a Distributed MAP for which to display information about its active connection. serial-id serial-ID — MAP access point serial ID. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — The serial-id parameter displays the active connection for the specified Distributed MAP even if that MAP is not configured on this WX switch. If you instead use the command with the dap-num parameter or without a parameter, connection information is displayed only for Distributed MAPs that are configured on this WX switch. If a Distributed MAP is configured on this WX switch (or another WX switch in the same Mobility Domain) but does not have an active connection, the command does not display information for the MAP. To show configured Distributed MAPs regardless of connection status, use the display dap global command. Examples — The following command displays information for all Distributed MAPs configured on this WX switch that have active connections: WX1200# display dap connection Total number of entries: 2 DAP Serial Id DAP IP Address --- ------------------------2 M9DE48B012F00 10.10.2.27 4 M9DE48B123400 10.10.3.34 WX IP Address --------------10.3.8.111 10.3.8.111 display dap global 295 The following command displays connection information specifically for a Distributed MAP with serial ID M9DE48B6EAD00: WX1200# display dap connection serial-id M9DE48B6EAD00 Total number of entries: 1 DAP Serial Id DAP IP Address WX IP Address --- ------------------------- --------------9 M9DE48B6EAD00 10.10.4.88 10.9.9.11 Table 60 describes the fields in this display. Table 60 Output of display dap connection Field Description DAP Connection ID you assigned to the Distributed MAP. If the connection is configured on another WX switch, this field contains a hyphen ( - ). Serial Id Serial ID of the Distributed MAP. DAP IP Address IP address assigned by DHCP to the Distributed MAP. WX IP Address System IP address of the WX switch on which the MAP has an active connection. This is the switch that the MAP used for booting and configuration and is using for data transfer. See Also display dap global display {ap | dap} config on page 277 display dap global on page 295 display dap unconfigured on page 297 Displays configuration information for Distributed MAPs configured on WX switches in the Mobility Domain. Syntax — display dap global [dap-num | serial-id serial-ID] dap-num — Number of a Distributed MAP for which to display configuration settings. serial-id serial-ID — MAP access point serial ID. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. 296 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Usage — To show information only for Distributed MAPs that have active connections, use the display dap connection command. Examples — The following command displays configuration information for all Distributed MAPs configured on WX switches in the Mobility Domain: WX4400# display dap global Total number of entries: 8 DAP Serial Id WX IP Address --- ------------------------1 M9DE48B012F00 10.3.8.111 M9DE48B012F00 10.4.3.2 2 M9DE48B123400 10.3.8.111 M9DE48B123400 10.4.3.2 17 M9DE48B123600 10.3.8.111 M9DE48B123600 10.4.3.2 18 M9DE48B123700 10.3.8.111 M9DE48B123700 10.4.3.2 Bias ---HIGH LOW LOW HIGH HIGH LOW LOW HIGH Table 61 describes the fields in this display. Table 61 Output for display dap global Field Description DAP Connection ID you assigned to the Distributed MAP. Note: DAP numbers are listed only for Distributed MAPs configured on this WX switch. If the field contains a hyphen ( - ), the Distributed MAP configuration displayed in the row of output is on another WX switch. Serial Id Serial ID of the Distributed MAP. WX IP Address System IP address of the WX switch on which the Distributed MAP is configured. A separate row of output is displayed for each WX switch on which the Distributed MAP is configured. Bias Bias of the WX switch for the Distributed MAP: High Low display dap unconfigured 297 See Also display dap unconfigured display {ap | dap} config on page 277 display dap connection on page 294 display dap unconfigured on page 297 set dap on page 77 set {ap | dap} bias on page 310 Displays Distributed MAPs that are physically connected to the network but that are not configured on any WX switches. Syntax — display dap unconfigured Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command also displays an MAP that is directly connected to an WX switch, if the WX port to which the MAP is connected is configured as a network port instead of a MAP access port, and if the network port is a member of a VLAN. If a Distributed MAP is configured on an WX switch in another Mobility Domain, the MAP can appear in the output until the MAP is able to establish a connection with an WX switch in its Mobility Domain. After the MAP establishes a connection, the entry for the MAP ages out and no longer appears in the command’s output. Entries in the command output’s table age out after two minutes. Examples — The following command displays information for two Distributed MAPs that are not configured: WX1200# display dap unconfigured Total number of entries: 2 Serial Id Model IP Address ------------- ------ --------------M9DE48B012F00 AP2750 10.3.8.54 M9DE48B123400 AP2750 10.3.8.57 Port ---5 6 Vlan -------default vlan-eng 298 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Table 62 describes the fields in this display. Table 62 Output for display dap unconfigured Field Description Serial Id Serial ID of the Distributed MAP. Model MAP model number. IP Address IP address of the MAP. This is the address that the MAP receives from a DHCP server. The MAP uses this address to send a Find WX message to request configuration information from WX switches. However, the MAP cannot use the address to establish a connection unless the MAP first receives a configuration from an WX switch. Port Port number on which this WX switch received the MAP’s Find WX message. VLAN VLAN on which this WX switch received the MAP’s Find WX message. See Also display radio-profile display dap connection on page 294 display dap global on page 295 Displays radio profile information. Syntax — display radio-profile {name | ?} name — Displays information about the named radio profile. ? — Displays a list of radio profiles. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — MSS contains a default radio profile. 3Com recommends that you do not change this profile but instead keep the profile for reference. Examples — The following command shows radio profile information for the default radio profile: display radio-profile WX4400# display radio-profile default Beacon Interval: 100 DTIM Interval: Max Tx Lifetime: 2000 Max Rx Lifetime: RTS Threshold: 2346 Frag Threshold: Short Retry Limit: 5 Long Retry Limit: Long Preamble: NO Allow 802.11g clients only: Tune Channel: no Tune Power: Tune Channel Interval: 3600 Tune Power Interval: Client Backoff Timer: 10 Channel Holddown: Service profiles: default-dot1x, default-clear 299 1 2000 2346 5 NO no 600 300 Table 63 describes the fields in this display. Table 63 Output for display radio-profile Field Description Beacon Interval Rate (in milliseconds) at which each MAP radio in the profile advertises the beaconed SSID. DTIM Interval Number of times after every beacon that each MAP radio in the radio profile sends a delivery traffic indication map (DTIM). Max Tx Lifetime Number of milliseconds that a frame received by a radio in the radio profile can remain in buffer memory. Max Rx Lifetime Number of milliseconds that a frame scheduled to be transmitted by a radio in the radio profile can remain in buffer memory. RTS Threshold Minimum length (in bytes) a frame can be for a radio in the radio profile to use the RTS/CTS method to send the frame. The RTS/CTS method clears the air of other traffic to avoid corruption of the frame due to a collision with another frame. Frag Threshold Maximum length (in bytes) a frame is allowed to be without being fragmented into multiple frames before transmission by a radio in the radio profile. Short Retry Limit Number of times a radio in the radio profile can send a short unicast frame without receiving an acknowledgment. Long Retry Limit Number of times a radio in the radio profile can send a long unicast frame without receiving an acknowledgment. A long unicast frame is a frame that is equal to or longer than the RTS threshold. 300 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Table 63 Output for display radio-profile (continued) Field Description Long Preamble Indicates whether an 802.11b radio that uses this radio profile advertises support for frames with long preambles only: Allow 802.11g clients only YES — Advertises support for long preambles only. NO — Advertises support for long and short preambles. Indicates whether the 802.11b/g radios in the radio profile restrict associations to 802.11g clients only: No — 802.11b/g radios allow associations with both 802.11b and 802.11g clients. No — 802.11b/g radios allow associations with 802.11g clients only. Note: This field applies only to 802.11b/g radios. Tune Channel Indicates whether RF Auto-Tuning is enabled for dynamically setting and tuning channels. Tune Power Indicates whether RF Auto-Tuning is enabled for dynamically setting and tuning power levels. Tune Channel Interval Interval, in seconds, at which RF Auto-Tuning decides whether to change the channels on radios in a radio profile. At the end of each interval, MSS processes the results of the RF scans performed during the previous interval, and changes radio channels if needed. Tune Power Interval Interval, in seconds, at which RF Auto-Tuning decides whether to change the power level on radios in a radio profile. At the end of each interval, MSS processes the results of the RF scans performed during the previous interval, and changes radio power levels if needed. Client Backoff Timer Interval, in minutes, at which radios in a radio profile reduce power after temporarily increasing the power to maintain the minimum data rate for an associated client. At the end of each power-backoff interval, radios that temporarily increased their power reduce it by 1 dBm. The power backoff continues in 1 dBm increments after each interval until the power returns to expected setting. Channel Holddown Minimum number of seconds a radio in a radio profile must remain at its current channel assignment before RF Auto-Tuning can change the channel. display radio-profile 301 Table 63 Output for display radio-profile (continued) Field Description Service profiles Service profiles mapped to this radio profile. Each service profile contains an SSID and encryption information for that SSID. Note: When you upgrade from 2.x, MSS creates a default-dot1x service profile for encrypted SSIDs and a default-clear service profile for unencrypted SSIDs. These default service profiles contain the default encryption settings for crypto SSIDs and clear SSIDs, respectively. See Also set radio-profile 11g-only on page 329 set radio-profile auto-tune channel-config on page 330 set radio-profile auto-tune channel-holddown on page 331 set radio-profile auto-tune channel-interval on page 332 set radio-profile auto-tune power-backoff- timer on page 333 set radio-profile auto-tune power-config on page 334 set radio-profile auto-tune power-interval on page 335 set radio-profile beacon-interval on page 336 set radio-profile dtim-interval on page 338 set radio-profile frag-threshold on page 339 set radio-profile long-retry on page 339 set radio-profile max-rx-lifetime on page 340 set radio-profile max-tx-lifetime on page 341 set radio-profile mode on page 342 set radio-profile preamble-length on page 345 set radio-profile rts-threshold on page 346 set radio-profile service-profile on page 346 set radio-profile short-retry on page 350 302 CHAPTER 9: MANAGED ACCESS POINT COMMANDS display service-profile Displays service profile information. Syntax — display service-profile {name | ?} name — Displays information about the named service profile. ? — Displays a list of service profiles. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command displays information for service profile wpa_clients: WX4400# display service-profile wpa_clients ssid-name: private ssid-type: crypto beacon: yes auth-fallthru: web-portal WEP Key 1 value: WEP Key 2 value: WEP Key 3 value: WEP Key 4 value: WEP Unicast Index: 1 WEP Multicast Index: 1 Shared Key Auth: NO WPA enabled: ciphers: cipher-tkip authentication: 802.1X TKIP countermeasures time: 60000ms Table 64 describes the fields in this display. Table 64 Output for display service-profile Field Description ssid-name Service set identifier (SSID) managed by this service profile. ssid-type SSID type: beacon crypto — Wireless traffic for the SSID is encrypted. clear — Wireless traffic for the SSID is unencrypted. Indicates whether the radio sends beacons, to advertise the SSID: no yes display service-profile 303 Table 64 Output for display service-profile (continued) Field Description auth-fallthru Secondary (fallthru) encryption type when a user tries to authenticate but the WX switch managing the radio does not have an authentication rule with a userglob that matches the username. WEP Key 1 value last-resort — Automatically authenticates the user and allows access to the SSID requested by the user, without requiring a username and password. none—Denies authentication and prohibits the user from accessing the SSID. web-portal — Redirects the user to a web page for login to the SSID. State of static WEP key number 1. Radios can use this key to encrypt traffic with static Wired-Equivalent Privacy (WEP): none —T he key is not configured. preset — The key is configured. Note: The WEP parameters apply to traffic only on the encrypted SSID. WEP Key 2 value WEP Key 3 value WEP Key 4 value State of static WEP key number 2: none — The key is not configured. preset — The key is configured. State of static WEP key number 3: none — The key is not configured. preset — The key is configured. State of static WEP key number 4: none — The key is not configured. preset — The key is configured. WEP Unicast Index Index of the static WEP key used to encrypt unicast traffic on an encrypted SSID. WEP Multicast Index Index of the static WEP key used to encrypt multicast traffic on an encrypted SSID. Shared Key Auth Indicates whether shared-key authentication is enabled. 304 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Table 64 Output for display service-profile (continued) Field Description WPA enabled Indicates that the Wi-Fi Protected Access (WPA) information element (IE) is enabled. Additional fields display the settings of other WPA parameters: ciphers — Lists the WPA cipher suites advertised by radios in the radio profile mapped to this service profile. authentication — Lists the authentication methods supported for WPA clients: 802.1X — dynamic authentication PSK — preshared key authentication TKIP countermeasures time — Indicates the amount of time (in ms) MSS enforces countermeasures following a second message integrity code (MIC) failure within a 60-second period. Note: The WPA fields are displayed only when the WPA IE is enabled. See Also set service-profile auth-dot1x on page 351 set service-profile auth-fallthru on page 352 set service-profile auth-psk on page 354 set service-profile beacon on page 355 set service-profile cipher-ccmp on page 356 set service-profile cipher-tkip on page 357 set service-profile cipher-wep104 on page 358 set service-profile cipher-wep40 on page 359 set service-profile psk-phrase on page 360 set service-profile psk-raw on page 361 set service-profile rsn-ie on page 362 set service-profile shared-key-auth on page 363 set service-profile ssid-name on page 363 set service-profile ssid-type on page 364 set service-profile tkip-mc-time on page 365 set service-profile web-aaa-form on page 366 reset {ap | dap} reset {ap | dap} set service-profile wep active-multicast- index on page 367 set service-profile wep active-unicast- index on page 368 set service-profile wep key-index on page 369 set service-profile wpa-ie on page 370 305 Restarts an MAP access point. Syntax — reset {ap port-list | dap dap-num} ap port-list — List of ports connected to the MAP access points to restart. dap dap-num — Number of a Distributed MAP to reset. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — When you enter this command, the MAP access point drops all sessions and reboots. CAUTION: Restarting an MAP access point can cause data loss for users who are currently associated with the MAP. Examples — The following command resets the MAP access point on port 6: WX1200# reset ap 6 This will reset specified AP devices. Would you like to continue? (y/n)y success: rebooting ap attached to port 6 306 CHAPTER 9: MANAGED ACCESS POINT COMMANDS set dap auto Creates a template for automatic configuration of Distributed MAPs. Syntax — set dap auto Defaults — None. Access — Enabled. History —Introduced in MSS 4.0. Usage — Table 65 lists the configurable template parameters and their defaults. The only parameter that requires configuration is the template mode. The template is disabled by default. To use the template to configure Distributed MAPs, you must enable the template using the set dap auto mode enable command. The template uses the default radio profile by default. You can change the profile using the set dap auto radio radio-profile command. You can use set dap auto commands to change settings for the parameters listed in Table 65. (The commands are listed in the “See Also” section.) Table 65 Configurable Template Parameters for Distributed MAPs Parameter Default Value MAP Parameters mode disabled bias high upgrade-firmware (boot-download-enable) enable (YES) group (load balancing group) none blink disable (Not shown in display dap config output) Radio Parameters radiotype (type) 11g (Applies only to single-radio MAP models) (or 11b for country codes where 802.11g is not allowed) mode enabled set dap auto 307 Table 65 Configurable Template Parameters for Distributed MAPs (continued) Parameter Default Value tx-pwr Highest setting allowed for the country of operation radio-profile (profile) default max-power default min-client-rate 5.5 for 802.11b/g 24 for 802.11a max-retransmissions 10 Examples — The following command creates a template for automatic Distributed MAP configuration: WX1200# set dap auto success: change accepted. See Also set dap auto mode on page 308 set dap auto radiotype on page 309 set {ap | dap} bias on page 310 set {ap | dap} blink on page 311 set {ap | dap} group on page 313 set {ap | dap} radio auto-tune max-power on page 317 set {ap | dap} radio auto-tune max- retransmissions on page 318 set {ap | dap} radio auto-tune min-client-rate on page 321 set {ap | dap} radio mode on page 323 set {ap | dap} radio radio-profile on page 324 set {ap | dap} upgrade-firmware on page 328 308 CHAPTER 9: MANAGED ACCESS POINT COMMANDS set dap auto mode Enables an WX switch’s template for automatic Distributed MAP configuration. Syntax — set dap auto mode {enable | disable} enable — Enables the MAP configuration template. disable — Disables the MAP configuration template. Defaults — The MAP configuration template is disabled by default. Access — Enabled. History —Introduced in MSS 4.0. Usage — You must use the set dap auto command to create the template before you can enable it. Examples — The following command enables the template for automatic Distributed MAP configuration: WX1200# set dap auto mode enable success: change accepted. See Also set dap auto on page 306 set dap auto radiotype on page 309 set {ap | dap} bias on page 310 set {ap | dap} blink on page 311 set {ap | dap} group on page 313 set {ap | dap} radio auto-tune max-power on page 317 set {ap | dap} radio auto-tune max- retransmissions on page 318 set {ap | dap} radio auto-tune min-client-rate on page 321 set {ap | dap} radio mode on page 323 set {ap | dap} radio radio-profile on page 324 set {ap | dap} upgrade-firmware on page 328 set dap auto radiotype set dap auto radiotype 309 Sets the radio type for single-MAP radios that use the MAP configuration template. Syntax — set dap auto [radiotype {11a | 11b| 11g}] radiotype {11a | 11b| 11g Radio type: 11a—802.11a 11b—802.11b 11g—802.11g This option applies only to single-radio models. The value 11g does not apply to model MAP-101. Defaults — The default radio type for model MAP-101 is 802.11b. The default radio type for model AP2750, MAP-241, and MAP-341, and for the 802.11b/g radios in models AP3750, AP8750, MAP-52, MAP-252, MAP-262, MAP-352, and MAP-372 is 802.11g in regulatory domains that support 802.11g, or 802.11b in regulatory domains that do not support 802.11g. MAP radios configured for 802.11g also allow associations from 802.11b clients by default. To disable support for 802.11b associations, use the set radio-profile 11g-only command on the radio profile that contains the radio. Examples — The following command sets the radio type to 802.11b: WX12000# set dap auto radiotype 11b success: change accepted. See Also set dap auto on page 306 310 CHAPTER 9: MANAGED ACCESS POINT COMMANDS set {ap | dap} bias Changes the bias for a MAP. Bias is the priority of one WX switch over other WX switches for booting and configuring the MAP. Syntax — set {ap port-list | dap (dap-num | auto)} bias {high | low} ap port-list — List of ports on which to change the bias for directly connected MAPs. dap dap-num — Number of a Distributed MAP for which to change the bias. dap auto — Configures bias for the MAP configuration template. (See set dap auto on page 306.) high — High bias. low — Low bias. Defaults — The default bias is high. Access — Enabled. History —Introduced in MSS Version 3.0. Option auto added for configuration of the MAP configuration template, MSS Version 4.0. Usage — High bias is preferred over low bias. Bias applies only to WX switches that are indirectly attached to the MAP through an intermediate Layer 2 or Layer 3 network. A MAP always attempts to boot on MAP port 1 first, and if an WX switch is directly attached on MAP port 1, the MAP always boots from it. If MAP port 1 is indirectly connected to WX switches through the network, the MAP boots from the switch with the high bias for the MAP. If the bias for all connections is the same, the MAP selects the switch that has the greatest capacity to add more active MAPs. For example, if a MAP is dual homed to two WX4400 wireless LAN switches, and one of the switches has 50 active MAPs while the other switch has 60 active MAPs, the new MAP selects the switch that has only 50 active MAPs. If the boot request on MAP port 1 fails, the MAP attempts to boot over its port 2, using the same process described above. set {ap | dap} blink 311 MAP selection of an WX switch is sticky. After a MAP selects an WX switch to boot from, the MAP continues to use that switch for its active data link even if another switch configured with high bias for the MAP becomes available. Examples — The following command changes the bias for a Distributed MAP to low: WX4400# set dap 1 bias low success: change accepted. See Also set {ap | dap} blink display {ap | dap} config on page 277 Enables or disables LED blink mode on a MAP access point to make it easy to identify. When blink mode is enabled on an AP2750, the 11a LED blinks on and off. When blink mode is enabled on an AP3750, the health and radio LEDs alternately blink green and amber. When blink mode is enabled on an AP7250, the Radio LED flashes red and the Power LED flashes green/orange. The Ethernet LED does not change. When blink mode is enabled on an AP8250, the Radio LED flashes red and the Power LED flashes green/orange. The Ethernet LED does not change. When blink mode is enabled on an AP8750, both Radio LEDs flash red and the Power LED flashes green/orange. The Ethernet LED does not change. When blink mode is enabled on other models (MAP-xxx), the health and radio LEDs alternately blink green and amber. By default, blink mode is disabled. 312 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Syntax — set {ap port-list | dap (dap-num | auto)} blink {enable | disable} ap port-list — List of ports connected to the MAP access points on which to turn blink mode on or off. dap dap-num — Number of a Distributed MAP on which to turn blink mode on or off. dap auto —Configures blink mode for the MAP configuration template. (See set dap auto on page 306.) enable — Enables blink mode. disable — Disables blink mode. Defaults — LED blink mode is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Option auto added for configuration of the MAP configuration template in MSS Version 4.0. Usage — Changing the LED blink mode does not alter operation of the MAP access point. Only the behavior of the LEDs is affected. Examples — The following command enables LED blink mode on the MAP access points connected to ports 3 and 4: WX1200# set ap 3-4 blink enable success: change accepted. set dap fingerprint Verifies a MAP’s fingerprint on an WX switch. If MAP-WX security is required by a WX switch, a MAP can establish a management session with the switch only if you have verified the MAP’s identity by verifying its fingerprint on the switch. Syntax — set dap num fingerprint hex dap dap-num — Number of the Distributed MAP whose fingerprint you are verifying. hex — The 16-digit hexadecimal number of the fingerprint. Use a colon between each digit. Make sure the fingerprint you enter matches the fingerprint used by the MAP. set {ap | dap} group 313 Defaults — None. Access — Enabled. History —Introduced in MSS 4.0. Usage — MAPs are configured with an encryption key pair at the factory. The fingerprint for the public key is displayed on a label on the back of the MAP, in the following format: RSA aaaa:aaaa:aaaa:aaaa: aaaa:aaaa:aaaa:aaaa If a MAP is already installed and operating, you can use the display dap status command to display the fingerprint. The display dap config command lists a MAP’s fingerprint only if the fingerprint has been verified in MSS. If the fingerprint has not been verified, the fingerprint information in the command output is blank. Examples — The following example verifies the fingerprint for Distributed MAP 8: WX-1200# set dap 8 fingerprint b4:f9:2a:52:37:58:f4:d0:10:75:43:2f:45:c9:52:c3 success: change accepted. See Also set {ap | dap} group set dap security on page 326 display {ap | dap} config on page 277 display {ap | dap} status on page 287 Configures a named group of MAP access points. MSS automatically load balances sessions among the access points in a group. To balance the sessions, MSS rejects an association request for an access point’s radio if that radio has at least four more active sessions than the radio of the same type with the least number of active sessions within the group. Syntax — set {ap port-list | dap (dap-num | auto)} group name ap port-list — List of MAP access ports to add to the group. 314 CHAPTER 9: MANAGED ACCESS POINT COMMANDS dap dap-num — Number of a Distributed MAP to add to the group. dap auto —Configures blink mode for the MAP configuration template. (See set dap auto on page 306.) name — MAP access point group name of up to 16 alphanumeric characters, with no spaces. Defaults — MAP access points are not grouped by default. Access — Enabled. History —Introduced in MSS Version 3.0. MSS Version 4.0 added auto option for configuration of the MAP configuration template. Usage — You can assign any subset or all of the MAP access points connected to an WX switch to a group on that switch. All access points in a group must be connected to the same WX switch. If you use the name none, spelled in any combination of capital or lowercase letters, the specified MAP access point is cleared from all MAP access point groups. Examples — The following command configures an MAP access point group named loadbalance1 that contains the MAP access points on ports 1, 3, and 5: WX1200# set ap 1,3,5 group loadbalance1 success: change accepted. The following command removes the MAP access point on port 4 from all MAP access point groups: WX1200# set ap 4 group none success: change accepted. See Also display {ap | dap} config on page 277 display {ap | dap} group on page 285 set {ap | dap} name set {ap | dap} name 315 Changes an MAP name. Syntax — set {ap port-list | dap dap-num} name name ap port-list — List of ports connected to the MAP access point to rename. dap dap-num — Number of a Distributed MAP to rename. name — Alphanumeric string of up to 16 characters, with no spaces. Defaults — The default name of a directly attached MAP is based on the port number of the MAP access port attached to the MAP. For example, the default name for a MAP on MAP access port 1 is MAP01. The default name of a Distributed MAP is based on the number you assign to it when you configure the connection. For example, the default name for Distributed MAP 1 is DMP01. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command changes the name of the MAP access point on port 1 to techpubs: WX1200# set ap 1 name techpubs success: change accepted. See Also set {ap | dap} radio antennatype “display {ap | dap} config” on page 277 Sets the model number for an external antenna. Syntax — set {ap port-list | dap dap-num} radio {1 antennatype ANT1060 | ANT1120 | ANT1180 | internal} {2 antennatype ANT5060 | ANT5120 | ANT5180 | internal} { {1|2} antennatype ANT3C591 | ANT3C592 | ANT3C597 | ANT3C598 | internal} ap port-list — List of ports connected to the MAP access points on which to set the channel. dap dap-num — Number of a Distributed MAP on which to set the channel. 316 CHAPTER 9: MANAGED ACCESS POINT COMMANDS radio 1 — Radio 1 of the MAP. radio 2 — Radio 2 of the MAP. (This option does not apply to single-radio models or to the AP8750.) antennatype {ANT1060 | ANT1120 | ANT1180 | internal} — 802.11b/g external antenna models: ANT1060 — 60° 802.11b/g antenna ANT1120 — 120° 802.11b/g antenna ANT1180 — 180° 802.11b/g antenna internal — uses the internal antenna instead antennatype {ANT5060 | ANT5120 | ANT5180 | internal} — 802.11a external antenna models: ANT5060 — 60° 802.11a antenna ANT5120 — 120° 802.11a antenna ANT5180 — 180° 802.11a antenna internal — uses the internal antenna instead antennatype {ANT3C591 | ANT3C592 | ANT3C597 | ANT3C598 | internal} — 802.11a/b/g dual-mode external antenna models: ANT3C591 — High gain omni 802.11a/b/g antenna ANT3C592 — Ceiling 802.11a/b/g antenna ANT3C597 — Hallway 802.11a/b/g antenna ANT3C598 — Panel 802.11a/b/g antenna internal — uses the internal antenna instead All radios use the internal antenna by default. (The MAP-262 802.11b/g radio does not have an internal antenna, and uses model ANT1060 by default.) Access — Enabled. History — Introduced in MSS Version 3.0. Model numbers added for 802.11a external antennas, and the default changed to internal (except for the MAP-262) in MSS Version 3.2. set {ap | dap} radio auto-tune max-power 317 Usage — This command applies only to MAP models that support external antennas. External 802.11b/g antennas are supported on MAP-372, MAP-341, MAP-352, and MAP-262. External 802.11a antennas are supported only on model MAP-372. External dual-mode antennas are supported on AP2750, AP3750, AP7250, AP8250 and AP8750. Examples — The following command configures the 802.11b/g radio on Distributed MAP 1 to use antenna model ANT1060: WX4400# set dap 1 radio 1 antennatype ANT1060 success: change accepted. See Also set {ap | dap} radio auto-tune max-power display {ap | dap} config on page 277 Sets the maximum power that RF Auto-Tuning can set on a radio. Syntax — set {ap port-list | dap (dap-num | auto)} radio {1 | 2} auto-tune max-power power-level ap port-list — List of ports connected to the MAP access points on which to set the maximum power. dap dap-num — Number of a Distributed MAP on which to set the maximum power. dap auto — Sets the maximum power for radios configured by the MAP configuration template. (See set dap auto on page 306.) radio 1 — Radio 1 of the MAP. radio 2 — Radio 2 of the MAP. (This option does not apply to single-radio models.) power-level — Maximum power setting RF Auto-Tuning can assign to the radio, expressed as the number of decibels in relation to 1 milliwatt (dBm). You can specify a value from 1 up to the maximum value allowed for the country of operation. The power-level can be a value from 1 to 20. Defaults — The default maximum power setting that RF Auto-Tuning can set on a radio is the highest setting allowed for the country of operation or highest setting supported on the hardware, whichever is lower. 318 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Access — Enabled. History —Introduced in MSS Version 3.0. MSS Version 4.0 added auto option for configuration of the MAP configuration template. Examples — The following command sets the maximum power that RF Auto-Tuning can set on radio 1 on the MAP access point on port 6 to 12 dBm. WX1200# set ap 6 radio 1 auto-tune max-power 12 success: change accepted. See Also set {ap | dap} radio auto-tune maxretransmissions set {ap | dap} radio auto-tune max- retransmissions on page 318 set radio-profile auto-tune power-backoff- timer on page 333 set radio-profile auto-tune power-config on page 334 set radio-profile auto-tune power-interval on page 335 Sets the maximum percentage of client retransmissions a radio can experience before RF Auto-Tuning considers changing the channel on the radio. A high percentage of retransmissions is a symptom of interference on the channel. Syntax — set {ap port-list | dap (dap-num | auto)} radio {1 | 2} auto-tune max-retransmissions retransmissions ap port-list — List of ports connected to the MAP access points on which to set the maximum retransmissions. dap dap-num — Number of a Distributed MAP on which to set the maximum retransmissions. dap auto — Sets the maximum retransmissions for radios configured by the MAP configuration template. (See set dap auto on page 306.) radio 1 — Radio 1 of the MAP. radio 2 — Radio 2 of the MAP. (This option does not apply to single-radio models.) retransmissions — Percentage of packets that can result in retransmissions without resulting in a channel change. You can specify from 1 to 100. set {ap | dap} radio auto-tune max- retransmissions 319 Defaults — The default is 10 percent. Access — Enabled. History —Introduced in MSS Version 3.0. MSS Version 4.0 added auto option for configuration of the MAP configuration template. Usage — A retransmission is a packet sent from a client to a MAP radio that the radio receives more than once. This can occur when the client does not receive an 802.11 acknowledgement for a packet sent to the radio. If the radio receives only a single copy of a packet that is transmitted multiple times by a client, the packet is not counted by the radio as a retransmission. For example, if a packet is corrupted and the radio does not receive it, but the second copy of the packet does reach the radio, the radio does not count the packet as a retransmission since the radio received only one recognizable copy of the packet. The interval is 1000 packets. If more than the specified percentage of packets within a group of 1000 packets received by the radio are retransmissions, the radio increases power. When the percentage of retransmissions exceeds the max-retransmissions threshold, the radio does not immediately increase power. Instead, if the data rate at which the radio is sending packets to the client is above the minimum data rate allowed, the radio lowers the data rate by one setting. If the retransmissions still exceed the maximum allowed, the radio continues to lower the data rate, one setting at a time, until either the retransmissions fall within the allowed percentile or the minimum allowed data rate is reached. If the retransmissions still exceed the threshold after the minimum allowed data rate is reached, the radio increases power by 1 dBm. The radio continues increasing the power in 1 dBm increments until the retransmissions fall below the threshold. After the retransmissions fall below the threshold, the radio reduces power by 1 dBm. As long as retransmissions remain below the threshold, the radio continues reducing power in 1 dBm increments until it returns to its default power level. 320 CHAPTER 9: MANAGED ACCESS POINT COMMANDS A radio also can increase power, in 1 dBm increments, if a client falls below the minimum allowed data rate. After a radio increases power, all clients must be at the minimum data rate or higher and the maximum retransmissions must be within the allowed percentile, before the radio begins reducing power again. Examples — The following command changes the max-retransmissions value to 20: WX1200# set ap 6 radio 1 auto-tune max-retransmissions 20 success: change accepted. See Also set {ap | dap} radio channel set {ap | dap} radio auto-tune max-power on page 317 set radio-profile auto-tune power-backoff- timer on page 333 set radio-profile auto-tune power-config on page 334 set radio-profile auto-tune power-interval on page 335 Sets an MAP radio’s channel. Syntax — set {ap port-list | dap dap-num} radio {1 | 2} channel channel-number ap port-list — List of ports connected to the MAP access points on which to set the channel. dap dap-num — Number of a Distributed MAP on which to set the channel. radio 1 — Radio 1 of the MAP. radio 2 — Radio 2 of the MAP. (This option does not apply to single-radio models.) channel channel-number — Channel number. The valid channel numbers depend on the country of operation. Defaults — The default channel depends on the radio type: The default channel number for 802.11b/g is 6. The default channel number for 802.11a is the lowest valid channel number for the country of operation. Access — Enabled. set {ap | dap} radio auto-tune min-client-rate 321 History —Introduced in MSS Version 3.0. Usage — You can configure a radio’s transmit power on the same command line. Use the tx-power option. This command is not valid if dynamic channel tuning (RF Auto-Tuning) is enabled. Examples — The following command configures the channel on the 802.11a radio on the MAP access point connected to port 5: WX1200# set ap 5 radio 1 channel 36 success: change accepted. The following command configures the channel and transmit power on the 802.11b/g radio on the MAP access point connected to port 1: WX1200# set ap 1 radio 1 channel 1 tx-power 10 success: change accepted. See Also set {ap | dap} radio auto-tune min-client-rate “display {ap | dap} config” on page 277 set {ap | dap} radio tx-power on page 325 Sets the minimum rate at which a radio is allowed to transmit traffic to clients. The radio automatically increases its transmit power when necessary to maintain at least the minimum rate with an associated client. Syntax — set {ap port-list | dap (dap-num | auto} radio {1 | 2} auto-tune min-client-rate rate ap port-list — List of ports connected to the MAP access points on which to set the minimum data rate. dap dap-num — Number of a Distributed MAP on which to set the minimum data rate. dap auto — Sets the maximum power for radios configured by the MAP configuration template. (See set dap auto on page 306.) radio 1 — Radio 1 of the MAP. radio 2 — Radio 2 of the MAP. (This option does not apply to single-radio models.) 322 CHAPTER 9: MANAGED ACCESS POINT COMMANDS rate — Minimum data rate, in megabits per second (Mbps). The valid values depend on the radio type: For 802.11g radios—54, 48, 36, 24, 18, 12, 11, 9, 6, 5.5, 2, or 1 For 802.11b radios—11, 5.5, 2, or 1 For 802.11a radios—54, 48, 36, 24, 18, 12, 9, or 6 Defaults — The default minimum data transmit rate depends on the radio type: The default minimum data rate for 802.11b/g and 802.11b radios is 5.5 Mbps. The default minimum data rate for 802.11a radios is 24 Mbps. Access — Enabled. History —Introduced in MSS Version 3.0. MSS Version 4.0 added auto option for configuration of the MAP configuration template. Usage — If the data rate for traffic sent by a radio to an associated client falls below the default minimum rate, the radio increases power, in 1 dBm increments, until all clients are at or above the minimum rate. After all clients are at or above the minimum data transmit rate, the radio reduces power by 1 dBm. As long as the radio continues to transmit at the minimum data rate or higher for all clients, the radio continues reducing power in 1 dBm increments until it returns to its normal power level. A radio also can increase power, in 1 dBm increments, if more than the allowed percentage of packets received by the radio from a client are retransmissions. After a radio increases power, all clients must be at the minimum data rate or higher and the maximum retransmissions must be within the allowed percentile, before the radio begins reducing power again. Examples — set ap 6 radio 1 min-client-rate 11 See Also set radio-profile auto-tune power-backoff- timer on page 333 set radio-profile auto-tune power-config on page 334 set {ap | dap} radio mode set {ap | dap} radio mode 323 Enables or disables a radio on an MAP access point. Syntax — set {ap port-list | dap {dap-num | auto}} radio {1 | 2} mode {enable | disable} ap port-list — List of ports connected to the MAP access point(s) on which to turn a radio on or off. dap dap-num — Number of a Distributed MAP on which to turn a radio on or off. dap auto — Sets the radio mode for radios configured by the MAP configuration template. (See set dap auto on page 306.) radio 1 — Radio 1 of the MAP. radio 2 — Radio 2 of the MAP. (This option does not apply to single-radio models.) mode enable — Enables a radio. mode disable — Disables a radio. Defaults — MAP access point radios are disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. MSS Version 4.0 added auto option for configuration of the MAP configuration template. Usage — To enable or disable one or more radios to which a profile is assigned, use the set ap radio radio-profile command. To enable or disable all radios that use a specific radio profile, use the set radio-profile command. Examples — The following command enables radio 1 on the MAP access points connected to ports 1 through 5: WX1200# set ap 1-5 radio 1 mode enable success: change accepted. The following command enables radio 2 on ports 1 through 3: WX1200# set ap 1-3 radio 2 mode enable success: change accepted. 324 CHAPTER 9: MANAGED ACCESS POINT COMMANDS See Also set {ap | dap} radio radio-profile clear {ap | dap} radio on page 272 display {ap | dap} config on page 277 set {ap | dap} radio radio-profile on page 324 set radio-profile mode on page 342 Assigns a radio profile to a MAP radio and enables or disables the radio. Syntax — set {ap port-list | dap {dap-num | auto}} radio {1 | 2} radio-profile name mode {enable | disable} ap port-list — List of ports. dap dap-num — Number of a Distributed MAP. dap auto — Sets the radio profile for radios configured by the MAP configuration template. (See set dap auto on page 306.) radio 1 — Radio 1 of the MAP. radio 2 — Radio 2 of the MAP. (This option does not apply to single-radio models.) radio-profile name — Radio profile name of up to 16 alphanumeric characters, with no spaces. mode enable — Enables radios on the specified ports with the parameter settings in the specified radio profile. mode disable — Disables radios on the specified ports. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Option auto added for configuration of the MAP configuration template in MSS Version 4.0 . Usage — When you create a new profile, the radio parameters in the profile are set to their factory default values. To enable or disable all radios that use a specific radio profile, use set radio-profile. set {ap | dap} radio tx-power 325 Examples — The following command enables radio 1 on ports 3 through 6 assigned to radio profile rp1: WX1200# set ap 3-6 radio 1 radio-profile rp1 mode enable success: change accepted. See Also set {ap | dap} radio tx-power clear {ap | dap} radio on page 272 display radio-profile on page 298 set {ap | dap} radio mode on page 323 set radio-profile mode on page 342 Sets an MAP radio’s transmit power. Syntax — set {ap port-list | dap dap-num} radio {1 | 2} tx-power power-level ap port-list — List of ports connected to the MAP access points on which to set the transmit power. dap dap-num — Number of a Distributed MAP on which to set the transmit power. radio 1 — Radio 1 of the MAP. radio 2 — Radio 2 of the MAP. (This option does not apply to single-radio models.) tx-power power-level — Number of decibels in relation to 1 milliwatt (dBm). The valid values depend on the country of operation. The maximum transmit power you can configure on any 3Com radio is the maximum allowed for the country in which you plan to operate the radio or one of the following values if that value is less than the country maximum: on an 802.11a radio, 11 dBm for channel numbers less than or equal to 64, or 10 dBm for channel numbers greater than 64; on an 802.11b/g radio, 16 dBm for all valid channel numbers for 802.11b, or 14 dBm for all valid channel numbers for 802.11g. Defaults — The default transmit power on all MAP radio types is the highest setting allowed for the country of operation or highest setting supported on the hardware, whichever is lower. 326 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You also can configure a radio’s channel on the same command line. Use the channel option. This command is not valid if dynamic power tuning (RF Auto-Tuning) is enabled. Examples — The following command configures the transmit power on the 802.11a radio on the MAP access point connected to port 5: WX1200# set ap 5 radio 1 tx-power 10 success: change accepted. The following command configures the channel and transmit power on the 802.11b/g radio on the MAP access point connected to port 1: WX1200# set ap 1 radio 1 channel 1 tx-power 10 success: change accepted. See Also set dap security “display {ap | dap} config” on page 277 set {ap | dap} radio channel on page 320 Sets security requirements for management sessions between an WX switch and its Distributed MAPs. This feature applies to Distributed MAPs only, not to directly connected MAPs configured on MAP access ports. In addition, MAP models AP7250, AP8250, AP8750, MAP-101 and MAP-122 do not have encryption keys and do not support this feature regardless of how they are connected to the WX switch. The maximum transmission unit (MTU) for encrypted MAP management traffic is 1498 bytes, whereas the MTU for unencrypted management traffic is 1474 bytes. Make sure the devices in the intermediate network between the WX switch and Distributed MAP can support the higher MTU. Syntax — set dap security {require | none | optional} set dap security 327 require — Require all Distributed MAPs to have encryption keys that have been verified in the CLI by an administrator. If a MAP does not have an encryption key or the key has not been verified, the WX does not establish a management session with the MAP. optional — Allows MAPs to be managed by the switch even if they do not have encryption keys or their keys have not been verified by an administrator. Encryption is used for MAPs that support it. none — Encryption is not used, even for MAPs that support it. Defaults — The default setting is none. Access — Enabled. History —Introduced in MSS 4.0. Usage — This parameter applies to all Distributed MAPs managed by the switch. If you change the setting to required, the switch requires Distributed MAPs to have encryption keys. The switch also requires their fingerprints to be verified in MSS. When MAP security is required, a MAP can establish a management session with the WX only if its fingerprint has been verified by you in MSS. A change to MAP security support does not affect management sessions that are already established. To apply the new setting to an MAP, restart the MAP. Examples — The following command configures an WX to require Distributed MAPs to have encryption keys: WX-1200# set dap security require See Also set dap fingerprint on page 312 display {ap | dap} config on page 277 display {ap | dap} status on page 287 328 CHAPTER 9: MANAGED ACCESS POINT COMMANDS set {ap | dap} upgrade-firmware Disables or reenables automatic upgrade of an MAP access point’s boot firmware. Syntax — set {ap port-list | dap {dap-num | auto}} upgrade-firmware {enable | disable} ap port-list — List of ports connected to the MAP access point(s) on which to allow automatic firmware upgrades. dap dap-num — Number of a Distributed MAP on which to allow automatic firmware upgrades. dap auto — Configures firmware upgrades for the MAP configuration template. (See set dap auto on page 306.) enable — Enables automatic firmware upgrades. disable — Disables automatic firmware upgrades. Defaults — Automatic firmware upgrades of MAP access points are enabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Option auto to configure the MAP configuration template added in MSS Version 4.0. Usage — When the feature is enabled on an WX port, an MAP access point connected to that port upgrades its boot firmware to the latest version stored on the WX switch while booting. Examples — The following command disables automatic firmware upgrades on the MAP access point connected to port 6: WX1200# set ap 6 upgrade-firmware disable See Also display {ap | dap} config on page 277 set radio-profile 11g-only set radio-profile 11g-only 329 Configures each 802.11b/g radio in a radio profile to allow associations with 802.11g clients only. Syntax — set radio-profile name 11g-only {enable | disable} name — Radio profile name. enable — Configures radios to allow associations with 802.11g clients only. disable — Configures radios to allow associations with 802.11g clients and 802.11b clients. Defaults — The default setting is disable. 3Com 802.11b/g radios allow associations with 802.11g and 802.11b clients by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must disable all radios that are using a radio profile before you can change parameters in the profile. Use the set radio-profile mode command. Even when association of 802.11b clients is disabled, if an 802.11b/g radio detects a beacon from an 802.11b network, the radio enters protection mode to guard against interference. The set radio-profile 11g-only command does not affect the radio support configured with the set port type ap command. For example, if you configure a radio to be 802.11b only when you set the port type, the set radio-profile 11g-only enable command does not enable 802.11g support on the radio. Examples — The following command configures the 802.11b/g radios in radio profile rp1 to allow associations from 802.11g clients only: WX4400# set radio-profile rp1 11g-only enable success: change accepted. See Also display {ap | dap} config on page 277 display radio-profile on page 298 set port type ap on page 87 set radio-profile mode on page 342 330 CHAPTER 9: MANAGED ACCESS POINT COMMANDS set radio-profile active-scan Disables or reenables active RF detection scanning on the MAP radios managed by a radio profile. When active scanning is enabled, MAP radios look for rogue devices by sending probe any requests (probe requests with a null SSID name), to solicit probe responses from other access points. Passive scanning is always enabled and cannot be disabled. During passive scanning, radios look for rogues by listening for beacons and probe responses. Syntax — set radio-profile name active-scan {enable | disable} name — Radio profile name. enable — Configures radios to actively scan for rogues. disable — Configures radios to scan only passively for rogues by listening for beacons and probe responses. Defaults — Active scanning is enabled by default. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — You can enter this command on any WX switch in the Mobility Domain. The command takes effect only on that switch. Examples — The following command disables active scan in radio profile radprof3: WX-1200# set radio-profile radprof3 active-scan disable success: change accepted. set radio-profile auto-tune channel-config Disables or reenables dynamic channel tuning (RF Auto-Tuning) for the MAP radios in a radio profile. Syntax — set radio-profile name auto-tune channel-config {enable | disable} name — Radio profile name. set radio-profile auto-tune channel-holddown 331 enable — Configures radios to dynamically select their channels when the radios are started. disable — Configures radios to use their statically assigned channels, or the default channels if unassigned, when the radios are started. Defaults — Dynamic channel assignment is enabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — If you disable RF Auto-Tuning for channels, MSS does not dynamically set the channels when radios are first enabled and also does not tune the channels during operation. If RF Auto-Tuning for channels is enabled, MSS does not allow you to manually change channels. Examples — The following command disables dynamic channel tuning for radios in the rp2 radio profile: WX4400# set radio-profile rp2 auto-tune channel-config disable success: change accepted. See Also set radio-profile auto-tune channel-holddown set radio-profile auto-tune channel-holddown on page 331 set radio-profile auto-tune channel-interval on page 332 set radio-profile auto-tune power-config on page 334 Sets the minimum number of seconds a radio in a radio profile must remain at its current channel assignment before RF Auto-Tuning can change the channel. The channel holddown provides additional stability to the network by preventing the radio from changing channels too rapidly in response to spurious RF anomalies such as short-duration channel interference. Syntax — set radio-profile name auto-tune channel-holddown holddown name — Radio profile name. 332 CHAPTER 9: MANAGED ACCESS POINT COMMANDS holddown — Minimum number of seconds a radio must remain on its current channel setting before RF Auto-Tuning is allowed to change the channel. You can specify from 0 to 65535 seconds. Defaults — The default RF Auto-Tuning channel holddown is 900 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — The channel holddown applies even if RF anomalies occur that normally cause an immediate channel change. Examples — The following command changes the channel holddown for radios in radio profile rp2 to 600 seconds: WX4400# set radio-profile rp2 auto-tune channel-holddown 600 success: change accepted. See Also set radio-profile auto-tune channel-interval set radio-profile auto-tune channel-config on page 330 set radio-profile auto-tune channel-interval on page 332 Sets the interval at which RF Auto-Tuning decides whether to change the channels on radios in a radio profile. At the end of each interval, MSS processes the results of the RF scans performed during the previous interval, and changes radio channels if needed. Syntax — set radio-profile name auto-tune channel-interval seconds name — Radio profile name. seconds — Number of seconds RF Auto-Tuning waits before changing radio channels to adjust to RF changes, if needed. You can specify from 0 to 65535 seconds. Defaults — The default channel interval is 3600 seconds (one hour). Access — Enabled. History —Introduced in MSS Version 3.0. set radio-profile auto-tune power-backoff- timer 333 Usage — 3Com recommends that you use an interval of at least 300 seconds (5 minutes). RF Auto-Tuning can change a radio’s channel before the channel interval expires in response to RF anomalies. Even in this case, channel changes cannot occur more frequently than the channel holddown interval. If you set the interval to 0, RF Auto-Tuning does not reevaluate the channel at regular intervals. However, RF Auto-Tuning can still change the channel in response to RF anomalies. Examples — The following command sets the channel interval for radios in radio profile rp2 to 2700 seconds (45 minutes): WX4400# set radio-profile rp2 auto-tune channel-interval 2700 success: change accepted. See Also set radio-profile auto-tune power-backofftimer set radio-profile auto-tune channel-config on page 330 set radio-profile auto-tune channel-holddown on page 331 Sets the interval at which radios in a radio profile reduce power after temporarily increasing the power to maintain the minimum data rate for an associated client. At the end of each power-backoff interval, radios that temporarily increased their power reduce it by 1 dBm. The power backoff continues in 1 dBm increments after each interval until the power returns to expected setting. Syntax — set radio-profile name auto-tune power-backoff-timer seconds name — Radio profile name. seconds — Number of seconds radios wait before lowering the power by 1 dBm. You can specify from 0 to 65535 seconds. Defaults — The default power-backoff interval is 10 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. 334 CHAPTER 9: MANAGED ACCESS POINT COMMANDS A radio can increase power again if required to preserve the minimum data rate for an associated client. Examples — The following command changes the power-backoff interval for radios in radio profile rp2 to 15 seconds: WX4400# set radio-profile rp2 auto-tune power-backoff-timer 15 success: change accepted. See Also set radio-profile auto-tune power-config set {ap | dap} radio auto-tune max-power on page 317 set {ap | dap} radio auto-tune max- retransmissions on page 318 set radio-profile auto-tune power-config on page 334 set radio-profile auto-tune power-interval on page 335 Enables or disables dynamic power tuning (RF Auto-Tuning) for the MAP radios in a radio profile. Syntax — set radio-profile name auto-tune power-config {enable | disable} name — Radio profile name. enable — Configures radios to dynamically set their power levels when the MAPs are started. disable — Configures radios to use their statically assigned power levels, or the default power levels if unassigned, when the radios are started. Defaults — Dynamic power assignment is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — When RF Auto-Tuning for power is disabled, MSS does not dynamically set the power levels when radios are first enabled and also does not tune power during operation with associated clients. When RF Auto-Tuning for power is enabled, MSS does not allow you to manually change the power level. set radio-profile auto-tune power-interval 335 Examples — The following command enables dynamic power tuning for radios in the rp2 radio profile: WX4400# set radio-profile rp2 auto-tune power-config enable success: change accepted. See Also set radio-profile auto-tune power-interval set {ap | dap} radio auto-tune max-power on page 317 set {ap | dap} radio auto-tune max- retransmissions on page 318 set radio-profile auto-tune channel-config on page 330 set radio-profile auto-tune power-backoff- timer on page 333 set radio-profile auto-tune power-interval on page 335 Sets the interval at which RF Auto-Tuning decides whether to change the power level on radios in a radio profile. At the end of each interval, MSS processes the results of the RF scans performed during the previous interval, and changes radio power levels if needed. Syntax — set radio-profile name auto-tune power-interval seconds name — Radio profile name. seconds — Number of seconds MSS waits before changing radio power levels to adjust to RF changes, if needed. You can specify from 1 to 65535 seconds. Defaults — The default power tuning interval is 300 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — RF Auto-Tuning also can temporarily increase a radio’s power level to preserve the minimum data rate for an associated client. In this case, the radio reduces its power in 1 dBm increments until the power returns to the expected level. 336 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Examples — The following command sets the power interval for radios in radio profile rp2 to 240 seconds: WX4400# set radio-profile rp2 auto-tune power-interval 240 success: change accepted. See Also set radio-profile beacon-interval set {ap | dap} radio auto-tune max-power on page 317 set {ap | dap} radio auto-tune max- retransmissions on page 318 set radio-profile auto-tune power-backoff- timer on page 333 set radio-profile auto-tune power-config on page 334 Changes the rate at which each MAP radio in a radio profile advertises its service set identifier (SSID). Syntax — set radio-profile name beacon-interval interval name — Radio profile name. interval — Number of milliseconds (ms) between beacons. You can specify from 25 ms to 8191 ms. Defaults — The beacon interval for MAP radios is 100 ms by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must disable all radios that are using a radio profile before you can change parameters in the profile. Use the set radio-profile mode command. Examples — The following command changes the beacon interval for radio profile rp1 to 200 ms: WX4400# set radio-profile rp1 beacon-interval 200 success: change accepted. See Also display radio-profile on page 298 set radio-profile mode on page 342 set radio-profile countermeasures set radio-profile countermeasures 337 CAUTION: Countermeasures affect wireless service on a radio. When a MAP radio is sending countermeasures, the radio is disabled for use by network traffic, until the radio finishes sending the countermeasures. Enables or disables countermeasures for on the MAP radios managed by a radio profile. Countermeasures are packets sent by a radio to prevent clients from being able to use rogue access points. MAP radios can also issue countermeasures against interfering devices. An interfering device is not part of the network but also is not a rogue. No client connected to the device has been detected communicating with any network entity listed in the forwarding database (FDD) of any WX switch in the Mobility Domain. Although the interfering device is not connected to your network, the device might be causing RF interference with MAP radios. Syntax — set radio-profile name countermeasures { all | rogue } name — Radio profile name. all — Configures radios to attack rogues and interfering devices. rogue — Configures radios to attack rogues only. Defaults — Countermeasures are disabled by default. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command enables countermeasures in radio profile radprof3 for rogues only: WX-1200# set radio-profile radprof3 countermeasures rogue success: change accepted. The following command disables countermeasures in radio profile radprof3: WX-1200# clear radio-profile radprof3 countermeasures success: change accepted. 338 CHAPTER 9: MANAGED ACCESS POINT COMMANDS set radio-profile dtim-interval Changes the number of times after every beacon that each MAP radio in a radio profile sends a delivery traffic indication map (DTIM). An MAP access point sends the multicast and broadcast frames stored in its buffers to clients who request them in response to the DTIM. The DTIM interval applies to both the beaconed SSID and the nonbeaconed SSID. Syntax — set radio-profile name dtim-interval interval name — Radio profile name. interval — Number of times the DTIM is transmitted after every beacon. You can enter a value from 1 through 31. Defaults — By default, MAP access points send the DTIM once after each beacon. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must disable all radios that are using a radio profile before you can change parameters in the profile. Use the set radio-profile mode command. The DTIM interval does not apply to unicast frames. Examples — The following command changes the DTIM interval for radio profile rp1 to 2: WX4400# set radio-profile rp1 dtim-interval 2 success: change accepted. See Also display radio-profile on page 298 set radio-profile mode on page 342 set radio-profile frag-threshold set radio-profile frag-threshold 339 Changes the fragmentation threshold for the MAP radios in a radio profile. The fragmentation threshold specifies the maximum length a frame is allowed to be without being broken into multiple frames before transmission. Syntax — set radio-profile name frag-threshold threshold name — Radio profile name. threshold — Maximum frame length, in bytes. You can enter a value from 256 through 2346. Defaults — The default fragmentation threshold for MAP radios is 2346 bytes. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must disable all radios that are using a radio profile before you can change parameters in the profile. Use the set radio-profile mode command. Examples — The following command changes the fragmentation threshold for radio profile rp1 to 1500 bytes: WX4400# set radio-profile rp1 frag-threshold 1500 success: change accepted. See Also set radio-profile long-retry display radio-profile on page 298 set radio-profile mode on page 342 Changes the long retry threshold for the MAP radios in a radio profile. The long retry threshold specifies the number of times a radio can send a long unicast frame without receiving an acknowledgment. A long unicast frame is a frame that is equal to or longer than the Request-to-Send (RTS) threshold. Syntax — set radio-profile name long-retry threshold name — Radio profile name. 340 CHAPTER 9: MANAGED ACCESS POINT COMMANDS threshold — Number of times the radio can send the same long unicast frame. You can enter a value from 1 through 15. Defaults — The default long unicast retry threshold for MAP radios is 5 attempts. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must disable all radios that are using a radio profile before you can change parameters in the profile. Use the set radio-profile mode command. Examples — The following command changes the long retry threshold for radio profile rp1 to 8: WX4400# set radio-profile rp1 long-retry 8 success: change accepted. See Also set radio-profile max-rx-lifetime display radio-profile on page 298 set radio-profile mode on page 342 set radio-profile short-retry on page 350 Changes the maximum receive threshold for the MAP radios in a radio profile. The maximum receive threshold specifies the number of milliseconds that a frame received by a radio can remain in buffer memory. Syntax — set radio-profile name max-rx-lifetime time name — Radio profile name. time — Number of milliseconds. You can enter a value from 500 (0.5 second) through 250,000 (250 seconds). Defaults — The default maximum receive threshold for MAP radios is 2000 ms (2 seconds). Access — Enabled. History —Introduced in MSS Version 3.0. set radio-profile max-tx-lifetime 341 Usage — You must disable all radios that are using a radio profile before you can change parameters in the profile. Use the set radio-profile mode command. Examples — The following command changes the maximum receive threshold for radio profile rp1 to 4000 ms: WX4400# set radio-profile rp1 max-rx-lifetime 4000 success: change accepted. See Also set radio-profile max-tx-lifetime set radio-profile mode on page 342 set radio-profile max-tx-lifetime on page 341 display radio-profile on page 298 Changes the maximum transmit threshold for the MAP radios in a radio profile. The maximum transmit threshold specifies the number of milliseconds that a frame scheduled to be transmitted by a radio can remain in buffer memory. Syntax — set radio-profile name max-tx-lifetime time name — Radio profile name. time — Number of milliseconds. You can enter a value from 500 (0.5 second) through 250,000 (250 seconds). Defaults — The default maximum transmit threshold for MAP radios is 2000 ms (2 seconds). Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must disable all radios that are using a radio profile before you can change parameters in the profile. Use the set radio-profile mode command. Examples — The following command changes the maximum transmit threshold for radio profile rp1 to 4000 ms: WX4400# set radio-profile rp1 max-tx-lifetime 4000 success: change accepted. 342 CHAPTER 9: MANAGED ACCESS POINT COMMANDS See Also set radio-profile mode display radio-profile on page 298 set radio-profile mode on page 342 set radio-profile max-rx-lifetime on page 340 Creates a new radio profile, or disables or reenables all MAP radios that are using a specific profile. Syntax — set radio-profile name [mode {enable | disable}] radio-profile name — Radio profile name of up to 16 alphanumeric characters, with no spaces. Use this command without the mode enable or mode disable option to create a new profile. mode enable — Enables the radios that use this profile. mode disable — Disables the radios that use this profile. Defaults — Each radio profile that you create has a set of properties with factory default values that you can change with the other set radio-profile commands in this chapter. Table 66 lists the parameters controlled by a radio profile and their default values. Table 66 Defaults for Radio Profile Parameters Parameter Radio Behavior When Parameter Set to Default Value Default Value 11g-only disable Allows associations with 802.11g and 802.11b clients. Note: This parameter applies only to 802.11b/g radios. active-scan enable Sends probe any requests (probe requests with a null SSID name) to solicit probe responses from other access points. auto-tune enable Allows dynamic configuration of channel and power settings by MSS. beacon-interval 100 Waits 100 ms between beacons. countermeasures Not configured Does not issue countermeasures against any device. set radio-profile mode 343 Table 66 Defaults for Radio Profile Parameters (continued) Parameter Radio Behavior When Parameter Set to Default Value Default Value dtim-interval 1 Sends the delivery traffic indication map (DTIM) after every beacon. frag-threshold 2346 Transmits frames up to 2346 bytes long without fragmentation. long-retry 5 Sends a long unicast frame up to five times without acknowledgment. max-rx-lifetime 2000 Allows a received frame to stay in the buffer for up to 2000 ms (2 seconds). max-tx-lifetime 2000 Allows a frame that is scheduled for transmission to stay in the buffer for up to 2000 ms (2 seconds). preamble-length short Advertises support for short 802.11b preambles, accepts either short or long 802.11b preambles, and generates unicast frames with the preamble length specified by the client. Note: This parameter applies only to 802.11b/g radios. rts-threshold 2346 Transmits frames longer than 2346 bytes by means of the Request-to-Send/Clear-to-Send (RTS/CTS) method. service-profile No service profiles defined Default settings for all service profile parameters, including encryption parameters, are used. short-retry 5 Sends a short unicast frame up to five times without acknowledgment. wmm enable Prioritizes traffic based on the Wi-Fi Multimedia (WMM) standard. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Use the command without any optional parameters to create new profile. If the radio profile does not already exist, MSS creates a new radio profile. Use the enable or disable option to enable or disable all the radios using a profile. To assign the profile to one or more radios, use the set ap radio radio-profile command. 344 CHAPTER 9: MANAGED ACCESS POINT COMMANDS To change a parameter in a radio profile, you must first disable all the radios in the profile. After you complete the change, you can reenable the radios. To enable or disable specific radios without disabling all of them, use the set ap radio command. Examples — The following command configures a new radio profile named rp1: WX4400# set radio-profile rp1 success: change accepted. The following command enables the radios that use radio profile rp1: WX4400# set radio-profile rp1 mode enable The following commands disable the radios that use radio profile rp1, change the beacon interval, then reenable the radios: WX4400# set radio-profile rp1 mode disable WX4400# set radio-profile rp1 beacon-interval 200 WX4400# set radio-profile rp1 mode enable The following command enables the WPA IE on MAP radios in radio profile rp2: WX4400# set radio-profile rp2 wpa-ie enable success: change accepted. See Also display {ap | dap} config on page 277 display radio-profile on page 298 set {ap | dap} radio mode on page 323 set {ap | dap} radio radio-profile on page 324 set radio-profile preamble-length set radio-profile preamble-length 345 Changes the preamble length for which an 802.11b/g MAP radio advertises support. This command does not apply to 802.11a. Syntax — set radio-profile name preamble-length {long | short} name — Radio profile name. long — Advertises support for long preambles. short — Advertises support for short preambles. Defaults — The default is short. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Changing the preamble length value affects only the support advertised by the radio. Regardless of the preamble length setting (short or long), an 802.11b/g radio accepts and can generate 802.11b/g frames with either short or long preambles. If a client associated with an 802.11b/g radio uses long preambles for unicast traffic, the MAP access point still accepts frames with short preambles but does not transmit frames with short preambles. This change also occurs if the access point overhears a beacon from an 802.11b/g radio on another access point that indicates the radio has clients that require long preambles. You must disable all radios that use a radio profile before you can change parameters in the profile. Use the set radio-profile mode command. Examples — The following command configures 802.11b/g radios that use the radio profile rp_long to advertise support for long preambles instead of short preambles: WX4400# set radio-profile rp_long preamble-length long success: change accepted. See Also display radio-profile on page 298 set radio-profile mode on page 342 346 CHAPTER 9: MANAGED ACCESS POINT COMMANDS set radio-profile rts-threshold Changes the RTS threshold for the MAP radios in a radio profile. The RTS threshold specifies the maximum length a frame can be before the radio uses the RTS/CTS method to send the frame. The RTS/CTS method clears the air of other traffic to avoid corruption of the frame due to a collision with another frame. Syntax — set radio-profile name rts-threshold threshold name — Radio profile name. threshold — Maximum frame length, in bytes. You can enter a value from 256 through 3000. Defaults — The default RTS threshold for an MAP radio is 2346 bytes. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must disable all radios that are using a radio profile before you can change parameters in the profile. Use the set radio-profile mode command. Examples — The following command changes the RTS threshold for radio profile rp1 to 1500 bytes: WX4400# set radio-profile rp1 rts-threshold 1500 success: change accepted. See Also set radio-profile service-profile set radio-profile mode on page 342 display radio-profile on page 298 Maps a service profile to a radio profile. All radios that use the radio profile also use the parameter settings, including SSID and encryption settings, in the service profile. Syntax — set radio-profile name service-profile name radio-profile name — Radio profile name of up to 16 alphanumeric characters, with no spaces. set radio-profile service-profile 347 service-profile name — Service profile name of up to 16 alphanumeric characters, with no spaces. Defaults — A radio profile does not have a service profile associated with it by default. In this case, the radios in the radio profile use the default settings for parameters controlled by the service profile. Table 67 lists the parameters controlled by a service profile and their default values. Table 67 Defaults for Service Profile Parameters Parameter Radio Behavior When Parameter Set Default Value to Default Value auth-dot1x enable When the Wi-Fi Protected Access (WPA) information element (IE) is enabled, uses 802.1X to authenticate WPA clients. auth-fallthru web-portal Uses WebAAA for users who do not match an 802.1X or MAC authentication rule for the SSID requested by the user. auth-psk disable Does not support using a preshared key (PSK) to authenticate WPA clients. auth-fallthru web-portal Uses WebAAA for users who do not match an 802.1X or MAC authentication rule for the SSID requested by the user. beacon enable Sends beacons to advertise the SSID managed by the service profile. cipher-ccmp disable Does not use Counter with Cipher Block Chaining Message Authentication Code Protocol (CCMP) to encrypt traffic sent to WPA clients. cipher-tkip enable When the WPA IE is enabled, uses Temporal Key Integrity Protocol (TKIP) to encrypt traffic sent to WPA clients. cipher-wep104 disable Does not use Wired Equivalent Privacy (WEP) with 104-bit keys to encrypt traffic sent to WPA clients. cipher-wep40 disable Does not use WEP with 40-bit keys to encrypt traffic sent to WPA clients. psk-phrase No passphrase defined Uses dynamically generated keys rather than statically configured keys to authenticate WPA clients. 348 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Table 67 Defaults for Service Profile Parameters (continued) Parameter Radio Behavior When Parameter Set Default Value to Default Value psk-raw No preshared key defined Uses dynamically generated keys rather than statically configured keys to authenticate WPA clients. rsn-ie disable Does not use the RSN IE in transmitted frames. (The RSN IE is required for 802.11i. RSN is sometimes called WPA2.) shared-key-auth disable Does not use shared-key authentication. This parameter does not enable PSK authentication for WPA. To enable PSK encryption for WPA, use the set radio-profile auth-psk command. ssid-name private Uses the SSID name private. ssid-type crypto Encrypts wireless traffic for the SSID. tkip-mc-time 60000 Uses Michael countermeasures for 60,000 ms (60 seconds) following detection of a second MIC failure within 60 seconds. web-aaa-form Not configured For WebAAA users, serves the default login web page or, if configured, the SSID-specific login web page. wep key-index No keys defined Uses dynamic WEP rather than static WEP. wep activemulticast-index 1 Uses WEP key 1 for static WEP encryption of multicast traffic if WEP encryption is enabled and keys are defined. wep active-unicastindex 1 Uses WEP key 1 for static WEP encryption of unicast traffic if WEP encryption is enabled and keys are defined. wpa-ie disable Does not use the WPA IE in transmitted frames. If you configure a WEP key for static WEP, MSS continues to also support dynamic WEP. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must configure the service profile before you can map it to a radio profile. You can map the same service profile to more than one radio profile. set radio-profile service-profile 349 You must disable all radios that use a radio profile before you can change parameters in the profile. Use the set radio-profile mode command. Examples — The following command maps service-profile wpa_clients to radio profile rp2: WX4400# set radio-profile rp2 service-profile wpa_clients success: change accepted. See Also display service-profile on page 302 set service-profile auth-dot1x on page 351 set service-profile auth-fallthru on page 352 set service-profile auth-psk on page 354 set service-profile beacon on page 355 set service-profile cipher-ccmp on page 356 set service-profile cipher-tkip on page 357 set service-profile cipher-wep104 on page 358 set service-profile cipher-wep40 on page 359 set service-profile psk-phrase on page 360 set service-profile psk-raw on page 361 set service-profile rsn-ie on page 362 set service-profile shared-key-auth on page 363 set service-profile ssid-name on page 363 set service-profile ssid-type on page 364 set service-profile tkip-mc-time on page 365 set service-profile web-aaa-form on page 366 set service-profile wep active-multicast- index on page 367 set service-profile wep active-unicast- index on page 368 set service-profile wep key-index on page 369 set service-profile wpa-ie on page 370 350 CHAPTER 9: MANAGED ACCESS POINT COMMANDS set radio-profile short-retry Changes the short retry threshold for the MAP radios in a radio profile. The short retry threshold specifies the number of times a radio can send a short unicast frame without receiving an acknowledgment. Syntax — set radio-profile name short-retry threshold name — Radio profile name. threshold — Number of times the radio can send the same short unicast frame. You can enter a value from 1 through 15. Defaults — The default short unicast retry threshold for MAP radios is 5 attempts. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must disable all radios that are using a radio profile before you can change parameters in the profile. Use the set radio-profile mode command. Examples — The following command changes the short retry threshold for radio profile rp1 to 3: WX4400# set radio-profile rp1 short-retry 3 success: change accepted. See Also set radio-profile wmm display radio-profile on page 298 set radio-profile mode on page 342 set radio-profile long-retry on page 339 Disables or reenables Wi-Fi Multimedia (WMM) on the MAP radios in a radio profile. Syntax — set radio-profile name wmm {enable | disable} name — Radio profile name. enable — Enables WMM. disable — Disables WMM. set service-profile auth-dot1x 351 Defaults — WMM is enabled by default. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — When WMM is disabled, MAP forwarding prioritization is optimized for SpectraLink Voice Priority (SVP) instead of WMM, and the MAP does not tag packets it sends to the WX. Otherwise, classification and tagging remain in effect. (For information, see the “Wi-Fi Multimedia” chapter of the Wireless LAN Switch and Controller Configuration Guide.) If you plan to use SVP or another non-WMM type of prioritization, you must configure ACLs to tag the packets. (See the “Enabling Prioritization for Legacy Voice over IP” section in the “Configuring and Managing Security ACLs” chapter of the Wireless LAN Switch and Controller Configuration Guide..) Examples — The following command disables WMM in radio profile radprofsvp: WX1200# set radio-profile radprofsvp wmm disable success: change accepted. See Also set service-profile auth-dot1x set radio-profile mode on page 342 display radio-profile on page 298 Disables or reenables 802.1X authentication of Wi-Fi Protected Access (WPA) clients by MAP radios, when the WPA information element (IE) is enabled in the service profile that is mapped to the radio profile that the radios are using. Syntax — set service-profile name auth-dot1x {enable | disable} name — Service profile name. enable — Enables 802.1X authentication of WPA clients. disable — Disables 802.1X authentication of WPA clients. 352 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Defaults — When the WPA IE is enabled, 802.1X authentication of WPA clients is enabled by default. If the WPA IE is disabled, the auth-dot1x setting has no effect. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command does not disable dynamic WEP for non-WPA clients. To disable dynamic WEP for non-WPA clients, enable the WPA IE (if not already enabled) and disable the 40-bit WEP and 104-bit WEP cipher suites in the WPA IE, if they are not already disabled. To use 802.1X authentication for WPA clients, you also must enable the WPA IE. If you disable 802.1X authentication of WPA clients, the only method available for authenticating the clients is preshared key (PSK) authentication. To use this, you must enable PSK support and configure a passphrase or key. Examples — The following command disables 802.1X authentication for WPA clients that use service profile wpa_clients: WX4400# set service-profile wpa_clients auth-dot1x disable success: change accepted. See Also set service-profile auth-fallthru display service-profile on page 302 set service-profile auth-psk on page 354 set service-profile psk-phrase on page 360 set service-profile wpa-ie on page 370 Specifies the authentication type for users who do not match an 802.1X or MAC authentication rule for an SSID managed by the service profile. When a user tries to associate with an SSID, MSS checks the authentication rules for that SSID for a userglob that matches the username. If the SSID does not have an authentication rule that matches the username, authentication for the user falls through to the fallthru method. set service-profile auth-fallthru 353 The fallthru method is a service profile parameter, and applies to all radios within the radio profiles that are mapped to the service profile. Syntax — set service-profile name auth-fallthru {last-resort | none | web-portal} last-resort — Automatically authenticates the user and allows access to the SSID requested by the user, without requiring a username and password. none — Denies authentication and prohibits the user from accessing the SSID. The authentication method none you can specify for administrative access is different from the fallthru authentication type none, which applies only to network access. The authentication method none allows access to the WX switch by an administrator. The fallthru authentication type none denies access to a network user. (See “set service-profile auth-fallthru” on page 352.) web-portal — Serves the user a web page from the WX switch’s nonvolatile storage for secure login to the network. Defaults — The default fallthru authentication type is web-portal. If a username does not match a userglob in an authentication rule for the SSID requested by the user, the WX switch that is managing the radio the user is connected to redirects the user to a web page located on the WX switch. The user must type a valid username and password on the web page to access the SSID. Access — Enabled. History —Introduced in MSS Version 3.0. Option web-portal renamed to web-portal in MSS Version 4.0. Usage — The last-resort fallthru authentication type allows any user to access any SSID managed by the service profile. This method does not require the user to provide a username or password. Use the last-resort method only if none of the SSIDs managed by the service profile require secure access. 354 CHAPTER 9: MANAGED ACCESS POINT COMMANDS The web-portal authentication type requires additional configuration items. (See the “Configuring AAA for Network Users” chapter of the Wireless LAN Switch and Controller Configuration Guide.) Examples — The following command sets the fallthru authentication for SSIDS managed by the service profile rnd_lab to none: WX4400# set service-profile rnd_lab auth-fallthru none success: change accepted. See Also set service-profile auth-psk display service-profile on page 302 set web-aaa on page 260 set service-profile web-aaa-form on page 366 Enables preshared key (PSK) authentication of Wi-Fi Protected Access (WPA) clients by MAP radios in a radio profile, when the WPA information element (IE) is enabled in the service profile. Syntax — set service-profile name auth-psk {enable | disable} name — Service profile name. enable — Enables PSK authentication of WPA clients. disable — Disables PSK authentication of WPA clients. Defaults — When the WPA IE is enabled, PSK authentication of WPA clients is enabled by default. If the WPA IE is disabled, the auth-psk setting has no effect. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command affects authentication of WPA clients only. To use PSK authentication, you also must configure a passphrase or key. In addition, you must enable the WPA IE. set service-profile beacon 355 The WebAAA fallthru authentication type is not supported in conjunction with WPA encryption using preshared keys (PSK) for the same SSID. These options are configurable together but are not compatible. WebAAA traffic is not encrypted, whereas the PSK four-way handshake requires a client to already be authenticated and for encryption to be in place. Examples — The following command enables PSK authentication for service profile wpa_clients: WX4400# set service-profile wpa_clients auth-psk enable success: change accepted. See Also set service-profile beacon display service-profile on page 302 set service-profile auth-dot1x on page 351 set service-profile psk-raw on page 361 set service-profile wpa-ie on page 370 Disables or reenables beaconing of the SSID managed by the service profile. A MAP radio responds to an 802.11 probe any request with only the beaconed SSID(s). For a nonbeaconed SSID, radios respond only to directed 802.11 probe requests that match the nonbeaconed SSID’s SSID string. When you disable beaconing for an SSID, the radio still sends beacon frames, but the SSID name in the frames is blank. Syntax — set service-profile name beaconed {enable | disable} name — Service profile name. enable — Enables beaconing of the SSID managed by the service profile. disable — Disables beaconing of the SSID managed by the service profile. Defaults — Beaconing is enabled by default. Access — Enabled. 356 CHAPTER 9: MANAGED ACCESS POINT COMMANDS History —Introduced in MSS Version 3.0. Examples — The following command disables beaconing of the SSID managed by service profile sp2: WX4400# set service-profile sp2 beacon disable success: change accepted. See Also set service-profile cipher-ccmp display service-profile on page 302 set radio-profile beacon-interval on page 336 set service-profile ssid-name on page 363 set service-profile ssid-type on page 364 Enables Counter with Cipher Block Chaining Message Authentication Code Protocol (CCMP) encryption with WPA clients, for a service profile. Syntax — set service-profile name cipher-ccmp {enable | disable} name — Service profile name. enable — Enables CCMP encryption for WPA clients. disable — Disables CCMP encryption for WPA clients. Defaults — CCMP encryption is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To use CCMP, you must also enable the WPA IE. Examples — The following command configures service profile sp2 to use CCMP encryption: WX4400# set service-profile sp2 cipher-ccmp enable success: change accepted. See Also set service-profile cipher-tkip on page 357 set service-profile cipher-wep104 on page 358 set service-profile cipher-tkip set service-profile cipher-tkip set service-profile cipher-wep40 on page 359 set service-profile wpa-ie on page 370 357 Disables or reenables Temporal Key Integrity Protocol (TKIP) encryption in a service profile. Syntax — set service-profile name cipher-tkip {enable | disable} name — Service profile name. enable — Enables TKIP encryption for WPA clients. disable — Disables TKIP encryption for WPA clients. Defaults — When the WPA IE is enabled, TKIP encryption is enabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To use TKIP, you must also enable the WPA IE. Examples — The following command disables TKIP encryption in service profile sp2: WX4400# set service-profile sp2 cipher-tkip disable success: change accepted. See Also set service-profile cipher-ccmp on page 356 set service-profile cipher-wep104 on page 358 set service-profile cipher-wep40 on page 359 set service-profile tkip-mc-time on page 365 set service-profile wpa-ie on page 370 358 CHAPTER 9: MANAGED ACCESS POINT COMMANDS set service-profile cipher-wep104 Enables dynamic Wired Equivalent Privacy (WEP) with 104-bit keys, in a service profile. Syntax — set service-profile name cipher-wep104 {enable | disable} name — Service profile name. enable — Enables 104-bit WEP encryption for WPA clients. disable — Disables 104-bit WEP encryption for WPA clients. Defaults — 104-bit WEP encryption is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To use 104-bit WEP with WPA clients, you must also enable the WPA IE. When 104-bit WEP in WPA is enabled in the service profile, radios managed by a radio profile that is mapped to the service profile can also support non-WPA clients that use dynamic WEP. To support WPA clients that use 40-bit dynamic WEP, you must enable WEP with 40-bit keys. Use the set service-profile cipher-wep40 command. Microsoft Windows XP does not support WEP with WPA. To configure a service profile to provide dynamic WEP for XP clients, leave WPA disabled and use the set service-profile wep commands. To support non-WPA clients that use static WEP, you must configure static WEP keys. Use the set service-profile wep key-index command. Examples — The following command configures service profile sp2 to use 104-bit WEP encryption: WX4400# set service-profile sp2 cipher-wep104 enable success: change accepted. set service-profile cipher-wep40 359 See Also set service-profile cipher-wep40 set service-profile cipher-ccmp on page 356 set service-profile cipher-tkip on page 357 set service-profile cipher-wep40 on page 359 set service-profile wep key-index on page 369 set service-profile wpa-ie on page 370 Enables dynamic Wired Equivalent Privacy (WEP) with 40-bit keys, in a service profile. Syntax — set service-profile name cipher-wep40 {enable | disable} name — Service profile name. enable — Enables 40-bit WEP encryption for WPA clients. disable — Disables 40-bit WEP encryption for WPA clients. Defaults — 40-bit WEP encryption is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To use 40-bit WEP with WPA clients, you must also enable the WPA IE. When 40-bit WEP in WPA is enabled in the service profile, radios managed by a radio profile that is mapped to the service profile can also support non-WPA clients that use dynamic WEP. To support WPA clients that use 104-bit dynamic WEP, you must enable WEP with 104-bit keys in the service profile. Use the set service-profile cipher-wep104 command. Microsoft Windows XP does not support WEP with WPA. To configure a service profile to provide dynamic WEP for XP clients, leave WPA disabled and use the set service-profile wep commands. To support non-WPA clients that use static WEP, you must configure static WEP keys. Use the set service-profile wep key-index command. 360 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Examples — The following command configures service profile sp2 to use 40-bit WEP encryption: WX4400# set service-profile sp2 cipher-wep40 enable success: change accepted. See Also set service-profile psk-phrase set service-profile cipher-ccmp on page 356 set service-profile cipher-tkip on page 357 set service-profile cipher-wep104 on page 358 set service-profile wep key-index on page 369 set service-profile wpa-ie on page 370 Configures a passphrase for preshared key (PSK) authentication to use for authenticating WPA clients, in a service profile. Radios use the PSK as a pairwise master key (PMK) to derive unique pairwise session keys for individual WPA clients. Syntax — set service-profile name psk-phrase passphrase name — Service profile name. passphrase — An ASCII string up to 63 characters long. The string can contain blanks if you use quotation marks at the beginning and end of the string. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — MSS converts the passphrase into a 256-bit binary number for system use and a raw hexadecimal key to store in the WX switch's configuration. Neither the binary number nor the passphrase itself is ever displayed in the configuration. To use PSK authentication, you must enable it and you also must enable the WPA IE. set service-profile psk-raw 361 Examples — The following command configures service profile sp3 to use passphrase “1234567890123<>?=+&% The quick brown fox jumps over the lazy sl”: WX4400# set service-profile sp3 psk-phrase "1234567890123<> ?=+&% The quick brown fox jumps over the lazy sl" success: change accepted. See Also set service-profile psk-raw set mac-user attr on page 246 set service-profile auth-psk on page 354 set service-profile psk-raw on page 361 set service-profile wpa-ie on page 370 Configures a raw hexadecimal preshared key (PSK) to use for authenticating WPA clients, in a service profile. Radios use the PSK as a pairwise master key (PMK) to derive unique pairwise session keys for individual WPA clients. Syntax — set service-profile name psk-raw hex name — Service profile name. hex — A 64-bit ASCII string representing a 32-digit hexadecimal number. Enter the two-character ASCII form of each hexadecimal number. Defaults — None. Examples — Enabled. History —Introduced in MSS Version 3.0. Usage — MSS converts the hexadecimal number into a 256-bit binary number for system use. MSS also stores the hexadecimal key in the WX switch's configuration. The binary number is never displayed in the configuration. To use PSK authentication, you must enable it and you also must enable the WPA IE. 362 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Examples — The following command configures service profile sp3 to use a raw PSK with PSK clients: WX4400# set service-profile sp3 psk-raw c25d3fe4483e867 d1df96eaacdf8b02451fa0836162e758100f5f6b87965e59d success: change accepted. See Also set service-profile rsn-ie set mac-user attr on page 246 set service-profile auth-psk on page 354 set service-profile psk-phrase on page 360 set service-profile wpa-ie on page 370 Enables the Robust Security Network (RSN) Information Element (IE). The RSN IE advertises the RSN authentication methods and cipher suites supported by radios in the radio profile mapped to the service profile. Syntax — set service-profile name rsn-ie {enable | disable} name — Service profile name. enable — Enables the RSN IE. disable — Disables the RSN IE. Defaults — The RSN IE is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command enables the RSN IE in service profile sprsn: WX4400# set service-profile sprsn rsn-ie enable success: change accepted. See Also set service-profile cipher-ccmp on page 356 set service-profile shared-key-auth set service-profile shared-key-auth 363 Enables shared-key authentication, in a service profile. Use this command only if advised to do so by 3Com. This command does not enable preshared key (PSK) authentication for Wi-Fi Protected Access (WPA). To enable PSK encryption for WPA, use the set service-profile auth-psk command. Syntax — set service-profile name shared-key-auth {enable | disable} name — Service profile name. enable — Enables shared-key authentication. disable — Disables shared-key authentication. Defaults — Shared-key authentication is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command enables shared-key authentication in service profile sp4: WX4400# set service-profile sp4 shared-key-auth enable success: change accepted. See Also set service-profile ssid-name display radio-profile on page 298 set radio-profile mode on page 342 Configures the SSID name in a service profile. Syntax — set service-profile name ssid-name ssid-name name — Service profile name. ssid-name — Name of up to 32 alphanumeric characters. You can include blank spaces in the name, if you delimit the name with single or double quotation marks. You must use the same type of quotation mark (either single or double) on both ends of the string Defaults — The default SSID name is private. 364 CHAPTER 9: MANAGED ACCESS POINT COMMANDS Access — Enabled. History —Introduced in MSS Version 3.0. Support added for blank spaces in the SSID name in Version 4.0. Examples — The following command applies the name guest to the SSID managed by service profile clear_wlan: WX4400# set service-profile clear_wlan ssid-name guest success: change accepted. The following command applies the name corporate users to the SSID managed by service profile mycorp_srvcprf: WX4400# set service-profile mycorp_srvcprf ssid-name “corporate users” success: change accepted. See Also set service-profile ssid-type set service-profile ssid-type on page 364 Specifies whether the SSID managed by a service profile is encrypted or unencrypted. Syntax — set service-profile name ssid-type [clear | crypto] name — Service profile name. clear — Wireless traffic for the service profile’s SSID is not encrypted. crypto — Wireless traffic for the service profile’s SSID is encrypted. Defaults — The default SSID type is crypto. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command changes the SSID type for service profile clear_wlan to clear: WX4400# set service-profile clear_wlan ssid-type clear success: change accepted. set service-profile tkip-mc-time 365 See Also set service-profile tkip-mc-time set service-profile ssid-name on page 363 Changes the length of time that MAP radios use countermeasures if two message integrity code (MIC) failures occur within 60 seconds. When countermeasures are in effect, MAP radios dissociate all TKIP and WPA WEP clients and refuse all association and reassociation requests until the countermeasures end. Syntax — set service-profile name tkip-mc-time wait-time name — Service profile name. wait-time — Number of milliseconds (ms) countermeasures remain in effect. You can specify from 0 to 60,000. Defaults — The default countermeasures wait time is 60,000 ms (60 seconds). Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Countermeasures apply only to TKIP and WEP clients. This includes WPA WEP clients and non-WPA WEP clients. CCMP clients are not affected. The TKIP cipher suite must be enabled. The WPA IE also must be enabled. Examples — The following command changes the countermeasures wait time for service profile sp3 to 30,000 ms (30 seconds): WX4400# set service-profile sp3 tkip-mc-time 30000 success: change accepted. See Also set service-profile cipher-tkip on page 357 set service-profile wpa-ie on page 370 366 CHAPTER 9: MANAGED ACCESS POINT COMMANDS set service-profile web-aaa-form Specifies a custom login page to serve to WebAAA users who request the SSID managed by the service profile. Syntax — set service-profile name web-aaa-form url name — Service profile name. url — WX subdirectory name and HTML page name of the login page. Specify the full path. For example, corpa-ssid/corpa.html. Defaults — The 3Com Web login page is served by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — 3Com recommends that you create a subdirectory for the custom page and place all the page’s files in that subdirectory. Do not place the custom page in the root directory of the switch’s user file area. If the custom login page includes gif or jpg images, their path names are interpreted relative to the directory from which the page is served. To use WebAAA, the fallthru authentication type in the service profile that manages the SSID must be set to web. To use WebAAA for a wired authentication port, edit the port configuration with the set port type wired-auth command. Examples — The following commands create a subdirectory named corpa-ssid, copy a custom login page named corpa-login.html and a jpg image named corpa-logo.jpg into that subdirectory, and set the Web login page for service profile to corpa-login.html: WX4400# mkdir corpa-ssid success: change accepted. WX4400# copy tftp://10.1.1.1/corpa-login.html corpa-ssid/corpa-login.html success: received 637 bytes in 0.253 seconds [ 2517 bytes/sec] WX4400# copy tftp://10.1.1.1/corpa-logo.jpg corpa-ssid/corpa-logo.jpg success: received 1202 bytes in 0.402 seconds [ 2112 bytes/sec] WX4400# dir corpa-ssid =============================================================================== file: Filename Size Created file:corpa-login.html 637 bytes Aug 12 2004, 15:42:26 file:corpa-logo.jpg 1202 bytes Aug 12 2004, 15:57:11 set service-profile wep active-multicast- index 367 Total: 1839 bytes used, 206577 Kbytes free WX4400# set service-profile corpa-service web-aaa-form corpa-ssid/ corpa-login.html success: change accepted. See Also set service-profile wep active-multicastindex copy on page 542 dir on page 598 display service-profile on page 302 mkdir on page 553 set port type wired-auth on page 91 set service-profile auth-fallthru on page 352 set web-aaa on page 260 Specifies the static Wired-Equivalent Privacy (WEP) key (one of four) to use for encrypting multicast frames. Syntax — set service-profile name wep active-multicast-index num name — Service profile name. num — WEP key number. You can enter a value from 1 through 4. Defaults — If WEP encryption is enabled and WEP keys are defined, MAP radios use WEP key 1 to encrypt multicast frames, by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Before using this command, you must configure values for the WEP keys you plan to use. Use the set service-profile wep key-index command. Examples — The following command configures service profile sp2 to use WEP key 2 for encrypting multicast traffic: WX4400# set service-profile sp2 wep active-multicast-index 2 success: change accepted. 368 CHAPTER 9: MANAGED ACCESS POINT COMMANDS See Also set service-profile wep active-unicastindex set service-profile wep active-unicast- index on page 368 set service-profile wep key-index on page 369 Specifies the static Wired-Equivalent Privacy (WEP) key (one of four) to use for encrypting unicast frames. Syntax — set service-profile name wep active-unicast-index num name — Service profile name. num — WEP key number. You can enter a value from 1 through 4. Defaults — If WEP encryption is enabled and WEP keys are defined, MAP radios use WEP key 1 to encrypt unicast frames, by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Before using this command, you must configure values for the WEP keys you plan to use. Use the set service-profile wep key-index command. Examples — The following command configures service profile sp2 to use WEP key 4 for encrypting unicast traffic: WX4400# set service-profile sp2 wep active-unicast-index 4 success: change accepted. See Also set service-profile wep active-multicast- index on page 367 set service-profile wep key-index on page 369 set service-profile wep key-index set service-profile wep key-index 369 Sets the value of one of four static Wired-Equivalent Privacy (WEP) keys for static WEP encryption. Syntax — set service-profile name wep key-index num key value name — Service profile name. key-index num — WEP key index. You can enter a value from 1 through 4. key value — Hexadecimal value of the key. You can enter a 10-character ASCII string representing a 5-digit hexadecimal number or a 26-character ASCII string representing a 13-digit hexadecimal number. You can use numbers or letters. ASCII characters in the following ranges are supported: 0 to 9 A to F a to f Defaults — By default, no static WEP keys are defined. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — MSS automatically enables static WEP when you define a WEP key. MSS continues to support dynamic WEP. If you plan to use static WEP, do not map more than 8 service profiles that contain static WEP keys to the same radio profile. Examples — The following command configures WEP key index 1 for service profile sp2 to aabbccddee: WX4400# set service-profile sp2 wep key-index 1 key aabbccddee success: change accepted. See Also set service-profile wep active-multicast- index on page 367 set service-profile wep active-unicast- index on page 368 370 CHAPTER 9: MANAGED ACCESS POINT COMMANDS set service-profile wpa-ie Enables the WPA information element (IE) in wireless frames. The WPA IE advertises the WPA authentication methods and cipher suites supported by radios in the radio profile mapped to the service profile. Syntax — set service-profile name wpa-ie {enable | disable} name — Service profile name. enable — Enables the WPA IE. disable — Disables the WPA IE. Defaults — The WPA IE is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — When the WPA IE is enabled, the default authentication method is 802.1X. There is no default cipher suite. You must enable the cipher suites you want the radios to support. Examples — The following command enables the WPA IE in service profile sp2: WX4400# set service-profile sp2 wpa-ie enable success: change accepted. See Also set service-profile auth-dot1x on page 351 set service-profile auth-psk on page 354 set service-profile cipher-ccmp on page 356 set service-profile cipher-tkip on page 357 set service-profile cipher-wep104 on page 358 set service-profile cipher-wep40 on page 359 10 STP COMMANDS Use Spanning Tree Protocol (STP) commands to configure and manage spanning trees on the virtual LANs (VLANs) configured on a wireless LAN switch or controller, to maintain a loop-free network. STP Commands by Usage This chapter presents STP commands alphabetically. Use the following table to locate commands in this chapter based on their use. Table 68 STP Commands by Usage Type Command STP State set spantree on page 388 display spantree on page 376 display spantree blockedports on page 379 Bridge Priority set spantree priority on page 397 Port Cost set spantree portcost on page 392 set spantree portvlancost on page 395 display spantree portvlancost on page 381 clear spantree portcost on page 372 clear spantree portvlancost on page 373 Port Priority set spantree portpri on page 394 set spantree portvlanpri on page 396 clear spantree portpri on page 373 clear spantree portvlanpri on page 374 Timers set spantree fwddelay on page 390 set spantree hello on page 390 set spantree maxage on page 391 Fast Convergence set spantree portfast on page 393 display spantree portfast on page 380 372 CHAPTER 10: STP COMMANDS Table 68 STP Commands by Usage (continued) Type Command Fast Convergence, cont. set spantree backbonefast on page 389 display spantree backbonefast on page 378 set spantree uplinkfast on page 397 display spantree uplinkfast on page 387 Statistics display spantree statistics on page 381 clear spantree statistics on page 375 clear spantree portcost Resets to the default value the cost of a network port or ports on paths to the STP root bridge in all VLANs on a WX switch. Syntax — clear spantree portcost port-list port-list — List of ports. The port cost is reset on the specified ports. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command resets the cost in all VLANs. To reset the cost for only specific VLANs, use the clear spantree portvlancost command. Examples — The following command resets the STP port cost on ports 5 and 6 to the default value: WX1200# clear spantree portcost 5-6 success: change accepted. See Also clear spantree portvlancost on page 373 display spantree on page 376 display spantree portvlancost on page 381 set spantree portcost on page 392 set spantree portvlancost on page 395 clear spantree portpri clear spantree portpri 373 Resets to the default value the priority of a network port or ports for selection as part of the path to the STP root bridge in all VLANs on a wireless LAN switch or controller. Syntax — clear spantree portpri port-list port-list — List of ports. The port priority is reset to 32 (the default) on the specified ports. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command resets the priority in all VLANs. To reset the priority for only specific VLANs, use the clear spantree portvlanpri command. Examples — The following command resets the STP priority on port 6 to the default: WX1200# clear spantree portpri 6 success: change accepted. See Also clear spantree portvlancost clear spantree portvlanpri on page 374 display spantree on page 376 set spantree portpri on page 394 set spantree portvlanpri on page 396 Resets to the default value the cost of a network port or ports on paths to the STP root bridge for a specific VLAN on a wireless LAN switch, or for all VLANs. Syntax — clear spantree portvlancost port-list {all | vlan vlan-id} port-list — List of ports. The port cost is reset on the specified ports. all — Resets the cost for all VLANs. 374 CHAPTER 10: STP COMMANDS vlan vlan-id — VLAN name or number. MSS resets the cost for only the specified VLAN. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — MSS does not change a port’s cost for VLANs other than the one(s) you specify. Examples — The following command resets the STP cost for port 2 in VLAN sunflower: WX4400# clear spantree portvlancost 2 vlan sunflower success: change accepted. See Also clear spantree portvlanpri clear spantree portcost on page 372 display spantree on page 376 display spantree portvlancost on page 381 set spantree portcost on page 392 set spantree portvlancost on page 395 Resets to the default value the priority of a network port or ports for selection as part of the path to the STP root bridge, on one VLAN or all VLANs. Syntax — clear spantree portvlanpri port-list {all | vlan vlan-id} port-list — List of ports. The port priority is reset to 32 (the default) on the specified ports. all — Resets the priority for all VLANs. vlan vlan-id — VLAN name or number. MSS resets the priority for only the specified VLAN. Defaults — None. Access — Enabled. clear spantree statistics 375 History —Introduced in MSS Version 3.0. Usage — MSS does not change a port’s priority for VLANs other than the one(s) you specify. Examples — The following command resets the STP priority for port 2 in VLAN avocado: WX4400# clear spantree portvlanpri 2 vlan avocado success: change accepted. See Also clear spantree statistics clear spantree portpri on page 373 display spantree on page 376 set spantree portpri on page 394 set spantree portvlanpri on page 396 Clears STP statistics counters for a network port or ports and resets them to 0. Syntax — clear spantree statistics port-list [vlan vlan-id] port-list — List of ports. Statistics counters are reset on the specified ports. vlan vlan-id — VLAN name or number. MSS resets statistics counters for only the specified VLAN. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command clears STP statistics counters for ports 1, 3, and 5 through 8, for all VLANs: WX1200# clear spantree statistics 1,3,5-8 success: change accepted. See Also display spantree statistics on page 381 376 CHAPTER 10: STP COMMANDS display spantree Displays STP configuration and port-state information. Syntax — display spantree [port-list | vlan vlan-id] [active] port-list — List of ports. If you do not specify any ports, MSS displays STP information for all ports. vlan vlan-id — VLAN name or number. If you do not specify a VLAN, MSS displays STP information for all VLANs. active — Displays information for only the active (forwarding) ports. Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Examples — The following command displays STP information for VLAN default: WX1200# display spantree vlan default VLAN 1 Spanning tree mode PVST+ Spanning tree type IEEE Spanning tree enabled Designated Root 00-02-4a-70-49-f7 Designated Root Priority 32768 Designated Root Path Cost 19 Designated Root Port 1 Root Max Age 20 sec Hello Time 2 sec Forward Delay 15 sec Bridge ID MAC ADDR 00-0b-0e-02-76-f7 Bridge ID Priority 32768 Bridge Max Age 20 sec Hello Time 2 sec Forward Delay 15 sec Port Vlan Port-State Cost Prio Portfast -----------------------------------------------------------------------------1 1 Forwarding 19 128 Disabled 2 1 Disabled 19 128 Disabled 3 1 Disabled 19 128 Disabled 4 1 Disabled 19 128 Disabled 5 1 Disabled 19 128 Disabled 6 1 Forwarding 19 128 Disabled display spantree 7 8 1 1 Disabled Disabled 19 19 128 128 377 Disabled Disabled Table 69 describes the fields in this display. Table 69 Output for display spantree Field Description VLAN VLAN number. Spanning tree mode In the current software version, the mode is always PVST+, which means Per VLAN Spanning Tree+. Spanning tree type In the current software version, the type is always IEEE, which means MSS STP is 802.1D-compatible. Spanning tree enabled State of STP on the VLAN. Designated Root MAC address of the spanning tree’s root bridge. Designated Root Priority Bridge priority of the root bridge. Designated Root Path Cumulative cost from this bridge to the root bridge. If this Cost WX switch is the root bridge, then the root cost is 0. Designated Root Port Port through which this WX switch reaches the root bridge. If this WX switch is the root bridge, this field says We are the root. Root Max Age Maximum acceptable age for hello packets on the root bridge. Root Hello Time Hello interval on the root bridge. Root Forward Delay Forwarding delay value on the root bridge. Bridge ID MAC ADDR This WX switch’s MAC address. Bridge ID Priority This WX switch’s bridge priority. Bridge Max Age This WX switch’s maximum acceptable age for hello packets. Bridge Hello Time This WX switch’s hello interval. Bridge Forward Delay This WX switch’s forwarding delay value. Port Port number. Only network ports are listed. STP does not apply to 3Com Wireless LAN Managed Access Point AP2750 ports or wired authentication ports. Vlan VLAN ID. 378 CHAPTER 10: STP COMMANDS Table 69 Output for display spantree (continued) Field Description Port-State STP state of the port: Blocking — The port is not forwarding Layer 2 traffic but is listening to and forwarding STP control traffic. Disabled — The port is not forwarding any traffic, including STP control traffic. The port might be administratively disabled or the link might be disconnected. Forwarding — The port is forwarding Layer 2 traffic. Learning — The port is learning the locations of other WX switches in the spanning tree before changing state to forwarding. Listening — The port is comparing its own STP information with information in STP control packets received by the port to compute the spanning tree and change state to blocking or forwarding. Cost STP cost of the port. Prio STP priority of the port. Portfast State of the uplink fast convergence feature: Enabled Disabled See Also display spantree backbonefast display spantree blockedports on page 379 Indicates whether the STP backbone fast convergence feature is enabled or disabled. Syntax — display spantree backbonefast Defaults — None. Access — All. History —Introduced in MSS Version 3.0. display spantree blockedports 379 Examples — The following example shows the command output on a WX switch with backbone fast convergence enabled: WX4400# display spantree backbonefast Backbonefast is enabled See Also display spantree blockedports set spantree backbonefast on page 389 Lists information about wireless LAN switch ports that STP has blocked on one or all of its VLANs. Syntax — display spantree blockedports [vlan vlan-id] vlan vlan-id — VLAN name or number. If you do not specify a VLAN, MSS displays information for blocked ports on all VLANs. Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Usage — The command lists information separately for each VLAN. Examples — The following command shows information about blocked ports on a WX switch for the default VLAN (VLAN 1): WX4400# display spantree blockedports vlan default Port Vlan Port-State Cost Prio Portfast -----------------------------------------------------------------------2 190 Blocking 4 128 Disabled Number of blocked ports (segments) in VLAN 1 : 1 The port information is the same as the information displayed by the display spantree command. See Table 69 on page 377. See Also display spantree on page 376 380 CHAPTER 10: STP COMMANDS display spantree portfast Displays STP uplink fast convergence information for all network ports or for one or more network ports. Syntax — display spantree portfast [port-list] port-list — List of ports. If you do not specify any ports, MSS displays uplink fast convergence information for all ports. Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Examples — The following command shows uplink fast convergence information for all ports: WX1200# display spantree portfast Port Vlan Portfast ------------------------- ------------1 1 disable 2 1 disable 3 1 disable 4 1 enable 5 1 disable 6 1 disable 7 1 disable 8 1 disable Table 70 describes the fields in this display. Table 70 Output for display spantree portfast Field Description Port Port number. VLAN VLAN number. Portfast State of the uplink fast convergence feature: Enable Disable See Also set spantree portfast on page 393 display spantree portvlancost display spantree portvlancost 381 Shows the cost of a port on a path to the STP root bridge, for each of the port’s VLANs. Syntax — display spantree portvlancost port-list port-list — List of ports. Defaults — None. Access — All. History —Introduced in MSS Version 3.0. Examples — The following command shows the STP port cost of port 1: WX4400# display spantree portvlancost 1 port 1 VLAN 1 have path cost 19 See Also display spantree statistics clear spantree portcost on page 372 clear spantree portvlancost on page 373 display spantree on page 376 set spantree portcost on page 392 set spantree portvlancost on page 395 Displays STP statistics for one or more WX network ports. Syntax — display spantree statistics [port-list [vlan vlan-id]] port-list — List of ports. If you do not specify any ports, MSS displays STP statistics for all ports. vlan vlan-id — VLAN name or number. If you do not specify a VLAN, MSS displays STP statistics for all VLANs. Defaults — None. Access — All. History —Introduced in MSS Version 3.0. 382 CHAPTER 10: STP COMMANDS Usage — The command displays statistics separately for each port. Examples — The following command shows STP statistics for port 1: WX4400# display spantree statistics 1 BPDU related parameters Port 1 VLAN 1 spanning tree enabled for VLAN = 1 port spanning tree state port_id port_number path cost message age (port/VLAN) designated_root designated cost designated_bridge designated_port top_change_ack config_pending port_inconsistency enabled Forwarding 0x8015 0x5 0x4 0(20) 00-0b-0e-00-04-30 0x0 00-0b-0e-00-04-30 38 FALSE FALSE none Port based information statistics config BPDU's xmitted(port/VLAN) config BPDU's received(port/VLAN) tcn BPDU's xmitted(port/VLAN) tcn BPDU's received(port/VLAN) forward transition count (port/VLAN) scp failure count root inc trans count (port/VLAN) inhibit loopguard loop inc trans count 0 (1) 21825 (43649) 0 (0) 2 (2) 1 (1) 0 1 (1) FALSE 0 (0) Status of Port Timers forward delay timer forward delay timer value message age timer message age timer value topology change timer INACTIVE 15 ACTIVE 0 INACTIVE display spantree statistics topology change timer value hold timer hold timer value delay root port timer delay root port timer value delay root port timer restarted is 0 INACTIVE 0 INACTIVE 0 FALSE VLAN based information & statistics spanning tree type spanning tree multicast address bridge priority bridge MAC address bridge hello time bridge forward delay topology change initiator: last topology change occured: topology change topology change time topology change detected topology change count topology change last recvd. from ieee 01-00-0c-cc-cc-cd 32768 00-0b-0e-12-34-56 2 15 0 Tue Jul 01 2003 22:33:36. FALSE 35 FALSE 1 00-0b-0e-02-76-f6 Other port specific info dynamic max age transition port BPDU ok count msg age expiry count link loading BPDU in processing num of similar BPDU's to process received_inferior_bpdu next state src MAC count total src MAC count curr_src_mac next_src_mac 0 21825 0 0 FALSE 0 FALSE 0 21807 21825 00-0b-0e-00-04-30 00-0b-0e-02-76-f6 Table 71 describes the fields in this display. 383 384 CHAPTER 10: STP COMMANDS Table 71 Output for display spantree statistics Field Description Port Port number. VLAN VLAN ID. Spanning Tree enabled State of the STP feature on the VLAN. for vlan port spanning tree State of the STP feature on the port. state STP state of the port: Blocking — The port is not forwarding Layer 2 traffic but is listening to and forwarding STP control traffic. Disabled — The port is not forwarding any traffic, including STP control traffic. The port might be administratively disabled or the link might be disconnected. Forwarding — The port is forwarding Layer 2 traffic. Learning — The port is learning the locations of other WX switches in the spanning tree before changing state to forwarding. Listening — The port is comparing its own STP information with information in STP control packets received by the port to compute the spanning tree and change state to blocking or forwarding. port_id STP port ID. port_number STP port number. path cost Cost to use this port to reach the root bridge. This is part of the total path cost (designated cost). message age Age of the protocol information for a port and the value of the maximum age parameter (shown in parenthesis) recorded by the switch. designated_root MAC address of the root bridge. designated cost Total path cost to reach the root bridge. designated_bridge Bridge to which this switch forwards traffic away from the root bridge. designated_port STP port through which this switch forwards traffic away from the root bridge. top_change_ack Value of the topology change acknowledgment flag in the next configured bridge protocol data unit (BPDU) to be transmitted on the associated port. The flag is set in reply to a topology change notification BPDU. display spantree statistics 385 Table 71 Output for display spantree statistics (continued) Field Description config_pending Indicates whether a configured BPDU is to be transmitted on expiration of the hold timer for the port. port_inconsistency Indicates whether the port is in an inconsistent state. config BPDU’s xmitted Number of BPDUs transmitted from the port. A number in parentheses indicates the number of configured BPDUs transmitted by the WX switch for this VLAN’s spanning tree. config BPDU’s received Number of BPDUs received by this port. A number in parentheses indicates the number of configured BPDUs received by the WX switch for this VLAN’s spanning tree. tcn BPDU’s xmitted Number of topology change notification (TCN) BDPUs transmitted on this port. tcn BPDU’s received Number of TCN BPDUs received on this port. forward transition count Number of times the port state transitioned to the forwarding state. scp failure count Number of service control point (SCP) failures. root inc trans count Number of times the root bridge changed. inhibit loopguard State of the loop guard. In the current release, the state is always FALSE. loop inc trans count Number of loops that have occurred. forward delay timer Status of the forwarding delay timer. This timer monitors the time spent by a port in the listening and learning states. forward delay timer value Current value of the forwarding delay timer, in seconds. message age timer Status of the message age timer. This timer measures the age of the received protocol information recorded for a port. message age timer value Current value of the message age timer, in seconds. topology change timer Status of the topology change timer. This timer determines the time period during which configured BPDUs are transmitted with the topology change flag set by this WX switch when it is the root bridge, after detection of a topology change. topology change timer Current value of the topology change timer, in seconds. value 386 CHAPTER 10: STP COMMANDS Table 71 Output for display spantree statistics (continued) Field Description hold timer Status of the hold timer. This timer ensures that configured BPDUs are not transmitted too frequently through any bridge port. hold timer value Current value of the hold timer, in seconds. delay root port timer Status of the delay root port timer, which enables fast convergence when uplink fast convergence is enabled. delay root port timer value Current value of the delay root port timer. delay root port timer restarted is Whether the delay root port timer has been restarted. spanning tree type Type of spanning tree. The type is always IEEE. spanning tree multicast Destination address used to send out configured BPDUs on address a bridge port. bridge priority STP priority of this WX switch. bridge MAC address MAC address of this WX switch. bridge hello time Value of the hello timer interval, in seconds, when this WX switch is the root or is attempting to become the root. bridge forward delay Value of the forwarding delay interval, in seconds, when this WX switch is the root or is attempting to become the root. topology change initiator Port number that initiated the most recent topology change. last topology change occurred System time when the most recent topology change occurred. topology change Value of the topology change flag in configuration BPDUs to be transmitted by this WX switch on VLANs for which the switch is the designated bridge. topology change time Time period, in seconds, during which BPDUs are transmitted with the topology change flag set by this WX switch when it is the root bridge, after detection of a topology change. It is equal to the sum of the switch’s maximum age and forwarding delay parameters. topology change detected Indicates whether a topology change has been detected by the switch. topology change count Number of times the topology change has occurred. topology change last recvd. from MAC address of the bridge from which the WX switch last received a topology change. display spantree uplinkfast 387 Table 71 Output for display spantree statistics (continued) Field Description dynamic max age transition Number of times the maximum age parameter was changed dynamically. port BPDU ok count Number of valid port BPDUs received. msg age expiry count Number of expired messages. link loading Indicates whether the link is oversubscribed. BPDU in processing Indicates whether BPDUs are currently being processed. num of similar BPDU’s to process Number of similar BPDUs received on a port that need to be processed. received_inferior_bpdu Indicates whether the port has received an inferior BPDU or a response to a Root Link Query (RLQ) BPDU. next state Port state before it is set by STP. src MAC count Number of BPDUs with the same source MAC address. total src MAC count Number of BPDUs with all the source MAC addresses. curr_src_mac Source MAC address of the current received BPDU. next_src_mac Other source MAC address from a different source. See Also display spantree uplinkfast clear spantree statistics on page 375 Shows uplink fast convergence information for one VLAN or all VLANs. Syntax — display spantree uplinkfast [vlan vlan-id] vlan vlan-id — VLAN name or number. If you do not specify a VLAN, MSS displays STP statistics for all VLANs. Defaults — None. Access — All. History —Introduced in MSS Version 3.0. 388 CHAPTER 10: STP COMMANDS Examples — The following command shows uplink fast convergence information for all VLANs: WX4400# display spantree uplinkfast VLAN port list -----------------------------------------------------------------------1 1(fwd),2,3 Table 72 describes the fields in this display. Table 72 Output for display spantree uplinkfast Field Description VLAN VLAN number. port list Ports in the uplink group. The port that is forwarding traffic is indicated by fwd. The other ports are blocking traffic. See Also set spantree set spantree uplinkfast on page 397 Enables or disables STP on one VLAN or all VLANs configured on a WX switch. Syntax — set spantree {enable | disable } [{all | vlan vlan-id | port port-list vlan-id}] enable — Enables STP. disable — Disables STP. all — Enables or disables STP on all VLANs. vlan vlan-id — VLAN name or number. MSS enables or disables STP on only the specified VLAN, on all ports within the VLAN. port port-list vlan-id — Port number or list and the VLAN the ports are in. MSS enables or disables STP on only the specified ports, within the specified VLAN. Defaults — Disabled. Access — Enabled. History —Introduced in MSS Version 3.0. set spantree backbonefast 389 Examples — The following command enables STP on all VLANs configured on a WX switch: WX4400# set spantree enable success: change accepted. The following command disables STP on VLAN burgundy: WX4400# set spantree disable vlan burgundy success: change accepted. See Also set spantree backbonefast display spantree on page 376 Enables or disables STP backbone fast convergence on a wireless LAN switch. This feature accelerates a port’s recovery following the failure of an indirect link. CAUTION: The backbone fast convergence feature is not compatible with switches that are running standard IEEE 802.1D Spanning Tree implementations. This includes switches running Rapid Spanning Tree or Multiple Spanning Tree. Syntax — set spantree backbonefast {enable | disable} enable — Enables backbone fast convergence. disable — Disables backbone fast convergence. Defaults — STP backbone fast path convergence is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — If you plan to use the backbone fast convergence feature, you must enable it on all the bridges in the spanning tree. Examples — The following command enables backbone fast convergence: WX4400# set spantree backbonefast enable success: change accepted. 390 CHAPTER 10: STP COMMANDS See Also set spantree fwddelay display spantree backbonefast on page 378 Changes the period of time after a topology change that a WX switch which is not the root bridge waits to begin forwarding Layer 2 traffic on one or all of its configured VLANs. (The root bridge always forwards traffic.) Syntax — set spantree fwddelay delay {all | vlan vlan-id} delay — Delay value. You can specify from 4 through 30 seconds. all — Changes the forwarding delay on all VLANs. vlan vlan-id — VLAN name or number. MSS changes the forwarding delay on only the specified VLAN. Defaults — The default forwarding delay is 15 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command changes the forwarding delay on VLAN pink to 20 seconds: WX4400# set spantree fwddelay 20 vlan pink success: change accepted. See Also set spantree hello display spantree on page 376 Changes the interval between STP hello messages sent by a wireless LAN switch when operating as the root bridge, on one or all of its configured VLANs. Syntax — set spantree hello interval {all | vlan vlan-id} interval — Interval value. You can specify from 1 through 10 seconds. all — Changes the interval on all VLANs. set spantree maxage 391 vlan vlan-id — VLAN name or number. MSS changes the interval on only the specified VLAN. Defaults — The default hello timer interval is 2 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command changes the hello interval for all VLANs to 4 seconds: WX4400# set spantree hello 4 all success: change accepted. See Also set spantree maxage display spantree on page 376 Changes the maximum age for an STP root bridge hello packet that is acceptable to a wireless LAN switch acting as a designated bridge on one or all of its VLANs. After waiting this period of time for a new hello packet, the WX switch determines that the root bridge is unavailable and issues a topology change message. Syntax — set spantree maxage aging-time {all | vlan vlan-id} aging-time — Maximum age value. You can specify from 6 through 40 seconds. all — Changes the maximum age on all VLANs. vlan vlan-id — VLAN name or number. MSS changes the maximum age on only the specified VLAN. Defaults — The default maximum age for root bridge hello packets is 20 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. 392 CHAPTER 10: STP COMMANDS Examples — The following command changes the maximum acceptable age for root bridge hello packets on all VLANs to 15 seconds: WX4400# set spantree maxage 15 all success: change accepted. See Also set spantree portcost display spantree on page 376 Changes the cost that transmission through a network port or ports in the default VLAN on a wireless LAN switch adds to the total cost of a path to the STP root bridge. Syntax — set spantree portcost port-list cost cost port-list — List of ports. MSS applies the cost change to all the specified ports. cost cost — Numeric value. You can specify a value from 1 through 65,535. STP selects lower-cost paths over higher-cost paths. Defaults — The default port cost depends on the port speed and link type. Table 73 lists the defaults for STP port path cost. Table 73 STP Port Path Cost Defaults Port Speed Link Type Default Port Path Cost 1000 Mbps Full Duplex Aggregate Link (Port Group) 3 1000 Mbps Full Duplex 4 100 Mbps Full Duplex Aggregate Link (Port Group) 15 100 Mbps Full Duplex 18 100 Mbps Half Duplex 19 10 Mbps Full Duplex Aggregate Link (Port Group) 90 10 Mbps Full Duplex 95 10 Mbps Half Duplex 100 Access — Enabled. History —Introduced in MSS Version 3.0. set spantree portfast 393 Usage — This command applies only to the default VLAN (VLAN 1). To change the cost of a port in another VLAN, use the set spantree portvlancost command. Examples — The following command changes the cost on ports 3 and 4 to 20: WX1200# set spantree portcost 3,4 cost 20 success: change accepted. See Also set spantree portfast clear spantree portcost on page 372 clear spantree portvlancost on page 373 display spantree on page 376 display spantree portvlancost on page 381 set spantree portvlancost on page 395 Enables or disables STP port fast convergence on one or more ports on a wireless LAN switch. Syntax — set spantree portfast port port-list {enable | disable} port port-list — List of ports. MSS enables the feature on the specified ports. enable — Enables port fast convergence. disable — Disables port fast convergence. Defaults — STP port fast convergence is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Use port fast convergence on ports that are directly connected to servers, hosts, or other MAC stations. Examples — The following command enables port fast convergence on ports 2, 5, and 7: WX1200# set spantree portfast port 2,4,7 enable success: change accepted. 394 CHAPTER 10: STP COMMANDS See Also set spantree portpri display spantree portfast on page 380 Changes the STP priority of a network port or ports for selection as part of the path to the STP root bridge in the default VLAN on a wireless LAN switch. Syntax — set spantree portpri port-list priority value port-list — List of ports. MSS changes the priority on the specified ports. priority value — Priority value. You can specify a value from 0 (highest priority) through 255 (lowest priority). Defaults — The default STP priority for all network ports is 128. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command applies only to the default VLAN (VLAN 1). To change the priority of a port in another VLAN, use the set spantree portvlanpri command. Examples — The following command sets the priority of ports 3 and 4 to 48: WX1200# set spantree portpri 3-4 priority 48 success: change accepted. See Also clear spantree portpri on page 373 clear spantree portvlanpri on page 374 display spantree on page 376 set spantree portvlanpri on page 396 set spantree portvlancost set spantree portvlancost 395 Changes the cost of a network port or ports on paths to the STP root bridge for a specific VLAN on a wireless LAN switch. Syntax — set spantree portvlancost port-list cost cost {all | vlan vlan-id} port-list — List of ports. MSS applies the cost change to all the specified ports. cost cost — Numeric value. You can specify a value from 1 through 65,535. STP selects lower-cost paths over higher-cost paths. all — Changes the cost on all VLANs. vlan vlan-id — VLAN name or number. MSS changes the cost on only the specified VLAN. Defaults — The default port cost depends on the port speed and link type. (See Table 68 on page 371.) Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command changes the cost on ports 3 and 4 to 20 in VLAN mauve: WX1200# set spantree portvlancost 3,4 cost 20 vlan mauve success: change accepted. See Also clear spantree portcost on page 372 clear spantree portvlancost on page 373 display spantree on page 376 display spantree portvlancost on page 381 set spantree portcost on page 392 396 CHAPTER 10: STP COMMANDS set spantree portvlanpri Changes the priority of a network port or ports for selection as part of the path to the STP root bridge, on one VLAN or all VLANs. Syntax — set spantree portvlanpri port-list priority value {all | vlan vlan-id} port-list — List of ports. MSS changes the priority on the specified ports. priority value — Priority value. You can specify a value from 0 (highest priority) through 255 (lowest priority). all — Changes the priority on all VLANs. vlan vlan-id — VLAN name or number. MSS changes the priority on only the specified VLAN. Defaults — The default STP priority for all network ports is 128. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command sets the priority of ports 3 and 4 to 48 on VLAN mauve: WX1200# set spantree portvlanpri 3-4 priority 48 vlan mauve success: change accepted. See Also clear spantree portpri on page 373 clear spantree portvlanpri on page 374 display spantree on page 376 set spantree portpri on page 394 set spantree priority set spantree priority 397 Changes the STP root bridge priority of a wireless LAN switch on one or all of its VLANs. Syntax — set spantree priority value {all | vlan vlan-id} priority value — Priority value. You can specify a value from 0 through 65,535. The bridge with the lowest priority value is elected to be the root bridge for the spanning tree. all — Changes the bridge priority on all VLANs. vlan vlan-id — VLAN name or number. MSS changes the bridge priority on only the specified VLAN. Defaults — The default root bridge priority for the switch on all VLANs is 32,768 for the WX4400 and 49,152 for the WX1200 and WXR100. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command sets the bridge priority of VLAN pink to 69: WX4400# set spantree priority 69 vlan pink success: change accepted. See Also set spantree uplinkfast display spantree on page 376 Enables or disables STP uplink fast convergence on a wireless LAN switch. This feature enables a WX switch with redundant links to the network backbone to immediately switch to the backup link to the root bridge if the primary link fails. Syntax — set spantree uplinkfast {enable | disable} enable — Enables uplink fast convergence. disable — Disables uplink fast convergence. Defaults — Disabled. Access — Enabled. 398 CHAPTER 10: STP COMMANDS History —Introduced in MSS Version 3.0. Usage — The uplink fast convergence feature is applicable to bridges that are acting as access switches to the network core (distribution layer) but are not in the core themselves. Do not enable the feature on WX switches that are in the network core. Examples — The following command enables uplink fast convergence: WX4400# set spantree uplinkfast enable success: change accepted. See Also display spantree uplinkfast on page 387 11 IGMP SNOOPING COMMANDS Use Internet Group Management Protocol (IGMP) snooping commands to configure and manage multicast traffic reduction on a WX. Commands by usage This chapter presents IGMP snooping commands alphabetically. Use the Table 74 to locate commands in this chapter based on their use. Table 74 IGMP Commands by Usage Type Command IGMP Snooping State set igmp on page 411 display igmp on page 400 Proxy Reporting set igmp proxy-report on page 416 Pseudo-querier set igmp querier on page 419 display igmp querier on page 405 Timers set igmp qi on page 417 set igmp oqi on page 415 set igmp qri on page 418 set igmp lmqi on page 412 set igmp rv on page 420 Router Solicitation set igmp mrsol on page 414 set igmp mrsol mrsi on page 414 Multicast Routers set igmp mrouter on page 413 display igmp mrouter on page 404 Multicast Receivers set igmp receiver on page 419 display igmp receiver-table on page 407 Statistics display igmp statistics on page 409 clear igmp statistics on page 400 400 CHAPTER 11: IGMP SNOOPING COMMANDS clear igmp statistics Clears IGMP statistics counters on one VLAN or all VLANs on a wireless LAN switch and resets them to 0. Syntax — clear igmp statistics [vlan vlan-id] vlan vlan-id — VLAN name or number. If you do not specify a VLAN, IGMP statistics are cleared for all VLANs. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command clears IGMP statistics for all VLANs: WX1200# clear igmp statistics IGMP statistics cleared for all vlans See Also — display igmp statistics on page 409 display igmp Displays IGMP configuration information and statistics. Syntax — display igmp [vlan vlan-id] vlan vlan-id — VLAN name or number. If you do not specify a VLAN, MSS displays IGMP information for all VLANs. Defaults — None. Access — All. History — Introduced in MSS Version 3.0. Examples — The following command displays IGMP information for VLAN orange: WX1200# display igmp vlan orange VLAN: orange IGMP is enabled Proxy reporting is on Mrouter solicitation is on Querier functionality is off Configuration values: qi: 125 oqi: 300 qri: 100 lmqi: 10 rvalue: 2 Multicast display igmp router information: Port Mrouter-IPaddr Mrouter-MAC Type TTL ---- --------------- ----------------- ----- ----1 192.28.7.5 00:01:02:03:04:05 dvmrp 17 Group Port Receiver-IP Receiver-MAC TTL --------------- ---- --------------- ----------------- ----224.0.0.2 none none none undef 237.255.255.255 5 10.10.10.11 00:02:04:06:08:0b 258 237.255.255.255 5 10.10.10.13 00:02:04:06:08:0d 258 237.255.255.255 5 10.10.10.14 00:02:04:06:08:0e 258 237.255.255.255 5 10.10.10.12 00:02:04:06:08:0c 258 237.255.255.255 5 10.10.10.10 00:02:04:06:08:0a 258 Querier information: Querier for vlan orange Port Querier-IP Querier-MAC TTL ---- --------------- ----------------- ----1 193.122.135.178 00:0b:cc:d2:e9:b4 23 IGMP vlan member ports: 1, 2, 3 IGMP static ports: none IGMP statistics for vlan orange: IGMP message type Received Transmitted Dropped ----------------- -------- ----------- ------General-Queries 0 0 0 GS-Queries 0 0 0 Report V1 0 0 0 Report V2 5 1 4 Leave 0 0 0 Mrouter-Adv 0 0 0 Mrouter-Term 0 0 0 Mrouter-Sol 50 101 0 DVMRP 4 4 0 PIM V1 0 0 0 PIM V2 0 0 0 Topology notifications: 0 Packets with unknown IGMP type: 0 Packets with bad length: 0 Packets with bad checksum: 0 Packets dropped: 4 Table 75 describes the fields in this display. 401 402 CHAPTER 11: IGMP SNOOPING COMMANDS Table 75 Output for display igmp Field Description VLAN VLAN name. MSS displays information separately for each VLAN. IGMP is enabled (disabled) IGMP state. Proxy reporting Proxy reporting state. Mrouter solicitation Multicast router solicitation state. Querier functionality Pseudo-querier state. Configuration values (qi) Query interval. Configuration values (oqi) Other-querier-present interval. Configuration values (qri) Query response interval. Configuration values (lmqi) Last member query interval. Configuration values (rvalue) Robustness value. Multicast router information List of multicast routers and active multicast groups. The fields containing this information are described separately. The display igmp mrouter command shows the same information. Port Number of the physical port through which the WX can reach the router. Mrouter-IPaddr IP address of the multicast router interface. Mrouter-MAC MAC address of the multicast router interface. Type How the WX learned that the port is a multicast router port: conf — Static multicast port configured by an administrator madv — Multicast advertisement quer — IGMP query dvmrp — Distance Vector Multicast Routing Protocol (DVMRP) pimv1 — Protocol Independent Multicast (PIM) version 1 pimv2 — PIM version 2 display igmp 403 Table 75 Output for display igmp (continued) Field Description TTL Number of seconds before this entry ages out if not refreshed. For static multicast router entries, the time-to-live (TTL) value is undef. Static multicast router entries do not age out. Group IP address of a multicast group. The display igmp receiver-table command shows the same information as these receiver fields. Port Physical port through which the WX can reach the group’s receiver. Receiver-IP IP address of the client receiving the group. Receiver-MAC MAC address of the client receiving the group. TTL Number of seconds before this entry ages out if the WX does not receive a group membership message from the receiver. For static multicast receiver entries, the TTL value is undef. Static multicast receiver entries do not age out. Querier information Information about the subnet’s multicast querier. If the querier is another WX switch, the fields described below are applicable. If the querier is the WX itself, the output indicates how many seconds remain until the next general query message. If IGMP snooping does not detect a querier, the output indicates this. The display igmp querier command shows the same information. Querier for vlan VLAN containing the querier. Information is listed separately for each VLAN. Querier-IP IP address of the querier. Querier-MAC MAC address of the querier. TTL Number of seconds before this entry ages out if the WX does not receive a query message from the querier. IGMP vlan member ports Physical ports in the VLAN. This list includes all network ports configured to be in the VLAN and all ports MSS dynamically assigns to the VLAN when a user assigned to the VLAN becomes a receiver. For example, the list can include a MAP access port that is not configured to be in the VLAN when a user associated with the 3Com Wireless LAN Managed Access Point AP2750 on that port becomes a receiver for a group. When all receivers on a dynamically added port age out, MSS removes the port from the list. IGMP static ports Static receiver ports. IGMP statistics Multicast message and packet statistics. These are the same statistics displayed by the display igmp statistics command. 404 CHAPTER 11: IGMP SNOOPING COMMANDS Table 75 Output for display igmp (continued) Field Description VLAN VLAN name. MSS displays information separately for each VLAN. IGMP is enabled (disabled) IGMP state. See Also display igmp mrouter display igmp mrouter on page 404 display igmp querier on page 405 display igmp receiver-table on page 407 display igmp statistics on page 409 Displays the multicast routers in a WX’s subnet, on one VLAN or all VLANs. Routers are listed separately for each VLAN, according to the port number through which the wireless LAN switch can reach the router. Syntax — display igmp mrouter [vlan vlan-id] vlan vlan-id — VLAN name or number. If you do not specify a VLAN, MSS displays the multicast routers in all VLANs. Defaults — None. Access — All. History — Introduced in MSS Version 3.0. Examples — The following command displays the multicast routers in VLAN orange: WX1200# display igmp mrouter vlan orange Multicast routers for vlan orange Port Mrouter-IPaddr Mrouter-MAC Type TTL ---- --------------- ----------------- ----- ----1 192.28.7.5 00:01:02:03:04:05 dvmrp 33 Table 76 describes the fields in this display. display igmp querier 405 Table 76 Output for display igmp mrouter Field Description Multicast routers for vlan VLAN containing the multicast routers. Ports are listed separately for each VLAN. Port Number of the physical port through which the WX can reach the router. Mrouter-IPaddr IP address of the multicast router. Mrouter-MAC MAC address of the multicast router. Type How the WX learned that the port is a multicast router port: TTL conf — Static multicast port configured by an administrator madv — Multicast advertisement quer — IGMP query dvmrp — Distance Vector Multicast Routing Protocol (DVMRP) pimv1 — Protocol Independent Multicast (PIM) version 1 pimv2 — PIM version 2 Number of seconds before this entry ages out if unused. For static multicast router entries, the TTL value is undef. Static multicast router entries do not age out. See Also display igmp querier display igmp mrouter on page 404 set igmp mrouter on page 413 Shows information about the active multicast querier, on one VLAN or all VLANs. Queriers are listed separately for each VLAN. Each VLAN can have only one querier. Syntax — display igmp querier [vlan vlan-id] vlan vlan-id — VLAN name or number. If you do not specify a VLAN, MSS displays querier information for all VLANs. Defaults — None. Access — Enabled. 406 CHAPTER 11: IGMP SNOOPING COMMANDS History — Introduced in MSS Version 3.0. Examples — The following command displays querier information for VLAN orange: WX1200# display igmp querier vlan orange Querier for vlan orange Port Querier-IP Querier-MAC TTL ---- --------------- ----------------- ----1 193.122.135.178 00:0b:cc:d2:e9:b4 23 The following command shows the information MSS displays when the querier is the WX itself: WX1200# display igmp querier vlan default Querier for vlan default: I am the querier for vlan default, time to next query is 20 The output indicates how many seconds remain before the pseudo-querier on the WX switch broadcasts the next general query report to IP address 224.0.0.1, the multicast all-systems group. If IGMP snooping does not detect a querier, the output indicates this finding, as shown in the following example: WX1200# display igmp querier vlan red Querier for vlan red: There is no querier present on vlan red This condition does not necessarily indicate a problem. For example, election of the querier might be in progress. Table 67 describes the fields in this display. Table 76 on page 405 describes the fields in the display when a querier other than the WX is present. Table 77 Output for display igmp mrouter Field Description Querier for vlan VLAN containing the querier. Information is listed separately for each VLAN. Querier-IP IP address of the querier interface. Querier-MAC MAC address of the querier interface. TTL Number of seconds before this entry ages out if the WX does not receive a query message from the querier. display igmp receiver-table 407 See Also display igmp receiver-table set igmp querier on page 419 Displays the receivers to which a WX forwards multicast traffic. You can display receivers for all VLANs, a single VLAN, or a group or groups identified by group address and network mask. Syntax — display igmp receiver-table [vlan vlan-id] [group group-ip-addr/mask-length] vlan vlan-id — VLAN name or number. If you do not specify a VLAN, MSS displays the multicast receivers on all VLANs. group group-ip-addr/mask-length — IP address and subnet mask of a multicast group, in CIDR format (for example, 239.20.20.10/24). If you do not specify a group address, MSS displays the multicast receivers for all groups. Defaults — None. Access — All. History — Introduced in MSS Version 3.0. Examples — The following command displays all multicast receivers in VLAN orange: WX1200# display VLAN: orange Session --------------224.0.0.2 237.255.255.255 237.255.255.255 237.255.255.255 237.255.255.255 237.255.255.255 igmp receiver-table vlan orange Port Receiver-IP Receiver-MAC TTL ---- --------------- ----------------- ----none none none undef 5 10.10.10.11 00:02:04:06:08:0b 179 5 10.10.10.13 00:02:04:06:08:0d 179 5 10.10.10.14 00:02:04:06:08:0e 179 5 10.10.10.12 00:02:04:06:08:0c 179 5 10.10.10.10 00:02:04:06:08:0a 179 408 CHAPTER 11: IGMP SNOOPING COMMANDS The following command lists all receivers for multicast groups 237.255.255.1 through 237.255.255.255, in all VLANs: WX1200# display igmp receiver-table group 237.255.255.0/24 VLAN: red Session Port Receiver-IP Receiver-MAC TTL --------------- ---- --------------- ----------------- ----237.255.255.2 2 10.10.20.19 00:02:04:06:09:0d 112 237.255.255.119 3 10.10.30.31 00:02:04:06:01:0b 112 VLAN: green Session Port Receiver-IP Receiver-MAC TTL --------------- ---- --------------- ----------------- ----237.255.255.17 1 10.10.40.41 00:02:06:08:02:0c 12 237.255.255.255 6 10.10.60.61 00:05:09:0c:0a:01 111 Table 78 describes the fields in this display. Table 78 Output for display igmp receiver-table Field Description VLAN VLAN that contains the multicast receiver ports. Ports are listed separately for each VLAN. Session IP address of the multicast group being received. Port Physical port through which the WX can reach the receiver. Receiver-IP IP address of the receiver. Receiver-MAC MAC address of the receiver. TTL Number of seconds before this entry ages out if the WX does not receive a group membership message from the receiver. For static multicast receiver entries, the TTL value is undef. Static multicast receiver entries do not age out. See Also set igmp receiver on page 419 display igmp statistics display igmp statistics 409 Shows IGMP statistics. Syntax — display igmp statistics [vlan vlan-id] vlan vlan-id — VLAN name or number. If you do not specify a VLAN, MSS displays IGMP statistics for all VLANs. Defaults — None. Access — All. History — Introduced in MSS Version 3.0. Examples — The following command displays IGMP statistics for VLAN orange: WX1200# display igmp statistics vlan orange IGMP statistics for vlan orange: IGMP message type Received Transmitted Dropped ----------------- -------- ----------- ------General-Queries 0 0 0 GS-Queries 0 0 0 Report V1 0 0 0 Report V2 5 1 4 Leave 0 0 0 Mrouter-Adv 0 0 0 Mrouter-Term 0 0 0 Mrouter-Sol 50 101 0 DVMRP 4 4 0 PIM V1 0 0 0 PIM V2 0 0 0 Topology notifications: 0 Packets with unknown IGMP type: 0 Packets with bad length: 0 Packets with bad checksum: 0 Packets dropped: 4 Table 79 describes the fields in this display. 410 CHAPTER 11: IGMP SNOOPING COMMANDS Table 79 Output of display igmp statistics Field Description IGMP statistics VLAN name. Statistics are listed separately for each VLAN. for vlan IGMP message Type of IGMP message: type General-Queries — General group membership queries sent by the multicast querier (multicast router or pseudo-querier). GS-Queries — Group-specific queries sent by the multicast querier to determine whether there are receivers for a specific group. Report V1 — IGMP version 1 group membership reports sent by clients who want to be receivers for the groups. Report V2 — IGMP version 2 group membership reports sent by clients who want to be receivers for the groups. Leave — IGMP version 2 leave messages sent by clients who want to stop receiving traffic for a group. Leave messages apply only to IGMP version 2. Mrouter-Adv — Multicast router advertisement packets. A multicast router sends this type of packet to advertise the IP address of the sending interface as a multicast router interface. Mrouter-Term — Multicast router termination messages. A multicast router sends this type of message when multicast forwarding is disabled on the router interface, the router interface is administratively disabled, or the router itself is gracefully shutdown. Mrouter-Sol — Multicast router solicitation messages. A multicast client or a WX sends this type of message to immediately solicit multicast router advertisement messages from the multicast routers in the subnet. DVMRP — Distance Vector Multicast Routing Protocol (DVMRP) messages. Multicast routers running DVMRP exchange multicast information with these messages. PIM V1 — Protocol Independent Multicast (PIM) version 1 messages. Multicast routers running PIMv1 exchange multicast information with these messages. PIM V2 — PIM version 2 messages. Received Number of packets received. Transmitted Number of packets transmitted. This number includes both multicast packets originated by the WX and multicast packets received and then forwarded by the WX. Dropped Number of IGMP packets dropped by the WX. set igmp 411 Table 79 Output of display igmp statistics (continued) Field Description Topology notifications Number of Layer 2 topology change notifications received by the WX. In the current software version, the value in this field is always 0. Packets with unknown IGMP type Number of multicast packets received with an unrecognized multicast type. Packets with bad length Number of packets with an invalid length. Packets with bad IGMP checksum Number of packets with an invalid IGMP checksum value. Packets dropped Number of multicast packets dropped by the WX. See Also set igmp clear igmp statistics on page 400 Disables or reenables IGMP snooping on one VLAN or all VLANs on a wireless LAN switch. Syntax — set igmp {enable | disable} [vlan vlan-id] enable — Enables IGMP snooping. disable — Disables IGMP snooping. vlan vlan-id — VLAN name or number. If you do not specify a VLAN, IGMP snooping is disabled or reenabled on all VLANs. History — Introduced in MSS Version 3.0. Examples — The following command disables IGMP snooping on VLAN orange: WX1200# set igmp disable vlan orange success: change accepted See Also set igmp rv on page 420 412 CHAPTER 11: IGMP SNOOPING COMMANDS set igmp lmqi Changes the IGMP last member query interval timer on one VLAN or all VLANs on a wireless LAN switch. Syntax — set igmp lmqi tenth-seconds [vlan vlan-id] lmqi tenth-seconds — Amount of time (in tenths of a second) that the WX waits for a response to a group-specific query after receiving a leave message for that group, before removing the receiver that sent the leave message from the list of receivers for the group. If there are no more receivers for the group, the WX switch also sends a leave message for the group to multicast routers. You can specify a value from 1 through 65,535. vlan vlan-id — VLAN name or number. If you do not specify a VLAN, the timer change applies to all VLANs. Defaults — The default last member query interval is 10 tenths of a second (1 second). Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command changes the last member query interval on VLAN orange to 5 tenths of a second: WX1200# set igmp lmqi 5 vlan orange success: change accepted. See Also set igmp oqi on page 415 set igmp qi on page 417 set igmp mrouter on page 413 set igmp mrouter set igmp mrouter 413 Adds or removes a port in a WX’s list of ports on which it forwards traffic to multicast routers. Static multicast ports are immediately added to or removed from the list of router ports and do not age out. Syntax — set igmp mrouter port port-list {enable | disable} port port-list — Port list. MSS adds or removes the specified ports in the list of static multicast router ports. enable — Adds the port to the list of static multicast router ports. disable — Removes the port from the list of static multicast router ports. Defaults — By default, no ports are static multicast router ports. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — You cannot add MAP access ports or wired authentication ports as static multicast ports. However, MSS can dynamically add these port types to the list of multicast ports based on multicast traffic. Examples — The following command adds port 6 as a static multicast router port: WX1200# set igmp mrouter port 6 enable success: change accepted. The following command removes port 6 from the static multicast router port list: WX1200# set igmp mrouter port 6 disable success: change accepted. See Also display igmp statistics on page 409 414 CHAPTER 11: IGMP SNOOPING COMMANDS set igmp mrsol Enables or disables multicast router solicitation by a WX. Syntax — set igmp mrsol {enable | disable} [vlan vlan-id] enable — Enables multicast router solicitation. disable — Disables multicast router solicitation. vlan vlan-id — VLAN name or number. If you do not specify a VLAN, multicast router solicitation is disabled or enabled on all VLANs. Defaults — Multicast router solicitation is disabled on all VLANs by default. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command enables multicast router solicitation on VLAN orange: WX1200# set igmp mrsol enable vlan orange success: change accepted See Also set igmp mrsol mrsi set igmp mrsol mrsi on page 414 Changes the interval between multicast router solicitations by a WX on one VLAN or all VLANs. Syntax — set igmp mrsol mrsi seconds [vlan vlan-id] seconds — Number of seconds between multicast router solicitations. You can specify a value from 1 through 65,535. vlan vlan-id — VLAN name or number. If you do not specify a VLAN, MSS changes the multicast router solicitation interval for all VLANs. Defaults — The interval between multicast router solicitations is 30 seconds by default. Access — Enabled. History — Introduced in MSS Version 3.0. set igmp oqi 415 Usage — You cannot add MAP access ports or wired authentication ports as static multicast ports. However, MSS can dynamically add these port types to the list of multicast ports based on multicast traffic. Examples — The following example changes the multicast router solicitation interval to 60 seconds: WX1200# set igmp mrsol mrsi 60 success: change accepted. See Also set igmp oqi set igmp mrsol on page 414. Changes the IGMP other-querier-present interval timer on one VLAN or all VLANs on a WX. Syntax — set igmp oqi seconds [vlan vlan-id] oqi seconds — Number of seconds that the WX waits for a general query to arrive before electing itself the querier. You can specify a value from 1 through 65,535. vlan vlan-id — VLAN name or number. If you do not specify a VLAN, the timer change applies to all VLANs. Defaults — The default other-querier-present interval is 255 seconds (4.25 minutes). Access — Enabled. History — Introduced in MSS Version 3.0. Usage — A WX cannot become the querier unless the pseudo-querier feature is enabled on the WX switch. When the feature is enabled, the WX becomes the querier for a subnet so long as the WX does not receive a query message from a router with a lower IP address than the IP address of the WX in that subnet. To enable the pseudo-querier feature, use set igmp querier. Examples — The following command changes the other-querier-present interval on VLAN orange to 200 seconds: WX1200# set igmp oqi 200 vlan orange success: change accepted. 416 CHAPTER 11: IGMP SNOOPING COMMANDS See Also set igmp proxy-report set igmp lmqi on page 412 set igmp qi on page 417 set igmp qri on page 418 set igmp querier on page 419 set igmp mrouter on page 413 set igmp rv on page 420 Disables or reenables proxy reporting by a WX on one VLAN or all VLANs. Syntax — set igmp proxy-report {enable | disable} vlan vlan-id — VLAN name or number. If you do not specify a VLAN, proxy reporting is disabled or reenabled on all VLANs. enable — Enables proxy reporting. disable — Disables proxy reporting. Defaults — Proxy reporting is enabled on all VLANs by default. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — Proxy reporting reduces multicast overhead by sending only one membership report for a group to the multicast routers and discarding other membership reports for the same group. If you disable proxy reporting, the WX sends all membership reports to the routers, including multiple reports for the same group. Examples — The following example disables proxy reporting on VLAN orange: WX1200# set igmp proxy-report disable vlan orange success: change accepted. See Also set igmp rv on page 420 set igmp qi set igmp qi 417 Changes the IGMP query interval timer on one VLAN or all VLANs on a WX. Syntax — set igmp qi seconds [vlan vlan-id] qi seconds — Number of seconds that elapse between general queries sent by the WX when the WX switch is the querier for the subnet. You can specify a value from 1 through 65,535. vlan vlan-id — VLAN name or number. If you do not specify a VLAN, the timer change applies to all VLANs. Defaults — The default query interval is 125 seconds. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — The query interval is applicable only when the WX is querier for the subnet. For the WX switch to become the querier, the pseudo-querier feature must be enabled on the WX and the WX must have the lowest IP address among all the WX switches eligible to become a querier. To enable the pseudo-querier feature, use the set igmp querier command. Examples — The following command changes the query interval on VLAN orange to 100 seconds: WX1200# set igmp qi 100 vlan orange success: change accepted. See Also set igmp lmqi on page 412 set igmp oqi on page 415 set igmp qri on page 418 set igmp querier on page 419 set igmp mrouter on page 413 set igmp rv on page 420 418 CHAPTER 11: IGMP SNOOPING COMMANDS set igmp qri Changes the IGMP query response interval timer on one VLAN or all VLANs on a WX. Syntax — set igmp qri tenth-seconds [vlan vlan-id] qri tenth-seconds — Amount of time (in tenths of a second) that the WX waits for a receiver to respond to a group-specific query message before removing the receiver from the receiver list for the group. You can specify a value from 1 through 65,535. vlan vlan-id — VLAN name or number. If you do not specify a VLAN, the timer change applies to all VLANs. Defaults — The default query response interval is 100 tenths of a second (10 seconds). Access — Enabled. History — Introduced in MSS Version 3.0. Usage — The query response interval is applicable only when the WX is querier for the subnet. For the WX to become the querier, the pseudo-querier feature must be enabled on the WX and the WX must have the lowest IP address among all the WX switches eligible to become a querier. To enable the pseudo-querier feature, use set igmp querier. Examples — The following command changes the query response interval on VLAN orange to 50 tenths of a second (5 seconds): WX1200# set igmp qri 50 vlan orange success: change accepted. See Also set igmp lmqi on page 412 set igmp oqi on page 415 set igmp qi on page 417 set igmp querier on page 419 set igmp rv on page 420 set igmp querier set igmp querier 419 Enables or disables the IGMP pseudo-querier on a WX, on one VLAN or all VLANs. Syntax — set igmp querier {enable | disable} [vlan vlan-id] enable — Enables the pseudo-querier. disable — Disables the pseudo-querier. vlan vlan-id — VLAN name or number. If you do not specify a VLAN, the pseudo-querier is enabled or disabled on all VLANs. Defaults — The pseudo-querier is disabled on all VLANs by default. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — 3Com recommends that you use the pseudo-querier only when the VLAN contains local multicast traffic sources and no multicast router is servicing the subnet. Examples — The following example enables the pseudo-querier on the orange VLAN: WX1200# set igmp querier enable vlan orange success: change accepted. See Also set igmp receiver display igmp querier on page 405 Adds or removes a network port in the list of ports on which a WX forwards traffic to multicast receivers. Static multicast receiver ports are immediately added to or removed from the list of receiver ports and do not age out. Syntax — set igmp receiver port port-list {enable | disable} port port-list — Network port list. MSS adds the specified ports to the list of static multicast receiver ports. enable — Adds the port to the list of static multicast receiver ports. disable — Removes the port from the list of static multicast receiver ports. 420 CHAPTER 11: IGMP SNOOPING COMMANDS Defaults — By default, no ports are static multicast receiver ports. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — You cannot add MAP access ports or wired authentication ports as static multicast ports. However, MSS can dynamically add these port types to the list of multicast ports based on multicast traffic. Examples — The following command adds port 7 as a static multicast receiver port: WX1200# set igmp receiver port 7 enable success: change accepted. The following command removes port 7 from the list of static multicast receiver ports: WX1200# set igmp receiver port 7 disable success: change accepted. See Also set igmp rv display igmp receiver-table on page 407 Changes the robustness value for one VLAN or all VLANs on a WX. Robustness adjusts the IGMP timers to the amount of traffic loss that occurs on the network. Syntax — set igmp rv num [vlan vlan-id] num — Robustness value. You can specify a value from 2 through 255. Set the robustness value higher to adjust for more traffic loss. vlan vlan-id — VLAN name or number. If you do not specify a VLAN, MSS changes the robustness value for all VLANs. Defaults — The default robustness value for all VLANs is 2. Access — Enabled. History — Introduced in MSS Version 3.0. set igmp rv See Also set igmp oqi on page 415 set igmp qi on page 417 set igmp qri on page 418 421 422 CHAPTER 11: IGMP SNOOPING COMMANDS 12 SECURITY ACL COMMANDS Use security ACL commands to configure and monitor security access control lists (ACLs). Security ACLs filter packets to restrict or permit network usage by certain users or traffic types, and can assign to packets a class of service (CoS) to define the priority of treatment for packet filtering. (Security ACLs are different from the location policy on a WX switch, which helps you locally control user access. For location policy commands, see “AAA Commands” on page 199.) Security ACL Commands by Usage This chapter presents security ACL commands alphabetically. Use Table 80 to locate commands in this chapter based on their use. Table 80 Security ACL Commands by Usage Type Command Create Security ACLs set security acl on page 439 display security acl dscp on page 428 display security acl on page 429 display security acl info on page 431 clear security acl on page 424 Commit Security ACLs commit security acl on page 427 rollback security acl on page 438 Map Security ACLs set security acl map on page 444 display security acl map on page 432 clear security acl map on page 425 Monitor Security ACLs display security acl hits on page 430 hit-sample-rate on page 437 display security acl resource-usage on page 433 424 CHAPTER 12: SECURITY ACL COMMANDS clear security acl Clears a specified security ACL, an access control entry (ACE), or all security ACLs, from the edit buffer. When used with the command commit security acl, clears the ACE from the running configuration. Syntax — clear security acl {acl-name | all} [editbuffer-index] acl-name — Name of an existing security ACL to clear. ACL names start with a letter and are case-insensitive. all — Clears all security ACLs. editbuffer-index — Number that indicates which access control entry (ACE) in the security ACL to clear. If you do not specify an ACE, all ACEs are cleared from the ACL. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — This command deletes security ACLs only in the edit buffer. You must use the commit security acl command with this command to delete the ACL or ACE from the running configuration and nonvolatile storage. The clear security acl command deletes a security ACL, but does not stop its current filtering function if the ACL is mapped to any virtual LANs (VLANs), ports, or virtual ports, or if the ACL is applied in a Filter-Id attribute to an authenticated user or group of users with current sessions. Examples — The following commands display the current security ACL configuration, clear acl_133 in the edit buffer, commit the deletion to the running configuration, and redisplay the ACL configuration to display that it no longer contains acl_133: clear security acl map 425 WX4400# display security acl info all ACL information for all set security acl ip acl_133 (hits #1 0) --------------------------------------------------------1. deny IP source IP 192.168.1.6 0.0.0.0 destination IP any set security acl ip acl_134 (hits #3 0) --------------------------------------------------------1. permit IP source IP 192.168.0.1 0.0.0.0 destination IP any enable-hits set security acl ip acl_135 (hits #2 0) --------------------------------------------------------1. deny IP source IP 192.168.1.1 0.0.0.0 destination IP any enable-hits WX4400# clear security acl acl_133 WX4400# commit security acl acl_133 configuration accepted WX4400# display security acl info all ACL information for all set security acl ip acl_134 (hits #3 0) --------------------------------------------------------1. permit IP source IP 192.168.0.1 0.0.0.0 destination IP any enable-hits set security acl ip acl_135 (hits #2 0) --------------------------------------------------------1. deny IP source IP 192.168.1.1 0.0.0.0 destination IP any enable-hits See Also clear security acl map clear security acl map on page 425 commit security acl on page 427 display security acl info on page 431 set security acl on page 439 Deletes the mapping between a security ACL and a virtual LAN (VLAN), one or more physical ports, or a virtual port. Or deletes all ACL maps to VLANs, ports, and virtual ports on a WX switch. Security ACLs are applied to users or groups dynamically via the Filter-Id attribute. To delete a security ACL from a user or group in the local WX database, use the command clear user attr, clear mac-user attr, clear usergroup attr, or clear mac-usergroup attr. To delete a security ACL from a user or group on an external RADIUS server, see the documentation for your RADIUS server. 426 CHAPTER 12: SECURITY ACL COMMANDS Syntax — clear security acl map {acl-name | all} {vlan vlan-id | port port-list [tag tag-value] | dap dap-num} {in | out} acl-name — Name of an existing security ACL to clear. ACL names start with a letter and are case-insensitive. all — Removes security ACL mapping from all physical ports, virtual ports, and VLANs on a WX switch. vlan vlan-id — VLAN name or number. MSS removes the security ACL from the specified VLAN. port port-list — Port list. MSS removes the security ACL from the specified WX physical port or ports. tag tag-value — Tag value that identifies a virtual port in a VLAN. Specify a value from 1 through 4095. MSS removes the security ACL from the specified virtual port. dap dap-num — One or more Distributed MAPs, based on their connection IDs. Specify a single connection ID, or specify a comma-separated list of connection IDs, a hyphen-separated range, or any combination, with no spaces. MSS removes the security ACL from the specified Distributed MAPs. in — Removes the security ACL from traffic coming into the WX switch. out — Removes the security ACL from traffic going out of the WX switch. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — To clear a security ACL map, type the name of the ACL with the VLAN, physical port or ports, virtual port tag, or Distributed MAP and the direction of the packets to stop filtering. This command deletes the ACL mapping, but not the ACL. Examples — To clear the mapping of security ACL acljoe from port 4 for incoming packets, type the following command: WX4400# clear security acl map acljoe port 4 in clear mapping accepted commit security acl 427 To clear all physical ports, virtual ports, and VLANs on a WX switch of the ACLs mapped for incoming and outgoing traffic, type the following command: WX4400# clear security acl map all success: change accepted. See Also commit security acl clear security acl on page 424 display security acl map on page 432 set security acl map on page 444 Saves a security ACL, or all security ACLs, in the edit buffer to the running configuration and nonvolatile storage on the WX switch. Or, when used with the clear security acl command, commit security acl deletes a security ACL, or all security ACLs, from the running configuration and nonvolatile storage. Syntax — commit security acl {acl-name | all} acl-name — Name of an existing security ACL to commit. ACL names must start with a letter and are case-insensitive. all — Commits all security ACLs in the edit buffer. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — Use the commit security acl command to save security ACLs into, or delete them from, the permanent configuration. Until you commit the creation or deletion of a security ACL, it is stored in an edit buffer and is not enforced. After you commit a security ACL, it is removed from the edit buffer. A single commit security acl all command commits the creation and/or deletion of whatever display security acl info all editbuffer shows to be currently stored in the edit buffer. 428 CHAPTER 12: SECURITY ACL COMMANDS Examples — The following commands commit all the security ACLs in the edit buffer to the configuration, display a summary of the committed ACLs, and show that the edit buffer has been cleared: WX4400# commit security acl all configuration accepted WX4400# display security acl ACL table ACL Type Class Mapping ----------------------- ---- ------ ------acl_123 IP Static acl_124 IP Static WX4400# display security acl info all editbuffer acl editbuffer information for all See Also display security acl dscp clear security acl on page 424 display security acl on page 429 display security acl info on page 431 rollback security acl on page 438 set security acl on page 439 Displays a table that maps Differentiated Services Code Point (DSCP) values to their equivalent combinations of IP precedence values and IP ToS values. Use the table to look up the values to use with the precedence and tos options in an ACE when you want the ACE to match on their equivalent DSCP value. Syntax — display security acl dscp Defaults — None. Access — Enabled. History — Introduced in MSS Version 4.0. display security acl 429 The IP precedence and ToS fields use 7 bits, while the DSCP field uses only 6 bits. Following the DSCP field is a 2-bit ECN field that can be set by other devices based on network congestion. If you are filtering based on DSCP value, you need two ACEs to ensure that the ACL matches regardless of the value of the seventh bit. Use the first ACE to match on the precedence and ToS values corresponding to the DSCP value. Use the second ACE to match on the same precedence value but on the ToS value plus 1. (For an example, see the “Using ACLs to Change CoS” section of the “Configuring and Managing Security ACLs” chapter in the Wireless LAN Switch and Controller Configuration Guide. Examples — The following command displays the table: WX-1200# display security acl dscp DSCP TOS precedence tos dec hex dec hex ----------------------------------------------0 0x00 0 0x00 0 0 1 0x01 4 0x04 0 2 2 0x02 8 0x08 0 4 ... 63 0x3f 252 0xfc 7 14 See Also display security acl set security acl on page 439 Displays a summary of security ACLs that are committed — saved in the running configuration and nonvolatile storage — or a summary of ACLs in the edit buffer. Syntax — display security acl [editbuffer] Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. 430 CHAPTER 12: SECURITY ACL COMMANDS Examples — To display a summary of the committed security ACLs on a WX switch, type the following command: WX4400# display security acl ACL table ACL ---------------------------acl_123 acl_133 acl_124 Type ---IP IP IP Class -----Static Static Static Mapping ------Port 2 In Port 4 In To view a summary of the security ACLs in the edit buffer, type the following command: WX4400# display security acl ACL edit-buffer table ACL ---------------------------acl_122 acl_132 acl-144 editbuffer Type ---IP IP IP Status -------------Not committed Not committed Not committed See Also display security acl hits clear security acl on page 424 display security acl info on page 431 set security acl on page 439 Displays the number of packets filtered by security ACLs (“hits”) on the WX switch. Each time a packet is filtered by a security ACL, the hit counter increments. Syntax — display security acl hits Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — For MSS to count hits for a security ACL, you must specify hits in the set security acl commands that define ACE rules for the ACL. display security acl info 431 Examples — To display the security ACL hits on a WX switch, type the following command: WX4400# display security acl hits ACL hit-counters Index Counter ACL-name ----- -------------------- -------1 0 acl_2 2 0 acl_175 3 916 acl_123 See Also display security acl info hit-sample-rate on page 437 set security acl on page 439 Displays the contents of a specified security ACL or all security ACLs that are committed — saved in the running configuration and nonvolatile storage — or the contents of security ACLs in the edit buffer before they are committed. Syntax — display security acl info {acl-name | all} [editbuffer] acl-name — Name of an existing security ACL to display. ACL names must start with a letter and are case-insensitive. all — Displays the contents of all security ACLs. editbuffer — Displays the contents of the specified security ACL or all security ACLs that are stored in the edit buffer after being created with set security acl. If you do not use this parameter, only committed ACLs are shown. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. 432 CHAPTER 12: SECURITY ACL COMMANDS Examples — To display the contents of all security ACLs committed on a WX switch, type the following command: WX4400# display security acl info all ACL information for all set security acl ip acl_123 (hits #5 462) --------------------------------------------------------1. permit IP source IP 192.168.1.11 0.0.0.255 destination IP any enable-hits 2. deny IP source IP 192.168.2.11 0.0.0.0 destination IP any set security acl ip acl_134 (hits #3 0) --------------------------------------------------------1. permit IP source IP 192.168.0.1 0.0.0.0 destination IP any enable-hits set security acl ip acl_135 (hits #2 0) --------------------------------------------------------1. deny IP source IP 192.168.1.1 0.0.0.0 destination IP any enable-hits The following command displays the contents of acl_123 in the edit buffer, including the committed ACE rules 1 and 2 and the uncommitted rule 3: WX4400# display security acl info acl_123 editbuffer ACL edit-buffer information for acl_123 set security acl ip acl_123 (ACEs 3, add 3, del 0, modified 0) --------------------------------------------------------1. permit IP source IP 192.168.1.11 0.0.0.255 destination IP any enable-hits 2. deny IP source IP 192.168.2.11 0.0.0.0 destination IP any 3. deny SRC source IP 192.168.1.234 255.255.255.255 enable-hits See Also display security acl map clear security acl on page 424 commit security acl on page 427 set security acl on page 439 Displays the VLANs, ports, and virtual ports on the WX switch to which a security ACL is assigned. Syntax — display security acl map acl-name acl-name — Name of an existing security ACL for which to show static mapping. ACL names must start with a letter and are case-insensitive. Defaults — None. display security acl resource-usage 433 Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command displays the port to which security ACL acl_111 is mapped: WX4400# display security acl map acl_111 ACL acl_111 is mapped to: Port 4 in See Also display security acl resource-usage clear security acl map on page 425 display security acl map on page 432 set security acl map on page 444 Displays statistics about the resources used by security ACL filtering on the WX switch. Syntax — display security acl resource-usage Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — Use this command with the help of 3Com to diagnose an ACL resource problem. (To obtain 3Com Technical Support, see “Obtaining Support for your Product” on page 607.) 434 CHAPTER 12: SECURITY ACL COMMANDS Examples — To display security ACL resource usage, type the following command: WX4400# display security acl resource-usage ACL resources Classifier tree counters -----------------------Number of rules : 2 Number of leaf nodes : 1 Stored rule count : 2 Leaf chain count : 1 Longest leaf chain : 2 Number of non-leaf nodes : 0 Uncompressed Rule Count : 2 Maximum node depth : 1 Sub-chain count : 0 PSCBs in primary memory : 0 (max: 512) PSCBs in secondary memory : 0 (max: 9728) Leaves in primary : 2 (max: 151) Leaves in secondary : 0 (max 12096) Sum node depth : 1 Information on Network Processor status --------------------------------------Fragmentation control : 0 UC switchdest : 0 ACL resources Port number : 0 Number of action types : 2 LUdef in use : 5 Default action pointer : c8007dc L4 global : True No rules : False Non-IP rules : False Root in first : True Static default action : False No per-user (MAC) mapping : True Out mapping : False In mapping : True No VLAN or PORT mapping : False No VPORT mapping : True Table 81 explains the fields in the display security acl resource-usage output. display security acl resource-usage 435 Table 81 Output of display security acl resource-usage Field Description Number of rules Number of security ACEs currently mapped to ports or VLANs. Number of leaf nodes Number of security ACL data entries stored in the rule tree. Stored rule count Number of security ACEs stored in the rule tree. Leaf chain count Number of chained security ACL data entries stored in the rule tree. Longest leaf chain Longest chain of security ACL data entries stored in the rule tree. Number of non-leaf nodes Number of nodes with no data entries stored in the rule tree. Uncompressed Rule Count Number of security ACEs stored in the rule tree, including duplicates—ACEs in ACLs applied to multiple ports, virtual ports, or VLANs. Maximum node depth Number of data elements in the rule tree, from the root to the furthest data entry (leaf). Sub-chain count Sum of action types represented in all security ACL data entries. PSCBs in primary memory Number of pattern search control blocks (PSCBs) stored in primary node memory. PSCBs in secondary memory Number of PSCBs stored in secondary node memory. Leaves in primary Number of security ACL data entries stored in primary leaf memory. Leaves in secondary Number of ACL data entries stored in secondary leaf memory. Sum node depth Total number of security ACL data entries. Fragmentation control Control value for handling fragmented IP packets. UC switchdest Control value for handling fragmented IP packets. Note: The current MSS version filters only the first packet of a fragmented IP packet and passes the remaining fragments. Note: The current MSS version filters only the first packet of a fragmented IP packet and passes the remaining fragments. Port number Control value for handling fragmented IP packets. Note: The current MSS version filters only the first packet of a fragmented IP packet and passes the remaining fragments. Number of action types Number of actions that can be performed by ACLs. This value is always 2, because ACLs can either permit or deny. 436 CHAPTER 12: SECURITY ACL COMMANDS Table 81 Output of display security acl resource-usage (continued) Field Description LUdef in use Number of the lookup definition (LUdef) table currently in use for packet handling. Default action pointer Memory address used for packet handling, from which default action data is obtained when necessary. L4 global Security ACL mapping on the WX switch: No rules Non-IP rules True — Security ACLs are mapped. False — No security ACLs are mapped. Security ACE rule mapping on the WX switch: True — No security ACEs are mapped. False — Security ACEs are mapped. Non-IP security ACE mapping on the WX switch: True — Non-IP security ACEs are mapped. False — Only IP security ACEs are mapped. Note: The current MSS version supports security ACEs for IP only. Root in first Static default action No per-user (MAC) mapping Out mapping Leaf buffer allocation: True — Enough primary leaf buffers are allocated in nonvolatile memory to accommodate all leaves. False — Insufficient primary leaf buffers are allocated in nonvolatile memory to accommodate all leaves. Definition of a default action: True — A default action types is defined. False — No default action type is defined. Per-user application of a security ACL with the Filter-Id attribute, on the WX switch: True — No security ACLs are applied to users. False — Security ACLs are applied to users. Application of security ACLs to outgoing traffic on the WX switch: True — Security ACLs are mapped to outgoing traffic. False — No security ACLs are mapped to outgoing traffic. hit-sample-rate 437 Table 81 Output of display security acl resource-usage (continued) Field Description In mapping Application of security ACLs to incoming traffic on the WX switch: No VLAN or PORT mapping No VPORT mapping hit-sample-rate True — Security ACLs are mapped to incoming traffic. False — No security ACLs are mapped to incoming traffic. Application of security ACLs to WX VLANs or ports on the WX switch: True — No security ACLs are mapped to VLANs or ports. False — Security ACLs are mapped to VLANs or ports. Application of security ACLs to WX virtual ports on the WX switch: True — No security ACLs are mapped to virtual ports. False — Security ACLs are mapped to virtual ports. Specifies the time interval, in seconds, at which the packet counter for each security ACL is sampled for display. The counter counts the number of packets filtered by the security ACL — or “hits.” Syntax — hit-sample-rate seconds seconds — Number of seconds between samples. A sample rate of 0 (zero) disables the sample process. Defaults — By default, the hits are not sampled. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — To view counter results for a particular ACL, use the display security acl info acl-name command. To view the hits for all security ACLs, use the display security acl hits command. 438 CHAPTER 12: SECURITY ACL COMMANDS Examples — The first command sets MSS to sample ACL hits every 15 seconds. The second and third commands display the results. The results show that 916 packets matching security acl_153 were sent since the ACL was mapped. WX4400# hit-sample-rate 15 WX4400# display security acl info acl_153 ACL information for acl_153 set security acl ip acl_153 (hits #3 916) --------------------------------------------------------1. permit IP source IP 20.1.1.1 0.0.0.0 destination IP any enable-hits WX4400# display security acl hits ACL hit counters Index Counter ACL-name ----- -------------------- ----------1 0 acl_2 2 0 acl_175 3 916 acl_153 See Also rollback security acl display security acl hits on page 430 display security acl info on page 431 Clears changes made to the security ACL edit buffer since it was last saved. The ACL is rolled back to its state after the last commit security acl command was entered. All uncommitted ACLs in the edit buffer are cleared. Syntax — rollback security acl {acl-name | all} acl-name — Name of an existing security ACL to roll back. ACL names must start with a letter and are case-insensitive. all — Rolls back all security ACLs in the edit buffer, clearing all uncommitted ACEs. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. set security acl 439 Examples — The following commands show the edit buffer before a rollback, clear any changes in the edit buffer to security acl_122, and show the edit buffer after the rollback: WX4400# display security acl info all editbuffer ACL edit-buffer information for all set security acl ip acl_122 (ACEs 3, add 3, del 0, modified 0) --------------------------------------------------------1. permit IP source IP 20.0.1.11 0.0.0.255 destination IP any enable-hits 2. deny IP source IP 20.0.2.11 0.0.0.0 destination IP any 3. deny SRC source IP 192.168.1.234 255.255.255.255 enable-hits WX4400# rollback security acl acl_122 WX4400# display security acl info all editbuffer ACL edit-buffer information for all See Also set security acl display security acl on page 429 In the edit buffer, creates a security access control list (ACL), adds one access control entry (ACE) to a security ACL, and/or reorders ACEs in the ACL. The ACEs in an ACL filter IP packets by source IP address, a Layer 4 protocol, or IP, ICMP, TCP, or UDP packet information. By source address Syntax — set security acl ip acl-name {permit [cos cos] | deny} source-ip-addr mask [before editbuffer-index | modify editbuffer-index] [hits] By Layer 4 protocol Syntax — set security acl ip acl-name {permit [cos cos] | deny} protocol-number {source-ip-addr mask destination-ip-addr mask} [precedence precedence] [tos tos] [before editbuffer-index | modify editbuffer-index] [hits] By IP packets Syntax — set security acl ip acl-name {permit [cos cos] | deny} ip {source-ip-addr mask destination-ip-addr mask} [precedence precedence] [tos tos] [before editbuffer-index | modify editbuffer-index] [hits] 440 CHAPTER 12: SECURITY ACL COMMANDS By ICMP packets Syntax — set security acl ip acl-name {permit [cos cos] | deny} icmp {source-ip-addr mask destination-ip-addr mask [type icmp-type] [code icmp-code] [precedence precedence ] [tos tos] [before editbuffer-index | modify editbuffer-index] [hits] By TCP packets Syntax — set security acl ip acl-name {permit [cos cos] |deny} tcp {source-ip-addr mask [operator port [port2]] destination-ip-addr mask [operator port [port2]]} [precedence precedence] [tos tos] [established] [before editbuffer-index | modify editbuffer-index] [hits] By UDP packets Syntax — set security acl ip acl-name {permit [cos cos] | deny} udp {source-ip-addr mask [operator port [port2]] destination-ip-addr mask [operator port [port2]]} [precedence precedence] [tos tos] [before editbuffer-index | modify editbuffer-index] [hits] acl-name — Security ACL name. ACL names must be unique within the WX switch, must start with a letter, and are case-insensitive. Specify an ACL name of up to 32 of the following characters: Letters a through z and A through Z Numbers 0 through 9 Hyphen (-), underscore (_), and period (.) 3Com recommends that you do not use the same name with different capitalizations for ACLs. For example, do not configure two separate ACLs with the names acl_123 and ACL_123. In an ACL name, do not include the term all, default-action, map, help, or editbuffer. permit — Allows traffic that matches the conditions in the ACE. cos cos — For permitted packets, a class-of-service (CoS) level for packet handling. Specify a value from 0 through 7: 1 or 2—Background. Packets are queued in MAP forwarding queue 4. set security acl 441 0 or 3—Best effort. Packets are queued in MAP forwarding queue 3. 4 or 5—Video. Packets are queued in MAP forwarding queue 2. Use CoS level 4 or 5 for voice over IP (VoIP) packets other than SpectraLink Voice Priority (SVP). 6 or 7—Voice. Packets are queued in MAP forwarding queue 1. In MSS Version 3.0, use 6 or 7 only for VoIP phones that use SVP, not for other types of traffic. deny — Blocks traffic that matches the conditions in the ACE. protocol — IP protocol by which to filter packets: ip tcp udp icmp A protocol number between 0 and 255. (For a complete list of IP protocol names and numbers, see www.iana.org/assignments/protocol-numbers.) source-ip-addr mask — IP address and wildcard mask of the network or host from which the packet is being sent. Specify both address and mask in dotted decimal notation. For more information, see “Wildcard Masks” on page 26. operator port [port2] — Operand and port number(s) for matching TCP or UDP packets to the number of the source or destination port on source-ip-addr or destination-ip-addr. Specify one of the following operands and the associated port: eq — Packets are filtered for only port number. gt — Packets are filtered for all ports that are greater than port number. lt — Packets are filtered for all ports that are less than port number. neq — Packets are filtered for all ports except port number. range — Packets are filtered for ports in the range between port and port2. To specify a port range, enter two port numbers. Enter the lower port number first, followed by the higher port number. 442 CHAPTER 12: SECURITY ACL COMMANDS (For a complete list of TCP and UDP port numbers, see www.iana.org/assignments/port-numbers.) destination-ip-addr mask — IP address and wildcard mask of the network or host to which the packet is being sent. Specify both address and mask in dotted decimal notation. For more information, see “Wildcard Masks” on page 26. type icmp-type — Filters ICMP messages by type. Specify a value from 0 through 255. (For a list of ICMP message type and code numbers, see www.iana.org/assignments/icmp-parameters.) code icmp-code — For ICMP messages filtered by type, additionally filters ICMP messages by code. Specify a value from 0 through 255. (For a list of ICMP message type and code numbers, see www.iana.org/assignments/icmp-parameters.) precedence precedence — Filters packets by precedence level. Specify a value from 0 through 7: 0 — routine precedence 1 — priority precedence 2 — immediate precedence 3 — flash precedence 4 — flash override precedence 5 — critical precedence 6 — internetwork control precedence 7 — network control precedence tos tos — Filters packets by type of service (TOS) level. Specify one of the following values, or any sum of these values up to 15. For example, a tos value of 9 filters packets with the TOS levels minimum delay (8) and minimum monetary cost (1). 8 — minimum delay 4 — maximum throughput 2 — maximum reliability 1 — minimum monetary cost 0 — normal established — For TCP packets only, applies the ACE only to established TCP sessions and not to new TCP sessions. set security acl 443 before editbuffer-index — Inserts the new ACE in front of another ACE in the security ACL. Specify the number of the existing ACE in the edit buffer. Index numbers start at 1. (To display the edit buffer, use display security acl editbuffer.) modify editbuffer-index — Replaces an ACE in the security ACL with the new ACE. Specify the number of the existing ACE in the edit buffer. Index numbers start at 1. (To display the edit buffer, use display security acl editbuffer.) hits — Tracks the number of packets that are filtered based on a security ACL, for all mappings. Defaults — Permitted packets are assigned to class-of-service (CoS) class 0 by default. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — The WX switch does not apply security ACLs until you activate them with the commit security acl command and map them to a VLAN, port, or virtual port, or to a user. If the WX switch is reset or restarted, any ACLs in the edit buffer are lost. You cannot perform ACL functions that include permitting, denying, or marking with a Class of Service (CoS) level on packets with a multicast or broadcast destination address. The order of security ACEs in a security ACL is important. Once an ACL is active, its ACEs are checked according to their order in the ACL. If an ACE criterion is met, its action takes place and any ACEs that follow are ignored. ACEs are listed in the order in which you create them, unless you move them. To position security ACEs within a security ACL, use before editbuffer-index and modify editbuffer-index. Examples — The following command adds an ACE to security acl_123 that permits packets from IP address 192.168.1.11/24 and counts the hits: WX4400# set security acl ip acl_123 permit 192.168.1.11 0.0.0.255 hits 444 CHAPTER 12: SECURITY ACL COMMANDS The following command adds an ACE to acl_123 that denies packets from IP address 192.168.2.11: WX4400# set security acl ip acl_123 deny 192.168.2.11 0.0.0.0 The following command creates acl_125 by defining an ACE that denies TCP packets from source IP address 192.168.0.1 to destination IP address 192.168.0.2 for established sessions only, and counts the hits: WX4400# set security acl ip acl_125 deny tcp 192.168.0.1 0.0.0.0 192.168.0.2 0.0.0.0 established hits The following command adds an ACE to acl_125 that denies TCP packets from source IP address 192.168.1.1 to destination IP address 192.168.1.2, on destination port 80 only, and counts the hits: WX4400# set security acl ip acl_125 deny tcp 192.168.1.1 0.0.0.0 192.168.1.2 0.0.0.0 eq 80 hits Finally, the following command commits the security ACLs in the edit buffer to the configuration: WX4400# commit security acl all configuration accepted See Also set security acl map clear security acl on page 424 commit security acl on page 427 display security acl on page 429 Assigns a committed security ACL to a VLAN, physical port or ports, virtual port, or Distributed MAP on the WX switch. To assign a security ACL to a user or group in the local WX database, use the command set user attr, set mac-user attr, set usergroup attr, or set mac-usergroup attr with the Filter-Id attribute. To assign a security ACL to a user or group with Filter-Id on a RADIUS server, see the documentation for your RADIUS server. set security acl map 445 Syntax — set security acl map acl-name {vlan vlan-id | port port-list [tag tag-list] | dap dap-num} {in | out} acl-name — Name of an existing security ACL to map. ACL names start with a letter and are case-insensitive. vlan vlan-id — VLAN name or number. MSS assigns the security ACL to the specified VLAN. port port-list — Port list. MSS assigns the security ACL to the specified physical WX port or ports. tag tag-list — One or more values that identify a virtual port in a VLAN. Specify a single tag value from 1 through 4095. Or specify a comma-separated list of values, a hyphen-separated range, or any combination, with no spaces. MSS assigns the security ACL to the specified virtual port or ports. dap dap-num — One or more Distributed MAPs, based on their connection IDs. Specify a single connection ID, or specify a comma-separated list of connection IDs, a hyphen-separated range, or any combination, with no spaces. MSS assigns the security ACL to the specified Distributed MAPs. in — Assigns the security ACL to traffic coming into the WX switch. out — Assigns the security ACL to traffic coming from the WX switch. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — Before you can map a security ACL, you must use the commit security acl command to save the ACL in the running configuration and nonvolatile storage. For best results, map only one input security ACL and one output security ACL to each VLAN, physical port, virtual port, or Distributed MAP to filter a flow of packets. If more than one security ACL filters the same traffic, MSS applies only the first ACL match and ignores any other matches. Examples — The following command maps security ACL acl_133 to port 4 for incoming packets: WX4400 set security acl map acl_133 port 4 in success: change accepted. 446 CHAPTER 12: SECURITY ACL COMMANDS See Also clear security acl map on page 425 commit security acl on page 427 set mac-user attr on page 246 set mac-usergroup attr on page 252 set security acl on page 439 set user attr on page 257 set user group on page 258 display security acl map on page 432 13 CRYPTOGRAPHY COMMANDS Use cryptography commands to configure and manage certificates and public-private key pairs for system authentication. Depending on your network configuration, you must create keys and certificates to authenticate the WX switch to IEEE 802.1X wireless clients for which the WX switch performs authentication, and to 3Com wireless switch manager (3WXM) and Web Manager. Commands by Usage This chapter presents cryptography commands alphabetically. Use Table 82 to locate commands in this chapter based on their use. Table 82 Cryptography Commands by Usage Type Command Encryption Keys crypto generate key on page 451 display crypto key ssh on page 461 PKCS #7 Certificates crypto generate request on page 452 crypto ca-certificate on page 448 display crypto ca-certificate on page 459 crypto certificate on page 449 display crypto certificate on page 460 PKCS #12 Certificate crypto otp on page 456 crypto pkcs12 on page 457 Self-Signed Certificate crypto generate self-signed on page 454 448 CHAPTER 13: CRYPTOGRAPHY COMMANDS crypto ca-certificate Installs a certificate authority’s own PKCS #7 certificate into the WX certificate and key storage area. Syntax — crypto ca-certificate {admin | eap | webaaa} PEM-formatted certificate admin — Stores the certificate authority’s certificate that signed the administrative certificate for the WX switch. The administrative certificate authenticates the WX to 3Com wireless switch manager (3XWM) or Web Manager. eap — Stores the certificate authority’s certificate that signed the Extensible Authentication Protocol (EAP) certificate for the WX switch. The EAP certificate authenticates the WX to 802.1X supplicants (clients). webaaa — Stores the certificate authority’s certificate that signed the WebAAA certificate for the WX switch. The Web certificate authenticates the WX to clients who use WebAAA. PEM-formatted certificate — ASCII text representation of the certificate authority PKCS #7 certificate, consisting of up to 4096 characters that you have obtained from the certificate authority. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — The Privacy-Enhanced Mail protocol (PEM) format is used for representing a PKCS #7 certificate in ASCII text. PEM uses base64 encoding to convert the certificate to ASCII text, then puts the encoded text between the following delimiters: -----BEGIN CERTIFICATE---------END CERTIFICATE----- crypto certificate 449 To use this command, you must already have obtained a copy of the certificate authority’s certificate as a PKCS #7 object file. Then do the following: 1 Open the PKCS #7 object file with an ASCII text editor such as Notepad or vi. 2 Enter the crypto ca-certificate command on the CLI command line. 3 When MSS prompts you for the PEM-formatted certificate, paste the PKCS #7 object file onto the command line. Examples — The following command adds the certificate authority’s certificate to WX certificate and key storage: WX4400# crypto ca-certificate admin Enter PEM-encoded certificate -----BEGIN CERTIFICATE----MIIDwDCCA2qgAwIBAgIQL2jvuu4PO5FAQCyewU3ojANBgkqhkiG9wOBAQUFADCB mzerMClaweVQQTTooewi\wpoer0QWNFNkj90044mbdrl1277SWQ8G7DiwYUtrqoQplKJvxz ..... Lm8wmVYxP56M;CUAm908C2foYgOY40= -----END CERTIFICATE----- See Also crypto certificate display crypto ca-certificate on page 459 Installs one of the WX switch’s PKCS #7 certificates into the certificate and key storage area on the WX switch. The certificate, which is issued and signed by a certificate authority, authenticates the WX switch either to 3WXM or Web Manager, or to 802.1X supplicants (clients). Syntax — crypto certificate PEM-formatted certificate {admin | eap | webaaa } admin — Stores the certificate authority’s administrative certificate, which authenticates the WX switch to 3WXM or Web Manager. eap — Stores the certificate authority’s Extensible Authentication Protocol (EAP) certificate, which authenticates the WX switch to 802.1X supplicants (clients). webaaa — Stores the certificate authority’s WebAAA certificate, which authenticates the WX to clients who use WebAAA. 450 CHAPTER 13: CRYPTOGRAPHY COMMANDS PEM-formatted certificate — ASCII text representation of the PKCS #7 certificate, consisting of up to 4096 characters, that you have obtained from the certificate authority. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To use this command, you must already have generated a certificate request with the crypto generate request command, sent the request to the certificate authority, and obtained a signed copy of the WX switch certificate as a PKCS #7 object file. Then do the following: 1 Open the PKCS #7 object file with an ASCII text editor such as Notepad or vi. 2 Enter the crypto certificate command on the CLI command line. 3 When MSS prompts you for the PEM-formatted certificate, paste the PKCS #7 object file onto the command line. The WX switch verifies the validity of the public key associated with this certificate before installing it, to prevent a mismatch between the WX switch’s private key and the public key in the installed certificate. Examples — The following command installs a certificate: WX4400# crypto certificate admin Enter PEM-encoded certificate -----BEGIN CERTIFICATE----MIIBdTCP3wIBADA2MQswCQYDVQQGEwJVUzELMAkGA1UECBMCQOExGjAYBgNVBAMU EXR1Y2hwdWJzQHRycHouY29tMIGfMAOGCSqGSIb3DQEBAQAA4GNADCBiQKBgQC4 ..... 2L8Q9tk+G2As84QYLm8wmVY>xP56M;CUAm908C2foYgOY40= -----END CERTIFICATE----- See Also crypto generate request on page 452 crypto generate self-signed on page 454 crypto generate key crypto generate key 451 Generates an RSA public-private encryption key pair that is required for a Certificate Signing Request (CSR) or a self-signed certificate. For SSH, the command generates an SSH authentication key. Syntax — crypto generate key {admin | eap | ssh | webaaa } {512 | 1024 | 2048} admin — Generates an administrative key pair for authenticating the WX switch to 3WXM or Web Manager. eap — Generates an EAP key pair for authenticating the WX switch to 802.1X supplicants (clients). ssh — Generates a key pair for authenticating the WX switch to Secure Shell (SSH) clients. webaaa — Generates an administrative key pair for authenticating the WX switch to WebAAA clients. 512 | 1024 | 2048 — Length of the key pair in bits. The minimum key size for SSH is 1024. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You can overwrite a key by generating another key of the same type. Examples — To generate an administrative key for use with 3WXM, type the following command: WX4400# crypto generate key admin 1024 key pair generated See Also display crypto key ssh on page 461 452 CHAPTER 13: CRYPTOGRAPHY COMMANDS crypto generate request Generates a Certificate Signing Request (CSR). This command outputs a PEM-formatted PKCS #10 text string that you can cut and paste to another location for delivery to a certificate authority. This command generates either an administrative CSR for use with 3WXM and Web Manager, or an EAP CSR for use with 802.1X clients. Syntax — crypto generate request {admin | eap | webaaa} admin — Generates a request for an administrative certificate to authenticate the WX switch to 3WXM or Web Manager. eap — Generates a request for an EAP certificate to authenticate the WX switch to 802.1X supplicants (clients). webaaa — Generates a request for a WebAAA certificate to authenticate the WX switch to WebAAA clients. After you type the command, you are prompted for the following variables: Country Name string — (Optional) Specify the abbreviation for the country in which the WX switch is operating, in 2 alphanumeric characters with no spaces. State Name string — (Optional) Specify the abbreviation for the name of the state, in 2 alphanumeric characters with no spaces. Locality Name string — (Optional) Specify the name of the locality, in up to 80 alphanumeric characters with no spaces. Organizational Name string — (Optional) Specify the name of the organization, in up to 80 alphanumeric characters with no spaces. Organizational Unit string — (Optional) Specify the name of the organizational unit, in up to 80 alphanumeric characters with no spaces. Common Name string — Specify a unique name for the WX switch, in up to 80 alphanumeric characters with no spaces. Use a fully qualified name if such names are supported on your network. This field is required. Email Address string — (Optional) Specify your email address, in up to 80 alphanumeric characters with no spaces. Unstructured Name string — (Optional) Specify any name, in up to 80 alphanumeric characters with no spaces. crypto generate request 453 Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To use this command, you must already have generated a public-private encryption key pair with the crypto generate key command. Enter crypto generate request admin, crypto generate request eap, or crypto generate request webaaa and press Enter. When you are prompted, type the identifying values in the fields, or press Enter if the field is optional. You must enter a common name for the WX switch. This command outputs a PKCS #10 text string in Privacy-Enhanced Mail protocol (PEM) format that you paste to another location for submission to the certificate authority. You then send the request to the certificate authority to obtain a signed copy of the WX switch certificate as a PKCS #7 object file. Examples — To request an administrative certificate from a certificate authority, type the following command: WX4400# crypto generate request admin Country Name: US State Name: CA Locality Name: Pleasanton Organizational Name: MyCorp Organizational Unit: ENG Common Name: ENG Email Address: admin@example.com Unstructured Name: admin CSR for admin is -----BEGIN CERTIFICATE REQUEST----MIIBuzCCASQCAQAwezELMAkGA1UEBhMCdXMxCzAJBgNVBAgTAmNhMQswCQYDVQQH EwJjYTELMAkGA1UEChMCY2ExCzAJBgNVBAsTAmNhMQswCQYDVQQDEwJjYTEYMBYG CSqGSIb3DQEJARYJY2FAY2EuY29tMREwDwYJKoZIhvcNAQkCEwJjYTCBnzANBgkq hkiG9w0BAQEFAAOBjQAwgYkCgYEA1zatpYStOjHMa0QJmWHeZPPFGQ9kBEimJKPG bznFjAC780GcZtnJPGqnMnOKj/4NdknonT6NdCd2fBdGbuEFGNMNgZMYKGcV2JIu M32SvpSEOEnMYuidkEzqLQol621vh67RM1KTMECM6uCBBROq6XNypIHn1gtrrpL/ LhyGTWUCAwEAAaAAMA0GCSqGSIb3DQEBBAUAA4GBAHK5z2kfjBbV/F0b0MyC5S7K htsw7T4SwmCij55qfUHxsRelggYcw6vJtr57jJ7wFfsMd8C50NcbJLF1nYC9OKkB hW+5gDPAOZdOnnr591XKz3Zzyvyrktv00rcld8Fo2RtTQ3AOT9cUZqJVelO85GXJ -----END CERTIFICATE REQUEST----- 454 CHAPTER 13: CRYPTOGRAPHY COMMANDS See Also crypto generate self-signed crypto certificate on page 449 crypto generate key on page 451 Generates a self-signed certificate for either an administrative certificate for use with 3WXM or an EAP certificate for use with 802.1X wireless users. Syntax — crypto generate self-signed {admin | eap | webaaa} admin — Generates an administrative certificate to authenticate the WX switch to 3WXM or Web Manager. eap — Generates an EAP certificate to authenticate the WX switch to 802.1X supplicants (clients). webaaa — Generates a WebAAA certificate to authenticate the WX switch to WebAAA clients. After you type the command, you are prompted for the following variables: Country Name string — (Optional) Specify the abbreviation for the country in which the WX switch is operating, in 2 alphanumeric characters with no spaces. State Name string — (Optional) Specify the abbreviation for the name of the state, in 2 alphanumeric characters with no spaces. Locality Name string — (Optional) Specify the name of the locality, in up to 80 alphanumeric characters with no spaces. Organizational Name string — (Optional) Specify the name of the organization, in up to 80 alphanumeric characters with no spaces. Organizational Unit string — (Optional) Specify the name of the organizational unit, in up to 80 alphanumeric characters with no spaces. Common Name string — Specify a unique name for the WX switch, in up to 80 alphanumeric characters with no spaces. Use a fully qualified name if such names are supported on your network. This field is required. crypto generate self-signed 455 Note: If you are generating a WebAAA (webaaa) certificate, use a common name that looks like a domain name (two or more strings connected by dots, with no spaces). For example, use common.name instead of common name. The string is not required to be an actual domain name. It simply needs to be formatted like one. Email Address string — (Optional) Specify your email address, in up to 80 alphanumeric characters with no spaces. Unstructured Name string — (Optional) Specify any name, in up to 80 alphanumeric characters with no spaces. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To use this command, you must already have generated a public-private encryption key pair with the crypto generate key command. To generate a self-signed administrative certificate, type the following command: WX4400# crypto generate self-signed admin Country Name: State Name: Locality Name: Organizational Name: Organizational Unit: Common Name: wx1@example.com Email Address: Unstructured Name: CSR for admin is -----BEGIN CERTIFICATE----MIICzzCCAjigAwIBAgICA+cwDQYJKoZIhvcNAQEEBQAwdDELMAkGA1UEBhMCY2Ex CzAJBgNVBAgTAmNhMQswCQYDVQQHEwJjYTELMAkGA1UEChMCY2ExCzAJBgNVBAsT AmNhMQswCQYDVQQDEwJjYTERMA8GCSqGSIb3DQEJARYCY2ExETAPBgkqhkiG9w0B CQITAmNhMB4XDTAwMDMwNTIwMjUxN1oXDTAxMDMwNTIwMjUxN1owdDELMAkGA1UE BhMCY2ExCzAJBgNVBAgTAmNhMQswCQYDVQQHEwJjYTELMAkGA1UEChMCY2ExCzAJ BgNVBAsTAmNhMQswCQYDVQQDEwJjYTERMA8GCSqGSIb3DQEJARYCY2ExETAPBgkq hkiG9w0BCQITAmNhMIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDXNq2lhK06 McxrRAmZYd5k88UZD2QESKYko8ZvOcWMALvzQZxm2ck8aqcyc4qP/g12SeidPo10 J3Z8F0Zu4QUY0w2BkxgoZxXYki4zfZK+lIQ4Scxi6J2QTOotCiXrbW+HrtEzUpMw QIzq4IEFE6rpc3KkgefWC2uukv8uHIZNZQIDAQABo3AwbjARBglghkgBhvhCAQEE 456 CHAPTER 13: CRYPTOGRAPHY COMMANDS BAMCBkAwSAYJYIZIAYb4QgENBDsWOXRoaXMgY2VydGlmaWNhdGUgaXMgY29tcGxl dGVseSB1bnRydXN0d29ydGh5LiBJcyB0aGF0IE9LPzAPBgNVHRMBAf8EBTADAQH/ MA0GCSqGSIb3DQEBBAUAA4GBAHUOhMG/Zbgojvxb+hopdNzWmjAL8Cr8lX4/g2W2 clyq55Y3SF+L6CmGxUmlLR5ZsM9KuEIZLPtKsCurIhiPft4g52fkCC/EdibxXlUb kw8IUADwGiE1T21OM8vmm4EIKM7tyyEF0b94dqFxZQfSsJp+Up6d8LBnBRYDxzPd -----END CERTIFICATE----- See Also crypto otp crypto certificate on page 449 crypto generate key on page 451 Sets a one-time password (OTP) for use with the crypto pkcs12 command. Syntax — crypto otp {admin | eap | webaaa} one-time-password admin — Creates a one-time password for installing a PKCS #12 object file for an administrative certificate and key pair—and optionally the certificate authority’s own certificate—to authenticate the WX switch to 3WXM or Web Manager. eap — Creates a one-time password for installing a PKCS #12 object file for an EAP certificate and key pair—and optionally the certificate authority’s own certificate—to authenticate the WX switch to 802.1X supplicants (clients). webaaa — Creates a one-time password for installing a PKCS #12 object file for a WebAAA certificate and key pair—and optionally the certificate authority’s own certificate—to authenticate the WX switch to WebAAA clients. one-time-password — Password of at least 1 alphanumeric character, with no spaces, for clients other than Microsoft Windows clients. The password must be the same as the password protecting the PKCS #12 object file. Note: On an WX switch that handles communications to and from Microsoft Windows clients, use a one-time password of 31 characters or fewer. The following characters cannot be used as part of the one-time password of a PKCS #12 file: Quotation marks (“ ”) crypto pkcs12 Question mark (?) Ampersand (&) 457 Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — The password allows the public-private key pair and certificate to be installed together from the same PKCS #12 object file. MSS erases the one-time password after processing the crypto pkcs12 command or when you reboot the WX switch. 3Com recommends that you create a password that is memorable to you but is not subject to easy guesses or a dictionary attack. For best results, create a password of alphanumeric uppercase and lowercase characters. Examples — The following command creates the one-time password hap9iN#ss for installing an EAP certificate and key pair: WX4400# crypto generate otp eap hap9iN#ss OTP set See Also crypto pkcs12 crypto pkcs12 on page 457 Unpacks a PKCS #12 object file into the certificate and key storage area on the WX switch. This object file contains a public-private key pair, an WX certificate signed by a certificate authority, and the certificate authority’s certificate. Syntax — crypto pkcs12 {admin | eap | webaaa} file-location-url admin — Unpacks a PKCS #12 object file for an administrative certificate and key pair — and optionally the certificate authority’s own certificate — for authenticating the WX switch to 3WXM or Web Manager. eap — Unpacks a PKCS #12 object file for an EAP certificate and key pair — and optionally the certificate authority’s own certificate — for authenticating the WX switch to 802.1X supplicants (clients). 458 CHAPTER 13: CRYPTOGRAPHY COMMANDS webaaa — Unpacks a PKCS #12 object file for a WebAAA certificate and key pair — and optionally the certificate authority’s own certificate — for authenticating the WX switch to WebAAA clients. file-location-url — Location of the PKCS #12 object file to be installed. Specify a location of between 1 and 128 alphanumeric characters, with no spaces. Defaults — The password you enter with the crypto otp command must be the same as the one protecting the PKCS #12 file. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To use this command, you must have already created a one-time password with the crypto otp command. You must also have the PKCS #12 object file available. You can download a PKCS #12 object file via TFTP from a remote location to the local nonvolatile storage system on the WX switch. Examples — The following commands copy a PKCS #12 object file for an EAP certificate and key pair—and optionally the certificate authority’s own certificate—from a TFTP server to nonvolatile storage on the WX switch, create the one-time password hap9iN#ss, and unpack the PKCS #12 file: WX4400# copy tftp://192.168.253.1/2048full.p12 2048full.p12 success: received 637 bytes in 0.253 seconds [ 2517 bytes/sec] WX4400# crypto otp eap hap9iN#ss OTP set WX4400# crypto pkcs12 eap 2048full.p12 Unwrapped from PKCS12 file: keypair device certificate CA certificate See Also crypto otp on page 456 display crypto ca-certificate display crypto ca-certificate 459 Displays information about the certificate authority’s PEM-encoded PKCS #7 certificate. Syntax — display crypto ca-certificate {admin | eap | webaaa} admin — Displays information about the certificate authority’s certificate that signed the administrative certificate for the WX switch. The administrative certificate authenticates the WX to 3WXM or Web Manager. eap — Displays information about the certificate authority’s certificate that signed the Extensible Authentication Protocol (EAP) certificate for the WX switch. The EAP certificate authenticates the WX switch to 802.1X supplicants (clients). webaaa — Displays information about the certificate authority’s certificate that signed the WebAAA certificate for the WX switch. The WebAAA certificate authenticates the WX switch to WebAAA clients. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To display information about the certificate of a certificate authority, type the following command: WX4400# display crypto ca-certificate Table 83 describes the fields in the display. Table 83 display crypto ca-certificate Output Fields Description Version Version of the X.509 certificate. Serial Number A unique identifier for the certificate or signature. Subject Name of the certificate owner. Signature Algorithm Algorithm that created the signature, such as RSA MD5 or RSA SHA. 460 CHAPTER 13: CRYPTOGRAPHY COMMANDS Table 83 display crypto ca-certificate Output (continued) Issuer Certificate authority that issued the certificate or signature. Validity Time period for which the certificate is valid. See Also display crypto certificate crypto ca-certificate on page 448 display crypto certificate on page 460 Displays information about one of the cryptographic certificates installed on the WX switch. Syntax — display crypto certificate {admin | eap | webaaa} admin — Displays information about the administrative certificate that authenticates the WX switch to 3WXM or Web Manager. eap — Displays information about the EAP certificate that authenticates the WX switch to 802.1X supplicants (clients). webaaa — Displays information about the WebAAA certificate that authenticates the WX switch to WebAAA clients. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must have generated a self-signed certificate or obtained a certificate from a certificate authority before displaying information about the certificate. Examples — To display information about a cryptographic certificate, type the following command: WX4400# display crypto certificate eap Table 84 describes the fields of the display. display crypto key ssh 461 Table 84 crypto certificate Output Fields Description Version Version of the X.509 certificate. Serial Number A unique identifier for the certificate or signature. Subject Name of the certificate owner. Signature Algorithm Algorithm that created the signature, such as RSA MD5 or RSA SHA. Issuer Certificate authority that issued the certificate or signature. Validity Time period for which the certificate is valid. See Also display crypto key ssh crypto generate self-signed on page 454 display crypto ca-certificate on page 459 Displays SSH authentication key information. This command displays the checksum (also called a fingerprint) of the public SSH authentication key. When you connect to the WX switch with an SSH client, you can compare the SSH key checksum displayed by the WX switch with the one displayed by the client to verify that you really are connected to the WX switch and not another device. Generally, SSH clients remember the encryption key after the first connection, so you need to check the key only once. Syntax — display crypto key ssh Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To display SSH key information, type the following command: WX4400# display crypto key ssh ec:6f:56:7f:d1:fd:c0:28:93:ae:a4:f9:7c:f5:13:04 See Also crypto generate key on page 451 462 CHAPTER 13: CRYPTOGRAPHY COMMANDS 14 RADIUS AND SERVER GROUP COMMANDS Use RADIUS commands to set up communication between an WX switch and groups of up to four RADIUS servers for remote authentication, authorization, and accounting (AAA) of administrators and network users. Commands by Usage This chapter presents RADIUS commands alphabetically. Use Table 85 to locate commands in this chapter based on their uses. Table 85 RADIUS Commands by Usage Type Command RADIUS Client set radius client system-ip on page 469 clear radius client system-ip on page 465 RADIUS Servers set radius on page 468 set radius server on page 472 clear radius on page 464 clear radius server on page 467 Server Groups set server group on page 474 set server group load-balance on page 475 clear server group on page 467 RADIUS Proxy set radius proxy client on page 470 set radius proxy port on page 471 clear radius proxy client on page 466 clear radius proxy port on page 466 (For information about RADIUS attributes, see the RADIUS appendix in the Wireless LAN Switch and Controller Configuration Guide.) 464 CHAPTER 14: RADIUS AND SERVER GROUP COMMANDS clear radius Resets parameters that were globally configured for RADIUS servers to their default values. Syntax — clear radius {deadtime | key | retransmit | timeout } deadtime — Number of minutes to wait after declaring an unresponsive RADIUS server unavailable before retrying the RADIUS server. key — Password (shared secret key) used to authenticate to the RADIUS server. retransmit — Number of transmission attempts made before declaring an unresponsive RADIUS server unavailable. timeout — Number of seconds to wait for the RADIUS server to respond before retransmitting. Defaults — Global RADIUS parameters have the following default values: deadtime—0 (zero) minutes (The WX switch does not designate unresponsive RADIUS servers as unavailable.) key—No key retransmit—3 (the total number of attempts, including the first attempt) timeout—5 seconds Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To override the globally set values on a particular RADIUS server, use the set radius server command. Examples — To reset all global RADIUS parameters to their factory defaults, type the following commands: WX4400# clear radius deadtime success: change accepted. WX4400# clear radius key success: change accepted. WX4400# clear radius retransmit success: change accepted. clear radius client system-ip 465 WX4400# clear radius timeout success: change accepted. See Also clear radius client system-ip set radius on page 468 set radius server on page 472 display aaa on page 217 Removes the WX switch’s system IP address from use as the permanent source address in RADIUS client requests from the switch to its RADIUS server(s). Syntax — clear radius client system-ip Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — The clear radius client system-ip command causes the WX switch to use the IP address of the interface through which it sends a RADIUS client request as the source IP address. The WX switch selects a source interface address based on information in its routing table as the source address for RADIUS packets leaving the switch. Examples — To clear the system IP address as the permanent source address for RADIUS client requests, type the following command: WX4400# clear radius client system-ip success: change accepted. See Also display aaa on page 217 set radius client system-ip on page 469 466 CHAPTER 14: RADIUS AND SERVER GROUP COMMANDS clear radius proxy client Removes a RADIUS proxy client entry for a third-party AP. Syntax — clear radius proxy client all Defaults — None. Access — Enabled. History —Introduced in MSS 4.0. Examples — The following command clears all RADIUS proxy client entries from the switch: WX-1200# clear radius proxy client all success: change accepted. See Also clear radius proxy port set radius proxy client on page 470 Removes a RADIUS proxy port configured for a third-party AP. Syntax — clear radius proxy port all Defaults — None. Access — Enabled. History —Introduced in MSS 4.0. Examples — The following command clears all RADIUS proxy port entries from the switch: WX-1200# clear radius proxy port all success: change accepted. See Also set radius proxy port on page 471 clear radius server clear radius server 467 Removes the named RADIUS server from the WX configuration. Syntax — clear radius server server-name server-name — Name of a RADIUS server configured to perform remote AAA services for the WX switch. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command removes the RADIUS server rs42 from a list of remote AAA servers: WX4400# clear radius server rs42 success: change accepted. See Also clear server group display aaa on page 217 set radius server on page 472 Removes a RADIUS server group from the configuration, or disables load balancing for the group. Syntax — clear server group group-name [load-balance] group-name — Name of a RADIUS server group configured to perform remote AAA services for WX switches. load-balance — Ability of group members to share demand for services among servers. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Deleting a server group removes the server group from the configuration. However, the members of the server group remain. 468 CHAPTER 14: RADIUS AND SERVER GROUP COMMANDS Examples — To remove the server group sg-77 type the following command: WX4400# clear server group sg-77 success: change accepted. To disable load balancing in a server group shorebirds, type the following command: WX4400# set server group shorebirds load-balance disable success: change accepted. See Also set radius set server group on page 474 Configures global defaults for RADIUS servers that do not explicitly set these values themselves. By default, the WX switch automatically sets all these values except the password (key). Syntax — set radius {deadtime minutes | key string | retransmit number | timeout seconds} deadtime minutes — Number of minutes the WX switch waits after declaring an unresponsive RADIUS server unavailable before retrying the RADIUS server. You can specify from 0 to 1440 minutes. key string — Password (shared secret key) used to authenticate to the RADIUS server. You must provide the same password that is defined on the RADIUS server. The password can be 1 to 32 characters long, with no spaces or tabs. retransmit number — Number of transmission attempts the WX switch makes before declaring an unresponsive RADIUS server unavailable. You can specify from 1 to 100 retries. timeout seconds — Number of seconds the WX switch waits for the RADIUS server to respond before retransmitting. You can specify from 1 to 65,535. Defaults — Global RADIUS parameters have the following default values: deadtime — 0 (zero) minutes (The WX switch does not designate unresponsive RADIUS servers as unavailable.) key — No key set radius client system-ip 469 retransmit — 3 (the total number of attempts, including the first attempt) timeout — 5 seconds Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You can specify only one parameter per command line. Examples — The following commands sets the dead time to 5 minutes, the RADIUS key to goody, the number of retransmissions to 1, and the timeout to 21 seconds on all RADIUS servers connected to the WX switch: WX1200# set radius deadtime 5 success: change accepted. WX1200# set radius key goody success: change accepted. WX1200# set radius retransmit 1 success: change accepted. WX1200# set radius timeout 21 success: change accepted. See Also set radius client system-ip clear radius server on page 467 display aaa on page 217 set radius server on page 472 Causes all RADIUS requests to be sourced from the IP address specified by the set system ip-address command, providing a permanent source IP address for RADIUS packets sent from the WX switch. Syntax — set radius client system-ip Defaults — None. If you do not use this command, RADIUS packets leaving the WX have the source IP address of the outbound interface, which can change as routing conditions change. Examples — Enabled. History —Introduced in MSS Version 3.0. 470 CHAPTER 14: RADIUS AND SERVER GROUP COMMANDS Usage — The WX system IP address must be set before you use this command. Examples — The following command sets the WX system IP address as the address of the RADIUS client: WX4400# set radius client system-ip success: change accepted. See Also set radius proxy client clear radius client system-ip on page 465 set system ip-address on page 57 Adds a RADIUS proxy entry for a third-party AP. The proxy entry specifies the IP address of the AP and the UDP port on which the WX switch listens for RADIUS traffic from the AP. Syntax — set radius proxy client address ip-address [port udp-port-number] key string address ip-address — IP address of the third-party AP. Enter the address in dotted decimal notation. port udp-port-number — UDP port on which the WX switch listens for RADIUS traffic from the AP. key string — Password (shared secret key) the WX switch uses to authenticate and encrypt RADIUS communication. Defaults — The default UDP port number is 1812. Access — Enabled. History —Introduced in MSS 4.0. Usage — AAA for third-party AP users has additional configuration requirements. See the “Configuring AAA for Users of Third-Party APs” section in the “Configuring AAA for Network Users” chapter of the Wireless LAN Switch and Controller Configuration Guide. Examples — The following command configures a RADIUS proxy entry for a third-party AP RADIUS client at 10.20.20.9, sending RADIUS traffic to the default UDP port 1812 on the WX: set radius proxy port 471 WX-1200# set radius proxy client address 10.20.20.9 key radkey1 success: change accepted. See Also set radius proxy port clear radius proxy client on page 466 set authentication proxy on page 238 set radius proxy port on page 471 Configures the WX port connected to a third-party AP as a RADIUS proxy for the SSID supported by the AP. Syntax — set radius proxy port port-list [tag tag-value] ssid ssid-name port-list — WX port(s) connected to the third-party AP. tag tag-value — 802.1Q tag value in packets sent by the third-party AP for the SSID. ssid ssid-name — SSID supported by the third-party AP. Defaults — None. Access — Enabled. History —Introduced in MSS 4.0. Usage — AAA for third-party AP users has additional configuration requirements. See the “Configuring AAA for Users of Third-Party APs” section in the “Configuring AAA for Network Users” chapter of the Wireless LAN Switch and Controller Configuration Guide. Enter a separate command for each SSID, and its tag value, you want the WX to support. Examples — The following command maps SSID mycorp to packets received on port 3 or 4, using 802.1Q tag value 104: WX-1200# set radius proxy port 3-4 tag 104 ssid mycorp success: change accepted. 472 CHAPTER 14: RADIUS AND SERVER GROUP COMMANDS See Also set radius server clear radius proxy port on page 466 set authentication proxy on page 238 set radius proxy client on page 470 Configures RADIUS servers and their parameters. By default, the WX switch automatically sets all these values except the password (key). Syntax — set radius server server-name [address ip-address] [auth-port port-number] [acct-port port-number] [timeout seconds] [retransmit number] [deadtime minutes] [key string] [author-password password] server-name — Unique name for this RADIUS server. Enter an alphanumeric string of up to 32 characters, with no blanks. address ip-address — IP address of the RADIUS server. Enter the address in dotted decimal notation. auth-port port-number — UDP port that the WX switch uses for authentication and authorization. acct-port port-number — UDP port that the WX switch uses for accounting. timeout seconds — Number of seconds the WX switch waits for the RADIUS server to respond before retransmitting. You can specify from 1 to 65,535 seconds. retransmit number — Number of transmission attempts made before declaring an unresponsive RADIUS server unavailable. You can specify from 1 to 100 retries. deadtime minutes — Number of minutes the WX switch waits after declaring an unresponsive RADIUS server unavailable before retrying that RADIUS server. Specify between 0 (zero) and 1440 minutes (24 hours). A zero value causes the switch to identify unresponsive servers as available. key string — Password (shared secret key) the WX switch uses to authenticate to the RADIUS server. You must provide the same password that is defined on the RADIUS server. The password can be 1 to 32 characters long, with no spaces or tabs. set radius server 473 author-password password — Password used for authorization to a RADIUS server for MAC users. Specify a password of up to 32 alphanumeric characters with no spaces or tabs. Defaults — Default values are listed below: auth-port — UDP port 1812 acct-port — UDP port 1813 timeout — 5 seconds retransmit — 3 (the total number of attempts, including the first attempt) deadtime — 0 (zero) minutes (The WX switch does not designate unresponsive RADIUS servers as unavailable.) key — No key author-password — When using RADIUS for authentication, a MAC user’s MAC address is also used as the default authorization password for that user, and no global authorization password is set. A last-resort user’s default authorization password is 3Com. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — For a given RADIUS server, the first instance of this command must set both the server name and the IP address and can include any or all of the other optional parameters. Subsequent instances of this command can be used to set optional parameters for a given RADIUS server. To configure the server as a remote authenticator for the WX switch, you must add it to a server group with the set server group command. Do not use the same name for a RADIUS server and a RADIUS server group. Examples — To set a RADIUS server named RS42 with IP address 198.162.1.1 to use the default accounting and authorization ports with a timeout interval of 30 seconds, two transmit attempts, 5 minutes of dead time, and a key string of keys4u, type the following command: WX1200# set radius server RS42 address 198.162.1.1 timeout 30 retransmit 2 deadtime 5 key keys4U 474 CHAPTER 14: RADIUS AND SERVER GROUP COMMANDS See Also set server group display aaa on page 217 set authentication admin on page 226 set authentication console on page 228 set authentication dot1x on page 230 set authentication last-resort on page 234 set authentication mac on page 236 set authentication web on page 239 set radius on page 468 set server group on page 474 Configures a group of one to four RADIUS servers. Syntax — set server group group-name members server-name1 [server-name2] [server-name3] [server-name4] group-name — Server group name of up to 32 characters, with no spaces or tabs. members server-name1, server-name2, server-name3, server-name4 — The names of one or more configured RADIUS servers. You can enter up to four server names. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You must assign all group members simultaneously, as shown in the example. To enable load balancing, use set server group load-balance enable. Do not use the same name for a RADIUS server and a RADIUS server group. Examples — To set server group shorebirds with members heron, egret, and sandpiper, type the following command: WX1200# set server group shorebirds members heron egret set server group load-balance 475 sandpiper success: change accepted. See Also set server group load-balance clear server group on page 467 display aaa on page 217 set server group load-balance on page 475 Enables or disables load balancing among the RADIUS servers in a server group. Syntax — set server group group-name load-balance {enable | disable} group-name — Server group name of up to 32 characters. load-balance enable | disable — Enables or disables load balancing of authentication requests among the servers in the group. Defaults — Load balancing is disabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You can optionally enable load balancing after assigning the server group members. If you configure load balancing, MSS sends each AAA request to a separate server, starting with the first one on the list and skipping unresponsive servers. If no server in the group responds, MSS moves to the next method configured with set authentication and set accounting. In contrast, if load balancing is not configured, MSS always begins with the first server in the list and sends unfulfilled requests to each subsequent server in the group before moving on to the next configured AAA method. Examples — To enable load balancing between the members of server group shorebirds, type the following command: WX1200# set server group shorebirds load-balance enable success: change accepted. 476 CHAPTER 14: RADIUS AND SERVER GROUP COMMANDS To disable load balancing between shorebirds server group members, type the following command: WX1200# set server group shorebirds load-balance disable success: change accepted. See Also clear server group on page 467 clear radius server on page 467 display aaa on page 217 set server group on page 474 15 802.1X MANAGEMENT COMMANDS Use 802. IEEE X management commands to modify the default settings for IEEE 802.1X sessions on an WX switch. For best results, change the settings only if you are aware of a problem with the WX switch’s 802.1X performance. CAUTION: 802.1X parameter settings are global for all SSIDs configured on the switch. Commands by Usage This chapter presents 802.1X commands alphabetically. Use Table 86 to locate commands in this chapter based on their use. For information about configuring 802.1X commands for user authentication, see “AAA Commands” on page 199. Table 86 802.1X Commands by Usage Type Command Wired Authentication Port Control set dot1x port-control on page 490 clear dot1x port-control on page 479 set dot1x authcontrol on page 486 Keys set dot1x key-tx on page 488 set dot1x tx-period on page 494 clear dot1x tx-period on page 483 set dot1x wep-rekey on page 495 set dot1x wep-rekey-period on page 496 Bonded Authentication clear dot1x bonded-period on page 478 set dot1x bonded-period on page 487 Reauthentication set dot1x reauth on page 491 set dot1x reauth-max on page 492 478 CHAPTER 15: 802.1X MANAGEMENT COMMANDS Table 86 802.1X Commands by Usage (continued) Type Command Reauthentication, cont. clear dot1x reauth-max on page 481 set dot1x reauth-period on page 493 clear dot1x reauth-period on page 481 Retransmission set dot1x max-req on page 489 clear dot1x max-req on page 479 Quiet Period and Timeouts set dot1x quiet-period on page 491 clear dot1x quiet-period on page 480 set dot1x timeout auth-server on page 493 clear dot1x timeout auth-server on page 482 set dot1x timeout supplicant on page 494 clear dot1x timeout supplicant on page 482 Settings, Active Clients, and Statistics clear dot1x bonded-period display dot1x on page 483 Resets the Bonded Auth period to its default value. Syntax — clear dot1x bonded-period Defaults — The default bonded authentication period is 0 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To reset the Bonded period to its default, type the following command: WX4400# clear dot1x bonded-period success: change accepted. See Also display dot1x on page 483 set dot1x bonded-period on page 487 clear dot1x max-req clear dot1x max-req 479 Resets to the default setting the number of Extensible Authentication Protocol (EAP) requests that the WX switch retransmits to a supplicant (client). Syntax — clear dot1x max-req Defaults — The default number is 20. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To reset the number of 802.1X requests the WX can send to the default setting, type the following command: WX4400# clear dot1x max-req success: change accepted. See Also clear dot1x port-control display dot1x on page 483 set dot1x max-req on page 489 Resets all wired authentication ports on the WX switch to default 802.1X authentication. Syntax — clear dot1x port-control By default, all wired authentication ports are set to auto and they process authentication requests as determined by the set authentication dot1X command. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command is overridden by the set dot1x authcontrol command. The clear dot1x port-control command returns port control to the method configured. This command applies only to wired authentication ports. 480 CHAPTER 15: 802.1X MANAGEMENT COMMANDS Examples — Type the following command to reset the wired authentication port control: WX4400# clear dot1x port-control success: change accepted. See Also clear dot1x quiet-period display dot1x on page 483 set dot1x port-control on page 490 Resets the quiet period after a failed authentication to the default setting. Syntax — clear dot1x quiet-period Defaults — The default is 60 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — Type the following command to reset the 802.1X quiet period to the default: WX4400# clear dot1x quiet-period success: change accepted. See Also display dot1x on page 483 set dot1x quiet-period on page 491 clear dot1x reauth-max clear dot1x reauth-max Resets the maximum number of reauthorization attempts to the default setting. Syntax — clear dot1x reauth-max Defaults — The default is 2 attempts. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — Type the following command to reset the maximum number of reauthorization attempts to the default: WX4400# clear dot1x reauth-max success: change accepted. See Also clear dot1x reauth-period 481 display dot1x on page 483 set dot1x reauth-max on page 492 Resets the time period that must elapse before a reauthentication attempt, to the default time period. Syntax — clear dot1x reauth-period Defaults — The default is 3600 seconds (1 hour). Access — Enabled. History —Introduced in MSS Version 3.0. Examples — Type the following command to reset the default reauthentication time period: WX4400# clear dot1x reauth-period success: change accepted. See Also display dot1x on page 483 set dot1x reauth-period on page 493 482 CHAPTER 15: 802.1X MANAGEMENT COMMANDS clear dot1x timeout auth-server Resets to the default setting the number of seconds that must elapse before the WX times out a request to a RADIUS server. Syntax — clear dot1x timeout auth-server Defaults — The default is 30 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To reset the default timeout for requests to an authentication server, type the following command: WX4400# clear dot1x timeout auth-server success: change accepted. See Also clear dot1x timeout supplicant display dot1x on page 483 set dot1x timeout auth-server on page 493 Resets to the default setting the number of seconds that must elapse before the WX switch times out an authentication session with a supplicant (client). Syntax — clear dot1x timeout supplicant Defaults — The default for the authentication timeout sessions is 30 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — Type the following command to reset the timeout period for an authentication session: WX4400# clear dot1x timeout supplicant success: change accepted. See Also display dot1x on page 483 set dot1x timeout supplicant on page 494 clear dot1x tx-period clear dot1x tx-period 483 Resets to the default setting the number of seconds that must elapse before the WX switch retransmits an EAP over LAN (EAPoL) packet. Syntax — clear dot1x tx-period Defaults — The default is 5 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — Type the following command to reset the EAPoL retransmission time: WX4400# clear dot1x tx-period success: change accepted. See Also display dot1x display dot1x on page 483 set dot1x tx-period on page 494 Displays 802.1X client information for statistics and configuration settings. Syntax — display dot1x {clients | stats | config} clients — Displays information about active 802.1X clients, including client name, MAC address, and state. stats — Displays global 802.1X statistics associated with connecting and authenticating. config — Displays a summary of the current configuration. Defaults — None. Access — Enabled. 484 CHAPTER 15: 802.1X MANAGEMENT COMMANDS History —Introduced in MSS Version 3.0. Format of 802.1X authentication rule information in display dot1x config output changed in MSS Version 3.2. The rules are still listed at the top of the display, but more information is shown for each rule. Examples — Type the following command to display the 802.1X clients: WX4400# display dot1x clients MAC Address State ------------------00:20:a6:48:01:1f Connecting 00:05:3c:07:6d:7c Authenticated 00:05:5d:7e:94:83 Authenticated 00:02:2d:86:bd:38 Authenticated 00:05:5d:7e:97:b4 Authenticated 00:05:5d:7e:98:1a Authenticated 00:0b:be:a9:dc:4e Authenticated 00:05:5d:7e:96:e3 Authenticated 00:02:2d:6f:44:77 Authenticated 00:05:5d:7e:94:89 Authenticated 00:06:80:00:5c:02 Authenticated 00:02:2d:6a:de:f2 Authenticated 00:02:2d:5e:5b:76 Authenticated 00:02:2d:80:b6:e1 Authenticated 00:30:65:16:8d:69 Authenticated 00:02:2d:64:8e:1b Authenticated Vlan -----(unknown) vlan-it vlan-eng vlan-eng vlan-eng vlan-eng vlan-pm vlan-eng vlan-eng vlan-eng vlan-eng vlan-pm vlan-pm vlan-cs vlan-wep vlan-eng Identity ---------EXAMPLE\jose EXAMPLE\singh bard@xmple.com EXAMPLE\havel EXAMPLE\nash xalik@xmple.com EXAMPLE\mishan EXAMPLE\ethan EXAMPLE\fmarshall EXAMPLE\bmccarthy neailey@xmple.com EXAMPLE\tamara dmc@xmple.com MAC authenticated EXAMPLE\wong Type the following command to display the 802.1X configuration: WX1200# display dot1x config 802.1X user policy ---------------------'host/bob-laptop.mycorp.com' on ssid 'mycorp' doing PASSTHRU 'bob.mycorp.com' on ssid 'mycorp' doing PASSTHRU (bonded) display dot1x 802.1X parameter ---------------supplicant timeout auth-server timeout quiet period transmit period reauthentication period maximum requests key transmission reauthentication authentication control WEP rekey period WEP rekey Bonded period port port port port 5, 6, 7, 8, authcontrol: authcontrol: authcontrol: authcontrol: auto, auto, auto, auto, setting ------30 30 5 5 3600 2 enabled enabled enabled 1800 enabled 60 max-sessions: max-sessions: max-sessions: max-sessions: 16 1 1 1 Type the following command to display 802.1X statistics: WX4400# display dot1x stats 802.1X statistic ---------------Enters Connecting: Logoffs While Connecting: Enters Authenticating: Success While Authenticating: Timeouts While Authenticating: Failures While Authenticating: Reauths While Authenticating: Starts While Authenticating: Logoffs While Authenticating: Starts While Authenticated: Logoffs While Authenticated: Bad Packets Received: value ----709 112 467 0 52 0 0 31 0 85 1 0 Table 87 explains the counters in the display dot1x stats output. 485 486 CHAPTER 15: 802.1X MANAGEMENT COMMANDS Table 87 display dot1x stats Output Field Description Enters Connecting Number of times that the WX switch state transitions to the CONNECTING state from any other state. Logoffs While Connecting Number of times that the WX switch state transitions from CONNECTING to DISCONNECTED as a result of receiving an EAPoL-Logoff message. Enters Authenticating Number of times that the state wildcard transitions. Success While Authenticating Number of times the WX switch state transitions from AUTHENTICATING from AUTHENTICATED, as a result of an EAP-Response/Identity message being received from the supplicant (client). Timeouts While Authenticating Number of times that the WX switch state wildcard transitions from AUTHENTICATING to ABORTING. Failures While Authenticating Number of times that the WX switch state wildcard transitions from AUTHENTICATION to HELD. Reauths While Authenticating Number of times that the WX switch state wildcard transitions from AUTHENTICATING to ABORTING, as a result of a reauthentication request (reAuthenticate = TRUE). Starts While Authenticating Number of times that the WX switch state wildcard transitions from AUTHENTICATING to ABORTING, as a result of an EAPoL-Start message being received from the Supplicant (client). Logoffs While Authenticating Number of times that the WX switch state wildcard transitions from AUTHENTICATING to ABORTING, as a result of an EAPoL-logoff message being received from the Supplicant (client). Bad Packets Received Number of EAPoL packets received that have an invalid version or type. set dot1x authcontrol Provides a global override mechanism for 802.1X authentication configuration on wired authentication ports. Syntax — set dot1x authcontrol {enable | disable} enable — Allows all wired authentication ports running 802.1X to use the authentication specified per port by the set dot1X port-control command. disable — Forces all wired authentication ports running 802.1X to unconditionally accept all 802.1X authentication attempts with an EAP Success message (ForceAuth). set dot1x bonded-period 487 Defaults — By default, authentication control for individual wired authentication is enabled. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command applies only to wired authentication ports. Examples — To enable per-port 802.1X authentication on wired authentication ports, type the following command: WX4400# set dot1x authcontrol enable success: dot1x authcontrol enabled. See Also set dot1x bonded-period display dot1x on page 483 set dot1x port-control on page 490 Changes the Bonded Auth™ (bonded authentication) period, which is the number of seconds MSS retains session information for an authenticated machine while waiting for the 802.1X client on the machine to start (re)authentication for the user. You must set the bonded period to longer than 0 seconds to enable bonded authentication. Syntax — set dot1x bonded-period seconds seconds — Number of seconds MSS retains session information for an authenticated machine while waiting for a client to (re)authenticate on the same machine. You can change the bonded authentication period to a value from 1 to 300 seconds. Defaults — The default bonded period is 0 seconds, which disables the feature. Access — Enabled. History —Introduced in MSS Version 3.0. 488 CHAPTER 15: 802.1X MANAGEMENT COMMANDS Usage — Normally, the Bonded Auth period needs to be set only if the network has Bonded Auth clients that use dynamic WEP, or use WEP-40 or WEP-104 encryption with WPA or RSN. These clients can be affected by the 802.1X reauthentication parameter or the RADIUS Session-Timeout parameter. 3Com recommends that you try 60 seconds, and change the period to a longer value only if clients are unable to authenticate within 60 seconds. The bonded authentication period applies only to 802.1X authentication rules that contain the bonded option. Examples — To set the bonded authentication period to 60 seconds, type the following command: WX4400# set dot1x bonded-period 60 success: change accepted. See Also set dot1x key-tx display dot1x on page 483 clear dot1x bonded-period on page 478 Enables or disables the transmission of encryption key information to the supplicant (client) in EAP over LAN (EAPoL) key messages, after authentication is successful. Syntax — set dot1x key-tx {enable | disable} enable — Enables transmission of encryption key information to clients. disable — Disables transmission of encryption key information to clients. Defaults — Key transmission is enabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. set dot1x max-req 489 Examples — Type the following command to enable key transmission: WX4400# set dot1x key-tx enable success: dot1x key transmission enabled. See Also set dot1x max-req display dot1x on page 483 Sets the maximum number of times the WX retransmits an EAP request to a supplicant (client) before ending the authentication session. Syntax — set dot1x max-req number-of-retransmissions number-of-retransmissions — Specify a value between 0 and 10. Defaults — The default number of EAP retransmissions is 2. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To support SSIDs that have both 802.1X and static WEP clients, MSS sends a maximum of two ID requests, even if this parameter is set to a higher value. Setting the parameter to a higher value does affect all other types of EAP messages. Examples — Type the following command to set the maximum number of EAP request retransmissions to three attempts: WX4400# set dot1x max-req 3 success: dot1x max request set to 3. See Also clear dot1x max-req on page 479 display dot1x on page 483 490 CHAPTER 15: 802.1X MANAGEMENT COMMANDS set dot1x port-control Determines the 802.1X authentication behavior on individual wired authentication ports or groups of ports. Syntax — set dot1x port-control {forceauth | forceunauth | auto} port-list forceauth — Forces the specified wired authentication port(s) to unconditionally authorize all 802.1X authentication attempts, with an EAP success message. forceunauth — Forces the specified wired authentication port(s) to unconditionally reject all 802.1X authentication attempts with an EAP failure message. auto — Allows the specified wired authentication ports to process 802.1X authentication normally as determined for the user by the set authentication dot1X command. port-list — One or more wired authentication ports for which to set 802.1X port control. Defaults — By default, wired authentication ports are set to auto. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command affects only wired authentication ports. Examples — The following command forces port 1 to unconditionally accept all 802.1X authentication attempts: WX4400# set dot1x port-control forceauth 1 success: authcontrol for 1 is set to FORCE-AUTH. See Also display port status on page 70 display dot1x on page 483 set dot1x quiet-period set dot1x quiet-period 491 Sets the number of seconds an WX remains quiet and does not respond to a supplicant after a failed authentication. Syntax — set dot1x quiet-period seconds seconds — Specify a value between 0 and 65,535. Defaults — The default is 60 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — Type the following command to set the quiet period to 90 seconds: WX4400# set dot1x quiet-period 90 success: dot1x quiet period set to 90. See Also set dot1x reauth clear dot1x quiet-period on page 480 set dot1x wep-rekey-period on page 496 Determines whether the WX switch allows the reauthentication of supplicants (clients). Syntax — set dot1x reauth {enable | disable} enable — Permits reauthentication. disable — Denies reauthentication. Defaults — Reauthentication is enabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — Type the following command to enable reauthentication of supplicants (clients): WX4400# set dot1x reauth enable success: dot1x reauthentication enabled. 492 CHAPTER 15: 802.1X MANAGEMENT COMMANDS See Also set dot1x reauth-max display dot1x on page 483 set dot1x reauth-max on page 492 set dot1x reauth-period on page 493 Sets the number of reauthentication attempts that the WX switch makes before the supplicant (client) becomes unauthorized. Syntax — set dot1x reauth-max number-of-attempts number-of-attempts — Specify a value between 1 and 10. Defaults — The default number of reauthentication attempts is 2. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — If the number of reauthentications for a wired authentication client is greater than the maximum number of reauthentications allowed, MSS sends an EAP failure packet to the client and removes the client from the network. However, MSS does not remove a wireless client from the network under these circumstances. Examples — Type the following command to set the number of authentication attempts to 8: WX4400# set dot1x reauth-max 8 success: dot1x max reauth set to 8. See Also display dot1x on page 483 clear dot1x reauth-max on page 481 set dot1x reauth-period set dot1x reauth-period 493 Sets the number of seconds that must elapse before the WX switch attempts reauthentication. Syntax — set dot1x reauth-period seconds seconds — Specify a value between 60 (1 minute) and 1,641,600 (19 days). Defaults — The default is 3600 seconds (1 hour). Access — Enabled. History —Introduced in MSS Version 3.0. Examples — Type the following command to set the number of seconds to 100 before reauthentication is attempted: WX4400# set dot1x reauth-period 100 success: dot1x auth-server timeout set to 100. See Also set dot1x timeout auth-server display dot1x on page 483 clear dot1x reauth-period on page 481 Sets the number of seconds that must elapse before the WX switch times out a request to a RADIUS authentication server. Syntax — set dot1x timeout auth-server seconds seconds — Specify a value between 1 and 65,535. Defaults — The default is 30 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — Type the following command to set the authentication server timeout to 60 seconds: WX4400# set dot1x timeout auth-server 60 success: dot1x auth-server timeout set to 60. 494 CHAPTER 15: 802.1X MANAGEMENT COMMANDS See Also set dot1x timeout supplicant display dot1x on page 483 clear dot1x timeout auth-server on page 482 Sets the number of seconds that must elapse before the WX switch times out an authentication session with a supplicant (client). Syntax — set dot1x timeout supplicant seconds seconds — Specify a value between 1 and 65,535. Defaults — The default is 30 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — Type the following command to set the number of seconds for authentication session timeout to 300: WX4400# set dot1x timeout supplicant 300 success: dot1x supplicant timeout set to 300. See Also set dot1x tx-period display dot1x on page 483 clear dot1x timeout auth-server on page 482 Sets the number of seconds that must elapse before the WX switch retransmits an EAPoL packet. Syntax — set dot1x tx-period seconds seconds — Specify a value between 1 and 65,535. Defaults — The default is 5 seconds. Access — Enabled. History —Introduced in MSS Version 3.0. set dot1x wep-rekey 495 Examples — Type the following command to set the number of seconds before the WX switch retransmits an EAPoL packet to 300: WX4400# set dot1x tx-period 300 success: dot1x tx-period set to 300. See Also set dot1x wep-rekey display dot1x on page 483 clear dot1x tx-period on page 483 Enables or disables Wired Equivalency Privacy (WEP) rekeying for broadcast and multicast encryption keys. Syntax — set dot1X wep-rekey {enable | disable} enable — Causes the broadcast and multicast keys for WEP to be rotated at an interval set by the set dot1x wep-rekey-period for each radio, associated VLAN, and encryption type. The WX generates the new broadcast and multicast keys and pushes the keys to the clients via EAPoL key messages. disable — WEP broadcast and multicast keys are never rotated. Defaults — WEP key rotation is enabled, by default. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Reauthentication is not required for WEP key rotation to take place. Broadcast and multicast keys are always rotated at the same time, so all members of a given radio, VLAN, or encryption type receive the new keys at the same time. Examples — Type the following command to disable WEP key rotation: WX4400# set dot1x wep-rekey disable success: wep rekeying disabled See Also display dot1x on page 483 set dot1x wep-rekey-period on page 496 496 CHAPTER 15: 802.1X MANAGEMENT COMMANDS set dot1x wep-rekey-period Sets the interval for rotating the WEP broadcast and multicast keys. Syntax — set dot1x wep-rekey-period seconds seconds — Specify a value between 30 and 1,641,600 (19 days). Defaults — The default is 1800 seconds (30 minutes). Access — Enabled. History —Introduced in MSS Version 3.0. Examples — Type the following command to set the WEP-rekey period to 300 seconds: WX4400# set dot1x wep-rekey-period 300 success: dot1x wep-rekey-period set to 300 See Also display dot1x on page 483 set dot1x wep-rekey on page 495 16 SESSION MANAGEMENT COMMANDS Use session management commands to display and clear administrative and network user sessions. Commands by Usage This chapter presents session management commands alphabetically. Use Table 88 to locate commands in this chapter based on their use. Table 88 Session Management Commands by Usage Type Command Administrative Sessions display sessions on page 500 clear sessions on page 497 Network Sessions display sessions network on page 503 clear sessions network on page 498 clear sessions Clears all administrative sessions, or clears administrative console or Telnet sessions. Syntax — clear sessions {admin | console | telnet [client [session-id]]} admin — Clears sessions for all users with administrative access to the WX switch through a Telnet or SSH connection or a console plugged into the switch. console — Clears sessions for all users with administrative access to the WX switch through a console plugged into the switch. telnet — Clears sessions for all users with administrative access to the WX switch through a Telnet connection. telnet client [session-id] — Clears all Telnet client sessions from the CLI to remote devices, or clears an individual session identified by session ID. 498 CHAPTER 16: SESSION MANAGEMENT COMMANDS Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To clear all administrator sessions type the following command: WX4400# clear sessions admin This will terminate manager sessions, do you wish to continue? (y|n) [n]y To clear all administrative sessions through the console, type the following command: WX4400# clear sessions console This will terminate manager sessions, do you wish to continue? (y|n) [n]y To clear all administrative Telnet sessions, type the following command: WX4400# clear sessions telnet This will terminate manager sessions, do you wish to continue? (y|n) [n]y To clear Telnet client session 0, type the following command: WX4400# clear sessions telnet client 0 See Also clear sessions network display sessions on page 500 Clears all network sessions for a specified username or set of usernames, MAC address or set of MAC addresses, virtual LAN (VLAN) or set of VLANs, or session ID. Syntax — clear sessions network {user user-glob | mac-addr mac-addr-glob | vlan vlan-glob | session-id local-session-id} user user-glob — Clears all network sessions for a single user or set of users. clear sessions network 499 Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character—either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) mac-addr mac-addr-glob — Clears all network sessions for a MAC address. Specify a MAC address in hexadecimal numbers separated by colons (:), or use the wildcard character (*) to specify a set of MAC addresses. (For details, see “MAC Address Globs” on page 27.) vlan vlan-glob — Clears all network sessions on a single VLAN or a set of VLANs. Specify a VLAN name, use the double-asterisk wildcard character (**) to specify all VLAN names, or use the single-asterisk wildcard character (*) to specify a set of VLAN names up to or following the first delimiter character, either an at sign (@) or a period (.). (For details, see “VLAN Globs” on page 28.) session-id local-session-id — Clears the specified 802.1X network session. To find local session IDs, use the display sessions command. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — The clear sessions network command clears network sessions by deauthenticating and, for wireless clients, disassociating them. Examples — To clear all sessions for MAC address 00:01:02:03:04:05, type the following command: WX4400# clear sessions network mac-addr 00:01:02:03:04:05 To clear session 9, type the following command: WX1200# clear sessions network session-id 9 SM Apr 11 19:53:38 DEBUG SM-STATE: localid 9, mac 00:06:25:09:39:5d, flags 0000012fh, to change state to KILLING Localid 9, globalid SESSION-9-893249336 moved from ACTIVE to KILLING (client=00:06:25:09:39:5d) 500 CHAPTER 16: SESSION MANAGEMENT COMMANDS To clear the session of user Natasha, type the following command: WX1200# clear sessions network user Natasha To clear the sessions of users whose name begins with the characters Jo, type the following command: WX1200# clear sessions network user Jo* To clear the sessions of all users on VLAN red, type the following command: WX1200# clear sessions network vlan red See Also display sessions display sessions on page 500 display sessions network on page 503 Displays session information and statistics for all users with administrative access to the WX switch, or for administrative users with either console or Telnet access. Syntax — display sessions {admin | console | telnet [client]} admin — Displays sessions for all users with administrative access to the WX switch through a Telnet or SSH connection or a console plugged into the switch. console — Displays sessions for all users with administrative access to the WX switch through a console plugged into the switch. telnet — Displays sessions for all users with administrative access to the WX switch through a Telnet connection. telnet client — Displays Telnet sessions from the CLI to remote devices. Defaults — None. Access — All, except for display sessions telnet client, which has enabled access. History —Introduced in MSS Version 3.0. display sessions 501 Examples — To view information about sessions of administrative users, type the following command: WX4400> display sessions admin Tty Username -------------------------tty0 tty2 tech tty3 sshadmin Time (s) -------3644 6 381 Type ---Console Telnet SSH 3 admin sessions To view information about console users’ sessions, type the following command: WX4400> display sessions console Tty Username -------------------------console 1 console session Time (s) -------8573 To view information about Telnet users sessions, type the following command: WX4400> display sessions telnet Tty Username -------------------------tty2 sea Time (s) -------7395 To view information about Telnet client sessions, type the following command: WX4400# display sessions telnet client Session Server Address Server Port ------------------------------0 192.168.1.81 23 1 10.10.1.22 23 Client Port ----------48000 48001 Table 89 describes the fields of the display sessions admin, display sessions console, and display sessions telnet displays. 502 CHAPTER 16: SESSION MANAGEMENT COMMANDS Table 89 display sessions admin, display sessions console, and display sessions telnet Output Field Description Tty The Telnet terminal number, or console for administrative users connected through the console port. Username Up to 30 characters of the name of an authenticated user. Time (s) Number of seconds the session has been active. Type Type of administrative session: Console SSH Telnet Table 90 describes the fields of the display sessions telnet client display. Table 90 display sessions telnet client Output Field Description Session Session number assigned by MSS when the client session is established. Server Address IP address of the remote device. Server Port TCP port number of the remote device’s TCP server. Client Port TCP port number MSS is using for the client side of the session. See Also clear sessions on page 497 display sessions network display sessions network 503 Displays summary or verbose information about all network sessions, or network sessions for a specified username or set of usernames, MAC address or set of MAC addresses, VLAN or set of VLANs, or session ID. Syntax — display sessions network [user user-glob | mac-addr mac-addr-glob | ssid ssid-name vlan vlan-glob | session-id session-id | wired] [verbose] user user-glob — Displays all network sessions for a single user or set of users. Specify a username, use the double-asterisk wildcard character (**) to specify all usernames, or use the single-asterisk wildcard character (*) to specify a set of usernames up to or following the first delimiter character—either an at sign (@) or a period (.). (For details, see “User Globs” on page 26.) mac-addr mac-addr-glob — Displays all network sessions for a MAC address. Specify a MAC address in hexadecimal numbers separated by colons (:). Or use the wildcard character (*) to specify a set of MAC addresses. (For details, see “MAC Address Globs” on page 27.) ssid ssid-name — Displays all network sessions for an SSID. vlan vlan-glob — Displays all network sessions on a single VLAN or a set of VLANs. Specify a VLAN name, use the double-asterisk wildcard character (**) to specify all VLAN names, or use the single-asterisk wildcard character (*) to specify a set of VLAN names up to or following the first delimiter character, either an at sign (@) or a period (.). (For details, see “VLAN Globs” on page 28.) session-id local-session-id — Displays the specified network session. To find local session IDs, use the display sessions command. The verbose option is not available with this form of the display sessions network command. wired — Displays all network sessions on wired authentication ports. verbose — Provides detailed output for all network sessions or ones displayed by username, MAC address, or VLAN name. Defaults — None. Access — All. 504 CHAPTER 16: SESSION MANAGEMENT COMMANDS History —Introduced in MSS Version 3.0. Usage — MSS displays information about network sessions in three types of displays. See the following tables for field descriptions. Summary display — See Table 91 on page 506. Verbose display — See Table 92 on page 506. display sessions network session-id display — See Table 93 on page 508. Examples — To display summary information for all network sessions, type display sessions network. For example: WX1200# display sessions network User Sess Name ID ------------------------------ ---EXAMPLE\Natasha 4* host/laptop11.exmpl.com 6* nin@exmpl.com 539* EXAMPLE\hosni 302* 563 jose@exmpl.com 380* 00:30:65:16:8d:69 443* EXAMPLE\Geetha 459* 8 sessions total IP or MAC VLAN Port/ Address Name Radio ----------------- --------------- ----10.10.40.17 vlan-eng 3/1 10.10.40.16 vlan-eng 3/2 10.10.40.17 vlan-eng 1/1 10.10.40.10 vlan-eng 3/1 00:0b:be:15:46:56 (none) 1/2 10.30.40.8 vlan-eng 1/1 10.10.40.19 vlan-wep 3/1 10.10.40.18 vlan-eng 3/2 The following command displays summary information about the sessions for MAC address 00:05:5d:7e:98:1a: WX1200# display sessions network mac-addr 00:05:5d:7e:98:1a User Sess IP or MAC VLAN Port/ Name ID Address Name Radio --------------------------- ---- --------------- ------------ ----EXAMPLE\Havel 13* 10.10.10.40 vlan-eng 1/2 The following command displays summary information about all the sessions of users whose names begin with E: WX1200# display sessions network user E* User Sess IP or MAC Name ID Address --------------------------- ---- --------------EXAMPLE\Singh 12* 10.10.10.30 EXAMPLE\Havel 13* 10.10.10.40 2 sessions match criteria (of 3 total) VLAN Port/ Name Radio ------------ ----vlan-eng 3/2 vlan-eng 1/2 display sessions network 505 (Table 91 on page 506 describes the summary displays of display sessions network commands.) The following command displays detailed (verbose) session information about user nin@example.com: WX1200# display sessions network user nin@example.com verbose User Sess IP or MAC VLAN Port/ Name ID Address Name Radio ----------------------------- ---- ----------------- --------------- ----nin@example.com 5* 10.20.30.40 vlan-eng 1/1 Client MAC: 00:02:2d:6e:ab:a5 GID: SESS-5-000430-686792-d8b3c564 State: ACTIVE (prev AUTHORIZED) now on: WX 192.168.12.7, AP/radio 1/1, AP 00:0b:0e:00:05:fe, as of 00:23:32 ago 1 sessions match criteria (of 10 total) The following command displays verbose output about the sessions of all current network users: WX1200# display sessions network verbose User Sess IP or MAC VLAN Name ID Address Name ------------------------------ ---- ----------------- --------------SHUTTLE2\exmpl 6* 10.3.8.55 default Client MAC: 00:06:25:13:08:33 GID: SESS-4-000404-98441-c807c14b State: ACTIVE (prev AUTHORIZED) now on: WX 10.3.8.103, AP/radio 3/1, AP 00:0b:0e:ff:00:3a, as of 00:00:24 ago from: WX 10.3.8.103, AP/radio 6/1, AP 00:0b:0e:00:05:d7, as of 00:01:07 ago from: WX 10.3.8.103, AP/radio 3/1, AP 00:0b:0e:ff:00:3a, as of 00:01:53 ago 1 sessions total Port/ Radio ----3/1 (Table 92 on page 506 describes the additional fields of the verbose output of display sessions network commands.) The following command displays information about network session 27: WX1200# display sessions network session-id 27 Global Id: SESS-27-000430-835586-58dfe5a State: ACTIVE Port/Radio: 3/1 MAC Address: 00:00:2d:6f:44:77 User Name: EXAMPLE Natasha IP Address: 10.10.40.17 Vlan Name: vlan-eng 506 CHAPTER 16: SESSION MANAGEMENT COMMANDS Tag: 1 Session Timeout: 1800 Authentication Method: PEAP, using server 10.10.70.20 Session statistics as updated from AP: Unicast packets in: 653 Unicast bytes in: 46211 Unicast packets out: 450 Unicast bytes out: 50478 Multicast packets in: 317 Multicast bytes in: 10144 Number of packets with encryption errors: 0 Number of bytes with encryption errors: 0 Last packet data rate: 2 Last packet signal strength: -67 dBm Last packet data S/N ratio: 55 Table 91 describes the output of this command. For descriptions of the fields of display sessions network session-id output, see Table 93 on page 508. Table 91 display sessions network (summary) Output Field Description User Name Up to 30 characters of the name of the authenticated user of this session. Sess ID Locally unique number that identifies this session. An asterisk (*) next to the session ID indicates currently active sessions. IP or MAC Address IP address of the session user, or the user’s MAC address if the user has not yet received an IP address. VLAN Name Name of the VLAN associated with the session. Port/Radio Number of the port and radio through which the user is accessing this session. Table 92 Additional display sessions network verbose Output Field Description Client MAC MAC address of the session user. GID Global session ID, a unique session number within a Mobility Domain. display sessions network 507 Table 92 Additional display sessions network verbose Output (continued) Field Description State Status of the session: AUTH, ASSOC REQ — Client is being associated by the 802.1X protocol. AUTH AND ASSOC — Client is being associated by the 802.1X protocol, and the user is being authenticated. AUTHORIZING — User has been authenticated (for example, by the 802.1X protocol and an AAA method), and is entering AAA authorization. AUTHORIZED — User has been authorized by an AAA method. ACTIVE — User’s AAA attributes have been applied, and the user is active on the network. DEASSOCIATED — One of the following: Wireless client has sent the WX switch a disassociate message. User associated with one of the current WX switch’s MAP access points has appeared at another WX switch in the Mobility Domain. ROAMING AWAY — The W switch has been sent a request to transfer the user, who is roaming, to another WX switch. STATUS UPDATED — WX switch is receiving a final update from an MAP access point about the user, who has roamed away. WEB_AUTHING — User is being authenticated by WebAAA. WIRED AUTH’ING — User is being authenticated by the 802.1X protocol on a wired authentication port. KILLING — User’s session is being cleared, because of 802.1X authentication failure, entry of a clear command, or some other event. now on IP address and port and radio numbers of the session’s current WX switch, the MAC address of the MAP access point, and the last update time. from IP address and port and radio numbers of the session’s previous WX switch, the MAC address of the MAP access point, and the last update time. Up to six roaming events are tracked in this display. 508 CHAPTER 16: SESSION MANAGEMENT COMMANDS Table 93 display sessions network session-id Output Field Description Global Id A unique session identifier within the Mobility Domain. State Status of the session: AUTH, ASSOC REQ — Client is being associated by the 802.1X protocol. AUTH AND ASSOC — Client is being associated by the 802.1X protocol, and the user is being authenticated. AUTHORIZING — User has been authenticated (for example, by the 802.1X protocol and an AAA method), and is entering AAA authorization. AUTHORIZED — User has been authorized by an AAA method. ACTIVE — User’s AAA attributes have been applied, and the user is active on the network. DEASSOCIATED — One of the following: Wireless client has sent the WX switch a disassociate message. User associated with one of the current WX switch’s MAP access points has appeared at another WX switch in the Mobility Domain. ROAMING AWAY — The WX switch has been sent a request to transfer the user, who is roaming, to another WX switch. STATUS UPDATED — WX switch is receiving a final update from an MAP access point about the user, who has roamed away. WEB_AUTHING — User is being authenticated by WebAAA. WIRED AUTH’ING — User is being authenticated by the 802.1X protocol on a wired authentication port. KILLING — User’s session is being cleared, because of 802.1X authentication failure, entry of a clear command, or some other event. Port/Radio Number of the port and radio through which the user is accessing this session. MAC address MAC address of the session user. User Name Name of the authenticated user of this session IP Address IP address of the session user. Vlan Name Name of the VLAN associated with the session. Tag System-wide supported VLAN tag type. display sessions network 509 Table 93 display sessions network session-id Output (continued) Field Description Session Timeout Assigned session timeout in seconds. Authentication Extensible Authentication Protocol (EAP) type used to authenticate Method the session user, and the IP address of the authentication server. Session statistics as updated from AP Time the session statistics were last updated from the MAP access point, in seconds since a fixed standard date and time. Unicast packets Total number of unicast packets received from the user by the WX in (64-bit counter). Unicast bytes in Total number of unicast bytes received from the user by the WX (64-bit counter). Unicast packets Total number of unicast packets sent by the WX to the user (64-bit out counter). Unicast bytes out Total number of unicast bytes sent by the WX to the user (64-bit counter). Multicast packets in Total number of multicast packets received from the user by the WX (64-bit counter). Multicast bytes Total number of multicast bytes received from the user by the WX in (64-bit counter). Number of packets with encryption errors Total number of decryption failures. Number of bytes with encryption errors Total number of bytes with decryption errors. Last packet data rate Data transmit rate, in megabits per second (Mbps), of the last packet received by the MAP access point. Last packet Signal strength, in decibels referred to 1 milliwatt (dBm), of the last signal strength packet received by the MAP access point. Last packet data S/N ratio Signal-to-noise ratio of the last packet received by the MAP access point. See Also clear sessions network on page 498 510 CHAPTER 16: SESSION MANAGEMENT COMMANDS 17 RF DETECTION COMMANDS MSS automatically performs RF detection scans on enabled and disabled radios to detect rogue access points. A rogue access point is a BSSID (MAC address associated with an SSID) that does not belong to a 3Com switch and is not a member of the ignore list configured on the seed switch of the Mobility Domain. MSS can issue countermeasures against rogue devices to prevent clients from being able to use them. You can configure RF detection parameters on individual WX switches. Commands by Usage This chapter presents RF detection commands alphabetically. Use Table 94 to locate the commands in this chapter based on their use. Table 94 RF Detection Commands by Usage Type Command Rogue Information display rfdetect clients on page 535 display rfdetect mobility-domain on page 521 display rfdetect data on page 518 display rfdetect visible on page 526 display rfdetect counters on page 515 Countermeasures display rfdetect countermeasures on page 517 Permitted Vendor List set rfdetect vendor-list on page 533 display rfdetect vendor-list on page 525 clear rfdetect vendor-list on page 515 512 CHAPTER 17: RF DETECTION COMMANDS Table 94 RF Detection Commands by Usage (continued) Type Command Permitted SSID List set rfdetect ssid-list on page 532 display rfdetect ssid-list on page 525 clear rfdetect ssid-list on page 514 Client Black List set rfdetect black-list on page 529 display rfdetect black-list on page 535 clear rfdetect black-list on page 513 Attack List set rfdetect attack-list on page 528 display rfdetect attack-list on page 534 clear rfdetect attack-list on page 512 Ignore List set rfdetect ignore on page 530 display rfdetect ignore on page 520 clear rfdetect ignore on page 513 MAP Signatures set rfdetect signature on page 532 Log Messages set rfdetect log on page 531 clear rfdetect Deprecated in MSS Version 3.0. Rogue detection takes place automatically in MSS Version 3.0. You do not need to configure RF detection scans. clear rfdetect attack-list Removes a MAC address from the attack list. Syntax — clear rfdetect attack-list mac-addr mac-addr — MAC address you want to remove from the attack list. Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command clears MAC address 11:22:33:44:55:66 from the attack list: WX-1200# clear rfdetect attack-list 11:22:33:44:55:66 success: 11:22:33:44:55:66 is no longer in attacklist. clear rfdetect black-list 513 See Also clear rfdetect black-list set rfdetect attack-list on page 528 display rfdetect attack-list on page 534 Removes a MAC address from the client black list. Syntax — clear rfdetect black-list mac-addr mac-addr — MAC address you want to remove from the black list. Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command removes MAC address 11:22:33:44:55:66 from the black list: WX-1200# clear rfdetect black-list 11:22:33:44:55:66 success: 11:22:33:44:55:66 is no longer blacklisted. See Also set rfdetect black-list on page 529 display rfdetect black-list on page 535 clear rfdetect countermeasures mac Deprecated in MSS Version 4.0. clear rfdetect ignore Removes a device from the ignore list for RF scans. MSS does not generate log messages or traps for the devices in the ignore list. Syntax — clear rfdetect ignore mac-addr mac-addr — Basic service set identifier (BSSID), which is a MAC address, of the device to remove from the ignore list. 514 CHAPTER 17: RF DETECTION COMMANDS Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command removes BSSID aa:bb:cc:11:22:33 from the ignore list for RF scans: WX1200# clear rfdetect ignore aa:bb:cc:11:22:33 success: aa:bb:cc:11:22:33 is no longer ignored. See Also clear rfdetect ssid-list display rfdetect ignore on page 520 set rfdetect ignore on page 530 Removes an SSID from the permitted SSID list. Syntax — clear rfdetect ssid-list ssid-name ssid-name — SSID name you want to remove from the permitted SSID list. Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command clears SSID mycorp from the permitted SSID list: WX-1200# clear rfdetect ssid-list mycorp success: mycorp is no longer in ssid-list. See Also set rfdetect ssid-list on page 532 display rfdetect ssid-list on page 525 clear rfdetect vendor-list clear rfdetect vendor-list 515 Removes an entry from the permitted vendor list. Syntax — clear rfdetect vendor-list {client | ap} mac-addr | all client|ap — Specifies whether the entry is for an AP brand or a client brand. mac-addr|all — Organizationally Unique Identifier (OUI) to remove. Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command removes client OUI aa:bb:cc:00:00:00 from the permitted vendor list: WX-1200# clear rfdetect vendor-list client aa:bb:cc:00:00:00 success: aa:bb:cc:00:00:00 is no longer in client vendor-list. See Also display rfdetect counters set rfdetect vendor-list on page 533 display rfdetect vendor-list on page 525 Displays statistics for rogue and Intrusion Detection System (IDS) activity detected by the MAPs managed by a WX switch. Syntax — display rfdetect counters Defaults — None. Access — Enabled. History — Introduced in MSS 4.0. 516 CHAPTER 17: RF DETECTION COMMANDS Examples — The following command shows counters for rogue activity detected by a WX switch: WX-1200# display rfdetect counters Type Current Total ----------------- ----------- -----------Rogue access points 0 0 Interfering access points 139 1116 Rogue 802.11 clients 0 0 Interfering 802.11 clients 4 347 802.11 adhoc clients 0 1 Unknown 802.11 clients 20 965 Interfering 802.11 clients seen on wired network 0 0 802.11 probe request flood 0 0 802.11 authentication flood 0 0 802.11 null data flood 0 0 802.11 mgmt type 6 flood 0 0 802.11 mgmt type 7 flood 0 0 802.11 mgmt type d flood 0 0 802.11 mgmt type e flood 0 0 802.11 mgmt type f flood 0 0 802.11 association flood 0 0 802.11 reassociation flood 0 0 802.11 disassociation flood 0 0 Weak wep initialization vectors 0 0 Spoofed access point mac-address attacks 0 0 Spoofed client mac-address attacks 0 0 Ssid masquerade attacks 1 12 Spoofed deauthentication attacks 0 0 Spoofed disassociation attacks 0 0 Null probe responses 626 11380 Broadcast deauthentications0 0 FakeAP ssid attacks 0 0 FakeAP bssid attacks 0 0 Netstumbler clients 0 0 Wellenreiter clients 0 0 Trapeze active scans 1796 4383 Wireless bridge frames 196 196 Adhoc client frames 8 0 Access points present in attack-list 0 0 Access points not present in ssid-list 0 0 Access points not present in vendor-list 0 0 Clients not present in vendor-list 0 0 Clients added to automatic black-list 0 0 display rfdetect countermeasures display rfdetect countermeasures 517 Displays the current status of countermeasures against rogues in the Mobility Domain. Syntax — display rfdetect countermeasures Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. As of Version 4.0, output no longer lists rogues for which countermeasures have not been started. Usage — This command is valid only on the seed switch of the Mobility Domain. Examples — The following example displays countermeasures status for the Mobility Domain: WX1200# display rfdetect countermeasures Total number of entries: 190 Rogue MAC Type Countermeasures Radio Mac ----------------- ----- -----------------00:0b:0e:00:71:c0 intfr 00:0b:0e:44:55:66 00:0b:0e:03:00:80 rogue 00:0b:0e:11:22:33 ... WX-IPaddr Port/Radio /Channel --------------- ------------10.1.1.23 dap 4/1/6 10.1.1.23 dap 2/1/11 Table 95 describes the fields in this display. Table 95 display rfdetect countermeasures Output Field Description Rogue MAC BSSID of the rogue. Type Classification of the rogue device: rogue—Wireless device that is on the network but is not supposed to be on the network. intfr—Wireless device that is not part of your network and is not a rogue, but might be causing RF interference with MAP radios. known—Device that is a legitimate member of the network. 518 CHAPTER 17: RF DETECTION COMMANDS Table 95 display rfdetect countermeasures Output (continued) Field Description Countermeasures Radio MAC MAC address of the 3Com radio sending countermeasures against the rogue. If the field value is Not Started, MSS has not started countermeasures against the rogue yet. WX-IPaddr System IP address of the WX switch that is managing the MAP that is sending or will send countermeasures. Port/Radio/Channel Port number, radio number, and channel number of the countermeasures radio. For a Distributed MAP, the connection number is labeled dap. (This stands for distributed ap.) See Also display rfdetect data clear rfdetect attack-list on page 512 set rf detect countermeasures on page 530 set rfdetect countermeasures mac on page 530 Displays information about the APs detected by a WX switch. Syntax — display rfdetect data Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0.Vendor, Type and Flags fields added to MSS Version 4.0 Usage — You can enter this command on any WX switch in the Mobility Domain. The output applies only to the switch on which you enter the command. To display all devices that a specific 3Com radio has detected, even if the radio is managed by another WX switch, use the display rfdetect visible command. To display rogue information for the entire Mobility Domain, use the display rfdetect mobility-domain command on the seed switch. Only one MAC address is listed for each 3Com radio, even if the radio is beaconing multiple SSIDs. display rfdetect data 519 Examples — The following command shows the devices detected by this WX switch during the most recent RF detection scan: WX1200# display rfdetect data Total number of entries: 197 Flags: i = infrastructure, a = ad-hoc c = CCMP, t = TKIP, 1 = 104-bit WEP, 4 BSSID Vendor Type Port/Radio/Ch ----------------- ------- ----- ------------00:07:50:d5:cc:91 Cisco intfr 3/1/6 00:07:50:d5:dc:78 Cisco intfr 3/1/6 00:09:b7:7b:8a:54 Cisco intfr 3/1/2 00:0a:5e:4b:4a:c0 3Com intfr 3/1/11 00:0a:5e:4b:4a:c2 3Com intfr 3/1/11 00:0a:5e:4b:4a:c4 3Com intfr 3/1/11 00:0a:5e:4b:4a:c6 3Com intfr 3/1/11 00:0a:5e:4b:4a:c8 3Com intfr 3/1/11 00:0a:5e:4b:4a:ca 3Com intfr 3/1/11 ... = 40-bit WEP, w Flags RSSI Age ------ ---- --i----w -61 6 i----w -82 6 i----- -57 6 i----- -57 6 i-t1-- -86 6 ic---- -85 6 i-t--- -85 6 i----w -83 6 i----- -85 6 = WEP(non-WPA) SSID ----------------r27-cisco1200-2 r116-cisco1200-2 public 3Comwlan 3ComWX-ccmp 3Com-tkip 3Com-voip 3Com-webaaa Table 96 describes the fields in this display. Table 96 display rfdetect data Output Field Description BSSID MAC address of the SSID used by the detected device. Vendor Company that manufactures or sells the rogue device. Type Classification of the rogue device: Port/Radio/Channel rogue—Wireless device that is not supposed to be on the network. The device has an entry in an WX switch’s FDB and is therefore on the network. intfr—Wireless device that is not part of your network but is not a rogue. The device does not have an entry in an WX switch’s FDB and is not actually on the network, but might be causing RF interference with MAP radios. known—Device that is a legitimate member of the network. Port number, radio number, and channel number of the radio that detected the rogue. For a Distributed MAP, the connection number is labeled dap. (This stands for distributed ap.) 520 CHAPTER 17: RF DETECTION COMMANDS Table 96 display rfdetect data Output Field Description Flags Classification and encryption information for the rogue: The i, a, or u flag indicates the classification. The other flags indicate the encryption used by the rogue. For flag definitions, see the key in the command output. See Also display rfdetect ignore display rfdetect mobility-domain on page 521 display rfdetect visible on page 526 Displays the BSSIDs of third-party devices that MSS ignores during RF scans. MSS does not generate log messages or traps for the devices in the ignore list. Syntax — display rfdetect ignore Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following example displays the list of ignored devices: WX4400# display rfdetect ignore Total number of entries: 2 Ignore MAC ----------------aa:bb:cc:11:22:33 aa:bb:cc:44:55:66 See Also clear rfdetect ignore on page 513 set rfdetect ignore on page 530 display rfdetect mobility-domain display rfdetect mobility-domain 521 Displays the rogues detected by all WX switches in the Mobility Domain during RF detection scans. Syntax — display rfdetect mobility-domain [ssid ssid-name | bssid mac-addr] ssid ssid-name — Displays rogues that are using the specified SSID. bssid mac-addr — Displays rogues that are using the specified BSSID. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. bssid and ssid options, Vendor, Type, and Flags fields added in MSS Version 4.0. Usage — This command is valid only on the seed switch of the Mobility Domain. To display rogue information for an individual switch, use the display rfdetect data command on that switch. Examples — The following example displays information for all SSIDs detected in the Mobility Domain: WS1200# display rfdetect mobility-domain Total number of entries: 194 Flags: i = infrastructure, a = ad-hoc, u = unresolved c = CCMP, t = TKIP, 1 = 104-bit WEP, 4 = 40-bit WEP, w = WEP(non-WPA) BSSID Vendor Type Flags SSID ----------------- ------------ ----- ------ -------------------------------00:07:50:d5:cc:91 Cisco intfr i----w r27-cisco1200-2 00:07:50:d5:dc:78 Cisco intfr i----w r116-cisco1200-2 00:09:b7:7b:8a:54 Cisco intfr i----00:0a:5e:4b:4a:c0 3Com intfr i----- public 00:0a:5e:4b:4a:c2 3Com intfr i----w 3Comwlan 00:0a:5e:4b:4a:c4 3Com intfr ic---- 3Com-ccmp 00:0a:5e:4b:4a:c6 3Com intfr i----w 3Com-tkip 00:0a:5e:4b:4a:c8 3Com intfr i----w 3Com-voip 00:0a:5e:4b:4a:ca 3Com intfr i----- 3Com-webaaa ... 522 CHAPTER 17: RF DETECTION COMMANDS The lines in this display are compiled from data from multiple listeners (MAP radios). If an item has the value unresolved, not all listeners agree on the value for that item. Generally, an unresolved state occurs only when an MAP or a Mobility Domain is still coming up, and lasts only briefly. The following command displays detailed information for rogues using SSID 3Com-webaaa. WS1200# display rfdetect mobility-domain ssid 3Com-webaaa BSSID: 00:0a:5e:4b:4a:ca Vendor: 3Com SSID: 3Com-webaaa Type: intfr Adhoc: no Crypto-types: clear WX-IPaddress: 10.8.121.102 Port/Radio/Ch: 3/1/11 Mac: 00:0b:0e:00:0a:6a Device-type: interfering Adhoc: no Crypto-types: clear RSSI: -85 SSID: 3Com-webaaa BSSID: 00:0b:0e:00:7a:8a Vendor: 3Com SSID: 3Com-webaaa Type: intfr Adhoc: no Crypto-types: clear WX-IPaddress: 10.8.121.102 Port/Radio/Ch: 3/1/1 Mac: 00:0b:0e:00:0a:6a Device-type: interfering Adhoc: no Crypto-types: clear RSSI: -75 SSID: 3Com-webaaa WX-IPaddress: 10.3.8.103 Port/Radio/Ch: dap 1/1/1 Mac: 00:0b:0e:76:56:82 Device-type: interfering Adhoc: no Crypto-types: clear RSSI: -76 SSID: 3Com-webaaa Two types of information are shown. The lines that are not indented show the BSSID, vendor, and information about the SSID. The indented lines that follow this information indicate the listeners (MAP radios) that detected the SSID. Each set of indented lines is for a separate MAP listener. In this example, two BSSIDs are mapped to the SSID. Separate sets of information are shown for each of the BSSIDs, and information about the listeners for each BSSID are shown. display rfdetect mobility-domain 523 The following command displays detailed information for a BSSID. WX1200# display rfdetect mobility-domain bssid 00:0b:0e:00:04:d1 BSSID: 00:0b:0e:00:04:d1 Vendor: Cisco SSID: notmycorp Type: rogue Adhoc: no Crypto-types: clear WX-IPaddress: 10.8.121.102 Port/Radio/Ch: 3/2/56 Mac: 00:0b:0e:00:0a:6b Device-type: rogue Adhoc: no Crypto-types: clear RSSI: -72 SSID: notmycorp WX-IPaddress: 10.3.8.103 Port/Radio/Ch: dap 1/1/157 Mac: 00:0b:0e:76:56:82 Device-type: rogue Adhoc: no Crypto-types: clear RSSI: -72 SSID: notmycorp Table 97 and Table 98 describe the fields in these displays. Table 97 display rfdetect mobility-domain Output Field Description BSSID MAC address of the SSID used by the detected device. Vendor Company that manufactures or sells the rogue device. Type Classification of the rogue device: Flags rogue—Wireless device that is not supposed to be on the network. The device has an entry in a WX switch’s FDB and is therefore on the network. intfr—Wireless device that is not part of your network but is not a rogue. The device does not have an entry in a WX switch’s FDB and is not actually on the network, but might be causing RF interference with MAP radios. known—Device that is a legitimate member of the network. Classification and encryption information for the rogue: The i, a, or u flag indicates the classification. The other flags indicate the encryption used by the rogue. For flag definitions, see the key in the command output. SSID SSID used by the detected device. 524 CHAPTER 17: RF DETECTION COMMANDS Table 98 display rfdetect mobility-domain ssid or bssid Output Field Description BSSID MAC address of the SSID used by the detected device. Vendor Company that manufactures or sells the rogue device. SSID SSID used by the detected device. Type Classification of the rogue device: rogue—Wireless device that is on the network but is not supposed to be on the network. intfr—Wireless device that is not part of your network and is not a rogue, but might be causing RF interference with MAP radios. known—Device that is a legitimate member of the network. Adhoc Indicates whether the rogue is an infrastructure rogue (is using an AP) or is operating in ad-hoc mode. Crypto-Types Encryption type: clear (no encryption) ccmp tkip wep104 (WPA 104-bit WEP) wep40 (WPA 40-bit WEP) wep (non-WPA WEP) WX-IPaddress System IP address of the WX switch that detected the rogue. Port/Radio/Channel Port number, radio number, and channel number of the radio that detected the rogue. For a Distributed MAP, the connection number is labeled dap. (This stands for distributed ap.) Mac MAC address of the radio that detected the rogue. Device-type Device type detected by the MAP radio. Adhoc Ad-hoc status (yes or no) detected by the MAP radio. Crypto-Types Encryption type detected by the MAP radio. RSSI Received signal strength indication (RSSI)—the strength of the RF signal detected by the MAP radio, in decibels referred to 1 milliwatt (dBm). SSID SSID mapped to the BSSID. display rfdetect ssid-list 525 See Also display rfdetect ssid-list display rfdetect data on page 518 display rfdetect visible on page 526 Displays the entries in the permitted SSID list. Syntax — display rfdetect ssid-list Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following example shows the permitted SSID list on WX switch: WX1200# display rfdetect ssid-list Total number of entries: 3 SSID ----------------mycorp corporate guest See Also display rfdetect vendor-list clear rfdetect ssid-list on page 514 set rfdetect ssid-list on page 532 Displays the entries in the permitted vendor list. Syntax — display rfdetect vendor-list Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. 526 CHAPTER 17: RF DETECTION COMMANDS Examples — The following example shows the permitted vendor list on WX switch: WX1200# display rfdetect vendor-list Total number of entries: 1 OUI Type ----------------- -----aa:bb:cc:00:00:00 client 11:22:33:00:00:00 ap See Also display rfdetect visible clear rfdetect vendor-list on page 515 set rfdetect vendor-list on page 533 Displays the BSSIDs discovered by a specific 3Com radio. The data includes BSSIDs transmitted by other 3Com radios as well as by third-party access points. Syntax — display rfdetect visible mac-addr Syntax — display rfdetect visible ap map-num [radio {1 | 2}] Syntax — display rfdetect visible dap dap-num [radio {1 | 2}] mac-addr — Base MAC address of the 3Com radio. To display the base MAC address of a 3Com radio, use the display {ap | dap} status command. map-num — Port connected to the MAP access point for which to display neighboring BSSIDs. dap-num — Number of a Distributed MAP for which to display neighboring BSSIDs. radio 1 — Shows neighbor information for radio 1. radio 2 — Shows neighbor information for radio 2. (This option does not apply to single-radio models.) Defaults — None. Access — Enabled. display rfdetect visible 527 History —Introduced in MSS Version 3.0. Vendor, Type, and Flags fields added in Version 4.0. Usage — If a 3Com radio is supporting more than one SSID, each of the corresponding BSSIDs is listed separately. To display rogue information for the entire Mobility Domain, use the display rfdetect mobility-domain command on the seed switch. Examples — The following command displays information about the rogues detected by radio 1 on MAP port 3: WX1200# display rfdetect visible ap 3 radio 1 Total number of entries: 104 Flags: i = infrastructure, a = ad-hoc c = CCMP, t = TKIP, 1 = 104-bit WEP, 4 = Transmit MAC Vendor Type Ch RSSI Flags ----------------- ------- ----- --- ---- -----00:07:50:d5:cc:91 Cisco intfr 6 -60 i----w 00:07:50:d5:dc:78 Cisco intfr 6 -82 i----w 00:09:b7:7b:8a:54 Cisco intfr 2 -54 i----00:0a:5e:4b:4a:c0 3Com intfr 11 -57 i----00:0a:5e:4b:4a:c2 3Com intfr 11 -86 i-t1-00:0a:5e:4b:4a:c4 3Com intfr 11 -85 ic---00:0a:5e:4b:4a:c6 3Com intfr 11 -85 i-t--00:0a:5e:4b:4a:c8 3Com intfr 11 -83 i----w 00:0a:5e:4b:4a:ca 3Com intfr 11 -85 i----... 40-bit WEP, w = WEP(non-WPA) SSID -------------------------------r27-cisco1200-2 r116-cisco1200-2 public 3Comwlan 3Com-ccmp 3Com-tkip 3Com-voip 3Com-webaaa Table 99 describes the fields in this display. Table 99 display rfdetect visible Output Field Description Transmit MAC MAC address the rogue device that sent the 802.11 packet detected by the MAP radio. Vendor Company that manufactures or sells the rogue device. 528 CHAPTER 17: RF DETECTION COMMANDS Table 99 display rfdetect visible Output (continued) Field Description Type Classification of the rogue device: rogue—Wireless device that is on the network but is not supposed to be on the network. intfr—Wireless device that is not part of your network and is not a rogue, but might be causing RF interference with MAP radios. known—Device that is a legitimate member of the network. Ch Channel number on which the radio detected the rogue. RSSI Received signal strength indication (RSSI)—the strength of the RF signal detected by the MAP radio, in decibels referred to 1 milliwatt (dBm). Flags Classification and encryption information for the rogue: The i, a, or u flag indicates the classification. The other flags indicate the encryption used by the rogue. For flag definitions, see the key in the command output. SSID SSID used by the detected device. See Also display rfdetect data on page 518 display rfdetect mobility-domain on page 521 set rfdetect active-scan Deprecated in MSS Version 4.0. You now can disable or reenable active scan in individual radio profiles. See set radio-profile active-scan on page 330. set rfdetect attack-list Adds an entry to the attack list. The attack list specifies the MAC address of devices that MSS should issue countermeasures against whenever the devices are detected on the network. The attack list can contain the MAC addresses of APs and clients. Syntax — set rfdetect attack-list mac-addr mac-addr — MAC address you want to attack. Defaults — The attack list is empty by default. set rfdetect black-list 529 Access — Enabled. History —Introduced in MSS Version 4.0. Usage — The attack list applies only to the WX switch on which the list is configured. WX switches do not share attack lists. Examples — The following command adds MAC address aa:bb:cc:44:55:66 to the attack list: WX-1200# set rfdetect attack-list 11:22:33:44:55:66 success: MAC 11:22:33:44:55:66 is now in attacklist. See Also set rfdetect black-list clear rfdetect attack-list on page 512 display rfdetect attack-list on page 534 Adds an entry to the client black list. The client black list specifies clients that are not allowed on the network. MSS drops all packets from the clients on the black list. Syntax — set rfdetect black-list mac-addr mac-addr — MAC address you want to place on the black list. Defaults — The client black list is empty by default. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — In addition to manually configured entries, the list can contain entries added by MSS. MSS can place a client in the black list due to an association, reassociation or disassociation flood from the client. The client black list applies only to the WX switch on which the list is configured. WX switches do not share client black lists. 530 CHAPTER 17: RF DETECTION COMMANDS Examples — The following command adds client MAC address 11:22:33:44:55:66 to the black list: WX-8# set rfdetect black-list 11:22:33:44:55:66 success: MAC 11:22:33:44:55:66 is now blacklisted. See Also set rfdetect black-list on page 529 display rfdetect black-list on page 535 set rf detect countermeasures Deprecated in MSS Version 4.0. You now can disable or reenable active scan in individual radio profiles. See set radio-profile countermeasures on page 337. set rfdetect countermeasures mac Deprecated in MSS Version 4.0. set rfdetect ignore Configures a list of known devices to ignore during an RF scan. MSS does not generate log messages or traps for the devices in the ignore list. Syntax — set rfdetect ignore mac-addr mac-addr — BSSID (MAC address) of the device to ignore. Defaults — MSS reports all unknown BSSIDs detected during an RF scan. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — Use this command to identify third-party APs and other devices you are already aware of and do not want MSS to report following RF scans. If you try to initiate countermeasures against a device on the ignore list, the ignore list takes precedence and MSS does not issue the countermeasures. Countermeasures apply only to rogue devices. set rfdetect log 531 Examples — The following command configures MSS to ignore BSSID aa:bb:cc:11:22:33 during RF scans: WX1200# set rfdetect ignore aa:bb:cc:11:22:33 success: MAC aa:bb:cc:11:22:33 is now ignored. See Also set rfdetect log clear rfdetect ignore on page 513 display rfdetect ignore on page 520 Disables or reenables generation of log messages when rogues are detected or when they disappear. Syntax — set rfdetect log {enable | disable} enable — Enables logging of rogues. disable — Disables logging of rogues. Defaults — RF detection logging is enabled by default. Access — Enabled. History —Introduced in MSS Version 3.0. The log messages for rogues are generated only on the seed and appear only in the seed’s log message buffer. Use the display log buffer command to display the messages in the seed switch’s log message buffer. Examples — The following command enables RF detection logging for the Mobility Domain managed by this seed switch: WX1200# set rfdetect log enable success: rfdetect logging is enabled. See Also display log buffer on page 582 532 CHAPTER 17: RF DETECTION COMMANDS set rfdetect signature Enables MAP signatures. A MAP signature is a set of bits in a management frame sent by a MAP that identifies that MAP to MSS. If someone attempts to spoof management packets from a 3Com MAP, MSS can detect the spoof attempt. Syntax — set rfdetect signature {enable | disable} enable — Enables MAP signatures. disable — Disables MAP signatures. Defaults — MAP signatures are disabled by default. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — The command applies only to MAPs managed by the WX switch on which you enter the command. To enable signatures on all MAPs in a Mobility Domain, enter the command on each WX switch in the Mobility Domain. You must use the same MAP signature setting (enabled or disabled) on all WX switches in a Mobility Domain. Examples — The following command enables MAP signatures on an WX switch: WX1200# set rfdetect signature enable success: signature is now enabled. set rfdetect ssid-list Adds an SSID to the permitted SSID list. The permitted SSID list specifies the SSIDs that are allowed on the network. If MSS detects packets for an SSID that is not on the list, the AP that sent the packets is classified as a rogue. MSS issues countermeasures against the rogue if they are enabled. Syntax — set rfdetect ssid-list ssid-name ssid-name — SSID name you want to add to the permitted SSID list. set rfdetect vendor-list 533 Defaults — The permitted SSID list is empty by default and all SSIDs are allowed. However, after you add an entry to the list, MSS allows traffic only for the SSIDs that are on the list. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — The permitted SSID list applies only to the WX switch on which the list is configured. WX switches do not share permitted SSID lists. Examples — The following command adds SSID mycorp to the list of permitted SSIDs: WX-1200# set rfdetect ssid-list mycorp success: ssid mycorp is now in ssid-list. See Also set rfdetect vendor-list clear rfdetect ssid-list on page 514 display rfdetect ssid-list on page 525 Adds an entry to the permitted vendor list. The permitted vendor list specifies the third-party AP or client vendors that are allowed on the network. MSS does not list a device as a rogue or interfering device if the device’s OUI is in the permitted vendor list. Syntax — set rfdetect vendor-list {client | ap} mac-addr | all client | ap — Specifies whether the entry is for an AP brand or a client brand. mac-addr | all — Organizationally Unique Identifier (OUI) to remove. Defaults — The permitted vendor list is empty by default and all vendors are allowed. However, after you add an entry to the list, MSS allows only the devices whose OUIs are on the list. Access — Enabled. History —Introduced in MSS Version 4.0. 534 CHAPTER 17: RF DETECTION COMMANDS Usage — The permitted vendor list applies only to the WX switch on which the list is configured. WX switches do not share permitted vendor lists. Examples — The following command adds an entry for clients whose MAC addresses start with aa:bb:cc: WX-1200# set rfdetect vendor-list client aa:bb:cc:00:00:00 success: MAC aa:bb:cc:00:00:00 is now in client vendor-list. The trailing 00:00:00 value is required. See Also display rfdetect attack-list clear rfdetect vendor-list on page 515 display rfdetect vendor-list on page 525 Displays information about the MAC addresses in the attack list. Syntax — display rfdetect attack-list Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following example shows the attack list on WX switch: WX1200# display rfdetect attack-list Total number of entries: 1 Attacklist MAC Port/Radio/Chan RSSI SSID ----------------- ----------------- ------ -----------11:22:33:44:55:66 dap 2/1/11 -53 rogue-ssid See Also clear rfdetect attack-list on page 512 set rfdetect attack-list on page 528 display rfdetect black-list display rfdetect black-list 535 Displays information abut the clients in the client black list. Syntax — display rfdetect black-list Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following example shows the client black list on WX switch: WX1200# display rfdetect black-list Total number of entries: 1 Blacklist MAC Type Port TTL ----------------- ----------------- ------- --11:22:33:44:55:66 configured 11:23:34:45:56:67 assoc req flood 3 25 See Also display rfdetect clients clear rfdetect black-list on page 513 set rfdetect black-list on page 529 Displays the wireless clients detected by an WX switch. Syntax — display rfdetect clients [mac mac-addr] mac mac-addr Displays detailed information for a specific client. Defaults — None. Access — Enabled. History — Introduced in MSS Version 4.0. 536 CHAPTER 17: RF DETECTION COMMANDS Examples — The following command shows information about all wireless clients detected by an WX switch’s MAPs: WX1200# display rfdetect clients Total number of entries: 30 Client MAC Client AP MAC AP Port/Radio NoL Type Last Vendor Vendor /Channel seen ----------------- ------- ----------------- ------- ------------- --- ----- ---00:03:7f:bf:16:70 Unknown 00:04:23:77:e6:e5 Intel 00:05:5d:79:ce:0f D-Link 00:05:5d:7e:96:a7 D-Link 00:05:5d:7e:96:ce D-Link 00:05:5d:84:d1:c5 D-Link Unknown Unknown Unknown Unknown Unknown Unknown dap dap dap dap dap dap 1/1/6 1/1/2 1/1/149 1/1/149 1/1/157 1/1/1 1 1 1 1 1 1 intfr intfr intfr intfr intfr intfr 207 155 87 117 162 52 The following command displays more details about a specific client: WX1200# display rfdetect clients mac 00:0c:41:63:fd:6d Client Mac Address: 00:0c:41:63:fd:6d, Vendor: Linksys Port: dap 1, Radio: 1, Channel: 11, RSSI: -82, Rate: 2, Last Seen (secs ago): 84 Bssid: 00:0b:0e:01:02:00, Vendor: 3Com, Type: intfr, Dst: ff:ff:ff:ff:ff:ff Last Rogue Status Check (secs ago): 3 The first line lists information for the client. The other lines list information about the most recent 802.11 packet detected from the client. Table 100 and Table 101 describe the fields in these displays. Table 100 display rfdetect clients Output Field Description Client MAC MAC address of the client. Client Vendor Company that manufactures or sells the client. AP MAC MAC address of the radio with which the rogue client is associated. AP Vendor Company that manufactures or sells the AP with which the rogue client is associated. Port/Radio/Channel Port number, radio number, and channel number of the radio that detected the rogue. For a Distributed MAP, the connection number is labeled dap. (This stands for distributed ap.) display rfdetect clients 537 Table 100 display rfdetect clients Output (continued) Field Description NoL Number of listeners. This is the number of MAP radios that detected the rogue client. Type Classification of the rogue device: Last seen rogue — Wireless device that is on the network but is not supposed to be on the network. intfr — Wireless device that is not part of your network and is not a rogue, but might be causing RF interference with MAP radios. known — Device that is a legitimate member of the network. Number of seconds since an MAP radio last detected 802.11 packets from the device. Table 101 display rfdetect clients mac Output Field Description RSSI Received signal strength indication (RSSI)—the strength of the RF signal detected by the MAP radio, in decibels referred to 1 milliwatt (dBm). Rate The data rate of the client. Last Seen Number of seconds since an MAP radio last detected 802.11 packets from the device. BSSID MAC address of the SSID with which the rogue client is associated. Vendor Company that manufactures or sells the AP with which the rogue client is associated. Typ Classification of the rogue device: Dst rogue—Wireless device that is on the network but is not supposed to be on the network. intfr—Wireless device that is not part of your network and is not a rogue, but might be causing RF interference with MAP radios. known—Device that is a legitimate member of the network. MAC addressed to which the last 802.11 packet detected from the client was addressed. 538 CHAPTER 17: RF DETECTION COMMANDS Table 101 display rfdetect clients mac Output (continued) Field Description Last Rogue Status Check Number of seconds since the WX switch looked on the air for the AP with which the rogue client is associated. The switch looks for the client’s AP by sending a packet from the wired side of the network addressed to the client, and watching the air for a wireless packet containing the client’s MAC address. 18 FILE MANAGEMENT COMMANDS Use file management commands to manage system files and to display software and boot information. Commands by Usage This chapter presents file management commands alphabetically. Use Table 102 to locate commands in this chapter based on their use. Table 102 File Management Commands by Usage Type Command Software Version reset system on page 554 display version on page 549 Boot Settings set boot partition on page 559 set boot configuration-file on page 558 display boot on page 547 clear boot config on page 541 File Management dir on page 545 copy on page 542 delete on page 544 mkdir on page 553 rmdir on page 556 Configuration File save config on page 557 load config on page 551 display config on page 548 System Backup and Restore backup on page 540 restore on page 555 540 CHAPTER 18: FILE MANAGEMENT COMMANDS backup Creates an archive of WX system files and optionally, user file, in Unix tape archive (tar) format. Syntax backup system [tftp:/ip-addr/]filename [all | critical] [tftp:/ip-addr/]filename — Name of the archive file to create. You can store the file locally in the switch’s nonvolatile storage or on a TFTP server. all — Backs up system files and all the files in the user files area. The user files area contains the set of files listed in the file section of dir command output. critical — Backs up system files only, including the configuration file used when booting, and certificate files. The size of an archive created by this option is generally 1MB or less. Defaults — All. Access — Enabled. History —Introduced in MSS Version 3.2. Usage — You can create an archive located on a TFTP server or in the switch’s nonvolatile storage. If you specify a TFTP server as part of the filename, the archive is copied directly to the TFTP server and not stored locally on the switch. Use the critical option if you want to back up or restore only the system-critical files required to operate and communicate with the switch. Use the all option if you also want to back up or restore WebAAA pages, backup configuration files, image files, and any other files stored in the user files area of nonvolatile storage. Neither option archives image files or any other files listed in the Boot section of dir command output. The all option archives image files only if they are present in the user files area. Archive files created by the all option are larger than files created by the critical option. The file size depends on the files in the user area, and the file can be quite large if the user area contains image files. clear boot config 541 The backup command places the boot configuration file into the archive. (The boot configuration file is the Configured boot configuration in the display boot command’s output.) If the running configuration contains changes that have not been saved, these changes are not in the boot configuration file and are not archived. To make sure the archive contains the configuration that is currently running on the switch, use the save config command to save the running configuration to the boot configuration file, before using the backup command. Examples — The following command creates an archive of the system-critical files and copies the archive directly to a TFTP server. The filename in this example includes a TFTP server IP address, so the archive is not stored locally on the switch. WX1200# backup system tftp:/10.10.20.9/sysa_bak critical success: sent 28263 bytes in 0.324 seconds [ 87231 bytes/sec] See Also clear boot config dir on page 545 restore on page 555 Resets to the factory default the configuration that MSS loads during a reboot. Syntax — clear boot config Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following commands back up the configuration file on an WX switch, reset the switch to its factory default configuration, and reboot the switch: WX4400# copy configuration tftp://10.1.1.1/backupcfg success: sent 365 bytes in 0.401 seconds [ 910 bytes/sec] WX4400# clear boot config success: Reset boot config to factory defaults. WX4400# reset system force ...... rebooting ...... 542 CHAPTER 18: FILE MANAGEMENT COMMANDS See Also copy display config on page 548 reset system on page 554 Performs the following copy operations: Copies a file from a TFTP server to nonvolatile storage. Copies a file from nonvolatile storage or temporary storage to a TFTP server. Copies a file from one area in nonvolatile storage to another. Copies a file to a new filename in nonvolatile storage. Syntax — copy source-url destination-url source-url — Name and location of the file to copy. The uniform resource locator (URL) can be one of the following: [subdirname/]filename file:[subdirname/]filename tftp://ip-addr/[subdirname/]filename tmp:filename For the filename, specify between 1 and 128 alphanumeric characters, with no spaces. Enter the IP address in dotted decimal notation. The subdirname/ option specifies a subdirectory. destination-url — Name of the copy and the location where to place the copy. The URL can be one of the following: [subdirname/]filename file:[subdirname/]filename tftp://ip-addr/[subdirname/]filename If you are copying a system image file into nonvolatile storage, the filename must include the boot partition name. You can specify one of the following: boot0:/filename boot1:/filename Defaults — None. Access — Enabled. copy 543 History —Introduced in MSS Version 3.0. Usage — The filename and file:filename URLs are equivalent. You can use either URL to refer to a file in an WX switch’s nonvolatile memory. The tftp://ip-addr/filename URL refers to a file on a TFTP server. If DNS is configured on the WX switch, you can specify a TFTP server’s hostname as an alternative to specifying the IP address. The tmp:filename URL specifies a file in temporary storage. You can copy a file out of temporary storage but you cannot copy a file into temporary storage. Temporary storage is reserved for use by MSS. If you are copying a system image file into nonvolatile storage, the filename must be preceded by the boot partition name, which can be boot0 or boot1. Enter the filename as boot0:/filename or boot1:/filename. You must specify the boot partition that was not used to load the currently running image. Examples — The following command copies a file called floorwx from nonvolatile storage to a TFTP server: WX4400# copy floorwx tftp://10.1.1.1/floorwx success: sent 365 bytes in 0.401 seconds [ 910 bytes/sec] The following command copies a file called closetwx from a TFTP server to nonvolatile storage: WX4400# copy tftp://10.1.1.1/closetwx closetwx success: received 637 bytes in 0.253 seconds [ 2517 bytes/sec] The following command copies system image WXA03001.Rel from a TFTP server to boot partition 1 in nonvolatile storage: WX4400# copy tftp://10.1.1.107/WXA03001.Rel boot1:WXA03001.Rel ............................................................ ................................................success: received 9163214 bytes in 105.939 seconds [ 86495 byt es/sec] The following commands rename test-config to new-config by copying it from one name to the other in the same location, then deleting test-config: WX4400# copy test-config new-config 544 CHAPTER 18: FILE MANAGEMENT COMMANDS WX4400# delete test-config success: file deleted. The following command copies file corpa-login.html from a TFTP server into subdirectory corpa in an WX switch’s nonvolatile storage: WX4400# copy tftp://10.1.1.1/corpa-login.html corpa/corpa-login.html success: received 637 bytes in 0.253 seconds [ 2517 bytes/sec] See Also delete delete on page 544 dir on page 545 Deletes a file. CAUTION: MSS does not prompt you to verify whether you want to delete a file. When you press Enter after typing a delete command, MSS immediately deletes the specified file. MSS does not allow you to delete the currently running software image file or the running configuration. Syntax — delete url url — Filename. Specify between 1 and 128 alphanumeric characters, with no spaces. If the file is in a subdirectory, specify the subdirectory name, followed by a forward slash, in front of the filename. For example: subdir_a/file_a. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — You might want to copy the file to a TFTP server as a backup before deleting the file. dir 545 Examples — The following commands copy file testconfig to a TFTP server and delete the file from nonvolatile storage: WX4400# copy testconfig tftp://10.1.1.1/testconfig success: sent 365 bytes in 0.401 seconds [ 910 bytes/sec] WX4400# delete testconfig success: file deleted. The following commands delete file dang_doc from subdirectory dang: WX4400# delete dang/dang_doc success: file deleted. See Also dir copy on page 542 dir on page 545 Displays a list of the files in nonvolatile storage and temporary files. Syntax — dir [subdirname] subdirname — Subdirectory name. If you specify a subdirectory name, the command lists the files in that subdirectory. Otherwise, the command lists the files in the root directory and also lists the subdirectories. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command displays the files in the root directory: WX4400# dir =============================================================================== file: Filename Size Created file:configuration 17 KB May 21 2004, 18:20:53 file:configuration.txt 379 bytes May 09 2004, 18:55:17 file:dangcfg 13 KB May 16 2004, 18:30:44 dangdir/ 512 bytes May 16 2004, 17:23:44 old/ 512 bytes Sep 23 2003, 21:58:48 Total: 32 Kbytes used, 207824 Kbytes free 546 CHAPTER 18: FILE MANAGEMENT COMMANDS =============================================================================== Boot: Filename Size Created *boot0:bload 746 KB May 09 2004, 19:02:16 *boot0:WXA03002.Rel 8182 KB May 09 2004, 18:58:16 boot1:WXA03001.Rel 8197 KB May 21 2004, 18:01:02 Boot0: Total: 8928 Kbytes used, 3312 Kbytes free Boot1: Total: 8197 Kbytes used, 4060 Kbytes free =============================================================================== temporary files: Filename Size Created Total: 0 bytes used, 93537 Kbytes free Total: 15 Kbytes used, 90941 Kbytes free The following command displays the files in the old subdirectory: WX4400# dir old =============================================================================== file: Filename Size Created file:configuration.txt 3541 bytes Sep 22 2003, 22:55:44 file:configuration.xml 24 KB Sep 22 2003, 22:55:44 Total: 27 Kbytes used, 207824 Kbytes free Table 103 describes the fields in the dir output. Table 103 Output for dir Field Description Filename Filename or subdirectory name. For files, the directory name is shown in front of the filename (for example, file:configuration). The file: directory is the root directory. For subdirectories, a forward slash is shown at the end of the subdirectory name (for example, old/ ). In the boot partitions list (Boot:), an asterisk (*) indicates the boot partition from which the currently running image was loaded and the image filename. Size Size in Kbytes or bytes. Created System time and date when the file was created or copied onto the switch. Total Number of kilobytes in use to store files and the number that are still free. See Also copy on page 542 delete on page 544 display boot display boot 547 Displays the system image and configuration filenames used after the last reboot and configured for use after the next reboot. Syntax — display boot Defaults — None. Access — Access. History —Introduced in MSS Version 3.0. Examples — The following command shows the boot information for a WX switch: WX1200# display boot Configured boot image: Configured boot configuration: Booted version: Booted image: Booted configuration: Product model: boot0:WXB03002.Rel file:newconfig 3.0.1 boot1:WXB03001.Rel file:configuration WX1200 Table 104 describes the fields in the display boot output. Table 104 Output for display boot Field Description Configured boot image Boot partition and image filename MSS will use to boot next time the software is rebooted. Configured boot configuration Configuration filename MSS will use to boot next time the software is rebooted. Booted version Software version the switch is running. Booted image Boot partition and image filename MSS used the last time the software was rebooted. MSS is running this software image. Booted configuration Configuration filename MSS used to load the configuration the last time the software was rebooted. See Also display version on page 549 reset system on page 554 set boot configuration-file on page 558 548 CHAPTER 18: FILE MANAGEMENT COMMANDS display config Displays the configuration running on the WX switch. Syntax — display config [area area] [all] area area — Configuration area. You can specify one of the following: aaa acls ap arp eapol httpd ip ip-config log mobility-domain ntp portconfig portgroup radio-profile rfdetect service-profile sm snmp snoop spantree system trace vlan vlan-fdb If you do not specify a configuration area, nondefault information for all areas is displayed. all — Includes configuration items that are set to their default values. Defaults — None. Access — Enabled. display version 549 History —Introduced in MSS Version 3.0. In MSS Version 4.0, option snoop added for remote traffic monitoring, and rfdevice was changed to rfdetect. Usage — If you do not use one of the optional parameters, configuration commands that set nondefault values are displayed for all configuration areas. If you specify an area, commands are displayed for that area only. If you use the all option, the display also includes commands for configuration items that are set to their default values. Examples — The following command shows configuration information for VLANs: WX4400# display config area vlan # Configuration nvgen'd at 2004-5-21 19:36:48 # Image 3.0.0 # Model WX4400 # Last change occurred at 2004-5-21 18:20:50 set vlan 1 port 1 See Also display version load config on page 551 save config on page 557 Displays software and hardware version information for an WX switch and, optionally, for any attached MAP access points. Syntax — display version [details] details — Includes additional software build information and information about the MAP access points configured on the WX switch. Defaults — None Access — All. History —Introduced in MSS Version 3.0. 550 CHAPTER 18: FILE MANAGEMENT COMMANDS Examples — The following command displays version information for a WX switch: WX1200# display version Mobility System Software, Version: 3.0.1 Copyright (c) 2004 3Com Corporation. All rights reserved. Build Information: Model: Hardware Mainboard: PoE board: Serial number Flash: Kernel: BootLoader: (build#168) TOP 2004-09-23 08:35:00 WX1200 version 1 ; FPGA version 0 version 0 ; FPGA version 0 M8WE48BB8C7A0 3.0.0.549 - md0a 3.0.0#130: Thu Sep 23 05:45:24 PDT 2004 1.4 / 3.0.2 The following command displays additional software build information and MAP access point information: WX1200# display version details Mobility System Software, Version: 3.0.1 Copyright (c) 2004 3Com Corporation. All rights reserved. Build Information: Label: Build Suffix: Model: Hardware Mainboard: CPU Model: PoE board: Serial number Flash: Kernel: BootLoader: (build#168) TOP 2004-09-23 08:35:00 3.0.1_092304_WX1200 -d-O1-3com WX1200 version 1 ; FPGA version 0 405EP (Revision 9.80) version 0 ; FPGA version 0 M8WE48BB8C7A0 3.0.1 - md0a 3.0.1#130: Thu Sep 23 05:45:24 PDT 2004 1.4 / 3.0.2 Port/DAP AP Model Serial # Versions -------- ---------- ---------------------------------/1 AP2750 M9DE48B012F00 H/W : A3 F/W1 : 4.2 F/W2 : N/A S/W : 3.0.1_092304_WX1200 BOOT S/W : 3.0.1_090304 /2 AP2750 M9DE48B123400 H/W : 4 load config F/W1 F/W2 S/W BOOT S/W : : : : 551 4.2 4.2 3.0.1_092304_WX1200 3.0.1_082504 Table 105 describes the fields in the display version output. Table 105 Output for display version Field Description Build Information Factory timestamp of the image file. Label Software version and build date. Build Suffix Build suffix. Model Build model. Hardware Version information for the WX switch’s motherboard and Power over Ethernet (PoE) board. Serial number Serial number of the WX switch. Flash Flash memory version. Kernel Kernel version. BootLoader Boot code version. Port/DAP Port number connected to an MAP access point. AP Model MAP model number. Serial # MAP serial number. Versions MAP hardware, firmware, and software versions. See Also load config display boot on page 547 Loads configuration commands from a file and replaces the WX switch’s running configuration with the commands in the loaded file. CAUTION: This command completely removes the running configuration and replaces it with the configuration contained in the file. 3Com recommends that you save a copy of the current running configuration to a backup configuration file before loading a new configuration. 552 CHAPTER 18: FILE MANAGEMENT COMMANDS Syntax — load config [url] url — Filename. Specify between 1 and 128 alphanumeric characters, with no spaces. If the file is in a subdirectory, specify the subdirectory name, followed by a forward slash, in front of the filename. For example: backup_configs/config_c. Defaults — The default file location is nonvolatile storage. The current version supports loading a configuration file only from the switch’s nonvolatile storage. You cannot load a configuration file directly from a TFTP server. If you do not specify a filename, MSS uses the same configuration filename that was used for the previous configuration load. For example, if the WX switch used configuration for the most recent configuration load, MSS uses configuration again unless you specify a different filename. To display the filename of the configuration file MSS loaded during the last reboot, use the display boot command. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — This command completely replaces the running configuration with the configuration in the file. Examples — The following command reloads the configuration from the most recently loaded configuration file: WX4400# load config Reloading configuration may result in lost of connectivity, do you wish to continue? (y/n) [n]y success: Configuration reloaded The following command loads configuration file testconfig1: WX4400# load config testconfig1 Reloading configuration may result in lost of connectivity, do you wish to continue? (y/n) [n]y success: Configuration reloaded mkdir 553 See Also mkdir display boot on page 547 display config on page 548 save config on page 557 Creates a new subdirectory in nonvolatile storage. Syntax — mkdir [subdirname] subdirname — Subdirectory name. Specify between 1 and 32 alphanumeric characters, with no spaces. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following commands create a subdirectory called corp2 and display the root directory to verify the result: WX4400# mkdir corp2 success: change accepted. WX4400# dir =============================================================================== file: Filename Size Created file:configuration 17 KB May 21 2004, 18:20:53 file:configuration.txt 379 bytes May 09 2004, 18:55:17 corp2/ 512 bytes May 21 2004, 19:22:09 corp_a/ 512 bytes May 21 2004, 19:15:48 file:dangcfg 13 KB May 16 2004, 18:30:44 dangdir/ 512 bytes May 16 2004, 17:23:44 old/ 512 bytes Sep 23 2003, 21:58:48 Total: 33 Kbytes used, 207822 Kbytes free =============================================================================== Boot: Filename Size Created *boot0:bload 746 KB May 09 2004, 19:02:16 *boot0:WXA03002.Rel 8182 KB May 09 2004, 18:58:16 boot1:WXA03001.Rel 8197 KB May 21 2004, 18:01:02 Boot0: Total: 8928 Kbytes used, 3312 Kbytes free Boot1: Total: 8197 Kbytes used, 4060 Kbytes free 554 CHAPTER 18: FILE MANAGEMENT COMMANDS =============================================================================== temporary files: Filename Size Created Total: 0 bytes used, 93537 Kbytes free See Also reset system dir on page 545 rmdir on page 556 Restarts an WX switch and reboots the software. Syntax — reset system [force] force — Immediately restarts the system and reboots, without comparing the running configuration to the configuration file. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — If you do not use the force option, the command first compares the running configuration to the configuration file. If the running configuration and configuration file do not match, MSS does not restart the WX switch but instead displays a message advising you to either save the configuration changes or use the force option. Examples — The following command restarts an WX switch that does not have any unsaved configuration changes: WX4400# reset system This will reset the entire system. Are you sure (y/n)y The following commands attempt to restart an WX switch with a running configuration that has unsaved changes, and then force the switch to restart: WX4400# reset system error: Cannot reset, due to unsaved configuration changes. Use "reset system force" to override. WX4400# reset system force ...... rebooting ...... restore 555 See Also restore display boot on page 547 display version on page 549 save config on page 557 Unzips a system archive created by the backup command and copies the files from the archive onto the switch. Syntax — restore system [tftp:/ip-addr/]filename [all | critical] [tftp:/ip-addr/]filename — Name of the archive file to load. The archive can be located in the switch’s nonvolatile storage or on a TFTP server. all — Restores system files and the user files from the archive. critical — Restores system files only, including the configuration file used when booting, and certificate files. force — Replaces files on the switch with those in the archive, even if the switch is not the same as the one from which the archive was created. CAUTION: Do not use this option unless advised to do so by 3Com TAC. If you restore one switch’s system files onto another switch, you must generate new key pairs and certificates on the switch. Defaults — Critical. Access — Enabled. History — Introduced in MSS Version 3.2. Usage — If a file in the archive has a counterpart on the switch, the archive version of the file replaces the file on the switch. The restore command does not delete files that do not have counterparts in the archive. For example, the command does not completely replace the user files area. Instead, files in the archive are added to the user files area. A file in the user area is replaced only if the archive contains a file with the same name. 556 CHAPTER 18: FILE MANAGEMENT COMMANDS If the archive’s files cannot fit on the switch, the restore operation fails. 3Com recommends deleting unneeded image files before creating or restoring an archive. The backup command stores the MAC address of the switch in the archive. By default, the restore command works only if the MAC address in the archive matches the MAC address of the switch where the restore command is entered. The force option overrides this restriction and allows you to unpack one switch’s archive onto another switch. CAUTION: Do not use the force option unless you are certain you want to replace the switch’s files with files from another switch. If you restore one switch’s system files onto another switch, you must generate new key pairs and certificates on the switch. If the configuration running on the switch is different from the one in the archive or you renamed the configuration file, and you want to retain changes that were made after the archive was created, see the “Managing System Files” chapter of the Wireless LAN Switch and Controller Configuration Guide. Examples — The following command restores system-critical files on a switch, from archive sysa_bak. WX1200# restore system tftp:/10.10.20.9/sysa_bak success: received 11908 bytes in 0.150 seconds [ 79386 bytes/sec] success: restore complete. See Also rmdir backup on page 540 Removes a subdirectory from nonvolatile storage. Syntax — rmdir [subdirname] subdirname — Subdirectory name. Specify between 1 and 32 alphanumeric characters, with no spaces. Defaults — None. Access — Enabled. save config 557 History —Introduced in MSS Version 3.0. Usage — MSS does not allow the subdirectory to be removed unless it is empty. Delete all files from the subdirectory before attempting to remove it. Examples — The following example removes subdirectory corp2: WX4400# rmdir corp2 success: change accepted. See Also save config dir on page 545 mkdir on page 553 Saves the running configuration to a configuration file. Syntax — save config [filename] filename — Name of the configuration file. Specify between 1 and 128 alphanumeric characters, with no spaces. To save the file in a subdirectory, specify the subdirectory name, followed by a forward slash, in front of the filename. For example: backup_configs/config_c. Defaults — By default, MSS saves the running configuration as the configuration filename used during the last reboot. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — If you do not specify a filename, MSS replaces the configuration file loaded during the most recent reboot. To display the filename of the configuration file MSS loaded during the most recent reboot, use the display boot command. The command completely replaces the specified configuration file with the running configuration. 558 CHAPTER 18: FILE MANAGEMENT COMMANDS Examples — The following command saves the running configuration to the configuration file loaded during the most recent reboot. In this example, the filename used during the most recent reboot is configuration. WX4400# save config Configuration saved to configuration. The following command saves the running configuration to a file named testconfig1: WX4400# save config testconfig1 Configuration saved to testconfig1. See Also set boot configuration-file display boot on page 547 display config on page 548 load config on page 551 Changes the configuration file to load after rebooting. Syntax — set boot configuration-file filename filename — Filename. Specify between 1 and 128 alphanumeric characters, with no spaces. To load the file from a subdirectory, specify the subdirectory name, followed by a forward slash, in front of the filename. For example: backup_configs/config_c. Defaults — The default configuration filename is configuration. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — The file must be located in the switch’s nonvolatile storage. Examples — The following command sets the boot configuration file to testconfig1: WX4400# set boot configuration-file testconfig1 success: boot config set. set boot partition set boot partition 559 Specifies the boot partition in which to look for the system image file following the next system reset, software reload, or power cycle. Syntax — set boot partition {boot0 | boot1} boot0 — Boot partition 0. boot1 — Boot partition 1. Defaults — By default, an WX switch uses the same boot partition for the next software reload that was used to boot the currently running image. Access — Enabled. History —Introduced in MSS Version 3.0. Usage — To determine the boot partition that was used to load the currently running software image, use the dir command. Examples — The following command sets the boot partition for the next software reload to partition 1: WX4400# set boot partition boot1 success: Boot partition set to boot1. See Also copy on page 542 dir on page 545 reset system on page 554 560 CHAPTER 18: FILE MANAGEMENT COMMANDS 19 TRACE COMMANDS Use trace commands to perform diagnostic routines. While MSS allows you to run many types of traces, this chapter describes commands for those traces you are most likely to use. For a complete listing of the types of traces MSS allows, type the set trace ? command. CAUTION: Using the set trace command can have adverse effects on system performance. 3Com recommends that you use the lowest levels possible for initial trace commands, and slowly increase the levels to get the data you need. Commands by Usage This chapter presents trace commands alphabetically. Use Table 106 to locate commands in this chapter based on their use. Table 106 Trace Commands by Usage Type Command Trace set trace sm on page 567 set trace dot1x on page 566 set trace authentication on page 564 set trace authorization on page 565 display trace on page 563 save trace on page 564 clear trace on page 562 clear log trace on page 562 562 CHAPTER 19: TRACE COMMANDS clear log trace Deletes the log messages stored in the trace buffer. Syntax — clear log trace Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To delete the trace log, type the following command: WX4400# clear log trace See Also clear trace display log buffer on page 582 set log on page 586 Deletes running trace commands and ends trace processes. Syntax — clear trace {trace-area | all} trace-area — Ends a particular trace process. Specify one of the following keywords to end the traces documented in this chapter: authorization — Ends an authorization trace dot1x — Ends an 802.1X trace authentication — Ends an authentication trace sm — Ends a session manager trace all — Ends all trace processes. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To clear all trace processes, type the following command: WX4400# clear trace all success: clear trace all display trace 563 To clear the session manager trace, type the following command: WX4400# clear trace sm success: clear trace sm See Also display trace display trace on page 563 set trace authentication on page 564 set trace authorization on page 565 set trace dot1x on page 566 set trace sm on page 567 Displays information about traces that are currently configured on the WX switch, or all possible trace options. Syntax — display trace [all] all — Displays all possible trace options and their configuration. Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To view the traces currently running, type the following command: WX4400# display trace milliseconds spent printing traces: 1885.614 Trace Area Level Mac User Port Filter -------------------- ----- ----------------- ----------------- ---- -------dot1x 5 0 sm 5 0 See Also clear trace on page 562 set trace authentication on page 564 set trace authorization on page 565 set trace dot1x on page 566 set trace sm on page 567 564 CHAPTER 19: TRACE COMMANDS save trace Saves the accumulated trace data for enabled traces to a file in the WX switch’s nonvolatile storage. Syntax — save trace filename filename — Name for the trace file. To save the file in a subdirectory, specify the subdirectory name, then a slash. For example: traces/trace1 Defaults — None. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — To save trace data into the file trace1 in the subdirectory traces, type the following command: WX4400# save trace traces/trace1 set trace authentication Traces authentication information. Syntax — set trace authentication [mac-addr mac-address] [port port-num] [user username] [level level] mac-addr mac-address — Traces a MAC address. Specify a MAC address, using colons to separate the octets (for example, 00:11:22:aa:bb:cc). port port-num — Traces on a WX port number. user username — Traces a user. Specify a username of up to 32 alphanumeric characters with no spaces. level level — Determines the quantity of information included in the output. You can set the level with an integer from 1 to 10, where level 10 provides the most information. Levels 1 through 5 provide user-readable information. If you do not specify a level, level 5 is the default. Defaults — The default trace level is 5. Access — Enabled. History —Introduced in MSS Version 3.0. set trace authorization 565 Examples — The following command starts a trace for information about user jose’s authentication: WX4400# set trace authentication user jose success: change accepted. See Also set trace authorization clear trace on page 562 display trace on page 563 Traces authorization information. Syntax — set trace authorization [mac-addr mac-address] [port port-num] [user username] [level level] mac-addr mac-address — Traces a MAC address. Specify a MAC address, using colons to separate the octets (for example, 00:11:22:aa:bb:cc). port port-num — Traces on a WX a port number. user username — Traces a user. Specify a username of up to 80 alphanumeric characters with no spaces. level level — Determines the quantity of information included in the output. You can set the level with an integer from 1 to 10, where level 10 provides the most information. Levels 1 through 5 provide user-readable information. If you do not specify a level, level 5 is the default. Defaults — The default trace level is 5. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command starts a trace for information for authorization for MAC address 00:01:02:03:04:05: WX4400# set trace authorization mac-addr 00:01:02:03:04:05 success: change accepted. See Also clear trace on page 562 display trace on page 563 566 CHAPTER 19: TRACE COMMANDS set trace dot1x Traces 802.1X sessions. Syntax — set trace dot1x [mac-addr mac-address] [port port-num] [user username] [level level] mac-addr mac-address — Traces a MAC address. Specify a MAC address, using colons to separate the octets (for example, 00:11:22:aa:bb:cc). port port-num — Traces on a WX port number. user username — Traces a user. Specify a username of up to 80 alphanumeric characters with no spaces. level level — Determines the quantity of information included in the output. You can set the level with an integer from 1 to 10, where level 10 provides the most information. Levels 1 through 5 provide user-readable information. If you do not specify a level, level 5 is the default. Defaults — The default trace level is 5. Access — Enabled. History —Introduced in MSS Version 3.0. Examples — The following command starts a trace for the 802.1X sessions for MAC address 00:01:02:03:04:05: WX4400# set trace dot1x mac-addr 00:01:02:03:04:05: success: change accepted. See Also clear trace on page 562 display trace on page 563 set trace sm set trace sm 567 Traces session manager activity. Syntax — set trace sm [mac-addr mac-address] [port port-num] [user username] [level level] mac-addr mac-address — Traces a MAC address. Specify a MAC address, using colons to separate the octets (for example, 00:11:22:aa:bb:cc). port port-num — Traces on a WX port number. user username — Traces a user. Specify a username of up to 80 alphanumeric characters, with no spaces. level level — Determines the quantity of information included in the output. You can set the level with an integer from 1 to 10, where level 10 provides the most information. Levels 1 through 5 provide user-readable information. If you do not specify a level, level 5 is the default. Defaults — The default trace level is 5.a Access — Enabled. History —Introduced in MSS Version 3.0. Examples — Type the following command to trace session manager activity for MAC address 00:01:02:03:04:05: WX4400# set trace sm mac-addr 00:01:02:03:04:05: success: change accepted. See Also clear trace on page 562 display trace on page 563 568 CHAPTER 19: TRACE COMMANDS 20 SNOOP COMMANDS Use snoop commands to monitor wireless traffic, by using a Distributed MAP as a sniffing device. The MAP copies the sniffed 802.11 packets and sends the copies to an observer, which is typically a protocol analyzer such as Ethereal or Tethereal. (For more information, including setup instructions for the monitoring station, see the “Remotely Monitoring Traffic” section in the “Troubleshooting an WX Switch” chapter of the Wireless LAN Switch Configuration Guide.) This chapter presents snoop commands alphabetically. Use the following table to locate commands in this chapter based on their use. Table 107 Snoop Commands by Usage Remote monitoring (snooping) set snoop on page 571 display snoop info on page 577 clear snoop on page 570 set snoop map on page 574 display snoop map on page 577 display snoop on page 576 clear snoop map on page 570 set snoop mode on page 575 display snoop stats on page 578 570 CHAPTER : SNOOP COMMANDS clear snoop Deletes a snoop filter. Syntax — clear snoop filter-name filter-name — Name of the snoop filter. Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command deletes snoop filter snoop1: WX1200# clear snoop snoop1 See Also clear snoop map set snoop on page 571 display snoop info on page 577 Removes a snoop filter from an MAP radio. clear snoop map filter-name dap dap-num radio {1 | 2} filter-name — Name of the snoop filter. dap-num — Number of a Distributed MAP to which to snoop filter is mapped. radio 1 — Radio 1 of the MAP. radio 2 — Radio 2 of the MAP. (This option does not apply to single-radio models.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command removes snoop filter snoop2 from radio 2 on Distributed MAP 3: WX1200# clear snoop map snoop2 dap 3 radio 2 success: change accepted. set snoop 571 The following command removes all snoop filter mappings from all radios: WX1200# clear snoop map all success: change accepted. See Also set snoop set snoop map on page 574 display snoop on page 576 display snoop map on page 577 Configures a snoop filter. set snoop filter-name [condition-list] [observer ip-addr] [snap-length num] filter-name — Name for the filter. The name can be up to 32 alphanumeric characters, with no spaces. condition-list — Match criteria for packets. Conditions in the list are ANDed. Therefore, to be copied and sent to an observer, a packet must match all criteria in the condition-list. You can specify up to eight of the following conditions in a filter, in any order or combination: frame-type {eq | neq} {beacon | control | data | management | probe} channel {eq | neq} channel bssid {eq | neq} bssid src-mac {eq | neq} mac-addr dest-mac {eq | neq} mac-addr host-mac {eq | neq} mac-addr mac-pair mac-addr1 mac-addr2 To match on packets to or from a specific MAC address, use the dest-mac or src-mac option. To match on both send and receive traffic for a host address, use the host-mac option. To match on a traffic flow (source and destination MAC addresses), use the mac-pair option. This option matches for either direction of a flow, and either MAC address can be the source or destination address. 572 CHAPTER : SNOOP COMMANDS If you omit a condition, all packets match that condition. For example, if you omit frame-type, all frame types match the filter. For most conditions, you can use eq (equal) to match only on traffic that matches the condition value. Use neq (not equal) to match only on traffic that is not equal to the condition value. observer ip-addr — Specifies the IP address of the station where the protocol analyzer is located. If you do not specify an observer, the MAP radio still counts the packets that match the filter. snap-length num — Specifies the maximum number of bytes to capture. If you do not specify a length, the entire packet is copied and sent to the observer. 3Com recommends specifying a snap length of 100 bytes or less. Defaults — No snoop filters are configured by default. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — Traffic that matches a snoop filter is copied after it is decrypted. The decrypted (clear) version is sent to the observer. For best results: Do not specify an observer that is associated with the MAP where the snoop filter is running. This configuration causes an endless cycle of snoop traffic. set snoop 573 If the snoop filter is running on a Distributed MAP, and the MAP used a DHCP server in its local subnet to configure its IP information, and the MAP did not receive a default gateway address as a result, the observer must also be in the same subnet. Without a default gateway, the MAP cannot find the observer. The MAP that is running a snoop filter forwards snooped packets directly to the observer. This is a one-way communication, from the MAP to the observer. If the observer is not present, the MAP still sends the snoop packets, which use bandwidth. If the observer is present but is not listening to TZSP traffic, the observer continuously sends ICMP error indications back to the MAP. These ICMP messages can affect network and MAP performance. Examples — The following command configures a snoop filter named snoop1 that matches on all traffic, and copies the traffic to the device that has IP address 10.10.30.2: WX1200# set snoop snoop1 observer 10.10.30.2 snap-length 100 The following command configures a snoop filter named snoop2 that matches on all data traffic between the device with MAC address aa:bb:cc:dd:ee:ff and the device with MAC address 11:22:33:44:55:66, and copies the traffic to the device that has IP address 10.10.30.3: WX1200# set snoop snoop2 frame-type eq data mac-pair aa:bb:cc:dd:ee:ff 11:22:33:44:55:66 observer 10.10.30.3 snap-length 100 See Also clear snoop on page 570 set snoop map on page 574 set snoop mode on page 575 display snoop info on page 577 display snoop stats on page 578 574 CHAPTER : SNOOP COMMANDS set snoop map Maps a snoop filter to a radio on a Distributed MAP. A snoop filter does take effect until you map it to a radio and enable the filter. Examples — set snoop map filter-name dap dap-num radio {1 | 2} filter-name — Name of the snoop filter. dap-num —Number of a Distributed MAP to which to map the snoop filter. radio 1 — Radio 1 of the MAP. radio 2 — Radio 2 of the MAP. (This option does not apply to single-radio models.) Defaults — Snoop filters are unmapped by default. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — You can map the same filter to more than one radio. You can map up to eight filters to the same radio. If more than one filter has the same observer, the MAP sends only one copy of a packet that matches a filter to the observer. After the first match, the MAP sends the packet and stops comparing the packet against other filters for the same observer. If the filter does not have an observer, the MAP still maintains a counter of the number of packets that match the filter. (See display snoop stats on page 578.) Examples — The following command maps snoop filter snoop1 to radio 2 on Distributed MAP 3: WX1200# set snoop map snoop1 dap 3 radio 2 success: change accepted. set snoop mode 575 See Also set snoop mode clear snoop map on page 570 set snoop on page 571 set snoop mode on page 575 display snoop map on page 577 display snoop stats on page 578 Enables a snoop filter. A snoop filter does not take effect until you map it to an MAP radio and enable the filter. set snoop {filter-name | all} mode {enable [stop-after num-pkts] | disable} filter-name | all — Name of the snoop filter. Specify all to enable all snoop filters. enable [stop-after num-pkts] — Enables the snoop filter. The stop-after option disables the filter after the specified number of packets match the filter. Without the stop-after option, the filter operates until you disable it or until the MAP is restarted. disable — Disables the snoop filter. Defaults — Snoop filters are disabled by default. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — The filter mode is not retained if you change the filter configuration or disable and reenable the radio, or when the MAP or the WX switch is restarted. You must reenable the filter to place it back into effect. Examples — The following command enables snoop filter snoop1, and configures the filter to stop after 5000 packets match the filter: WX1200 set snoop snoop1 mode enable stop-after 5000 success: filter 'snoop1' enabled See Also 576 CHAPTER : SNOOP COMMANDS display snoop display snoop on page 576 display snoop info on page 577 display snoop map on page 577 display snoop stats on page 578 Displays the MAP radio mapping for all snoop filters. Syntax — display snoop Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — To display the mappings for a specific MAP radio, use the display snoop map command. Examples — The following command shows the MAP radio mappings for all snoop filters configured on a WX switch: WX1200# display snoop Dap: 3 Radio: 2 snoop1 snoop2 Dap: 2 Radio: 2 snoop2 See Also clear snoop map on page 570 set snoop map on page 574 display snoop map on page 577 display snoop info display snoop info 577 Shows the configured snoop filters. Syntax — display snoop filter-name filter-name — Name of the snoop filter. Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Examples — The following command shows the snoop filters configured in the examples above: WX1200# display snoop info snoop1: observer 10.10.30.2 snap-length 100 all packets snoop2: observer 10.10.30.3 snap-length 100 frame-type eq data mac-pair (aa:bb:cc:dd:ee:ff, 11:22:33:44:55:66) See Also display snoop map clear snoop on page 570 set snoop on page 571 Shows the MAP radios that are mapped to a specific snoop filter. Syntax — display snoop map filter-name filter-name — Name of the snoop filter. Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. 578 CHAPTER : SNOOP COMMANDS Usage — To display the mappings for all snoop filters, use the display snoop command. Examples — The following command shows the mapping for snoop filter snoop1: WX1200# display snoop map snoop1 filter 'snoop1' mapping Dap: 3 Radio: 2 See Also display snoop stats clear snoop map on page 570 set snoop map on page 574 display snoop on page 576 Displays statistics for enabled snoop filters. Examples — display snoop stats [filter-name [dap-num [radio {1 | 2}]]] filter-name — Name of the snoop filter. dap-num — Number of a Distributed MAP to which the snoop filter is mapped. radio 1 — Radio 1 of the MAP. radio 2 — Radio 2 of the MAP. (This option does not apply to single-radio models.) Defaults — None. Access — Enabled. History —Introduced in MSS Version 4.0. Usage — The MAP retains statistics for a snoop filter until the filter is changed or disabled. The MAP then clears the statistics. display snoop stats 579 Examples — The following command shows statistics for snoop filter snoop1: WX1200# display snoop stats snoop1 Filter Dap Radio Rx Match Tx Match Dropped Stop-After ========================================================================= snoop 3 1 96 4 0 stopped Table 108 describes the fields in this display. Table 108 display snoop stats Output Field Description Filter Name of the snoop filter. Dap Distributed MAP containing the radio to which the filter is mapped. Radio Radio to which the filter is mapped. Rx Match Number of packets received by the radio that match the filter. Tx Match Number of packets sent by the radio that match the filter. Dropped Number of packets that matched the filter but that were not copied to the observer due to memory or network problems. Stop-After Filter state: running—enabled stopped—disabled number-of-packets—If the filter is running and the stop-after option was used to stop the filter, this field displays the number of packets that still need to match before the filter is stopped. 580 CHAPTER : SNOOP COMMANDS 21 SYSTEM LOG COMMANDS Use the system log commands to record information for monitoring and troubleshooting. MSS system logs are based on RFC 3164, which defines the log protocol. Commands by Usage This chapter present system log commands alphabetically. Use Table 109 to locate commands in this chapter based on their use. Table 109 System Log Commands by Usage Type Command System Logs set log on page 586 set log trace mbytes on page 589 display log config on page 584 display log buffer on page 582 display log trace on page 585 clear log on page 581 clear log Clears the log messages stored in the log buffer, or removes the configuration for a syslog server and stops sending log messages to that server. Syntax — clear log [buffer | server ip-addr] buffer — Deletes the log messages stored in nonvolatile storage. server ip-addr — Deletes the configuration for and stops sending log messages to the syslog server at this IP address. Specify an address in dotted decimal notation. Defaults — None. 582 CHAPTER 21: SYSTEM LOG COMMANDS Access — Enabled. History — Introduced in MSS Version 3.0. Examples — To stop sending system logging messages to a server at 192.168.253.11, type the following command: WX4400# clear log server 192.168.253.11 success: change accepted. Type the following command to clear all messages from the log buffer: WX4400# clear log buffer success: change accepted. See Also display log buffer clear log trace on page 562 set log on page 586 Displays system information stored in the nonvolatile log buffer or the trace buffer. Syntax — display log buffer [{+|-}number-of-messages] [facility facility-name] [matching string] [severity severity-level] buffer — Displays the log messages in nonvolatile storage. +|- number-of-messages — Displays the number of messages specified as follows: A positive number (for example, +100), displays that number of log entries starting from the oldest in the log. A negative number (for example, -100) displays that number of log entries starting from newest in the log. facility facility-name — Area of MSS that is sending the log message. Type a space and a question mark (?) after display log buffer facility for a list of valid facilities. matching string — Displays messages that match a string—for example, a username or IP address. display log buffer 583 severity severity-level — Displays messages at a severity level greater than or equal to the level specified. Specify one of the following: emergency — The WX switch is unusable. alert — Action must be taken immediately. critical — You must resolve the critical conditions. If the conditions are not resolved, the WX can reboot or shut down. error — The WX is missing data or is unable to form a connection. warning — A possible problem exists. notice — Events that potentially can cause system problems have occurred. These are logged for diagnostic purposes. No action is required. info — Informational messages only. No problem exists. debug — Output from debugging. Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — The debug level produces a lot of messages, many of which can appear to be somewhat cryptic. Debug messages are used primarily by 3Com for troubleshooting and are not intended for administrator use. Examples — Type the following command to see the facilities for which you can view event messages archived in the buffer: WX4400# display log buffer facility ? Select one of: KERNEL, AAA, SYSLOGD, ACL, APM, ARP, ASO, BOOT, CLI, CLUSTER, COPP, CRYPTO, DOT1X, ENCAP, ETHERNET, GATEWAY, HTTPD, IGMP, IP, MISC, NOSE, NP, RAND, RESOLV, RIB, ROAM, ROGUE, SM, SNMPD, SPAN, STORE, SYS, TAGMGR, TBRIDGE, TCPSSL, TELNET, TFTP, TLS, TUNNEL, VLAN, X509, XML, MAP, RAPDA, WEBVIEW, EAP, PORTCONFIG, FP. The following command displays logged messages for the AAA facility: WX4400# display log buffer facility AAA AAA Jun. 25 09:11:32.579848 ERROR AAA_NOTIFY_ERR: AAA got SM special event (98) on locality 3950 which is gone 584 CHAPTER 21: SYSTEM LOG COMMANDS See Also display log config clear log on page 581 display log config on page 584 Displays log configuration information. Syntax — display log config Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — To display how logging is configured, type the following command: WX4400# Logging Logging Logging Logging Logging Logging Logging Logging Logging display log config console: console severity: sessions: sessions severity: buffer: buffer severity: trace: trace severity: buffer size: Logging server: Current session: Current session severity: See Also set log on page 586 clear log on page 581 disabled DEBUG disabled INFO enabled WARNING enabled DEBUG 10485760 bytes 10.1.1.10 disabled INFO severity DEBUG display log trace display log trace 585 Displays system information stored in the nonvolatile log buffer or the trace buffer. Syntax — display log trace [{+|-|/}number-of-messages] [facility facility-name] [matching string] [severity severity-level] trace — Displays the log messages in the trace buffer. +|-|/number-of-messages — Displays the number of messages specified as follows: A positive number (for example, +100), displays that number of log entries starting from the oldest in the log. A negative number (for example, -100) displays that number of log entries starting from newest in the log. A number preceded by a slash (for example, /100) displays that number of the most recent log entries in the log, starting with the least recent. facility facility-name — Area of MSS that is sending the log message. Type a space and a question mark (?) after display log trace facility for a list of valid facilities. matching string — Displays messages that match a string—for example, a username or IP address. severity severity-level — Displays messages at a severity level greater than or equal to the level specified. Specify one of the following: emergency — The WX switch is unusable. alert — Action must be taken immediately. critical — You must resolve the critical conditions. If the conditions are not resolved, the WX can reboot or shut down. error — The WX is missing data or is unable to form a connection. warning — A possible problem exists. notice — Events that potentially can cause system problems have occurred. These are logged for diagnostic purposes. No action is required. info — Informational messages only. No problem exists. debug — Output from debugging. 586 CHAPTER 21: SYSTEM LOG COMMANDS Defaults — None. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — Type the following command to see the facilities for which you can view event messages archived in the buffer: WX4400# display log trace facility ? Select one of: KERNEL, AAA, SYSLOGD, ACL, APM, ARP, ASO, BOOT, CLI, CLUSTER, COPP, CRYPTO, DOT1X, ENCAP, ETHERNET, GATEWAY, HTTPD, IGMP, IP, MISC, NOSE, NP, RAND, RESOLV, RIB, ROAM, ROGUE, SM, SNMPD, SPAN, STORE, SYS, TAGMGR, TBRIDGE, TCPSSL, TELNET, TFTP, TLS, TUNNEL, VLAN, X509, XML, MAP, RAPDA, WEBVIEW, EAP, PORTCONFIG, FP. See Also set log clear log on page 581 display log config on page 584 Enables or disables logging of WX and MAP events to the WX log buffer or other logging destination and sets the level of the events logged. For logging to a syslog server only, you can also set the facility logged. Syntax — set log {buffer | console | current | server ip-addr | sessions | trace} [severity severity-level] enable | disable] Syntax — set log server ip-addr [severity severity-level [local-facility facility-level]] [enable | disable] buffer — Sets log parameters for the log buffer in nonvolatile storage. console — Sets log parameters for console sessions. current — Sets log parameters for the current Telnet or console session. These settings are not stored in nonvolatile memory. server ip-addr — Sets log parameters for a syslog server. Specify an address in dotted decimal notation. set log 587 sessions — Sets the default log values for Telnet sessions. You can set defaults for the following log parameters: Severity Logging state (enabled or disabled) To override the session defaults for an individual session, type the set log command from within the session and use the current option. trace — Sets log parameters for trace files. severity severity-level — Logs events at a severity level greater than or equal to the level specified. Specify one of the following: emergency — The WX switch is unusable. alert — Action must be taken immediately. critical — You must resolve the critical conditions. If the conditions are not resolved, the WX can reboot or shut down. error — The WX is missing data or is unable to form a connection. warning — A possible problem exists. notice — Events that potentially can cause system problems have occurred. These are logged for diagnostic purposes. No action is required. info — Informational messages only. No problem exists. debug — Output from debugging. local-facility facility-level — For messages sent to a syslog server, maps all messages of the severity you specify to one of the standard local log facilities defined in RFC 3164. You can specify one of the following values: 0 — maps all messages to local0. 1 — maps all messages to local1. 2 — maps all messages to local2. 3 — maps all messages to local3. 4 — maps all messages to local4. 5 — maps all messages to local5. 6 — maps all messages to local6. 7 — maps all messages to local7. 588 CHAPTER 21: SYSTEM LOG COMMANDS If you do not specify a local facility, MSS sends the messages with their default MSS facilities. For example, AAA messages are sent with facility 4 and boot messages are sent with facility 20 by default. enable — Enables messages to the specified target. disable — Disables messages to the specified target. Defaults — The following are defaults for the set log commands. Events at the error level and higher are logged to the WX console. Events at the error level and higher are logged to the WX system buffer. Trace logging is enabled, and debug-level output is stored in the WX trace buffer. Access — Enabled. History — Introduced in MSS Version 3.0. Usage — Using the command with only enable or disable turns logging on or off for the target at all levels. For example, entering set log buffer enable with no other keywords turns on logging to the system buffer of all facilities at all levels. Entering set log buffer disable with no other keywords turns off all logging to the buffer. Examples — To log only emergency, alert, and critical system events to the console, type the following command: WX4400# set log console severity critical enable success: change accepted. See Also clear log on page 581 display log config on page 584 set log trace mbytes set log trace mbytes 589 Changes the size of trace log files. Syntax — set log trace mbytes count count — Size of the trace buffer, in megabytes (MB). You can specify from 1 through 50. Defaults — The default trace buffer size is 1 MB. Access — Enabled. History — Introduced in MSS Version 3.0. Examples — The following command increases the trace buffer size to 4 MB: WX4400# set log trace mbytes 4 success: change accepted. See Also display log config on page 584 590 CHAPTER 21: SYSTEM LOG COMMANDS 22 BOOT PROMPT COMMANDS Boot prompt commands enable you to perform basic tasks, including booting a system image file, from the boot prompt (boot>). A CLI session enters the boot prompt if MSS does not boot successfully or you intentionally interrupt the boot process. To interrupt the boot process, press q followed by Enter (return). CAUTION: Generally, boot prompt commands are used only for troubleshooting. 3Com recommends that you use these commands only when working with 3Com Technical Support to diagnose a system issue. In particular, commands that change boot parameters can interfere with a WX switch’s ability to boot successfully. Boot Prompt Commands by Usage This chapter presents boot prompt commands alphabetically. Use Table 110 to locate commands in this chapter based on their use. Table 110 Boot Prompt Commands by Usage Type Command Command Information ls on page 602 help on page 602 Booting boot on page 593 reset on page 604 autoboot on page 592 File Management dir on page 598 fver on page 601 version on page 606 Boot Profile Management display on page 599 create on page 596 592 CHAPTER 22: BOOT PROMPT COMMANDS Table 110 Boot Prompt Commands by Usage (continued) Type Command Boot Profile Management, cont. next on page 603 change on page 595 delete on page 597 Diagnostics diag on page 598 test on page 605 autoboot Displays or changes the state of the autoboot option. The autoboot option controls whether a WX switch automatically boots a system image after initializing the hardware, following a system reset or power cycle. Syntax — autoboot [ON | on | OFF | off] ON — Enables the autoboot option. on — Same effect as ON. OFF — Disables the autoboot option. off — Same effect as OFF. Defaults — The autoboot option is enabled by default. Access — Boot prompt. History —Introduced in MSS Version 3.0. Examples — The following command displays the current setting of the autoboot option: boot> autoboot The autoboot flag is on. See Also boot on page 593 boot boot 593 Loads and executes a system image file. Syntax — boot [BT=type] [DEV=device] [FN=filename] [HA=ip-addr] [FL=num] [OPT=option] [OPT+=option] BT=type — Boot type: c — Compact flash. Boots using nonvolatile storage or a flash card. n — Network. Boots using a TFTP server. DEV=device — Location of the system image file: c: — Nonvolatile storage area containing boot partition 0 d: — Nonvolatile storage area containing boot partition 1 e: — Primary partition of the flash card in the flash card slot f: — Secondary partition of the flash card in the flash card slot boot0 — boot partition 0 boot1 — boot partition 1 FN=filename — System image filename. HA=ip-addr — Host address (IP address) of a TFTP server. This parameter applies only when the boot type is n (network). FL=num — Number representing the bit settings of boot flags to pass to the booted system image. Use this parameter only if advised to do so by 3Com. OPT=option — String up to 128 bytes of boot options to pass to the booted system image instead of the boot option(s) in the currently active boot profile. The options temporarily replace the options in the boot profile. Use this parameter only if advised to do so by 3Com. OPT+=option — String up to 128 bytes of boot options to pass to the booted system image in addition to the boot option(s) in the currently active boot profile. The options are appended to the options already in the boot profile. Use this parameter only if advised to do so by 3Com. Defaults — The boot settings in the currently active boot profile are used by default. Access — Boot prompt. History —Introduced in MSS Version 3.0. 594 CHAPTER 22: BOOT PROMPT COMMANDS Usage — If you use an optional parameter, the parameter setting overrides the setting of the same parameter in the currently active boot profile. However, the boot profile itself is not changed. To display the currently active boot profile, use the display command. To change the currently active boot profile, use the change command. Examples — The following command loads system image file WXA30001.Rel from boot partition 1: boot> boot FN=WXA03001.Rel DEV=boot1 Compact Flash load from boot0:WXA03001.Rel. unzip: Inflating ramdisk_3.0.1_092304_WX4400 OK unzip file len 36196930 OK Copyright (c) 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004 The NetBSD Foundation, Inc. All rights reserved. Copyright (c) 1982, 1986, 1989, 1991, 1993 The Regents of the University of California. All rights reserved. Detecting hardware...done. readclock: 2004-9-29 21:45:7.31 UTC system initialized (3.0.1), starting MSS Executing update_3 Starting supervisor 3.0.1_092304_WX4400 ... SNMPD Sep 29 21:45:34.262293 NOTICE SNMPD: SNMP Agent Resident Module Version 16.1.0.0 SNMPD Sep 29 21:45:34.263146 NOTICE SNMPD: Copyright (c) 2004 3Com Corporation. All rights reserved. SYS Sep 29 21:45:36.849457 NOTICE Port 1 up 1000 Full Duplex SYSLOGD Sep 29 21:45:38.857125 ALERT SYSTEM_READY: The system has finished booting. (cause was "Warm Reboot") Copyright (c) 2004 3Com Corporation. All rights reserved. Username: See Also change on page 595 display on page 599 change change 595 Changes parameters in the currently active boot profile. (For information about boot profiles, see display on page 599.) Syntax — change Defaults — The default boot type is c (compact flash). The default filename is default. The default flags setting is 0x00000000 (all flags disabled) and the default options list is run=nos;boot=0. The default device setting is the boot partition specified by the most recent set boot partition command typed at the Enabled level of the CLI, or boot 0 if the command has never been typed. Access — Boot prompt. History —Introduced in MSS Version 3.0. Usage — After you type the change command, the system interactively displays the current setting of each parameter and prompts you for the new setting. When prompted, type the new setting, press Enter to accept the current setting, or type . (period) to change the setting to its default value. To back up to the previous parameter, type - (hyphen). For information about each of the boot parameters you can set, see display on page 599. Examples — The following command enters the configuration mode for the currently active boot profile, changes the device to boot1, and leaves the other parameters with their current settings: boot> change Changing the default configuration is not recommended. Are you sure that you want to proceed? (y/n) BOOT TYPE: DEVICE: FILENAME: FLAGS: OPTIONS: [c] [boot0:]boot1 [default] [0x00000000] [run=nos;boot=0] See Also boot on page 593 create on page 596 596 create CHAPTER 22: BOOT PROMPT COMMANDS delete on page 597 display on page 599 next on page 603 Creates a new boot profile. (For information about boot profiles, see display on page 599.) Syntax — create Defaults — The new boot profile has the same settings as the currently active boot profile by default. Access — Boot prompt. History —Introduced in MSS Version 3.0. Usage — A WX switch can have up to four boot profiles. The boot profiles are stored in slots, numbered 0 through 3. When you create a new profile, the system uses the next available slot for the profile. If all four slots already contain profiles and you try to create a fifth profile, the switch displays a message advising you to change one of the existing profiles instead. To make a new boot profile the currently active boot profile, use the next command. To change boot parameter settings, use the change command. Examples — The following command creates a new boot profile in slot 1 on a WX switch that currently has only one boot profile, in slot 0: boot> create BOOT Index: BOOT TYPE: DEVICE: FILENAME: FLAGS: OPTIONS: 1 c boot1: default 00000000 run=nos;boot=0 See Also change on page 595 delete on page 597 delete delete display on page 599 next on page 603 597 Removes the currently active boot profile. (For information about boot profiles, see display on page 599.) Syntax — delete Defaults — None. Access — Boot prompt. History —Introduced in MSS Version 3.0. Usage — When you type the delete command, the next-lower numbered boot profile becomes the active profile. For example, if the currently active profile is number 3, profile number 2 becomes active after you type delete to delete profile 3. You cannot delete boot profile 0. Examples — To remove the currently active boot profile, type the following command: boot> delete BOOT Index: BOOT TYPE: DEVICE: FILENAME: FLAGS: OPTIONS: 1 c boot1: default 00000000 run=nos;boot=0 See Also change on page 595 create on page 596 display on page 599 next on page 603 598 diag CHAPTER 22: BOOT PROMPT COMMANDS Accesses the diagnostic mode. Syntax — diag Defaults — The diagnostic mode is disabled by default. Access — Boot prompt. History —Introduced in MSS Version 3.0. Usage — Access to the diagnostic mode requires a password, which is not user configurable. Use this mode only if advised to do so by 3Com. dir Displays the boot code and system image files on a WX switch. Syntax — dir [c: | d: | e: | f: | boot0 | boot1] c: — Nonvolatile storage area containing boot partition 0 (primary). d: — Nonvolatile storage area containing boot partition 1 (secondary). e: — Primary partition of the flash card in the flash card slot. f: — Secondary partition of the flash card in the flash card slot. boot0 — Boot partition 0. boot1 — Boot partition 1. Defaults — None. Access — Boot prompt. History —Introduced in MSS Version 3.0. Usage — To display the system image software versions, use the fver command. This command does not list the boot code versions. To display the boot code versions, use the version command. Examples — The following command displays all the boot code and system image files on a WX switch: boot> dir Internal Compact Flash Directory (Primary): WXA30001.Rel 8863722 bytes display 599 Internal Compact Flash Directory (Secondary): WXA30001.Rel 8862885 bytes See Also display fver on page 601 version on page 606 Displays the currently active boot profile. A boot profile is a set of parameters that a WX switch uses to control the boot process. Each boot profile contains the following parameters: Boot type — Either compact flash (local device on the WX switch) or network (TFTP) Boot device — Location of the system image file Filename — System image file Flags — Number representing the bit settings of boot flags to pass to the booted system image. Options — String up to 128 bytes of boot options to pass to the booted system image A WX switch can have up to four boot profiles, numbered 0 through 3. Only one boot profile can be active at a time. You can create, change, and delete boot profiles. You also can activate another boot profile in place of the currently active one. Syntax — display Defaults — None. Access — Boot prompt. History —Introduced in MSS Version 3.0. Examples — To display the currently active boot profile, type the following command at the boot prompt: boot> display BOOT Index: BOOT TYPE: 0 c 600 CHAPTER 22: BOOT PROMPT COMMANDS DEVICE: FILENAME: FLAGS: OPTIONS: boot1: default 00000000 run=nos;boot=0 Table 111 describes the fields in the display. Table 111 Output of display command Field Description BOOT Index Boot profile slot, which can be a number from 0 to 3. BOOT TYPE Boot type: DEVICE c — Compact flash. Boots using nonvolatile storage or a flash card. n — Network. Boots using a TFTP server. Location of the system image file: c: — Nonvolatile storage area containing boot partition 0 d: — Nonvolatile storage area containing boot partition 1 e: — Primary partition of the flash card in the flash card slot f: — Secondary partition of the flash card in the flash card slot boot0 — boot partition 0 boot1 — boot partition 1 FILENAME System image file name. FLAGS Number representing the bit settings of boot flags to pass to the booted system image. OPTIONS String up to 128 bytes of boot options to pass to the booted system image. See Also change on page 595 create on page 596 delete on page 597 next on page 603 fver fver 601 Displays the version of a system image file installed in a specific location on a WX switch. Syntax — fver {c: | d: | e: | f: | boot0: | boot1:} [filename] c: — Nonvolatile storage area containing boot partition 0 (primary). d: — Nonvolatile storage area containing boot partition 1 (secondary). e: — Primary partition of the flash card in the flash card slot. f: — Secondary partition of the flash card in the flash card slot. boot0: — Boot partition 0. boot1: — Boot partition 1. filename — System image filename. Defaults — None. Access — Boot prompt. History —Introduced in MSS Version 3.0. Usage — To display the image filenames, use the dir command. This command does not list the boot code versions. To display the boot code versions, use the version command. Examples — The following command displays the system image version installed in boot partition 1: boot> fver boot1 File boot1:default version is 3.0.1. See Also dir on page 598 version on page 606 602 CHAPTER 22: BOOT PROMPT COMMANDS help Displays a list of all the boot prompt commands or detailed information for an individual command. Syntax — help [command-name] command-name — Boot prompt command. Defaults — None. Access — Boot prompt. History —Introduced in MSS Version 3.0. Usage — If you specify a command name, detailed information is displayed for that command. If you do not specify a command name, all the boot prompt commands are listed. Examples — The following command displays detailed information for the fver command: boot> help fver fver Display the version of the specified device:filename. USAGE: fver [c:file|d:file|e:file|f:file|boot0:file|boot1:file| boot2:file|boot3:file] Command to display the version of the compressed image file associated with the given device:filename. See Also ls ls on page 602 Displays a list of the boot prompt commands. Syntax — ls Defaults — None. Access — Boot prompt. History —Introduced in MSS Version 3.0. next 603 Usage — To display help for an individual command, type help followed by the command name (for example, help boot). Examples — To display a list of the commands available at the boot prompt, type the following command: boot> ls ls help autoboot boot profile. change create delete next display dir fver version reset test diag Display a list of all commands and descriptions. Display help information for each command. Display the state of, enable, or disable the autoboot option. Load and execute an image using the current boot configuration Change the current boot configuration profile. Create a new boot configuration profile. Delete the current boot configuration profile. Select the next boot configuration profile. Display the current boot configuration profile. Display the contents of the specified boot partition. Display the version of the loadable image specified by device:filename. Display HW and Bootstrap/Bootloader version information. Reset the system. Display the state of, enable, or disable the tests option. Access the diagnostic command CLI. See Also next help on page 602 Activates and displays the boot profile in the next boot profile slot. (For information about boot profiles, see display on page 599.) Syntax — next Defaults — None. Access — Boot prompt. History —Introduced in MSS Version 3.0. Usage — A WX switch contains 4 boot profile slots, numbered 0 through 3. This command activates the boot profile in the next slot, in ascending numerical order. If the currently active slot is 3, the command activates the boot profile in slot 0. 604 CHAPTER 22: BOOT PROMPT COMMANDS Examples — To activate the boot profile in the next slot and display the profile, type the following command: boot> next BOOT Index: BOOT TYPE: DEVICE: FILENAME: FLAGS: OPTIONS: 0 c boot1: testcfg 00000000 run=nos;boot=0 See Also reset change on page 595 create on page 596 delete on page 597 display on page 599 Resets a WX switch’s hardware. Syntax — reset Defaults — None. Access — Boot prompt. History —Introduced in MSS Version 3.0. Usage — After resetting the hardware, the reset command attempts to load a system image file only if other boot settings are configured to do so. Examples — To immediately reset the system, type the following command at the boot prompt: boot> reset WX Bootstrap 3.1 Release Testing Low Memory 1 ............ Testing Low Memory 2 ............ CISTPL_VERS_1: 4.1 <5/3 0.6> Reset Cause (0x0100) is WARM test 605 3Com WX-4400 Bootstrap/Bootloader Version 3.0.2 Release Compiled on Wed Sep 22 09:18:47 PDT 2004 by Bootstrap Bootloader Bootstrap Bootloader 0 0 1 1 version: version: version: version: WX-4400 Board Revision: WX-4400 Controller Revision: WXA30001.Rel BOOT Index: BOOT TYPE: DEVICE: FILENAME: FLAGS: OPTIONS: 3.1 3.0.2 3.1 3.0.1 Active Active 2. 5. 8863722 bytes 0 c boot0: default 00000000 run=nos;root=md0a See Also test boot on page 593 Displays or changes the state of the poweron test flag. The poweron test flag controls whether a WX performs a set of self tests prior to the boot process. Syntax — test [ON | on | OFF | off] ON — Enables the poweron test flag. on — Same effect as ON. OFF — Disables the poweron test flag. off — Same effect as OFF. Defaults — The poweron test flag is disabled by default. Access — Boot prompt. History —Introduced in MSS Version 3.0. 606 CHAPTER 22: BOOT PROMPT COMMANDS Examples — The following command displays the current setting of the poweron test flag: boot> test The diagnostic execution flag is not set. See Also version boot on page 593 Displays version information for a WX switch’s hardware and boot code. Syntax — version Defaults — None. Access — Boot prompt. History —Introduced in MSS Version 3.0. Usage — This command does not list the system image file versions installed in the boot partitions. To display system image file versions, use the dir or fver command. Examples — To display hardware and boot code version information, type the following command at the boot prompt: boot> version 3Com WX-4400 Bootstrap/Bootloader Version 3.0.2 Release Compiled on Wed Sep 22 09:18:47 PDT 2004 by Bootstrap Bootloader Bootstrap Bootloader 0 0 1 1 version: version: version: version: WX-4400 Board Revision: WX-4400 Controller Revision: See Also dir on page 598 fver on page 601 3.1 3.0.2 3.1 3.0.1 2. 5. Active Active A Register Your Product OBTAINING SUPPORT FOR YOUR PRODUCT Warranty and other service benefits start from the date of purchase, so it is important to register your product quickly to ensure you get full use of the warranty and other service benefits available to you. Warranty and other service benefits are enabled through product registration. Register your product at http://eSupport.3com.com/. 3Com eSupport services are based on accounts that you create or have authorization to access. First time users must apply for a user name and password that provides access to a number of eSupport features including Product Registration, Repair Services, and Service Request. If you have trouble registering your product, please contact 3Com Global Services for assistance. Purchase Value-Added Services To enhance response times or extend warranty benefits, contact 3Com or your authorized 3Com reseller. Value-added services like 3Com ExpressSM and GuardianSM can include 24x7 telephone Technical Support, software upgrades, onsite assistance or advance hardware replacement. Experienced engineers are available to manage your installation with minimal disruption to your network. Expert assessment and implementation services are offered to fill resource gaps and ensure the success of your networking projects. More information on 3Com maintenance and Professional Services is available at http://www.3com.com/ Contact your authorized 3Com reseller or 3Com for a complete list of the value-added services available in your area. 608 APPENDIX A: OBTAINING SUPPORT FOR YOUR PRODUCT Troubleshoot Online You will find support tools posted on the 3Com web site at http://www.3com.com/ 3Com Knowledgebase helps you troubleshoot 3Com products. This query-based interactive tool is located at http://knowledgebase.3com.com and contains thousands of technical solutions written by 3Com support engineers. Access Software Downloads Software Updates are the bug fix / maintenance releases for the version of software initially purchased with the product. In order to access these Software Updates you must first register your product on the 3Com web site at http://eSupport.3com.com/ First time users will need to apply for a user name and password. A link to software downloads can be found at http://eSupport.3com.com/, or under the Product Support heading at http://www.3com.com/ Software Upgrades are the software releases that follow the software version included with your original product. In order to access upgrades and related documentation you must first purchase a service contract from 3Com or your reseller. Telephone Technical Support and Repair To enable telephone support and other service benefits, you must first register your product at http://eSupport.3com.com/ Warranty and other service benefits start from the date of purchase, so it is important to register your product quickly to ensure you get full use of the warranty and other service benefits available to you. When you contact 3Com for assistance, please have the following information ready: Product model name, part number, and serial number Proof of purchase, if you have not pre-registered your product A list of system hardware and software, including revision level Diagnostic error messages Details about recent configuration changes, if applicable Contact Us 609 To send a product directly to 3Com for repair, you must first obtain a return authorization number (RMA). Products sent to 3Com, without authorization numbers clearly marked on the outside of the package, will be returned to the sender unopened, at the sender’s expense. If your product is registered and under warranty, you can obtain an RMA number online at http://eSupport.3com.com/. First time users will need to apply for a user name and password. Contact Us 3Com offers telephone, e-mail and internet access to Technical Support and repair services. To access these services for your region, use the appropriate telephone number, URL or e-mail address from the list below. Telephone numbers are correct at the time of publication. Find a current directory of contact information posted on the 3Com web site at http://csoweb4.3com.com/contactus/ Country Telephone Number Country Telephone Number Asia, Pacific Rim Telephone Technical Support and Repair Australia Hong Kong India Indonesia Japan Malaysia New Zealand Pakistan 1 800 678 515 800 933 486 +61 2 9424 5179 or 000800 650 1111 001 803 61009 00531 616 439 or 03 3507 5984 1800 801 777 0800 446 398 +61 2 9937 5083 Philippines P.R. of China Singapore S. Korea Taiwan Thailand 1235 61 266 2602 or 1800 1 888 9469 800 810 3033 800 6161 463 080 333 3308 00801 611 261 001 800 611 2000 You can also obtain support in this region using the following e-mail: apr_technical_support@3com.com Or request a repair authorization number (RMA) by fax using this number: Europe, Middle East, and Africa Telephone Technical Support and Repair From anywhere in these regions, call: +44 (0)1442 435529 From the following countries, you may use the numbers shown: + 65 543 6348 610 APPENDIX A: OBTAINING SUPPORT FOR YOUR PRODUCT Country Telephone Number Country Telephone Number Austria Belgium Denmark Finland France Germany Hungary Ireland Israel Italy 01 7956 7124 070 700 770 7010 7289 01080 2783 0825 809 622 01805 404 747 06800 12813 1407 3387 1800 945 3794 199 161346 Luxembourg Netherlands Norway Poland Portugal South Africa Spain Sweden Switzerland U.K. 342 0808128 0900 777 7737 815 33 047 00800 441 1357 707 200 123 0800 995 014 9 021 60455 07711 14453 08488 50112 0870 909 3266 You can also obtain support in this region using the following URL: http://emea.3com.com/support/email.html Latin America Telephone Technical Support and Repair Antigua Argentina Aruba Bahamas Barbados Belize Bermuda Bonaire Brazil Cayman Chile Colombia Costa Rica Curacao Ecuador Dominican Republic 1 800 988 2112 0 810 444 3COM 1 800 998 2112 1 800 998 2112 1 800 998 2112 52 5 201 0010 1 800 998 2112 1 800 998 2112 0800 13 3COM 1 800 998 2112 AT&T +800 998 2112 AT&T +800 998 2112 AT&T +800 998 2112 1 800 998 2112 AT&T +800 998 2112 AT&T +800 998 2112 Guatemala Haiti Honduras Jamaica Martinique Mexico Nicaragua Panama Paraguay Peru Puerto Rico Salvador Trinidad and Tobago Uruguay Venezuela Virgin Islands You can also obtain support in this region using the following: Spanish speakers, enter the URL: http://lat.3com.com/lat/support/form.html Portuguese speakers, enter the URL: http://lat.3com.com/br/support/form.html English speakers in Latin America should send e-mail to: lat_support_anc@3com.com US and Canada Telephone Technical Support and Repair 1 800 876 3266 AT&T +800 998 2112 57 1 657 0888 AT&T +800 998 2112 1 800 998 2112 571 657 0888 01 800 849CARE AT&T +800 998 2112 AT&T +800 998 2112 54 11 4894 1888 AT&T +800 998 2112 1 800 998 2112 AT&T +800 998 2112 1 800 998 2112 AT&T +800 998 2112 AT&T +800 998 2112 57 1 657 0888 INDEX A autoboot 592 B boot 593 C change 595 clear {ap | dap} radio 272 clear accounting 201 clear authentication admin 202 clear authentication console 203 clear authentication dot1x 204 clear authentication last-resort 205 clear authentication mac 205 clear authentication proxy 206 clear authentication web 207 clear banner motd 38 clear boot config 541 clear dap 62 clear dot1x max-req 479 clear dot1x port-control 479 clear dot1x quiet-period 480 clear dot1x reauth-max 481 clear dot1x reauth-period 481 clear dot1x timeout auth-server 482 clear dot1x timeout supplicant 482 clear dot1x tx-period 483 clear fdb 96 clear history 38 clear igmp statistics 400 clear interface 115 clear ip alias 116 clear ip dns domain 117 clear ip dns server 117 clear ip route 118 clear ip telnet 119 clear location policy 208 clear log 581 clear log buffer 581 clear log server 581 clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear clear log trace 562 mac-user 209 mac-user attr 209 mac-user group 210 mac-usergroup 211 mac-usergroup attr 212 mobility-domain 262 mobility-domain member 262 mobility-profile 213 ntp server 119 ntp update-interval 120 port counters 63 port name 64 port type 65 port-group 63 radio-profile 274 radius 464 radius client system-ip 465 radius proxy client 466 radius proxy port 466 radius server 467 rfdetect attack-list 512 rfdetect black-list 513 rfdetect countermeasures mac 513 rfdetect ignore 513 rfdetect ssid-list 514 rfdetect vendor-list 515 security acl 424 security acl map 425 server group 467 server group load-balance 467 service-profile 275, 276 sessions 497 sessions network 498 snmp notify target 121 snmp profile 122 snmp trap receiver 121 snmp usm 122 snoop 570 snoop map 570 spantree portcost 372 spantree portpri 373 spantree portvlancost 373 spantree portvlanpri 374 612 INDEX clear spantree statistics 375 clear summertime 123 clear system 39 clear system countrycode 39 clear system ip-address 39, 124 clear system location 40 clear system name 39 clear timezone 124 clear trace 562 clear user 213 clear user attr 214 clear user group 215 clear usergroup 215 clear usergroup attr 216 clear vlan 97 commit security acl 427 copy 542 create 596 crypto certificate 449 crypto certificate admin 449 crypto certificate eap 449 crypto generate key 451 crypto generate request 452 crypto generate request admin 452 crypto generate request eap 452 crypto generate self-signed 454 crypto generate self-signed admin 454 crypto generate self-signed eap 454 crypto otp 456 crypto otp admin 456 crypto otp eap 456 crypto pkcs12 457 crypto pkcs12 admin 457 crypto pkcs12 eap 457 D delete 544, 597 diag 598 dir 545, 598 disable 33 display 599 display {ap | dap} config 277 display {ap | dap} counters 280 display {ap | dap} etherstats 284 display {ap | dap} group 285 display {ap | dap} qos-stats 282 display {ap | dap} status 287 display aaa 217 display accounting statistics 220 display arp 125 display auto-tune attributes 290 display auto-tune neighbors 292 display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display banner motd 40 base-information 41 boot 547 config 548 crypto ca-certificate 459 crypto certificate 460 crypto key ssh 461 dap connection 294 dap global 295 dap unconfigured 297 dhcp-client 182 dhcp-server 183 dot1x 483 fdb 98 fdb agingtime 101 fdb count 101 igmp 400 igmp mrouter 404 igmp querier 405 igmp receiver-table 407 igmp statistics 409 interface 126 ip alias 127 ip dns 128 ip https 129 ip route 131 ip telnet 133 license 42 location policy 222 log buffer 582 log config 584 log trace 585 mobility-domain config 263 mobility-domain status 263 mobility-profile 222 ntp 134 ntp on page 163 121 port counters 66 port poe 68 port status 70 port-group 67 radio-profile 298 rfdetect attack-list 534 rfdetect black-list 535 rfdetect clients 535 rfdetect countermeasures 517 rfdetect counters 515 rfdetect data 518 rfdetect ignore 520 rfdetect mobility-domain 521 rfdetect ssid-list 525 rfdetect vendor-list 525 rfdetect visible 526 INDEX display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display display roaming station 102 roaming vlan 104 security acl 429 security acl dscp 428 security acl editbuffer 429 security acl hits 430 security acl info 431 security acl map 432 security acl resource-usage 433 service-profile 302 sessions 500 sessions network 503 snmp community 186 snmp configuration 136 snmp counters 187 snmp notify profile 188 snmp notify target 189 snmp status 191 snmp usm 193 snoop 576 snoop info 577 snoop map 577 snoop stats 578 spantree 376 spantree backbonefast 378 spantree blockedports 379 spantree portfast 380 spantree portvlancost 381 spantree statistics 381 spantree uplinkfast 387 summertime 138 system 42 timedate 138 timezone 139 trace 563 tunnel 105 version 549 vlan config 106 F fver 601 H help 45, 602 history 46 hit-sample-rate 437 L load config 551 ls 602 M mkdir 553 monitor port counters 72 N next 603 P ping 140 Q quit 34 R reset 604 reset {ap | dap} 305 reset port 77 reset system 554 rmdir 556 rollback security acl 438 S save config 557 save trace 564 set {ap | dap} bias 310 set {ap | dap} blink 311, 313 set {ap | dap} name 315 set {ap | dap} radio antennatype 315 set {ap | dap} radio auto-tune max-power 317 set {ap | dap} radio auto-tune max-retransmissions 318 set {ap | dap} radio channel 320 set {ap | dap} radio min-client-rate 321 set {ap | dap} radio mode 323 set {ap | dap} radio radio-profile 324 set {ap | dap} radio tx-power 325 set {ap | dap} upgrade-firmware 328 set accounting {admin | console} 223 set accounting {dot1x | mac | web} 224 set arp 141 set arp agingtime 142 set authentication admin 226 set authentication console 228 set authentication dot1x 230 set authentication last-resort 234 set authentication mac 236 set authentication proxy 238 613 614 set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set INDEX authentication web 239 auto-config 46 banner motd 49 boot configuration-file 558, 559 confirm 50 dap 77 dap auto 306 dap auto mode 308 dap auto radiotype 309 dap fingerprint 312 dap security 326 dot1x authcontrol 486 dot1x key-tx 488 dot1x max-req 489 dot1x port-control 490 dot1x quiet-period 491 dot1x reauth 491 dot1x reauth-max 492 dot1x reauth-period 493 dot1x timeout auth-server 493 dot1x timeout supplicant 494 dot1x tx-period 494 dot1x wep-rekey 495 dot1x wep-rekey-period 496 enablepass 35 fdb 107 fdb agingtime 108 igmp mrsol 414 igmp mrsol mrsi 414 igmp qri 418 igmp querier 419 igmp receiver 419 igmp rv 420 interface 143 interface dhcp-client 144 interface dhcp-server 145 interface status 146 ip alias 147 ip dns 147 ip dns domain 148 ip dns server 149 ip https server 150 ip route 150 ip snmp server 152 ip ssh 153 ip ssh absolute-timeout 154 ip ssh idle-timeout 155 ip ssh server 155 ip telnet 156 ip telnet server 157 length 51 license 52 location policy 241 set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set log 586 log buffer 586 log console 586 log current 586 log server 586 log sessions 586 log trace 586 log trace mbytes 589 mac-user 245 mac-user attr 246 mac-usergroup attr 252 mobility profile 253 mobility-domain member 265 mobility-domain mode member seed-ip 266 mobility-domain mode seed domain-name 267 mobility-profile mode 255 ntp 158 ntp server 158 ntp update-interval 159 port 80 port name 82 port negotiation 83 port poe 84 port preference 85 port speed 85 port trap 86 port type ap 87 port type wired-auth 91 port-group 81 prompt 53 radio-profile active-scan 330 radio-profile auto-tune channel-config 330 radio-profile auto-tune channel-holddown 331 radio-profile auto-tune channel-interval 332 radio-profile auto-tune power-backoff-timer 333 radio-profile auto-tune power-config 334 radio-profile auto-tune power-interval 335 radio-profile beacon-interval 329, 336 radio-profile countermeasures 337 radio-profile dtim-interval 338 radio-profile frag-threshold 339 radio-profile long-retry 339 radio-profile max-rx-lifetime 340 radio-profile max-tx-lifetime 341 radio-profile mode 342 radio-profile preamble-length 345 radio-profile rts-threshold 346 radio-profile service-profile 346 radio-profile short-retry 350 radio-profile wmm 350 radius 468 radius client system-ip 469 radius deadtime 468 INDEX set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set radius key 468 radius proxy client 470 radius proxy port 471 radius retransmit 468 radius server 472 radius timeout 468 rfdetect active-scan 528 rfdetect attack-list 528 rfdetect black-list 529 rfdetect countermeasures 530 rfdetect countermeasures mac 530 rfdetect ignore 530 rfdetect log 531 rfdetect signature 532 rfdetect ssid-list 532 rfdetect vendor-list 533 security acl 439 security acl ip icmp 439 security acl ip ip 439 security acl ip tcp 439 security acl ip udp 439 security acl map 444 server group 474 server group load-balance 475 service-profile auth-dot1x 351 service-profile auth-fallthru 352 service-profile auth-psk 354 service-profile beacon 355 service-profile cipher-ccmp 356 service-profile cipher-tkip 357 service-profile cipher-wep104 358 service-profile cipher-wep40 359 service-profile psk-phrase 360 service-profile psk-raw 361 service-profile rsn-ie 362 service-profile shared-key-auth 363 service-profile ssid-name 363 service-profile ssid-type 364 service-profile tkip-mc-time 365 service-profile web-aaa-form url 366 service-profile wep active-multicast-index 367 service-profile wep active-unicast-index 368 service-profile wep key-index 369 service-profile wpa-ie 370 snmp community 160 snmp notify target 162 snmp profile 167 snmp protocol 172 snmp security 173 snmp trap 167 snmp trap receiver 162 snmp usm 174 snoop 571 set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set set snoop map 574 snoop mode 575 spantree 388 spantree backbonefast 389 spantree fwddelay 390 spantree hello 390 spantree maxage 391 spantree portcost 392 spantree portfast 393 spantree portpri 394 spantree portvlancost 395 spantree portvlanpri 396 spantree priority 397 spantree uplinkfast 397 summertime 177 system contact 54 system countrycode 54 system ip-address 57, 179 system location 58 system name 58 timedate 180 timezone 181 trace authentication 564 trace authentication mac-addr 564 trace authentication port 564 trace authentication user 564 trace authorization 565 trace authorization mac-addr 565 trace authorization port 565 trace authorization user 565 trace dot1x 566 trace dot1x mac-addr 566 trace dot1x port 566 trace dot1x user 566 trace sm 567 trace sm mac-addr 567 trace sm port 567 trace sm user 567 user 256 user attr 257 user group 258 user password 256 usergroup 259 usergroup attr 259 vlan name 109 vlan port 110 vlan tunnel-affinity 111 web-aaa 260 T telnet 195 test 605 615 616 INDEX traceroute 196 V version 606
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : Yes Modify Date : 2005:06:23 15:39:08Z Create Date : 2005:06:23 15:39:08Z Page Count : 616 Creation Date : 2005:06:23 15:39:08Z Mod Date : 2005:06:23 15:39:08Z Producer : Acrobat Distiller 5.0.5 (Windows) Author : Shelley Bandy Metadata Date : 2005:06:23 15:39:08Z Creator : Shelley Bandy Title : cmdref.book Page Mode : UseNoneEXIF Metadata provided by EXIF.tools