Pr oC ur v e 5400zl S w it c h e s
Inst al l a t i o n an d G e t t i n g S t art e d G u i d e
HP MSM7xx Controllers CLI Reference Guide
HP MSM7xx Controllers CLI
Reference Guide
HP MSM7xx Controllers
CLI Reference Guide
Copyright and Disclaimer Notices
© Copyright 2011 Hewlett-Packard Development Company, L.P. The
information contained herein is subject to change without notice.
This document contains proprietary information, which is
protected by copyright. No part of this document may be
photocopied, reproduced, or translated into another language
without the prior written consent of Hewlett-Packard.
Publication Number
5998-1432
December 2011
Applicable Products
See Products covered on page 1-2 .
Trademark Credits
Windows NT®, Windows®, and MS Windows® are US
registered trademarks of Microsoft Corporation.
Disclaimer
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF
ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING,
BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. Hewlett-Packard shall not be liable for errors
contained herein or for incidental or consequential damages in
connection with the furnishing, performance, or use of this
material.
The only warranties for HP products and services are set forth
in the express warranty statements accompanying such
products and services. Nothing herein should be construed as
constituting an additional warranty. HP shall not be liable for
technical or editorial errors or omissions contained herein.
Hewlett-Packard assumes no responsibility for the use or
reliability of its software on equipment that is not furnished by
Hewlett-Packard.
Hewlett-Packard Company
8000 Foothills Boulevard
Roseville, California 95747
www.hp.com/networking
Contents
1 Introduction
About this guide ...........................................................................................................1-2
Products covered...................................................................................................1-2
Important terms.....................................................................................................1-2
Typographical conventions ..................................................................................1-2
Command syntax ............................................................................................1-2
Management tool ............................................................................................1-3
New in this release.......................................................................................................1-4
HP support ....................................................................................................................1-4
Before contacting support............................................................................. 1-4
Online documentation .................................................................................................1-5
Configuring CLI support..............................................................................................1-5
Secure shell access................................................................................................1-6
Authentication .......................................................................................................1-6
Serial port access...................................................................................................1-7
Starting a CLI session on the serial port ......................................................1-7
Entering strings ............................................................................................................1-8
Context hierarchy ........................................................................................................1-9
Sample CLI sessions ..................................................................................................1-10
Example 1 ......................................................................................................1-10
Example 2 ......................................................................................................1-11
Example 3 ......................................................................................................1-11
File transfer.................................................................................................................1-12
A. The controller gets the file using a URL................................................1-12
B. Send a file to the controller ....................................................................1-12
iii
2 CLI commands
View context .................................................................................................................2-3
arping ......................................................................................................................2-3
enable......................................................................................................................2-3
nslookup ................................................................................................................. 2-3
ping..........................................................................................................................2-3
ps .............................................................................................................................2-3
quit...........................................................................................................................2-3
show license...........................................................................................................2-4
show logging filtered.............................................................................................2-4
top............................................................................................................................2-4
traceroute ...............................................................................................................2-4
Enable context..............................................................................................................2-5
reboot device..........................................................................................................2-5
show certificate .....................................................................................................2-5
show certificate binding ....................................................................................... 2-5
iperf .........................................................................................................................2-5
ping..........................................................................................................................2-5
arping ......................................................................................................................2-6
arp............................................................................................................................2-6
end........................................................................................................................... 2-6
quit...........................................................................................................................2-6
rcapture...................................................................................................................2-6
show arp .................................................................................................................2-6
show bridge............................................................................................................2-7
show bridge forwarding........................................................................................2-7
show dns cache......................................................................................................2-7
show interfaces......................................................................................................2-7
show ip....................................................................................................................2-7
show ip route .........................................................................................................2-7
show system info ...................................................................................................2-7
show vsc overview ................................................................................................2-7
show controlled-aps wireless clients ..................................................................2-8
disassociate controlled-ap wireless client _.......................................................2-8
show ip dhcp database..........................................................................................2-8
show satellites........................................................................................................2-8
show web content .................................................................................................2-8
show client log....................................................................................................... 2-8
iv
show radius statistics............................................................................................2-8
show radius users..................................................................................................2-8
show users..............................................................................................................2-9
show discrete pin...................................................................................................2-9
config.......................................................................................................................2-9
show all config.......................................................................................................2-9
controlled network................................................................................................2-9
show controlled network config..........................................................................2-9
Config context ............................................................................................................2-10
vlan ........................................................................................................................2-10
New interface................................................................................................................2-10
dhcp public ip default lease period ...................................................................2-10
dhcp public ip subnet..........................................................................................2-10
certificate..............................................................................................................2-10
certificate binding................................................................................................2-10
certificate revocation ..........................................................................................2-11
end......................................................................................................................... 2-11
factory settings ....................................................................................................2-11
network-profile ....................................................................................................2-11
reboot device........................................................................................................2-11
show certificate ...................................................................................................2-11
show certificate binding ..................................................................................... 2-11
show config factory.............................................................................................2-12
show network-profiles........................................................................................ 2-12
show tech..............................................................................................................2-12
interface ethernet ................................................................................................2-12
interface ip............................................................................................................2-12
interface pptp client-default...............................................................................2-12
interface gre .........................................................................................................2-12
New show lacp..............................................................................................................2-13
New show mac-address ...............................................................................................2-13
New show mac-address count ....................................................................................2-13
New show trunks..........................................................................................................2-13
New show vlans ............................................................................................................2-13
virtual ap...............................................................................................................2-13
cap-switch to........................................................................................................ 2-13
show subscription plan.......................................................................................2-14
subscription plan .................................................................................................2-14
mac list..................................................................................................................2-14
v
show mac list .......................................................................................................2-14
ipsec policy...........................................................................................................2-14
admin local authentication.................................................................................2-14
admin radius authentication ..............................................................................2-15
admin radius authentication server ..................................................................2-15
ip http port............................................................................................................2-15
ip https port..........................................................................................................2-15
snmp-server trap certificate-expired.................................................................2-15
snmp-server trap certificate-expires-soon .......................................................2-16
snmp-server trap web-fail...................................................................................2-16
snmp-server trap web-login................................................................................2-16
snmp-server trap web-logout .............................................................................2-16
username ..............................................................................................................2-16
web admin kickout..............................................................................................2-17
web allow..............................................................................................................2-17
web access internet-port ....................................................................................2-17
web access lan-port.............................................................................................2-17
web access interface vlan...................................................................................2-17
web access interface gre ....................................................................................2-18
web access vpn ....................................................................................................2-18
web access lan .....................................................................................................2-18
dhcp mode............................................................................................................2-18
enable console password reset..........................................................................2-18
console authentication........................................................................................2-18
dhcp server...........................................................................................................2-19
dhcp server default domain name.....................................................................2-19
dhcp server default lease period .......................................................................2-19
dhcp server default permanent lease period....................................................2-19
dhcp server controller.........................................................................................2-19
dhcp server controller discovery.......................................................................2-19
dhcp server logout html user .............................................................................2-20
dhcp server access centralized clients .............................................................2-20
dhcp server access lan........................................................................................ 2-20
dhcp relay .............................................................................................................2-20
dhcp relay circuit id ............................................................................................2-20
dhcp relay remote id ...........................................................................................2-21
dhcp relay access centralized clients................................................................2-21
dhcp relay access lan ..........................................................................................2-21
New dhcp relay access access network ....................................................................2-21
vi
dhcp relay extend internet port......................................................................... 2-21
New dhcp relay extend internet network..................................................................2-22
clock......................................................................................................................2-22
clock auto adjust dst ...........................................................................................2-22
clock timezone.....................................................................................................2-22
clock use custom dst rules.................................................................................2-22
ntp protocol..........................................................................................................2-23
ntp server..............................................................................................................2-23
clock custom dst begins .....................................................................................2-23
clock custom dst begins format.........................................................................2-23
clock custom dst ends ........................................................................................2-24
clock custom dst ends format............................................................................2-24
ntp server..............................................................................................................2-24
ntp server failure trap .........................................................................................2-24
config-update automatic.....................................................................................2-25
config-update operation......................................................................................2-25
config-update start ..............................................................................................2-25
config-update time...............................................................................................2-25
config-update uri..................................................................................................2-25
config-update weekday.......................................................................................2-25
snmp-server trap config-change ........................................................................2-26
snmp-server trap config-update.........................................................................2-26
logging destination ..............................................................................................2-26
snmp-server trap syslog-severity .......................................................................2-26
snmp-server..........................................................................................................2-26
snmp-server allow ...............................................................................................2-27
snmp-server chassis-id........................................................................................2-27
snmp-server contact............................................................................................2-27
snmp-server heartbeat period............................................................................2-27
snmp-server location...........................................................................................2-27
snmp-server port..................................................................................................2-28
snmp-server readonly..........................................................................................2-28
snmp-server readwrite........................................................................................2-28
snmp-server trap..................................................................................................2-28
snmp-server trap community............................................................................. 2-28
snmp-server trap destination ............................................................................. 2-29
snmp-server trap heartbeat ................................................................................2-29
snmp-server trap link-state.................................................................................2-29
snmp-server trap snmp-authentication.............................................................2-29
vii
snmp-server version 1.........................................................................................2-29
snmp-server version 2c.......................................................................................2-30
snmp-server version 3.........................................................................................2-30
snmp-server access interface vlan ....................................................................2-30
snmp-server access interface gre ......................................................................2-30
snmp-server access port-1..................................................................................2-30
snmp-server access port-2..................................................................................2-31
snmp-server access vpn......................................................................................2-31
snmp-server trap device-authorization-failure.................................................2-31
snmp-server trap device-configuration-failure ................................................2-31
snmp-server trap device-firmware-failure........................................................2-31
snmp-server trap device-security-failure..........................................................2-32
snmp-server trap device-state-change ..............................................................2-32
snmp-server trap new-satellite-detected ..........................................................2-32
snmp-server trap satellite-unreachable ............................................................2-32
snmp-server trap service-controller-state.........................................................2-32
snmp-server access lan....................................................................................... 2-33
snmp-server user .................................................................................................2-33
snmp-server notification receiver .....................................................................2-33
soap-server ...........................................................................................................2-33
soap-server access interface vlan......................................................................2-33
soap-server allow.................................................................................................2-34
soap-server http authentication.........................................................................2-34
soap-server http authentication password.......................................................2-34
soap-server http authentication username.......................................................2-34
soap-server port...................................................................................................2-34
soap-server ssl......................................................................................................2-34
soap-server ssl with client certificate ...............................................................2-35
soap-server access interface gre........................................................................2-35
soap-server access port-1 ...................................................................................2-35
soap-server access port-2 ...................................................................................2-35
soap-server access lan ........................................................................................2-35
soap-server access vpn ....................................................................................... 2-36
snmp-server trap vpn-connection......................................................................2-36
snmp-server trap syslog-matches ......................................................................2-36
snmp-server trap syslog-matches regex ...........................................................2-36
snmp-server trap syslog-severity level..............................................................2-36
snmp-server trap network-trace ........................................................................2-36
firmware-update automatic................................................................................2-37
viii
firmware-update start .........................................................................................2-37
firmware-update time..........................................................................................2-37
firmware-update uri ............................................................................................2-37
firmware-update weekday..................................................................................2-38
snmp-server trap firmware-update....................................................................2-38
ip name-server......................................................................................................2-38
ip name-server cache ..........................................................................................2-38
ip name-server dynamic......................................................................................2-38
ip name-server interception ............................................................................... 2-39
ip name-server switch-on-servfail .....................................................................2-39
ip name-server switch-over ................................................................................2-39
ip name-server logout-info .................................................................................2-39
access controller shared secret .........................................................................2-39
radius-server profile ............................................................................................2-40
ip-qos profile ........................................................................................................2-40
access controller..................................................................................................2-40
certificate ipsec ca...............................................................................................2-40
certificate ipsec local ..........................................................................................2-40
certificate ipsec revocation................................................................................2-41
certificate ssl ........................................................................................................2-41
session profile default.........................................................................................2-41
session profile......................................................................................................2-41
show session profile............................................................................................2-41
remote configuration ..........................................................................................2-41
lldp config.............................................................................................................2-42
lldp dynamic-name ..............................................................................................2-42
lldp dynamic-name refresh-time........................................................................2-42
lldp dynamic-name user-string...........................................................................2-42
lldp fast-start-count .............................................................................................2-42
lldp holdtime-multiplier...................................................................................... 2-43
lldp med-location civic-address-element..........................................................2-43
lldp med-location elin-addr ................................................................................2-43
lldp refresh-interval.............................................................................................2-43
lldp run..................................................................................................................2-43
show lldp config...................................................................................................2-43
show lldp info local-device.................................................................................2-43
show lldp info remote-device.............................................................................2-44
show lldp stats .....................................................................................................2-44
discovery protocol...............................................................................................2-44
ix
discovery protocol device-id..............................................................................2-44
service controller ap authentication credentials.............................................2-44
service controller ap authentication enable.....................................................2-44
service controller ap authentication file...........................................................2-45
service controller ap authentication radius-server ......................................... 2-45
service controller ap authentication refresh-rate............................................2-45
service controller ap authentication source file..............................................2-45
service controller ap authentication source local...........................................2-45
service controller ap authentication source radius ........................................2-45
service controller discovery...............................................................................2-46
service controller primary..................................................................................2-46
service controller primary ip addr.....................................................................2-46
service controller priority...................................................................................2-46
service controller discovery interface internet-port....................................... 2-46
service controller discovery interface lan-port ...............................................2-46
New service controller discovery interface ..............................................................2-47
service controller provisioning..........................................................................2-47
bandwidth control internet-port........................................................................2-47
bandwidth control internet-port high ...............................................................2-47
bandwidth control internet-port low ................................................................2-47
bandwidth control internet-port max-rate .......................................................2-47
bandwidth control internet-port normal ..........................................................2-48
bandwidth control internet-port very-high.......................................................2-48
New bandwidth control ...............................................................................................2-49
New bandwidth control high.......................................................................................2-49
New bandwidth control low........................................................................................2-49
New bandwidth control max-rate...............................................................................2-49
New bandwidth control normal..................................................................................2-50
New bandwidth control very-high..............................................................................2-50
ip route gateway ..................................................................................................2-50
firewall mode .......................................................................................................2-51
show user profiles ...............................................................................................2-51
show user profiles details...................................................................................2-51
user profile ...........................................................................................................2-51
renew user profile subscription.........................................................................2-51
New dot1x radius accounting start delay..................................................................2-51
dot1x reauth .........................................................................................................2-52
dot1x reauth period.............................................................................................2-52
dot1x reauth terminate ....................................................................................... 2-52
x
dot1x supplicant timeout....................................................................................2-52
dynamic key .........................................................................................................2-52
dynamic key interval ...........................................................................................2-53
key chain...............................................................................................................2-53
config-version.......................................................................................................2-53
radius-server accounting session ......................................................................2-53
radius-server client..............................................................................................2-53
radius-server local eap-peap ..............................................................................2-53
radius-server local eap-tls...................................................................................2-54
radius-server local eap-ttls ................................................................................. 2-54
radius-server local pap........................................................................................2-54
radius-server ssid detection nas-id....................................................................2-54
show radius-server ..............................................................................................2-54
active-directory check attribute ........................................................................2-54
active-directory check user access ...................................................................2-55
active-directory device name............................................................................. 2-55
active-directory domain......................................................................................2-55
active-directory domain netbios name .............................................................2-55
active-directory group.........................................................................................2-55
active-directory group order ..............................................................................2-55
active-directory join ............................................................................................2-56
show active-directory..........................................................................................2-56
show active-directory group ..............................................................................2-56
radius-server client..............................................................................................2-56
user tracking ........................................................................................................2-56
user tracking destination....................................................................................2-56
user tracking filter...............................................................................................2-56
user tracking port ................................................................................................2-57
persistent user information................................................................................2-57
persistent user information period....................................................................2-57
client data tunnel security..................................................................................2-57
igmp proxy............................................................................................................2-57
igmp proxy downstream interface ....................................................................2-57
igmp proxy upstream interface..........................................................................2-57
rf-id aeroscout......................................................................................................2-58
sflow......................................................................................................................2-58
show sflow agent .................................................................................................2-58
show sflow controller stats ................................................................................2-58
show sflow device stats ......................................................................................2-58
xi
sflow destination 80211 ......................................................................................2-58
show sflow destination....................................................................................... 2-58
show sflow sampling-polling..............................................................................2-59
sflow sampling .....................................................................................................2-59
sflow polling.........................................................................................................2-59
sflow interface .....................................................................................................2-59
mac lockout entry................................................................................................2-59
show mac lockout ...............................................................................................2-59
New team communication ip address........................................................................2-59
New team communication vlan ..................................................................................2-60
team management address.................................................................................2-60
team manager....................................................................................................... 2-60
New team name ............................................................................................................2-60
teaming .................................................................................................................2-60
New team communication interface..........................................................................2-60
New team communication interface..........................................................................2-60
New team communication vlan ..................................................................................2-61
team management interface...............................................................................2-61
team management interface vlan ......................................................................2-61
Access Controller context.........................................................................................2-62
end......................................................................................................................... 2-62
ads presentation ..................................................................................................2-62
ads presentation interval ....................................................................................2-62
station free access............................................................................................... 2-62
station http proxy html authentication only support......................................2-62
station http proxy support..................................................................................2-63
station idle detection...........................................................................................2-63
system accounting...............................................................................................2-63
remember delay ...................................................................................................2-63
remember html users ..........................................................................................2-64
worldpay installation id ......................................................................................2-64
worldpay payment response password ............................................................ 2-64
worldpay payment url......................................................................................... 2-64
authorize_net installation id...............................................................................2-64
authorize_net payment url .................................................................................2-64
authorize_net transaction key ...........................................................................2-64
show paypal..........................................................................................................2-65
paypal api-url........................................................................................................2-65
xii
paypal operation-mode .......................................................................................2-65
paypal password.................................................................................................. 2-65
paypal signature...................................................................................................2-65
paypal user-id .......................................................................................................2-65
ads presentation with frameset .........................................................................2-65
authentication http ..............................................................................................2-66
authentication https ............................................................................................2-66
local welcome-page.............................................................................................2-66
noc access internet.............................................................................................. 2-66
noc access vpn .....................................................................................................2-66
noc allow ..............................................................................................................2-66
noc authentication............................................................................................... 2-67
secure login .......................................................................................................... 2-67
sslv2 authentication ............................................................................................2-67
user-agent block...................................................................................................2-67
user-agent filtering...............................................................................................2-67
noc access interface vlan....................................................................................2-68
noc access interface gre .....................................................................................2-68
ipass id .................................................................................................................. 2-68
ipass name............................................................................................................2-68
wispr abort login url............................................................................................2-68
wispr login url ......................................................................................................2-69
wispr logoff url.....................................................................................................2-69
access-list .............................................................................................................2-69
use access-list ......................................................................................................2-70
use access-list unauth ......................................................................................... 2-70
config file..............................................................................................................2-70
http proxy upstream............................................................................................2-71
https ssl certificate ..............................................................................................2-71
mac-address .........................................................................................................2-71
fail page.................................................................................................................2-71
goodbye url...........................................................................................................2-71
ipass login url....................................................................................................... 2-72
login error url....................................................................................................... 2-72
login page..............................................................................................................2-72
login url.................................................................................................................2-72
logo........................................................................................................................2-72
messages...............................................................................................................2-73
noc ssl ca-certificate ...........................................................................................2-73
noc ssl certificate.................................................................................................2-73
xiii
session page .........................................................................................................2-73
transport page......................................................................................................2-73
welcome url..........................................................................................................2-74
notify user location changes ..............................................................................2-74
Default user session profile context........................................................................2-75
accounting interim update .................................................................................2-75
idle timeout ..........................................................................................................2-75
maximum input octets ........................................................................................2-75
maximum input packets .....................................................................................2-75
maximum output octets......................................................................................2-76
maximum output packets...................................................................................2-76
maximum total octets .........................................................................................2-76
maximum total packets ......................................................................................2-76
nat one-to-one ......................................................................................................2-76
session timeout ....................................................................................................2-77
smtp redirection setup........................................................................................2-77
public ip subnet ...................................................................................................2-77
end......................................................................................................................... 2-77
smtp redirection ..................................................................................................2-78
Session profile context..............................................................................................2-79
end......................................................................................................................... 2-79
access controlled.................................................................................................2-79
access list..............................................................................................................2-79
accounting interim update .................................................................................2-79
arp polling interval ..............................................................................................2-80
arp polling max count .........................................................................................2-80
bandwidth level....................................................................................................2-80
egress vlan ............................................................................................................2-80
idle timeout ..........................................................................................................2-81
intercept traffic ....................................................................................................2-81
max input rate......................................................................................................2-81
max output rate ...................................................................................................2-81
nat one-to-one ......................................................................................................2-82
session profile......................................................................................................2-82
smtp redirection setup........................................................................................2-82
termination action ...............................................................................................2-83
xiv
user defined attribute..........................................................................................2-83
public ip subnet ...................................................................................................2-83
User account context.................................................................................................2-85
end......................................................................................................................... 2-85
access controlled.................................................................................................2-85
access-controlled profile ....................................................................................2-85
access-controlled virtual ap ............................................................................... 2-85
active.....................................................................................................................2-86
chargeable user identity .....................................................................................2-86
control method ....................................................................................................2-86
egress vlan ............................................................................................................2-86
end time ................................................................................................................2-86
idle timeout ..........................................................................................................2-86
max user sessions................................................................................................ 2-87
password...............................................................................................................2-87
regular profile ......................................................................................................2-87
regular virtual ap .................................................................................................2-87
session timeout ....................................................................................................2-87
subscription plan .................................................................................................2-88
username ..............................................................................................................2-88
Internet port interface context.................................................................................2-89
end......................................................................................................................... 2-89
duplex ...................................................................................................................2-89
speed ..................................................................................................................... 2-89
interface vlan........................................................................................................2-89
ipsec vlan interface .............................................................................................2-90
LAN port interface context .......................................................................................2-91
end......................................................................................................................... 2-91
duplex ...................................................................................................................2-91
speed ..................................................................................................................... 2-91
interface vlan........................................................................................................2-91
ipsec vlan interface .............................................................................................2-92
WAN IP interface context..........................................................................................2-93
pppoe client user .................................................................................................2-93
New tagged....................................................................................................................2-93
New untagged ...............................................................................................................2-93
ip address mode...................................................................................................2-93
ip address..............................................................................................................2-94
ip nat......................................................................................................................2-94
nat limit port range..............................................................................................2-94
xv
nat limit port range size ......................................................................................2-94
ip address dhcp client-id.....................................................................................2-94
end......................................................................................................................... 2-95
pppoe auto-reconnect .........................................................................................2-95
pppoe mru ............................................................................................................2-95
pppoe mtu.............................................................................................................2-95
pppoe unnumbered .............................................................................................2-95
ip nat outside source static ................................................................................2-96
ip address alternate .............................................................................................2-96
LAN IP interface context...........................................................................................2-97
end......................................................................................................................... 2-97
ip address..............................................................................................................2-97
ip address management ......................................................................................2-97
New tagged....................................................................................................................2-97
New untagged ...............................................................................................................2-97
Public access RADIUS attributes context...............................................................2-98
end......................................................................................................................... 2-98
active.....................................................................................................................2-98
credentials ............................................................................................................2-98
interval ..................................................................................................................2-98
radius server profile ............................................................................................2-98
Virtual AP context......................................................................................................2-99
virtual ap name ....................................................................................................2-99
access control ......................................................................................................2-99
force centralize data............................................................................................2-99
ingress interface ................................................................................................2-100
egress unauthenticated.....................................................................................2-100
guest-mode .........................................................................................................2-100
max-association .................................................................................................2-100
ssid name............................................................................................................2-101
encryption key 1 ................................................................................................2-101
encryption key format.......................................................................................2-101
transmit key........................................................................................................2-101
authentication server access controller .........................................................2-102
authentication server accounting....................................................................2-102
authentication server accounting radius profile ...........................................2-102
authentication server radius ............................................................................2-102
xvi
dot1x authentication .........................................................................................2-102
wpa-psk...............................................................................................................2-102
authentication server request radius cui ........................................................2-103
dot1x session page ............................................................................................2-103
New wpa terminate controller..................................................................................2-103
wireless filters....................................................................................................2-103
wireless filters mac ...........................................................................................2-103
wireless filters rule input..................................................................................2-104
wireless filters rule output ...............................................................................2-104
wireless filters type ...........................................................................................2-104
mac-filters local .................................................................................................2-105
mac-filters...........................................................................................................2-106
mac-filters mode ................................................................................................2-106
mac authentication accounting .......................................................................2-106
mac authentication accounting radius profile...............................................2-106
mac authentication radius profile ...................................................................2-106
mac authentication remote ..............................................................................2-107
mac authentication request radius cui............................................................2-107
mac authentication local ..................................................................................2-107
mac authentication............................................................................................2-107
html authentication ...........................................................................................2-107
html authentication accounting.......................................................................2-108
html authentication accounting radius profile ..............................................2-108
html authentication active-directory...............................................................2-108
html authentication local..................................................................................2-108
html authentication radius ............................................................................... 2-108
html authentication radius profile...................................................................2-108
html authentication request radius cui........................................................... 2-109
html authentication timeout.............................................................................2-109
active...................................................................................................................2-109
band steering......................................................................................................2-109
beacon dtim count.............................................................................................2-109
beacon transmit power..................................................................................... 2-110
broadcast filter...................................................................................................2-110
data rate..............................................................................................................2-110
public forwarding ..............................................................................................2-110
access lan stations.............................................................................................2-110
fast authentication.............................................................................................2-110
layer3 mobility ...................................................................................................2-111
layer3 mobility hns fallback method...............................................................2-111
xvii
layer3 mobility hns method..............................................................................2-111
add ip-qos profile...............................................................................................2-111
delete ip-qos profile all......................................................................................2-111
delete ip-qos profile...........................................................................................2-111
qos .......................................................................................................................2-112
upstream diffserv tagging.................................................................................2-113
wmm advertising ...............................................................................................2-113
html redirection .................................................................................................2-113
local nas id..........................................................................................................2-113
bandwidth...........................................................................................................2-113
bandwidth default rates....................................................................................2-113
bandwidth default rates maximum .................................................................2-114
radius accounting realms .................................................................................2-114
radius authentication realms ...........................................................................2-114
identify stations by ip only ...............................................................................2-114
location-aware group ........................................................................................2-114
location-aware called-station-id content ........................................................2-115
dhcp relay ...........................................................................................................2-115
dhcp relay active................................................................................................2-115
dhcp relay circuit id ..........................................................................................2-115
dhcp relay remote id .........................................................................................2-115
dhcp relay subnet ..............................................................................................2-115
dhcp server.........................................................................................................2-116
dhcp server dns..................................................................................................2-116
dhcp server gateway .........................................................................................2-116
dhcp server range ..............................................................................................2-116
dhcp server subnet ............................................................................................2-116
radius-framed-protocol-attribute.....................................................................2-116
end....................................................................................................................... 2-117
security ...............................................................................................................2-117
Interface context ......................................................................................................2-118
New duplex-mode.......................................................................................................2-118
New end....................................................................................................................... 2-118
New flow-control........................................................................................................2-118
New flow-control auto-negotiation .......................................................................... 2-118
New speed ................................................................................................................... 2-118
New trunk group.........................................................................................................2-118
New trunk type ...........................................................................................................2-119
xviii
VLAN interface context ...........................................................................................2-120
end....................................................................................................................... 2-120
ip address............................................................................................................2-120
ip address mode.................................................................................................2-120
New tagged..................................................................................................................2-120
New untagged .............................................................................................................2-120
ip default-gateway .............................................................................................2-121
ip nat....................................................................................................................2-121
RADIUS profiles context.........................................................................................2-122
end....................................................................................................................... 2-122
radius-server accounting port..........................................................................2-122
radius-server alternate hosts............................................................................2-122
radius-server authentication method..............................................................2-122
radius-server authentication port....................................................................2-122
radius-server deadtime .....................................................................................2-123
radius-server host ..............................................................................................2-123
radius-server key 2 ............................................................................................2-123
radius-server message-authenticator..............................................................2-123
radius-server name ............................................................................................2-123
radius-server nasid ............................................................................................2-124
radius-server timeout ........................................................................................2-124
radius-server timeout ........................................................................................2-124
radius-server force-nas-port-to-vlanid ............................................................2-124
radius-server realm............................................................................................2-124
radius-server realm name.................................................................................2-124
IP QOS context .........................................................................................................2-125
end....................................................................................................................... 2-125
end-port...............................................................................................................2-125
priority ................................................................................................................2-125
profile name .......................................................................................................2-125
protocol...............................................................................................................2-125
start-port .............................................................................................................2-125
DHCP server context ...............................................................................................2-127
end....................................................................................................................... 2-127
active...................................................................................................................2-127
gateway...............................................................................................................2-127
range....................................................................................................................2-127
permanent leases...............................................................................................2-127
xix
GRE interface context .............................................................................................2-128
end force.............................................................................................................2-128
gre name .............................................................................................................2-128
ip address............................................................................................................2-128
peer ip address...................................................................................................2-128
remote ip address ..............................................................................................2-128
IPsec context ............................................................................................................2-129
end....................................................................................................................... 2-129
active...................................................................................................................2-129
authentication ....................................................................................................2-129
cipher ..................................................................................................................2-129
dns domain .........................................................................................................2-129
dns server ...........................................................................................................2-129
incoming nat.......................................................................................................2-130
incoming traffic network..................................................................................2-130
interface..............................................................................................................2-130
local id.................................................................................................................2-130
mode....................................................................................................................2-130
outgoing traffic network...................................................................................2-130
peer id .................................................................................................................2-130
peer ip address...................................................................................................2-131
perfect forward secrecy....................................................................................2-131
preshared key..................................................................................................... 2-131
Syslog context ..........................................................................................................2-132
active...................................................................................................................2-132
logging facility....................................................................................................2-132
logging host ........................................................................................................2-132
logging prefix .....................................................................................................2-132
name....................................................................................................................2-132
logging source....................................................................................................2-133
end....................................................................................................................... 2-133
level .....................................................................................................................2-133
level .....................................................................................................................2-133
matches...............................................................................................................2-133
message...............................................................................................................2-134
message...............................................................................................................2-134
xx
process................................................................................................................2-134
process................................................................................................................2-134
PPTP client interface ...............................................................................................2-135
active...................................................................................................................2-135
pptp client credentials ......................................................................................2-135
pptp client domain name.................................................................................. 2-135
pptp client server address ................................................................................2-135
end....................................................................................................................... 2-135
ip nat....................................................................................................................2-135
pptp client auto route discovery......................................................................2-136
pptp client lcp echo...........................................................................................2-136
Keychain context......................................................................................................2-137
end....................................................................................................................... 2-137
key .......................................................................................................................2-137
key chain name ..................................................................................................2-137
Keys context .............................................................................................................2-138
end....................................................................................................................... 2-138
key-string ............................................................................................................2-138
Subscription plan context....................................................................................... 2-139
end....................................................................................................................... 2-139
daily restriction..................................................................................................2-139
end time ..............................................................................................................2-139
initial login time allocation...............................................................................2-139
online time limit.................................................................................................2-140
online time limit.................................................................................................2-140
start time.............................................................................................................2-140
subscription plan name.....................................................................................2-140
public ip reservation .........................................................................................2-140
public ip subnet .................................................................................................2-140
SNMP user context ..................................................................................................2-142
access level.........................................................................................................2-142
end....................................................................................................................... 2-142
password.............................................................................................................2-142
security ...............................................................................................................2-142
user name ...........................................................................................................2-142
SNMP notification receiver context ......................................................................2-143
community..........................................................................................................2-143
end....................................................................................................................... 2-143
port ......................................................................................................................2-143
xxi
receiver ...............................................................................................................2-143
user......................................................................................................................2-143
version.................................................................................................................2-143
Active Directory Group context.............................................................................2-144
end....................................................................................................................... 2-144
access controlled...............................................................................................2-144
access-controlled profile ..................................................................................2-144
access-controlled virtual ap ............................................................................. 2-144
active...................................................................................................................2-145
active-directory group name ............................................................................2-145
egress vlan ..........................................................................................................2-145
regular profile ....................................................................................................2-145
regular virtual ap ...............................................................................................2-145
Controlled APs context ...........................................................................................2-147
end....................................................................................................................... 2-147
execute action....................................................................................................2-147
execute system action.......................................................................................2-147
show config factory...........................................................................................2-147
ap group.............................................................................................................. 2-147
ap name...............................................................................................................2-147
config...................................................................................................................2-147
contact ................................................................................................................2-148
location ...............................................................................................................2-148
product type .......................................................................................................2-148
product type .......................................................................................................2-148
Controlled APs group context................................................................................ 2-149
execute action....................................................................................................2-149
show config factory...........................................................................................2-149
end....................................................................................................................... 2-149
config...................................................................................................................2-149
group name.........................................................................................................2-149
virtual ap binding...............................................................................................2-149
Controlled APs base group context....................................................................... 2-150
execute action....................................................................................................2-150
show config factory...........................................................................................2-150
config...................................................................................................................2-150
end....................................................................................................................... 2-150
xxii
Controlled APs network configuration context...................................................2-151
end....................................................................................................................... 2-151
interface wireless ..............................................................................................2-151
local mesh group ...............................................................................................2-151
local mesh provisioning group.........................................................................2-151
provisioning connectivity .................................................................................2-151
provisioning discovery......................................................................................2-151
radius profile......................................................................................................2-151
show tech............................................................................................................2-152
switch port..........................................................................................................2-152
syslog...................................................................................................................2-152
inherit vlan port2 ...............................................................................................2-152
vlan port2............................................................................................................2-152
vlan port2 id .......................................................................................................2-152
inherit country code..........................................................................................2-152
world-mode dot11 country code......................................................................2-153
New inherit ipv6 ra conversion.................................................................................2-153
New ipv6 ra conversion .............................................................................................2-153
New show ipv6 ra conversion...................................................................................2-153
sensor server name ...........................................................................................2-153
sensor server id..................................................................................................2-154
sensor discovery mode .....................................................................................2-154
sensor network detector...................................................................................2-154
inherit sensor .....................................................................................................2-154
dynamic key .......................................................................................................2-155
dynamic key interval .........................................................................................2-155
dot1x reauth .......................................................................................................2-155
dot1x reauth period...........................................................................................2-155
dot1x reauth terminate ..................................................................................... 2-155
dot1x supplicant timeout..................................................................................2-156
inherit 8021x.......................................................................................................2-156
bridge protocol ieee ..........................................................................................2-156
inherit untagged stp...........................................................................................2-156
bridge protocol ieee vlan..................................................................................2-156
inherit vlan stp ................................................................................................... 2-157
inherit local mesh qos .......................................................................................2-157
local mesh ip qos profile...................................................................................2-157
local mesh qos mechanism...............................................................................2-157
enable vsc services............................................................................................2-157
xxiii
inherit service availability ................................................................................2-157
inherit l3subnets ................................................................................................2-158
l3subnet...............................................................................................................2-158
inherit switch port _..........................................................................................2-158
inherit switch ports ...........................................................................................2-158
inherit lldp-app-profile...................................................................................... 2-158
lldp app-profile...................................................................................................2-159
lldp app-profile...................................................................................................2-159
lldp app-profile...................................................................................................2-159
lldp app-profile...................................................................................................2-159
inherit lldp-general ............................................................................................2-159
lldp dynamic-name ............................................................................................2-159
lldp fast-start-count ...........................................................................................2-160
lldp holdtime-multiplier.................................................................................... 2-160
lldp local-mesh...................................................................................................2-160
lldp med-location civic-address-element........................................................2-160
lldp med-location elin-addr ..............................................................................2-160
lldp refresh-interval...........................................................................................2-160
lldp run................................................................................................................2-161
Controlled APs VSC binding context.....................................................................2-162
dual radio binding..............................................................................................2-162
egress vlan ..........................................................................................................2-162
egress vlan ..........................................................................................................2-162
end....................................................................................................................... 2-162
location aware....................................................................................................2-162
Syslog context ..........................................................................................................2-163
message...............................................................................................................2-163
message...............................................................................................................2-163
process................................................................................................................2-163
process................................................................................................................2-163
level .....................................................................................................................2-163
level .....................................................................................................................2-164
matches...............................................................................................................2-164
end....................................................................................................................... 2-164
inherit..................................................................................................................2-164
Provisioning connectivity context ......................................................................... 2-165
end....................................................................................................................... 2-165
xxiv
inherit..................................................................................................................2-165
interface..............................................................................................................2-165
interface provisioning .......................................................................................2-165
ip assignation .....................................................................................................2-165
vlan ......................................................................................................................2-166
vlan ......................................................................................................................2-166
static ip................................................................................................................2-166
provisioning local mesh group.........................................................................2-166
provisioning local mesh key.............................................................................2-166
provisioning local mesh port............................................................................2-166
provisioning local mesh security.....................................................................2-166
provisioning local mesh security.....................................................................2-167
provisioning local mesh type ...........................................................................2-167
country code ......................................................................................................2-167
anonymous identity...........................................................................................2-167
eap ....................................................................................................................... 2-167
ieee8021x provisioning .....................................................................................2-167
Provisioning discovery context..............................................................................2-168
end....................................................................................................................... 2-168
dns name.............................................................................................................2-168
dns provisioning ................................................................................................2-168
inherit..................................................................................................................2-168
dns domain name...............................................................................................2-168
dns server ...........................................................................................................2-169
discovery provisioning......................................................................................2-169
ip address............................................................................................................2-169
ip provisioning ...................................................................................................2-169
Wireless interface context.......................................................................................2-170
dot11....................................................................................................................2-170
distance...............................................................................................................2-170
transmit power................................................................................................... 2-171
multicast rate .....................................................................................................2-171
dot11 automatic frequency...............................................................................2-171
dot11 automatic frequency period ..................................................................2-171
dot11 automatic frequency time......................................................................2-171
dot11 automatic transmit-power .....................................................................2-172
dot11 automatic transmit-power period.........................................................2-172
antenna bidirectionnal......................................................................................2-172
antenna gain .......................................................................................................2-172
xxv
autochannel skip................................................................................................2-172
station distance..................................................................................................2-172
beacon interval ..................................................................................................2-173
rts threshold .......................................................................................................2-173
dot11 mode.........................................................................................................2-173
radio active.........................................................................................................2-173
spectralink view.................................................................................................2-174
New client statistics ...................................................................................................2-174
dot11n guard interval ........................................................................................2-174
dot11n mimo ......................................................................................................2-174
dot11n channel width........................................................................................2-174
dot11n channel extension.................................................................................2-174
dot11n mac protection......................................................................................2-175
end....................................................................................................................... 2-175
inherit..................................................................................................................2-175
RADIUS profile context...........................................................................................2-176
end....................................................................................................................... 2-176
inherit..................................................................................................................2-176
radius nas id ....................................................................................................... 2-176
Local mesh profile context .....................................................................................2-177
security ...............................................................................................................2-177
security mode..................................................................................................... 2-177
security psk ........................................................................................................2-177
security wep .......................................................................................................2-177
dynamic mode....................................................................................................2-177
mesh id................................................................................................................2-178
allowed downtime .............................................................................................2-178
minimum snr ......................................................................................................2-178
snr cost per hop .................................................................................................2-178
initial discovery time.........................................................................................2-178
active...................................................................................................................2-179
end....................................................................................................................... 2-179
inherit..................................................................................................................2-179
name....................................................................................................................2-179
radio active.........................................................................................................2-179
xxvi
Local mesh provisioning context ...........................................................................2-180
accept connection .............................................................................................2-180
end....................................................................................................................... 2-180
inherit..................................................................................................................2-180
multiple radio.....................................................................................................2-180
Switch port context .................................................................................................2-181
end....................................................................................................................... 2-181
active...................................................................................................................2-181
app-profile ..........................................................................................................2-181
app-profile ..........................................................................................................2-181
authentication profile vsc.................................................................................2-181
authentication server radius ............................................................................2-182
dot1x authentication .........................................................................................2-182
dynamic vlan ...................................................................................................... 2-182
egress rate ..........................................................................................................2-182
force flow control..............................................................................................2-182
ingress rate .........................................................................................................2-183
ingress traffic type.............................................................................................2-183
loop protection ..................................................................................................2-183
mac authentication............................................................................................2-183
mac filter list ......................................................................................................2-183
poe-class-support...............................................................................................2-183
port name............................................................................................................2-184
port type..............................................................................................................2-184
power over ethernet..........................................................................................2-184
priority ................................................................................................................2-184
priority lookup ...................................................................................................2-184
quarantine vlan ..................................................................................................2-184
secondary vlan ...................................................................................................2-185
vlan ......................................................................................................................2-185
MAC addresses list context ....................................................................................2-186
end....................................................................................................................... 2-186
entry ....................................................................................................................2-186
list name..............................................................................................................2-186
Network profile context..........................................................................................2-187
end....................................................................................................................... 2-187
name....................................................................................................................2-187
vlan ......................................................................................................................2-187
vlan ......................................................................................................................2-187
New default .................................................................................................................2-187
xxvii
LLDP agent context .................................................................................................2-188
admin-status .......................................................................................................2-188
basic-tlv-enable ..................................................................................................2-188
basic-tlv-enable port_desc................................................................................2-188
basic-tlv-enable system_cap.............................................................................2-188
basic-tlv-enable system_descr .........................................................................2-188
basic-tlv-enable system_name .........................................................................2-189
dot3-tlv-enable ...................................................................................................2-189
end....................................................................................................................... 2-189
ip-addr-enable.....................................................................................................2-189
med-application-type.........................................................................................2-189
medtlv-enable capabilities................................................................................2-189
medtlv-enable location-id .................................................................................2-190
medtlv-enable network-policy .........................................................................2-190
medtlv-enable poe .............................................................................................2-190
xxviii
Alphabetical list of commands
accept connection ..................................................... 2-180
access control .............................................................. 2-99
access controlled....................................................... 2-144
access controlled......................................................... 2-79
access controlled......................................................... 2-85
access controller shared secret ................................. 2-39
access controller.......................................................... 2-40
access lan stations..................................................... 2-110
access level................................................................. 2-142
access list...................................................................... 2-79
access-controlled profile .......................................... 2-144
access-controlled profile ............................................ 2-85
access-controlled virtual ap ..................................... 2-144
access-controlled virtual ap ....................................... 2-85
access-list ..................................................................... 2-69
accounting interim update ......................................... 2-75
accounting interim update ......................................... 2-79
active ........................................................................... 2-109
active ........................................................................... 2-127
active ........................................................................... 2-129
active ........................................................................... 2-132
active ........................................................................... 2-135
active ........................................................................... 2-145
active ........................................................................... 2-179
active ........................................................................... 2-181
active ............................................................................. 2-86
active ............................................................................. 2-98
active-directory check attribute ................................ 2-54
active-directory check user access ........................... 2-55
active-directory device name ..................................... 2-55
active-directory domain netbios name ..................... 2-55
active-directory domain.............................................. 2-55
active-directory group name .................................... 2-145
active-directory group order ...................................... 2-55
active-directory group................................................. 2-55
active-directory join .................................................... 2-56
add ip-qos profile ....................................................... 2-111
admin local authentication......................................... 2-14
admin radius authentication server .......................... 2-15
admin radius authentication ...................................... 2-15
admin-status ............................................................... 2-188
ads presentation interval ............................................ 2-62
ads presentation with frameset ................................. 2-65
ads presentation .......................................................... 2-62
allowed downtime ..................................................... 2-178
anonymous identity ................................................... 2-167
antenna bidirectionnal .............................................. 2-172
antenna gain ............................................................... 2-172
ap group ...................................................................... 2-147
ap name....................................................................... 2-147
app-profile .................................................................. 2-181
app-profile .................................................................. 2-181
arp polling interval ...................................................... 2-80
arp polling max count ................................................. 2-80
arp.................................................................................... 2-6
arping .............................................................................. 2-3
arping .............................................................................. 2-6
authentication http ...................................................... 2-66
authentication https .................................................... 2-66
authentication profile vsc......................................... 2-181
authentication server access controller ................. 2-102
authentication server accounting radius profile ... 2-102
authentication server accounting ............................ 2-102
authentication server radius..................................... 2-102
authentication server radius..................................... 2-182
authentication server request radius cui.................2-103
authentication............................................................. 2-129
authorize_net installation id ....................................... 2-64
authorize_net payment url .......................................... 2-64
authorize_net transaction key .................................... 2-64
autochannel skip ........................................................ 2-172
band steering ..............................................................2-109
New bandwidth control high ............................................... 2-49
bandwidth control internet-port high........................ 2-47
bandwidth control internet-port low ......................... 2-47
bandwidth control internet-port max-rate................ 2-47
bandwidth control internet-port normal................... 2-48
bandwidth control internet-port very-high ...............2-48
bandwidth control internet-port ................................ 2-47
New bandwidth control low ................................................ 2-49
New bandwidth control max-rate ....................................... 2-49
New bandwidth control normal .......................................... 2-50
New bandwidth control very-high ...................................... 2-50
New bandwidth control........................................................ 2-49
bandwidth default rates maximum.......................... 2-114
bandwidth default rates ............................................ 2-113
bandwidth level ............................................................ 2-80
bandwidth ................................................................... 2-113
basic-tlv-enable port_desc ........................................ 2-188
basic-tlv-enable system_cap ..................................... 2-188
basic-tlv-enable system_descr .................................. 2-188
basic-tlv-enable system_name ..................................2-189
basic-tlv-enable........................................................... 2-188
beacon dtim count ..................................................... 2-109
beacon interval ........................................................... 2-173
beacon transmit power ............................................. 2-110
bridge protocol ieee vlan ..........................................2-156
bridge protocol ieee................................................... 2-156
broadcast filter ........................................................... 2-110
cap-switch to ................................................................ 2-13
certificate binding ........................................................ 2-10
certificate ipsec ca ....................................................... 2-40
certificate ipsec local................................................... 2-40
certificate ipsec revocation ........................................2-41
certificate revocation .................................................. 2-11
certificate ssl ................................................................ 2-41
certificate ......................................................................2-10
chargeable user identity .............................................. 2-86
cipher........................................................................... 2-129
client data tunnel security .......................................... 2-57
New client statistics............................................................2-174
clock auto adjust dst.................................................... 2-22
clock custom dst begins format ................................. 2-23
clock custom dst begins.............................................. 2-23
clock custom dst ends format .................................... 2-24
clock custom dst ends ................................................. 2-24
clock timezone ............................................................. 2-22
clock use custom dst rules ......................................... 2-22
clock .............................................................................. 2-22
community .................................................................. 2-143
config file ...................................................................... 2-70
config ...........................................................................2-147
config ...........................................................................2-149
config ...........................................................................2-150
config ...............................................................................2-9
config-update automatic ............................................. 2-25
xxix
config-update operation.............................................. 2-25
config-update start ...................................................... 2-25
config-update time....................................................... 2-25
config-update uri.......................................................... 2-25
config-update weekday............................................... 2-25
config-version............................................................... 2-53
console authentication................................................ 2-18
contact ........................................................................ 2-148
control method ............................................................ 2-86
controlled network........................................................ 2-9
country code .............................................................. 2-167
credentials .................................................................... 2-98
daily restriction.......................................................... 2-139
data rate ...................................................................... 2-110
New default ......................................................................... 2-187
delete ip-qos profile all.............................................. 2-111
delete ip-qos profile................................................... 2-111
dhcp mode .................................................................... 2-18
dhcp public ip default lease period ........................... 2-10
dhcp public ip subnet.................................................. 2-10
New dhcp relay access access network ............................ 2-21
dhcp relay access centralized clients........................ 2-21
dhcp relay access lan .................................................. 2-21
dhcp relay active........................................................ 2-115
dhcp relay circuit id .................................................. 2-115
dhcp relay circuit id .................................................... 2-20
New dhcp relay extend internet network.......................... 2-22
dhcp relay extend internet port ................................. 2-21
dhcp relay remote id ................................................. 2-115
dhcp relay remote id ................................................... 2-21
dhcp relay subnet ...................................................... 2-115
dhcp relay ................................................................... 2-115
dhcp relay ..................................................................... 2-20
dhcp server access centralized clients ..................... 2-20
dhcp server access lan ................................................ 2-20
dhcp server controller discovery............................... 2-19
dhcp server controller................................................. 2-19
dhcp server default domain name ............................. 2-19
dhcp server default lease period ............................... 2-19
dhcp server default permanent lease period............ 2-19
dhcp server dns.......................................................... 2-116
dhcp server gateway ................................................. 2-116
dhcp server logout html user ..................................... 2-20
dhcp server range ...................................................... 2-116
dhcp server subnet .................................................... 2-116
dhcp server................................................................. 2-116
dhcp server................................................................... 2-19
disassociate controlled-ap wireless client _............... 2-8
discovery protocol device-id ...................................... 2-44
discovery protocol....................................................... 2-44
discovery provisioning.............................................. 2-169
distance....................................................................... 2-170
dns domain name....................................................... 2-168
dns domain ................................................................. 2-129
dns name..................................................................... 2-168
dns provisioning ........................................................ 2-168
dns server ................................................................... 2-129
dns server ................................................................... 2-169
dot11 automatic frequency period .......................... 2-171
dot11 automatic frequency time .............................. 2-171
dot11 automatic frequency....................................... 2-171
dot11 automatic transmit-power period ................. 2-172
dot11 automatic transmit-power ............................. 2-172
dot11 mode................................................................. 2-173
dot11............................................................................ 2-170
dot11n channel extension......................................... 2-174
dot11n channel width ................................................ 2-174
dot11n guard interval................................................. 2-174
dot11n mac protection ..............................................2-175
dot11n mimo............................................................... 2-174
dot1x authentication.................................................. 2-102
dot1x authentication.................................................. 2-182
New dot1x radius accounting start delay .......................... 2-51
dot1x reauth period ................................................... 2-155
dot1x reauth period ..................................................... 2-52
dot1x reauth terminate.............................................. 2-155
dot1x reauth terminate................................................2-52
dot1x reauth................................................................ 2-155
dot1x reauth..................................................................2-52
dot1x session page.....................................................2-103
dot1x supplicant timeout .......................................... 2-156
dot1x supplicant timeout ............................................ 2-52
dot3-tlv-enable ............................................................ 2-189
dual radio binding ...................................................... 2-162
duplex............................................................................ 2-89
duplex............................................................................ 2-91
New duplex-mode ............................................................... 2-118
dynamic key interval ................................................. 2-155
dynamic key interval ................................................... 2-53
dynamic key................................................................ 2-155
dynamic key.................................................................. 2-52
dynamic mode ............................................................2-177
dynamic vlan............................................................... 2-182
eap................................................................................ 2-167
egress rate................................................................... 2-182
egress unauthenticated ............................................. 2-100
egress vlan .................................................................. 2-145
egress vlan .................................................................. 2-162
egress vlan .................................................................. 2-162
egress vlan .................................................................... 2-80
egress vlan .................................................................... 2-86
enable console password reset .................................. 2-18
enable vsc services .................................................... 2-157
enable .............................................................................. 2-3
encryption key 1......................................................... 2-101
encryption key format ............................................... 2-101
end force ..................................................................... 2-128
end time....................................................................... 2-139
end time......................................................................... 2-86
end ................................................................................. 2-11
end ............................................................................... 2-117
New end ...............................................................................2-118
end ............................................................................... 2-120
end ............................................................................... 2-122
end ............................................................................... 2-125
end ............................................................................... 2-127
end ............................................................................... 2-129
end ............................................................................... 2-133
end ............................................................................... 2-135
end ............................................................................... 2-137
end ............................................................................... 2-138
end ............................................................................... 2-139
end ............................................................................... 2-142
end ............................................................................... 2-143
end ............................................................................... 2-144
end ............................................................................... 2-147
end ............................................................................... 2-149
end ............................................................................... 2-150
end ............................................................................... 2-151
end ............................................................................... 2-162
end ............................................................................... 2-164
end ............................................................................... 2-165
xxx
end ............................................................................... 2-168
end ............................................................................... 2-175
end ............................................................................... 2-176
end ............................................................................... 2-179
end ............................................................................... 2-180
end ............................................................................... 2-181
end ............................................................................... 2-186
end ............................................................................... 2-187
end ............................................................................... 2-189
end ................................................................................... 2-6
end ................................................................................. 2-62
end ................................................................................. 2-77
end ................................................................................. 2-79
end ................................................................................. 2-85
end ................................................................................. 2-89
end ................................................................................. 2-91
end ................................................................................. 2-95
end ................................................................................. 2-97
end ................................................................................. 2-98
end-port....................................................................... 2-125
entry ............................................................................ 2-186
execute action............................................................ 2-147
execute action............................................................ 2-149
execute action............................................................ 2-150
execute system action............................................... 2-147
factory settings ............................................................ 2-11
fail page......................................................................... 2-71
fast authentication..................................................... 2-110
firewall mode ............................................................... 2-51
firmware-update automatic........................................ 2-37
firmware-update start ................................................. 2-37
firmware-update time.................................................. 2-37
firmware-update uri .................................................... 2-37
firmware-update weekday.......................................... 2-38
New flow-control auto-negotiation .................................. 2-118
New flow-control................................................................ 2-118
force centralize data.................................................... 2-99
force flow control...................................................... 2-182
gateway ....................................................................... 2-127
goodbye url................................................................... 2-71
gre name ..................................................................... 2-128
group name................................................................. 2-149
guest-mode ................................................................. 2-100
html authentication accounting radius profile ...... 2-108
html authentication accounting............................... 2-108
html authentication active-directory....................... 2-108
html authentication local.......................................... 2-108
html authentication radius profile........................... 2-108
html authentication radius ....................................... 2-108
html authentication request radius cui ................... 2-109
html authentication timeout..................................... 2-109
html authentication ................................................... 2-107
html redirection ......................................................... 2-113
http proxy upstream.................................................... 2-71
https ssl certificate ...................................................... 2-71
identify stations by ip only ....................................... 2-114
idle timeout .................................................................. 2-75
idle timeout .................................................................. 2-81
idle timeout .................................................................. 2-86
ieee8021x provisioning ............................................. 2-167
igmp proxy downstream interface ............................ 2-57
igmp proxy upstream interface.................................. 2-57
igmp proxy.................................................................... 2-57
incoming nat............................................................... 2-130
incoming traffic network .......................................... 2-130
ingress interface ........................................................ 2-100
ingress rate.................................................................. 2-183
ingress traffic type ..................................................... 2-183
inherit 8021x ............................................................... 2-156
inherit country code ..................................................2-152
New inherit ipv6 ra conversion ......................................... 2-153
inherit l3subnets.........................................................2-158
inherit lldp-app-profile .............................................. 2-158
inherit lldp-general..................................................... 2-159
inherit local mesh qos................................................ 2-157
inherit sensor.............................................................. 2-154
inherit service availability......................................... 2-157
inherit switch port _ .................................................. 2-158
inherit switch ports.................................................... 2-158
inherit untagged stp ................................................... 2-156
inherit vlan port2........................................................ 2-152
inherit vlan stp............................................................2-157
inherit .......................................................................... 2-164
inherit .......................................................................... 2-165
inherit .......................................................................... 2-168
inherit .......................................................................... 2-175
inherit .......................................................................... 2-176
inherit .......................................................................... 2-179
inherit .......................................................................... 2-180
initial discovery time ................................................. 2-178
initial login time allocation ....................................... 2-139
intercept traffic ............................................................ 2-81
interface ethernet.........................................................2-12
interface gre.................................................................. 2-12
interface ip .................................................................... 2-12
interface pptp client-default ....................................... 2-12
interface provisioning................................................ 2-165
interface vlan ................................................................ 2-89
interface vlan ................................................................ 2-91
interface wireless....................................................... 2-151
New interface ........................................................................ 2-10
interface ...................................................................... 2-130
interface ...................................................................... 2-165
interval...........................................................................2-98
ip address alternate ..................................................... 2-96
ip address dhcp client-id ............................................. 2-94
ip address management............................................... 2-97
ip address mode ......................................................... 2-120
ip address mode ...........................................................2-93
ip address .................................................................... 2-120
ip address .................................................................... 2-128
ip address .................................................................... 2-169
ip address ...................................................................... 2-94
ip address ...................................................................... 2-97
ip assignation.............................................................. 2-165
ip default-gateway...................................................... 2-121
ip http port .................................................................... 2-15
ip https port .................................................................. 2-15
ip name-server cache................................................... 2-38
ip name-server dynamic .............................................. 2-38
ip name-server interception........................................ 2-39
ip name-server logout-info .......................................... 2-39
ip name-server switch-on-servfail ..............................2-39
ip name-server switch-over......................................... 2-39
ip name-server .............................................................. 2-38
ip nat outside source static.........................................2-96
ip nat ............................................................................2-121
ip nat ............................................................................2-135
ip nat ..............................................................................2-94
ip provisioning............................................................ 2-169
ip route gateway........................................................... 2-50
ip-addr-enable............................................................. 2-189
xxxi
ipass id .......................................................................... 2-68
ipass login url ............................................................... 2-72
ipass name .................................................................... 2-68
iperf ................................................................................. 2-5
ip-qos profile ................................................................ 2-40
ipsec policy................................................................... 2-14
ipsec vlan interface ..................................................... 2-90
ipsec vlan interface ..................................................... 2-92
New ipv6 ra conversion ..................................................... 2-153
key chain name .......................................................... 2-137
key chain....................................................................... 2-53
key ............................................................................... 2-137
key-string .................................................................... 2-138
l3subnet....................................................................... 2-158
layer3 mobility hns fallback method....................... 2-111
layer3 mobility hns method...................................... 2-111
layer3 mobility ........................................................... 2-111
level ............................................................................. 2-133
level ............................................................................. 2-133
level ............................................................................. 2-163
level ............................................................................. 2-164
list name...................................................................... 2-186
lldp app-profile........................................................... 2-159
lldp app-profile........................................................... 2-159
lldp app-profile........................................................... 2-159
lldp app-profile........................................................... 2-159
lldp config..................................................................... 2-42
lldp dynamic-name refresh-time ................................ 2-42
lldp dynamic-name user-string................................... 2-42
lldp dynamic-name .................................................... 2-159
lldp dynamic-name ...................................................... 2-42
lldp fast-start-count ................................................... 2-160
lldp fast-start-count ..................................................... 2-42
lldp holdtime-multiplier ............................................ 2-160
lldp holdtime-multiplier .............................................. 2-43
lldp local-mesh........................................................... 2-160
lldp med-location civic-address-element ................ 2-160
lldp med-location civic-address-element .................. 2-43
lldp med-location elin-addr ...................................... 2-160
lldp med-location elin-addr ........................................ 2-43
lldp refresh-interval................................................... 2-160
lldp refresh-interval..................................................... 2-43
lldp run........................................................................ 2-161
lldp run.......................................................................... 2-43
local id......................................................................... 2-130
local mesh group ....................................................... 2-151
local mesh ip qos profile........................................... 2-157
local mesh provisioning group................................. 2-151
local mesh qos mechanism....................................... 2-157
local nas id.................................................................. 2-113
local welcome-page..................................................... 2-66
location aware............................................................ 2-162
location ....................................................................... 2-148
location-aware called-station-id content ................ 2-115
location-aware group ................................................ 2-114
logging destination ...................................................... 2-26
logging facility............................................................ 2-132
logging host ................................................................ 2-132
logging prefix ............................................................. 2-132
logging source ............................................................ 2-133
login error url ............................................................... 2-72
login page...................................................................... 2-72
login url......................................................................... 2-72
logo................................................................................ 2-72
loop protection .......................................................... 2-183
mac authentication accounting radius profile ....... 2-106
mac authentication accounting................................ 2-106
mac authentication local...........................................2-107
mac authentication radius profile............................ 2-106
mac authentication remote....................................... 2-107
mac authentication request radius cui .................... 2-107
mac authentication .................................................... 2-107
mac authentication .................................................... 2-183
mac filter list............................................................... 2-183
mac list .......................................................................... 2-14
mac lockout entry ........................................................ 2-59
mac-address.................................................................. 2-71
mac-filters local.......................................................... 2-105
mac-filters mode ........................................................ 2-106
mac-filters ................................................................... 2-106
matches ....................................................................... 2-133
matches ....................................................................... 2-164
max input rate .............................................................. 2-81
max output rate............................................................ 2-81
max user sessions ........................................................ 2-87
max-association ......................................................... 2-100
maximum input octets................................................. 2-75
maximum input packets.............................................. 2-75
maximum output octets .............................................. 2-76
maximum output packets ........................................... 2-76
maximum total octets.................................................. 2-76
maximum total packets............................................... 2-76
med-application-type ................................................. 2-189
medtlv-enable capabilities ........................................ 2-189
medtlv-enable location-id.......................................... 2-190
medtlv-enable network-policy.................................. 2-190
medtlv-enable poe...................................................... 2-190
mesh id ........................................................................ 2-178
message .......................................................................2-134
message .......................................................................2-134
message .......................................................................2-163
message .......................................................................2-163
messages ....................................................................... 2-73
minimum snr............................................................... 2-178
mode ............................................................................ 2-130
multicast rate.............................................................. 2-171
multiple radio ............................................................. 2-180
name ............................................................................ 2-132
name ............................................................................ 2-179
name ............................................................................ 2-187
nat limit port range size............................................... 2-94
nat limit port range ......................................................2-94
nat one-to-one............................................................... 2-76
nat one-to-one............................................................... 2-82
network-profile............................................................. 2-11
noc access interface gre.............................................. 2-68
noc access interface vlan ............................................ 2-68
noc access internet ...................................................... 2-66
noc access vpn ............................................................. 2-66
noc allow....................................................................... 2-66
noc authentication ....................................................... 2-67
noc ssl ca-certificate .................................................... 2-73
noc ssl certificate ......................................................... 2-73
notify user location changes....................................... 2-74
nslookup.......................................................................... 2-3
ntp protocol ..................................................................2-23
ntp server failure trap.................................................. 2-24
ntp server ...................................................................... 2-23
ntp server ...................................................................... 2-24
online time limit ......................................................... 2-140
online time limit ......................................................... 2-140
outgoing traffic network ........................................... 2-130
xxxii
password..................................................................... 2-142
password....................................................................... 2-87
paypal api-url................................................................ 2-65
paypal operation-mode ............................................... 2-65
paypal password .......................................................... 2-65
paypal signature........................................................... 2-65
paypal user-id............................................................... 2-65
peer id ......................................................................... 2-130
peer ip address........................................................... 2-128
peer ip address........................................................... 2-131
perfect forward secrecy............................................ 2-131
permanent leases ....................................................... 2-127
persistent user information period............................ 2-57
persistent user information ........................................ 2-57
ping.................................................................................. 2-3
ping.................................................................................. 2-5
poe-class-support....................................................... 2-183
port name.................................................................... 2-184
port type...................................................................... 2-184
port .............................................................................. 2-143
power over ethernet.................................................. 2-184
pppoe auto-reconnect ................................................. 2-95
pppoe client user ......................................................... 2-93
pppoe mru .................................................................... 2-95
pppoe mtu..................................................................... 2-95
pppoe unnumbered ..................................................... 2-95
pptp client auto route discovery.............................. 2-136
pptp client credentials .............................................. 2-135
pptp client domain name .......................................... 2-135
pptp client lcp echo ................................................... 2-136
pptp client server address ........................................ 2-135
preshared key............................................................. 2-131
priority lookup ........................................................... 2-184
priority ........................................................................ 2-125
priority ........................................................................ 2-184
process........................................................................ 2-134
process........................................................................ 2-134
process........................................................................ 2-163
process........................................................................ 2-163
product type ............................................................... 2-148
product type ............................................................... 2-148
profile name ............................................................... 2-125
protocol....................................................................... 2-125
provisioning connectivity ......................................... 2-151
provisioning discovery.............................................. 2-151
provisioning local mesh group................................. 2-166
provisioning local mesh key..................................... 2-166
provisioning local mesh port.................................... 2-166
provisioning local mesh security ............................. 2-166
provisioning local mesh security ............................. 2-167
provisioning local mesh type ................................... 2-167
ps ..................................................................................... 2-3
public forwarding ...................................................... 2-110
public ip reservation ................................................. 2-140
public ip subnet ......................................................... 2-140
public ip subnet ........................................................... 2-77
public ip subnet ........................................................... 2-83
qos ............................................................................... 2-112
quarantine vlan .......................................................... 2-184
quit................................................................................... 2-3
quit................................................................................... 2-6
radio active................................................................. 2-173
radio active................................................................. 2-179
radius accounting realms ......................................... 2-114
radius authentication realms ................................... 2-114
radius nas id ............................................................... 2-176
radius profile .............................................................. 2-151
radius server profile..................................................... 2-98
radius-framed-protocol-attribute ............................. 2-116
radius-server accounting port .................................. 2-122
radius-server accounting session............................... 2-53
radius-server alternate hosts .................................... 2-122
radius-server authentication method ...................... 2-122
radius-server authentication port ............................ 2-122
radius-server client ......................................................2-53
radius-server client ......................................................2-56
radius-server deadtime.............................................. 2-123
radius-server force-nas-port-to-vlanid ..................... 2-124
radius-server host ...................................................... 2-123
radius-server key 2..................................................... 2-123
radius-server local eap-peap.......................................2-53
radius-server local eap-tls ........................................... 2-54
radius-server local eap-ttls.......................................... 2-54
radius-server local pap ................................................ 2-54
radius-server message-authenticator ......................2-123
radius-server name .................................................... 2-123
radius-server nasid..................................................... 2-124
radius-server profile .................................................... 2-40
radius-server realm name ......................................... 2-124
radius-server realm .................................................... 2-124
radius-server ssid detection nas-id ............................ 2-54
radius-server timeout ................................................ 2-124
radius-server timeout ................................................ 2-124
range ............................................................................2-127
rcapture ...........................................................................2-6
reboot device ................................................................2-11
reboot device ..................................................................2-5
receiver........................................................................ 2-143
regular profile............................................................. 2-145
regular profile............................................................... 2-87
regular virtual ap........................................................ 2-145
regular virtual ap.......................................................... 2-87
remember delay............................................................ 2-63
remember html users................................................... 2-64
remote configuration ................................................... 2-41
remote ip address....................................................... 2-128
renew user profile subscription ................................. 2-51
rf-id aeroscout .............................................................. 2-58
rts threshold................................................................ 2-173
secondary vlan............................................................ 2-185
secure login................................................................... 2-67
security mode ............................................................. 2-177
security psk................................................................. 2-177
security wep................................................................2-177
security........................................................................ 2-117
security........................................................................ 2-142
security........................................................................ 2-177
sensor discovery mode.............................................. 2-154
sensor network detector ........................................... 2-154
sensor server id .......................................................... 2-154
sensor server name.................................................... 2-153
service controller ap authentication credentials ..... 2-44
service controller ap authentication enable.............2-44
service controller ap authentication file ...................2-45
service controller ap authentication radius-server.. 2-45
service controller ap authentication refresh-rate.... 2-45
service controller ap authentication source file ...... 2-45
service controller ap authentication source local ...2-45
service controller ap authentication source radius. 2-45
service controller discovery interface internet-port2-46
service controller discovery interface lan-port........ 2-46
New service controller discovery interface....................... 2-47
xxxiii
service controller discovery....................................... 2-46
service controller primary ip addr............................. 2-46
service controller primary .......................................... 2-46
service controller priority........................................... 2-46
service controller provisioning .................................. 2-47
session page ................................................................. 2-73
session profile default................................................. 2-41
session profile .............................................................. 2-41
session profile .............................................................. 2-82
session timeout ............................................................ 2-77
session timeout ............................................................ 2-87
sflow destination 80211 .............................................. 2-58
sflow interface ............................................................. 2-59
sflow polling................................................................. 2-59
sflow sampling ............................................................. 2-59
sflow.............................................................................. 2-58
show active-directory group ...................................... 2-56
show active-directory.................................................. 2-56
show all config ............................................................... 2-9
show arp ......................................................................... 2-6
show bridge forwarding................................................ 2-7
show bridge .................................................................... 2-7
show certificate binding ............................................. 2-11
show certificate binding ............................................... 2-5
show certificate ........................................................... 2-11
show certificate ............................................................. 2-5
show client log ............................................................... 2-8
show config factory..................................................... 2-12
show config factory................................................... 2-147
show config factory................................................... 2-149
show config factory................................................... 2-150
show controlled network config.................................. 2-9
show controlled-aps wireless clients .......................... 2-8
show discrete pin........................................................... 2-9
show dns cache.............................................................. 2-7
show interfaces.............................................................. 2-7
show ip dhcp database.................................................. 2-8
show ip route ................................................................. 2-7
show ip............................................................................ 2-7
New show ipv6 ra conversion ........................................... 2-153
New show lacp...................................................................... 2-13
show license................................................................... 2-4
show lldp config........................................................... 2-43
show lldp info local-device......................................... 2-43
show lldp info remote-device..................................... 2-44
show lldp stats ............................................................. 2-44
show logging filtered..................................................... 2-4
show mac list ............................................................... 2-14
show mac lockout ....................................................... 2-59
New show mac-address count ............................................ 2-13
New show mac-address ....................................................... 2-13
show network-profiles ................................................ 2-12
show paypal.................................................................. 2-65
show radius statistics.................................................... 2-8
show radius users.......................................................... 2-8
show radius-server ...................................................... 2-54
show satellites................................................................ 2-8
show session profile.................................................... 2-41
show sflow agent ......................................................... 2-58
show sflow controller stats ........................................ 2-58
show sflow destination ............................................... 2-58
show sflow device stats .............................................. 2-58
show sflow sampling-polling...................................... 2-59
show subscription plan............................................... 2-14
show system info ........................................................... 2-7
show tech...................................................................... 2-12
show tech .................................................................... 2-152
New show trunks .................................................................. 2-13
show user profiles details ........................................... 2-51
show user profiles........................................................2-51
show users ...................................................................... 2-9
New show vlans .................................................................... 2-13
show vsc overview......................................................... 2-7
show web content.......................................................... 2-8
smtp redirection setup ................................................ 2-77
smtp redirection setup ................................................ 2-82
smtp redirection ........................................................... 2-78
snmp-server access interface gre............................... 2-30
snmp-server access interface vlan .............................2-30
snmp-server access lan ............................................... 2-33
snmp-server access port-1 ..........................................2-30
snmp-server access port-2 ..........................................2-31
snmp-server access vpn ..............................................2-31
snmp-server allow........................................................ 2-27
snmp-server chassis-id ................................................ 2-27
snmp-server contact ....................................................2-27
snmp-server heartbeat period .................................... 2-27
snmp-server location ................................................... 2-27
snmp-server notification receiver .............................. 2-33
snmp-server port .......................................................... 2-28
snmp-server readonly .................................................. 2-28
snmp-server readwrite ................................................ 2-28
snmp-server trap certificate-expired .........................2-15
snmp-server trap certificate-expires-soon ................ 2-16
snmp-server trap community ..................................... 2-28
snmp-server trap config-change................................. 2-26
snmp-server trap config-update ................................. 2-26
snmp-server trap destination...................................... 2-29
snmp-server trap device-authorization-failure......... 2-31
snmp-server trap device-configuration-failure......... 2-31
snmp-server trap device-firmware-failure ................ 2-31
snmp-server trap device-security-failure .................. 2-32
snmp-server trap device-state-change ....................... 2-32
snmp-server trap firmware-update ............................2-38
snmp-server trap heartbeat......................................... 2-29
snmp-server trap link-state ......................................... 2-29
snmp-server trap network-trace................................. 2-36
snmp-server trap new-satellite-detected................... 2-32
snmp-server trap satellite-unreachable..................... 2-32
snmp-server trap service-controller-state ................. 2-32
snmp-server trap snmp-authentication ..................... 2-29
snmp-server trap syslog-matches regex .................... 2-36
snmp-server trap syslog-matches............................... 2-36
snmp-server trap syslog-severity level ...................... 2-36
snmp-server trap syslog-severity ............................... 2-26
snmp-server trap vpn-connection .............................. 2-36
snmp-server trap web-fail ........................................... 2-16
snmp-server trap web-login ........................................ 2-16
snmp-server trap web-logout...................................... 2-16
snmp-server trap ..........................................................2-28
snmp-server user.......................................................... 2-33
snmp-server version 1 ................................................. 2-29
snmp-server version 2c ............................................... 2-30
snmp-server version 3 ................................................. 2-30
snmp-server .................................................................. 2-26
snr cost per hop.......................................................... 2-178
soap-server access interface gre ................................ 2-35
soap-server access interface vlan .............................. 2-33
soap-server access lan................................................. 2-35
soap-server access port-1............................................ 2-35
soap-server access port-2............................................ 2-35
soap-server access vpn................................................2-36
xxxiv
soap-server allow......................................................... 2-34
soap-server http authentication password ............... 2-34
soap-server http authentication username............... 2-34
soap-server http authentication ................................. 2-34
soap-server port........................................................... 2-34
soap-server ssl with client certificate ....................... 2-35
soap-server ssl.............................................................. 2-34
soap-server ................................................................... 2-33
spectralink view......................................................... 2-174
New speed ........................................................................... 2-118
speed ............................................................................. 2-89
speed ............................................................................. 2-91
ssid name .................................................................... 2-101
sslv2 authentication .................................................... 2-67
start time..................................................................... 2-140
start-port ..................................................................... 2-125
static ip........................................................................ 2-166
station distance.......................................................... 2-172
station free access ....................................................... 2-62
station http proxy html authentication only support2-62
station http proxy support.......................................... 2-63
station idle detection................................................... 2-63
subscription plan name............................................. 2-140
subscription plan ......................................................... 2-14
subscription plan ......................................................... 2-88
switch port.................................................................. 2-152
syslog........................................................................... 2-152
system accounting....................................................... 2-63
New tagged.......................................................................... 2-120
New tagged............................................................................ 2-93
New tagged............................................................................ 2-97
New team communication interface .................................. 2-60
New team communication interface .................................. 2-60
New team communication ip address................................ 2-59
New team communication vlan .......................................... 2-60
New team communication vlan .......................................... 2-61
team management address......................................... 2-60
team management interface vlan .............................. 2-61
team management interface....................................... 2-61
team manager............................................................... 2-60
New team name .................................................................... 2-60
teaming ......................................................................... 2-60
termination action ....................................................... 2-83
top.................................................................................... 2-4
traceroute ....................................................................... 2-4
transmit key................................................................ 2-101
transmit power........................................................... 2-171
transport page .............................................................. 2-73
New trunk group................................................................. 2-118
New trunk type ................................................................... 2-119
New untagged ..................................................................... 2-120
New untagged ....................................................................... 2-93
New untagged ....................................................................... 2-97
upstream diffserv tagging ......................................... 2-113
use access-list unauth ................................................. 2-70
use access-list .............................................................. 2-70
user defined attribute.................................................. 2-83
user name ................................................................... 2-142
user profile ................................................................... 2-51
user tracking destination ............................................ 2-56
user tracking filter ....................................................... 2-56
user tracking port ........................................................ 2-57
user tracking ................................................................ 2-56
user.............................................................................. 2-143
user-agent block........................................................... 2-67
user-agent filtering....................................................... 2-67
username....................................................................... 2-16
username....................................................................... 2-88
version ......................................................................... 2-143
virtual ap binding ....................................................... 2-149
virtual ap name............................................................. 2-99
virtual ap ....................................................................... 2-13
vlan port2 id................................................................ 2-152
vlan port2 ....................................................................2-152
vlan................................................................................. 2-10
vlan............................................................................... 2-166
vlan............................................................................... 2-166
vlan............................................................................... 2-185
vlan............................................................................... 2-187
vlan............................................................................... 2-187
web access interface gre ............................................. 2-18
web access interface vlan ........................................... 2-17
web access internet-port.............................................2-17
web access lan..............................................................2-18
web access lan-port ..................................................... 2-17
web access vpn............................................................. 2-18
web admin kickout ...................................................... 2-17
web allow ...................................................................... 2-17
welcome url ..................................................................2-74
wireless filters mac.................................................... 2-103
wireless filters rule input .......................................... 2-104
wireless filters rule output........................................2-104
wireless filters type.................................................... 2-104
wireless filters ............................................................2-103
wispr abort login url .................................................... 2-68
wispr login url............................................................... 2-69
wispr logoff url ............................................................. 2-69
wmm advertising........................................................ 2-113
world-mode dot11 country code ..............................2-153
worldpay installation id............................................... 2-64
worldpay payment response password.....................2-64
worldpay payment url ................................................. 2-64
New wpa terminate controller ..........................................2-103
wpa-psk ....................................................................... 2-102
xxxv
xxxvi
Chapter 1: Introduction
Introduction
Contents
About this guide ...........................................................................................................1-2
Products covered...................................................................................................1-2
Important terms.....................................................................................................1-2
Typographical conventions ..................................................................................1-2
New in this release.......................................................................................................1-4
HP support ....................................................................................................................1-4
1
Online documentation .................................................................................................1-5
Configuring CLI support..............................................................................................1-5
Secure shell access................................................................................................1-6
Authentication .......................................................................................................1-6
Serial port access...................................................................................................1-7
Entering strings ............................................................................................................1-8
Context hierarchy ........................................................................................................1-9
Sample CLI sessions ..................................................................................................1-10
File transfer.................................................................................................................1-12
Introduction
About this guide
About this guide
This guide explains how to work with the Command Line Interface (CLI) on HP MSM7xx
Controllers.
Products covered
This guide covers the following products:
Model Part
MSM710 Access Controller J9328A
MSM710 Mobility Controller J9325A
E-MSM720 Access Controller J9693A
E-MSM720 Premium Mobility Controller J9694A
MSM760 Access Controller J9421A
MSM760 Premium Mobility Controller J9420A
MSM765zl Premium Mobility Controller J9370A
Important terms
The following terms are used in this guide.
Term Description
AP Refers to any HP MSM3xx or MSM4xx Access Point.
controller, service
controller
VSC, Virtual ap, VAP These terms are used interchangeably to refer to VSC (Virtual
Refers to any HP MSM7xx Controller, including both Access
Controller and Mobility Controller variants.
Service Community).
Typographical conventions
Command syntax
Command syntax is formatted in a monospaced font as follows:
1-2
Example Description
web admin kickout
ip http port <number >
Items in plain text must be entered as shown.
Items in italics and enclosed in < > are parameters for
which you must supply a value. In this example, you
must supply a value for <number>.
Example Description
Network
Tree
Main menu
Sub-menu
end [force]
firewall mode
(high|low|none)
Items enclosed in square brackets are optional. You
can either include them or not. Do not include the
brackets. In this example you can either include
“force” or omit it.
Items enclosed in parenthesis and separated by a
vertical line indicate a choice. Specify only one of the
items. In this example, you must specify ’high’, ’low’, or
’none’.
Management tool
This guide uses specific syntax when directing you to interact with the management tool user
interface on the controller. Key user-interface elements are identified as follows:
Example directions in this guide What to do in the user interface
Select Controller >> Security > Firewall . On a non-teamed MSM7xx controller
In the Network Tree select the Controller element, then on
the main menu select Security, and then select Firewall on
the sub-menu. All elements to the left of the double angle
brackets >> are found in the Network Tree.
On an MSM7xx controller team
In the Network Tree on the team manager, select the Team
[team-name ] element, then on the main menu select
Security, and then select Firewall on the sub-menu. All
elements to the left of the double angle brackets >> are found
in the Network Tree.
1-3
New in this release
Example directions in this guide What to do in the user interface
Select Controller > VSCs > [VSC-name]
>> Configuration.
For Password specify secret22.I n t h e Password field enter the text secret22 exactly as
On a non-teamed MSM7xx controller
Expand the Controller branch (click its + symbol), expand
the VSCs branch, select a [VSC-name ] , then select
Configuration on the main menu.
On an MSM7xx controller team
In the Network Tree on the team manager, expand the Team:
[team-name ] branch (click its + symbol), expand the VSCs
branch, select a [VSC-name ] , then select Configuration on
the main menu.
shown.
New in this release
New CLI commands in this release are identified by the text New in the left margin. This is
done in the table of contents, alphabetical list of commands, and Chapter 2: CLI commands .
HP support
For support information, visit www.hp.com/networking/support and for Product Brand ,
select ProCurve . Additionally, your HP-authorized networking products reseller can provide
you with assistance.
Before contacting support
To make the support process most efficient, before calling your networking dealer or HP
Support, you first should collect the following information:
Collect this information Where to find it
Product identification. On the rear of the product.
Software version. The service controller management
tool Login page.
Network topology map, including the addresses
assigned to all relevant devices.
Your network administrator.
1-4
Online documentation
Online documentation
You can download documentation from the HP Support Website at:
www.hp.com/support/manuals.
Search by product name or part number.
Configuring CLI support
CLI support is configured using the management tool on the controller. Select Controller >>
Management > CLI to open the Command Line Interface (CLI) configuration page.
Note A maximum of three concurrent CLI sessions are supported.
1-5
Configuring CLI support
Secure shell access
Enable this option to allow access to the CLI via an SSH session. The CLI supports SSH on
the standard TCP port (22).
SSH connections to the CLI can be made on any active interface. Support for each interface
must be explicitly enabled under Security on the Controller >> Management >
Management tool page.
The following SSH clients have been tested with the CLI. Others may work as well:
OpenSSH
Tectia
SecureCRT
Putty
Authentication
The CLI validates login credentials (username and password) using the settings defined
under Administrative user authentication on the Controller >> Management >
Management tool page (shown here for reference).
1-6
Local manager account
The login username and password are the same as those defined for the local manager
account. If this account is disabled, the last known username and password for this account
are used.
Administrative user authentication settings
The login username and password use the same settings (Local and/or RADIUS ) as defined
for the manager account.
Configuring CLI support
Serial port access
Access to the CLI via the console port is available on the MSM710 and MSM760.
Enable the CLI on serial port
When enabled, access to the command line interface is permitted via the serial port.
Use hardware flow control
Enables hardware flow control.
Serial port line speed
Speed of the serial port connection.
Starting a CLI session on the serial port
The following step sequence illustrates how to start a CLI session via a serial connection to
the controller.
1. Power off the controller.
2. Connect a serial cable to the controller console port as follows:
For the MSM710, see Console ports in the MSM7xx Configuration Guide .
For the MSM760, see the MSM760 Controllers Installation Guide.
3. Configure a communications terminal program (such as Microsoft Hyperterminal for
Windows, or Minicom for Linux) as follows:
Ter m in al : VT-100 (ANSI)
Speed: Set speed according to Serial port speed option ( Management > CLI):
Data bits: 8
Stop bits: 1
Parity: none
Flow control: none
4. Open an appropriately-configured terminal session.
5. Power on the controller. System boot messages appear.
6. Wait for the login prompt to appear.
login:
7. Type the login username and press Enter.
8. The password prompt appears.
password:
9. Type the login password and press Enter.
10. The CLI prompt appears. You can now enter CLI commands.
1-7
Entering strings
CLI>
Entering strings
When entering a value that contains spaces, you must enclose it in quotation marks. For
example, if the command syntax is:
ssid <name>
You must specify one of the following:
ssid ANameWithNoSpaces
ssid "A name with spaces"
1-8
Context hierarchy
Context hierarchy
CLI commands are grouped into functional contexts. The following table shows the context
hierarchy and the commands used to switch from the parent context:
Context hierarchy To switch to this context from parent context
View (This is the root context. No command is needed.)
Enable
Config
VLAN interface
WAN IP interface
LAN IP interface
Upstream/WAN port interface
VLAN interface
Downstream/LAN port interface
VLAN interface
Wireless interface
Local mesh profile
VLAN interface
PPTP client interface
GRE interface
Virtual AP
Subscription plan
MAC addresses list
Network profile
IPsec
DHCP server
Syslog
SNMP user
SNMP notification receiver
RADIUS profile
IP QOS
Access Controller
Default user session profile
Session profile
Public access RADIUS attributes
LLDP agent
User account
Keychain
Keys
Active Directory Group
Controlled APs
Controlled APs network configuration
enable
config
vlan <name >
interface ip wan
interface ip lan
interface ethernet port-2
interface vlan <id> [-<id2> ]
interface ethernet port-1
interface vlan <id> [-<id2> ]
interface wireless
local mesh profile
interface vlan <id> [-<id2> ]
interface pptp client-default
interface gre <name>
virtual ap <name>
subscription plan <name>
mac list <name>
network-profile <name>
ipsec policy <name>
dhcp server lan
logging destination <name>
snmp-server user <name>
snmp-server notification receiver <host>
radius-server profile <name>
ip-qos profile <name>
access controller
session profile default
session profile <name>
remote configuration radius
lldp config <port>
user profile <name>
key chain <name>
key <number>
active-directory group <name>
controlled network (ap <name> [<mac> ]
config
1-9
Sample CLI sessions
Context hierarchy To switch to this context from parent context
Wireless interface
RADIUS profile
Local mesh profile
Local mesh provisioning
Provisioning connectivity
Provisioning discovery
Syslog
Switch port
Controlled APs group
Controlled APs VSC binding
Controlled APs network configuration
Wireless interface
RADIUS profile
Local mesh profile
Local mesh provisioning
Provisioning connectivity
Provisioning discovery
Syslog
Switch port
Controlled APs base group
Controlled APs network configuration
Wireless interface
RADIUS profile
Local mesh profile
Local mesh provisioning
Provisioning connectivity
Provisioning discovery
Syslog
Switch port
interface wireless (single|dual|triple) <number>
radius profile <profile>
local mesh group <group>
local mesh provisioning group
provisioning connectivity
provisioning discovery
syslog
switch port <name>
controlled network (group <name> [<mac> ]
virtual ap binding <profile>
config
interface wireless (single|dual|triple) <number>
radius profile <profile>
local mesh group <group>
local mesh provisioning group
provisioning connectivity
provisioning discovery
syslog
switch port <name>
controlled network base
config
interface wireless (single|dual|triple) <number>
radius profile <profile>
local mesh group <group>
local mesh provisioning group
provisioning connectivity
provisioning discovery
syslog
switch port <name>
1-10
Sample CLI sessions
Example 1
This sample CLI session shows you how to set the WAN port to use a static IP address,
disable NAT, and add an alternate IP address. (The CLI prompt is shown in bold.)
CLI> enable
CLI# config
CLI(config)# interface ip wan
CLI(config-if-ip)# ip address 192.168.66.1/24
CLI(config-if-ip)# ip address mode static
Sample CLI sessions
CLI(config-if-ip)# no ip nat
CLI(config-if-ip)# ip address alternate 192.168.23.56
CLI(config-if-ip)# end
CLI(config)# end
CLI# quit
Example 2
This sample CLI session shows you how to create a static trunk on the E-MSM720 that is
bound to a network profile called static trunk on port 2. The trunk is created on trunk group
1 using a VLAN ID of 900 (tagged).
CLI> enable
CLI# config
CLI(config)# network-profile "static trunk"
CLI(network-profile)# vlan 900
CLI(network-profile)# vlan
CLI(network-profile)# default
CLI(network-profile)# end
CLI(config)# interface 1
CLI(if)# trunk type trunk
CLI(if)# trunk group 1
CLI(if)# end
CLI(config)# interface 2
CLI(if)# trunk group 1
CLI(if)# trunk type trunk
CLI(if)# end
CLI(config)#
Example 3
This sample CLI session shows you how to create a dynamic trunk on the E-MSM720 that is
bound to a network profile called lacp trunk on ports 5 and 6. The trunk is created using a
VLAN ID of 800 (tagged).
CLI> enable
CLI# config
CLI(config)# network-profile "lacp trunk"
CLI(network-profile)# vlan 800
CLI(network-profile)# vlan
CLI(network-profile)# default
CLI(network-profile)# end
CLI(config)# interface 1
CLI(if)# trunk type lacp
CLI(if)# end
CLI(config)# interface 2
CLI(if)# trunk type lacp
CLI(if)# end
1-11
File transfer
File transfer
In some cases you may need to transfer files (certificates or configuration) to the controller.
Commands that have this capability typically include <uri> or <url> in their parameter list.
Note When you enter the commands discussed here, the files are transferred immediately.
File transfer can be performed in two ways.
A. The controller gets the file using a URL
Transfer a certificate file using ftp. For example:
certificate ipsec ca ftp://ftp.example.com/certificate/my-root-certificate.pem
B. Send a file to the controller
Using SFTP (available with OpenSSH or SSH), authenticate with the CLI credentials. Then
send the file to the controller. For example:
sftp msm710.mycompany.com
>login: admin
>password: ****
>put my-root-certificate.pem
file transferred (1k)
>quit
In the CLI, use the local://< > parameter in the URL. Replace < > with the
filename you used to transfer using SFTP. For example:
CLI(config)# certificate ipsec ca local://my-root-certificate.pem
1-12
Chapter 2: CLI commands
CLI commands
Contents
View context .................................................................................................................2-3
Enable context..............................................................................................................2-5
Config context ............................................................................................................2-10
Access Controller context.........................................................................................2-62
Default user session profile context........................................................................2-75
2
Session profile context..............................................................................................2-79
User account context.................................................................................................2-85
Internet port interface context.................................................................................2-89
LAN port interface context .......................................................................................2-91
WAN IP interface context..........................................................................................2-93
LAN IP interface context...........................................................................................2-97
Public access RADIUS attributes context...............................................................2-98
Virtual AP context......................................................................................................2-99
Interface context ......................................................................................................2-118
VLAN interface context ...........................................................................................2-120
RADIUS profiles context.........................................................................................2-122
IP QOS context .........................................................................................................2-125
DHCP server context ...............................................................................................2-127
GRE interface context .............................................................................................2-128
IPsec context ............................................................................................................2-129
CLI commands
Syslog context ..........................................................................................................2-132
PPTP client interface ...............................................................................................2-135
Keychain context......................................................................................................2-137
Keys context .............................................................................................................2-138
Subscription plan context....................................................................................... 2-139
SNMP user context ..................................................................................................2-142
SNMP notification receiver context ......................................................................2-143
Active Directory Group context.............................................................................2-144
Controlled APs context ...........................................................................................2-147
Controlled APs group context................................................................................ 2-149
Controlled APs base group context....................................................................... 2-150
Controlled APs network configuration context...................................................2-151
Controlled APs VSC binding context.....................................................................2-162
Syslog context ..........................................................................................................2-163
Provisioning connectivity context ......................................................................... 2-165
Provisioning discovery context..............................................................................2-168
Wireless interface context.......................................................................................2-170
RADIUS profile context...........................................................................................2-176
Local mesh profile context .....................................................................................2-177
Local mesh provisioning context ...........................................................................2-180
Switch port context .................................................................................................2-181
MAC addresses list context ....................................................................................2-186
Network profile context..........................................................................................2-187
LLDP agent context .................................................................................................2-188
2-2
CLI commands
View context
View context
Path: View
This is the root of the command tree.
arping
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
arping [ -AbDfhqUV] [ -c <count>] [ -w <deadline>] [ -s <source>] -I <interface>
<destination>
Pings a destination on a device interface using ARP packets.
enable
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
enable
Switches to the enable context.
nslookup
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
nslookup [ -option authentication ] [ <host-to-find> | - [< server> ]]
Queries DNS servers for information on hosts or domains.
ping
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ping <host> [-c <count> ] [-s <length> ] [-q]
Determines if the specified remote IP address is active.
Parameters
<-c host> The IP address or DNS name of the host to ping.
<-c count> Number of pings.
<-s length> Length of the ping datagram.
<-q> Quiet mode. No output.
ps
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ps
Displays all running processes.
quit
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
quit
Quits the CLI.
2-3
CLI commands
View context
show license
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show license (eula | gpl | other)
Displays license information.
show logging filtered
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show logging [filtered]
Displays the system log.
top
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
top
Displays all running processes.
traceroute
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
traceroute [-n] [-r] [-v] [-m <max_ttl>] [-p <port#>] [-q <nqueries>] [-s
<src_addr>] [-t <tos>] [-w <wait>] <host> [ <data size>]
Displays the hosts that are traversed to reach the specified IP address.
2-4
Enable context
Path: View > Enable
This context provides access to various utilities.
reboot device
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
reboot device
Restarts the system.
show certificate
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show certificate
Displays current certificates.
show certificate binding
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show certificate binding
CLI commands
Enable context
Displays how the certificates are used.
iperf
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
iperf -c host [-t time]
Runs a performance throughput test.
Parameters
<-c host> The IP address or DNS name of the iperf server to connect to.
<-t length> Length of the throughput test in seconds.
ping
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ping <host> [-c <count> ] [-s <length> ] [-q]
Determines if the specified remote IP address is active.
Parameters
<-c host> The IP address or DNS name of the host to ping.
<-c count> Number of pings.
<-s length> Length of the ping datagram.
<-q> Quiet mode. No output.
2-5
CLI commands
Enable context
arping
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
arping [ -AbDfhqUV] [ -c <count>] [ -w <deadline>] [ -s <source>] -I <interface>
<destination>
Pings a destination on a device interface using ARP packets.
arp
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
arp [-evn] [-H <type> ] [-i if] ?- [<hostname> ] arp [-v] [-i if] -d <hostname>
[pub] arp [-v] [-H <type> ] [-i if] -s <hostname> <hw_addr> [temp] arp [-v] [-H
<type>] [-i if] -s <hostname> <hw_addr> [<netmask> <nm>] <pub> arp [-v] [-H
<type>] [-i if] -Ds <hostname> ifa [<netmask> <nm>] <pub>
Displays and modifies the Internet-to-Ethernet address translation tables used by the address
resolution protocol.
end
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
end
Switches to parent context.
quit
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
quit
Exits the enable context.
rcapture
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
rcapture -u <URI> [-c <count>] -i <interface>
Captures data on a port and sends it to a file on an FTP server.
Parameters
<URI> Address of the FTP site and filename where the trace will be saved. For
example: ftp://user:pass@ftp.mysite.com/trace.pcap
<count> Number of packets to capture.
<interface> Interface to trace: eth0 = Internet port, eth1 = LAN port, wvlan0 = wireless
port
2-6
show arp
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show arp
Displays the ARP table.
show bridge
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show bridge
Displays bridge information.
show bridge forwarding
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show bridge forwarding
Displays bridge forwarding information.
show dns cache
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show dns cache [<serial> ]
Displays DNS cache entries. Specify a serial number to display detailed information.
CLI commands
Enable context
show interfaces
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show interfaces
Displays networking interfaces.
show ip
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show ip
Displays all IP addresses.
show ip route
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show ip route
Displays all IP routes.
show system info
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show system info
Displays basic system information.
show vsc overview
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show vsc overview
Displays an overview of the current VSCs.
2-7
CLI commands
Enable context
show controlled-aps wireless clients
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show controlled-aps wireless clients
Displays all wireless clients associated with controlled APs.
disassociate controlled-ap wireless client _
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
disassociate controlled-ap wireless client [<client_macaddress> ]
Terminates the connection for the specified wireless client.
show ip dhcp database
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show ip dhcp database
Displays the DHCP server lease database.
show satellites
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show satellites [<deviceid> ]
Displays current satellites of this access point.
show web content
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show web content
Displays all files inside the access points detected nearby.
show client log
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show client log [<macaddr> ]
Displays the client station log. Enter the MAC address to display more details for a specific client
station.
show radius statistics
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
2-8
show radius statistics
Displays RADIUS server statistics.
show radius users
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show radius users [<filter> ]
Displays users that are using RADIUS accounting.
show users
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show users [<filter> ]
Displays all users on this controller.
show discrete pin
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show discrete pin
Displays the state of the discrete pin.
config
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
config
Switches to the config context.
CLI commands
Enable context
show all config
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show all config
Displays all configuration settings that apply to this device.
controlled network
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
controlled network (ap | group | base) [<name> ] [<mac> ]
Creates or switches to the specified AP or group.
show controlled network config
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show controlled network config
Displays configuration information for all controlled APs.
2-9
CLI commands
Config context
Config context
Path: View > Enable > Config
This is the root context for all configuration commands.
vlan
Supported on: E-MSM720
vlan <networkname>
Switches to the specified VLAN interface or create a new VLAN interface with the specified VLAN
definition.
no vlan <networkname>
Deletes the specified VLAN.
New interface
Supported on: E-MSM720
interface <port>
Switches to the specified physical interface (port).
dhcp public ip default lease period
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp public ip default lease period <number>
Defines the amount of time a public IP address lease will be valid.
dhcp public ip subnet
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp public ip subnet
Enables the DHCP server IP address pool to support the public IP address feature.
no dhcp public ip subnet
Disables DHCP server IP address pool support for the public IP address feature.
certificate
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
certificate (authority | local) <uri> <certname> [<password> ]
Adds a new certificate to the store, using the specified friendly name.
2-10
certificate binding
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
certificate binding (web-management | html-auth | soap | eap) <certname>
Assigns a certificate to a service.
CLI commands
Config context
no certificate binding (web-management | html-auth | soap | eap) <certname>
Unassigns a certificate from a service.
certificate revocation
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
certificate revocation <uri> <certname>
Adds a Certificate Revocation List (CRL) to an existing authority certificate.
end
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
end
Switches to parent context.
factory settings
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
factory settings
Resets the system configuration to factory default settings.
network-profile
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
network-profile <name>
Add/Edits the specified network profile or creates a new profile with the specified name.
no network-profile <name>
Deletes the network profile with the specified name.
reboot device
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
reboot device
Restarts the system.
show certificate
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show certificate
Displays current certificates.
show certificate binding
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show certificate binding
Displays how the certificates are used.
2-11
CLI commands
Config context
show config factory
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show config [factory]
Generates a list of CLI commands that can be used to define the currently loaded configuration.
show network-profiles
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show network-profiles
Displays all currently defined network profiles.
show tech
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show tech
Displays tech support information.
interface ethernet
Supported on: MSM710 MSM760 MSM765zl
interface ethernet (port-1|port-2)
Switches to the specified Ethernet interface context.
interface ip
Supported on: MSM710 MSM760 MSM765zl
interface ip (lan | wan)
Switches to the specified IP interface context.
interface pptp client-default
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
interface pptp client-default
Switches to the PPTP client interface context.
interface gre
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
interface gre <name>
2-12
Switches to the specified GRE interface or creates a new GRE interface with the specified name.
no interface gre <name>
Deletes the specified GRE interface.
New show lacp
Supported on: E-MSM720
show lacp
Displays E-MSM720 LACP information.
New show mac-address
Supported on: E-MSM720
show mac-address [<port> ]
Displays the MAC forwarding table.
New show mac-address count
Supported on: E-MSM720
show mac-address count
Displays the number of entries in the MAC forwarding table.
CLI commands
Config context
New show trunks
Supported on: E-MSM720
show trunks
Displays trunking information.
New show vlans
Supported on: E-MSM720
show vlans
Displays VLAN information.
virtual ap
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
virtual ap <name>
Creates a new VSC (VAP) profile or switches to the existing VSC (VAP) context with the specified
name.
no virtual ap <name>
Deletes the specified VSC (VAP) profile.
Parameters
name Name of an existing or new VSC (VAP) profile.
cap-switch to
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
cap-switch to (ap | ac | wab)
Switches to the specified operational mode.
2-13
CLI commands
Config context
Parameters
ap Switches operational mode to CAP MultiService Access Point.
ac Switches operational mode to CAP MultiService Controller.
wab Switches operational mode to WAB Wireless Station.
show subscription plan
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show subscription plan [<name> ]
Displays one or more subscription plans.
subscription plan
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
subscription plan <name>
Adds a new subscription plan.
no subscription plan <name>
Deletes the specified subscription plan.
mac list
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
mac list <name>
Edits the specified MAC list or create a new list with the specified name.
no mac list <name>
Deletes the specified MAC list.
show mac list
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show mac list [<name> ]
Displays all current MAC lists, or details for the specified list.
ipsec policy
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ipsec policy <name>
Switches to the specified IPSec policy or creates a new IPSec policy with the specified name.
admin local authentication
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
admin local authentication
2-14
Sets the authentication of manager logins to occur using the local account.
no admin local authentication
Disables administrator authentication via the local account.
admin radius authentication
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
admin radius authentication
Sets the authentication of manager logins to occur using RADIUS.
no admin radius authentication
Disables manager authentication via RADIUS.
admin radius authentication server
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
admin radius authentication server <name>
Sets the authentication of manager logins to occur using RADIUS.
ip http port
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ip http port <number>
CLI commands
Config context
Sets the port number to use for HTTP access to the controller.
Parameters
<number> Port number. Range: 1 - 65535.
Description
HTTP connections made to this port are met with a warning and the browser is redirected to the
secure web server port. By default. this parameter is set to port 80.
ip https port
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ip https port <number>
Sets the port number used for HTTPS access to the controller.
Parameters
<number> Port number. Range: 1 - 65535.
snmp-server trap certificate-expired
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap certificate-expired
Send a trap when the SSL certificate has expired. A trap is sent every 12 hours.
no snmp-server trap certificate-expired
Do not send a trap when the SSL certificate has expired.
2-15
CLI commands
Config context
snmp-server trap certificate-expires-soon
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap certificate-expires-soon
Send a trap when the SSL certificate is about to expire. A trap is sent every 12 hours starting 15
days before the certificate expires.
no snmp-server trap certificate-expires-soon
Do not send a trap when the SSL certificate is about to expire.
snmp-server trap web-fail
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap web-fail
Send a trap each time an manager login is refused.
no snmp-server trap web-fail
Do not send a trap each time an manager login is refused.
snmp-server trap web-login
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap web-login
Send a trap each time an manager login is accepted.
no snmp-server trap web-login
Do not send a trap each time an manager login is accepted.
snmp-server trap web-logout
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap web-logout
Send a trap each time an manager logs out.
no snmp-server trap web-logout
Do not send a trap each time an manager logs out.
username
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
username <user> <password>
Changes the current manager local username and password.
2-16
Parameters
<user> New manager username.
<password> New manager password. New password must be between 6 and 16
printable characters in length and contain at least 4 different characters.
Passwords are case sensitive. Space characters and double quotes cannot
be used. Passwords must also conform to the Security policy that is in
effect.
CLI commands
Config context
web admin kickout
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
web admin kickout
Enables a new manager login to terminate an existing manager session.
no web admin kickout
Stops a new manager from logging in until an existing manager logs out.
web allow
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
web allow <ip address> /<mask>
Adds an address to the list of hosts that can access the management tool.
no web allow <ip address> /<mask>
Removes the specified address from the list of hosts that can access the management tool.
Parameters
<address> IP address.
</mask> Subnet mask in CIDR format. Specifies the number of bits in the mask.
web access internet-port
Supported on: MSM710 MSM760 MSM765zl
web access internet-port
Enables access to the management tool via the Internet port.
no web access internet-port
Blocks access to the management tool via the Internet port.
web access lan-port
Supported on: MSM710 MSM760 MSM765zl
web access lan-port
Enables access to the management tool via the LAN port.
no web access lan-port
Blocks access to the management tool via the LAN port.
web access interface vlan
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
web access interface vlan <name>
Enables access to the management tool via the specified VLAN.
no web access interface vlan <name>
Removes access to the management tool for the specified VLAN.
2-17
CLI commands
Config context
web access interface gre
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
web access interface gre <name>
Enables access to the management tool via the specified GRE tunnel.
no web access interface gre <name>
Disables access to the management tool via the specified GRE tunnel.
web access vpn
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
web access vpn
Enables access to the management tool via a VPN connection.
no web access vpn
Blocks access to the management tool via a VPN connection.
web access lan
Supported on: MSM710 MSM760 MSM765zl
web access lan
Enables access to the management tool via the LAN port.
no web access lan
Blocks access to the management tool via the LAN port.
dhcp mode
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp mode (server | relay | none)
Sets whether the controller operates as a DHCP server or DHCP relay agent.
enable console password reset
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
enable console password reset
Enables Console Password Reset.
no enable console password reset
Disables Console Password Reset.
console authentication
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
console authentication (always-local | like-web)
2-18
Sets how a CLI user gets authenticated.
dhcp server
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp server lan
Switches to the DHCP server context.
dhcp server default domain name
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp server default domain name <domain>
Sets the DHCP server domain name.
dhcp server default lease period
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp server default lease period <number>
Sets the default lease time for the DHCP server.
CLI commands
Config context
dhcp server default permanent lease period
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp server default permanent lease period <number>
Sets the permanent lease time for the DHCP server.
dhcp server controller
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp server controller <ip address>
Add the specified IP address to the list of controllers.
no dhcp server controller <ip address>
Remove the specified IP address from the list of controllers.
Use the address list to define the IP address for one or more controllers that are active on the
network. This list is sent to all devices that request an IP address, encoded as DHCP option 43
(Vendor-specific information). This option is only interpreted by HP APs that are operating in
controlled mode. Controlled mode APs use these addresses to connect with the controllers in the
order that they appear in the list.
dhcp server controller discovery
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp server controller discovery
Send the controller list, encoded as DHCP option 43, when assigning an address to a DHCP client.
no dhcp server controller discovery
Do not the controller address list to DHCP clients.
2-19
CLI commands
Config context
dhcp server logout html user
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp server logout html user
Logout HTML users upon discovery request.
no dhcp server logout html user
Do not logout HTML user upon discovery request.
The controller will log out a client station if a DHCP discovery request is received from the client
station while a DHCP address lease is currently assigned. This feature is useful when multiple
users share the same client station. If a user forgets to log out before turning off the client station,
the next user will have to wait until the lease expires before being able to log in.
dhcp server access centralized clients
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp server access centralized clients
Listen for DHCP requests from access-controlled client stations using the client data tunnel.
no dhcp server access centralized clients
Do not listen for DHCP requests from access-controlled client stations using the client data
tunnel.
dhcp server access lan
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp server access lan
Listen for DHCP request on the LAN port.
no dhcp server access lan
Do not listen for DHCP request on the LAN port.
dhcp relay
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp relay <primary-ip-address> <[secondary-ip-address]>
Sets the primary and secondary DHCP server for the relay.
dhcp relay circuit id
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
2-20
dhcp relay circuit id <string>
Sets the DHCP relay Option 82 circuit ID.
no dhcp relay circuit id
Clears the DHCP relay Option 82 circuit ID.
CLI commands
Config context
dhcp relay remote id
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp relay remote id <string>
Sets the DHCP relay Option 82 remote ID.
no dhcp relay remote id
Clears the DHCP relay Option 82 remote ID.
dhcp relay access centralized clients
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
dhcp relay access centralized clients
Listen for DHCP requests from access-controlled client stations using the client data tunnel.
no dhcp relay access centralized clients
Do not listen for DHCP requests from access-controlled client stations using the client data
tunnel.
dhcp relay access lan
Supported on: MSM710 MSM760 MSM765zl
dhcp relay access lan
Listen for DHCP request on the LAN port.
no dhcp relay access lan
Do not listen for DHCP request on the LAN port.
New dhcp relay access access network
Supported on: E-MSM720
dhcp relay access access network
Listen for DHCP request on the Access network.
no dhcp relay access access network
Do not listen for DHCP request on the Access network.
dhcp relay extend internet port
Supported on: MSM710 MSM760 MSM765zl
dhcp relay extend internet port
Alter DHCP requests so they appear to originate from the Internet port.
no dhcp relay extend internet port
Do not alter DHCP requests.
When enabled, the controller will alter the DHCP address requests from client stations so that
they appear to originate from the network assigned to the Internet port on the controller. This will
cause the DHCP server to assign IP addresses on this network to all client stations. The controller
handles all mapping between the two subnets internally.
2-21
CLI commands
Config context
New dhcp relay extend internet network
Supported on: E-MSM720
dhcp relay extend internet network
Alter DHCP requests so they appear to originate from the Internet network.
no dhcp relay extend internet network
Do not alter DHCP requests.
When enabled, the controller will alter the DHCP address requests from client stations so that
they appear to originate from the network assigned to the Internet port on the controller. This will
cause the DHCP server to assign IP addresses on this network to all client stations. The controller
handles all mapping between the two subnets internally.
clock
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
clock <time> <date>
Sets the system time and date.
Parameters
<time> Time as hh:mm:ss. For example: 15:44:00.
<date> Date as dd mmm yyyy. For example: 17 Oct 2004
clock auto adjust dst
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
clock auto adjust dst
Automatically adjust clock for daylight savings changes.
no clock auto adjust dst
Do not automatically adjust clock for daylight savings changes.
clock timezone
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
clock timezone <gmtdiff>
Sets the time zone the controller is operating in.
Parameters
<gmtdiff> Offset from GMT as follows: +-HOUR:MIN. For example, Eastern Standard
time is -5:00.
2-22
clock use custom dst rules
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
clock use custom dst rules
Use custom DST rules instead of default ones.
no clock use custom dst rules
Do not use custom DST rules, use default ones.
CLI commands
Config context
ntp protocol
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ntp protocol (ntp | sntp)
Sets the network time protocol to use.
ntp server
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ntp server
Enable this option to have the controller periodically contact a network time server to update its
internal clock.
no ntp server
Disables the use of a network time server.
clock custom dst begins
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
clock custom dst begins <day> <weekday> <month> <time>
Set parameters of the rule defining the beginning of daylight savings time.
Parameters
<day> Day of the month. Range 1 - 31.
<weekday> Weekday. Valid values are: "sun", "mon", "tue", "wed", "thu", "fri", "sat".
<month> Month. Valid values are: "jan", "feb", "mar", "apr", "may", "jun", "jul", "aug",
"sep", "oct", "nov", "dec".
<time> Time as hh:mm[:ss]. For example: 15:44:00.
If a parameter does not apply to the configured DST rule format, simply set this parameter to any
valid value.
clock custom dst begins format
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
clock custom dst begins format ( <fixed>| <last-weekday>| <followingdate>| <preceding-date>
Set the format of the custom DST rule.
Parameters
<fixed> Rule of the form: The [Day]th of [Month] at [Time].
<last-weekday> Rule of the form: The last [Weekday] of [Month] at [Time].
<following-date> Rule of the form: The first [Weekday] on or after the [Day]th of [Month] at
[Time].
<preceding-date> Rule of the form: The first [Weekday] on or before the [Day]th of [Month]
at [Time].
2-23
CLI commands
Config context
clock custom dst ends
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
clock custom dst ends <day> <weekday> <month> <time>
Set parameters of the rule defining the end of daylight savings time.
Parameters
<day> Day of the month. Range 1 - 31.
<weekday> Weekday. Valid values are: "sun", "mon", "tue", "wed", "thu", "fri", "sat".
<month> Month. Valid values are: "jan", "feb", "mar", "apr", "may", "jun", "jul", "aug",
"sep", "oct", "nov", "dec".
<time> Time as hh:mm[:ss]. For example: 15:44:00.
If a parameter does not apply to the configured DST rule format, simply set this parameter to any
valid value.
clock custom dst ends format
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
clock custom dst ends format ( <fixed>| <last-weekday>| <followingdate>| <preceding-date>
Set the format of the custom DST rule.
Parameters
<fixed> Rule of the form: The [Day]th of [Month] at [Time].
<last-weekday> Rule of the form: The last [Weekday] of [Month] at [Time].
<following-date> Rule of the form: The first [Weekday] on or after the [Day]th of [Month] at
[Time].
<preceding-date> Rule of the form: The first [Weekday] on or before the [Day]th of [Month]
at [Time].
ntp server
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ntp server <index><host>
Adds the specified network time server.
Parameters
<index> Index of the time server in the list. Up to 20 time servers are supported.
Time servers are checked in the order that they appear in the list.
<host> DNS name or IP address of the time server.
ntp server failure trap
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ntp server failure trap
2-24
Send a trap each time a time server synchronization failed.
no ntp server failure trap
Do not send a trap each time a time server synchronization failed.
CLI commands
Config context
config-update automatic
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
config-update automatic
Enables scheduled configuration restore or backup.
no config-update automatic
Disables scheduled configuration restore or backup.
The controller can automatically download the configuration file from a local or remote URL
(restore). It is also possible to upload the current configuration to a given URL (backup). Theses
operations can be done at preset times.
config-update operation
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
config-update operation (restore | backup)
Sets the type of operation that will take place at the preset time.
config-update start
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
config-update start
Start a config update now. Will reboot on success.
config-update time
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
config-update time <time>
Sets the time of day when the scheduled configuration operation (backup or restore) will take
place.
Parameters
<time> Time as hh:mm:ss. For example: 15:44:00.
config-update uri
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
config-update uri <uri>
Sets the URI where the controller will download or upload the configuration file.
no config-update uri
Clears the configuration file URI.
config-update weekday
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
config-update weekday (everyday | monday | tuesday | wednesday | thursday |
friday | saturday | sunday)
Sets the day when the scheduled configuration operation (backup or restore) will take place.
2-25
CLI commands
Config context
snmp-server trap config-change
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap config-change
Send a trap whenever the configuration is changed.
no snmp-server trap config-change
Do not send this trap.
snmp-server trap config-update
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap config-update
Send a trap whenever the firmware is updated.
no snmp-server trap config-update
Do not send this trap.
logging destination
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
logging destination <name>
Creates a new remote destination for syslog.
no logging destination <name>
Deletes the specified syslog destination.
Parameters
<name> Name of syslog destination. Use the name "local" to edit your local log file
settings. Any other name will edit/create a remote log destination.
snmp-server trap syslog-severity
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap syslog-severity
Set the severity level of syslog messages that will trigger a trap.
no snmp-server trap syslog-severity
Do not send this trap.
snmp-server
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server
Enables the SNMP agent.
2-26
no snmp-server
Disables the SNMP agent.
CLI commands
Config context
snmp-server allow
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server allow <ip address> /<mask>
Adds a host to the list of IP address from which access to the SNMP interface is permitted.
no snmp-server allow <ip address> /<mask>
Removes a host from the list of IP address from which access to the SNMP interface is permitted.
Parameters
<address> IP address.
</mask> Subnet mask in CIDR format. Specifies the number of bits in the mask.
snmp-server chassis-id
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server chassis-id <name>
Specifies a name to identify the controller. By default, this is set to the serial number of the
controller.
no snmp-server chassis-id
Deletes the system name.
snmp-server contact
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server contact <email>
Specifies contact information.
no snmp-server contact
Deletes contact information.
Parameters
<email> Email address.
snmp-server heartbeat period
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server heartbeat period <seconds>
Sets the interval between sending heartbeat traps.
Parameters
<seconds> Heartbeat interval in seconds.
snmp-server location
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server location <name>
Specifies the location where the controller is installed.
2-27
CLI commands
Config context
no snmp-server location
Deletes location information.
Parameters
<name> Location where the controller is installed.
snmp-server port
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server port <port number>
Sets the port the controller will use to respond to SNMP requests.
Parameters
<port number> SNMP port number. Range 1 - 65535.
snmp-server readonly
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server readonly <community>
Sets the read-only community string.
no snmp-server readonly
Deletes the read-only community string.
snmp-server readwrite
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server readwrite <community>
Sets the read-write community string.
no snmp-server readwrite
Deletes the read-write community string.
snmp-server trap
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap
Enables support for SNMP traps.
no snmp-server trap
Disables support for SNMP traps.
snmp-server trap community
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap community <str>
2-28
Sets the password required by the remote host that will receive the trap.
no snmp-server trap community
Deletes the password required by the remote host that will receive the trap.
CLI commands
Config context
snmp-server trap destination
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap destination <host> <[port number]>
Add a new trap destination.
no snmp-server trap destination <host> [<port> ]
Deletes the specified trap destination.
Parameters
<host> Sets the IP address or domain name of the host that the controller will send
traps to.
<[port number]> SNMP port number. Range 1 - 65535. By default port 162 is used
snmp-server trap heartbeat
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap heartbeat
Enables sending of heartbeat traps at regular intervals.
no snmp-server trap heartbeat
Disables sending of heartbeat traps at regular intervals.
snmp-server trap link-state
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap link-state
Send a trap when the link state changes on any interface.
no snmp-server trap link-state
Do not send this trap.
snmp-server trap snmp-authentication
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap snmp-authentication
Send a trap each time an SNMP request fails to supply the correct community name.
no snmp-server trap snmp-authentication
Do not send a trap each time an SNMP request fails to supply the correct community name.
snmp-server version 1
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server version 1
Enable support for SNMP version 1.
no snmp-server version 1
Disable support for SNMP version 1.
2-29
CLI commands
Config context
snmp-server version 2c
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server version 2c
Enable support for SNMP version 2c.
no snmp-server version 2c
Disable support for SNMP version 2c.
snmp-server version 3
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server version 3
Enable support for SNMP version 3.
no snmp-server version 3
Disable support for SNMP version 3.
snmp-server access interface vlan
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server access interface vlan <name>
Enables access to SNMP via the specified VLAN.
no snmp-server access interface vlan <name>
Disables access to SNMP via the specified VLAN.
Parameters
<name> Specifies the name of the VLAN.
snmp-server access interface gre
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server access interface gre <name>
Enables access to SNMP via the specified GRE tunnel.
no snmp-server access interface gre <name>
Removes access to SNMP via the specified GRE tunnel.
snmp-server access port-1
Supported on: MSM710 MSM760 MSM765zl
snmp-server access port-1
Enables SNMP access on the downstream port.
no snmp-server access port-1
2-30
Blocks SNMP access on the downstream port.
snmp-server access port-2
Supported on: MSM710 MSM760 MSM765zl
snmp-server access port-2
Enables SNMP access on the upstream port.
no snmp-server access port-2
Blocks SNMP access on the upstream port.
snmp-server access vpn
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server access vpn
Enables access to the management tool via a VPN connection.
no snmp-server access vpn
Blocks access to the management tool via a VPN connection.
snmp-server trap device-authorization-failure
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap device-authorization-failure
CLI commands
Config context
Send a trap when the device is not authorized to connect to the service controller.
no snmp-server trap device-authorization-failure
Do not send a trap about device authorization failure.
snmp-server trap device-configuration-failure
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap device-configuration-failure
Send a trap when the device does not accept a new configuration.
no snmp-server trap device-configuration-failure
Do not send a trap about device configuration failure.
snmp-server trap device-firmware-failure
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap device-firmware-failure
Send a trap when the device does not accept a new firmware.
no snmp-server trap device-firmware-failure
Do not send a trap about device firmware failure.
2-31
CLI commands
Config context
snmp-server trap device-security-failure
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap device-security-failure
Send a trap when the device is not able to establish a secure connection with the service
controller.
no snmp-server trap device-security-failure
Do not send a trap about device security failure.
snmp-server trap device-state-change
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap device-state-change
Send a trap when the device switch to a new state.
no snmp-server trap device-state-change
Do not send a trap about device state change.
snmp-server trap new-satellite-detected
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap new-satellite-detected
Send a trap when a new satellite is detected.
no snmp-server trap new-satellite-detected
Do not send a trap when a new satellite is detected.
snmp-server trap satellite-unreachable
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap satellite-unreachable
Send a trap when a satellite cannot be reached.
no snmp-server trap satellite-unreachable
Ignore unreachable satellites.
snmp-server trap service-controller-state
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap service-controller-state
Send a trap when a service controller leave or enter the runnig state.
2-32
no snmp-server trap service-controller-state
Do not send a trap about service controller states.
CLI commands
Config context
snmp-server access lan
Supported on: MSM710 MSM760 MSM765zl
snmp-server access lan
Enables access to the management tool via the LAN port.
no snmp-server access lan
Blocks access to the management tool via the LAN port.
snmp-server user
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server user <name>
Creates a new SNMP user or switches to the SNMP user context with the specified user name.
no snmp-server user <name>
Deletes the specified SNMP user.
snmp-server notification receiver
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server notification receiver <host>
Creates a new SNMP notification receiver or switches to the SNMP notification receiver context
with the specified IP address.
no snmp-server notification receiver <host>
Deletes the specified SNMP notification receiver.
soap-server
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
soap-server
Enables the SOAP server.
no soap-server
Disables the SOAP server.
soap-server access interface vlan
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
soap-server access interface vlan <name>
Enables access to SOAP via this VLAN.
no soap-server access interface vlan <name>
Disables access to SOAP via this VLAN.
2-33
CLI commands
Config context
soap-server allow
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
soap-server allow <ip address> /<mask>
Adds a host to the list of IP addresses from which access to the SOAP interface is permitted.
no soap-server allow <ip address> /<mask>
Removes a host from the list of IP addresses from which access to the SOAP interface is
permitted.
Parameters
<address> IP address.
</mask> Subnet mask in CIDR format. Specifies the number of bits in the mask.
soap-server http authentication
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
soap-server http authentication
Enable the SOAP server HTTP authentication.
no soap-server http authentication
Disable the SOAP server HTTP authentication.
soap-server http authentication password
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
soap-server http authentication password
Set the SOAP server HTTP authentication password.
soap-server http authentication username
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
soap-server http authentication username
Set the SOAP server HTTP authentication username.
soap-server port
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
soap-server port <port number>
Sets the port the controller will use to respond to SOAP requests.
Parameters
<port number> SOAP port number. Range 1 - 65535.
2-34
soap-server ssl
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
soap-server ssl
SSL enabled for SOAP server.
no soap-server ssl
SSL disabled for SOAP server.
soap-server ssl with client certificate
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
soap-server ssl with client certificate
Enable the use of client certificate with SSL for SOAP server.
no soap-server ssl with client certificate
Disable the use of client certificate with SSL for SOAP server.
soap-server access interface gre
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
soap-server access interface gre <name>
Enables access to SOAP via the specified GRE tunnel.
no soap-server access interface gre <name>
CLI commands
Config context
Removes access to SOAP via the specified GRE tunnel.
soap-server access port-1
Supported on: MSM710 MSM760 MSM765zl
soap-server access port-1
Enables SOAP access on the downstream port.
no soap-server access port-1
Blocks SOAP access on the downstream port.
soap-server access port-2
Supported on: MSM710 MSM760 MSM765zl
soap-server access port-2
Enables SOAP access on the upstream port.
no soap-server access port-2
Blocks SOAP access on the upstream port.
soap-server access lan
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
soap-server access lan
Enables access to the management tool via the LAN port.
no soap-server access lan
Blocks access to the management tool via the LAN port.
2-35
CLI commands
Config context
soap-server access vpn
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
soap-server access vpn
Enables access to the management tool via a VPN connection.
no soap-server access vpn
Blocks access to the management tool via a VPN connection.
snmp-server trap vpn-connection
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap vpn-connection
Send a trap when a user establishes a VPN connection with the controller.
no snmp-server trap vpn-connection
Do not send this trap.
snmp-server trap syslog-matches
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap syslog-matches
Send a trap when syslog messages matches a specified regular expression.
no snmp-server trap syslog-matches
Do not send this trap.
snmp-server trap syslog-matches regex
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap syslog-matches regex <regex>
Sets the regular expression used to match the syslog messages.
snmp-server trap syslog-severity level
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap syslog-severity level (debug | info | notice | warning | error
| critical | alert | emergency)
Set the severity level of syslog messages that will trigger a trap.
snmp-server trap network-trace
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap network-trace
2-36
Send a trap when a network trace is started or stopped.
no snmp-server trap network-trace
Do not send this trap.
CLI commands
Config context
firmware-update automatic
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
firmware-update automatic
Enables scheduled firmware upgrades.
no firmware-update automatic
Disables scheduled firmware upgrade.
The controller can automatically retrieve and install firmware from a local or remote URL at
preset times. By placing controller firmware on a web or ftp server, you can automate the update
process for multiple units.
When the update process is triggered the controller retrieves the first 2K of the firmware file to
determine if it is different from the active version. If different, the entire firmware file is then
downloaded and installed.
(Different means older or newer. This enables you to return to a previous firmware version if
required).
Configuration settings are preserved during the update unless stated otherwise in the release
notes for the firmware. However, all active connections will be terminated. Customers will have
to log in again after the controller restarts
firmware-update start
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
firmware-update start
Upload the firmware based on a specified URI. This URI can be set with the command: firmwareupdate uri.
firmware-update time
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
firmware-update time <time>
Sets the time of day the scheduled firmware upgrade will take place.
Parameters
<time> Time as hh:mm:ss. For example: 15:44:00.
firmware-update uri
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
firmware-update uri <uri>
Sets the URI where the controller will retrieve new firmware.
no firmware-update uri
Clears the firmware URI.
2-37
CLI commands
Config context
firmware-update weekday
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
firmware-update weekday (everyday | monday | tuesday | wednesday | thursday |
friday | saturday | sunday)
Sets the day when the scheduled firmware upgrade will take place.
snmp-server trap firmware-update
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
snmp-server trap firmware-update
Send a trap on firmware update.
no snmp-server trap firmware-update
Do not send a trap on firmware update.
ip name-server
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ip name-server <primary> [<secondary> ] [<third> ]
Sets the primary and secondary DNS servers overriding dynamically assigned ones.
Parameters
<primary> IP address of the primary DNS server.
<secondary> IP address of the secondary DNS server.
<third> IP address of the third DNS server.
ip name-server cache
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ip name-server cache
Enables the DNS cache.
no ip name-server cache
Disables the DNS cache.
Once a host name has been successfully resolved to an IP address by a remote DNS server, it is
stored in the cache. This speeds up network performance, as the remote DNS server now does not
have to be queried for subsequent requests for this host.
The entry stays in the cache until:
an error occurs when connecting to the remote host
the time to live (TTL) of the DNS request expires
2-38
the controller is restarted
ip name-server dynamic
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ip name-server dynamic
Enables dynamic assignment of DNS servers.
no ip name-server dynamic
Disables dynamic DNS assignment.
ip name-server interception
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ip name-server interception
Intercept all DNS requests from users and relay them to configured servers.
no ip name-server interception
Process DNS requests addressed to this device only.
ip name-server switch-on-servfail
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ip name-server switch-on-servfail
Switch to next server when server failure is received.
no ip name-server switch-on-servfail
CLI commands
Config context
Do not switch to next server when server failure is received.
ip name-server switch-over
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ip name-server switch-over
Switch over to primary when active.
no ip name-server switch-over
Do not switch over to primary when active.
ip name-server logout-info
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ip name-server logout-info <host> <ip address>
Sets the logout host name and the logout IP address.
access controller shared secret
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
access controller shared secret <secret>
Sets the shared secret used to communicate with the controller.
no access controller shared secret
Sets the shared secret used to communicate with the access controller.
The controller will only accept authentication/location-aware information from HP APs that have
a matching shared secret to its own.
2-39
CLI commands
Config context
radius-server profile
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
radius-server profile <name>
Creates a new RADIUS profile or switches to the RADIUS context with the specified profile name.
no radius-server profile <name>
Deletes the specified RADIUS profile.
ip-qos profile
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ip-qos profile <name>
Creates a new IP QoS profile or switches to the IP QoS context with the specified profile name.
no ip-qos profile <name>
Deletes the specified IP QoS profile.
access controller
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
access controller
Switches to the access controller context.
certificate ipsec ca
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
certificate ipsec ca <uri>
Loads a new CA certificate from the specified URI.
The URI can be local:
local://FILENAME
or remote
ftp://host/path
certificate ipsec local
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
certificate ipsec local <uri> <password>
Loads a new local certificate from the specified URI.
no certificate ipsec local
Removes the local certificate.
The URI can be local:
local://FILENAME
2-40
or remote
ftp://host/path
certificate ipsec revocation
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
certificate ipsec revocation <uri>
Loads a new CRL file from the specified URI.
The URI can be local:
local://FILENAME
or remote
ftp://host/path
certificate ssl
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
certificate ssl <uri> <password>
Loads a new SSL certificate using the URI.
session profile default
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
CLI commands
Config context
session profile default
Switches to the session profile context.
session profile
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
session profile <name>
Switches to the session profile context.
no session profile <name>
Removes the specified session profile.
show session profile
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show session profile
Display all session profiles.
remote configuration
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
remote configuration (radius)
Switches to the RADIUS remote configuration context.
2-41
CLI commands
Config context
lldp config
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
lldp config <port>
Edit LLPD port specific options.
lldp dynamic-name
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
lldp dynamic-name
Enables the LLDP dynamic naming feature.
no lldp dynamic-name
Disables the LLDP dynamic naming feature.
lldp dynamic-name refresh-time
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
lldp dynamic-name refresh-time <time>
Sets the interval at which dynamic names for controlled APs are updated.
lldp dynamic-name user-string
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
lldp dynamic-name user-string <name>
Specifies the text to use for the dynamic name.
You can use regular text in combination with placeholders to create the name. Placeholders are
automatically expanded each time the name is regenerated.
Placeholders
%RN System name of the neighboring device to which the port is connected,
obtained via the System Name TLV. Since this is an optional TLV, if it is not
available, the Chassis ID TLV is used instead.
%RP Port description of the port on the neighboring device to which the local
port is connected, obtained via the Port Description TLV. Since this is an
optional TLV, if it is not available, the Port ID TLV is used instead.
%SN Controller’s serial number.
%IP Controller’s IP address. An IP address can require up to 15 characters
(nnn.nnn.nnn.nnn).
lldp fast-start-count
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
2-42
lldp fast-start-count <count>
After an MED LLDPDU is received, this timer is started and the agent sends one MED LLDPDU to
the MED device each second as it counts down.
CLI commands
Config context
lldp holdtime-multiplier
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
lldp holdtime-multiplier <hold>
Sets the hold time multiplier for LLDPDU transmissions.
The value of Multiplier is multiplied by the refresh-interval to define Time to live. Time to live
indicates the length of time that neighbors will consider LLDP information sent by this agent to be
valid.
lldp med-location civic-address-element
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
lldp med-location civic-address-element <caelement>
Adds a Civic Address Element.
lldp med-location elin-addr
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
lldp med-location elin-addr <elin>
Sets the Emergency Call Services ELIN as described, for example, by NENA TID 07-501.
lldp refresh-interval
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
lldp refresh-interval <time>
Sets the interval (in seconds) at which local LLDP information is updated and TLVs are sent to
neighboring network devices.
lldp run
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
lldp run
Enables the LLDP Agent.
no lldp run
Disables the LLDP Agent.
show lldp config
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show lldp config [<port> ]
Displays LLDP configuration settings.
show lldp info local-device
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show lldp info local-device [<port> ]
Displays LLDP configuration settings.
2-43
CLI commands
Config context
show lldp info remote-device
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show lldp info remote-device [<port> ]
Displays LLDP configuration settings.
show lldp stats
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
show lldp stats [<port> ]
Displays LLDP statistics for all ports or a specific port .
discovery protocol
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
discovery protocol
Enables broadcast of HP device information for interoperability with CDP-enabled networking
hardware.
no discovery protocol
Disables broadcast of HP device information.
discovery protocol device-id
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
discovery protocol device-id <name>
Overwrite the device-id field of information packets (the controller serial number is not used).
no discovery protocol device-id
Do not overwrite the device-id field of information packets (use the controller serial number).
service controller ap authentication credentials
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller ap authentication credentials <username> <password>
When the RADIUS authentication source is selected, this option specifies the RADIUS username
and password assigned to the controller.
no service controller ap authentication credentials
Clears the RADIUS username/password.
2-44
service controller ap authentication enable
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller ap authentication enable
Enables authentication of discovered controlled APs.
no service controller ap authentication enable
Disables AP authentication.
CLI commands
Config context
service controller ap authentication file
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller ap authentication file <name>
Sets the file to use for authentication of controlled access points. This must be an ASCII file with
one or more MAC addresses in it. Each address must appear on a separate line.
service controller ap authentication radius-server
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller ap authentication radius-server <name>
Sets the RADIUS profile to use for authentication of controlled access points.
service controller ap authentication refresh-rate
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller ap authentication refresh-rate <number>
Specifies the interval at which the controller retrieves authentication list entries from the selected
authentication source(s).
service controller ap authentication source file
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller ap authentication source file
Enables the use of a file authentication source.
no service controller ap authentication source file
Disables the use of a file authentication source.
service controller ap authentication source local
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller ap authentication source local
Enables the use of local authentication source.
no service controller ap authentication source local
Disables the use of local authentication source.
service controller ap authentication source radius
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller ap authentication source radius
Enables the use of RADIUS authentication source.
no service controller ap authentication source radius
Disables the use of RADIUS authentication source.
2-45
CLI commands
Config context
service controller discovery
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller discovery
Enable controller discovery.
no service controller discovery
Disable service controller discovery.
service controller primary
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller primary
Become the Primary controller.
no service controller primary
Become a secondary controller.
service controller primary ip addr
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller primary ip addr <ip address>
Configure a static ip address for the primary controller.
service controller priority
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller priority <number>
Sets this device’s discovery priority.
service controller discovery interface internet-port
Supported on: MSM710 MSM760 MSM765zl
service controller discovery interface internet-port
Allow discovery on the LAN port.
no service controller discovery interface internet-port
Allow discovery on the LAN port.
service controller discovery interface lan-port
Supported on: MSM710 MSM760 MSM765zl
service controller discovery interface lan-port
Allow discovery on the LAN port.
2-46
no service controller discovery interface lan-port
Allow discovery on the LAN port.
New service controller discovery interface
Supported on: E-MSM720
service controller discovery interface <interface>
Allow discovery on the specified interface.
no service controller discovery interface <interface>
Denies discovery on the specified interface.
service controller provisioning
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
service controller provisioning
Enable the AP provisioning system.
no service controller provisioning
Disable the AP provisioning system.
bandwidth control internet-port
Supported on: MSM710 MSM760 MSM765zl
bandwidth control internet-port
CLI commands
Config context
Enables bandwidth control on the Internet port.
no bandwidth control internet-port
Disables bandwidth control on the Internet port.
bandwidth control internet-port high
Supported on: MSM710 MSM760 MSM765zl
bandwidth control internet-port high <min-tx-%> <min-rx-%> <max-tx-%> <max-rx%>
Sets the bandwidth rates (Tx minimum, Tx maximum, Rx minimum, and Rx maximum) for traffic
classed as High.
bandwidth control internet-port low
Supported on: MSM710 MSM760 MSM765zl
bandwidth control internet-port low <min-tx-%> <min-rx-%> <max-tx-%> <max-rx-%>
Sets the bandwidth rates (Tx minimum, Tx maximum, Rx minimum, and Rx maximum) for traffic
classed as Low.
bandwidth control internet-port max-rate
Supported on: MSM710 MSM760 MSM765zl
bandwidth control internet-port max-rate<transmit> )<receive> )
Sets the maximum transmit and receive rates on the Internet port in kbps.
2-47
CLI commands
Config context
These settings enable you to limit the total incoming or outgoing data rate on the Internet port. If
traffic exceeds the rate you set for short bursts, it is buffered. Long overages will result in data
being dropped. To utilize the full available bandwidth, the transmit and receive limits should be
set to match the incoming and outgoing data rates on the Internet port.
Parameters
<transmit> Sets the maximum transmit rate in kbps.
<receive> Sets the maximum receive rate in kbps.
About bandwidth control
Bandwidth rates for each level are defined by taking a percentage of the maximum transmit and
receive rates defined for the Internet port. Each bandwidth level has four rate settings:
Transmit rate - guaranteed minimum: This is the minimum amount of bandwidth that will be
assigned to a level as soon as outgoing traffic is present on the level.
Transmit rate - maximum: This is the maximum amount of outgoing bandwidth that can be
consumed by the level. Traffic in excess will be buffered for short bursts, and dropped for
sustained overages.
Receive rate - guaranteed minimum: This is the minimum amount of bandwidth that will be
assigned to a level as soon as incoming traffic is present on the level.
Receive rate - maximum: This is the maximum amount of incoming bandwidth that can be
consumed by the level. Traffic in excess will be buffered for short bursts, and dropped for
sustained overages.
Bandwidth levels are arranged in order of priority from Very High to Low. Priority determines
how free bandwidth is allocated once the minimum rate has been met for each level. Free
bandwidth is always assigned to the higher priority levels first.
Assigning traffic to bandwidth levels
Customer traffic is assigned to a bandwidth level on a per-VAP (VSC) basis.
Management traffic (RADIUS, SNMP, management tool admin sessions) is assigned to
bandwidth level Very High and cannot be changed.
All traffic assigned to a particular bandwidth level shares the allocated bandwidth for that
level.
bandwidth control internet-port normal
Supported on: MSM710 MSM760 MSM765zl
bandwidth control internet-port normal <min-tx-%> <min-rx-%> <max-tx-%> <maxrx-%>
Sets the bandwidth rates (Tx minimum, Tx maximum, Rx minimum, and Rx maximum) for traffic
classed as Normal.
2-48
bandwidth control internet-port very-high
Supported on: MSM710 MSM760 MSM765zl
bandwidth control internet-port very-high <min-tx-%> <min-rx-%> <max-tx-%>
<max-rx-%>
Sets the bandwidth rates (Tx minimum, Tx maximum, Rx minimum, and Rx maximum) for traffic
classed as Very High.
New bandwidth control
Supported on: E-MSM720
bandwidth control
Enables bandwidth control for traffic going between the Access and the Internet network.
no bandwidth control
Disables bandwidth control for traffic going between the Access and the Internet network.
New bandwidth control high
Supported on: E-MSM720
bandwidth control high <min-tx-%> <min-rx-%> <max-tx-%> <max-rx-%>
Sets the bandwidth rates (Tx minimum, Tx maximum, Rx minimum, and Rx maximum) for traffic
classed as High.
New bandwidth control low
Supported on: E-MSM720
CLI commands
Config context
bandwidth control low <min-tx-%> <min-rx-%> <max-tx-%> <max-rx-%>
Sets the bandwidth rates (Tx minimum, Tx maximum, Rx minimum, and Rx maximum) for traffic
classed as Low.
New bandwidth control max-rate
Supported on: E-MSM720
bandwidth control max-rate<transmit> )<receive> )
Sets the maximum transmit and receive rates in kbps.
These settings enable you to limit the total incoming or outgoing data rate on the Internet
network. If traffic exceeds the rate you set for short bursts, it is buffered. Long overages will
result in data being dropped. To utilize the full available bandwidth, the transmit and receive
limits should be set to match the incoming and outgoing data rates on the Internet network.
Parameters
<transmit> Sets the maximum transmit rate in kbps.
<receive> Sets the maximum receive rate in kbps.
About bandwidth control
Bandwidth rates for each level are defined by taking a percentage of the maximum transmit and
receive rates defined for the Internet network. Each bandwidth level has four rate settings:
Transmit rate - guaranteed minimum: This is the minimum amount of bandwidth that will be
assigned to a level as soon as outgoing traffic is present on the level.
Transmit rate - maximum: This is the maximum amount of outgoing bandwidth that can be
consumed by the level. Traffic in excess will be buffered for short bursts, and dropped for
sustained overages.
Receive rate - guaranteed minimum: This is the minimum amount of bandwidth that will be
assigned to a level as soon as incoming traffic is present on the level.
2-49
CLI commands
Config context
Receive rate - maximum: This is the maximum amount of incoming bandwidth that can be
consumed by the level. Traffic in excess will be buffered for short bursts, and dropped for
sustained overages.
Bandwidth levels are arranged in order of priority from Very High to Low. Priority determines
how free bandwidth is allocated once the minimum rate has been met for each level. Free
bandwidth is always assigned to the higher priority levels first.
Assigning traffic to bandwidth levels
Customer traffic is assigned to a bandwidth level on a per-VAP (VSC) basis.
Management traffic (RADIUS, SNMP, management tool admin sessions) is assigned to
bandwidth level Very High and cannot be changed.
All traffic assigned to a particular bandwidth level shares the allocated bandwidth for that
level.
New bandwidth control normal
Supported on: E-MSM720
bandwidth control normal <min-tx-%> <min-rx-%> <max-tx-%> <max-rx-%>
Sets the bandwidth rates (Tx minimum, Tx maximum, Rx minimum, and Rx maximum) for traffic
classed as Normal.
New bandwidth control very-high
Supported on: E-MSM720
bandwidth control very-high <min-tx-%> <min-rx-%> <max-tx-%> <max-rx-%>
Sets the bandwidth rates (Tx minimum, Tx maximum, Rx minimum, and Rx maximum) for traffic
classed as Very High.
ip route gateway
Supported on: MSM710 E-MSM720 MSM760 MSM765zl
ip route gateway<destination> /<mask> <gateway> <[metric]>
Adds a static route.
no ip route gateway <destination> /<mask> <gateway> <[metric]>
Removes the specified static route.
Parameters
<destination> Traffic addressed to this IP address will be routed.
<mask> Indicates the number of bits in the destination address that is checked for a
match.
<gateway> Indicates the IP address of the gateway the controller will forward routed
traffic to. The gateway address must be on the same subnet as one of the
available interfaces (Internet port or LAN port).
<metrix> Indicates the priority of a route. If two routes exist for a destination
address then the controller chooses the one with the lower metric.
2-50