indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
ambient conditions must be complied with. The information in the relevant documentation must be observed.
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the specific
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Proper use of Siemens products
Note the following:
documentation. If products and components from other manufacturers are used, these must be recommended
or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
maintenance are required to ensure that the products operate safely and without any problems. The permissible
Trademarks
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
03/2019 Subject to change
Table of contents
1 About this guide .................................................................................................................................... 13
4.1 A .............................................................................................................................................. 27
4.1.27 arm .......................................................................................................................................... 50
4.2.4 ble .......................................................................................................................................... 61
4.3 C ............................................................................................................................................. 64
4.7.4 gre ......................................................................................................................................... 115
4.8 H ............................................................................................................................................ 118
4.9 I ............................................................................................................................................. 160
4.11.12 mtu ....................................................................................................................................... 206
4.12 N ........................................................................................................................................... 207
4.12.1 name .................................................................................................................................... 207
4.16 S ............................................................................................................................................ 238
4.16.1 show 1xcert ........................................................................................................................... 238
4.16.2 show aaa ............................................................................................................................... 238
4.16.3 show about ............................................................................................................................ 239
4.16.4 show access-rule .................................................................................................................. 240
4.16.5 show access-rule-all ............................................................................................................. 242
4.16.6 show acl ................................................................................................................................ 243
4.16.7 show airgroup ....................................................................................................................... 244
4.16.8 show airgroupservice ............................................................................................................ 254
4.16.9 show aigroupservice-ids ....................................................................................................... 257
4.16.10 show ale ................................................................................................................................ 258
4.16.11 show ale stats ....................................................................................................................... 260
4.16.12 show alert global ................................................................................................................... 261
4.16.13 show alg ................................................................................................................................ 263
4.16.14 show all monitor .................................................................................................................... 264
4.16.15 show allowed-aps ................................................................................................................. 265
4.16.16 show a-max-clients ............................................................................................................... 266
4.16.17 show amp-audit ..................................................................................................................... 267
4.16.18 show ap allowed-channels .................................................................................................... 272
4.16.19 show ap allowed-max-EIRP .................................................................................................. 273
4.16.20 show ap arm ......................................................................................................................... 275
4.16.21 show ap association.............................................................................................................. 283
4.16.22 show ap bss-table ................................................................................................................. 284
4.16.23 show ap cacert ...................................................................................................................... 286
4.16.24 show ap mesh cluster ........................................................................................................... 288
4.16.25 show ap mpskcache ............................................................................................................. 290
4.16.26 show ap checksum ............................................................................................................... 291
4.16.27 show ap client-match-live ..................................................................................................... 292
4.16.28 show ap client-match-history ................................................................................................ 293
4.16.29 show ap client-match-refused ............................................................................................... 294
4.16.30 show ap client-match-ssid-table radio-mac .......................................................................... 296
4.16.31 show ap client-match-triggers ............................................................................................... 297
4.16.32 show ap client-probe-report .................................................................................................. 298
4.16.33 show ap client-view ............................................................................................................... 299
4.16.34 show ap debug airwave ........................................................................................................ 300
4.16.35 show ap debug airwave-config-received .............................................................................. 311
4.16.36 show ap debug airwave-data-sent ........................................................................................ 312
4.16.37 show ap debug airwave-events-pending .............................................................................. 313
4.16.38 show ap debug airwave-restore-status ................................................................................. 314
4.16.39 show ap debug airwave-signon-key ..................................................................................... 314
4.16.40 show ap debug airwave-state ............................................................................................... 315
4.16.41 show ap debug airwave-stats ............................................................................................... 317
4.16.42 show ap debug am-config ..................................................................................................... 319
4.16.43 show ap debug auth-trace-buf .............................................................................................. 320
4.16.44 show ap debug ble-config ..................................................................................................... 321
4.16.45 show ap debug ble-counters ................................................................................................. 323
4.16.46 show ap debug ble-daemon ................................................................................................. 323
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
7
Table of contents
4.16.47 show ap debug ble-relay ...................................................................................................... 324
4.16.48 show ap debug ble-table ...................................................................................................... 327
4.16.49 show ap debug ble-table assettags ..................................................................................... 328
4.16.50 show ap debug client-frame-history ..................................................................................... 329
4.16.51 show ap debug client-match ................................................................................................ 330
4.16.52 show ap debug client-stats .................................................................................................. 331
4.16.53 show ap debug client-table .................................................................................................. 337
4.16.54 show ap debug core-info ...................................................................................................... 339
4.16.55 show ap debug crash-info .................................................................................................... 340
4.16.56 show ap debug dhcp-packets .............................................................................................. 340
4.16.57 show ap debug dot1x-statistics ............................................................................................ 342
4.16.58 show ap debug driver-config ................................................................................................ 343
4.16.59 show ap debug lldp .............................................................................................................. 348
4.16.60 show ap debug lldp neighbor ............................................................................................... 350
4.16.61 show ap debug lldp state ..................................................................................................... 351
4.16.62 show ap debug mgmt-frames .............................................................................................. 352
4.16.63 show ap debug network-bssid ............................................................................................. 353
4.16.64 show ap debug persistent-clients......................................................................................... 354
4.16.65 show ap debug power-table ................................................................................................. 355
4.16.66 show ap debug radio-stats ................................................................................................... 356
4.16.67 show ap debug radius-statistics ........................................................................................... 359
4.16.68 show ap debug rfc3576-radius-statistics ............................................................................. 360
4.16.69 show ap debug shaping-table .............................................................................................. 362
4.16.70 show ap debug spanning-tree .............................................................................................. 364
4.16.71 show ap debug stm-config ................................................................................................... 365
4.16.72 show ap debug stm-role ....................................................................................................... 366
4.16.73 show ap debug stystem-status ............................................................................................ 366
4.16.74 show ap debug tacas-statistics ............................................................................................ 367
4.16.75 show ap dot11k-beacon-report ............................................................................................ 368
4.16.76 show ap dot11k-nbrs ............................................................................................................ 369
4.16.77 show ap flash-config ............................................................................................................
370
4.16.78 show ap mesh counters ....................................................................................................... 371
4.16.79 show ap mesh link ............................................................................................................... 373
4.16.80 show ap mesh neighbors ..................................................................................................... 375
4.16.81 show ap monitor ................................................................................................................... 377
4.16.82 show ap pmkcache .............................................................................................................. 389
4.16.83 show ap virtual-beacon-report ............................................................................................. 390
4.16.84 show ap1x ............................................................................................................................ 392
4.16.85 show ap1xcert ...................................................................................................................... 392
4.16.86 show ap-alert ........................................................................................................................ 393
4.16.87 show ap-env ......................................................................................................................... 394
4.16.88 show aps .............................................................................................................................. 395
4.16.89 show app-services ............................................................................................................... 398
4.16.90 show arm config ................................................................................................................... 400
4.16.91 show arm-channels .............................................................................................................. 402
4.16.92 show arp ............................................................................................................................... 404
4.16.93 show attack .......................................................................................................................... 405
4.16.94 show audit-trail ..................................................................................................................... 407
4.16.95 show auth-surviveability ....................................................................................................... 408
4.16.96 show backup-config ............................................................................................................. 409
4.16.97 show banner ......................................................................................................................... 411
4.16.98 show blacklist-client ............................................................................................................. 412
SCALANCE W1750D CLI
8Function Manual, 03/2019, C79000-G8976-C452-04
Table of contents
4.16.99 show ble-config ..................................................................................................................... 413
4.16.100 show calea config ................................................................................................................. 414
4.16.101 show calea statistics ............................................................................................................. 415
4.16.102 show cellular ......................................................................................................................... 416
4.16.103 show cert all .......................................................................................................................... 419
4.16.104 show clarity ........................................................................................................................... 421
4.16.105 show clearpassca ................................................................................................................. 423
4.16.106 show clients .......................................................................................................................... 423
4.16.107 show clock ............................................................................................................................ 427
4.16.108 show cluster-security ............................................................................................................ 430
4.16.109 show config-status ................................................................................................................ 436
4.16.110 show configuration ................................................................................................................ 437
4.16.111 show console-setttings.......................................................................................................... 443
4.16.112 show country-codes .............................................................................................................. 444
4.16.113 show cpcert ........................................................................................................................... 447
4.16.114 show cpu ............................................................................................................................... 448
4.16.115 show datapath ....................................................................................................................... 450
4.16.116 show ddns ............................................................................................................................. 471
4.16.117 show delta-config .................................................................................................................. 472
4.16.118 show derivation-rules ............................................................................................................ 473
4.16.119 show dhcp-allocation ............................................................................................................ 474
4.16.120 show dhcps config ................................................................................................................ 475
4.16.121 show dhcpc-opts ................................................................................................................... 477
4.16.122 show dhcp ............................................................................................................................. 478
4.16.123 show distributed-dhcp-branch-counts ................................................................................... 480
4.16.124 show domain-names ............................................................................................................. 482
4.16.125 show dpi ................................................................................................................................ 482
4.16.126 show dpi-error-page-urls ....................................................................................................... 489
4.16.127 show dpi-stats ....................................................................................................................... 490
4.16.128 show drt state ........................................................................................................................ 494
4.16.129 show election ........................................................................................................................ 495
4.17 T ............................................................................................................................................ 633
4.18 U ............................................................................................................................................ 639
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
A Appendix A .......................................................................................................................................... 725
A.1 Glossary of Terms ................................................................................................................ 725
Index ................................................................................................................................................... 757
SCALANCE W1750D CLI
12Function Manual, 03/2019, C79000-G8976-C452-04
1
This document describes the CLI command syntax and provides the following information for
each command:
● Command Syntax—The complete syntax of the command.
● Description—A brief description of the command.
● Syntax—A description of the command parameters, the applicable ranges and default
values, if any.
● Usage Guidelines—Information to help you use the command, including prerequisites,
prohibitions, and related commands.
● Example—An example of how to use the command.
● Command Information—This table describes command modes and platforms for which
this command is applicable.
The commands are listed in alphabetical order.
Security information
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens’ products and solutions constitute one element of such a concept.
Customers are responsible for preventing unauthorized access to their plants, systems,
machines and networks. Such systems, machines and components should only be
connected to an enterprise network or the internet if and to the extent such a connection is
necessary and only when appropriate security measures (e.g. firewalls and/or network
segmentation) are in place.
For additional information on industrial security measures that may be implemented, please
visit https://www.siemens.com/industrialsecurity.
Siemens’ products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends that product updates are applied as soon as they are
available and that the latest product versions are used. Use of product versions that are no
longer supported, and failure to apply the latest updates may increase customers’ exposure
to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed under https://www.siemens.com/industrialsecurity.
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
13
About this guide
SCALANCE W1750D CLI
14Function Manual, 03/2019, C79000-G8976-C452-04
2
General
To prevent unauthorized access, note the following security recommendations.
● You should make regular checks to make sure that the device meets these
recommendations and/or other security guidelines.
● Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products (https://www.industry.siemens.com/topics/global/en/industrial-
security/pages/default.aspx).
● When the internal and external network are disconnected, an attacker cannot access
internal data from the outside. Therefore operate the device only within a protected
network area.
● For communication via non-secure networks use additional devices with VPN functionality
to encrypt and authenticate the communication.
● Restrict physical access to the device to qualified personnel.
Software (security functions)
● Keep the software up to date. Check regularly for security updates of the product. You will
find information on this on the Internet pages "Industrial Security
(https://www.siemens.com/industrialsecurity)" .
● Inform yourself regularly about security advisories and bulletins published by Siemens
ProductCERT (https://www.siemens.com/cert/en/cert-security-advisories.htm).
● Only activate protocols that you really require to use the device.
● Use the security functions such as address translation with NAT (Network Address
Translation) or NAPT (Network Address Port Translation) to protect receiving ports from
access by third parties.
● Restrict access to the device with a firewall or rules in an access control list (ACL -
Access Control List).
● If RADIUS authentication is via remote access, make sure that the communication is
within the secured network area or is via a secure channel.
● The option of VLAN structuring provides good protection against DoS attacks and
unauthorized access. Check whether this is practical or useful in your environment.
● Enable logging functions. Use the central logging function to log changes and access
attempts centrally. Check the logging information regularly.
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
15
Security recommendations
● Configure a Syslog server to forward all logs to a central location.
● Use WPA2/ WPA2-PSK with AES to protect the WLAN.
Software (security functions)
● Restrict physical access to the device to qualified personnel
Passwords
● Define rules for the use of devices and assignment of passwords.
● Regularly update passwords and keys to increase security.
● Change all default passwords for users before you operate the device.
● Only use passwords with a high password strength. Avoid weak passwords for example
password1, 123456789, abcdefgh.
● Make sure that all passwords are protected and inaccessible to unauthorized personnel.
● Do not use the same password for different users and systems or after it has expired.
Keys and certificates
● This section deals with the security keys and certificates you require to set up HTTPS (
Hypertext Transfer Protocol Secured Socket Layer).
● We strongly recommend that you create your own HTTPS certificates and make them
available. There are preset certificates and keys on the device. The preset and
automatically created HTTPS certificates are self-signed. We recommend that you use
HTTPS certificates signed either by a reliable external or by an internal certification
authority. The HTTPS certificate checks the identity of the device and controls the
encrypted data exchange. You can install the HTTPS certificate via the Configuration
Manual “SCALANCE W UI”, see "Uploading Certificate".
● Handle user-defined private keys with great caution if you use user-defined SSH or SSL
keys.
● Use the certification authority including key revocation and management to sign the
certificates.
● Verify certificates and fingerprints on the server and client to avoid "man in the middle"
attacks.
● We recommend that you use certificates with a key length of 2048 bits.
● Change keys and certificates immediately, if there is a suspicion of compromise.
SCALANCE W1750D CLI
16Function Manual, 03/2019, C79000-G8976-C452-04
Security recommendations
Secure/non-secure protocols
● Avoid and disable non-secure protocols, for example Telnet and TFTP. For historical
reasons, these protocols are still available, however not intended for secure applications.
Use non-secure protocols on the device with caution.
● The following protocols provide secure alternatives:
– SNMPv1/v2 → SNMPv3
Check whether use of SNMPv1 is necessary. SNMPv1 is classified as non-secure.
Use the option of preventing write access. The product provides you with suitable
setting options. If SNMP is enabled, change the community names. If no unrestricted
access is necessary, restrict access with SNMP. Use SNMPv3 in conjunction with
passwords.
– HTTP → HTTPS
– Telnet → SSH
– SNTP → NTP
– Use secure protocols when access to the device is not prevented by physical
protection measures.
● To prevent unauthorized access to the device or network, take suitable protective
measures against non-secure protocols.
● If you require non-secure protocols and services, operate the device only within a
protected network area.
● Restrict the services and protocols available to the outside to a minimum.
Available protocols per port
The following list provides you with an overview of the open ports on this device. The table
includes the following columns:
● Protocol
All protocols that the device supports
● Port number
Port number assigned to the protocol
● Port status
– Open: The port is always open and cannot be closed.
● Factory setting
– Open: The factory setting of the port is "Open".
– Closed: The factory setting of the port is "Closed".
● Authentication
Specifies whether or not the protocol is authenticated.
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
17
Security recommendations
Protocol
Port number
Port status
Factory setting of the
port
Authentication
Air Monitor
UDP/1144
Open
Open
Yes
slave
Captive portal
TCP/8080
Open
Open
Yes
UDP/1067
Open
Open
No
UDP/4011
Open
Open
No
DTLS
UDP/4433
Open
Open
Yes
TCP/80
Open
Open
No
TCP/4343
Open
Open
Yes
TCP/4343
Open
Open
Yes
TCP/443
Open
Open
Yes
mDNS
UDP/5353
Open
Open
No
NTP
UDP/123
Open
Open
No
UDP/8209
Open
Open
No
UDP/8211
Open
Open
No
(dTable)
UDP/1616
Open
Open
No
UDP/1892
Open
Open
No
SNMPv1
UDP/161
Open
Open
No
TCP/22
Open
Open
Yes
TCP/2322
Open
Open
Yes
Syslog
UDP/514
Open
Open
No
Telnet
TCP/23
Open
Open
Yes
Airgroup UDP/53536 Open Open Yes
Airgroup Master to
Bootps UDP/67 Open Open No
DHCP
HTTP (redirect
4343)
HTTPS
UDP/53535 Open Open No
Proprietary
Proprietary
RADIUS
SNMPv3 UDP/161 Open Open Yes
SSH
UDP/8612 Open Open No
SCALANCE W1750D CLI
18Function Manual, 03/2019, C79000-G8976-C452-04
3
Note
Although automatic completion is supported for some commands such as configure terminal,
the complete exit
end
execution.
SCALANCE W supports the use of CLI for scripting purposes. You can access the
SCALANCE W CLI through a SSH.
To enable the SSH access to the SCALANCE CLI:
1. From the SCALCNCE W UI, navigate to
2. Select
3. Click
Enabled from the Terminal access drop-down list.
OK.
Connecting to a CLI Session
On connecting to a CLI session, the system displays its host name followed by the login
prompt. Use the administrator credentials to start a CLI session. For example:
(scalance)
User: admin
Password: *****
If the login is successful, the privileged command mode is enabled and a command prompt
is displayed. For example:
(scalance)#
The privileged mode provides access to
commands. The configuration commands are available in the configuration (config) mode.
To move from privileged mode to the configuration mode, enter the following command at
the command prompt:
(scalance)# configure terminal
System > Show advanced options.
show, clear, ping, traceroute, and commit
The configure terminal command allows you to enter the basic configuration mode and the
command prompt is displayed as follows:
(scalance)(config)#
The SCALANCE W CLI allows CLI scripting in several other sub-command modes to allow
the users to configure individual interfaces, SSIDs, access rules, and security settings.
You can use the question mark (?) to view the commands available in a privileged mode,
configuration mode, or sub-mode
and
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
commands must be entered at command prompt for successful
19
SCALANCE W CLI
Applying Configuration Changes
Each command processed by the Virtual Controller is applied on all the slave APs in a
cluster. When you make configuration changes on a master AP in the CLI, all associated
APs in the cluster inherit these changes and subsequently update their configurations. The
changes configured in a CLI session are saved in the CLI context.
The CLI does not support the configuration data exceeding the 4K buffer size in a CLI
session: therefore, SCALANCE W recommends that you configure fewer changes at a time
and apply the changes at regular intervals.
To apply and save the configuration changes at regular intervals, use the following command
in the privileged mode:
(scalance)# commit apply
To apply the configuration changes to the cluster, without saving the configuration, use the
following command in the privileged mode:
(scalance)# commit apply no-save
To view the changes that are yet to be applied, use the following command in the privileged
mode:
(scalance)# show uncommitted-config
To revert to the earlier configuration, use the following command in the privileged mode.
(scalance)# commit revert
Example:
(scalance)(config)# rf dot11a-radio-profile
(scalance)# show uncommitted-config
Configuration Sub-modes
Some commands in configuration mode allow you to enter into a sub-mode to configure the
commands specific to that mode. When you are in a configuration sub-mode, the command
prompt changes to indicate the current sub-mode.
You can exit a sub-command mode and return to the basic configuration mode or the
privileged Exec (enable) mode at any time by executing the
exit or end command.
SCALANCE W1750D CLI
20Function Manual, 03/2019, C79000-G8976-C452-04
SCALANCE W CLI
Sequence-Sensitive Command
Corresponding no command
opendns <username> <password>
no opendns
rule <dest> <mask> <match> <protocol>
<port>}}[<option1…option9>]
no rule <dest> <:mask> <match> <protocol>
mgmt-auth-server <auth-profile-name>
no mgmt-auth-server <auth-profilename>
set-role <attribute>{{equals| not-equals|
no set-role <attribute>{{equals| not-
with| contains}
no set-role
set-vlan <attribute>{{equals| not-equals|
no set-vlan <attribute>{{equals| not-
with| contains}
no set-vlan
auth-server <name>
no auth-server <name>
Deleting Configuration Settings
Use the no command to delete or negate previously-entered configurations or parameters.
● To view a list of no commands, type
followed by the question mark. For example:
(scalance)(config) # no?
● To delete a configuration, use the
following command removes a configured user role:
(scalance)(config) # no user <username>
● To negate a specific configured parameter, use the
For example, the following command deletes the PPPoE user configuration settings:
(scalance)(config) # pppoe-uplink-profile
(scalance)(pppoe_uplink_profile)# no pppoe-username
Using Sequence Sensitive Commands
The SCALANcE W CLI does not support positioning or precedence of sequence-sensitive
commands. Therefore, Siemens recommends that you remove the existing configuration
before adding or modifying the configuration details for sequence-sensitive commands. You
can either delete an existing profile or remove a specific configuration by using the
commands.
The following table lists the sequence-sensitive commands and the corresponding
command to remove the configuration.
no at the prompt in the relevant mode or sub-mode
no form of a configuration command. For example, the
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
21
SCALANCE W CLI
3.1 Saving Configuration Changes
3.1 Saving Configuration Changes
The
running-config
are yet to be saved. To view the running-config of an AP, use the following command:
(scalance) # show running-config
When you make configuration changes through the CLI, the changes affect the current
running configuration only. To save your configuration changes, use the following command
in the privileged Exec mode:
(scalance)# write memory
Commands that Reset the AP
If you use the CLI to modify a currently provisioned radio profile, the changes take place
immediately. A reboot of the AP is not required to apply the configuration changes. Certain
commands, however, automatically force AP to reboot. Verify the current network loads and
conditions before executing the commands that enforce a reboot of the AP, as they may
cause a momentary disruption in service as the unit resets.
reload command resets an AP.
The
holds the current AP configuration, including all pending changes which
SCALANCE W1750D CLI
22Function Manual, 03/2019, C79000-G8976-C452-04
SCALANCE W CLI
Key
Effect
Description
Ctrl A
Home
Move the cursor to the beginning of the line.
Ctrl B
row
Ctrl D
Delete Right
Delete the character to the right of the cursor.
Ctrl E
Ctrl F
arrow
Ctrl K
Delete Right
Delete all characters to the right of the cursor.
Ctrl N
arrow
Ctrl P or up arrow
Previous
Display the previous command in the command history.
Ctrl T
ter to the right of the cursor.
Ctrl U
Clear
Clear the line.
Ctrl W
the first space encountered.
Ctrl X
Delete Left
Delete all characters to the left of the cursor.
3.2 Command Line Editing
3.2 Command Line Editing
The system records your most recently entered commands. You can review the history of
your actions, or reissue a recent command easily, without having to retype it.
To view items in the command history, use the
down
and the
arrow key to move forward. To reissue a specific command, press Enter when
up
arrow key to move back through the list
the command appears in the command history. You can also use the command line editing
feature to make changes to the command prior to entering it. The command line editing
feature allows you to make corrections or changes to a command without retyping. The
following table lists the editing controls. To use key shortcuts, press and hold the
Ctrl button
while you press a letter key.
Table 3- 2 Line Editing Keys
or the left ar-
End Move the cursor to the end of the line.
or the right
or the down
Transpose Swap the character to the left of the cursor with the charac-
Back Move the cursor one character left.
Forward Move the cursor one character right.
Next Display the next command in the command history.
Delete Word Delete the characters from the cursor up to and including
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
23
SCALANCE W CLI
Address/Identifier
Description
dotted decimal notation (for example, 192.0.2.1).
notation (for example, 255.255.255.0).
00:05:4e:50:14:aa).
sensitive (for example, WLAN-01).
used from the AP. Use the same format as for a MAC address.
ESSID includes spaces, enclose the name in quotation marks.
3.3 Specifying Addresses and Identifiers in Commands
3.3 Specifying Addresses and Identifiers in Commands
This section describes addresses and other identifiers that you can reference in CLI
commands.
Table 3- 3 Addresses and Identifiers
IP address For any command that requires entry of an IP address to specify a
network entity, use IPv4 network address format in the conventional
Netmask address For subnet addresses, specify a subnet mask in dotted decimal
MAC address For any command that requires entry of a device’s hardware ad-
dress, use the hexadecimal format (for example,
SSID A unique character string (sometimes referred to as a network
name), consisting of no more than 32 characters. The SSID is case-
BSSID This entry is the unique hard-wireless MAC address of the AP. A
unique BSSID applies to each frequency— 802.11a and 802.11g—
ESSID Typically the unique logical name of a wireless network. If the
SCALANCE W1750D CLI
24Function Manual, 03/2019, C79000-G8976-C452-04
SCALANCE W CLI
Type Style
Description
mark the titles of books.
Boldface
Commands
amples of commands and command output.
<angle brackets>
Do not type the angle brackets.
[square brackets]
optional. Do not type the brackets.
{Item_A|Item_B}
braces or bars.
{ap-name <ap-name>}|{ipaddr <ip-
the braces or bars.
Note
NOTICE
WARNING
3.4 Typographic Conventions
3.4 Typographic Conventions
The following conventions are used throughout this document to emphasize important
concepts:
Table 3- 4 Typographical Conventions
Italics
This style is used for emphasizing important terms and to
This style is used for command names and parameter
options when mentioned in the text.
This fixed-width font depicts command syntax and ex-
In the command syntax, text within angle brackets represents items that you should replace with information
appropriate to your specific situation.
For example, ping <ipaddr>
In this example, you would type “ping” at the system
prompt exactly as shown, followed by the IP address of
the system to which ICMP echo packets are to be sent.
In the command syntax, items enclosed in brackets are
In the command examples, single items within curled
braces and separated by a vertical bar represent the
available choices. Enter only one choice. Do not type the
addr>}
Two items within curled braces indicate that both parameters must be entered together. If two or more sets of
curled braces are separated by a vertical bar, like in the
example to the left, enter only one choice. Do not type
The following informational icons are used throughout this guide:
Indicates helpful suggestions, pertinent information, and important things to remember.
Indicates a risk of damage to your hardware or loss of data.
Indicates a risk of personal injury or death.
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
25
SCALANCE W CLI
3.5 Industry Online Support
3.5 Industry Online Support
In addition to the product documentation, also check out the comprehensive online
information platform of Siemens Industry Online Support at the following Internet address:
https://support.industry.siemens.com/cs/en/
Apart from news, there you will also find:
● Project information: Manuals, FAQs, downloads, application examples etc.
Right across our products and systems, we provide numerous services that support you in
every phase of the life of your machine or system - from planning and implementation to
commissioning, through to maintenance and modernization.
You will find contact data on the Internet at the following address:
https://www.automation.siemens.com/aspa_app/?ci=yes&lang=en
SCALANCE W1750D CLI
26Function Manual, 03/2019, C79000-G8976-C452-04
4
Parameter
Description
Range
0.1 dBm and negative values.
AP Platform
Command Mode
All platforms
Privileged EXEC mode
4.1 A
4.1.1 a-channel
Description
This command configures 5 GHz radio channels for a specific AP.
Syntax
a-channel <channel> <tx-power>
<channel> Configures the specified 5 GHz channel The valid channels for a band are
<tx-power> Configures the specified
Usage Guidelines
Use this command to configure radio channels for the 5 GHz band for a specific AP.
Example
The following example configures the 5 GHz radio channel:
(scalance)# a-channel 44 18
Command Information
determined by the AP regulatory
domain.
-51 dBm to 51 dBm
transmission power values. It also supports
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
27
CLI Commands
Parameter
Description
Range
Default
<interval>
val is ranged in minutes.
AP Platform
Command Mode
All platforms
Configuration mode
4.1 A
4.1.2 aaa dns-query-interval
Description
This command configures the interval at which the dns server sends out a query.
Syntax
aaa dns-query-interval <interval>
no aaa dns-query-interval
Usage Guidelines
Use this command to configure the time interval for sending out dns queries.
Example
The following example shows the output of the aaa dns-query-interval command:
Add RADIUS attributes for use in SDRs. Use the show aaa radius-attributes command to
display a list of the current RADIUS attributes recognized by the Mobility Master. To add a
RADIUS attribute to the list, use the
Adds the specified attribute name (alphanumeric string), associated
Adds a date attribute
Adds an ip address attribute
aaa radius-attributes command.
SCALANCE W1750D CLI
Function Manual, 03/2019, C79000-G8976-C452-04
29
CLI Commands
Parameter
Description
<profile_name>
The specified RADIUS modifier profile name
clone
exclude
Attribute to be excluded in RADIUS request.
include
no
Delete Command
4.1 A
4.1.4 aaa radius modifier
Description
This command configures the RADIUS modifier profile to customize the attributes that are
included, excluded and modified in the RADIUS request before it is sent to the authentication
server.
Syntax
aaa radius-attributes modifier <profile_name>
Copy data from another Radius Modifier Profile.
Authentication protocol type. Use PAP as the authentication typeAttribute/Value to be included in RADIUS request.
Usage Guidelines
Example
Use the show aaa radius modifier command to display a list of RADIUS modifier profiles. To
create a RADIUS modifier profile with customized attributes, use the