READ CAREFULLY BEFORE USE.
KEEP THIS GUIDE FOR FUTURE REFERENCE.
This is a Reference Guide for a series of products intended for people who want to configure the NXC
via Command Line Interface (CLI).
Some commands or command options in this guide may not be available in your
product. See your product's User’s Guide for a list of supported features. Every effort
has been made to ensure that the information in this guide is accurate.
How To Use This Guide
1 Read Chapter 1 on page 15 for how to access and use the CLI (Command Line Interface).
2 Read Chapter 2 on page 31 to learn about the CLI user and privilege modes.
Do not use commands not documented in this guide.
Related Documentation
• Quick Start Guide
The Quick Start Guide shows how to connect the NXC and access the Web Configurator.
• User’s Guide
The User’s Guide explains how to use the Web Configurator to configure the NXC.
It is recommended you use the Web Configurator to configure the NXC.
Contents Overview
Contents Overview
Command Line Interface ........................................................................................................... 15
User and Privilege Modes ......................................................................................................... 31
7.2.1 Assured Forwarding (AF) PHB for DiffServ .............................................................................68
7.2.2 Policy Route Command Example ............................................................................................69
7.3 IP Static Route ..................................................................................................................................69
7.5.1 show ip route Command Example .......................... .......................... ......................... .............. 71
Chapter 8
AP Management..................................................................................................................................73
8.1 AP Management Overview ...............................................................................................................73
8.2 AP Management Commands .............. ... ... ... .....................................................................................74
8.2.1 AP Management Commands Example ...................................................................................78
Chapter 9
AP Group.............................................................................................................................................79
42.3.1 CAPWAP Client Commands Example .................................................................................251
42.4 DNS Server Commands ................................................................................................................252
42.4.1 DNS Server Commands Example ....................................................................................... 252
42.4.2 DNS Server Commands and DHCP ........................ ....................................................... .....253
List of Commands ............................................................................................................................255
NXC CLI Reference Guide
13
Table of Contents
14
NXC CLI Reference Guide
CHAPTER 1
Command Line Interface
This chapter describes how to access and use the CLI (Command Line Interface).
1.1 Overview
If you have problems with your NXC, customer support may request that you issue some of
these commands to assist them in troubleshooting.
Use of undocumented commands or misconfiguration can damage the NXC
and possibly render it unusable.
1.1.1 The Configuration File
When you configure the NXC using either the CLI (Command Line Interface) or the web
configurator, the settings are saved as a series of commands in a configuration file on the
NXC. You can store more than one configuration file on the NXC. However, only one
configuration file is used at a time.
You can perform the following with a configuration file:
• Back up NXC configuration once the NXC is set up to work in your network.
• Restore NXC configuration.
• Save and edit a configuration file and upload it to multiple NXCs in your network to have
the same settings.
You may also edit a configuration file using a text editor.
1.2 Accessing the CLI
You can access the CLI using a terminal emulation program on a computer connected to the
console port, from the web configurator or access the NXC using Telnet or SSH (Secure
SHell).
NXC CLI Reference Guide
15
Chapter 1 Command Line Interface
The NXC might force you to log out of your session if reauthentication time,
lease time, or idle timeout is reached. See Chapter 22 on page 143 for more
information about these settings.
1.2.1 Console Port
The default settings for the console port are as follows.
Table 1 Managing the NXC: Console Port
SETTINGVALUE
Speed115200 bps
Data Bits8
ParityNone
Stop Bit1
Flow ControlOff
When you turn on your NXC, it performs several internal tests as well as line initialization.
You can view the initialization information using the console port.
• Garbled text displays if your terminal emulation program’s speed is set lower than the
NXC’s.
• No text displays if the speed is set higher than the NXC’s.
• If changing your terminal emulation program’s speed does not get anything to display,
restart the NXC.
• If restarting the NXC does not get anything to display, contact your local customer
support.
After the initialization, the login screen displays.
16
Figure 2 Login Screen
Welcome to NXC
Username:
NXC CLI Reference Guide
Chapter 1 Command Line Interface
Enter the user name and password at the prompts.
The default login username is admin and password is 1234. The username
and password are case-sensitive.
1.2.2 Web Configurator Console
The Console allows you to use CLI commands from directly within the Web Configurator
rather than having to use a separate terminal program. In addition to logging in directly to the
NXC’s CLI, you can also log into other devices on the network through this Console. It uses
SSH to establish a connection.
To view the functions in the Web Configurator user interface that correspond
directly to specific NXC CLI commands, use the CLI Messages window
(described in the User’s Guide) in tandem with this one.
Figure 3 Console
NXC CLI Reference Guide
17
Chapter 1 Command Line Interface
The following table describes the elements in this screen.
Table 2 Console
LABELDESCRIPTION
Command Line
Enter commands for the device that you are currently logged into here. If you are
logged into the NXC, see the CLI Reference Guide for details on using the
command line to configure it.
Device IP
Address
This is the IP address of the device that you are currently logged into.
Logged-In User
This displays the username of the account currently logged into the NXC through
the Console Window.
Y ou can log into the Web Configurator with a different account than used to log into
the NXC through the Console.
Connection
Status
This displays the connection status of the account currently logged in.
If you are logged in and connected, then this displays ‘Connected’.
If you lose the connection, get disconnected, or logout, then this displays ‘Not
Connected’.
Tx/RX Activity
Monitor
This displays the current upload / download activity. The faster and more frequently
an LED flashes, the faster the data connection.
Before you use the Console, ensure that:
• Your web browser of choice allows pop-up windows from the IP address assigned to your
NXC.
• Your web browser allows Java programs.
• You are using the latest version of the Java program (http://www.java.com).
To login in through the Console:
1 Click the Console button on the Web Configurator title bar.
18
NXC CLI Reference Guide
Chapter 1 Command Line Interface
2 Enter the IP address of the NXC and click OK.
3 Next, enter the user name of the account being used to log into your target device and
then click OK.
4 You may be prompted to authenticate your account password, depending on the type of
device that you are logging into. Enter the password and click OK.
NXC CLI Reference Guide
19
Chapter 1 Command Line Interface
5 If your login is successful, the command line appears and the status bar at the bottom of
the Console updates to reflect your connection state.
1.2.3 Telnet
Use the following steps to Telnet into your NXC.
1 If your computer is connected to the NXC over the Internet, skip to the next step. Make
sure your computer IP address and the NXC IP address are on the same subnet.
2 In Windows, click Start (usually in the bottom left corner) and Run. Then type
and the NXC’s IP address. For example, enter telnet 192.168.1.1 (the default
management IP address).
3 Click OK. A login screen displays. Enter the user name and password at the prompts.
telnet
The default login username is admin and password is 1234. The username
and password are case-sensitive.
1.2.4 SSH (Secure SHell)
You can use an SSH client program to access the CLI. The following figure shows an example
using a text-based SSH client program. Refer to the documentation that comes with your SSH
program for information on using it.
The default login username is admin and password is 1234. The username
and password are case-sensitive.
20
NXC CLI Reference Guide
Figure 4 SSH Login Example
C:\>ssh2 admin@192.168.1.1
Host key not found from database.
Key fingerprint:
xolor-takel-fipef-zevit-visom-gydog-vetan-bisol-lysob-cuvun-muxex
You can get a public key's fingerprint by running
% ssh-keygen -F publickey.pub
on the keyfile.
Are you sure you want to continue connecting (yes/no)? yes
Host key saved to C:/Documents and Settings/user/Application Data/SSH/
hostkeys/
ey_22_192.168.1.1.pub
host key for 192.168.1.1, accepted by user Tue Aug 09 2005 07:38:28
admin's password:
Authentication successful.
1.3 How to Find Commands in this Guide
Chapter 1 Command Line Interface
You can simply look for the feature chapter to find commands. In addition, you can use the
List of Commands at the end of the guide. This section lists the commands in alphabetical
order that they appear in this guide.
If you are looking at the CLI Reference Guide electronically, you might have additional
options (for example, bookmarks or Find...) as well.
1.4 How Commands Are Explained
Each chapter explains the commands for one keyword. The chapters ar e divided into the
following sections.
1.4.1 Background Information
See the User’s Guide for background information about most features.
This section provides background information about features that you cannot configure in the
web configurator. In addition, this section identifies related commands in other chapters.
1.4.2 Command Input Values
This section lists common input values for the commands for the feature in one or more tables
NXC CLI Reference Guide
21
Chapter 1 Command Line Interface
1.4.3 Command Summary
This section lists the commands for the feature in one or more tables.
1.4.4 Command Examples
This section contains any examples for the commands in this feature.
1.4.5 Command Syntax
The following conventions are used in this guide.
• A command or keyword in courier new must be entered literally as shown. Do not
abbreviate.
• Values that you need to provide are in italics.
• Required fields that have multiple choices are enclosed in curly brackets
• A range of numbers is enclosed in angle brackets
• Optional fields are enclosed in square brackets
•The
| symbol means OR.
{}.
<>.
[].
For example, look at the following command to create a TCP/UDP service object.
1 Enter service-object exactly as it appears.
2 Enter the name of the object where you see object-name.
3 Enter
tcp or udp, depending on the service object you want to create.
4 Finally , do one of the following.
•Enter
•Enter
eq exactly as it appears, followed by a number between 1 and 65535.
range exactly as it appears, followed by two numbers between 1 and 65535.
1.4.6 Changing the Password
It is highly recommended that you change the password for accessing the NXC. See Section
22.2 on page 144 for the appropriate commands.
1.5 CLI Modes
You run CLI commands in one of several modes.
Table 3 CLI Modes
USERPRIVILEGECONFIGURATIONSUB-COMMAND
What Guest users
can do
What User users
can do
Unable to accessUnable to accessUnable to accessUnable to access
•Look at (but not
run) available
commands
Unable to accessUnable to accessUnable to access
22
NXC CLI Reference Guide
Chapter 1 Command Line Interface
Table 3 CLI Modes (continued)
USERPRIVILEGECONFIGURATIONSUB-COMMAND
What LimitedAdmin users can
do
What Admin
users can do
How you enter itLog in to the NXCType enable in User
What the prompt
looks like
How you exit itType exitType disableType exitType exit
•Look at system
information (like
Status screen)
•Run basic
diagnostics
•Look at system
information (like
Status screen)
•Run basic
diagnostics
Router>Router#Router(config)#(varies by part)
•Look at system
information (like
Status screen)
•Run basic
diagnostics
•Look at system
information (like
Status screen)
•Run basic
diagnostics
mode
Unable to accessUnable to access
•Configure simple
features (such as
an address
object)
•Create or remove
complex parts
(such as an
interface)
Type configure
terminal in User or
Privilege mode
•Configure
complex parts
(such as an
interface) in the
NXC
Type the command
used to create the
specific part in
Configuration mode
Router(zone)#
Router(configif-ge)#
...
See Chapter 22 on page 143 for more information about the user types. User users can only
log in, look at (but not run) the available commands in User mode, and log out. Limited-Admin users can look at the configuration in the web configurator and CLI, and they can run
basic diagnostics in the CLI. Admin users can configure the NXC in the web configurator or
CLI.
At the time of writing, there is not much difference between User and Privilege mode for
admin users. This is reserved for future use.
1.6 Shortcuts and Help
1.6.1 List of Available Commands
A list of valid commands can be found by typing ? or [TAB] at the command prompt. To view a
list of available commands within a command group, enter
[TAB].
<command> ? or <command>
NXC CLI Reference Guide
23
Chapter 1 Command Line Interface
Figure 5 Help: Available Commands Example 1
Router> ?
<cr>
apply
atse
clear
configure
------------------[Snip]-------------------shutdown
telnet
test
traceroute
write
Router>
Figure 6 Help: Available Command Example 2
Router> show ?
<wlan ap interface>
aaa
access-page
account
ad-server
address-object
------------------[Snip]-------------------wlan
workspace
zone
Router> show
1.6.2 List of Sub-commands or Required User Input
To view detailed help information for a command, enter <command> <sub command> ?.
Figure 7 Help: Sub-command Information Example
Router(config)# ip telnet server ?
;
<cr>
port
rule
|
Router(config)# ip telnet server
Figure 8 Help: Required User Input Example
Router(config)# ip telnet server port ?
<1..65535>
Router(config)# ip telnet server port
24
NXC CLI Reference Guide
1.6.3 Entering Partial Commands
The CLI does not accept partial or incomplete commands. You may enter a unique part of a
command and press
[TAB] to have the NXC automatically display the full command.
Chapter 1 Command Line Interface
For example, if you enter
config and press [TAB] , the full command of configure
automatically displays.
If you enter a partial command that is not unique and press
commands that start with the partial command.
Figure 9 Non-Unique Partial Command Example
Router# c [TAB]
clear configure copy
Router# co [TAB]
configure copy
1.6.4 Entering a ? in a Command
Typing a ? (questio n mark) usually displays help information. However, some commands
allow you to input a ?, for example as part of a string. Press [CTRL+V] on your keyboard to
enter a ? without the NXC treating it as a help query.
1.6.5 Command History
The NXC keeps a list of commands you have entered for the current CLI session. You can use
any commands in the history again by pressing the up () or down () arrow key to scroll
through the previously used commands and press
[TAB], the NXC displays a list of
[ENTER].
1.6.6 Navigation
Press [CTRL]+A to move the cursor to the beginning of the line. Press [CTRL]+E to move the
cursor to the end of the line.
1.6.7 Erase Current Command
Press [CTRL]+U to erase whatever you have currently typed at the prompt (before pressing
[ENTER]).
1.6.8 The no Commands
When entering the no commands described in this document, you may not need to type the
whole command. For example, with the “[no] mss <536..1452>” command, you use
“mss 536” to specify the MSS value. But to disable the MSS setting, you only need to type
“no mss” instead of “no mss 536”.
NXC CLI Reference Guide
25
Chapter 1 Command Line Interface
1.7 Input Values
You can use the ? or [TAB] to get more information about the next input value that is required
for a command. In some cases, the next input value is a string whose length and allowable
characters may not be displayed in the screen. For example, in the following example, the next
input value is a string called
mail server fqdnlower-case letters, numbers, or -.
name1-31alphanumeric or _-
notification message1-81alphanumeric, spaces, or '()+,/:=?;!*#@$_%-
password: less than 15
chars
password: less than 8
chars
126+”.conf”
26+”.zysh”
1-15alphanumeric or `~!@#$%^&*()_\-+={}|\;:'<,>./
1-8alphanumeric or ;/?:@&=+$\.-_!~*'()%,#$
“0x” or “0X” + 16-64 hexadecimal values
alphanumeric or ;\|`~!@#$%^&*()_+\\{}':,./<>=-
first character: alphanumeric or -
first character: alphanumeric or -
first character: alphanumeric or -
first character: alphanumeric or -
alphanumeric or ;`~!@#$%^&()_+[]{}',.=add “.conf” at the end
alphanumeric or ;`~!@#$%^&()_+[]{}',.=add “.zysh” at the end
upper-case letters or numbers
NXC CLI Reference Guide
27
Chapter 1 Command Line Interface
Table 4 Input-Value Formats for Strings in CLI Commands (continued)
TAG# VALUESLEGAL VALUES
passwordUsed in user and ip
1-63alphanumeric or `~!@#$%^&*()_-+={}|\;:'<,>./
Used in e-mail log profile SMTP authentication
1-63alphanumeric or `~!@#$%^&*()_-+={}|\;:'<>./
Used in device HA synchronization
1-63alphanumeric or ~#%^*_-={}:,.
Used in registration
6-20alphanumeric or .@_-
phone number1-20numbers or ,+
preshared key16-64“0x” or “0X” + 16-64 hexadecimal values
alphanumeric or ;|`~!@#$%^&*()_+\{}':,./<>=-
profile name1-31alphanumeric or _-
first character: letters or _-
proto name1-16lower-case letters, numbers, or -
protocol name1-31alphanumeric or _-
first character: letters or _-
quoted string less
than 255 chars
quoted string less
than 63 chars
quoted string0+alphanumeric, spaces, or punctuation marks
realm1-253alphanumeric or -_
service name0-63alphanumeric or -_@$./
spi2-8hexadecimal
string less than 15
chars
string: less than 63
chars
string1+alphanumeric or -_@
subject1-61alphanumeric, spaces, or '()+,./:=?;!*#@$_%-
system type0-2hexadecimal
timezone [-+]hh---12 through +12 (with or without “+”)
url1-511alphanumeric or '()+,/:.=?;!*#@$_%-
url“http://”+
user name1-31alphanumeric or _-
1-255alphanumeric, spaces, or ;/?:@&=+$\.-_!~*'()%,
1-63alphanumeric, spaces, or ;/?:@&=+$\.-_!~*'()%
enclosed in double quotation marks (“)
must put a backslash (\) before double quotation
marks that are part of input value itself
first character: alphanumeric or -_
used in domain authentication
1-15alphanumeric or -_
1-63alphanumeric or `~!@#$%^&*()_-+={}|\;:'<,>./
alphanumeric or ;/?:@&=+$\.-_!~*'()%,
“https://”+
starts with “http://” or “https://”
may contain one pound sign (#)
first character: letters or _-
28
NXC CLI Reference Guide
Chapter 1 Command Line Interface
Table 4 Input-Value Formats for Strings in CLI Commands (continued)
TAG# VALUESLEGAL VALUES
username1-31alphanumeric or _-
first character: alphanumeric or _domain authorization
username6-20alphanumeric or .@_-
registration
user name1+alphanumeric or -_.
logging commands
user@domainname1-80alphanumeric or .@_-
vrrp group name: less
than 15 chars
week-day sequence,
i.e. 1=first,2=second
xauth method1-31alphanumeric or _-
xauth password1-31alphanumeric or ;|`~!@#$%^&*()_+\{}':,./<>=-
mac address0-12 (even
1-15alphanumeric or _-
11-4
hexadecimal
number)
for example: xx-xx-xx-xx-xx-xx
1.8 Saving Configuration Changes
Use the write command to save the current configuration to the NXC.
Always save the changes before you log out after each management session.
All unsaved changes will be lost after the system restarts.
1.9 Logging Out
Enter the exit or end command in configure mode to go to privilege mode.
Enter the
exit command in user mode or privilege mode to log out of the CLI.
NXC CLI Reference Guide
29
Chapter 1 Command Line Interface
30
NXC CLI Reference Guide
CHAPTER 2
User and Privilege Modes
This chapter describes how to use these two modes.
2.1 User And Privilege Modes
This is the mode you are in when you first log into the CLI. (Do not confuse ‘user mode’ with
types of user accounts the NXC uses. See Chapter 22 on page 143 for more information about
the user types. ‘User’ type accounts can only run ‘exit’ in this mode. However, they may need
to log into the device in order to be authenticated for ‘user-aware’ policies, for example a
firewall rule that a particular user is exempt from.)
Type ‘enable’ to go to ‘privilege mode’. No password is required. All commands can be run
from here except those marked with an asterisk. Many of these commands are for troubleshooting purposes, for example the htm (hardware test module) and debug commands.
Customer support may ask you to run some of these commands and send the results if you
need assistance troubleshooting your device.
For admin logins, all commands are visible in ‘user mode’ but not all can be run there. The
following table displays which commands can be run in ‘user mode’. All commands can be
run in ‘privilege mode’.
The htm and psm commands are for ZyXEL’s internal manufacturing process.
Table 5 User (U) and Privilege (P) Mode Commands
COMMANDMODEDESCRIPTION
applyPApplies a configuration file.
atseU/PDisplays the seed code
clearU/PClears system or debug logs or DHCP binding.
configureU/PUse ‘configure terminal’ to enter configuration mode.
copyPCopies configuration files.
debug (*)U/PFor support personnel only! The device needs to have the debug flag enabled.
deletePDeletes configuration files.
detailsPPerforms diagnostic commands.
diagPProvided for support personnel to collect internal system information. It is not
recommended that you use these.
NXC CLI Reference Guide
31
Chapter 2 User and Privilege Modes
Table 5 User (U) and Privilege (P) Mode Commands (continued)
COMMANDMODEDESCRIPTION
diag-infoPHas the NXC create a new diagnostic file.
dirPLists files in a directory.
disableU/PGoes from privilege mode to user mode
enableU/PGoes from user mode to privilege mode
exitU/PGoes to a previous mode or logs out.
htmU/PGoes to htm (hardware test module) mode for testing hardware components. You
may need to use the htm commands if your customer support Engineer asks you
to during troubleshooting.
Note: These commands are for ZyXEL’s internal manufacturing
process.
interfaceU/PDials or disconnects an interface.
no packet-trace U/PTurns of packet tracing.
nslookupU/PResolves an IP add ress to a host name and vice -versa.
packet-traceU/PPerforms a packet trace.
pingU/PPings an IP address or host name.
psmU/PGoes to psm (product support module) mode for setting product parameters. You
may need to use the htm commands if your customer support Engineer asks you
to during troubleshooting.
Note: These commands are for ZyXEL’s internal manufacturing
process.
rebootPRestarts the device.
releasePReleases DHCP information from an interface.
renamePRenames a configuration file.
renewPRenews DHCP information for an interface.
runPRuns a script.
setenvU/PTurns stop-on-error on (terminates booting if an error is found in a configuration
file) or off (ignores configuration file errors and continues booting).
showU/PDisplays command statistics. See the associated command chapter in this guide.
shutdownPWrites all d data to disk and stops the system processes. It does not turn off the
power.
telnetU/PEstablishes a connection to the TCP port number 23 of the specified host name or
IP address.
test aaaU/PTests whether the specified user name can be successfully authenticated by an
traceroutePTraces the route to the specified host name or IP address.
writePSaves the current configuration to the NXC. All unsaved changes are lost after the
external authentication server.
NXC restarts.
Subsequent chapters in this guide describe the configuration commands. User/privilege mode
commands that are also configuration commands (for example, ‘show’) are described in more
detail in the related configuration command chapter.
32
NXC CLI Reference Guide
Chapter 2 User and Privilege Modes
2.1.1 Debug Commands
Debug commands marked with an asterisk (*) are not available when the debug flag is on and
are for ZyXEL service personnel use only. The debug commands follow a syntax that is
Linux-based, so if there is a Linux equivalent, it is displayed in this chapter for your reference.
You must know a command listed here well before you use it. Otherwise, it may cause
undesired results.
Shows system interfaces detail> ifconfig [interface]
commands
responses for interfaces which don't
own the IP address
Set the myZyXEL.com registration/
update server to the official site
myZyXEL.com debug commands
ZLD internal debug commands
cat /proc/sys/net/ipv4/
conf/*/arp_ignore
NXC CLI Reference Guide
33
Chapter 2 User and Privilege Modes
34
NXC CLI Reference Guide
CHAPTER 3
Object Reference
This chapter describes how to use object reference commands.
3.1 Object Reference Commands
The object reference commands are used to see which configuration settings reference a
specific object. You can use this table when you want to delete an object because you have to
remove references to the object first.
Table 7 show reference Commands
COMMANDDESCRIPTION
show reference object username
[username]
show reference object address
[profile]
show reference object service
[profile]
show reference object schedule
[profile]
show reference object aaa
authentication [default |
auth_method]
show reference object ca
category {local|remote}
[cert_name]
show reference object zone
[profile]
show reference object-group
username [username]
show reference object-group
address [profile]
show reference object-group
service [profile]
show reference object-group
interface [profile]
show reference object-group aaa
ad [group_name]
show reference object-group aaa
ldap [group_name]
Displays which configuration settings reference the
specified user object.
Displays which configuration settings reference the
specified address object.
Displays which configuration settings reference the
specified service object.
Displays which configuration settings reference the
specified schedule object.
Displays which configuration settings reference the
specified AAA authentication object.
Displays which configuration settings reference the
specified authentication method object.
Displays which configuration settings reference the
specified zone object.
Displays which configuration settings reference the
specified user group object.
Displays which configuration settings reference the
specified address group object.
Displays which configuration settings reference the
specified service group object.
Displays which configuration settings reference the
specified trunk object.
Displays which configuration settings reference the
specified AAA AD group object.
Displays which configuration settings reference the
specified AAA LDAP group object.
NXC CLI Reference Guide
35
Chapter 3 Object Reference
Table 7 show reference Commands (continued)
COMMANDDESCRIPTION
show reference object-group aaa
radius [group_name]
show reference object [wlan-radio-profile]
show reference object [wlan-monitor-profile]
show reference object [wlan-ssid-profile]
show reference object [wlan-security-profile]
show reference object [wlan-macfilter-profile]
Displays which configuration settings reference the
specified AAA RADIUS group object.
Displays the specified radio profile object.
Displays the specified monitor profile object.
Displays the specified SSID profile object.
Displays the specified security profile object.
Displays the specified macfilter profile object.
3.1.1 Object Reference Command Example
This example shows how to check which configuration is using an address object named
LAN1_SUBNET. For the command output, firewall rule 3 named LAN1-to-NXC is using the
address object.
Router(config)# show reference object address LAN1_SUBNET
This chapter explains some commands you can use to display information about the NXC’s
current operational state.
4.1 Status Show Commands
The following table describes the commands available for NXC system status.
Table 8 Status Show Commands
COMMANDDESCRIPTION
show boot statusDisplays details about the NXC’s startup state.
show comport statusDisplays whether the console and auxiliary ports are on or off.
show cpu statusDisplays the CPU utilization.
show disk Displays the disk utilization.
show extension-slotDisplays the status of the extension card slot and the USB ports and the names of
show fan-speedDisplays the current fan speed.
show led statusDisplays the status of each LED on the NXC.
show macDisplays the NXC’s MAC address.
show mem statusDisplays what percentage of the NXC’s memory is currently being used.
show ram-sizeDisplays the size of the NXC’s on-board RAM.
show serial-numberDisplays the serial number of this NXC.
show socket listenDisplays the NXC’s listening ports.
show socket openDisplays the ports that are open on the NXC.
show system uptimeDisplays how long the NXC has been running since it last restarted or was turned
show versionDisplays the NXC’s model, firmware and build information.
any connected devices.
on.
NXC CLI Reference Guide
37
Chapter 4 Status
Here are examples of the commands that display the CPU and disk utilization.
Router(config)# show cpu status
CPU utilization: 0 %
CPU utilization for 1 min: 0 %
CPU utilization for 5 min: 0 %
Router(config)# show disk
; <cr> |
Router(config)# show disk
No. Disk Size(MB) Usage
===========================================================================
1 image 67 83%
2 onboard flash 163 15%
Here are examples of the commands that display the fan speed, MAC address, memory usage,
RAM size, and serial number.
Router(config)# show fan-speed
FAN1(F00)(rpm): limit(hi)=6500, limit(lo)=1400, max=6650, min=6642, avg=6644
FAN2(F01)(rpm): limit(hi)=6500, limit(lo)=1400, max=6809, min=6783, avg=6795
FAN3(F02)(rpm): limit(hi)=6500, limit(lo)=1400, max=6683, min=6666, avg=6674
FAN4(F03)(rpm): limit(hi)=6500, limit(lo)=1400, max=6633, min=6617, avg=6627
Router(config)# show mac
MAC address: 28:61:32:89:37:61-28:61:32:89:37:67
Router(config)# show mem status
memory usage: 39%
Router(config)# show ram-size
ram size: 1024MB
Router(config)# show serial-number
serial number: S132L06160030
Here is an example of the command that displays the listening ports.
Here are examples of the commands that display the system uptime and model, firmware, and
build information.
Router> show system uptime
system uptime: 04:18:00
Router> show version
ZyXEL Communications Corp.
model : NXC5200
firmware version: 2.20(AQQ.0)b3
BM version : 1.08
build date : 2009-11-21 01:18:06
This example shows the current LED states on the NXC. The SYS LED lights on and green.
Router> show led status
sys: green
Router>
40
NXC CLI Reference Guide
CHAPTER 5
Registration
This chapter introduces myzyxel.com and shows you how to register the NXC for IDP/
AppPatrol and anti-virus using commands.
5.1 myZyXEL.com overview
myZyXEL.comis ZyXEL’s online services center where you can register your NXC and
manage subscription services available for the NXC.
You need to create an account before you can register your device and
activate the services at myZyXEL.com.
You can directly create a myZyXEL.com account, register your NXC and activate a service
using the Licensing > Registration screens. Alternatively, go to http://www.myZyXEL.com
with the NXC’s serial number and LAN MAC address to register it. Refer to the web site’s online help for details.
To activate a service on a NXC, you need to access myZyXEL.com via that
NXC.
5.1.1 Subscription Services Available on the NXC
Maximum Number of Managed APs
The NXC2500 is initially configured to support up to 8 managed APs (such as the NWA5123NI). You can increase this by subscribing to additional licenses. As of this writing, each
license upgrade allows an additional 8 managed APs while the maximum number of APs a
single NXC2500 can support is 24.
The NXC5200 is initially configured to support up to 48 managed APs (such as the
NWA5160N). You can increase this by subscribing to additional licenses. As of this writing,
each license upgrade allows an additional 48 managed APs while the maximum number of
APs a single NXC5200 can support is 240.
NXC CLI Reference Guide
41
Chapter 5 Registration
To use a subscription service, you have to register the NXC and activate the
corresponding service at myZyXEL.com (through the NXC).
5.2 Registration Commands
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 9 Input Values for General Registration Commands
LABELDESCRIPTION
user_nameThe user name of your myZyXEL.com account. You may use six to 20
passwordThe password for the myZyXEL.com account. You may use six to 20
The following table describes the commands available for registration. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
alphanumeric characters (and the underscore). Spaces are not allowed.
alphanumeric characters (and the underscore). Spaces are not allowed.
Table 10 Command Summary: Registration
COMMANDDESCRIPTION
device-register checkuser user_nameChecks if the user name exists in the
service-register checkexpireGets information of all service subscriptions from
service-register service-type standard licensekey key_value
show device-register statusDisplays whether the device is registered and
show service-register status {all|maps}Displays service license information.
Registers the device with an existing account or
creates a new account and registers the device at
one time.
country_code: see Table 11 on pag e 43
vat_number: your seller’s Value-Added Tax
number, if you bought your NXC from Europe.
myZyXEL.com and updates the status table.
Activates a standard service subscription with the
license key.
account information.
5.2.1 Command Examples
The following commands allow you to register your device with an existing account or create
a new account and register the device at one time, and activate a trial service subscription.
The following command displays the account information and whether the device is
registered.
Router# configure terminal
Router(config)# show device-register status
username : alexctsui
password : 123456
device register status : yes
expiration self check : no
The following command displays the service registration status and type and how many days
remain before the service expires.
Router# configure terminal
Router(config)# show service-register status all
Service Status Type Count Expiration
===========================================================================
IDP Signature Licensed Standard N/A 698
Anti-Virus Licensed Standard N/A 698
MAPS Licensed Standard 240 N/A
5.3 Country Code
The following table displays the number for each country.
Table 11 Country Codes
COUNTRY CODECOUNTRY NAMECOUNTRY CODECOUNTRY NAME
001Afghanistan002Albania
003Algeria004American Samoa
005Andorra006Angola
007Anguilla008Antarctica
009Antigua & Barbuda010Argentina
011Armenia012Aruba
013Ascension Island014Australia
015Austria016Azerbaijan
017Bahamas018Bahrain
019Bangladesh020Barbados
021Belarus022Belgium
023Belize024Benin
025Bermuda026Bhutan
027Bolivia028Bosnia and Herzegovina
029Botswana030Bouvet Island
031Brazil032British Indian Ocean Territory
033Brunei Darussalam034Bulgaria
NXC CLI Reference Guide
43
Chapter 5 Registration
Table 11 Country Codes (continued)
COUNTRY CODECOUNTRY NAMECOUNTRY CODECOUNTRY NAME
035Burkina Faso036Burundi
037Cambodia038Cameroon
039Canada040Cape Verde
041Cayman Islands042Central African Republic
043Chad044Chile
045China046Christmas Island
047Cocos (Keeling) Islands048Colombia
049Comoros050Congo, Democratic Republic of the
051Congo, Republic of052Cook Islands
053Costa Rica054Cote d'Ivoire
055Croatia/Hrvatska056Cyprus
057Czech Republic058Denmark
059Djibouti060Dominica
061Dominican Republic062East Timor
063Ecuador064Egypt
065El Salvador066Equatorial Guinea
067Eritrea068Estonia
069Ethiopia070Falkland Islands (Malvina)
071Faroe Islands072Fiji
073Finland074France
075France (Metropolitan)076French Guiana
077French Polynesia078French Southern Territories
079Gabon080Gambia
081Georgia082Germany
083Ghana084Gibraltar
085Great Britain086Greece
087Greenland088Grenada
089Guadeloupe090Guam
091Guatemala092Guernsey
093Guinea094Guinea-Bissau
095Guyana096Haiti
097Heard and McDonald Islands098Holy See (City Vatican State)
099Honduras100Hong Kong
101Hungary102Iceland
103India104Indonesia
105Ireland106I sle of Man
107Italy108Jamaica
109Japan110Jersey
Republic
129Malawi130Malaysia
131Maldives132Mali
133Malta13 4Marshall Islands
135Martinique136Mauritania
137Mauritius138Mayotte
139Mexico140Micronesia, Federal State of
141Moldova, Republic of142Monaco
143Mongolia144Montserrat
145Morocco146Mozambique
147Namibia148Nauru
149Nepal150Netherlands
151Netherlands Antilles152New Caledonia
153New Zealand154Nicaragua
155Niger156Nigeria
157Niue158Norfolk Island
159Northern Mariana Islands160Norway
161Not Determined162Oman
163Pakistan164Palau
165Panama166Papua New Guinea
167Paraguay168Peru
169Philippines170Pitcairn Island
171Poland172Portugal
173Puerto Rico174Qatar
175Reunion Island176Romania
177Russian Federation178Rwanda
179Saint Kitts and Nevis180Saint Lucia
181Saint Vincent and the Grenadines182San Marino
183Sao Tome an d Principe184Saudi Arabia
185Senegal186Seychelles
128Madagascar
NXC CLI Reference Guide
45
Chapter 5 Registration
Table 11 Country Codes (continued)
COUNTRY CODECOUNTRY NAMECOUNTRY CODECOUNTRY NAME
187Sierra Leone188Singapore
189Slovak Republic190Slovenia
191Solomon Islands192Somalia
193South Africa194South Georgia and the South
Sandwich Islands
185Spain196Sri Lanka
197St Pierre and Miquelon198St. Helena
199Suriname200Svalbard and Jan Mayen Islands
201Swaziland202Sweden
203Switzerland204Taiwan
205Tajikistan206Tanzania
207Thailand208Togo
209Tokelau210Tonga
211Trinidad and Tobago212Tunisia
213Turkey214Turkmenistan
215Turks and Caicos Islands216Tuvalu
217US Minor Outlying Islands218Uganda
219Ukraine220United Arab Emirates
221United Kingdom222United States
223Uruguay224Uzbekistan
225Vanuatu226Venezuela
227Vietnam228Virgin Islands (British)
229Virgin Islands (USA)230Wallis And Futuna Islands
231Western Sahara232Western Samoa
233Yemen234Yugoslavia
235Zambia236Zimbabwe
46
NXC CLI Reference Guide
CHAPTER 6
Interfaces
This chapter shows you how to use interface-related commands.
6.1 Interface Overview
In general, an interface has the following characteristics.
• An interface is a logical entity through which (layer-3) packets pass.
• An interface is bound to a physical port or another interface.
• Many interfaces can share the same physical port.
• An interface is bound to one zone at most.
• Many interface can belong to the same zone.
• Layer-3 virtualization (IP alias, for example) is a kind of interface.
Some characteristics do not apply to some types of interfaces.
6.1.1 Types of Interfaces
You can create several types of interfaces in the NXC:
• Ethernet interfaces are the foundation for defining other interfaces and network policies.
RIP and OSPF are also configured in these interfaces.
• VLAN interfaces receive and send tagged frames. The NXC automatically adds or
removes the tags as needed.
6.2 Interface General Commands Summary
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 12 Input Values for General Interface Commands
LABELDESCRIPTION
interface_name The name of the interface.
Ethernet interface: gex, x = 1 - N, where N equals the highest numbered Ethernet
interface for your NXC model.
VLAN interface: vlanx, x = 0 - 4094
NXC CLI Reference Guide
47
Chapter 6 Interfaces
Table 12 Input Values for General Interface Commands (continued)
LABELDESCRIPTION
profile_nameThe name of the DHCP pool. You may use 1-31 alphanumeric characters,
underscores(
value is case-sensitive.
domain_nameFully-qualified domain name. You may up to 254 alphanumeric characters,
dashes (-), or periods (.), but the first character cannot be a period.
_), or dashes (-), but the first character cannot be a number. This
The following sections introduce commands that are supported by several types of interfaces.
6.2.1 Basic Interface Properties and IP Address Commands
This table lists basic properties and IP address commands.
Table 13 interface General Commands: Basic Properties and IP Address Assignment
COMMANDDESCRIPTION
show interface {ethernet | vlan} statusDisplays the connection status of the specified type
of interfaces.
show interface {interface_name | ethernet |
vlan | all}
show interface send statistics intervalDisplays the interval for how often the NXC
show interface summary all Displays basic information about the interfaces.
show interface summary all statusDisplays the connection status of the interfaces.
[no] interface interface_nameCreates the specified interface if necessary and
[no] description descriptionSpecifies the description for the specified interface.
[no] downstream <0..1048576>This is reserved for future use.
exitLeaves the sub-command mode.
[no] ip address dhcpMakes the specified interface a DHCP client; the
[no] ip address ip subnet_maskAssigns the specified IP address and subnet mask
[no] ip gateway ipAdds the specified gateway using the specified
ip gateway ip metric <0..15>Sets the priority (relative to every gateway on every
Displays information about the specified interface,
specified type of interfaces, or all interfaces.
refreshes the sent packet statistics for the
interfaces.
enters sub-command mode. The
deletes the specified interface.
The no command clears the description.
description: You can use alphanumeric and
no command
()+/:=?!*#@$_%- characters, and it can be up
to 60 characters long.
Specifies the downstream bandwidth for the
specified interface. The
downstream bandwidth to 1048576.
DHCP server gives the specified interface its IP
address, subnet mask, and gateway. The
command makes the IP address static IP address
for the specified interface. (See the next command
to set this IP address.)
to the specified interface. The
the IP address and the subnet mask.
interface. The
interface) for the specified gateway. The lower the
number, the higher the priority.
no command removes the gateway.
no command sets the
no
no command clears
48
NXC CLI Reference Guide
Chapter 6 Interfaces
Table 13 interface General Commands: Basic Properties and IP Address Assignment (continued)
COMMANDDESCRIPTION
ipv6 dhcp6 [client]Sets the IPv6 interface to be a DHCPv6 client.
[no] ipv6 dhcp6 rapid-commitShortens the DHCPv6 message exchange process
[no] ipv6 dhcp6 address-requestGet this interface’s IPv6 address from the DHCPv6
[no] ipv6 dhcp6-request-object
dhcp6_profile
[no] ipv6 nd ra acceptSets the IPv6 interface to accept IPv6 neighbor
[no] mss <536..1460>Specifies the maximum segment size (MSS) the
[no] mtu <576..1500>Specifies the Maximum Transmission Unit, which is
[no] shutdownDeactivates the specified interface. The
[no] upstream <0..1048576>Specifies the upstream bandwidth for the specified
interface send statistics interval <15..3600>Sets how often the NXC sends interface statistics
from four to two steps to help reduce network
traffic. The no command sets the full four-step
DHCPv6 message exchange process.
server. The no command has the NXC not get this
interface’s IPv6 address from the DHCPv6 server.
For a DHCPv6 client interface, specify the profile of
DHCPv6 request settings that determine what
additional information to get from the DHCPv6
server. The no command removes the DHCPv6
request settings profile.
discovery router advertisement messages. The no
command sets the IPv6 interface to discard IPv6
neighbor discovery router advertisement
messages.
interface is to use. MSS is the largest amount of
data, specified in bytes, that the interface can
handle in a single, unfragmented piece. The
command has the interface use its default MSS.
the maximum number of bytes in each packet
moving through this interface. The NXC divides
larger packets into smaller fragments. The
command resets the MTU to 1500.
no
no
no
command activates it.
Applies traffic priority when the interface sends
TCP-ACK traffic, or traffic for resolving domain
names. It also sets how much bandwidth the traffic
can use and can turn on maximize bandwidth
usage.
Turns off traffic priority settings for when the
interface sends the specified type of traffic.
interface. The
bandwidth to 1048576.
to external servers. For example, a syslog server.
no command sets the upstream
NXC CLI Reference Guide
49
Chapter 6 Interfaces
Table 13 interface General Commands: Basic Properties and IP Address Assignment (continued)
This example shows how to modify the name of interface ge4 to “VIP”. First you have to
check the interface system name (ge4 in this example) on the NXC. Then change the name and
display the result.
Router> show interface-name
No. System Name User Defined Name
===========================================================================
1 ge1 ge1
2 ge2 ge2
3 ge3 ge3
4 ge4 ge4
5 ge5 ge5
Router> configure terminal
Router(config)# interface-name ge4 VIP
Router(config)# show interface-name
No. System Name User Defined Name
===========================================================================
1 ge1 ge1
2 ge2 ge2
3 ge3 ge3
4 ge4 VIP
5 ge5 ge5
Router(config)#
This example shows how to restart an interface. You can check all interface names on the
NXC. Then use either the system name or user-defined name of an interface (ge4 or Customer
in this example) to restart it.
Router> show interface-name
No. System Name User Defined Name
===========================================================================
1 ge1 ge1
2 ge2 ge2
3 ge3 ge3
4 ge4 Customer
5 ge5 ge5
Router> configure terminal
Router(config)# interface reset ge4
Router(config)# interface reset Customer
Router(config)#
NXC CLI Reference Guide
51
Chapter 6 Interfaces
6.2.2 DHCP Setting Commands
This table lists DHCP setting commands. DHCP is based on DHCP pools. Create a DHCP
pool if you want to assign a static IP address to a MAC address or if you want to specify the
starting IP address and pool size of a range of IP addresses that can be assigned to DHCP
clients. There are different commands for each configuration. Afterwards, in either case, you
have to bind the DHCP pool to the interface.
Table 14 interface Commands: DHCP Settings
COMMANDDESCRIPTION
show ip dhcp dhcp-optionsShows the DHCP extended option settings.
show ip dhcp pool [profile_name]Shows information about the specified DHCP poo l
ip dhcp pool rename profile_name profile_nameRenames the specified DHCP pool from the first
[no] ip dhcp pool profile_nameCreates a DHCP pool if necessary and enters sub-
showShows information about the specified DHCP pool.
[no] host ipSpecifies the static IP address the NXC should
or about all DHCP pools.
profile_name to the second profile_name.
command mode. You can use the DHCP pool to
create a static entry or to set up a range of IP
addresses to assign dynamically.
About the sub-command settings:
•If you use the
this DHCP pool as a static DHCP entry.
•If you do not use the
the network command, the NXC treats this
DHCP pool as a pool of IP addresses.
•If you do not use the
host command, the NXC treats
host command and use
host command or the
network command, the DHCP pool is not
properly configured and cannot be bound to
any interface.
The no command removes the specified DHCP
pool.
Use the following commands if you want to create
a static DHCP entry. If you do not use the
command, the commands that are not in this
section have no effect, but you can still set them.
assign. Use this command, along with
host
hardware-address, to create a static DHCP
entry.
52
Note: The IP address must be in the
same subnet as the interface to
which you plan to bind the DHCP
pool.
When this command is used, the NXC treats this
DHCP pool like a static entry, regardless of the
network setting. The no command clears this
field.
[no] hardware-address mac_addressReserves the DHCP pool for the specified MAC
address. Use this command, along with host, to
create a static DHCP entry. The
clears this field.
[no] client-identifier mac_addressSpecifies the MAC address that appears in the
DHCP client list. The
[no] client-name host_nameSpecifies the host name that appears in the DHCP
client list. The
host_name: You may use 1-31 alphanumeric
characters, underscores(
first character cannot be a number. This value is
case-sensitive.
Use the following commands if you want to create
a pool of IP addresses. These commands have no
effect if you use the host command. You can still
set them, however.
no dhcp-option <1..254>Removes the DHCP extended option for the
network IP/<1..32>
network ip mask
no network
Adds or edits a DHCP extended option for the
specified DHCP pool.
text: String of up to 250 characters
hex: String of up to 250 hexadecimal pairs.
vivc: Vendor-Identifying Vendor Class option. A
DHCP client may use this option to unambiguously
identify the vendor that manufactured the hardware
on which the client is running, the software in use,
or an industry consortium to which the vendor
belongs.
enterprise_id: Number <0..4294967295>.
hex_s: String of up to 120 hexadecimal pairs.
vivs: Vendor-Identifying Vendor-Specific option.
DHCP clients and servers may use this option to
exchange vendor-specific information.
specified DHCP pool.
Specifies the IP address and subnet mask of the
specified DHCP pool. The subnet mask can be
written in w.x.y.z format or in /<1..32> format.
no command clears this field.
no command clears this field.
_), or dashes (-), but the
Note: The DHCP pool must have the
same subnet as the interface to
which you plan to bind it.
The no command clears these fields.
[no] default-router ipSpecifies the default gateway DHCP clients should
use. The
[no] description descriptionSpecifies a description for the DHCP pool for
identification. The
description.
[no] domain-name domain_nameSpecifies the domain name assigned to DHCP
[no] ip dhcp-pool profile_nameBinds the specified interface to the specified DHCP
[no] ip helper-address ipCreates the specified DHCP relay. You have to
release dhcp interface-nameReleases the TCP/IP configuration of the specified
renew dhcp interface-nameRenews the TCP/IP configuration of the specified
show ip dhcp binding [ip]Displays information about DHCP bindings for the
clear ip dhcp binding {ip | *}Removes the DHCP bindings for the specified IP
Sets the first DNS server to the specified IP
address, the specified interface’s first, second, or
third DNS server, or the NXC itself. The
command resets the setting to its default value.
Sets the second DNS server to the specified IP
address, the specified interface’s first, second, or
third DNS server, or the NXC itself. The
command resets the setting to its default value.
Sets the third DNS server to the specified IP
address, the specified interface’s first, second, or
third DNS server, or the NXC itself. The
command resets the setting to its default value.
assign to the remote users. The no command
removes the setting.
assign to the remote users. The no command
removes the setting.
Sets the lease time to the specified number of
days, hours, and minutes or makes the lease time
infinite. The
server setting to its default value.
pool. You have to remove any DHCP relays first.
The
no command removes the binding.
remove the DHCP pool first, if the DHCP pool is
bound to the specified interface. The
removes the specified DHCP relay.
interface. The interface must be a DHCP client.
This command is available in privilege mode, not
configuration mode.
interface. The interface must be a DHCP client.
This command is available in privilege mode, not
configuration mode.
specified IP address or for all IP addresses.
address or for all IP addresses.
no command resets the first DNS
no
no
no
no command
54
NXC CLI Reference Guide
6.2.2.1 DHCP Setting Command Examples
The following example uses these commands to configure DHCP pool DHCP_TEST.
Router# configure terminal
Router(config)# ip dhcp pool DHCP_TEST
Router(config-ip-dhcp-pool)# network 192.168.1.0 /24
Router(config-ip-dhcp-pool)# domain-name zyxel.com
Router(config-ip-dhcp-pool)# first-dns-server 10.1.5.1
Router(config-ip-dhcp-pool)# second-dns-server ge1 1st-dns
Router(config-ip-dhcp-pool)# third-dns-server 10.1.5.2
Router(config-ip-dhcp-pool)# default-router 192.168.1.1
Router(config-ip-dhcp-pool)# lease 0 1 30
Router(config-ip-dhcp-pool)# starting-address 192.168.1.10 pool-size 30
Router(config-ip-dhcp-pool)# hardware-address 00:0F:20:74:B8:18
Router(config-ip-dhcp-pool)# client-identifier 00:0F:20:74:B8:18
Router(config-ip-dhcp-pool)# client-name TWtester1
Router(config-ip-dhcp-pool)# exit
Router(config)# interface ge1
Router(config-if)# ip dhcp-pool DHCP_TEST
Router(config-if)# exit
Router(config)# show ip dhcp server status
binding interface : ge1
binding pool : DHCP_TEST
Chapter 6 Interfaces
NXC CLI Reference Guide
55
Chapter 6 Interfaces
6.2.3 Connectivity Check (Ping-check) Commands
Use these commands to have an interface regularly check the connection to the gateway you
specified to make sure it is still available. You specify how often the interface checks the
connection, how long to wait for a response before the attempt is a failure, and how many
consecutive failures are required before the NXC stops routing to the gateway. The NXC
resumes routing to the gateway the first time the gateway passes the connectivity check.
This table lists the ping-check commands
Table 15 interface Commands: Ping Check
COMMANDDESCRIPTION
show ping-check [interface_name | status]Displays information about ping check settings for
the specified interface or for all interfaces.
status: displays the current connectivity check
status for any interfaces upon which it is activated.
show ping-check [interface_name]Displays information about ping check settings for
the specified interface or for all interfaces.
[no] connectivity-check continuous-log
activate
show connectivity-check continuous-log statusDisplays the continuous log setting about
interface interface_nameEnters sub-command mode.
[no] ping-check activateEnables ping check for the specified interface. The
ping-check {domain_name | ip | defaultgateway}
ping-check {domain_name | ip | defaultgateway} period <5..30>
ping-check {domain_name | ip | defaultgateway} timeout <1..10>
ping-check {domain_name | ip | defaultgateway} fail-tolerance <1..10>
ping-check {domain_name | ip | defaultgateway} method {icmp | tcp}
ping-check {domain_name | ip | defaultgateway} port <1..65535>
Use this command to have the NXC logs
connectivity check result continuously. The no
command disables the setting.
connectivity check.
no command disables ping check for the specified
interface.
Specifies what the NXC pings for the ping check;
you can specify a fully-qualified domain name, IP
address, or the default gateway for the interface.
Specifies what the NXC pings for the ping check
and sets the number of seconds between each
ping check.
Specifies what the NXC pings for the ping check
and sets the number of seconds the NXC waits for
a response.
Specifies what the NXC pings for the ping check
and sets the number of times the NXC times out
before it stops routing through the specified
interface.
Sets how the NXC checks the connection to the
gateway.
icmp: ping the gateway you specify to make sure it
is still available.
tcp: perform a TCP handshake with the gateway
you specify to make sure it is still available.
Specifies the port number to use for a TCP
connectivity check.
56
NXC CLI Reference Guide
6.2.3.1 Connectivity Check Command Example
The following commands show you how to set the WAN1 interface to use a TCP handshake
on port 8080 to check the connection to IP address 1.1.1.2
This section covers commands that are specific to Ethernet interfaces.
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 16 Input Values for Ethernet Interface Commands
LABELDESCRIPTION
interface_nameThe name of the interface.
Ethernet interface: gex, x = 1 - N, where N equals the highest numbered
Ethernet interface for your NXC model.
VLAN interface: vlanx, x = 0 - 4094.
6.3.1 MAC Address Setting Commands
This table lists the commands you can use to set the MAC address of an interface..
Table 17 interface Commands: MAC Setting
COMMANDDESCRIPTION
interface interface_nameEnters sub-command mode.
no macHas the interface use its default MAC address.
mac macSpecifies the MAC address the interface is to use.
NXC CLI Reference Guide
57
Chapter 6 Interfaces
Table 17 interface Commands: MAC Setting (continued)
COMMANDDESCRIPTION
type {internal|external|general}Sets which type of network you will connect this
interface. The NXC automatically adds default
route and SNAT settings for traffic it routes from
internal interfaces to external interfaces; for
example LAN to WAN traffic.
internal: Set this to connect to a local network.
Other corresponding configuration options: DHCP
server and DHCP relay. The NXC automatically
adds default SNAT settings for traffic flowing from
this interface to an external interface.
external: Set this to connect to an external
network (like the Internet). The NXC automatically
adds this interface to the default WAN trunk.
general: Set this if you want to manually
configure a policy route to add routing and SNAT
settings for the interface.
no use-defined-macHas the interface use its default MAC address.
use-defined-macHas the interface use a MAC address that you
specify.
6.4 Port Commands
This section covers commands that are specific to ports.
In CLI, representative interfaces are also called representative ports.
Table 18 Basic Interface Setting Commands
COMMANDDESCRIPTION
no port <1..x>Removes the specified physical port from its
current representative interface and adds it to its
default representative interface (for example, port x
--> gex).
port status Port<1..x>Enters a sub-command mode to configure the
specified port’s settings.
[no] duplex <full | half>Sets the port’s duplex mode. The no command
returns the default setting.
exitLeaves the sub-command mode.
[no] negotiation autoSets the port to use auto-negotiation to determine
the port speed and duplex. The no command turns
off auto-negotiation.
[no] speed <100,10>Sets the Ethernet port’s connection speed in Mbps.
The no command returns the default setting.
show port settingDisplays the Ethernet port negotiation, duplex, and
show port statusDisplays statistics for the Ethernet ports.
speed settings.
58
NXC CLI Reference Guide
Chapter 6 Interfaces
6.5 Port Role Commands
The following table describes the commands available for port role identification. You must
use the
these commands.
Table 19 Command Summary: Port Role
COMMANDDESCRIPTION
show port typeDisplays the type of cable connection for each physical
show module typeDisplay the type of module for each physical interface on
6.5.1 Port Role Examples
The following are two port role examples..
configure terminal command to enter the configuration mode before you can use
interface on the device.
the device.
Router(config)# show port type
Port Type
===========================================================================
1 Copper
2 Down
3 Down
4 Down
5 Down
6 Down
7 Down
8 Down
Router(config)# show module type
Port Type
===========================================================================
1 Copper
2 Copper
3 Copper
4 Copper
5 Fiber
6 Fiber
7 Fiber
8 Fiber
6.6 USB Storage Specific Commands
Use these commands to configure settings that apply to the USB storage device connected to
the NXC.
NXC CLI Reference Guide
59
Chapter 6 Interfaces
For the NXC which supports more than one USB ports, these commands only
apply to the USB storage device that is first attached to the NXC.
Table 20 USB Storage General Commands
COMMANDDESCRIPTION
show usb-storageDisplays the status of the connected USB storage device.
[no] usb-storage activateEnables or disables the connected USB storage service.
usb-storage warn number
<percentage|megabyte>
usb-storage mountMounts the connected USB storage device.
usb-storage umountUnmounts the connected USB storage device.
[no] logging usb-storageSets to have the NXC log or not log any information about the connected
Sets a number and the unit (percentage or megabyte) to have the NXC
send a warning message when the remaining USB storage space is less
than the set value.
percentage: 10 to 99
megabyte: 100 to 9999
USB storage device(s) for the system log.
Configures the logging settings for the specified category for the connected
USB storage device.
Stops logging for the specified category to the connected USB storage
device.
Configures the maximum storage space (in percentage) for storing system
logs on the connected USB storage device.
Sets to have the NXC save or stop saving the current system diagnostics
information to the connected USB storage device. You may need to send
this file to customer support for troubleshooting.
Sets to have the NXC save or not save a process’s core dump to the
connected USB storage device if the process terminates abnormally
(crashes). You may need to send this file to customer support for
troubleshooting.
Displays whether (enable or disable) the NXC saves core dump files to the
connected USB storage device.
Displays whether (enable or disable) the NXC saves the current system
diagnostics information to the connected USB storage device.
Displays the logging settings for the connected USB storage device.
60
NXC CLI Reference Guide
6.6.1 USB Storage General Commands Example
This example shows how to display the status of the connected USB storage device.
A Virtual Local Area Network (VLAN) divides a physical network into multiple logical
networks. The standard is defined in IEEE 802.1q.
Chapter 6 Interfaces
In the NXC, each VLAN is called a VLAN interface. As a router, the NXC routes traffic
between VLAN interfaces, but it does not route traffic within a VLAN interface.
vlan0 is the default VLAN interface. It cannot be deleted and its VID cannot
changed.
Otherwise, VLAN interfaces are similar to other interfaces in many ways. They have an IP
address, subnet mask, and gateway used to make routing decisions. They restrict bandwidth
and packet size. They can provide DHCP services, and they can verify the gateway is
available.
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 21 Input Values for VLAN Interface Commands
LABELDESCRIPTION
virtual_interfaceThe VLAN interface name. You may use 0 - 511 alphanumeric
characters, underscores (
be a number. This value is case-sensitive.
gatewayThe gateway IP address of the interface. Enter a standard IPv4 IP
address (for example, 127.0.0.1).
ip_addressThe netwo rk mask IP address. Enter a standard IPv4 IP address.
netmaskThe network subnet mask. For example, 255.255.255.0.
_), or dashes (-), but the first character cannot
NXC CLI Reference Guide
61
Chapter 6 Interfaces
Table 21 Input Values for VLAN Interface Commands (continued)
LABELDESCRIPTION
descriptionSets the description of the interface. Y ou may use 0 - 511 alphanumeric
characters, underscores (
be a number. This value is case-sensitive.
profile_nameThe DHCP pool name.
_), or dashes (-), but the first character cannot
The following table describes the commands available for VLAN interface management. You
must use the
configure terminal command to enter the configuration mode before you
can use these commands.
Table 22 Command Summary: VLAN Interface Profile
COMMANDDESCRIPTION
[no] interface virtual_interfaceEnters configuration mode for the specified interface. Use
vlanid <1..4094>Sets the interface’s VLAN identification number.
[no] ip address ip_address netmaskSets the interface’s IP address and netmask address.
[no] ip address dhcp [metric <0..15>]Sets the interface to use the DHCP to acquire an IP
mtu <576..1500>Sets the maximum size of each data packet, in bytes, that
no mtuDisables the mtu feature for this interface.
[no] ip gateway gateway [metric
<0..15>]
join <interface_name> <tag|untag>Links the VLAN to the specified physical interface and
no join <interface_name>Disassociates the specified physical interface from the
upstream <0..1048576>Sets the maximum amount of traffic, in kilobits per
no upstreamDisables the upstream bandwidth limit.
downstream <0..1048576>Sets the maximum amount of traffic, in kilobits per
no downstreamDisables the downstream bandwidth limit.
the no command to remove the specified VLAN interface.
Use the no command to remove these values from this
interface.
address. Enter the metric (priority) of the gateway (if any)
on this interface. The NXC decides which gateway to use
based on this priority. The lower the number, the higher
the priority. If two or more gateways have the same
priority, the NXC uses the one that was configured first.
can move through this interface. If a larger packet arrives,
the NXC divides it into smaller fragments.
Enter the IP address of the gateway. The NXC sends
packets to the gateway when it does not know how to
route the packet to its destination. The gateway should be
on the same network as the interface.
Also enter the metric (priority) of the gateway (if any) on
this interface. The NXC decides which gateway to use
based on this priority. The lower the number, the higher
the priority. If two or more gateways have the same
priority, the NXC uses the one that was configured first.
also sets this interface to send packets with or without a
VLAN tag.
VLAN.
second, the NXC can send through the interface to the
network.
second, the NXC can receive from the network through
the interface.
This chapter shows you how to configure policies for IP routing and static routes on your
NXC.
7.1 Policy Route
Traditionally, routing is based on the destination address only and the NXC takes the shortest
path to forward a packet. IP Policy Routing (IPPR) provides a mechanism to override the
default routing behavior and alter the packet forwarding based on the policy defined by the
network administrator. Policy-based routing is applied to incoming packets on a per interface
basis, prior to the normal routing.
7.2 Policy Route Commands
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 23 Input Values for General Policy Route Commands
LABELDESCRIPTION
address_objectThe name of the IP address (group) object. You may use 1-31 alphanumeric
interface_nameThe name of the interface.
policy_numberThe number of a policy route. 1 - x where x is the highest number of policy
schedule_object The name of the schedule. You may use 1-31 alphanumeric characters,
service_nameThe name of the service (group). You may use 1-31 alphanumeric characters,
user_nameThe name of a user (group). You may use 1-31 alphanumeric characters,
characters, underscores(
number. This value is case-sensitive.
Ethernet interface: gex, x = 1 - N, where N equals the highest numbered
Ethernet interface for your NXC model.
routes the NXC model supports. See the NXC’s User’s Guide for details.
underscores(
value is case-sensitive.
underscores(
value is case-sensitive.
underscores(
value is case-sensitive.
_), or dashes (-), but the first character cannot be a number. This
_), or dashes (-), but the first character cannot be a number. This
_), or dashes (-), but the first character cannot be a number. This
_), or dashes (-), but the first character cannot be a
NXC CLI Reference Guide
65
Chapter 7 Route
The following table describes the commands available for policy route. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 24 Command Summary: Policy Route
COMMANDDESCRIPTION
[no] bwm activateGlobally enables bandwidth management. You
[no] description descriptionSets a descriptive name for the policy. The
[no] destination {address_object|any}Sets the destination IP address the matched
[no] dscp {any | <0..63>}Sets a custom DSCP code point (0~63). This is
[no] dscp class {default | dscp_class}Sets a DSCP class. Use default to apply this
dscp-marking <0..63>Sets a DSCP value to have the NXC apply that
dscp-marking class {default | dscp_class}Sets how the NXC handles the DSCP value of
must globally activate bandwidth management to
have individual policy routes or application patrol
policies apply bandwidth management. The
command globally disables bandwidth
management.
Enters the policy-route sub-command mode to
configure, add or insert a policy.
(using the next-hop interface) for this route,
you can use this command to have the NXC
automatically disable this policy route when the
next-hop’s connection is down. The no command
disables the setting.
Sets the maximum bandwidth and priority for the
policy. The no command removes bandwidth
settings from the rule. You can also turn
maximize bandwidth usage on or off.
no command
enables the specified policy.
command removes the name for the policy.
packets must have. The no command resets the
destination IP address to the default (any). any
means all IP addresses.
the DSCP value of incoming packets to which
this policy route applies. any means all DSCP
value or no DSCP marker.
policy route to incoming packets that are marked
with DSCP value 0. Use one of the pre-defined
AF classes (including af11~af13, af21~af23,
af31~af33, and af41~af43) to apply this policy
route to incoming packets that are marked with
the DSCP AF class.
The “af” entries stand for Assured Forwarding.
The number following the “af” identifies one of
four classes and one of three drop preferences.
DSCP value to the route’s outgoing packets.
the outgoing packets that match this route. Set
this to default to have the NXC set the DSCP
value of the packets to 0. Set this to an “af” class
(including af11~af13, af21~af23, af31~af33, and
af41~af43) which stands for Assured Forwarding.
The number following the “af” identifies one of
four classes and one of three drop preferences.
trigger move <1..8> to <1..8>Moves a port triggering rule to the number that
[no] user user_nameSets the user name. The
policy default-routeEnters the policy-route sub-command mode to
policy delete policy_numberRemoves a routing policy.
policy flushClears the policy routing table.
policy list tableDisplays all policy route settings.
policy move policy_number to policy_numberMoves a routing policy to the number that you
[no] policy override-direct-route activateUse this command to have the NXC forward
show policy-route [policy_number]Displays all or specified policy route settings.
Sets the interface on which the incoming packets
are received. The
incoming interface to the default (
means all interfaces.
EnterpriseWLAN: the packets are coming from
the NXC itself.
Sets the next-hop to which the matched packets
are routed. The
settings to the default (
the schedule setting to the default (
means any time.
no command resets the
any). any
no command resets next-hop
auto).
none). none
no command resets
service settings to the default (
all services.
Sets the source IP address of the matched
packets that use SNAT. The no command
removes source NAT settings from the rule.
packets must have. The no command resets the
source IP address to the default (
means all IP addresses.
Sets a port triggering rule. The
removes port trigger settings from the rule.
Adds a new port triggering rule to the end of the
list.
Adds a new port triggering rule before the
specified number.
you specified.
any). any means
any). any
no command
no command resets the
user name to the default (
users.
set a route with the name “default-route”.
specified.
packets that match a policy route according to
the policy route instead of sending the packets to
a directly connected network. Use the no
command to disable it.
show policy-route begin policy_number end
policy_number
show policy-route override-direct-routeDisplays whether or not the NXC forwards
show policy-route rule_countDisplays the number of policy routes that have
show policy-route underlayer-rulesDisplays all policy route rule details for advanced
show bwm activationDisplays whether or not the global setting for
show bwm-usage < [policy-route policy_number] |
[interface interface_name]
Displays the specified range of policy route
settings.
packets that match a policy route according to
the policy route instead of sending the packets to
a directly connected network.
been configured on the NXC.
debugging.
bandwidth management on the NXC is enabled.
Displays the specified policy route or interface’s
bandwidth allotment, current bandwidth usage,
and bandwidth usage statistics.
7.2.1 Assured Forwarding (AF) PHB for DiffServ
Assured Forwarding (AF) behavior is defined in RFC 2597. The AF behavior group defines
four AF classes. Inside each class, packets are given a high, medium or low drop precedence.
The drop precedence determines the probability that routers in the network will drop packets
when congestion occurs. If congestion occurs between classes, the traffic in the higher class
(smaller numbered class) is generally given priority. Combining the classes and drop
precedence produces the following twelve DSCP encodings from AF11 through AF43. The
decimal equivalent is listed in brackets.
Table 25 Assured Forwarding (AF) Behavior Group
CLASS 1CLASS 2CLASS 3CLASS 4
Low Drop PrecedenceAF11 (10)AF21 (18)AF31 (26)AF41 (34)
Medium Drop PrecedenceAF12 (12)AF22 (20)AF32 (28)AF42 (36)
High Drop PrecedenceAF13 (14)AF23 (22)AF33 (30)AF43 (38)
68
NXC CLI Reference Guide
7.2.2 Policy Route Command Example
The following commands create two address objects (TW_SUBNET and GW_1) and insert a
policy that routes the packets (with the source IP address TW_SUBNET and any destination
IP address) through the interface ge1 to the next-hop router GW_1. This route uses the IP
address of the outgoing interface as the matched packets’ source IP address.
Router(config)# address-object TW_SUBNET 192.168.2.0 255.255.255.0
Router(config)# address-object GW_1 192.168.2.250
Router(config)# policy insert 1
Router(policy-route)# description example
Router(policy-route)# destination any
Router(policy-route)# interface ge1
Router(policy-route)# next-hop gateway GW_1
Router(policy-route)# snat outgoing-interface
Router(policy-route)# source TW_SUBNET
Router(policy-route)# exit
Router(config)# show policy-route 1
index: 1
active: yes
description: example
user: any
schedule: none
interface: ge1
tunnel: none
sslvpn: none
source: TW_SUBNET
destination: any
DSCP code: any
service: any
nexthop type: Gateway
nexthop: GW_1
nexthop state: Not support
auto destination: no
bandwidth: 0
bandwidth priority: 0
maximize bandwidth usage: no
SNAT: outgoing-interface
DSCP marking: preserve
amount of port trigger: 0
Router(config)#
Chapter 7 Route
7.3 IP Static Route
The NXC has no knowledge of the networks beyond the n e twork that is directly connected to
the NXC. For instance, the NXC knows about network N2 in the following figure through
gateway R1. However, the NXC is unable to route a packet to network N3 because it doesn't
know that there is a route through the same gateway R1 (via gateway R2). The static routes are
for you to tell the NXC about the networks beyond the network connected to the NXC directly.
NXC CLI Reference Guide
69
Chapter 7 Route
Figure 10 Example of Static Routing Topology
7.4 Static Route Commands
The following table describes the commands available for static route.You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 26 Command Summary: Static Route
COMMANDDESCRIPTION
[no] ip route {w.x.y.z} {w.x.y.z}
{interface|w.x.y.z} [<0..127>]
ip route replace {w.x.y.z} {w.x.y.z}
{interface|w.x.y.z} [<0..127>] with {w.x.y.z}
{w.x.y.z} {interface|w.x.y.z} [<0..127>]
show ip route-settingsDisplays static route information. Use show ip
show ip route control-virtual-server-rulesDisplays whether or not static routes have priority
Sets a static route. The no command disables a
static route.
Changes an existing route’s settings.
route to see learned route information.
over NAT virtual server rules (1-1 SNAT).
7.4.1 Static Route Commands Example
The following command sets a static route with IP address 10.10.10.0 and subnet mask
255.255.255.0 and with the next-hop interface ge1. Then use the show command to display
the setting.
Router(config)# ip route 10.10.10.0 255.255.255.0 ge1
Router(config)#
Router(config)# show ip route-settings
Route Netmask Nexthop Metric
===========================================================================
10.10.10.0 255.255.255.0 ge1 0
70
NXC CLI Reference Guide
Chapter 7 Route
7.5 Learned Routing Information Commands
This table lists the commands to look at learned routing information.
Table 27 ip route Commands: Learned Routing Information
COMMANDDESCRIPTION
show ip route [kernel | connected | static] Displays learned routing and other routing information.
7.5.1 show ip route Command Example
The following example shows learned routing information on the NXC.
Router> show ip route
Flags: A - Activated route, S - Static route, C - directly Connected
O - OSPF derived, R - RIP derived, G - selected Gateway
! - reject, B - Black hole, L - Loop
IP Address/Netmask Gateway IFace Metric Flags
Persist
===========================================================================
127.0.0.0/8 0.0.0.0 lo 0 ACG -
192.168.1.0/24 0.0.0.0 vlan0 0 ACG -
Router>
NXC CLI Reference Guide
71
Chapter 7 Route
72
NXC CLI Reference Guide
CHAPTER 8
A
B
C
D
AP Management
This chapter shows you how to configure wireless AP management options on yo ur NXC.
8.1 AP Management Overview
The NXC allows you to remotely manage all of the Access Points (APs) on your network. You
can manage a number of APs without having to configure them individually as the NXC
automatically handles basic configuration for you.
The commands in this chapter allow you to add, delete, and edit the APs managed by the NXC
by means of the CAPWAP protocol. An AP must be moved from the wait list to the
management list before you can manage it. If you do not want to use this registration
mechanism, you can disable it and then any newly connected AP is registered automatically.
Figure 11 Example AP Management
In this example, the NXC (A) connects up to a number of Power over Ethernet switches, such
as the ES-2025 PWR (B). They connect to the NWA5160N Access Points (C), which in turn
provide access to the network for the wireless clients within their broadcast radius.
Let’s say one AP (D) starts giving you trouble. You can log into the NXC via console or Telnet
and troubleshoot, such as viewing its traffic statistics or reboot it or even remove it altogether
from the list of viable APs that stations can use.
NXC CLI Reference Guide
73
Chapter 8 AP Management
8.2 AP Management Commands
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 28 Input Values for General AP Management Commands
LABELDESCRIPTION
ap_macThe Ethernet MAC address of the managed AP. Enter 6 hexidecimal pairs
ap_modelThe model name of the managed AP , such as NWA5160N, NWA5560-N,
slot_nameThe slot name for the AP’s on-board wireless LAN card. Use either slot1 or
profile_nameThe wireless LAN radio profile name. You may use 1-31 alphanumeric
ap_descriptionThe AP description. This is strictly used for reference purposes and has no
sta_macThe MAC address of the wireless client. Enter 6 hexidecimal pairs separated by
separated by colons. You can use 0-9, a-z and A-Z.
NWA5550-N, NWA5121-NI or NWA5123-NI.
slot2. (The NWA5560-N supports up to 2 radio slots.)
characters, underscores(
number. This value is case-sensitive.
effect on any other settings. You may use 1-31 alphanumeric characters,
underscores(
value is case-sensitive.
colons. You can use 0-9, a-z and A-Z.
_), or dashes (-), but the first character cannot be a number. This
_), or dashes (-), but the first character cannot be a
The following table describes the commands available for AP management. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 29 Command Summary: AP Management
COMMANDDESCRIPTION
capwap ap ap_macEnters the sub-command mode for the specified AP.
slot_name ap-profile profile_nameSets the radio (slot_name) to AP mode and assigns a
created profile to the radio.
no slot_name ap-profile Removes the AP mode profile assignment for the
slot_name monitor-profile
profile_name
no slot_name monitor-profileRemoves the monitor mode profile assignment for the
description ap_descriptionSets the description for the specified AP.
specified radio (slot_name).
Sets the specified radio (slot_name) to monitor mode
and assigns a created profile to the radio. Monitor mode
APs act as wireless monitors, which can detect rogue
APs and help you in building a list of friendly ones. See
also Section 10.2 on page 87.
specified radio (slot_name).
Sets the specified radio (slot_name) to root AP or
repeater mode and assigns a created ZyMesh profile to
the radio. See also Section 10.7 on page 101 for more
information about ZyMesh.
Sets the AP group to which the AP belongs.
74
NXC CLI Reference Guide
Chapter 8 AP Management
Table 29 Command Summary: AP Management (continued)
COMMANDDESCRIPTION
[no] force vlanSets whether or not the NXC changes the AP’s
management VLAN to match the one you configure using
the vlan sub-command. The management VLAN on the
NXC and AP must match for the NXC to manage the AP.
This takes priority over the AP’s CAPWAP client
commands described in Chapter 42 on page 249.
[no] override lan-provisionSets the NXC to overwrite the AP’s LAN port settings.
[no] override vlan-settingSets the NXC to overwrite the AP’s LAN port settings.
vlan <1..4094> {tag | untag}Sets the VLAN ID for the specified AP as well as whether
exitExits the sub-command mode for the specified AP.
capwap ap ac-ip {primary_ac_ip}
{secondary_ac_ip}
capwap ap ac-ip autoSets the AP to use DHCP to get the address of the AP
capwap ap add ap_mac [ap_model]Adds the specified AP to the NXC for management. If
capwap ap fallback disableSets the managed AP(s) to not change back to associate
capwap ap fallback enableSets the managed AP(s) to change back to associate
capwap ap fallback interval <30..86400>Sets how often (in seconds) the managed AP(s) check
Sets the NXC to enable or disable the specified LAN port
on the AP and configures a PVID (Port VLAN ID) for this
port.
lan_port: the name of the AP’s LAN port (lan1 for
example).
Sets the NXC to create a new VLAN or configure an
existing VLAN. Y ou can disable or enable the VLAN, set
the VLAN ID, assign up to three ports to this VLAN as
members and set whether the port is to tag outgoing
traffic with the VLAN ID.
vlan_interface: the name of the VLAN (vlan1 for
example).
Sets the NXC to overwrite the AP’s output power, radio or
SSID profile settings for the specified radio.
Use the no command to not overwrite the specified
settings.
Use the no command to not overwrite the specified
settings.
Use the no command to not overwrite the specified
settings.
packets sent to and from that ID are tagged or untagged.
Specifies the primary and secondary IP address or
domain name of the AP controller (the NXC) to which the
AP connects.
controller (the NXC).
manual add is disabled, this command can still be used; if
you add an AP before it connects to the network, then this
command simply preconfigures the management list with
that AP’s information.
with the primary AP controller when the primary AP
controller is available.
with the primary AP controller as soon as the primary AP
controller is available.
whether the primary AP controller is avail a bl e .
NXC CLI Reference Guide
75
Chapter 8 AP Management
Table 29 Command Summary: AP Management (continued)
COMMANDDESCRIPTION
capwap ap kick {all | ap_mac}Removes the specified AP (ap_mac) or all connected
APs (all) from the management list. Doing this removes
the AP(s) from the management list.
If the NXC is set to automatically add new APs to the AP
management list, then any kicked APs are added back to
the management list as soon as they reconnect.
capwap ap led-off ap_macSets the LEDs of the specified AP to turn off after it’s
capwap ap led-on ap_macSets the LEDs of the specified AP to stay lit after the NXC
capwap ap reboot ap_macForces the specified AP (ap_mac) to restart. Doing this
capwap manual-add {enable | disable}Allows the NXC to either automatically add new APs to
capwap station kick sta_macForcibly disconnects the specified station from the
country-code country_codeSets the country where the NXC is located/installed.
lan-provision ap ap_macEnters the sub-command mode for the specified AP
show capwap ap {all | ap_mac}Displays the management list (all) or whether the
show capwap ap ap_macslot_name detailDisplays details for the specified radio (slot_name) on
show capwap ap {all | ap_mac} config
status
show capwap ap ac-ipDisplays the address of the NXC or auto if the AP finds
show capwap ap all statisticsDisplays radio statistics for all APs on the management
ready.
is ready.
severs the connections of all associated stations.
the network (disable) or wait until you manually confirm
them (enable).
network.
This is the default country code the NXC uses in a new
radio profile or monitor profile if you do not change it. The
available channels vary depending on the country you
selected.
country_code: 2-letter country-codes, such as TW, DE,
or FR.
Enables or disables the specified LAN port on the AP and
configures a PVID (Port VLAN ID) for this port.
lan_port: the name of the AP’s LAN port (lan1 for
example).
Creates a new VLAN or configures an existing VLAN. You
can disable or enable the VLAN, set the VLAN ID, assign
up to three ports to this VLAN as members and set
whether the port is to tag outgoing tra ffic with the VLAN
ID.
vlan_interface: the name of the VLAN (vlan1 for
example).
specified AP is on the management list (ap_mac).
the specified AP (ap_mac
Displays whether or not any AP’s configuration or the
specified AP’s configuration is in conflict with the NXC’s
settings for the AP and displays the settings in conflict if
there are any.
the NXC through broadcast packets.
list.
).
76
NXC CLI Reference Guide
Chapter 8 AP Management
Table 29 Command Summary: AP Management (continued)
COMMANDDESCRIPTION
show capwap ap fallbackDisplays whether the managed AP(s) will change back to
associate with the primary AP controller when the primary
AP controller is available.
show capwap ap fallback intervalDisplays the interval for how often the managed AP(s)
check whether the primary AP controller is available.
show capwap ap wait-listDisplays a list of connected but as-of-yet unmanaged
show capwap manual-addDisplays the current manual add option.
show capwap station allDisplays information for all stations connected to the APs
show country-code listDisplays a refe rence list of two-letter country codes.
show default country-codeDisplays the default country code configured on the NXC.
show lan-provision ap ap_mac interface
{lan_port | vlan_interface | all| ethernet
| uplink | vlan}
APs. This is known as the ‘wait list’.
on the management list.
Displays the port and/or VLAN settings for the specified
AP.
You can also set to display settings for a specified port, a
sepcified VLAN, all physical Ethernet ports, the uplink
port or all VLANs on the AP.
NXC CLI Reference Guide
77
Chapter 8 AP Management
8.2.1 AP Management Commands Example
The following example shows you how to add an AP to the management list, and then edit it.
Router# show capwap ap wait-list
index: 1
IP: 192.168.1.35, MAC: 00:11:11:11:11:FE
Model: NWA5160N, Description: AP-00:11:11:11:11:FE
index: 2
IP: 192.168.1.36, MAC: 00:19:CB:00:BB:03
Model: NWA5160N, Description: AP-00:19:CB:00:BB:03
Router# configure terminal
Router(config)# capwap ap add 00:19:CB:00:BB:03
Router(config)# capwap ap 00:19:CB:00:BB:03
Router(AP 00:19:CB:00:BB:03)# slot1 ap-profile approf01
Router(AP 00:19:CB:00:BB:03)# exit
Router(config)# show capwap ap all
index: 1
Status: RUN
IP: 192.168.1.37, MAC: 40:4A:03:05:82:1E
Description: AP-404A0305821E
Model: NWA5160N
R1 mode: AP, R1Prof: default
R2 mode: AP, R2Prof: n/a
Station: 0, RadioNum: 2
Mgnt. VLAN ID: 1, Tag: no
WTP VLAN ID: 1, WTP Tag: no
Force VLAN: disable
Firmware Version: 2.25(AAS.0)b2
Recent On-line Time: 08:43:04 2012/07/24
Last Off-line Time: N/A
Router(config)# show capwap ap 40:4A:03:05:82:1E slot1 detail
index: 1
SSID: ZyXEL, BSSID: 40:4A:03:05:82:1F
SecMode: NONE, Forward Mode: Local Bridge, Vlan: 1
Router(config)# show capwap ap all statistics
index: 1
Status: RUN, Loading: AP MAC: 40:4A:03:05:82:1E
Radio: 1, OP Mode: AP
Profile: default, MAC: 40:4A:03:05:82:1F
Description: AP-404A0305821E
Model: NWA5160N
Band: 2.4GHz, Channel: 6
Station: 0
RxPkt: 4463, TxPkt: 38848
RxFCS: 1083323, TxRetry: 198478
78
NXC CLI Reference Guide
CHAPTER 9
AP Group
This chapter shows you how to configure AP groups, which define the radio, po rt, VLAN and
load balancing settings and apply the settings to all APs in the group. An AP can belong to one
AP group at a time.
9.1 Wireless Load Balancing Overview
Wireless load balancing is the process whereby you limit the number of connections allowed
on an wireless access point (AP) or you limit the amount of wireless traffic transmitted and
received on it. Because there is a hard upper limit on the AP’s wireless bandwidth, this can be
a crucial function in areas crowded with wireless users. Rather than let every user connect and
subsequently dilute the available bandwidth to the point where each connecting device
receives a meager trickle, the load balanced AP instead limits the incoming connections as a
means to maintain bandwidth integrity.
9.2 AP Group Commands
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 30 Input Values for General AP Management Commands
LABELDESCRIPTION
ap_group_profil
e_name
slot_nameThe slot name for the AP’s on-board wireless LAN card. Use either slot1 or
The following table describes the commands available for AP groups. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 31 Command Summary: AP Group
COMMANDDESCRIPTION
ap-group first-priority
ap_group_profile_name
ap-group flush wtp-setting
ap_group_profile_name
The wireless LAN radio profile name. You may use 1-31 alphanumeric
characters, underscores(
number. This value is case-sensitive.
slot2. (The NWA5560-N supports up to 2 radio slots.)
_), or dashes (-), but the first character cannot be a
Sets an AP group file that is used as the default group
file. Any AP that is not configured to associate with a
specific AP group belongs to the default group
automatically.
Sets the NXC to overwrite the settings of all managed
APs in the specified group with the group profile settings.
NXC CLI Reference Guide
79
Chapter 9 AP Group
Table 31 Command Summary: AP Group (continued)
COMMANDDESCRIPTION
ap-group-member ap_group_profile_name
[no] member mac_address
[no] load-balancing activateEnables load balancing. Use the no parameter to disable
load-balancing alpha <1..255>Sets the load balancing alpha value.
Sets the model of the managed AP and disable the
model-specific LAN port and configure the port VLAN ID.
Use the no command to remove the specified port and
VLAN settings.
ap_lan_port: the Ethenet LAN port on the managed
AP, such as lan1 or lan2.
Sets the model of the managed AP, enable a VLAN and
configure the VLAN ID. It also sets the Ethernet port(s) on
the managed AP to be a member of the VLAN, and sets
the port(s) to send packets with or without a VLAN tag.
Use the no command to remove the specified port and
VLAN settings.
vlan_interface: the name of the VLAN, such as
vlan0.
ap_lan_port: the Ethenet LAN port on the managed
AP, such as lan1 or lan2.
Sets the model of the managed AP, disable a VLAN and
configure the VLAN ID. It also sets the Ethernet port(s) on
the managed AP to be a member of the VLAN, and sets
the port(s) to send packets with or without a VLAN tag.
Use the no command to remove the specified port and
VLAN settings.
vlan_interface: the name of the VLAN, such as
vlan0.
ap_lan_port: the Ethenet LAN port on the managed
AP, such as lan1 or lan2.
it.
When the AP is balanced, then this setting delays a
client’s association with it by this number of seconds.
Note: This parameter has been optimized for
the NXC and should not be changed
unless you have been specifically
directed to do so by ZyXEL support.
load-balancing beta <1..255>Sets the load balancing beta value.
When the AP is overloaded, then this setting delays a
client’s association with it by this number of seconds.
Note: This parameter has been optimized for
the NXC and should not be changed
unless you have been specifically
directed to do so by ZyXEL support.
load-balancing kickInterval <1..255>Enables the kickout feature for load balancing and also
sets the kickout interval in seconds. While load balancing
is enabled, the AP periodically disconnects stations at
intervals equal to this setting.
This occurs until the load balancing threshold is no longer
exceeded.
[no] load-balancing kickoutEnables an overloaded AP to disconnect (“kick”) idle
clients or clients with noticeably weak connections.
NXC CLI Reference Guide
81
Chapter 9 AP Group
Table 31 Command Summary: AP Group (continued)
COMMANDDESCRIPTION
load-balancing liInterval <1..255>Sets the interval in seconds that each AP communicates
with the other APs in its range for calculating the load
balancing algorithm.
Note: This parameter has been optimized for
the NXC and should not be changed
unless you have been specifically
directed to do so by ZyXEL support.
load-balancing max sta<1..127>If load balancing by the number of stations/wireless
clients, this sets the maximum number of devices allowed
to connect to a load-balanced AP.
load-balancing sigma <51..100>Sets the load balancing sigma value.
Enables load balancing based on either number of
stations (also known as wireless clients) or wireless traffic
on an AP.
station or traffic: once the threshold is crossed (either the
maximum station numbers or with network traffic), the AP
delays association request and authentication request
packets from any new station that attempts to make a
connection.
smart-classroom: the AP ignores association request and
authentication request packets from any new station
when the maximum number of stations is reached.
This value is algorithm parameter used to calculate
whether an AP is considered overloaded, balanced, or
underloaded. It only applies to ‘by traffic mode’.
Note: This parameter has been optimized for
the NXC and should not be changed
unless you have been specifically
directed to do so by ZyXEL support.
load-balancing timeout <1..255>Sets the length of time that an AP retains load balancing
show ap-group-profile rule_countDisplays how many AP group profiles have been
ap-group-profile rename
ap_group_profile_name1
ap_group_profile_name2
Displays the LAN port and/or VLAN settings on th e
managed AP which is in the specified AP group and of
the specified model.
vlan_interface: the name of the VLAN, such as
vlan0.
ap_lan_port: the Ethenet LAN port on the managed
AP, such as lan1 or lan2.
Shows the model name of the managed AP which
belongs to the specified AP group.
configured on the NXC.
Gives an existing AP group profile
(ap_group_profile_name1) a new name
(ap_group_profile_name2).
9.2.1 AP Group Examples
The following example shows you how to create an AP group profile (named “TEST”) and
configure the AP’s first radio to work in repeater mode using the “default” radio profile and
the “ZyMesh_TEST” ZyMesh profile. It also adds the AP with the MAC address
00:a0:c5:01:23:45 to this AP group.
Router(config)# ap-group-profile TEST
Router(config-ap-group TEST)# slot1 repeater-ap default
Router(config-ap-group TEST)# slot1 zymesh-profile ZyMesh_TEST
Router(config-ap-group TEST)# exit
Router(config)# ap-group-member TEST member 00:a0:c5:01:23:45
Router(config)#
NXC CLI Reference Guide
83
Chapter 9 AP Group
The following example shows you how to create an AP group profile (named GP1) and
configure AP load balancing in "by station" mode. The maximum number of stations is set to
1.
Router(config)# ap-group-profile GP1
Router(config-ap-group GP1)# load-balancing mode station
Router(config-ap-group GP1)# load-balancing max sta 1
Router(config-ap-group GP1)# exit
Router(config)# show ap-group-profile GP1 load-balancing config
AP Group Profile:GP1
load balancing config:
Activate: yes
Kickout: no
Mode: station
Max-sta: 1
Traffic-level: high
Alpha: 5
Beta: 10
Sigma: 60
Timeout: 20
LIInterval: 10
KickoutInterval: 20
Router(config)#
The following example shows you how to create an AP group profile (named GP2) and
configure AP load balancing in "by traffic" mode. The traffic level is set to low, and
"disassociate station" is enabled.
The following example shows the settings and status of the VLAN(s) configured for the
managed APs (NWA5301-NJ) in the default AP group.
Router(config)# show ap-group-profile default lan-provision model nwa5301-nj
interface vlan
No. Name Active VID Member
===========================================================================
1 vlan0 yes 1 lan1,lan2,lan3
Router(config)# show ap-group-profile default lan-provision model nwa5301-nj
interface vlan0
active: yes
interface name: vlan0
VID: 1
member: lan1&lan2&lan3
lan1_tag: untag
lan2_tag: untag
lan3_tag: untag
Router(config)#
The following example shows the status of Ethernet ports for the managed APs (NWA5301NJ) in the default AP group. It also shows whether the lan1 port is enabled and what the port’s
VLAN ID is.
Router(config)# show ap-group-profile default lan-provision model nwa5301-nj
interface ethernet
No. Name Active PVID
===========================================================================
1 uplink yes n/a
2 lan1 yes 1
3 lan2 yes 1
4 lan3 yes 1
Router(config)# show ap-group-profile default lan-provision model nwa5301-nj
interface lan1
Name Active PVID
===========================================================================
lan1 yes 1
Router(config)#
NXC CLI Reference Guide
85
Chapter 9 AP Group
86
NXC CLI Reference Guide
CHAPTER 10
Wireless LAN Profiles
This chapter shows you how to configure wireless LAN profiles on your NXC.
10.1 Wireless LAN Profiles Overview
The managed Access Points designed to work explicitly with your NXC do not have on-board
configuration files, you must create “profiles” to manage them. Profiles are preset
configurations that are uploaded to the APs and which manage them. They include: Radio and
Monitor profiles, SSID profiles, Security profiles, MAC Filter profiles, and Layer-2 isolation
profiles. Altogether, these profiles give you absolute control over your wireless network.
10.2 AP Radio & Monitor Profile Commands
The radio profile commands allow you to set up configurations for the radios onboard your
various APs. The monitor profile commands allow you to set up monitor mode configurations
that allow your APs to scan for other APs in the vicinity.
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 32 Input Values for General Radio and Monitor Profile Commands
LABELDESCRIPTION
radio_profile_nameThe radio profile name. You may use 1-31 alphanumeric characters,
underscores (
number. This value is case-sensitive.
monitor_profile_nameThe monitor profile name. You may use 1-31 alphanumeric characters,
underscores (
number. This value is case-sensitive.
intervalEnters the dynamic channel selection interval time. The range is 10 ~
1440 minutes.
wlan_roleSets the wireless LAN radio operating mode. At the time of writing, you
can use ap for Access Point.
wireless_channel_2gSets the 2 GHz channel used by this radio profile. The channel range is
1 ~ 14.
Note: Your choice of channel may be restricted by
_), or dashes (-), but the first character cannot be a
_), or dashes (-), but the first character cannot be a
regional regulations.
NXC CLI Reference Guide
87
Chapter 10 Wireless LAN Profiles
Table 32 Input Values for General Radio and Monitor Profile Commands (continued)
LABELDESCRIPTION
wireless_channel_5gSets the 5 GHz channel used by this radio profile. The channel range is
wlan_htcwSets the HT channel width. Select either 20, 20/40 or 20/40/80.
wlan_htgiSets the HT guard interval. Select either long or short.
chain_maskSets the network traffic chain mask. The range is 1 ~ 7.
wlan_powerSets the radio output power.
scan_methodSets the radio’s scan method while in Monitor mode. Select manual or
wlan_interface_indexSets the radio interface index number. The range is 1 ~ 8.
ssid_profileSets the associated SSID profile name. This name must be an existing
36 ~ 165.
Note: Your choice of channel may be restricted by
regional regulations.
auto.
SSID profile. You may use 1-31 alphanumeric characters, underscores
(_), or dashes (-), but the first character cannot be a number. This value
is case-sensitive.
The following table describes the commands available for radio and monitor profile
management. You must use the
configure terminal command to enter the configuration
mode before you can use these commands.
Table 33 Command Summary: Radio Profile
COMMANDDESCRIPTION
show wlan-radio-profile {all |
radio_profile_name}
wlan-radio-profile rename
radio_profile_name1 radio_profile_name2
[no] wlan-radio-profile
radio_profile_name
2g-channel wireless_channel_2gSets the broadcast band for this profile in the 2.4 GHz
5g-channel wireless_channel_5gSets the broadcast band for this profile in the 5 GHz
2g-multicast-speed
wlan_2g_support_speed
5g-multicast-speed
wlan_5g_basic_speed
[no] activateMakes this profile active or inactive.
Displays the radio profile(s).
all: Displays all profiles.
radio_profile_name: Displays the specified profile.
Gives an existing radio profile (radio_profile_name1)
a new name (radio_profile_name2).
Enters configuration mode for the specified radio profile.
Use the no parameter to remove the specified profile.
frequency range. The default is 6.
frequency range. The default is 36.
When you disable
command to set the data rate
Mbps for 2.4 GHz multicast traffic.
When you disable
command to set the data rate
Mbps for 5 GHz multicast traffic.
multicast to unicast, use this
{ 1.0 | 2.0 | … } in
multicast to unicast, use this
{ 6.0 | 9.0 | … } in
88
NXC CLI Reference Guide
Chapter 10 Wireless LAN Profiles
Table 33 Command Summary: Radio Profile (continued)
COMMANDDESCRIPTION
band {2.4G |5G} band-mode
{bg | bgn | a | ac | an}
beacon-interval <40..1000>Sets the beacon interval for this profile.
country-code country_codeSets the country where the NXC is located/installed.
[no] dcs activateStarts dynamic channel selection. Use the no parameter
dcs 2g-selected-channel 2.4g_channelsSets the channels that are available in the 2.4 GHz band
dcs dcs-2g-method {auto|manual}Sets the AP to automatically search for available
dcs dcs-5g-method {auto}Sets the AP to automati cally search for available
dcs client-aware {enable|disable}When enabled, this ensu res that an AP will not change
dcs channel-deployment {3-channel|4channel}
Sets the radio band (2.4 GHz or 5 GHz) and band mode
for this profile. Band mode details:
For 2.4 GHz, bg lets IEEE 802.11b an d IEEE 802.11g
clients associate with the AP.
For 2.4 GHz, bgn lets IEEE 802.11b, IEEE 802.11g, and
IEEE 802.11n clients associate with the AP.
For 5 GHz, a lets only IEEE 802.11a clients associate
with the AP.
For 5 GHz, ac lets IEEE 802.11a, IEEE 802.11n, and
IEEE 802.11ac clients associate with the AP.
For 5 GHz, an lets IEEE 802.11a and IEEE 802.11n
clients associate with the AP.
When a wirelessly networked device sends a beacon, it
includes with it a beacon interval. This specifies the time
period before the device sends the beacon again. The
interval tells receiving devices on the network how long
they can wait in low-power mode before waking up to
handle the beacon. This value can be set from 40ms to
1000ms. A high value helps save current consumption of
the access point.
The default is 100.
The available channels vary depending on the country
you selected. Be sure to select the correct/same country
for both radios on an AP and all connected APs, in order
to prevent roaming failure and interference to other
systems.
country_code: 2-letter country-codes, such as TW, DE,
or FR.
to turn it off.
when you manually configure the channels an AP can
use.
channels or manually configures the channels the AP
uses in the 2.4 GHz band.
channels.
channels as long as a client is connected to it. If disabled,
the AP may change channels regardless of whether it has
clients connected to it or not.
Sets either a 3-channel deployment or a 4-channel
deployment.
In a 3-channel deployment, the AP running the scan
alternates between the following channels: 1, 6, and 11.
In a 4-channel deployment, the AP running the scan
alternates between the following channels: 1, 4, 7, and 11
(FCC) or 1, 5, 9, and 13 (ETSI).
Sets the option that is applicable to your region. (Channel
deployment may be regulated differently between
countries and locales.)
NXC CLI Reference Guide
89
Chapter 10 Wireless LAN Profiles
Table 33 Command Summary: Radio Profile (continued)
COMMANDDESCRIPTION
dcs dfs-aware {enable|disable}Enables this to allow an AP to avoid phase DFS channels
below the 5 GHz spectrum.
dcs sensitivity-level {high| medium
|low}
dcs time-interval intervalSets the interval that specifies how often DCS should run.
[no] disable-dfs-switchMakes the DFS switch active or inactive. By default this is
[no] dot11n-disable-coexistenceFixes the channel bandwidth as 40 MHz. The no
[no] ctsrts <0..2347>Sets or removes the RTS/CTS value for this profile.
[no] frag <256..2346>Sets or removes the fragmentation value for this profile.
dtim-period <1..255> Sets the DTIM period for this profile.
[no] ampduActivates MPDU frame aggregation for this profile. Use
limit-ampdu < 100..65535> Sets the maximum frame size to be aggregated.
subframe-ampdu <2..64> Sets the maximum number of frames to be aggregated
Sets how sensitive DCS is to radio channel changes in
the vicinity of the AP running the scan.
inactive.
command has the AP automatically choose 40 MHz if all
the clients support it or 20 MHz if some clients only
support 20 MHz.
Use RTS/CTS to reduce data collisions on the wireless
network if you have wireless clients that are associated
with the same AP but out of range of one another. When
enabled, a wireless client sends an RTS (Request To
Send) and then waits for a CTS (Clear To Send) before it
transmits. This stops wireless clients from transmitting
packets at the same time (and causing data collisions).
A wireless client sends an RTS for all packets larger than
the number (of bytes) that you enter here. Set the RTS/
CTS equal to or higher than the fragmentation threshold
to turn RTS/CTS off.
The default is 2347.
The threshold (number of bytes) for the fragmentation
boundary for directed messages. It is the maximum data
fragment size that can be sent.
The default is 2346.
Delivery Traffic Indication Message (DTIM) is the time
period after which broadcast and multicast packets are
transmitted to mobile clients in the Active Power
Management mode. A high DTIM value can cause clients
to lose connectivity with the network. This value can be
set from 1 to 255.
The default is 1.
the no parameter to disable it.
Message Protocol Data Unit (MPDU) aggregation collects
Ethernet frames along with their 802.11n headers and
wraps them in a 802.11n MAC header. This method is
useful for increasing bandwidth throughput in
environments that are prone to high error rates.
By default this is enabled.
By default this is 50000.
each time.
By default this is 32.
90
NXC CLI Reference Guide
Chapter 10 Wireless LAN Profiles
Table 33 Command Summary: Radio Profile (continued)
COMMANDDESCRIPTION
[no] amsduActivates MPDU frame aggregation for this profile. Use
the no parameter to disable it.
Mac Service Data Unit (MSDU) aggregation collects
Ethernet frames without any of their 802.11n headers and
wraps the header-less payload in a single 802.11n MAC
header. This method is useful for increasing bandwidth
throughput. It is also more efficient than A-MPDU except
in environments that are prone to high error rates.
By default this is enabled.
limit-amsdu <2290..4096>Sets the maximum frame size to be aggregated.
The default is 4096.
[no] multicast-to-unicast“Multicast to unicast” broadcasts wireless multicast traffic
[no] block-ackMakes block-ack active or inactive. Use the no
ch-width wlan_htcwSets the channel width for this profile.
guard-interval wlan_htgiSets the guard interval for this profile.
[no] htprotectActivates HT protection for this profile. Use the no
output-power wlan_powerSets the output power (between 0 to 30 dBm) for the
role wlan_roleSets the profile’s wireless LAN radio operating mode.
rssi-dbm <-20~-76>When using the RSSI threshold, set a minimum client
rssi-kickout <-20~-105>Sets a minimum kick-off signal strength. When a wireless
[no] rssi-retryAllows a wireless client to try to associate with the AP
rssi-retrycount <1~100>Sets the maximum number of times a wireless client can
[no] rssi-thresSets whether or not to use the Received Signal Strength
to all wireless clients as unicast traffic to provide more
reliable transmission. The data rate changes dynamically
based on the application’s bandwidth requirements.
Although unicast provides more reliable transmission of
the multicast traffic, it also produces duplicate packets.
The no command turns multicast to unicast off to send
wireless multicast traffic at the rate you specify with the
2g-multicast-speed or 5g-multicast-speed
command.
parameter to disable it.
The default for this is short.
parameter to disable it.
By default, this is disabled.
radio in this profile.
signal strength for connecting to the AP. -20 dBm is the
strongest signal you can require and -76 is the weakest.
client’s signal strength is lower than the specified
threshold, the NXC disconnects the wireless client from
the AP.
-20 dBm is the strongest signal you can require and -105
is the weakest.
again after it is disconnected due to weak signal strength.
Use the no parameter to disallow it.
attempt to re-connect to the AP.
Indication (RSSI) threshold to ensure wireless clients
receive good throughput. This allows only wireless clients
with a strong signal to connect to the AP.
NXC CLI Reference Guide
91
Chapter 10 Wireless LAN Profiles
Table 33 Command Summary: Radio Profile (continued)
COMMANDDESCRIPTION
[no] ssid-profile
wlan_interface_index ssid_profile
tx-mask chain_maskSets the outgoing chain mask rate.
rx-mask chain_maskSets the incoming chain mask rate.
exitExits configuration mode for this profile.
show wlan-monitor-profile {all |
monitor_profile_name}
wlan-monitor-profile rename
monitor_profile_name1
monitor_profile_name2
[no] wlan-monitor-profile
monitor_profile_name
[no] activateMakes this profile active or inactive.
country-code country_codeSets the country where the NXC is located/installed.
scan-method scan_methodSets the channel scanning method for this profile.
[no] 2g-scan-channel
wireless_channel_2g
[no] 5g-scan-channel
wireless_channel_5g
scan-dwell <100..1000>Sets the duration in milliseconds that the device using
exitExits configuration mode for this profile.
Assigns an SSID profile to this radio profile. Requires an
existing SSID profile. Use the no parameter to disable it.
Displays all monitor profiles or just the specified one.
Gives an existing monitor profile
(monitor_profile_name1) a new name
(monitor_profile_name2).
Enters configuration mode for the specified monitor
profile. Use the no parameter to remove the specified
profile.
By default, this is enabled.
The available channels vary depending on the country
you selected. Be sure to select the correct/same country
for both radios on an AP and all connected APs, in order
to prevent roaming failure and interference to other
systems.
country_code: 2-letter country-codes, such as TW, DE,
or FR.
Sets the broadcast band for this profile in the 2.4 Ghz
frequency range. Use the no parameter to disable it.
Sets the broadcast band for this profile in the 5 GHz
frequency range. Use the no parameter to disable it.
this profile scans each channel.
10.2.1 AP Radio & Monitor Profile Commands Example
The following example shows you how to set up the radio profile named ‘RADIO01’, activate
it, and configure it to use the following settings:
• 2.4G band with channel 6
• channel width of 20MHz
• a DTIM period of 2
• a beacon interval of 100ms
• AMPDU frame aggregation enabled
• an AMPDU buffer limit of 65535 bytes
• an AMPDU subframe limit of 64 frames
• AMSDU frame aggregation enabled
• an AMSDU buffer limit of 4096
92
NXC CLI Reference Guide
Chapter 10 Wireless LAN Profiles
• block acknowledgement enabled
• a short guard interval
• an output power of 100%
It will also assign the SSID profile labeled ‘default’ in order to create WLAN VAP (wlan-1-1)
functionality within the radio profile.
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 34 Input Values for General SSID Profile Commands
LABELDESCRIPTION
ssid_profile_nameThe SSID profile name. You may use 1-31 alphanumeric characters,
underscores (
number. This value is case-sensitive.
ssidThe SSID broadcast name. You may use 1-32 alphanumeric
characters, underscores (_), or dashes (-). This value is case-sensitive.
wlan_qosSets the type of QoS the SSID should use.
disable: Turns off QoS for this SSID.
wmm: Turns on QoS for this SSID. It automatically assigns Access
Categories to packets as the device inspects them in transit.
wmm_be: Assigns the “best effort” Access Category to all traffic moving
through the SSID regardless of origin.
wmm_bk: Assigns the “background” Access Category to all traffic
moving through the SSID regardless of origin.
wmm_vi: Assigns the “video” Access Category to all traffic moving
through the SSID regardless of origin.
wmm_vo: Assigns the “voice” Access Category to all traffic moving
through the SSID regardless of origin.
vlan_ifaceThe VLAN interface name of the controller (in this case, it is NXC5200).
The maximum VLAN interface number is product-specific; for the NXC,
the number is 512.
_), or dashes (-), but the first character cannot be a
NXC CLI Reference Guide
93
Chapter 10 Wireless LAN Profiles
Table 34 Input Values for General SSID Profile Commands (continued)
LABELDESCRIPTION
securityprofileAssigns an existing security profile to the SSID profile. You may use 1-
31 alphanumeric characters, underscores (
character cannot be a number. This value is case-sensitive.
macfilterprofileAssigns an existing MAC filter profile to the SSID profile. You may use
1-31 alphanumeric characters, underscores (_), or dashes (-), but the
first character cannot be a number. This value is case-sensitive.
description2Sets the description of the profile. You may use up to 60 alphanumeric
characters, underscores (
_), or dashes (-). This value is case-sensitive.
_), or dashes (-), but the first
The following table describes the commands available for SSID profile management. You
must use the
configure terminal command to enter the configuration mode before you
can use these commands.
Table 35 Command Summary: SSID Profile
COMMANDDESCRIPTION
show wlan-ssid-profile {all |
ssid_profile_name}
wlan-ssid-profile rename
ssid_profile_name1 ssid_profile_name2
[no] wlan-ssid-profile ssid_profile_nameEnters configuration mode for the specified SSID profile.
[no] block-intraEnables intra-BSSID traffic blocking. Use the no
data-forward {localbridge | tunnel
vlan_iface}
downlink-rate-limit data_rateSets the maximum incoming transmission data rate
[no] hidePrevents the SSID from being publicly broadcast. Use the
[no] l2isolation l2isolationprofileAssigns the specified layer-2 isolation profile to this SSID
[no] macfilter macfilterprofileAssigns the specified MAC filtering profile to this SSID
qos wlan_qosSets the type of QoS used by this SSID.
security securityprofileAssigns the specified security profile to this SSID profile.
ssidSets the SSID. This is the name visible on the network to
uplink-rate-limit data_rateSets the maximum outgoing transmission data rate
Displays the SSID profile(s).
all: Displays all profiles for the selected operating mode.
ssid_profile_name: Displays the specified profile for
the selected operating mode.
Gives an existing SSID profile (ssid_profile_name1)
a new name (ssid_profile_name2).
Use the no parameter to remove the specified profile.
parameter to disable it in this profile.
By default this is disabled.
Sets the data forwarding mode used by this SSID.
The default is localbridge.
(either in mbps or kbps) on a per-station basis.
no parameter to re-enable public broadcast of the SSID
in this profile.
By default this is disabled.
profile. Use the no parameter to remove it.
profile. Use the no parameter to remove it.
By default, no MAC filter is assigned.
wireless clients. Enter up to 32 characters, spaces and
underscores are allowed.
vlan-id <1..4094>Applies to each SSID profile that uses localbridge. If
the VLAN ID is equal to the AP’s native VLAN ID then
traffic originating from the SSID is not tagged.
The default VLAN ID is 1.
exitExits configuration mode for this profile.
10.3.1 SSID Profile Example
The following example creates an SSID profile with the name ‘ZyXEL’. It makes the
assumption that both the security profile (SECURITY01) and the MAC filter profile
(MACFILTER01) already exist.
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 36 Input Values for General Security Profile Commands
LABELDESCRIPTION
security_profile_name The security profile name. You may use 1-31 alphanumeric characters,
underscores (
number. This value is case-sensitive.
wep_keySets the WEP key encryption strength. Select either 64bit or 128bit.
wpa_keySets the WPA/WPA2 pre-shared key in ASCII. You may use 8~63
alphanumeric characters. This value is case-sensitive.
wpa_key_64Sets the WPA/WPA2 pre-shared key in HEX. You muse use 64
alphanumeric characters.
secretSets the shared secret used by your network’s RADIUS server.
auth_methodThe authentication method used by the security profile.
_), or dashes (-), but the first character cannot be a
NXC CLI Reference Guide
95
Chapter 10 Wireless LAN Profiles
The following table describes the commands available for security profile management. You
must use the
configure terminal command to enter the configuration mode before you
can use these commands.
Table 37 Command Summary: Security Profile
COMMANDDESCRIPTION
show wlan-security-profile {all |
security_profile_name}
wlan-security-profile rename
security_profile_name1
security_profile_name2
[no] wlan-security-profile
security_profile_name
description descriptionSets the description for the profile. You may use up to 60
[no] dot1x-eapEnables 802.1x secure authentication. Use the no
[no] dot11wData frames in 802.11 WLANs can be encrypted and
dot11w-op <1..2> Sets whether wireless clients have to support
eap {external | internal auth_method}Sets the 802.1x authentication method.
group-key <30..30000>Sets the interval (in seconds) at which the AP updates the
idle <30..30000>Sets the idle interval (in seconds) that a client can be idle
Displays the security profile(s).
all: Displays all profiles for the selected operating mode.
security_profile_name: Displays the specified
profile for the selected operating mode.
Gives existing security profile
(security_profile_name1) a new name,
(security_profile_name2).
Enters configuration mode for the specified security
profile. Use the no parameter to remove the specified
profile.
alphanumeric characters, underscores (_), or dashes (-).
This value is case-sensitive
parameter to disable it.
authenticated with WEP, WPA or WPA2. But 802.11
management frames, such as beacon/probe response,
association request, association response, deauthentication and disassociation are always
unauthenticated and unencrypted. IEEE 802.11w
Protected Management Frames allows APs to use the
existing security mechanisms (encryption and
authentication methods defined in IEEE 802.11i WPA/
WPA2) to protect management frames. This helps
prevent wireless DoS attacks.
Enables management frame protection (MFP) to add
security to 802.11 management frames. Use the no
parameter to disable it.
management frame protection in order to access the
wireless network.
1: if you do not require the wireless clients to support
MFP. Management frames will be encrypted if the clients
support MFP.
2: wireless clients must support MFP in order to join the
AP’s wireless network.
group WPA/WPA2 encryption key.
The default is 3000.
before authentication is discontinued.
The default is 300.
[no] mac-auth activateMAC authentication has the AP use an external server to
authenticate wireless clients by their MAC addresses.
Users cannot get an IP address if the MAC authentication
fails. The no parameter turns it off.
RADIUS servers can require the MAC address in the
wireless client’s account (username/password) or Calling
Station ID RADIUS attribute. See Section 22.2.4.1 on
page 147 for a MAC authentication example.
mac-auth auth-method auth_methodSets the authentication method for MAC authentication.
mac-auth case account {upper | lower}Sets the case (upper or lower) the external server
mode {none | wep | wpa2 | wpa2-mix}Sets the security mode for this profile.
wep <64 | 128> default-key <1..4>Sets the WEP encryption strength (64 or 128) and the
wep-auth-type {open | share}Sets the authentication key type to either open or share.
requires for using MAC addresses as the account
username and password.
For example, use mac-auth case account upper
and mac-auth delimiter account dash if you
need to use a MAC address formatted like 00-11-AC-01A0-11 as the username and password.
Sets the case (upper or lower) the external server
requires for letters in MAC addresses in the Calling
Station ID RADIUS attribute.
Specify the separator the external server uses for the
two-character pairs within MAC addresses used as the
account username and password.
For example, use mac-auth case account upper
and mac-auth delimiter account dash if you
need to use a MAC address formatted like 00-11-AC-01A0-11 as the username and password.
Select the separator the external server uses for the pairs
in MAC addresses in the Calling Station ID RADIUS
attribute.
default key value (1 ~ 4).
If you select WEP-64 enter 10 hexadecimal digits in the
range of “A-F”, “a-f” and “0-9” (for example,
0x11AA22BB33) for each Key used; or enter 5 ASCII
characters (case sensitive) ranging from “a-z”, “A-Z” and
“0-9” (for example, MyKey) for each Key used.
If you select WEP-128 enter 26 hexadecimal digits in the
range of “A-F”, “a-f” and “0-9” (for example,
0x00112233445566778899AABBCC) for each Key used;
or enter 13 ASCII characters (case sensitive) ranging
from “a-z”, “A-Z” and “0-9” (for example,
MyKey12345678) for each Key used.
You can save up to four different keys. Enter the
default-key (1 ~ 4) to save your WEP to one of those
four available slots.
auto: This automatically chooses the best available
cipher based on the cipher in use by the wireless client
that is attempting to make a connection.
tkip: This is the Temporal Key Integrity Protocol
encryption method added later to the WEP encryption
protocol to further secure. Not all wireless clients may
support this.
aes: This is the Advanced Encryption Standard
encryption method, a newer more robust algorithm than
TKIP Not all wireless clients may support this.
wpa-psk {wpa_key | wpa_key_64}Sets the WPA/WPA2 pre-shared key.
[no] wpa2-preauthEnables pre-authentication to allow wireless clients to
switch APs without having to re-authenticate their
network connection. The RADIUS server puts a
temporary PMK Security Authorization cache on the
wireless clients. It contains their session ID and a preauthorized list of viable APs.
Use the no parameter to disable this.
[no] reauth <30..30000>Sets the interval (in seconds) between authentication
requests.
The default is 0.
[no] server-auth <1..2> activateActivates server authentication. Use the no parameter to
server-auth <1..2> ip address
ipv4_address port <1..65535> secret
secret
[no] server-auth <1..2>Clears the server authentication setting.
exitExits configuration mode for this profile.
deactivate.
Sets the IPv4 address, port number and shared secret of
the RADIUS server to be used for authentication.
10.4.1 Security Profile Example
The following example creates a security profile with the name ‘SECURITY01’..
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 38 Input Values for General MAC Filter Profile Commands
LABELDESCRIPTION
macfilter_profile_nameThe MAC filter profile name. You may use 1-31 alphanumeric
description2Sets the description of the profile. You may use up to 60
characters, underscores (
cannot be a number. This value is case-sensitive.
alphanumeric characters, underscores (_), or dashes (-). This value
is case-sensitive.
The following table describes the commands available for security profile management. You
must use the
configure terminal command to enter the configuration mode before you
can use these commands.
Table 39 Command Summary: MAC Filter Profile
COMMANDDESCRIPTION
show wlan-macfilter-profile {all |
macfilter_profile_name}
wlan-macfilter-profile rename
macfilter_profile_name1
macfilter_profile_name2
[no] wlan-macfilter-profile
macfilter_profile_name
filter-action {allow | deny}Permits the wireless client with the MAC addresses in this
[no] MAC description description2Sets the description of this profile. Enter up to 60
exitExits configuration mode for this profile.
Displays the security profile(s).
all: Displays all profiles for the selected operating mode.
macfilter_profile_name: Displays the specified
profile for the selected operating mode.
Gives an existing security profile
(macfilter_profile_name1) a new name
(macfilter_profile_name2).
Enters configuration mode for the specified MAC filter
profile. Use the no parameter to remove the specified
profile.
profile to connect to the network through the associated
SSID; select deny to block the wireless clients with the
specified MAC addresses.
The default is set to deny.
characters. Spaces and underscores allowed.
_), or dashes (-), but the first character
10.5.1 MAC Filter Profile Example
The following example creates a MAC filter profile with the name ‘MACFILTER01’..
Router(config)# wlan-macfilter-profile MACFILTER01
Router(config-macfilter-profile)# filter-action deny
Router(config-macfilter-profile)# MAC 01:02:03:04:05:06 description MAC01
Router(config-macfilter-profile)# MAC 01:02:03:04:05:07 description MAC02
Router(config-macfilter-profile)# MAC 01:02:03:04:05:08 description MAC03
Router(config-macfilter-profile)# exit
Router(config)#
NXC CLI Reference Guide
99
Chapter 10 Wireless LAN Profiles
10.6 Layer-2 Isolation Profile Commands
The following table identifies the values required for many of these commands. Other input
values are discussed with the corresponding commands.
Table 40 Input Values for General Layer-2 Isolation Profile Commands
LABELDESCRIPTION
l2isolation_profile_n
ame
macThe Ethernet MAC address of the device that you want to allow to be
descriptionSets the description of the profile. You may use up to 60 alphanumeric
The following table describes the commands available for layer-2 isolation profile
management. You must use the
mode before you can use these commands.
[no] mac description descriptionSets a MAC address associated with this profile and the
The layer-2 isolation profile name. You may use 1-31 alphanumeric
characters, underscores (
be a number. This value is case-sensitive.
accessed by other devices in the SSID to which the layer-2 isolation
profile is applied. Enter 6 hexidecimal pairs separated by colons. You
can use 0-9, a-z and A-Z.
characters, underscores (
_), or dashes (-), but the first character cannot
_), or dashes (-). This value is case-sensitive.
configure terminal command to enter the configuration
Displays the layer-2 isolation profile(s).
all: Displays all profiles.
l2isolation_profile_name: Displays the specified
profile.
Gives an existing layer-2 isolation profile
(l2isolation_profile_name1) a new name
(l2isolation_profile_name2).
Enters configuration mode for the specified layer-2
isolation profile. Use the no parameter to remove the
specified profile.
profile description. Use the no parameter to clear the
settings.
100
Note: If a device’s MAC addresses is NOT
listed in a layer-2 isolation profile, it is
blocked from communicating with other
devices in an SSID on which layer-2
isolation is enabled.
description descriptionSets the description for the profile.
exitExits configuration mode for this profile.
NXC CLI Reference Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.