IMPORTANT!
READ CAREFULLY BEFORE USE.
KEEP THIS GUIDE FOR FUTURE REFERENCE.
This is a Reference Guide for a series of products intended for people who want to configure the Zyxel
Device via Command Line Interface (CLI).
Note: Some commands or command options in this guide may not be available in your
product. See your product's User’s Guide for a list of supported features. Every effort has
been made to ensure that the information in this guide is accurate.
Note: The version number on the cover page refers to the latest firmware version supported
by the Zyxel Device. This guide applies to versions 4.20, 4.21, 4.22, 4.30, 5.00, 5.10, 5.20,
5.25, 5.30, 5.40, 6.00, 6.10, 6.20, and 6.25 at the time of writing.
How To Use This Guide
1Read Chapter 2 on page 19 for how to access and use the CLI (Command Line Interface).
2Read Chapter 3 on page 30 to learn about the CLI user and privilege modes.
Do not use commands not documented in this guide.
Related Documentation
•Quick Start Guide
The Quick Start Guide shows how to connect the Zyxel Device and access the Web Configurator.
• User’s Guide
The User’s Guide explains how to use the Web Configurator to configure the Zyxel Device.
Note: It is recommended you use the Web Configurator to configure the Zyxel Device.
Icons Used in Figures
Figures in this guide may use the following generic icons. The Zyxel Device icon is not an exact
representation of your device.
Status ......................................................................... ............................................................................. 36
Storm Control ........................................................................................................................................ 46
AP Management .................................................................................................................................. 55
Wireless LAN Profiles .............................................................................................................................. 63
Rogue AP ............................................................................................................................................... 81
Bluetooth ............................................................................................................................................... 91
System ................................................................ .................................................................................... 96
System Remote Management .......................................................................................................... 101
AAA Server .......................................................................................................................................... 108
30.3.1 Application Watchdog Commands Example ............................................................... 157
List of Commands (Alphabetical) ..................................................................................................158
NWA/WAC/WAX Series CLI Reference Guide
10
PART I
Introduction
11
Getting to Know your Zyxel
1.1 Overview
Your Zyxel Device is a wireless AP (Access Point). It extends the range of your existing wired network
without additional wiring, providing easy network access to mobile users.
You can set the Zyxel Device to operate in either standalone AP or managed AP mode. When the Zyxel
Device is in standalone AP mode, it can serve as a normal AP, as an RF monitor to search for rouge APs
to help eliminate network threats (if it supports monitor mode and rogue APs detection/containment), or
even as a root AP or a wireless repeater to esta blish wireless links with other APs in a WDS (Wireless
Distribution System). A WDS is a wireless connection between two or more APs.
CHAPTER 1
Device
Your Zyxel Device’s business-class reliability, SMB features, and centralized wireless management make it
ideally suited for advanced service delivery in mission-critical networks. It uses Multiple BSSID and VLAN
to provide simultaneous independent virtual APs. Additionally, innovations in roaming technology and
QoS features eliminate voice call disruptions.
The Zyxel Device controls network access with Media Access Control (MAC) address filtering, and rogue
Access Point (AP) detection. It also provides a high level of network traffic security, supporting IEEE
802.1x, Wi-Fi Protected Access 2 and Wired Equivalent Privacy (WEP) data encryption.
1.1.1 Product Features
The following tables list model specific features.
Table 1 Zyxel Device 1000/5000 Series Comparison Table
FEATURES
Supported
Wireless
Standards
Supported
Frequency
Bands
NWA1123-
AC
IEEE
802.11a
IEEE
802.11b
IEEE
802.11g
IEEE
802.11n
IEEE
802.11ac
2.4 GHz
5 GHz
V2
NWA1123
-AC PRO
IEEE
802.11a
IEEE
802.11b
IEEE
802.11g
IEEE
802.11n
IEEE
802.11ac
2.4 GHz
5 GHz
NWA1123
-AC HD
IEEE
802.11a
IEEE
802.11b
IEEE
802.11g
IEEE
802.11n
IEEE
802.11ac
2.4 GHz
5 GHz
NWA110AX
NWA210AX
IEEE
802.11a
IEEE
802.11b
IEEE
802.11g
IEEE
802.11n
IEEE
802.11ac
IEEE
802.11ax
2.4 GHz
5 GHz
NWA1302
-AC
IEEE
802.11a
IEEE
802.11b
IEEE
802.11g
IEEE
802.11n
IEEE
802.11ac
2.4 GHz
5 GHz
NWA5123
-AC
IEEE
802.11a
IEEE
802.11b
IEEE
802.11g
IEEE
802.11n
IEEE
802.11ac
2.4 GHz
5 GHz
NWA5123
-AC HD
IEEE
802.11a
IEEE
802.11b
IEEE
802.11g
IEEE
802.11n
IEEE
802.11ac
2.4 GHz
5 GHz
WAC5302
D-S
IEEE
802.11a
IEEE
802.11b
IEEE
802.11g
IEEE
802.11n
IEEE
802.11ac
2.4 GHz
5 GHz
NWA/WAC/WAX Series CLI Reference Guide
12
Chapter 1 Getting to Know your Zyxel Device
Table 1 Zyxel Device 1000/5000 Series Comparison Table
FEATURES
Available
Security Modes
Number of SSID
Profiles
Number of
Wireless Radios
Monitor Mode
& Rogue APs
Containment
Rogue AP
Detection
WDS (Wireless
Distribution
System) - Root
AP & Repeater
Modes
Tunnel
Forwarding
Mode
Layer-2
Isolation
Supported PoE
Standards
Power
Detection
External
Antennas
Internal
Antennas
Antenna
Switch
Console Port
LED LocatorYesYesYesYesYesYesYesYes
LED
Suppression
AC (AP
Controller)
Discovery
NWA1123-
AC
None
WEP
WPA2
WPA2-MIX
WPA2-PSK
WPA2-
PSK-MIX
6464646464646464
222 2 2222
A
NoNoNoNoNoYesNoNo
YesYesYesYesYesYesYesYes
YesYesYesYesYesYesYesYes
NoNoNoNoNoNoYesNo
YesYesYesYesYesYesYesYes
IEEE
802.3af
IEEE
802.3at
NoNoYesYesYesNoYesYes
NoNoNoNoNoNoNoNo
YesYesYesYesYesYesYesYes
No
4-Pin Serial
YesYesYesYesYesYesYesYes
NoNoNoNoNoYesYesYes
V2
NWA1123
-AC PRO
None
WEP
WPA2
WPA2-
MIX
WPA2-PSK
WPA2-
PSK-MIX
IEEE
802.3af
IEEE
802.3at
Yes
(per radio
+ physical
switch)
4-Pin
Serial
NWA1123
-AC HD
None
WEP
WPA2
WPA2-
MIX
WPA2-PSK
WPA2-
PSK-MIX
IEEE
802.3af
IEEE
802.3at
NoNoNoNoNoNo
4-Pin
Serial
NWA110AX
NWA210AX
None
WEP
WPA2
WPA2-MIX
WPA2-PSK
WPA2-PSK-
MIX
Enhanced-
open
WPA3-
enterprise
WPA3-
personal
IEEE 802.3af
IEEE 802.3at
4-Pin Serial
NWA1302
-AC
None
WEP
WPA2
WPA2-
MIX
WPA2-
PSK
WPA2-
PSK-MIX
IEEE
802.3af
IEEE
802.3at
4-Pin
Serial
NWA5123
-AC
None
WEP
WPA2
WPA2-
MIX
WPA2-
PSK
WPA2-
PSK-MIX
IEEE
802.3af
IEEE
802.3at
4-Pin
Serial
NWA5123
-AC HD
None
WEP
WPA2
WPA2-
MIX
WPA2-
PSK
WPA2-
PSK-MIX
IEEE
802.3af
IEEE
802.3at
4-Pin
Serial
WAC5302
None
WPA2
WPA2WPA2WPA2-
PSK-MIX
802.3af
802.3at
Serial
D-S
WEP
MIX
PSK
IEEE
IEEE
4-Pin
NWA/WAC/WAX Series CLI Reference Guide
13
Chapter 1 Getting to Know your Zyxel Device
Table 1 Zyxel Device 1000/5000 Series Comparison Table
FEATURES
NebulaFlex
PRO
NCC DiscoveryYesYesYesYesYesNoYesNo
802.11r Fast
Roaming
Support
802.11k/v
Assisted
Roaming
Bluetooth Low
Energy (BLE)
USB Port for BLENoNoNoNoNoNoNoYes
Ethernet Storm
Control
GroundingNoNoYesYesNoNoYesNo
Maximum
number of log
messages
Firmware
Version
A. For NXC managed devices only. See the NXC User’s Guide for details.
NWA1123-
AC
NoNoNoNoNoNoYesNo
YesYesYesYesYesYesYesYes
YesYesYesYesYesYesYesYes
NoNoNoNoNoNoNoYes
NoNoYesYesNoNoYesNo
6.106.256.256.256.256.106.256.10
V2
NWA1123
-AC PRO
NWA1123
-AC HD
NWA110AX
NWA210AX
512 event logs
NWA1302
-AC
NWA5123
-AC
NWA5123
-AC HD
WAC5302
256 event
logs and
1 debug
D-S
logs
The following tables show the differences between each Zyxel Device model.
Table 2 Zyxel Device 1000/5000 Series Comparison Table
802.11k/v Assisted RoamingYesYesYes
Bluetooth Low Energy (BLE)NoNoYes
USB Port for BLENoNoNo
Ethernet Storm ControlYesYesYes
GroundingYesYesYes
Maximum number of log
messages
Firmware Version6.256.256.25
A. For NXC managed devices only. See the NXC User’s Guide for details.
YesYesYes
YesYesYes
512 event logs
NWA/WAC/WAX Series CLI Reference Guide
18
Command Line Interface
This chapter describes how to access and use the CLI (Command Line Interface).
2.1 Overview
If you have problems with your Zyxel Device, customer support may request that you issue some of these
commands to assist them in troubleshooting.
Use of undocumented commands or misconfiguration can damage the
Zyxel Device and possibly render it unusable.
2.1.1 The Configuration File
CHAPTER 2
When you configure the Zyxel Device using either the CLI (Command Line Interface) or the web
configurator, the settings are saved as a series of commands in a configuration file on the Zyxel Device.
You can store more than one configuration file on the Zyxel Device. However, only one configuration file
is used at a time.
You can perform the following with a configuration file:
• Back up Zyxel Device configuration once the Zyxel Device is set up to work in your network.
• Restore Zyxel Device configuration.
• Save and edit a configuration file and upload it to multiple Zyxel Devices in your network to have the
same settings.
Note: You may also edit a configuration file using a text editor.
2.2 Accessing the CLI
You can access the CLI using a terminal emulation program on a computer connected to the console
port, or access the Zyxel Device using Telnet or SSH (Secure SHell).
Note: The console port is not available in every model. Please check the User’s Guide or
datasheet, or refer to the product page at www.zyxel.com to see if your Zyxel Device
has a console port.
Note: The Zyxel Device might force you to log out of your session if reauthentication time,
lease time, or idle timeout is reached. See Chapter 9 on page 50 for more information
about these settings.
NWA/WAC/WAX Series CLI Reference Guide
19
2.2.1 Console Port
The default settings for the console port are as follows.
Table 5 Managing the Zyxel Device: Console Port
SETTINGVALUE
Speed115200 bps
Data Bits8
ParityNone
Stop Bit1
Flow ControlOff
When you turn on your Zyxel Device, it performs several internal tests as well as line initialization. You can
view the initialization information using the console port.
• Garbled text displays if your terminal emulation program’s speed is set lower than the Zyxel Device’s.
• No text displays if the speed is set higher than the Zyxel Device’s.
• If changing your terminal emulation program’s speed does not get anything to display, restart the
Zyxel Device.
• If restarting the Zyxel Device does not get anything to display, contact your local customer support.
After the initialization, the login screen displays.
Figure 2 Login Screen
Welcome to NWA5123-AC-HD
Username:
Enter the user name and password at the prompts.
Note: The default login username is admin and password is 1234. The username and password
2.2.2 Telnet
Use the following steps to Telnet into your Zyxel Device.
are case-sensitive.
1If your computer is connected to the Zyxel Device over the Internet, skip to the next step. Make sure your
computer IP address and the Zyxel Device IP address are on the same subnet.
NWA/WAC/WAX Series CLI Reference Guide
20
2In Windows, click Start (usually in the bottom left corner) and Run. Then type telnet and the Zyxel
Device’s IP address. For example, enter
address).
3Click OK. A login screen displays. Enter the user name and password at the prompts.
Note: The default login username is admin and password is 1234. The username and password
are case-sensitive.
2.2.3 SSH (Secure SHell)
You can use an SSH client program to access the CLI. The following figure shows an example using a
text-based SSH client program. Refer to the documentation that comes with your SSH program for
information on using it.
Note: The default login username is admin and password is 1234. The username and password
are case-sensitive.
Figure 3 SSH Login Example
C:\>ssh2 admin@192.168.1.2
Host key not found from database.
Key fingerprint:
xolor-takel-fipef-zevit-visom-gydog-vetan-bisol-lysob-cuvun-muxex
You can get a public key's fingerprint by running
% ssh-keygen -F publickey.pub
on the keyfile.
Are you sure you want to continue connecting (yes/no)? yes
Chapter 2 Command Line Interface
telnet 192.168.1.2 (the default static management IP
Host key saved to C:/Documents and Settings/user/Application Data/SSH/
hostkeys/
ey_22_192.168.1.2.pub
host key for 192.168.1.2, accepted by user Tue Aug 09 2005 07:38:28
admin's password:
Authentication successful.
2.3 How to Find Commands in this Guide
You can simply look for the feature chapter to find commands. In addition, you can use the List of
Commands (Alphabetical) at the end of the guide. This section lists the commands in alphabetical
order that they appear in this guide.
If you are looking at the CLI Reference Guide electronically, you might have additional options (for
example, bookmarks or Find...) as well.
2.4 How Commands Are Explained
Each chapter explains the commands for one keyword. The chapters are divided into the following
sections.
NWA/WAC/WAX Series CLI Reference Guide
21
Chapter 2 Command Line Interface
2.4.1 Background Information
Note: See the User’s Guide for background information about most features.
This section provides background information about features that you cannot configure in the web
configurator. In addition, this section identifies related commands in other chapters.
2.4.2 Command Input Values
This section lists common input values for the commands for the feature in one or more tables
2.4.3 Command Summary
This section lists the commands for the feature in one or more tables.
2.4.4 Command Examples
This section contains any examples for the commands in this feature.
2.4.5 Command Syntax
The following conventions are used in this User’s Guide.
• A command or keyword in courier new must be entered literally as shown. Do not abbreviate.
• Values that you need to provide are in italics.
• Required fields that have multiple choices are enclosed in curly brackets
• A range of numbers is enclosed in angle brackets <>.
• Optional fields are enclosed in square brackets
• The | symbol means OR.
2.4.6 Changing the Password
It is highly recommended that you change the password for accessing the Zyxel Device. See Section 9.2
on page 50 for the appropriate commands.
{}.
[].
NWA/WAC/WAX Series CLI Reference Guide
22
2.5 CLI Modes
You run CLI commands in one of several modes.
Table 6 CLI Modes
What User users
can do
What Limited-Admin users can
do
What Admin users
can do
How you enter itLog in to the Zyxel
What the prompt
looks like
How you exit itType exitType disableType exitType exit
Chapter 2 Command Line Interface
USERPRIVILEGECONFIGURATIONSUB-COMMAND
• Look at (but not
run) available
commands
• Look at system
information (like
Status screen)
•Run basic
diagnostics
• Look at system
information (like
Status screen)
•Run basic
diagnostics
Device
Router>Router#Router(config)#
Unable to accessUnable to accessUnable to access
•Look at system
information (like
Status screen)
•Run basic
diagnostics
•Look at system
information (like
Status screen)
•Run basic
diagnostics
Type enable in User
mode
Unable to accessUnable to access
• Configure simple
features (such as
an address
object)
• Create or remove
complex parts
(such as an
interface)
Type configure
terminal in User or
Privilege mode
• Configure
complex parts
(such as an
interface) in the
Zyxel Device
Type the command
used to create the
specific part in
Configuration mode
(varies by part)
Router(configif-brg)#
...
See Chapter 9 on page 50 for more information about the user types. User users can only log in, look at
(but not run) the available commands in User mode, and log out. Limited-Admin users can look at the
configuration in the web configurator and CLI, and they can run basic diagnostics in the CLI. Admin
users can configure the Zyxel Device in the web configurator or CLI.
At the time of writing, there is not much difference between User and Privilege mode for admin users.
This is reserved for future use.
2.6 Shortcuts and Help
2.6.1 List of Available Commands
A list of valid commands can be found by typing ? or [TAB] at the command prompt. To view a list of
available commands within a command group, enter
<command> ? or <command> [TAB].
NWA/WAC/WAX Series CLI Reference Guide
23
Chapter 2 Command Line Interface
Figure 4 Help: Available Commands Example 1
Router> ?
<cr>
apply
atse
clear
configure
------------------[Snip]-------------------shutdown
telnet
test
traceroute
wlan-report
write
Router>
Figure 5 Help: Available Command Example 2
Router> show ?
<wlan ap interface>
aaa
account
app-watch-dog
apply
arp-table
------------------[Snip]-------------------wlan-security-profile
wlan-ssid-profile
wtp-logging
Router> show
2.6.2 List of Sub-commands or Required User Input
To view detailed help information for a command, enter <command> <sub command> ?.
Figure 6 Help: Sub-command Information Example
Router(config)# ip telnet server ?
;
<cr>
port
rule
|
Router(config)# ip telnet server
Figure 7 Help: Required User Input Example
Router(config)# ip telnet server port ?
<1..65535>
Router(config)# ip telnet server port
2.6.3 Entering Partial Commands
The CLI does not accept partial or incomplete commands. You may enter a unique part of a command
and press
[TAB] to have the Zyxel Device automatically display the full command.
NWA/WAC/WAX Series CLI Reference Guide
24
Chapter 2 Command Line Interface
For example, if you enter config and press [TAB] , the full command of configure automatically
displays.
If you enter a partial command that is not unique and press
commands that start with the partial command.
Figure 8 Non-Unique Partial Command Example
Router# c [TAB]
clear configure copy
Router# co [TAB]
configure copy
2.6.4 Entering a ? in a Command
Typing a ? (question mark) usually displays help information. However, some commands allow you to
input a ?, for example as part of a string. Press [CTRL+V] on your keyboard to enter a ? without the Zyxel
Device treating it as a help query.
2.6.5 Command History
The Zyxel Device keeps a list of commands you have entered for the current CLI session. You can use
any commands in the history again by pre s s i ng th e up ( ) or down () arrow key to scroll through the
previously used commands and press
2.6.6 Navigation
[TAB], the Zyxel Device displays a list of
[ENTER].
Press [CTRL]+A to move the cursor to the beginning of the line. Press [CTRL]+E to move the cursor to the
end of the line.
2.6.7 Erase Current Command
Press [CTRL]+U to erase whatever you have currently typed at the prompt (before pressing [ENTER]).
2.6.8 The no Commands
When entering the no commands described in this document, you may not need to type the whole
command. For example, with the “[no] mss <536..1452>” command, you use “mss 536” to specify
the MSS value. But to disable the MSS setting, you only need to type “no mss” instead of “no mss 536”.
2.7 Input Values
You can use the ? or [TAB] to get more information about the next input value that is required for a
command. In some cases, the next input value is a string whose length and allowable characters may
NWA/WAC/WAX Series CLI Reference Guide
25
Chapter 2 Command Line Interface
not be displayed in the screen. For example, in the following example, the next input value is a string
called
<description>.
Router# configure terminal
Router(config)# interface lan
Router(config-if-brg)# description ?
<description>
The following table provides more information about input values like <description>.
Table 7 Input-Value Formats for Strings in CLI Commands
TAG# VALUESLEGAL VALUES
*1*
all--ALL
authentication key32-40
16-20
Used in MD5 authentication keys and text authentication key
0-16alphanumeric or _-
Used in text authentication keys
0-8alphanumeric or _-
certificate name1-31alphanumeric or ;`~!@#$%^&()_+[\]{}',.=-
community string0-63alphanumeric or .-
connection_id1+alphanumeric or -_:
contact1-61alphanumeric, spaces, or '()+,/:=?;!*#@$_%-.
country code0 or 2alphanumeric
custom signature file
name
descriptionUsed in keyword criteria for log entries
distinguished name1-511alphanumeric, spaces, or .@=,_-
domain name0+lower-case letters, numbers, or .-
email1-63alphanumeric or .@_-
e-mail1-64alphanumeric or .@_-
encryption key16-64
0-30alphanumeric or _-.
1-64alphanumeric, spaces, or '()+,/:=?;!*#@$_%-.
Used in other commands
1-61alphanumeric, spaces, or '()+,/:=?;!*#@$_%-
Used in ip dns server
1-248alphanumeric or .-
Used in domainname, ip dhcp pool, and ip domain
1-255alphanumeric or ._-
8-32
“0x” or “0X” + 32-40 hexadecimal values
alphanumeric or ;|`~!@#$%^&*()_+\\{}':,./<>=-
first character: alphanumeric or -
first character: letter
first character: alphanumeric or -
first character: alphanumeric or -
“0x” or “0X” + 16-64 hexadecimal values
alphanumeric or ;\|`~!@#$%^&*()_+\\{}':,./
<>=-
NWA/WAC/WAX Series CLI Reference Guide
26
Chapter 2 Command Line Interface
Table 7 Input-Value Formats for Strings in CLI Commands (continued)
TAG# VALUESLEGAL VALUES
file name0-31alphanumeric or _-
filter extension1-256alphanumeric, spaces, or '()+,/:=?;!*#@$_%.-
fqdnUsed in ip dns server
1-253alphanumeric or .-
first character: alphanumeric or -
Used in ip, time server, device HA, certificates, and
interface ping check
1-255alphanumeric or .-
first character: alphanumeric or -
full file name0-256alphanumeric or _/.-
hostnameUsed in hostname command
1-64alphanumeric or .-_
first character: alphanumeric or -
Used in other commands
1-253alphanumeric or .-
first character: alphanumeric or -
import configuration
file
import shell script1-
initial string1-64alphanumeric, spaces, or '()+,/:=!*#@$_%-.&
mail server fqdnlower-case letters, numbers, or -.
name1-31alphanumeric or _-
notification message1-81alphanumeric, spaces, or '()+,/:=?;!*#@$_%-
password: less than 15
chars
password: less than 8
chars
passwordUsed in user and ip
phone number1-20numbers or ,+
126+”.conf”
26+”.zysh”
1-15alphanumeric or `~!@#$%^&*()_\-+={}|\;:'<,>./
1-8alphanumeric or ;/?:@&=+$\.-_!~*'()%,#$
1-63alphanumeric or `~!@#$%^&*()_-+={}|\;:'<,>./
Used in e-mail log profile SMTP authentication
1-63alphanumeric or `~!@#$%^&*()_-+={}|\;:'<>./
Used in device HA synchronization
1-63alphanumeric or ~#%^*_-={}:,.
Used in registration
6-20alphanumeric or .@_-
alphanumeric or ;`~!@#$%^&()_+[]{}',.=add “.conf” at the end
alphanumeric or ;`~!@#$%^&()_+[]{}',.=add “.zysh” at the end
16 upper-case letters or numbers
NWA/WAC/WAX Series CLI Reference Guide
27
Chapter 2 Command Line Interface
Table 7 Input-Value Formats for Strings in CLI Commands (continued)
TAG# VALUESLEGAL VALUES
preshared key16-64“0x” or “0X” + 16-64 hexadecimal values
alphanumeric or ;|`~!@#$%^&*()_+\{}':,./<>=-
profile name1-31alphanumeric or _-
first character: letters or _-
proto name1-16lower-case letters, numbers, or -
protocol name1-31alphanumeric or _-
first character: letters or _-
quoted string less
than 255 chars
quoted string less
than 63 chars
quoted string0+alphanumeric, spaces, or punctuation marks
realm1-253alphanumeric or -_
service name0-63alphanumeric or -_@$./
spi2-8hexadecimal
string less than 15
chars
string: less than 63
chars
string1+alphanumeric or -_@
subject1-61alphanumeric, spaces, or '()+,./:=?;!*#@$_%-
system type0-2hexadecimal
timezone [-+]hh---12 through +12 (with or without “+”)
url1-511alphanumeric or '()+,/:.=?;!*#@$_%-
url“http://”+
user name1-31alphanumeric or _-
username1-31alphanumeric or _-
username6-20alphanumeric or .@_-
user name1+alphanumeric or -_.
user@domainname1-80alphanumeric or .@_-
vrrp group name: less
than 15 chars
1-255alphanumeric, spaces, or ;/?:@&=+$\.-
_!~*'()%,
1-63alphanumeric, spaces, or ;/?:@&=+$\.-_!~*'()%
enclosed in double quotation marks (“)
must put a backslash (\) before double
quotation marks that are part of input value
itself
first character: alphanumeric or -_
used in domain authentication
1-15alphanumeric or -_
1-63alphanumeric or `~!@#$%^&*()_-+={}|\;:'<,>./
alphanumeric or ;/?:@&=+$\.-_!~*'()%,
“https://”+
1-15alphanumeric or _-
starts with “http://” or “https://”
may contain one pound sign (#)
first character: letters or _-
first character: alphanumeric or _domain authorization
registration
logging commands
NWA/WAC/WAX Series CLI Reference Guide
28
Chapter 2 Command Line Interface
Table 7 Input-Value Formats for Strings in CLI Commands (continued)
TAG# VALUESLEGAL VALUES
week-day sequence,
i.e. 1=first,2=second
xauth method1-31alphanumeric or _-
xauth password1-31alphanumeric or ;|`~!@#$%^&*()_+\{}':,./<>=-
mac address0-12 (even
11-4
hexadecimal
number)
for example: xx-xx-xx-xx-xx-xx
2.8 Saving Configuration Changes
Use the write command to save the current configuration to the Zyxel Device.
Note: Always save the changes before you log out after each management session. All
unsaved changes will be lost after the system restarts.
2.9 Logging Out
Enter the exit or end command in configure mode to go to privilege mode.
Enter the
exit command in user mode or privilege mode to log out of the CLI.
NWA/WAC/WAX Series CLI Reference Guide
29
User and Privilege Modes
This chapter describes how to use these two modes.
3.1 User And Privilege Modes
This is the mode you are in when you first log into the CLI. (Do not confuse ‘user mode’ with types of user
accounts the Zyxel Device uses. See Chapter 9 on page 50 for more information about the user types.
‘User’ type accounts can only run ‘exit’ in this mode. However, they may need to log into the device in
order to be authenticated for ‘user-aware’ policies, for example a firewall rule that a particular user is
exempt from.)
Type ‘enable’ to go to ‘privilege mode’. No password is required. All commands can be run from here
except those marked with an asterisk. Many of these commands are for trouble-shooting purposes, for
example the htm (hardware test module) and debug commands. Customer support may ask you to run
some of these commands and send the results if you need assistance troubleshooting your device.
CHAPTER 3
For admin logins, all commands are visible in ‘user mode’ but not all can be run there. The following
table displays which commands can be run in ‘user mode’. All commands can be run in ‘privilege
mode’.
The htm and psm commands are for Zyxel’s internal manufacturing
process.
Table 8 User (U) and Privilege (P) Mode Commands
COMMANDMODEDESCRIPTION
apply
atse
clear
configure
copy
daily-report
debug (*)
delete
details
diag
diag-info
dir
disable
PApplies a configuration file.
U/PDisplays the seed code
U/PClears system or debug logs or DHCP binding.
U/PUse ‘configure terminal’ to enter configuration mode.
PCopies configuration files.
U/PSets how and where to send daily reports and what reports to send.
U/PFor support personnel only! The device needs to have the debug flag enabled.
PDeletes configuration files.
PPerforms diagnostic commands.
PProvided for support personnel to collect internal system information. It is not
recommended that you use these.
PHas the Zyxel Device create a new diagnostic file.
PLists files in a directory.
U/PGoes from privilege mode to user mode
NWA/WAC/WAX Series CLI Reference Guide
30
Chapter 3 User and Privilege Modes
Table 8 User (U) and Privilege (P) Mode Commands (continued)
COMMANDMODEDESCRIPTION
enable
exit
htm
U/PGoes from user mode to privilege mode
U/PGoes to a previous mode or logs out.
U/PGoes to htm (hardware test module) mode for testing hardware components.
You may need to use the htm commands if your customer support Engineer asks
you to during troubleshooting.
Note: These commands are for Zyxel’s internal manufacturing process.
interface
no packet-trace
nslookup
packet-trace
ping
psm
U/PDials or disconnects an interface.
U/PTurns off packet tracing.
U/PResolves an IP address to a host name and vice-versa.
U/PPerforms a packet trace.
U/PPings an IP address or host name.
U/PGoes to psm (product support module) mode for setting product parameters.
You may need to use the htm commands if your customer support Engineer asks
you to during troubleshooting.
Note: These commands are for Zyxel’s internal manufacturing process.
reboot
release
rename
renew
run
setenv
show
shutdown
telnet
test aaa
traceroute
write
PRestarts the device.
PReleases DHCP information from an interface.
PRenames a configuration file.
PRenews DHCP information for an interface.
PRuns a script.
U/PTurns stop-on-error on (terminates booting if an error is found in a configuration
file) or off (ignores configuration file errors and continues booting).
U/PDisplays command statistics. See the associated command chapter in this
guide.
PWrites all d data to disk and stops the system processes. It does not turn off the
power.
U/PEstablishes a connection to the TCP port number 23 of the specified host name
or IP address.
U/PTests whether the specified user name can be success fully authe nticated by an
external authentication server.
PTraces the route to the specified host name or IP address.
PSaves the current configuration to the Zyxel Device. All unsaved changes are
lost after the Zyxel Device restarts.
Subsequent chapters in this guide describe the configuration commands. User/privilege mode
commands that are also configuration commands (for example, ‘show’) are described in more detail in
the related configuration command chapter.
3.1.1 Debug Commands
Debug commands marked with an asterisk (*) are not available when the debug flag is on and are for
Zyxel service personnel use only. The debug commands follow a syntax that is Linux-based, so if there is a
NWA/WAC/WAX Series CLI Reference Guide
31
Chapter 3 User and Privilege Modes
Linux equivalent, it is displayed in this chapter for your reference. You must know a command listed here
well before you use it. Otherwise, it may cause undesired results.
Table 9 Debug Commands
COMMAND SYNTAXDESCRIPTION
debug app show l7protocol
Shows app patrol protocol list
(*)
LINUX COMMAND
EQUIVALENT
> cat /etc/
l7_protocols/
protocol.list
debug ca (*)
debug device-ha (*)
debug gui (*)
debug hardware (*)
debug interface
debug interface ifconfig
Certificate debug commands
Device HA debug commands
Web Configurator related debug commands
Hardware debug commands
Interface debug commands
Shows system interfaces detail
> ifconfig
[interface]
debug ip dns
debug logging
debug manufacture
debug network arpignore (*)
DNS debug commands
System logging debug commands
Manufacturing related debug commands
Enable/Display the ignoring of ARP responses
This chapter describes how to use object reference commands.
4.1 Object Reference Commands
The object reference commands are used to see which configuration settings reference a specific
object. You can use this table when you want to delete an object because you have to remove
references to the object first.
Table 10 show reference Commands
COMMANDDESCRIPTION
show reference object username
[username]
show reference object aaa
authentication [default | profile]
show reference object ca category
{local|remote} [cert_name]
show reference object [wlan-radio-profile]
show reference object [wlan-monitor-profile]
show reference object [wlan-ssid-profile]
show reference object [wlan-security-profile]
show reference object [wlan-macfilter-profile]
Displays which configuration settings reference the specified
user object.
Displays which configuration settings reference the specified
AAA authentication object.
Displays which configuration settings reference the specified
authentication method object.
Displays the specified radio profile object.
Displays the specified monitor profile object.
Displays the specified SSID profile object.
Displays the specified security profile object.
Displays the specified macfilter profile object.
CHAPTER 4
NWA/WAC/WAX Series CLI Reference Guide
34
Chapter 4 Object Reference
4.1.1 Object Reference Command Example
This example shows the names of the WLAN profiles and which security profile each is set to use.
Router(config)# show reference object aaa authentication
This chapter explains some commands you can use to display information about the Zyxel Device’s
current operational state.
Table 11 Status Show Commands
COMMANDDESCRIPTION
show boot status
show cpu status
show cpu all
show disk
show extension-slot
show led status
show mac
show mem status
show ram-size
show serial-number
show socket listen
show socket open
show system uptime
show version
Displays details about the Zyxel Device’s startup state.
Displays the CPU utilization.
Displays the CPU utilization of each CPU.
Displays the disk utilization.
Displays the status of the extension card slot and the USB ports and the names of any
connected devices.
Displays the status of each LED on the Zyxel Device.
Displays the Zyxel Device’s MAC address.
Displays what percentage of the Zyxel Device’s memory is currently being used.
Displays the size of the Zyxel Device’s on-board RAM.
Displays the serial number of this Zyxel Device.
Displays the Zyxel Device’s listening ports
Displays the ports that are open on the Zyxel Device.
Displays how long the Zyxel Device has been running since it last restarted or was
turned on.
Displays the Zyxel Device’s model, firmware and build information.
Here are examples of the commands that display the CPU and disk utilization.
Use show cpu all to check all the Zyxel Device CPU utilization. Use show cpu status to check the
Zyxel Device average CPU utilization. You can use these commands to check your cpu status if you feel
the Zyxel Device’s performance is becoming slower
Use show disk to check the percentage of Zyxel Device onboard flash memory that is currently being
used. You can use this command to check your disk status if you’r e having tr ouble saving files on the
NWA/WAC/WAX Series CLI Reference Guide
36
Chapter 5 Status
Zyxel Device, such as the firmware or the packet capture files.
Router> show cpu status
CPU utilization: 7 %
CPU utilization for 1 min: 7 %
CPU utilization for 5 min: 7 %
Router> show cpu all
CPU core 0 utilization: 4 %
CPU core 0 utilization for 1 min: 6 %
CPU core 0 utilization for 5 min: 6 %
CPU core 1 utilization: 12 %
CPU core 1 utilization for 1 min: 14 %
CPU core 1 utilization for 5 min: 13 %
Router> show disk
No. Disk Size(MB) Usage
===========================================================================
1 onboard flash 3 15%
Here are examples of the commands that display the MAC address, memory usage, RAM size, and serial
number. You need the MAC address and serial number if you want to pass the Zyxel Device
management to Nebula.
Router(config)# show mac
MAC address: 12:34:56:78:90:16-40:4A:03:42:70:17
Router(config)# show mem status
memory usage: 19%
Router(config)# show ram-size
ram size: 256MB
Router(config)# show serial-number
serial number: XXXXXXXXXXXXX
Here is an example of the command that displays the listening ports.
Here is an example of the command that displays the open ports.
Router(config)# show socket open
No. Proto Local_Address Foreign_Address State
===========================================================================
1 udp 0.0.0.0:1812 0.0.0.0:0
2 udp 0.0.0.0:1814 0.0.0.0:0
3 udp 0.0.0.0:161 0.0.0.0:0
4 udp 172.23.26.245:53 0.0.0.0:0
5 0.0.1:53 0.0.0.0:0
6 udp 0.0.0.0:43386 0.0.0.0:0
7 udp 0.0.0.0:5246 0.0.0.0:0
NWA/WAC/WAX Series CLI Reference Guide
37
Chapter 5 Status
Here are examples of the commands that display the system uptime and model, firmware, and build
information.
Router> show system uptime
system uptime: 04:18:00
Router> show version
Zyxel Communications Corp.
model : NWA3160-N
firmware version: 2.23(UJA.0)b2
BM version : 1.13
build date : 2010-12-21 09:10:11
This example shows the current LED states on the Zyxel Device. The SYS LED lights on and green.
Router> show led status
sys: green
Router>
NWA/WAC/WAX Series CLI Reference Guide
38
This chapter shows you how to use interface-related commands.
6.1 Interface Overview
In general, an interface has the following characteristics.
• An interface is a logical entity through which (layer-3) packets pass.
• An interface is bound to a physical port or another interface.
• Many interfaces can share the same physical port.
Some characteristics do not apply to some types of interfaces.
CHAPTER 6
Interfaces
6.2 Interface General Commands Summary
The following table identifies the values required for many of these commands. Other input values are
discussed with the corresponding commands.
Table 12 Input Values for General Interface Commands
LABELDESCRIPTION
interface_name
domain_name
The following sections introduce commands that are supported by several types of interfaces.
The name of the interface.
Ethernet interface: gex, x = 1 - N, where N equals the highest numbered Ethernet interface for
your Zyxel Device model.
VLAN interface: vlanx, x = 0 - 511
Fully-qualified domain name. You may up to 254 alphanumeric characters, dashes (-), or
periods (.), but the first character cannot be a period.
NWA/WAC/WAX Series CLI Reference Guide
39
Chapter 6 Interfaces
6.2.1 Basic Interface Properties and IP Address Commands
This table lists basic properties and IP address commands.
Table 13 interface General Commands: Basic Properties and IP Address Assignment
• This name cannot begin with one of the
follows either: "ge", "ppp", "vlan", "wlan-",
"br", "cellular", "aux", "tunnel".
Modifies the user-defined name of an Ethernet
interface.
Sets how often the Zyxel Device sends interface
statistics to external servers. For example, a
syslog server.
Creates the specified interface if necessary and
enters sub-command mode. The
deletes the specified interface.
Specifies the description for the specified
interface. The
description.
description: You can use alphanumeric and
no command clears the
()+/:=?!*#@$_%- characters, and it can
be up to 60 characters long.
This is reserved for future use.
Specifies the downstream bandwidth for the
specified interface. The
downstream bandwidth to 1048576.
Leaves the sub-command mode.
Makes the specified interface a DHCP client;
the DHCP server gives the specified interface its
IP address, subnet mask, and gateway. The
command makes the IP address static IP
address for the specified interface. (See the
next command to set this IP address.)
Assigns the specified IP address and subnet
mask to the specified interface. The
command clears the IP address and the subnet
mask.
no command
no command sets the
no
no
NWA/WAC/WAX Series CLI Reference Guide
40
Chapter 6 Interfaces
Table 13 interface General Commands: Basic Properties and IP Address Assignment (continued)
manager ap vlan ip address [ip subnet_mask |
dhcp]
manager ap vlan [no] ipv6 address ipv6_addr/
prefix
manager ap vlan [no] ipv6 dhcp6 {addressrequest | client}
Adds the specified gateway using the specified
interface. The
gateway.
Sets the priority (relative to every gateway on
every interface) for the specified gateway. The
lower the number, the higher the priority.
Sets the interface’s priority relative to other
interfaces. The lower the number, the higher the
priority.
Specifies the maximum segment size (MSS) the
interface is to use. MSS is the largest amount of
data, specified in bytes, that the interface can
handle in a single, unfragmented piece. The
command has the interface use its default MSS.
Specifies the Maximum Transmission Unit, which
is the maximum number of bytes in each
packet moving through this interface. The Zyxel
Device divides larger packets into smaller
fragments. The
1500.
Deactivates the specified interface. The no
command activates it.
Applies traffic priority when the interface sends
TCP-ACK traffic, or traffic for resolving domain
names. It also sets how much bandwidth the
traffic can use and can turn on maximize
bandwidth usage.
Turns off traffic priority settings for when the
interface sends the specified type of traffic.
Specifies the upstream bandwidth for the
specified interface. The
upstream bandwidth to 1048576.
When the Zyxel Device is in standalone or cloud
management mode, this sets the AP’s VLAN
identification number and sets it to send
tagged or untagged packets.
Sets the management IPv4 address for the Zyxel
Device.
Sets the IPv6 address and the prefix length for
the LAN interface of the Zyxel Device.
The no command removes the IPv6 address
settings.
Set the Zyxel Device to act as a DHCPv6 client
or get this interface’s IPv6 address from a
DHCPv6 server.
no command removes the
no command resets the MTU to
no command sets the
no
The no command sets the Zyxel Device to not
get this interface’s IPv6 address from the
DHCPv6 server.
NWA/WAC/WAX Series CLI Reference Guide
41
Chapter 6 Interfaces
Table 13 interface General Commands: Basic Properties and IP Address Assignment (continued)
For a DHCPv6 client interface, sets the profile of
DHCPv6 request settings that determine what
additional information to get from the DHCPv6
server.
The no command removes the DHCPv6 request
settings profile.
Enables IPv6 stateless auto-configuration on the
Zyxel Device. The Zyxel Device will generate an
IPv6 address itself from a prefix obtained from
an IPv6 router in the network.
The no command disables IPv6 stateless autoconfiguration.
Sets the IPv6 address of the default outgoing
gateway.
The no command removes the IPv6 gateway
settings.
Sets the IPv6 interface to accept IPv6 neighbor
discovery router advertisement messages.
The no command sets the IPv6 interface to
discard IPv6 neighbor discovery router
advertisement messages.
Sets the manager gateway address. The no
command removes the gateway.
Displays the connection status of the specified
type of interfaces.
Displays information about the specified
interface, specified type of interfaces, or all
interfaces.
Displays the interval for how often the Zyxel
Device refreshes the sent packet statistics for
the interfaces.
Displays basic information about the interfaces.
Displays the connection status of the interfaces.
Displays all Ethernet interface system name and
user-defined name mappings.
Displays information about the specified IPv6
interface, specified type of IPv6 interfaces, or all
IPv6 interfaces.
Displays the specified IPv6 interface’s IPv6
router advertisement configuration.
Displays the static IPv6 addresses configured on
the specified IPv6 interface.
Use these commands to set LAN settings. Use manager ap vlan ip address to set the LAN interface to use
a static IP address or DHCP (Dynamic Host Configuration Protocol). If you set an attribute twice, the
latter setting overrides the previous one.
NWA/WAC/WAX Series CLI Reference Guide
42
Chapter 6 Interfaces
The following example shows how to check the Internet interface status, including the current IP address
used.
Router(config)# show interface all
No. Name Status IP Address Mask IP Assignment
==========================================================================
2 lan Up 123.45.67.89 255.255.252.0 DHCP client
3 wlan-1 n/a n/a n/a n/a
4 wlan-1-1 Up 0.0.0.0 0.0.0.0 static
5 wlan-1-2 Up 0.0.0.0 0.0.0.0 static
The following commands configure the LAN Ethernet interface to use IP address 1.1.1.1, netmask
255.255.255.0, and gateway address 1.2.3.4.
Router(config)# manager ap vlan ip address 1.1.1.1 255.255.255.0
Router(config)# manager ap vlan ip gateway 1.2.3.4
The following command makes the LAN Ethernet interface a DHCP client. A DHCP client (your Zyxel
Device) uses the IP address dynamically assigned by a DHCP server. Use this command to have the LAN
Ethernet interface use dynamic IP address.
Router(config)# manager ap vlan ip address dhcp
A VLAN (Virtual Local Area Network) allows a physical network to be partitioned into multiple logical
networks. You can assign a VLAN Id for the Zyxel Device to be the management VLAN Id. The Zyxel
Device only handles packets from the Ethernet port tagged with the same VLAN ID (management VLAN
Id). Specify untag
the Ethernet port.
This example sets the LAN Ethernet interface’s management VLAN Id to 100, untagged.
if you want the Zyxel Device to send outgoing packets tagged with VLAN Id through
Note: Mis-configuring the management VLAN settings in your Zyxel Device can make it
inaccessible. If this happens, you’ll have to reset the Zyxel Device.
Router(config)# manager ap vlan vlan-id 100 untag
6.3 Port Commands
This section covers commands that are specific to ports.
NWA/WAC/WAX Series CLI Reference Guide
43
Chapter 6 Interfaces
Note: In CLI, representative interfaces are also called representative ports.
Table 14 Basic Interface Setting Commands
COMMANDDESCRIPTION
no port <1..x>
port status port_name
[no] duplex <full | half>
exit
[no] negotiation auto
[no] speed <1000, 100, 10>
show port setting
show port status
show port type
show manager vlan
Removes the specified physical port from its current
representative interface and adds it to its default
representative interface (for example, port x --> gex).
Enters a sub-command mode to configure the
specified port’s settings.
port_name: The name of the Ethernet port. Port1
(NWA5123-AC and NWA1123-ACv2 only),
lanx, x = 1-N, where N equals the highest numbered
Ethernet LAN interface for your Zyxel Device model.
Sets the port’s duplex mode. The no command returns
the default setting.
Leaves the sub-command mode.
Sets the port to use auto-negotiation to determine the
port speed and duplex. The no command turns off
auto-negotiation.
Sets the Ethernet port’s connection speed in Mbps.
The no command returns the default setting.
Displays the Ethernet port negotiation, duplex, and
speed settings.
Displays statistics for the Ethernet ports.
Displays the type of cable connection for each
physical interface on the device.
Displays the LAN interface’s management interface
settings.
UPLINK, or
6.3.1 Port Command Examples
The following example shows port status.
Router# show port status
Port Status TxPkts RxPkts TxBcast RxBcast Colli. TxB/s
RxB/s Up Time PVID
===========================================================================
====
1 1000M/Full 465 5452 411 2647 0 812
612 00:13:28 1
2 Down 0 0 0 0 0 0 0
00:00:00 1
3 Down 0 0 0 0 0 0 0
00:00:00 1
4 Down 0 0 0 0 0 0 0
00:00:00 1
Router#
NWA/WAC/WAX Series CLI Reference Guide
44
The following example shows port settings.
Router(config)# show port setting
Port Negotiation Duplex Speed EEE
===========================================================================
====
1 auto full 1000 no
The following example shows LAN settings.
Router(config)# show manager vlan
Management Interface:
VLAN ID: 100
VLAN Tag: untag
IP Status: static
IP Address: 192.168.1.2
Mask: 255.255.255.0
Gateway: 0.0.0.0
The following example shows each port’s type of cable connection.
Router(config)# show port type
Port Type
===========================================================================
1 Copper
NWA/WAC/WAX Series CLI Reference Guide
45
This chapter shows you how to configure the traffic storm control settings on the Zyxel Device.
7.1 Overview
Traffic storm control limits the number of broadcast and/or multicast packets the Zyxel Device receives
on the ports. When the maximum number of allowable broadcast and/or multicast packets is reached,
the subsequent packets are discarded. Enable this feature to reduce broadcast and/or multicast
packets in your network.
Chapter 7 Storm Control
CHAPTER 7
Storm Control
7.2 Storm Control Commands
The following table describes the commands available for storm control. You must use the configure
terminal
Table 15 Command Summary: Storm Control
COMMANDDESCRIPTION
storm-control ethernet
no storm-control ethernet
show storm-control ethernet
show storm-control port_name
command to enter the configuration mode before you can use these commands.
[no] broadcast
broadcast pps <1..10000>
[no] multicast
multicast pps <1..10000>
Enters a sub-command mode to configure the Zyxel
Device’s storm control settings.
Enables or disables broadcast storm control, which drops
broadcast packets from ingress traffic if the traffic rate
exceeds the configured maximum rate.
Sets the maximum rate for broadcast traffic before storm
control starts dropping broadcast packets.
Enables or disables multicast storm control, which drops
multicast packets from ingress traffic if the traffic rate
exceeds the configured maximum rate.
Sets the maximum rate for multicast traffic before storm
control starts dropping multicast packets.
Disables broadcast/multicast storm control on the Zyxel
Device.
Displays storm control settings on all Zyxel Device ports.
Displays storm control settings on the specified port.
port_name: The name of the Ethernet port. UPLINK or
lanx, x = 1-N, where N equals the highest numbered
Ethernet LAN interface for your Zyxel Device model.
NWA/WAC/WAX Series CLI Reference Guide
46
7.2.1 Storm Control Command Examples
The following example shows you how to enable broadcast storm control on the Zyxel Device.
The following example shows you how to display the uplink port’s storm control settings. The way data is
displayed may vary slightly for different models.
Router# configure terminal
Router(config)# show storm-control UPLINK
Port: UPLINK
Storm Type 1: Multicast
Storm Suppression: Disable
Storm Type 2: Broadcast
Storm Suppression: Enable
Rate Type: pps
Rate: 100
Storming: No
Last Suppression Time: N/A
Last Recovery Time: N/A
Router(config)#
Router# configure terminal
Router(config)# show storm-control UPLINK
Port: UPLINK
Storm Type 1: Multicast
Storm Suppression: Disable
Rate Type: pps
Rate: 100
Storming: N/A
Last Suppression Time: N/A
Last Recovery Time: N/A
Storm Type 2: Broadcast
Storm Suppression: Enable
Rate Type: pps
Rate: 100
Storming: No
Last Suppression Time: N/A
Last Recovery Time: N/A
Router(config)#
NWA/WAC/WAX Series CLI Reference Guide
47
This chapter shows you how to configure the NCC discovery and proxy server settings on the Zyxel
Device.
8.1 Overview
If your Zyxel Device can be managed through the Zyxel Nebula Control Center (NCC) and is behind a
proxy server, you will need to enable NCC discovery and configure the proxy server settings so that the
Zyxel Device can access the NCC through the proxy server.
Chapter 8 NCC Discovery
CHAPTER 8
NCC Discovery
8.2 NCC Discovery Commands
The following table describes the commands available for NCC discovery and proxy server. You must
use the
commands.
Table 16 Command Summary: NCC Discovery
COMMANDDESCRIPTION
[no] netconf inactivate
[no] netconf proxy
netconf proxy server {ip|host_name}
netconf proxy port <1..65535>
[no] netconf proxy-auth
configure terminal command to enter the configuration mode before you can use these
Turns off NCC discovery on the Zyxel Device. If NCC
discovery is disabled, the Zyxel Device will not discover the
NCC and remain in standalone AP mode.
The
no command turns on NCC discovery. The Zyxel
Device will try to discover the NCC and go into cloud
management mode when it is connected to the Internet
and has been registered in the NCC.
Sets the Zyxel Device to access the NCC through the
specified proxy server.
The
no command sets the Zyxel Device to not access the
NCC through the specified proxy server.
Sets the IP address or URL of the proxy server.
Sets the service port number used by the proxy server.
Turns on proxy authentication. The no command turns it
The following example shows you how to turn on NCC discover on the Zyxel Device.
Router# configure terminal
Router(config)# no netconf inactivate
Router(config)#
The following example shows proxy server settings.
Router> show netconf proxy status
active: yes
proxy server: 172.16.15.253
proxy port: 8080
proxy-auth active: yes
proxy-auth username: Joseph
proxy-auth encrypted-password: $4$hT65kQTR$Uh8lp5zfcP7vEfm
O97C5MJ6U1B47M3DIiPvb6GcrPK2kEo3R7PTChiVWl7rRi+xr0xhg8DsdTPU$
Router>
Displays the proxy server settings.
Displays whether NCC discovery is enabled or not on the
Zyxel Device.
NWA/WAC/WAX Series CLI Reference Guide
49
This chapter describes how to set up user accounts and user settings for the Zyxel Device. You can also
set up rules that control when users have to log in to the Zyxel Device before the Zyxel Device routes
traffic for them.
9.1 User Account Overview
A user account defines the privileges of a user logged into the Zyxel Device. User accounts are used in
firewall rules and application patrol, in addition to controlling access to configuration and services in the
Zyxel Device.
9.1.1 User Types
CHAPTER 9
Users
These are the types of user accounts the Zyxel Device uses.
Table 17 Types of User Accounts
Perform basic diagnostics (CLI)
Access Users
userUsed for the embedded RADIUS server and
SNMPv3 user access
Browse user-mode commands (CLI)
9.2 User Commands Summary
The following table identify the values required for many username commands. Other input values are
discussed with the corresponding commands.
Table 18 user Command Input Values
LABELDESCRIPTION
username
The name of the user (account). You may use 1-31 alphanumeric characters, underscores(_),
or dashes (-), but the first character cannot be a number. This value is case-sensitive and must
be unique.
WWW, TELNET, SSH, Console
The following sections list the
NWA/WAC/WAX Series CLI Reference Guide
username commands.
50
Chapter 9 Users
9.2.1 Username and User Commands
The first table lists the commands for users.
Table 19 username Commands Summary: Users
• Specify 0 to make the number of minutes
unlimited.
•The
Displays the default lease and reauthentication
times for the specified type of user accounts.
Displays the default lease and reauthentication
times for all types of user account.
Sets the default lease time (in minutes) for each
new user. Set it to zero to set unlimited lease
time. The
time to five.
Sets the default reauthorization time (in minutes)
for each new user. Set it to zero to set unlimited
reauthorization time. The
default reauthorization time to thirty.
Sets the default user type for each new user.
The
user.
Displays the current retry limit settings for users.
no command sets the reauthorization
time to five minutes, regardless of the
current default setting for new users.
Enables the retry limit for users. The no
command disables the retry limit.
Sets the number of failed login attempts a user
can have before the account or IP address is
locked out for lockout-period minutes. The
command sets the retry-count to five.
Sets the amount of time, in minutes, a user or IP
address is locked out after retry-count number
of failed login attempts. The
the lockout period to thirty minutes.
Displays the current settings for sim ultaneous
logins by users.
Enables the limit on the number of simultaneous
logins by users of the specified account-type.
The
no command disables the limit, or allows
an unlimited number of simultaneous logins.
Sets the limit for the number of simultaneous
logins by users of the specified account-type.
The
no command sets the limit to one.
no
no command sets
9.2.2.1 User Setting Command Examples
The following commands show the current settings for the number of simultaneous logins.
Router# configure terminal
Router(config)# show users simultaneous-logon-settings
enable simultaneous logon limitation for administration account: no
maximum simultaneous logon per administration account : 1
9.2.3 Additional User Commands
This table lists additional commands for users.
Table 21 users Commands Summary: Additional
COMMANDDESCRIPTION
show users {username | all | current}
show lockout-users
unlock lockout-users ip | console
users force-logout ip | username
Displays information about the users logged
onto the system.
Displays users who are currently locked out.
Unlocks the specified IP address.
Logs out the specified logins.
NWA/WAC/WAX Series CLI Reference Guide
53
Chapter 9 Users
9.2.3.1 Additional User Command Examples
The following commands display the users that are currently logged in to the Zyxel Device and forces
the logout of all logins from a specific IP address.
Router# configure terminal
outer(config)# show users all
No. Name Type From
Service Session Time Idle Time Lease Timeout Re-Auth. Timeout
===============================================================================
1 admin admin 172.17.16.101
http/https 04:31:01 unlimited unlimited unlimited
2 admin admin console
console 04:23:51 unlimited unlimited unlimited
Router(config)# users force-logout 172.17.16.101
Logout user 'admin'(from 172.17.16.101): OK
Total 1 user has been forced logout
Router(config)# show users all
No. Name Type From
Service Session Time Idle Time Lease Timeout Re-Auth. Timeout
===============================================================================
1 admin admin console
console 04:24:55 unlimited unlimited unlimited
The following commands display the users that are currently locked out and then unlocks the user who is
displayed.
Router# configure terminal
Router(config)# show lockout-users
No. Username Tried From Lockout Time Remaining
===========================================================================
No. From Failed Login Attempt Record Expired Timer
===========================================================================
1 172.17.13.60 2 46
Router(config)# unlock lockout-users 172.17.13.60
User from 172.17.13.60 is unlocked
Router(config)# show lockout-users
No. Username Tried From Lockout Time Remaining
===========================================================================
No. From Failed Login Attempt Record Expired Timer
===========================================================================
NWA/WAC/WAX Series CLI Reference Guide
54
CHAPTER 10
AP Management
This chapter shows you how to configure wireless AP management options on your Zyxel Device.
10.1 AP Management Overview
The Zyxel Device supports CAPWAP. This is Zyxel’s implementation of the CAPWAP protocol (RFC 5415). The CAPWAP
data flow is protected by Datagram Transport Layer Security (DTLS).
The Zyxel Device can be a standalone AP (default), or a CAPWAP managed AP.
The following figure illustrates a CAPWAP wireless network. The user (U) configures the AP controller (C), which then
automatically updates the configurations of the managed APs (M1 ~ M4).
Figure 9 CAPWAP Network Example
CAPWAP Discovery and Management
The link between CAPWAP-enabled access points proceeds as follows:
1An AP in managed AP mode joins a wired network (receives a dynamic IP address).
2The AP sends out a discovery request, looking for a CAPWAP AP controller.
NWA/WAC/WAX Series CLI Reference Guide
55
Chapter 10 AP Management
3If there is an AP controller on the network, it receives the discovery request. If the AP controller is in
Manual mode it adds the details of the AP to its Unmanaged Access Points list, and you decide which
available APs to manage. If the AP controller is in Always Accept mode, it automatically adds the AP to
its Managed Access Points list and provides the managed AP with default configuration information, as
well as securely transmitting the DTLS pre-shared key. The managed AP is ready for association with
wireless clients.
Managed AP Finds the Controller
A managed Zyxel Device can find the controller in one of the following ways:
• Manually specify the controller’s IP address in the Web Configurator’s AC (AP Controller) Discovery screen or using
the capwap ap ac-ip command.
• Get the controller’s IP address from a DHCP server with the controller’s IP address configured as option 138.
• Get the controller’s IP address from a DNS server SRV (Service) record.
• Broadcasting to discover the controller within the broadcast domain.
Note: The AP controller needs to have a static IP address. If it is a DHCP client, set the DHCP server to
reserve an IP address for the AP controller.
CAPWAP and IP Subnets
By default, CAPWAP works only between devices with IP addresses in the same subnet.
However, you can configure CAPWAP to operate between devices with IP addresses in different subnets by doing
the following.
• Activate DHCP. Your network’s DHCP server must support option 138 defined in RFC 5415.
• Configure DHCP option 138 with the IP address of the CAPWAP AP controller on your network.
DHCP Option 138 allows the CAPWAP management request (from the AP in managed AP mode) to reach the AP
controller in a different subnet, as shown in the following figure.
Figure 10 CAPWAP and DHCP Option 138
NWA/WAC/WAX Series CLI Reference Guide
56
Chapter 10 AP Management
Notes on CAPWAP
This section lists some additional features of Zyxel’s implementation of the CAPWAP protocol.
• When the AP controller uses its internal Remote Authentication Dial In User Service (RADIUS) server, managed APs
also use the AP controller’s authentication server to authenticate wireless clients.
• If a managed AP’s link to the AP controller is broken, the managed AP continues to use the wireless settings with
which it was last provided.
10.2 AP Management Commands
The following table identifies the values required for many of these commands. Other input values are discussed with
the corresponding commands.
Table 22 Input Values for General AP Management Commands
LABELDESCRIPTION
ap_mac
slot_name
profile_name
ap_description
sta_mac
The Ethernet MAC address of the managed AP. Enter 6 hexadecimal pairs separated by
colons. You can use 0-9, a-z and A-Z.
The slot name for the AP’s on-board wireless LAN card. Use either slot1 or slot2. (Not all
Zyxel Devices support 2 radio slots.)
The wireless LAN radio profile name. You may use 1-31 alphanumeric characters,
underscores(
sensitive.
The AP description. This is strictly used for reference purposes and has no effect on any other
settings. You may use 1-31 alphanumeric characters, underscores(
first character cannot be a number. This value is case-sensitive.
The Ethernet MAC address of the managed station (or wireless client). Enter 6 hexadecimal
pairs separated by colons. You can use 0-9, a-z and A-Z.
_), or dashes (-), but the first character cannot be a number. This value is case-
_), or dashes (-), but the
The following table describes the commands available for AP management. You must use the configure
terminal
command to enter the configuration mode before you can use these commands.
Table 23 Command Summary: AP Management
COMMANDDESCRIPTION
wlan slot_name
[no] activate
ap profile radio_profile_name
output-power power
repeater profile radio_profile_name
rootap profile radio_profile_name
ssid profile index ssid_profile_name
wds_profile wds_profile_name
Enters the sub-command mode for the specified radio
on the Zyxel Device.
Enables the specified radio. The no command
disables the radio.
Sets the radio (slot_name) to AP mode and assigns a
created radio profile to the radio.
Sets the output power (between 0 to 30 dBm) for the
specified radio.
Sets the specified radio (slot_name) to repeater
mode and assigns a created r a di o profile to the radio.
Sets the specified radio (slot_name) to root AP mode
and assigns a created radio profile to the radio.
Assigns an SSID profile to this radio. Requires an existing
SSID profile.
Selects the WDS profile the radio (in repeater or root
AP mode) uses to connect to a root AP or repeater.
NWA/WAC/WAX Series CLI Reference Guide
57
Chapter 10 AP Management
Table 23 Command Summary: AP Management (continued)
COMMANDDESCRIPTION
wds_uplink {auto | manual bssid
mac_address}
wireless-bridge {enable | disable}
Sets how the radio (in repeater mode) connect to a
root AP or repeater.
auto: to have the Zyxel Device automatically use the
settings in the applied WDS profile to connect to a
root AP or repeater.
manual: to have the Zyxel Device connect to the root
AP or repeater with the specified MAC address. You
need to configure the MAC address of the root AP or
repeater with which you want the Zyxel Device to
associate.
Enables or disables wireless bridging on the specified
radio (slot_name). The Zyxel Device must support LAN
provision and the radio must be in repeater mode.
VLAN and bridge interfaces are created
automatically according to the LAN port’s VLAN
settings.
When wireless bridging is enabled, the Zyxel Device in
repeater mode can still transmit data through its
Ethernet port(s) after the WDS link is up. This allows you
to extend your wired ne twork to a new area wirele ssly,
when it is difficult to run cables to that area.
show wlan slot_name
show wlan slot_name detail
show wlan slot_name list all sta
show wlan country-code
show wlan channels {11A|11G}
show wlan channels {11A|11G} [cw {20|20/
40|20/40/80|20/40/80/160}] [country
country_code] [indoor|outdoor]
show wlan radio macaddr
show wireless-hal current channel
show wireless-hal station info
show wireless-hal station number
The Zyxel Devices in the same WDS must use the same
static VLAN ID.
Note: Be careful to avoid bridge loops. A bridge
loop occurs when there are two layer-2
paths between the same endpoints,
causing broadcast packets to be send
back and forth indefinitely.
Displays the operating mode and profile settings for
the specified radio.
Displays the SSID, MAC address, VLAN ID and security
mode for the specified radio.
Displays statistics for the specified radio’s wireless
traffic.
Displays the country code of the Zyxel Device.
Displays the channels available for the specified
frequency band.
Displays the channels available for the specified
frequency band, channel width, and/or country. You
can also specify whether the channels are for indoor
or outdoor use.
Displays the MAC address(es) assigned to the Zyxel
Device’s radio(s).
Displays the channel number the Zyxel Devi ce’s radio
is using.
Displays the connected station information of the
Zyxel Device’s radio.
Displays the number of wireless clients that are
currently connected to the Zyxel Device.
NWA/WAC/WAX Series CLI Reference Guide
58
Chapter 10 AP Management
Table 23 Command Summary: AP Management (continued)
COMMANDDESCRIPTION
show wireless-hal statistic
show wireless-hal wds info {all | downlink
| uplink}
show wireless-hal wds interface {all |
downlink | uplink}
show wireless-hal wds number
Displays the overall traffic information of the Zyxel
Device’s radio.
Displays the WDS traffic statistics between the Zyxel
Device and a root AP or repeaters
Uplink refers to the WDS link from the repeaters to the
root AP.
Downlink refers to the WDS link from the root AP to the
repeaters.
Displays status information for the WDS links.
Uplink refers to the WDS link from the repeaters to the
root AP.
Downlink refers to the WDS link from the root AP to the
repeaters.
Displays the number of the root AP or repeater to
which the Zyxel Device is connected using WDS.
10.2.1 AP Management Commands Example
The following commands display:
• number of currently connected wireless clients
• connection information
• overall traffic information of the Zyxel Device’s radio.
Use these commands to monitor the current wireless LAN status and connection of the Zyxel Device.
The following command displays the number of currently connected wireless clients of each radio slot (Slot1 - 2.4
GHz, Slot2 - 5 GHz).
Router# configure terminal
Router(config)# show wireless-hal station number
Slot1: 0
Slot2: 1
NWA/WAC/WAX Series CLI Reference Guide
59
Chapter 10 AP Management
The following command displays the identity information of currently connected clients and connection details. This
can help you identify the wireless clients connected to the Zyxel Device and check on respective connection
statuses.
Router# configure terminal
!Shows the connected clients’ info & connection info
Router(config)# show wireless-hal station info
index: 0
MAC: a1:bc:2d:3e:f4:56
IPv4: 123.45.67.89
Slot: 2
SSID: Zyxel
Security: WPA2-PSK
TxRate: 866M
RxRate: 650M
RSSI: 100
RSSI dBm: -44
Time: 13:11:21 2021/11/01
VapIdx: 1
Capability: 802.11ac
DOT11 features: N/A
Display SSID: Zyxel
The following command displays the overall throughput, traffic and signal information. You can use this command to
check if there is any abnormal traffic or connection error.
The following table describes the commands available for configuring CAPWAP AP settings. You must use the
configure terminal command to enter the configuration mode before you can use these commands.
Table 24 Command Summary: CAPWAP AP Commands
COMMANDDESCRIPTION
capwap ap ac-ip {primary ip secondary ip
| auto}
capwap ap vlan ip address {ip subnet_mask
| dhcp}
capwap ap vlan [no] ip gateway ip
capwap ap vlan [no] ipv6 address
ipv6_addr/prefix
capwap ap vlan [no] ipv6 dhcp6 {addressrequest | client}
capwap ap vlan [no] ipv6 dhcp6-requestobject dhcp6_profile
capwap ap vlan [no] ipv6 enable
capwap ap vlan [no] ipv6 gateway ipv6_addr
capwap ap vlan [no] ipv6 nd ra accept
capwap ap vlan vlan-id <1..4094> [tag |
untag]
hybrid-mode [managed | standalone]
Sets the AP controller’s address or sets the Zyxel Device
(in managed mode) to use DHCP option 138 to get
the AP controller’s IP address.
Sets the IP address of the Zyxel Device or sets it to use
DHCP.
Adds the gateway address of the Zyxel Device. The no
command removes the gateway setting.
Sets the IPv6 address and the prefix length of the Zyxel
Device.
The no command removes the IPv6 address settings.
Set the Zyxel Device to act as a DHCPv6 client or get
an IPv6 address from a DHCPv6 server.
The no command sets the Zyxel Device to not get the
IPv6 address from the DHCPv6 server.
Sets the profile of DHCPv6 request settings that
determine what additional information to get from the
DHCPv6 server.
The no command removes the DHCPv6 request
settings profile.
Enables IPv6 stateless auto-configuration on the Zyxel
Device. The Zyxel Device will generate an IPv6 address
itself from a prefix obtained from an IPv6 router in the
network.
The no command disables IPv6 stateless autoconfiguration.
Sets the IPv6 address of the default outgoing gateway.
The no command removes the IPv6 gateway settings.
Sets the Zyxel Device to accept IPv6 neighbor
discovery router advertisement messages.
The no command sets the Zyxel Device to discard IPv6
neighbor discovery router advertisement messages.
Sets the VLAN ID and tagging setting of the Zyxel
Device.
Sets the Zyxel Device to act as a CAPWAP managed
AP, or uses it in its default standalone mode.
When the Zyxel Device is in standalone mode, you can
manage the Zyxel Device using its own web
configurator or commands.
show capwap ap info
show capwap ap discovery-type
When the Zyxel Device is in managed mode, it can be
configured ONLY by the AP controller.
Displays information about the Zyxel Device’s wireless
usage.
Displays how the Zyxel Device gets its IP address.
NWA/WAC/WAX Series CLI Reference Guide
61
Chapter 10 AP Management
Table 24 Command Summary: CAPWAP AP Commands (continued)
COMMANDDESCRIPTION
show capwap ap ac-ip
show hybrid-mode
Displays the controller’s IP address.
Displays the Zyxel Device management mode.
10.3.1 AP Management Client Commands Example
The following example shows you how to configure the Zyxel Device management mode to allow it to be managed
by an AP controller and check the Zyxel Device management mode.
The following example shows you how to configure the interface of the Zyxel Device, set the AP controller IP address
and display the related settings.
Router# configure terminal
Router(config)# show capwap_wtp ap discovery-type
Discovery type : Broadcast
Router(config)# capwap ap vlan ip address 192.168.1.37 255.255.255.0
Router(config)# capwap ap vlan ip gateway 192.168.1.32
Router(config)# capwap ap ac-ip 192.168.1.1 192.168.1.2
Router(config)# show capwap ap discovery-type
Discovery type : Static AC IP
Router(config)# show capwap ap ac-ip
AC IP: 192.168.1.1 192.168.1.2
Router(config)# exit
Router# show capwap ap info
SM-State RUN(8)
msg-buf-usage 0/10 (Usage/Max)
capwap-version 10118
Radio Number 1/4 (Usage/Max)
BSS Number 8/8 (Usage/Max)
IANA ID 037a
Description AP-0013499999FF
NWA/WAC/WAX Series CLI Reference Guide
62
Chapter 11 Wireless LAN Profiles
CHAPTER 11
Wireless LAN Profiles
This chapter shows you how to configure wireless LAN profiles on your Zyxel Device.
11.1 Wireless LAN Profiles Overview
The Zyxel Devices are designed to work explicitly with your Zyxel Devices. If you do not have on-board configuration
files, you must create “profiles” to manage them. Profiles are preset configurations that are uploaded to the APs and
which manage them. They include: Radio and Monitor profiles, SSID profiles, Security profiles, and MAC Filter profiles.
Altogether, these profiles give you absolute control over your wireless network.
11.2 AP Radio & Monitor Profile Commands
The radio profile commands allow you to set up configurations for the radios onboard your various APs. The monitor
profile commands allow you to set up monitor mode configurations that allow your APS to scan for other APs in the
vicinity.
The following table identifies the values required for many of these commands. Other input values are discussed with
the corresponding commands.
Table 25 Input Values for General Radio and Monitor Profile Commands
LABELDESCRIPTION
radio_profile_name
monitor_profile_name
wireless_channel_2g
wireless_channel_5g
wlan_cw
wlan_htgi
chain_mask
scan_method
The radio profile name. You may use 1-31 alphanumeric characters, underscores
(
_), or dashes (-), but the first character cannot be a number. This value is case-
sensitive.
The monitor profile name. You may use 1-31 alphanumeric characters, underscores
(
_), or dashes (-), but the first character cannot be a number. This value is case-
sensitive.
Sets the 2 Ghz channel used by this radio profile. The channel range is 1 ~ 14.
Note: Your choice of channel may be restricted by regional regulations.
Sets the 5 Ghz channel used by this radio profile. The channel range is 36 ~ 165.
Note: Your choice of channel may be restricted by regional regulations.
Sets the channel width. Select either 20, 20/40, 20/40/80, or 20/40/80/160.
Sets the HT guard interval. Select either long or short.
Sets the network traffic chain mask. The range is 1 ~ 7.
Sets the radio’s scan method while in Monitor mode. Select manual or auto.
NWA/WAC/WAX Series CLI Reference Guide
63
Chapter 11 Wireless LAN Profiles
Table 25 Input Values for General Radio and Monitor Profile Commands (continued)
LABELDESCRIPTION
wlan_interface_index
wds_lan_interface_ind
Sets the radio interface index number. The range is 1 ~ 8.
Sets the AP-WDS mode interface’s index number. The range is 1 ~ 8.
ex
The following table describes the commands available for radio and monitor profile management. You must use the
configure terminal command to enter the configuration mode before you can use these commands.
Table 26 Command Summary: Radio Profile
COMMANDDESCRIPTION
show wlan-radio-profile {all | rule_count
| [radio_profile_name]}
wlan-radio-profile rename
radio_profile_name1 radio_profile_name2
[no] wlan-radio-profile
radio_profile_name
2g-channel wireless_channel_2g
2g-multicast-speed
wlan_2g_support_speed
2g-wlan-rate-control rate_2g
5g-channel wireless_channel_5g
5g-multicast-speed
wlan_5g_basic_speed
5g-wlan-rate-control rate_5g
Displays the radio profile(s).
all: Displays all radio profiles created on the Zyxel
Device.
rule_count: Displays how many radio profiles are
created on the Zyxel Device.
radio_profile_name: Displays the specified radio
profile.
Gives an existing radio profile
(radio_profile_name1) a new name
(radio_profile_name2).
Enters configuration mode for the specified radio
profile. Use the no parameter to remove the specified
profile.
Sets the broadcast band for this profile in the 2.4 Ghz
frequency range. The default is 6.
When you disable multicast to unicast, use this
command to set the data rate {1.0 | 2.0 | …} in
Mbps for 2.4 GHz multicast traffic.
Sets the minimum data rate that 2.4Ghz WiFi clients
can connect at, in Mbps. At the time of write, allowed
values are: 1, 2,5. 5, 6, 9, 11, 12, 18, 24, 36, 48, 54.
Increasing the minimum data rate can reduce
network overhead and improve WiFi network
performance in high density environments. However,
WiFi clients that do not support the minimum data rate
will not be able to connect to the AP.
Sets the broadcast band for this profile in the 5 GHz
frequency range.
When you disable multicast to unicast, use this
command to set the data rate {6.0 | 9.0 | …} in
Mbps for 5 GHz multicast traffic.
Sets the minimum data rate that 5Ghz WiFi clients can
connect at, in Mbps. At the time of write, allowed
values are: 6,9, 12, 18, 24, 36, 48, 54.
[no] activate
Increasing the minimum data rate can reduce
network overhead and improve WiFi network
performance in high density environments. However,
WiFi clients that do not support the minimum data rate
will not be able to connect to the AP.
Makes this profile active or inactive.
NWA/WAC/WAX Series CLI Reference Guide
64
Chapter 11 Wireless LAN Profiles
Table 26 Command Summary: Radio Profile (continued)
COMMANDDESCRIPTION
[no] ampdu
[no] amsdu
band wlan_band band_mode
wlan_band_mode
beacon-interval <40..1000>
[no] block-ack
bss-color <0..63>
[no] disable-bss-color
ch-width wlan_cw
Activates MPDU frame aggregation for this profile. Use
the no parameter to disable it.
Message Protocol Data Unit (MPDU) aggregation
collects Ethernet frames along with their 802.11n
headers and wraps them in a 802.11n MAC header.
This method is useful for increasing bandwidth
throughput in environments that are prone to high
error rates.
By default this is enabled.
Activates MPDU frame aggregation for this profile. Use
the no parameter to disable it.
Mac Service Data Unit (MSDU) aggregation collects
Ethernet frames without any of their 802.11n headers
and wraps the header-less payload in a single 802.11n
MAC header. This method is useful for increasing
bandwidth throughput. It is also more efficient than AMPDU except in environments that are prone to high
error rates.
By default this is enabled.
Sets the radio band (2.4 GHz or 5 GHz) and 80.211
wireless mode for this profile.
wlan_band: 2.4G or 5G
wlan_band_mode: 11n, bg, bgn, a, ac, an, anacax,
bgnax
Sets the beacon interval for this profile.
When a wirelessly networked device sends a beacon,
it includes with it a beacon interval. This specifies the
time period before the device sends the beacon
again. The interval tells receiving devices on the
network how long they can wait in low-power mode
before waking up to handle the beacon. This value
can be set from 40ms to 1000ms. A high value helps
save current consumption of the access point.
The default is 100.
Makes block-ack active or inactive. Use the no
parameter to disable it.
Sets the BSS color of the Zyxel Device, which
distinguishes it from other nearby APs when they
transmit over the same channel. Set it to 0 to
automatically assign a BSS color.
Disables BSS coloring.
Use the no command to enable BSS coloring.
Sets the channel width for this profile.
NWA/WAC/WAX Series CLI Reference Guide
65
Chapter 11 Wireless LAN Profiles
Table 26 Command Summary: Radio Profile (continued)
COMMANDDESCRIPTION
[no] ctsrts <0..2347>
dcs time-interval interval
dcs sensitivity-level {high|medium
|low}
dcs client-aware {enable|disable}
dcs channel-deployment {3-channel|4channel}
dcs 2g-selected-channel 2.4g_channels
dcs 5g-selected-channel 5g_channels
dcs dcs-2g-method {auto|manual}
dcs dcs-5g-method {auto|manual}
dcs dfs-aware {enable|disable}
dcs mode {interval|schedule}
Sets or removes the RTS/CTS value for this profile.
Use RTS/CTS to reduce data collisions on the wireless
network if you have wireless clients that are associated
with the same AP but out of range of one another.
When enabled, a wireless client sends an RTS (Request
To Send) and then waits for a CTS (Clear To Send)
before it transmits. This stops wireless clients from
transmitting packets at the same time (and causing
data collisions).
A wireless client sends an RTS for all packets larger than
the number (of bytes) that you enter here. Set the RTS/
CTS equal to or higher than the fragmentation
threshold to turn RTS/CTS off.
The default is 2347.
Sets the interval that specifies how often DCS should
run.
Sets how sensitive DCS is to radio channel changes in
the vicinity of the AP running the scan.
When enabled, this ensures that the Zyxel Device will
not change channels as long as a client is connected
to it. If disabled, the Zyxel Device may change
channels regardless of wheth er it has clients
connected to it or not.
Sets either a 3-channel deployment or a 4-channel
deployment.
In a 3-channel deployment, the AP running the scan
alternates between the following channels: 1, 6, and
11.
In a 4-channel deployment, the AP running the scan
alternates between the following channels: 1, 4, 7, and
11 (FCC) or 1, 5, 9, and 13 (ETSI).
Set the option that is applicable to your region.
(Channel deployment may be regulated differently
between countries and locales.)
Specifies the channels that are available in the 2.4
GHz band when you manually configure the channels
the Zyxel Device can use.
Specifies the channels that are available in the 5 GHz
band when you manually configure the channels the
Zyxel Device can use.
Sets the Zyxel Device to automatically search for
available channels or manually configure the
channels the Zyxel Device uses in the 2.4 GHz band.
Sets the Zyxel Device to automatically search for
available channels or manually configure the
channels the Zyxel Device uses in the 5 GHz band.
Enable this to allow an Zyxel Device to avoid phase
DFS channels below the 5 GHz spectrum.
Sets the Zyxel Device to use DCS at the end of the
specified time interval or at a specific time on selected
days of the week.
NWA/WAC/WAX Series CLI Reference Guide
66
Chapter 11 Wireless LAN Profiles
Table 26 Command Summary: Radio Profile (continued)
Sets what time of day (in 24-hour format) the Zyxel
Device starts to use DCS on the specified day(s) of the
week.
Sets the description for the profile. You may use up to
60 alphanumeric characters, underscores (_), or
dashes (-). This value is case-sensitive
Makes the DFS switch active or inactive. By default this
is inactive.
Fixes the channel bandwidth as 40 MHz. The no
command has the Zyxel Device automatically choose
40 MHz if all the clients support it or 20 MHz if some
clients only support 20 MHz.
Sets the DTIM period for this profile.
Delivery Traffic Indication Message (DTIM) is the time
period after which broadcast and multicast packets
are transmitted to mobile clients in the Active Power
Management mode. A high DTIM value can cause
clients to lose connectivity with the network. This value
can be set from 1 to 255.
[no] frag <256..2346>
guard-interval wlan_htgi
[no] htprotect
[no] ignore-country-ie
limit-ampdu < 100..65535>
limit-amsdu <2290..4096>
[no] nol-channel-block
The default is 1.
Sets or removes the fragmentation value for this profile.
The threshold (number of bytes) for the fragmentation
boundary for directed messages. It is the maximum
data fragment size that can be sent.
The default is 2346.
Sets the guard interval for this profile.
The default for this is short.
Activates HT protection for this profile. Use the no
parameter to disable it.
By default, this is disabled.
Prevents the AP from broadcasting a country code,
also called a country Information Element (IE), in
beacon frames. This makes the AP incompatible with
802.11d networks and devices. The
allows the AP to broadcast the country code.
802.11d is a WiFi network specification that allows an
AP to broadcast a country code to WiFi clients. The
country code tells clients where the AP is located.
no command
Note: Run this command if WiFi clients are
unable to connect to the AP because of
an incompatible country code.
Sets the maximum frame size to be aggregated.
By default this is 50000.
Sets the maximum frame size to be aggregated.
The default is 4096.
Enables or disables DFS channel blocking when the
Zyxel Device detects radar signals within the range of
that DFS channel.
NWA/WAC/WAX Series CLI Reference Guide
67
Chapter 11 Wireless LAN Profiles
Table 26 Command Summary: Radio Profile (continued)
COMMANDDESCRIPTION
[no] multicast-to-unicast
[no] reject-legacy-station
role {ap}
rssi-dbm <-20~-105>
“Multicast to unicast” broadcasts wireless multicast
traffic to all wireless clients as unicast traffic to provide
more reliable transmission. The data rate changes
dynamically based on the application’s bandwidth
requirements. Although unicast provides more reliable
transmission of the multicast traffic, it also produces
duplicate packets.
The no command turns multicast to unicast off to send
wireless multicast traffic at the rate you specify with
the 2g-multicast-speed or 5g-multicast-speed
command.
Allows only 802.11 n/ac/ax clients to connect, and
reject 802.11a/b/g clients.
Use the no command to also allow 802.11a/b/g
clients.
Sets the profile’s wireless LAN radio operating mode.
Use ap to have the radio function as an access point
with one or more BSSIDs.
When using the RSSI threshold, set a minimum client
signal strength for connecting to the AP.
rssi-kickout <-20~-105>
[no] rssi-retry
rssi-retrycount <1~100>
[no] rssi-thres
tx-mask chain_mask
rx-mask chain_mask
subframe-ampdu <2..64>
exit
show wlan-monitor-profile {all|rule_count
|[monitor_profile_name]}
-20 dBm is the strongest signal you can require and 105 is the weakest.
Sets a minimum kick-off signal strength. When a
wireless client’s signal strength is lower than the
specified threshold, the Zyxel Device disconnects the
wireless client.
-20 dBm is the strongest signal you can require and 105 is the weakest.
Allows a wireless client to try to associate with the Zyxel
Device again after it is disconnected due to weak
signal strength.
Use the no parameter to disallow it.
Sets the maximum number of times a wireless client
can attempt to re-connect to the Zyxel Device.
Sets whether or not to use the Received Signal
Strength Indication (RSSI) threshold to ensure wireless
clients receive good throughput. This allows only
wireless clients with a strong signal to connect to the
Zyxel Device.
Sets the outgoing chain mask.
Sets the incoming chain mask.
Sets the maximum number of frames to be
aggregated each time.
By default this is 32.
Exits configuration mode for this profile.
Displays all monitor profiles or just the specified one.
rule_count: Displays how many monitor profiles are
created on the Zyxel Device.
NWA/WAC/WAX Series CLI Reference Guide
68
Chapter 11 Wireless LAN Profiles
Table 26 Command Summary: Radio Profile (continued)
COMMANDDESCRIPTION
wlan-monitor-profile rename
monitor_profile_name1
monitor_profile_name2
[no] wlan-monitor-profile
monitor_profile_name
[no] activate
description description
scan-method scan_method
[no] 2g-scan-channel
wireless_channel_2g
[no] 5g-scan-channel
wireless_channel_5g
scan-dwell <100..1000>
exit
Gives an existing monitor profile
(monitor_profile_name1) a new name
(monitor_profile_name2).
Enters configuration mode for the specified monitor
profile. Use the no parameter to remove the specified
profile.
Makes this profile active or inactive.
By default, this is enabled.
Sets the description for the profile. You may use up to
60 alphanumeric characters, underscores (_), or
dashes (-). This value is case-sensitive
Sets the channel scanning method for this profile.
Sets the broadcast band for this profile in the 2.4 Ghz
frequency range. Use the no parameter to disable it.
Sets the broadcast band for this profile in the 5 GHz
frequency range. Use the no parameter to disable it.
Sets the duration in milliseconds that the device using
this profile scans each channel.
Exits configuration mode for this profile.
11.2.1 AP radio & Monitor Profile Commands Example
The following example shows you how to set up the radio profile named ‘RADIO01’, activate it, and configure it to
use the following settings:
• 2.4G band and 802.11ac wireless mode with channel 6
The following table identifies the values required for many of these commands. Other input values are discussed with
the corresponding commands.
Table 27 Input Values for General SSID Profile Commands
LABELDESCRIPTION
ssid_profile_name
ssid
wlan_qos
securityprofile
The SSID profile name. You may use 1-31 alphanumeric characters, underscores
(
_), or dashes (-), but the first character cannot be a number. This value is case-
sensitive.
The SSID broadcast name. You may use 1-32 alphanumeric characters,
underscores (
Sets the type of QoS the SSID should use.
disable: Turns off QoS for this SSID.
wmm: Turns on QoS for this SSID. It automatically assigns Access Categories to
packets as the device inspects them in transit.
wmm_be: Assigns the “best effort” Access Category to all traffic moving through the
SSID regardless of origin.
wmm_bk: Assigns the “background” Access Category to all traffic moving through
the SSID regardless of origin.
wmm_vi: Assigns the “video” Access Category to all traffic moving through the SSID
regardless of origin.
wmm_vo: Assigns the “voice” Access Category to all traffic moving through the SSID
regardless of origin.
Assigns an existing security profile to the SSID profile. You may use 1-31
alphanumeric characters, underscores (
cannot be a number. This value is case-sensitive.
_), or dashes (-). This value is case-sensitive.
_), or dashes (-), but the first character
NWA/WAC/WAX Series CLI Reference Guide
70
Chapter 11 Wireless LAN Profiles
Table 27 Input Values for General SSID Profile Commands (continued)
LABELDESCRIPTION
macfilterprofile
description2
Assigns an existing MAC filter profile to the SSID profile. You may use 1-31
alphanumeric characters, underscores (
cannot be a number. This value is case-sensitive.
Sets the description of the profile. You may use up to 60 alphanumeric characters,
underscores (
_), or dashes (-). This value is case-sensitive.
_), or dashes (-), but the first character
The following table describes the commands available for SSID profile management. You must use the configure
terminal
command to enter the configuration mode before you can use these commands.
Table 28 Command Summary: SSID Profile
COMMANDDESCRIPTION
show wlan-ssid-profile {all | rule_count |
ssid_profile_name}
wlan-ssid-profile rename
ssid_profile_name1 ssid_profile_name2
[no] wlan-ssid-profile ssid_profile_name
[no] block-intra
description description
[no] dot11k-v activate
downlink-rate-limit data_rate
exit
[no] hide
[no] l2isolation l2profile
[no] macfilter macfilterprofile
Displays the SSID profile(s).
all: Displays all profiles.
rule_count: Displays how many SSID profiles are
created on the Zyxel Device.
ssid_profile_name: Displays the specified profile.
Gives an existing SSID profile (ssid_profile_name1) a
new name (ssid_profile_name2).
Enters configuration mode for the specified SSID
profile. Use the no parameter to remove the specified
profile.
Enables intra-BSSID traffic blocking. Use the no
parameter to disable it in this profile.
By default this is disabled.
Sets a descriptive name for this profile.
Enable IEEE 802.11k/v assisted roaming on the Zyxel
Device. When the connected clients request 802.11k
neighbor lists, the Zyxel Device will response with a list
of neighbor APs that can be candidates for roaming.
Use the no parameter to disable it in this profile.
Sets the maximum incoming transmission data rate
(either in mbps or kbps) on a per-station basis.
Exits configuration mode for this profile.
Prevents the SSID from being publicly broadcast. Use
the no parameter to re-enable public broadcast of
the SSID in this profile.
By default this is disabled.
Assigns the specified layer-2 isolation profile to this SSID
profile. Use the no parameter to remove it.
By default, no layer-2 isolation profile is assigned.
Assigns the specified MAC filtering profile to this SSID
profile. Use the no parameter to remove it.
Sets the Zyxel Device to answer ARP requests for an IP
address on behalf of a client associated with this SSID.
This can reduce broadcast traffic and improve
network performance.
Use the no parameter to disable Proxy ARP.
Sets the type of QoS used by this SSID.
Assigns the specified security profile to this SSID profile.
Sets the SSID. This is the name visible on the network to
wireless clients. Enter up to 32 characters, spaces and
underscores are allowed.
Enables the SSID schedule. Use the no parameter to
disable the SSID schedule.
Sets whether the SSID is enabled or disabled on each
day of the week. This also specifies the hour and
minute (in 24-hour format) to set the time period of
each day during which the SSID is enabled/enabled.
<hh:mm> <hh:mm>: If you set both start time and end
time to 00:00, it indicates a whole day event.
Note: The end time must be larger than the start
time.
[no] uapsd
uplink-rate-limit data_rate
[no] vlan-id <1..4094>
Enables Unscheduled Automatic Power Save Delivery
(U-APSD), which is also known a s WMM-Power Save.
This helps increase battery life for battery-powered
wireless clients connected to the Zyxel Device using
this SSID profile.
Use the no parameter to disable the U-APSD feature.
Sets the maximum outgoing transmission data rate
(either in mbps or kbps) on a per-station basis.
Applies to each SSID profile. If the VLAN ID is equal to
the AP’s native VLAN ID then traffic originating from
the SSID is not tagged.
The default VLAN ID is 1.
11.3.1 SSID Profile Example
The following example creates an SSID profile with the name ‘Zyxel’. It makes the assumption that both the security
profile (SECURITY01) and the MAC filter profile (MACFILTER01) already exist.
The following table identifies the values required for many of these commands. Other input values are discussed with
the corresponding commands.
Table 29 Input Values for General Security Profile Commands
LABELDESCRIPTION
security_profile_name
wep_key
wpa_key
wpa_key_64
secret
auth-method
The following table describes the commands available for security profile management. You must use the
configure terminal command to enter the configuration mode before you can use these commands.
The security profile name. You may use 1-31 alphanumeric characters, underscores
(
_), or dashes (-), but the first character cannot be a number. This value is case-
sensitive.
Sets the WEP key encryption strength. Select either 64bit or 128bit.
Sets the WPA/WPA2 pre-shared key in ASCII. You may use 8~63 alphanumeric
characters. This value is case-sensitive.
Sets the WPA/WPA2 pre-shared key in HEX. You muse use 64 alphanumeric
characters.
Sets the shared secret used by your network’s RADIUS server.
The authentication method used by the security profile.
Table 30 Command Summary: Security Profile
COMMANDDESCRIPTION
show wlan-security-profile {all |
rule_count | [security_profile_name]}
wlan-security-profile rename
security_profile_name1
security_profile_name2
[no] wlan-security-profile
security_profile_name
[no] accounting interim-interval
<1..1440>
[no] accounting interim-update
description description
[no] dot11r activate
Displays the security profile(s).
all: Displays all profiles.
rule_count: Displays how many security profiles are
created on the Zyxel Device.
security_profile_name: Displays the specified
profile.
Gives existing security profile
(security_profile_name1) a new name,
(security_profile_name2).
Enters configuration mode for the specified security
profile. Use the no parameter to remove the specified
profile.
Sets the time interval for how often the Zyxel Device is
to send an interim update message with current client
statistics to the accounting server. Use the no
parameter to clear the interval setting.
Sets the Zyxel Device to send accounting update
messages to the accounting server at the specified
interval. Use the no parameter to disable it.
Sets the description for the profile. You may use up to
60 alphanumeric characters, underscores (_), or
dashes (-). This value is case-sensitive
Turns on IEEE 802.11r fast roaming on the Zyxel Device.
Use the no parameter to turn it off.
Sets the clients to communicate with the target AP
through the current AP (the Zyxel Device). The
communication between the client and the target AP
is carried in frames between the client and the current
AP, and is then sent to the target AP through the wired
Ethernet connection.
Use the no parameter to have the clients
communicate directly with the target AP.
Note: This command is applicable to the Zyxel
Devices running with firmware version 5.30
or later.
[no] dot11r over-the-ds activate
Sets the clients to communicate with the target AP
through the current AP (the Zyxel Device). The
communication between the client and the target AP
is carried in frames between the client and the current
AP, and is then sent to the target AP through the wired
Ethernet connection.
Use the no parameter to have the clients
communicate directly with the target AP.
[no] dot11w
dot11w-op <1..2>
[no] dot1x-eap
eap {external | internal auth_method}
group-key <30..30000>
Note: This command is applicable to the Zyxel
Devices running with firmware version
older than v5.30.
Data frames in 802.11 WLANs can be encrypted and
authenticated with WEP, WPA or WPA2. But 802.11
management frames, such as beacon/probe
response, association request, association response,
de-authentication and disassociation are always
unauthenticated and unencrypted. IEEE 802.11w
Protected Management Frames allows APs to use the
existing security mechanisms (encryption and
authentication methods defined in IEEE 802.11i WPA/
WPA2) to protect management frames. This helps
prevent wireless DoS attacks.
Enables management frame protection (MFP) to add
security to 802.11 management frames. Use the no
parameter to disable it.
Sets whether wireless clients have to support
management frame protection in order to access the
wireless network.
1: if you do not require the wireless clients to support
MFP. Management frames will be encrypted if the
clients support MFP.
2: wireless clients must support MFP in order to join the
Zyxel Device’s wireless network.
Enables 802.1x secure authentication. Use the no
parameter to disable it.
Sets the 802.1x authentication method.
Sets the interval (in seconds) at which the AP updates
the group WPA/WPA2 encryption key.
The default is 1800.
Sets the idle interval (in seconds) that a client can be
idle before authentication is discontinued.
The default is 3000.
MAC authentication has the AP use an external server
to authenticate wireless clients by their MAC
addresses. Users cannot get an IP address if the MAC
authentication fails. The no parameter turns it off.
RADIUS servers can require the MAC address in the
wireless client’s account (username/password) or
Calling Station ID RADIUS attribute.
Sets the authentication method for MAC
authentication.
Sets the case (upper or lower) the external server
requires for using MAC addresses as the account
username and password.
For example, use mac-auth case account upper
and mac-auth delimiter account dash if you need
to use a MAC address formatted like 00-11-AC-01-A011 as the username and password.
Sets the case (upper or lower) the external server
requires for letters in MAC addresses in the Calling
Station ID RADIUS attribute.
Specify the separator the external server uses for the
two-character pairs within MAC addresses used as the
account username and password.
For example, use mac-auth case account upper
and mac-auth delimiter account dash if you need
to use a MAC address formatted like 00-11-AC-01-A011 as the username and password.
Select the separator the external server uses for the
pairs in MAC addresses in the Calling Station ID RADIUS
attribute.
Sets the security mode for this profile.
Activates server authentication. Use the no parameter
to deactivate.
Sets the NAS (Network Access Server) identifier
attribute if the RADIUS server requires the Zyxel Dev ice
to provide it. The NAS identifier is to identify the source
of access request. It could be the NAS’s fully qualified
domain name.
Sets the NAS (Network Access Server) IP address
attribute if the RADIUS server requires the Zyxel Dev ice
to provide it.
Sets the interval (in seconds) between authentication
requests.
The default is 0.
Sets the server authentication IPv4 port and shared
Enables backward compatibility when used with
WPA3 or Enhanced Open security mode. WPA3 falls
back to WPA2, while Enhanced Open falls back to
open (none).
Use the no command to disable this feature.
Sets the authentication key type to either open or
share.
Sets the WEP encryption strength (64 or 128) and the
default key index (1 ~ 4).
If you select WEP-64 enter 10 hexadecimal digits in the
range of “A-F”, “a-f” and “0-9” (for example,
0x11AA22BB33) for each Key used; or enter 5 ASCII
characters (case sensitive) ranging from “a-z”, “A-Z”
and “0-9” (for example, MyKey) for each Key used.
If you select WEP-128 enter 26 hexadecimal digits in
the range of “A-F”, “a-f” and “0-9” (for example,
0x00112233445566778899AABBCC) for each Key used;
or enter 13 ASCII characters (case sensitive) ranging
from “a-z”, “A-Z” and “0-9” (for example,
MyKey12345678) for each Key used.
wpa-encrypt {aes | auto}
wpa-psk {wpa_key | wpa_key_64}
[no] wpa2-preauth
exit
You can save up to four different keys. Enter the
default-key (1 ~ 4) to save your WEP to one of
those four available slots.
Sets the WPA/WPA2 encryption cipher type.
auto: This automatically chooses the best available
cipher based on the cipher in use by the wireless client
that is attempting to make a connection.
aes: This is the Advanced Encryption Standard
encryption method, a newer more robust algorithm
than TKIP Not all wireless clients may support this.
Sets the WPA/WPA2 pre-shared key.
Enables pre-authentication to allow wireless clients to
switch APs without having to re-authenticate their
network connection. The RADIUS server puts a
temporary PMK Security Authorization cache on the
wireless clients. It contains their session ID and a preauthorized list of viable APs.
Use the no parameter to disable this.
Exits configuration mode for this profile.
NWA/WAC/WAX Series CLI Reference Guide
76
11.4.1 Security Profile Example
The following example creates a security profile with the name ‘SECURITY01’.
The following table identifies the values required for many of these commands. Other input values are discussed with
the corresponding commands.
Table 31 Input Values for General MAC Filter Profile Commands
LABELDESCRIPTION
macfilter_profile_name
description
The MAC filter profile name. You may use 1-31 alphanumeric characters,
underscores (
value is case-sensitive.
Sets the description of the MAC address. You may use up to 60 alphanumeric
characters, underscores (
_), or dashes (-), but the first character cannot be a number. This
_), or dashes (-). This value is case-sensitive.
The following table describes the commands available for MAC filter profile management. You must use the
configure terminal command to enter the configuration mode before you can use these commands.
Table 32 Command Summary: MAC Filter Profile
COMMANDDESCRIPTION
show wlan-macfilter-profile {all |
rule_count | [macfilter_profile_name]}
wlan-macfilter-profile rename
macfilter_profile_name1
macfilter_profile_name2
[no] wlan-macfilter-profile
macfilter_profile_name
filter-action{allow | deny}
Displays the MAC filter profil e(s).
all: Displays all profiles.
rule_count: Displays how many MAC filter profiles are
created on the Zyxel Device.
macfilter_profile_name: Displays the specified
profile.
Gives an existing MAC filter profile
(macfilter_profile_name1) a new name
(macfilter_profile_name2).
Enters configuration mode fo r the specified MAC filter
profile. Use the no parameter to remove the specified
profile.
Permits the wireless client with the MAC addresses in
this profile to connect to the network through the
associated SSID; select deny to bl ock the wireless
clients with the specified MAC addresses.
The default is set to deny.
NWA/WAC/WAX Series CLI Reference Guide
77
Chapter 11 Wireless LAN Profiles
Table 32 Command Summary: MAC Filter Profile (continued)
COMMANDDESCRIPTION
[no] mac_addr [description
description]
exit
Specifies a MAC address associated with this profile.
You can also set a description for the MAC address.
Enter up to 60 characters. Spaces and underscores
allowed.
Exits configuration mode for this profile.
11.5.1 MAC Filter Profile Example
The following example creates a MAC filter profile with the name ‘MACFILTER01’ .
The following table identifies the values required for many of these commands. Other input values are discussed with
the corresponding commands.
Table 33 Input Values for General Layer-2 Isolation Profile Commands
LABELDESCRIPTION
l2isolation_profile_n
ame
mac_address
description
The layer-2 isolation profile name. You may use 1-31 alphanumeric characters,
underscores (
value is case-sensitive.
The MAC address of the device that is allowed to communicate with the Zyxel
Device’s wireless clients. Enter 6 hexadecimal pairs separated by colons. You can
use 0-9, a-z and A-Z.
Sets the description name of MAC address in the profile. You may us e 1-60
alphanumeric characters, underscores (
_), or dashes (-), but the first character cannot be a number. This
_), or dashes (-).
NWA/WAC/WAX Series CLI Reference Guide
78
Chapter 11 Wireless LAN Profiles
The following table describes the commands available for Layer-2 Isolation profile management. You must use the
configure terminal command to enter the configuration mode before you can use these commands.
The following table identifies the values required for many of these commands. Other input values are discussed with
the corresponding commands.
Table 35 Input Values for General WDS Profile Commands
LABELDESCRIPTION
wds_profile_name
The WDS profile name. You may use 1-31 alphanumeric characters, underscores
(
_), or dashes (-), but the first character cannot be a number. This value is case-
sensitive.
NWA/WAC/WAX Series CLI Reference Guide
79
Chapter 11 Wireless LAN Profiles
The following table describes the commands available for WDS profile management. You must use the configure
terminal
command to enter the configuration mode before you can use these commands.
Table 36 Command Summary: WDS Profile
COMMANDDESCRIPTION
show wlan-wds-profile {all | rule_count |
[wds_profile_name]}
wlan-wds-profile rename
wds_profile_name1 wds_profile_name2
[no] wlan-wds-profile wds_profile_name
psk psk
ssid ssid
exit
Displays the WDS profile(s) settings.
all: Displays settings of all WDS profiles configured on
the Zyxel Device.
rule_count: Displays how many WDS profiles are
created on the Zyxel Device.
wds_profile_name: Displays settings of the specified
profile.
Gives the existing WDS profile (wds_profile_name1) a
new name, (wds_profile_name2).
Enters configuration mode for the specified WDS profile.
Sets a pre-shared key of between 8 and 63 casesensitive ASCII characters (including spaces and
symbols) or 64 hexadecimal characters.The key is used
to encrypt the traffic between the APs.
Sets the SSID with which you want the Zyxel Device to
connect to a root AP or repeater to form a WDS.
Exits configuration mode for this profile.
11.7.1 WDS Profile Example
The following example creates a WDS profile with the name ‘WDS1’, and show s the profile settings.
This chapter shows you how to set up Rogue Access Point (AP) detection and containment.
12.1 Rogue AP Detection Overview
Rogue APs are wireless access points operating in a network’s coverage area that are not under the control of the
network’s administrators, and can potentially open holes in the network security. Attackers can take advantage of a
rogue AP’s weaker (or non-existent) security to gain illicit access to the network, or set up their own rogue APs in
order to capture information from wireless clients.
Conversely, a friendly AP is one that the Zyxel Device network administrator regards as non-threatening. This does not
necessarily mean the friendly AP must belong to the network managed by the Zyxel Device; rather, it is any
unmanaged AP within range of the Zyxel Device’s own wireless network that is allowed to operate without being
contained. This can include APs from neighboring companies, for example, or even APs maintained by your
company’s employees that operate outside of the established network.
12.2 Rogue AP Detection Commands
The following table identifies the values required for many of these commands. Other input values are discussed with
the corresponding commands.
Table 37 Input Values for Rogue AP Detection Commands
LABELDESCRIPTION
ap_mac
description2
The following table describes the commands available for rogue AP detection. You must use the configure
terminal
Table 38 Command Summary: Rogue AP Detection
COMMANDDESCRIPTION
rogue-ap detection
command to enter the configuration mode before you can use these commands.
[no] activate
[no] ap-mode detection activate
Specifies the MAC address (in XX:XX:XX:XX:XX:XX or XX-XX-XX-XX-XX-XX format) of
the AP to be added to either the rogue AP or friendly AP list. The no command
removes the entry.
Sets the description of the AP. You may use 1-60 alphanumeric characters,
underscores (
_), or dashes (-). This value is case-sensitive.
Enters sub-command mode for rogue AP detection.
Activates rogue AP detection. Use the no parameter
to deactivate rogue AP detection.
Sets the Zyxel Device to detect Rogue APs in the
network.
Use the no parameter to disable rogue AP detection.
NWA/WAC/WAX Series CLI Reference Guide
81
Chapter 12 Rogue AP
Table 38 Command Summary: Rogue AP Detection (continued)
Sets the time interval (in seconds) at which the Zyxel
Device scans for rogues APs.
Sets the device that owns the specified MAC address
as a friendly AP. You can also assign a description to
this entry on the friendly AP list.
Removes the device that owns the specified MAC
address from the friendly AP list.
Sets the device that owns the specified MAC address
as a rogue AP. You can also assign a description to this
entry on the rogue AP list.
Removes the device that owns the specified MAC
address from the rogue AP list.
Specifies the characteristic(s) an AP should have for
the Zyxel Device to classify it as a Rogue AP.
Use the no parameter to remove the classification rule.
Adds an SSID Keyword.
Use the no parameter to remove the SSID keyword.
Exits configuration mode for rogue AP detection.
Displays the SSID keyword(s) an AP should have for the
Zyxel Device to rule it as a Rogue AP.
Displays a table of detected APs and information
about them, such as their MAC addresses, when they
were last seen, and their SSIDs, to name a few.
Displays the specified rogue/friendly/all AP list.
{rogue|friendly|all}
show rogue-ap detection status
show rogue-ap detection info
Displays whether rogue AP detection is on or off.
Displays a summary of the number of detected
devices from the following categories: rogue, friendly,
ad-hoc, unclassified, and total.
12.2.1 Rogue AP Detection Examples
This example sets the device associated with MAC address 00:13:49:11:11:11 as a rogue AP, and the device
associated with MAC address 00:13:49:11:11:22 as a friendly AP. It then removes MAC address from the rogue AP list
with the assumption that it was misidentified.
This example displays the rogue AP detection list.
Router(config)# show rogue-ap detection list rogue
no. mac description
contain
===========================================================================
1 00:13:49:18:15:5A
0
This example shows the friendly AP detection list.
Router(config)# show rogue-ap detection list friendly
no. mac description
===========================================================================
1 11:11:11:11:11:11 third floor
2 00:13:49:11:22:33
3 00:13:49:00:00:05
4 00:13:49:00:00:01
5 00:0D:0B:CB:39:33 dept1
This example shows the combined rogue and friendly AP detection list.
Router(config)# show rogue-ap detection list all
no. role mac description
===========================================================================
1 friendly-ap 11:11:11:11:11:11 third floor
2 friendly-ap 00:13:49:11:22:33
3 friendly-ap 00:13:49:00:00:05
4 friendly-ap 00:13:49:00:00:01
5 friendly-ap 00:0D:0B:CB:39:33 dept1
6 rogue-ap 00:13:49:18:15:5A
This example shows both the status of rogue AP detection and the summary of detected APs.
Router(config)# show rogue-ap detection status
rogue-ap detection status: on
Router(config)# show rogue-ap detection info
rogue ap: 1
friendly ap: 4
adhoc: 4
unclassified ap: 0
total devices: 0
12.3 Rogue AP Containment Overview
These commands enable rogue AP containment. You can use them to isolate a device that is flagged as a rogue
AP. They are global in that they apply to all managed APs on the network (all APs utilize the same containment list,
but only APs set to monitor mode can actively engage in containment of rogue APs). This means if we add a MAC
address of a device to the containment list, then every AP on the network will respect it.
NWA/WAC/WAX Series CLI Reference Guide
83
Note: Containing a rogue AP means broadcasting unviable login data at it, preventing legitimate
wireless clients from connecting to it. This is a kind of Denial of Service attack.
12.4 Rogue AP Containment Commands
The following table identifies the values required for many of these commands. Other input values are discussed with
the corresponding commands.
Table 39 Input Values for Rogue AP Containment Commands
LABELDESCRIPTION
ap_mac
Specifies the MAC address (in XX:XX:XX:XX:XX:XX format) of the AP to be
contained. The no command removes the entry.
The following table describes the commands available for rogue AP containment. You must use the
terminal
Table 40 Command Summary: Rogue AP Containment
COMMANDDESCRIPTION
rogue-ap containment
show rogue-ap containment list
command to enter the configuration mode before you can use these commands.
Enters sub-command mode for rogue AP
containment.
[no] activate
[no] contain ap_mac
exit
Activates rogue AP containment. Use the no
parameter to deactivate rogue AP containment.
Isolates the device associated with the specified MAC
address. Use the no parameter to remove this device
from the containment list.
Exits configuration mode for rogue AP containment.
Displays the rogue AP containment list.
configure
12.4.1 Rogue AP Containment Example
This example contains the device associated with MAC address 00:13:49:11:11:12 then displays the containment list
for confirmation.
Router(config)# rogue-ap containment
Router(config-containment)# activate
Router(config-containment)# contain 00:13:49:11:11:12
Router(config-containment)# exit
Router(config)# show rogue-ap containment list
no. mac
=====================================================================
1 00:13:49:11:11:12
NWA/WAC/WAX Series CLI Reference Guide
84
Chapter 13 Wireless Frame Capture
CHAPTER 13
Wireless Frame Capture
This chapter shows you how to configure and use wireless frame capture on the Zyxel Device.
13.1 Wireless Frame Capture Overview
Troubleshooting wireless LAN issues has always been a challenge. Wireless sniffer tools like Ethereal can help capture
and decode packets of information, which can then be analyzed for debugging. It works well for local data traffic,
but if your devices are spaced increasingly farther away then it often becomes correspondingly difficult to attempt
remote debugging. Complicated wireless packet collection is arguably an arduous and perplexing process. The
wireless frame capture feature in the Zyxel Device can help.
This chapter describes the wireless frame capture commands, which allows a network administrator to capture
wireless traffic information and download it to an Ethereal/Tcpdump compatible format packet file for analysis.
13.2 Wireless Frame Capture Commands
The following table identifies the values required for many of these commands. Other input values are discussed with
the corresponding commands.
Table 41 Input Values for Wireless Frame Capture Commands
LABELDESCRIPTION
ip_address
mon_file_size
file_name
The IP address of the Access Point (AP) that you want to monitor. Enter a standard
IPv4 IP address (for example, 192.168.1.2).
The size (in kbytes) of file to be captured.
It stops the capture and generates the capture file when either it reaches this size
or the total combined size of all files in the directory reaches the maximum size
which is 50 megabytes (51200 kbytes).
The file name prefix for each captured file. The default prefix is monitor while the
default file name is monitor.dump.
You can use 1-31 alphanumeric characters, underscores or dashes but the first
character cannot be a number. This string is case sensitive.
NWA/WAC/WAX Series CLI Reference Guide
85
Chapter 13 Wireless Frame Capture
The following table describes the commands available for wireless frame capture. You must use the configure
terminal
command to enter the configuration mode before you can use these commands.
Table 42 Command Summary: Wireless Frame Capture
COMMANDDESCRIPTION
frame-capture configure
src-ip add ip_address
file-prefix file_name
files-size mon_file_size
exit
[no] frame-capture activate
show frame-capture status
show frame-capture config
Enters sub-command mode for wireless frame
capture.
Sets the IP address of an AP controlled by the Zyxel
Device that you want to monitor. You can use this
command multiple times to add additional IPs to the
monitor list.
Sets the file name prefix for each captured file. Enter
up to 31 alphanumeric characters. Spaces and
underscores are not allowed.
Sets the size (in kbytes) of files to be captured.
Exits configuration mode for wireless frame capture.
Starts wireless frame capture. Use the no parameter to
turn it off.
Displays whether frame capture is running or not.
Displays the frame capture configuration.
13.2.1 Wireless Frame Capture Examples
This example configures the wireless frame capture parameters for an AP located at IP address 192.168.1.2.
This chapter shows you how to configure and use dynamic channel selection on the Zyxel Device.
14.1 DCS Overview
Dynamic Channel Selection (DCS) is a feature that allows an AP to automatically select the radio channel upon
which it broadcasts by passively listening to the area around it and determining what channels are currently being
broadcast on by other devices.
When numerous APs broadcast within a given area, they introduce the possibility of heightened radio interference,
especially if some or all of them are broadcasting on the same radio channel. This can make accessing the network
potentially rather difficult for the stations connected to them. If the interference becomes too great, then the
network administrator must open his AP configuration options and manually change the channel to one that no
other AP is using (or at least a channel that has a lower level of interference) in order to give the connected stations
a minimum degree of channel interference.
14.2 DCS Commands
See Section 11.2 on page 63 for detailed information about how to configure DCS settings in a radio profile.
The following table describes the commands available for dynamic channel selection. You must use the
configure terminal command to enter the configuration mode before you can use these commands.
Table 43 Command Summary: DCS
COMMANDDESCRIPTION
dcs now
Sets the Zyxel Device to scan for and select an available channel
immediately.
NWA/WAC/WAX Series CLI Reference Guide
87
Chapter 15 Wireless Load Balancing
CHAPTER 15
Wireless Load Balancing
This chapter shows you how to configure wireless load balancing.
15.1 Wireless Load Balancing Overview
Wireless load balancing is the process whereby you limit the number of connections allowed on an wireless access
point (AP) or you limit the amount of wireless traffic transmitted and received on it. Because there is a hard upper
limit on the AP’s wireless bandwidth, this can be a crucial function in areas crowded with wireless users. Rather than
let every user connect and subsequently dilute the available bandwidth to the point where each connecting
device receives a meager trickle, the load balanced AP instead limits the incoming connections as a means to
maintain bandwidth integrity.
15.2 Wireless Load Balancing Commands
The following table describes the commands available for wireless load balancing. You must use the configure
command to enter the configuration mode before you can use these commands.
Enables an overloaded AP to disconnect (“kick”) idle
clients or clients with noticeably weak connections.
Enables load balancing based on either number of
stations (also known as wireless clients) or wireless
traffic on an AP.
station or traffic: once the threshold is crossed
(either the maximum station numbers or with network
traffic), the Zyxel Device delays association request
and authentication request packets from any new
station that attempts to make a connection.
smart-classroom: the Zyxel Device ignores
association request and authentication request
packets from any new station when the maximum
number of stations is reached.
If load balancing by the number of stations/wireless
clients, this sets the maximum number of devices
allowed to connect to a load-balanced AP.
If load balancing by traffic threshold, this sets the
traffic threshold level.
Sets the load balancing alpha value.
When the AP is balanced, then this setting delays a
client’s association with it by this number of seconds.
Note: This parameter has been optimized for
the Zyxel Device and should not be
changed unless you have been
specifically directed to do so by Zyxel
support.
load-balancing beta <1..255>
Sets the load balancing beta value.
When the AP is overloaded, then this setting delays a
client’s association with it by this number of seconds.
Note: This parameter has been optimized for
the Zyxel Device and should not be
changed unless you have been
specifically directed to do so by Zyxel
support.
load-balancing sigma <51..100>
Sets the load balancing sigma value.
This value is algorithm parameter used to calculate
whether an AP is considered overloaded, balanced,
or underloaded. It only applies to ‘by traffic mode’.
load-balancing timeout <1..255>
load-balancing liInterval <1..255>
load-balancing kickInterval <1..255>
show load-balancing config
show load-balancing loading
[no] load-balancing activate
Note: This parameter has been optimized for
the Zyxel Device and should not be
changed unless you have been
specifically directed to do so by Zyxel
support.
Sets the length of time that an AP retains load
balancing information it receives from other APs within
its range.
Sets the interval in seconds that each AP
communicates with the other APs in its range for
calculating the load balancing algorithm.
Note: This parameter has been optimized for
the Zyxel Device and should not be
changed unless you have been
specifically directed to do so by Zyxel
support.
Enables the kickout feature for load balancing and
also sets the kickout interval in seconds. While load
balancing is enabled, the AP periodically disconnects
stations at intervals equal to this setting.
This occurs until the load balan cing threshold is no
longer exceeded.
Displays the load balancing configuration.
Displays the loading status per radio (underload /
balance / overload) when you enable the load
balancing function.
Enables load balancing. Use the no parameter to
disable it.
NWA/WAC/WAX Series CLI Reference Guide
89
Chapter 15 Wireless Load Balancing
15.2.1 Wireless Load Balancing Examples
The following example shows you how to configure AP load balancing in "by station" mode. The maximum number of
stations is set to 1.
Router(config)# load-balancing mode station
Router(config)# load-balancing max sta 1
Router(config)# show load-balancing config
load balancing config:
Activate: yes
Kickout: no
Mode: station
Max-sta: 1
Traffic-level: high
Alpha: 5
Beta: 10
Sigma: 60
Timeout: 20
LIInterval: 10
KickoutInterval: 20
The following example shows you how to configure AP load balancing in "by traffic" mode. The traffic level is set to
low, and "disassociate station" is enabled.
This chapter shows you how to configure the iBeacon advertising settings for the Zyxel Device that
supports Bluetooth Low Energy (BLE). Bluetooth Low Energy, which is also known as Bluetooth Smart,
transmits less data over a shorter distance but consumes less power than classic Bluetooth.
On the WAC5302D-S, you need to attach a supported BLE USB dongle to its USB port to have the AP act
as a beacon to broadcast packets. Contact Zyxel customer support if you are not sure whether your BLE
USB dongle is compatible with the Zyxel Device.
16.1 Bluetooth Overview
iBeacon is Apple’s communication protocol on top of Bluetooth Low Energy wireless technology.
Beacons (Bluetooth radio transmitters) or BLE enabled devices broadcast packets to every device
around it to announce their presence. Advertising packets contain their iBeacon ID, which consists of
the Universally Unique Identifier (UUID), major number, and minor number. These packets also contain a
TX (transmit) power measured at a reference point, which is used to approximate a device’s distance
from the beacon. The UUID can be used to identify a service, a device, a manufacturer or an owner.
The 2-byte major number is to identify and distinguish a group, and the 2-byte minor number is to identify
and distinguish an individual.
CHAPTER 16
Bluetooth
For example, a company can set all its beacons to share the same UUID. The beacons in a particular
branch uses the same major number, and each beacon in a branch can have its own minor number.
Developers can create apps that respond to the iBeacon ID that your Zyxel Device broadcasts. An app
that is associated with the Zyxel Device’s iBeacon ID can measure the proximity of a customer to a
beacon. This app can then push messages or trigger prompts and actions based on this information. This
allows you to send highly contextual and highly localized advertisements to customers.
NWA/WAC/WAX Series CLI Reference Guide
91
Chapter 16 Bluetooth
16.2 Bluetooth Commands
The following table describes the commands available for Bluetooth advertising settings. You must use
the configure terminal command before you can use these commands.
Table 45 Bluetooth Commands
COMMANDDESCRIPTION
ble slot_name
ibeacon index <1..5> no
activate
ibeacon index <1..5> activate
ibeacon index <1..5> uuid uuid
major <0..65535> minor
<0..65535>
show ble advertising
show ble uuid-gen
show ble status
Enters the Bluetooth sub-command mode for the specified radio
on the Zyxel Device.
Disables the specified iBeacon ID.
Enables the specified iBeacon ID.
Adds a new iBeacon ID to be included in the Bluetooth
advertising packets by specifying the UUID, major number and
minor number.
UUID: Enter 32 hexadecimal digits in the range of “A-F”, “a-f”
and “0-9”, split into five groups separated by hyphens (-). The
UUID format is as follows: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx (8-44-4-12).
Major/minor number: Enter an integer from 0 to 65535.
Displays the Bluetooth advertising settings (beacon IDs) of the
Zyxel Device.
Displays the UUID that is automatically generated by the Zyxel
Device.
Displays the Zyxel Device’s Bluetooth status and detailed
information.
16.2.1 Bluetooth Commands Example
The following example adds a beacon ID and displays the Bluetooth advertising settings.
Router(config)# show ble uuid-gen
UUID: 72F3CCD4-2D00-4158-8BA0-AF1A586E92AD
Router(config)# ble slot1
Router(config-ble-slot)# ibeacon index 1 uuid 72F3CCD4-2D00-4158-8BA0AF1A586E92AD major 1 minor 1
Router(config-ble-slot)# ibeacon index 1 activate
Router(config-ble-slot)# exit
Router(config)# show ble advertising
Slot Index Activate UUID Major Minor
=====================================================================
1 1 1 72F3CCD4-2D00-4158-8BA0-AF1A586E92AD 1 1
1 2 0 0 0
1 3 0 0 0
1 4 0 0 0
1 5 0 0 0
Router(config)#
NWA/WAC/WAX Series CLI Reference Guide
92
This chapter explains how to use the certificates.
17.1 Certificates Overview
The Zyxel Device can use certificates (also called digital IDs) to authenticate users. Certificates are
based on public-private key pairs. A certificate contains the certificate owner’s identity and public key.
Certificates provide a way to exchange public keys for use in authentication.
A Certification Authority (CA) issues certificates and guarantees the identity of each certificate owner.
There are commercial certification authorities like CyberTrust or VeriSign and government certification
authorities. You can use the Zyxel Device to generate certification requests that contain identifying
information and public keys and then send the certification requests to a certification authority.
CHAPTER 17
Certificates
17.2 Certificate Commands
This section describes the commands for configuring certificates.
17.3 Certificates Commands Input Values
The following table explains the values you can input with the certificate commands.
Table 46 Certificates Commands Input Values
LABELDESCRIPTION
certificate_name
cn_address
cn_domain_name
cn_email
organizational_unit
The name of a certificate. You can use up to 31 alphanumeric and
;‘~!@#$%^&()_+[]{}’,.=-
A common name IP address identifies the certificate’s owner. Type the IP address
in dotted decimal notation.
A common name domain name identifies the certificate’s owner. The domain
name is for identification purposes only and can be any string. The domain name
can be up to 255 characters. You can use alphanumeric characters, the hyphen
and periods.
A common name e-mail address identifies the certificate’s owner. The e-mail
address is for identification purposes only and can be any string. The e-mail
address can be up to 63 characters. You can use alphanumeric characters, the
hyphen, the @ symbol, periods and the underscore.
Identify the organizational unit or department to which the certificate owner
belongs. You can use up to 31 characters. You can use alphanumeric characters,
the hyphen and the underscore.
Identify the company or group to which the certificate owner belongs. You can
use up to 31 characters. You can use alphanumeric characters, the hyphen and
the underscore.
Identify the nation where the certificate owner is located. You can use up to 31
characters. You can use alphanumeric characters, the hyphen and the
underscore.
Type a number to determine how many bits the key should use (512 to 2048). The
longer the key, the more secure it is. A longer key also uses more PKI storage
space.
When you have the Zyxel Device enroll for a certificate immediately online, the
certification authority may want you to include a key (password) to identify your
certification request. Use up to 31 of the following characters. a-zA-Z09;|`~!@#$%^&*()_+\{}':,./<>=-
When you have the Zyxel Device enroll for a certificate immediately online, you
must have the certification authority’s certificate already imported as a trusted
certificate. Specify the name of the certification authority’s certificate. It can be
up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=-
When you have the Zyxel Device enroll for a certificate immediately online, enter
the IP address (or URL) of the certification authority server. You can use up to 511
of the following characters. a-zA-Z0-9'()+,/:.=?;!*#@$_%-
characters.
17.4 Certificates Commands Summary
The following table lists the commands that you can use to display and manage the Zyxel Device’s
summary list of certificates and certification requests. You can also create certificates or certification
requests. Use the
these commands.
Table 47 ca Commands Summary
COMMANDDESCRIPTION
ca enroll cmp name certificate_name cn-type
{ip cn cn_address|fqdn cn cn_domain_name|mail
cn cn_email} [ou organizational_unit] [o
organization] [c country] key-type {rsa|dsa}
key-len key_length num <0..99999999> password
password ca ca_name url url;
ca enroll scep name certificate_name cn-type
{ip cn cn_address|fqdn cn cn_domain_name|mail
cn cn_email} [ou organizational_unit] [o
organization] [c country] key-type {rsa|dsa}
key-len key_length password password ca
ca_name url url
ca generate pkcs10 name certificate_name cntype {ip cn cn_address|fqdn cn
configure terminal command to enter the configuration mode to be able to use
Enrolls a certificate with a CA using Certificate
Management Protocol (CMP). The certification
authority may want you to include a reference
number and key (password) to identify your
certification request.
Enrolls a certificate with a CA using Simple
Certificate Enrollment Protocol (SCEP). The
certification authority may want you to include
a key (password) to identify your certification
request.
Generates a PKCS#10 certification request.
NWA/WAC/WAX Series CLI Reference Guide
94
Chapter 17 Certificates
Table 47 ca Commands Summary (continued)
COMMANDDESCRIPTION
ca generate pkcs12 name name password password
ca generate x509 name certificate_name cn-type
Generates a PKCS#12 certificate.
Generates a self-signed x509 certificate.
show ca category {local|remote} name
certificate_name certpath
show ca category {local|remote} [name
certificate_name format {text|pem}]
show ca validation name name
show ca spaceusage
Renames a local (my certificates) or remote
(trusted certificates) certificate.
Enters the sub command mode for validation of
certificates signed by the specified remote
(trusted) certificates.
Deletes the specified local (my certificates) or
remote (trusted certificates) certificate.
Removes the validation configuration for the
specified remote (trusted) certificate.
Displays the certification path of the specified
local (my certificates) or remote (trusted
certificates) certificate.
Displays a summary of the certificates in the
specified category (local for my certificates or
remote for trusted certificates) or the details of a
specified certificate.
Displays the validation configuration for the
specified remote (trusted) certificate.
Displays the storage space in use by certificates.
17.5 Certificates Commands Examples
The following example creates a self-signed X.509 certificate with IP address 10.0.0.58 as the common
name. It uses the RSA key type with a 512 bit key. Then it displays the list of local certificates. Finally it
deletes the pkcs12request certification request.
Router# configure terminal
Router(config)# ca generate x509 name test_x509 cn-type ip cn 10.0.0.58 keytype rsa key-len 512
Router(config)# show ca category local
certificate: default
type: SELF
subject: CN=nwa3160-n_00134905820A
issuer: CN=nwa3160-n_00134905820A
status: EXPIRED
ID: nwa3160-n_00134905820A
type: EMAIL
valid from: 1970-01-01 02:09:16 GMT
valid to: 1989-12-27 02:09:16 GMT
Router(config)# no ca category local pkcs12request
NWA/WAC/WAX Series CLI Reference Guide
95
This chapter provides information on the commands that correspond to what you can configure in the
system screens.
18.1 System Overview
Use these commands to configure general Zyxel Device information, the system time and the console
port connection speed for a terminal emulation program. They also allow you to configure DNS settings
and determine which services/protocols can access which Zyxel Device zones (if any) from which
computers.
18.2 Host Name Commands
CHAPTER 18
System
The following table describes the commands available for the hostname and domain name. You must
use the
commands.
Table 48 Command Summary: Host Name
COMMANDDESCRIPTION
[no] domainname <domain_name>
[no] hostname <hostname>
show fqdn
configure terminal command to enter the configuration mode before you can use these
Sets the domain name. The no command removes the domain
name.
domain_name: This name can be up to 254 alphanumeric
characters long. Spaces are not allowed, but dashes “-” and
underscores “_” are accepted.
Sets a descriptive name to identify your Zyxel Device. The no
command removes the host name.
Displays the fully qualified domain name.
NWA/WAC/WAX Series CLI Reference Guide
96
Chapter 18 System
18.3 Roaming Group Commands
The following table describes the commands available for the roaming group. You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 49 Command Summary: Host Name
COMMANDDESCRIPTION
[no] roaming group group_name
Sets the name of the roaming group to which the Zyxel Device
belongs. The 802.11k neighbor list a client requests from the Zyxel
Device is generated according to the roaming group and RCPI
(Received Channel Power Indicator) value of its neighbor APs.
When a client wants to roam from the current AP to another, other
APs in the same roaming group or not in a roaming group will be
candidates for roaming. Neighbor APs in a different roaming group
will be excluded from the 802.11k neighbor lists even when the
neighbor AP has the best signal strength.
If the Zyxel Device’s roaming group is not configured, any neighbor
APs can be candidates for roaming.
The
no command removes the roaming group name.
show roaming group
18.4 Time and Date
For effective scheduling and logging, the Zyxel Device system time must be accurate. There is also a
software mechanism to set the time manually or get the current time and date from an external server.
18.4.1 Date/Time Commands
The following table describes the commands available for date and time setup.You must use the
configure terminal command to enter the configuration mode before you can use these
commands.
Table 50 Command Summary: Date/Time
COMMANDDESCRIPTION
clock date <yyyy-mm-dd> time <hh:mm:ss>
[no] clock daylight-saving
group_name: This name can be up to 31 alphanumeric and @#
characters. Dashes and underscores are also allowed. The name
should start with a letter or digit.
Displays the name of the roaming group to which the Zyxel Device
belongs.
Sets the new date in year, month and day
format manually and the new time in hour,
minute and second format.
Enables daylight saving. The no command
disables daylight saving.
NWA/WAC/WAX Series CLI Reference Guide
97
Chapter 18 System
Table 50 Command Summary: Date/Time (continued)
COMMANDDESCRIPTION
[no] clock saving-interval begin
{apr|aug|dec|feb|jan|jul|jun|mar|may|nov|oct|se
p} {1|2|3|4|last} {fri|mon|sat|sun|thu|tue|wed}
hh:mm end
{apr|aug|dec|feb|jan|jul|jun|mar|may|nov|oct|se
p} {1|2|3|4|last} {fri|mon|sat|sun|thu|tue|wed}
Configures the day and time when Daylight
Saving Time starts and ends. The
command removes the day and time when
Daylight Saving Time starts and ends.
offset: a number from 1 to 5.5 (by 0.5
increments)
hh:mm offset
clock time hh:mm:ss
[no] clock time-zone {-|+hh:mm}
[no] ntp
[no] ntp server {fqdn|w.x.y.z}
ntp sync
show clock date
show clock status
show clock time
show ntp server
Sets the new time in hour, minute and second
format.
Sets your time zone. The no command
removes time zone settings.
Saves your date and time and time zone
settings and updates the data and time every
24 hours. The
the data and time every 24 hours.
Sets the IP address or URL of your NTP time
server. The
information.
Gets the time and date from a NTP time
server.
Displays the current date of your Zyxel Device.
Displays your time zone and daylight saving
settings.
Displays the current time of your Zyxel Device.
Displays time server settings.
no
no command stops updating
no command removes time server
18.5 Console Port Speed
This section shows you how to set the console port speed when you connect to the Zyxel Device via the
console port using a terminal emulation program. The following table describes the console port
commands.
before you can use these commands.
Table 51 Command Summary: Console Port Speed
COMMANDDESCRIPTION
[no] console baud baud_rate
show console
You must use the configure terminal command to enter the configuration mode
NWA/WAC/WAX Series CLI Reference Guide
Sets the speed of the console port. The no
command resets the console port speed to the
default (115200).
baud_rate: 9600, 19200, 38400, 57600 or 115200.
Displays console port speed.
98
18.6 DNS Overview
DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice
versa. The DNS server is extremely important because without it, you must know the IP address of a
machine before you can access it.
18.6.1 DNS Commands
The following table identifies the values required for many of these commands. Other input values are
discussed with the corresponding commands.
Table 52 Input Values for General DNS Commands
LABELDESCRIPTION
address_object
interface_name
The name of the IP address (group) object. You may use 1-31 alphanumeric characters,
underscores(
sensitive.
The name of the interface.
Ethernet interface: gex, x = 1 - N, where N equals the highest numbered Ethernet interface
for your Zyxel Device model.
Chapter 18 System
_), or dashes (-), but the first character cannot be a number. This value is case-
VLAN interface: vlanx, x = 0 - 511.
The following table describes the commands available for DNS. You must use the
terminal
command to enter the configuration mode before you can use these commands.
Table 53 Command Summary: DNS
COMMANDDESCRIPTION
[no] ip dns server a-record fqdn w.x.y.z
ip dns server cache-flush
[no] ip dns server mx-record domain_name
{w.x.y.z|fqdn}
ip dns server rule {<1..32>|append|insert
Sets an A record that specifies the mapping of a
fully qualified domain name (FQDN) to an IP
address. The
Clears the DNS server cache.
Sets a MX record that specifie s a mail server that
is responsible for handling the mail for a particular
domain. The
Sets a service control rule for DNS requests.
no command deletes an A record.
no command deletes a MX record.
<1..32>} access-group {ALL|profile_name} zone
{ALL|profile_name} action {accept|deny}
ip dns server rule move <1..32> to <1..32>
ip dns server zone-forwarder
{<1..32>|append|insert <1..32>}
{domain_zone_name|*} user-defined w.x.y.z
[private | interface {interface_name | auto}]
ip dns server zone-forwarder move <1..32> to
<1..32>
no ip dns server rule <1..32>
Changes the number of a service control rule.
Sets a domain zone forwarder record that
specifies a DNS server’s IP address.
private | interface: Use private if the Zyxel
Device connects to the DNS server through a
VPN tunnel. Otherwise, use the interface
command to set the interface through which the
Zyxel Device sends DNS queries to a DNS server.
The auto means any interface that the Zyxel
Device uses to send DNS queries to a DNS server
according to the routing rule.
Changes the index number of a zone forwarder
record.
Deletes a service control rule.
configure
NWA/WAC/WAX Series CLI Reference Guide
99
Table 53 Command Summary: DNS (continued)
COMMANDDESCRIPTION
show ip dns server database
show ip dns server status
18.6.2 DNS Command Example
This command sets an A record that specifies the mapping of a fully qualified domain name
(www.abc.com) to an IP address (210.17.2.13).
Router# configure terminal
Router(config)# ip dns server a-record www.abc.com 210.17.2.13
18.7 Power Mode
This section shows you how to configure and view the Zyxel Device‘s power settings. The following table
describes the power mode commands.
the configuration mode before you can use these commands.
Chapter 18 System
Displays all configured records.
Displays whether this service is enabled or not.
You must use the configure terminal command to enter
Table 54 Command Summary: Power Mode
COMMANDDESCRIPTION
[no] override-full-power activate
Forces the Zyxel Device to draw full power from the
power sourcing equipment. This improves
performance in cases when a PoE injector that
does not support PoE negotiation is used.
Use the no command to disable this feature.
Note: Only enable this if you are using a
passive PoE injector that is not IEEE
802.3at/bt compliant but can still
provide full power.
show override-full-power status
show power mode
Displays whether the Zyxel Device is forced to draw
full power from the power sourcing equipment.
Displays the Zyxel Device’s power status.
Full - the Zyxel Device receives power using a
power adaptor and/or through a PoE switch/
injector using IEEE 802.3at PoE plus.
Limited - the Zyxel Device receives power through
a PoE switch/injector using IEEE 802.3af PoE even
when it is also connected to a power source using
a power adaptor.
When the Zyxel Device is in limited power mode,
the Zyxel Device throughput decreases and has
just one transmitting radio chain.
It always shows Full if the Zyxel Device does not
support power detection.
NWA/WAC/WAX Series CLI Reference Guide
100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.