
AOS-W 6.2 Command-Line Reference Guide
0510949-01
AOS-W 6.2 Command-Line Reference Guide
PDF preview unavailable.
Open the PDF or use the Download button.
OAW-4x50 AOS-W v6.2 CLI Reference Guide AOS-W 6.2 Command-Line Interface
Reference Guide
Copyright Information
© 2013 Alcatel-Lucent. All rights reserved.
Specifications in this manual are subject to change without notice.
Originated in the USA.
AOS-W, Alcatel 4302, Alcatel 4304, Alcatel 4306, Alcatel 4308, Alcatel 4324, Alcatel 4504, Alcatel 4604, Alcatel 4704, Alcatel 6000, OAW-AP41, OAW-AP68, OAW-AP60/61/65, OAW-AP70, OAW-AP80, OAW-AP92/93, OAWAP105, OAW-AP120/121, OAW-AP124/125, OAW-AP175, OAW-IAP92/93/105, OAW-RAP2, OAW-RAP5, and Omnivista 3600 Air Manager are trademarks of Alcatel-Lucent in the United States and certain other countries.
Any other trademarks appearing in this manual are the property of their respective companies. Includes software from Litech Systems Design. The IF-MAP client library copyright 2011 Infoblox, Inc. All rights reserved. This product includes software developed by Lars Fenneberg et al.
Legal Notice
The use of Alcatel-Lucent switching platforms and software, by all individuals or corporations, to terminate Cisco or Nortel VPN client devices constitutes complete acceptance of liability by that individual or corporation for this action and indemnifies, in full, Alcatel- Lucent from any and all legal actions that might be taken against it with respect to infringement of copyright on behalf of Cisco Systems or Nortel Networks.
0510950-01 | March 2013
2
Introduction
The AOS-W 6.2 command line interface (CLI) allows you to configure and manage your switches. The CLI is accessible from a local console connected to the serial port on the switches or through a Telnet or Secure Shell (SSH) session from a remote management console or workstation.
Telnet access is disabled by default. To enable Telnet access, enter the telnet cli command from a serial connection or an SSH session, or in the WebUI navigate to the Configuration > Management > General page.
What's New In AOS-W 6.2.1.0
The following commands have been modified in the AOS-W 6.2.1.0 command line interface.
Command provision-ap ap provisioning-profile
Description
AOS-W 6.2.1.0 introduces the cellular_nw_preference parameter for provisioning a multimode USB modem for a remote AP. These changes simplify modem provisioning for both 3G and 4G networks. The previous modem configuration procedure required that you define a driver for a 3G modem in the USB modem field in the AP provisioning profile, or define a driver for a 4G modem in the 4G USB type field. Starting with AOS-W 6.2.1.0, you can configure drivers for both a 3G or a 4G modem using the USB field, and the 4G USB Type field is deprecated
What's New In AOS-W 6.2.0.0
The following commands have been added in the AOS-W 6.2 command line interface.
Command
Description
aaa user monitor
This command checks to see whether an authenticated user's attributes differ from those in the SOS.
ap debug radio-event-log
Start and stops radio event log capture for debugging purposes, and sends a pktlog file to a dump server in the case of stop.
ap debug radio-registers dump
Allows you to collect all or specific radio register log files into a separate file.
ap lldp med-network-policy-pro- Define an LLDP MED network policy profile that defines DSCP
file
values and L2 priority levels for a voice or video application.
ap lldp profile
Link Layer Discovery Protocol (LLDP), is a Layer-2 protocol that allows network devices to advertise their identity and capabilities on a LAN. Wired interfaces on APs support LLDP by periodically transmitting LLDP Protocol Data Units (PDUs) comprised of typelength-value (TLV) elements.
ap packet-capture
Replaces the pcap command and includes open-port and close-
AOS-W 6.2 | Reference Guide
Introduction | 3
Command
Description
port subcommands for allowing packet monitoring by port.
ap remove-r1-key
This command removes the r1 key from an AP.
clock append
This command enables the timestamp feature, adding a date and time to the output of show commands.
firewall-visibility
This command enables or disables policy enforcement firewall visibility feature.
interface-profile voip-profile This command creates a VoIP profile that can be applied to any interface or an interface group.
lcd-menu
This command allows you to enable or disable the LCD menu either completely or for specific operations.
show ap radio-summary
Displays AP radios registered to this switch.
show ap remote debug r1_key
This command displays all the r1 keys that are stored in an AP.
show fast-roaming-r1efficiency
This command displays the hit/miss rate of r1 keys cached on an AP before Fast BSS transition roaming.
show firewall-visibility show gap-debug show iap table
This command displays the policy enforcement firewall visibility process state and status information.
This command displays the troubleshooting information for the global AP database.
This command displays the details of the branch Instant AP network information connected to the switch.
show interface-profile voipprofile
This command displays the specified VoIP profile configuration information.
show wlan bcn-rpt-req-profile
This command shows configuration and other information about the parameters for the Beacon Report Request frames.
show wlan handover-trigger-pro- This command displays the current configuration settings for a
file
handover trigger profile.
show wlan tsm-req-profile
This command shows configuration and other information about the Traffic Stream Measurement.
threshold
This command configures switch capacity thresholds which, when exceeded, will trigger alerts.
wlan bcn-rpt-req-profile
This command configures a Beacon Report Request Profile to provide the parameters for the Beacon Report Request frames.
Description
Configure a handover trigger profile to ensure QoS for voice calls.
wlan rrm-ie-profile
This command configure an radio resource management RRM IE profile to define the information elements advertised by
4 | Introduction
AOS-W 6.2 | Reference Guide
Command wlan tsm-req-profile
Description an AP with 802.11k support enabled. This command configures a TSM Report Request Profile.
Modified Commands
The following commands were modified in AOS-W 6.2.
Command aaa authentication mgmt aaa authentication via connection-profile
aaa authentication-server radius
aaa authentication-server tacacs copy
firewall
firewall cp
interface vlan ipv6 address ip mobile proxy mgmt-user
Parameter Description
The option to enable mschapv2 was added.
The following parameters were added: l allow-whitelist-traffic l auto-launch-supplicant l banner-message-reappear l enable-fips l enable-supplicant l whitelist
The following support was added: l enable-ipv6 and nas-ip6 parameters to specify an IPv6 host
address for the host parameter. l mac-lowercase to send MAC addresses in lowercase format.
IPv6 support was added for TACACS server. You can now specify an IPv6 host address for the host parameter.
The following parameters were added: l usb: partition <partition-number> l usb: partition <partition-number> <filename>
The following parameters were added: l enable-bridging l prevent-dhcp-exhaustion
The following parameters were added: l permit <ip-addr><ip-mask> l deny <ip-addr> l any l host l ftp, http, https, icmp, snmp, ssh, telnet and tftp
The nd parameter for configuring IPv6 neighbor discovery and IPv6 router advertizement options was introduced.
The re-home parameter is deprecated as the re-homing functionality is no longer available.
The rcp (Revocation Checkpoint) parameter was added. The rcp checks the revocation status of the SSH user's client certificate before permitting access.
AOS-W 6.2 | Reference Guide
Introduction | 5
Command
Parameter Description
provision-apsch-mode-radio-0 | sch-mode-radio-1
If you are provisioning an 802.11n-capable AP, issue the schmode-radio-0 or command to enable single-chain mode for the selected radio. AP radios in single-chain mode will transmit and receive data using only legacy rates and single-stream HT rates up to MCS 7. This setting is disabled by default.
rf arm-profilerf arm-profile
Channel quality percentage below which ARM initiates a channel change.
rf arm-profilerf arm-profile
If channel quality is below the specified channel quality threshold for this wait time period, ARM initiates a channel change.
service
The dhcpv6 parameter is introduced. This command enables DHCPv6 service on the switch.
show ap debug counters
Added AP crash information.
show ap debug system-status
Added CPU usage statistics.
show ap remote debug mgmtframes
Added deauthentication reason explanation to output table.
show datapath
Following parameters were added: l network ingress l internal dir l error counters l debug opcode l trace-route l ip-fragment
show ap debug system-status
Added parameters to display Control-Plane security, OSPF, SAPM, Station Management low priority, syslog database, user database, and wrieless management statistics.
show mgmt-users
The Revocation Checkpoint (rcp)appears in the outpoint.
show storage
Information detailing attached USB storage devices now appear in the output. This is applicable to the OAW-4x50 Series switches only.
show user
The output now shows if IP address is from DHCP.
show vlan mapping
The Assignment Type appears in the output.
vlan-name <name> [pool|assignment {even|hash}]
Sets the assignment type as even or hash.The Even assignment type is based on an even distribution of VLAN pool assignments. The hash type means that the VLAN assignment is based on the station MAC address.
wlan dot11k-profile
The following parameters were introduced:
l bcn-req-chan-11a l bcn-req-chan-11bg l ap-chan-rpt-11a l ap-chan-rpt-11bg l handover-trigger-profile l rrm-ie-profile
6 | Introduction
AOS-W 6.2 | Reference Guide
Command wlan ssid-profile
Parameter Description
l bcn-rpt-req-profile l tsm-req-profile
The handover trigger threshold parameter was deprecated, as the handover trigger settings are now configured using the handover trigger profile.
The following parameters were introduced:
l dot11r-profile l bSec-128 l bSec-256 l advertise-location l enforce-user-vlan
Deprecated Commands
The following commands were deprecated in AOS-W 6.2:
Command papi-security (deprecated)
pcap (deprecated) policer-profile (deprecated) firewall local-userdb-ap add local-userdb-ap del local-userdb-ap modify local-userdb-ap revoke qos-profile (deprecated) show papi-security (deprecated) show policer-profile (deprecated) show qos-profile (deprecated)
Description
The papi-security command configure a key on the master switch which then distributes it to other switches and APs, thus allowing each site to have a unique key.
Name changed to ap packet capture.
This command configures a Policer profile to manage the transmission rate of a class of traffic based on user-defined criteria
This clears the datapath sessions when roles are updated.
This command adds a Remote AP entry to the Remote AP whitelist table.
This command deletes a Remote AP entry from the Remote AP whitelist table.
This command modifies a Remote AP entry in the Remote AP whitelist table.
Revoke a lost or stolen remote AP to prevent unauthorized users from accessing the company's corporate network.
This command configures a QoS profile to assign TC/DP, DSCP, and 802.1p values to an interface or policer profile.
Shows a configured papi-security profile.
This command displays the policer profile configuration.
This command displays the QoS profile configuration.
AOS-W 6.2 | Reference Guide
Introduction | 7
About this Guide
This guide describes the AOS-W 6.2 command syntax. The commands in this guide are listed alphabetically.
The following information is provided for each command:
l Command Syntax--The complete syntax of the command. l Description--A brief description of the command. l Syntax--A description of the command parameters, including license requirements for specific parameters if
needed. The applicable ranges and default values, if any, are also included. l Usage Guidelines--Information to help you use the command, including: prerequisites, prohibitions, and related
commands. l Example--An example of how to use the command. l Command History--The version of AOS-W in which the command was first introduced. Modifications and
changes to the command are also noted. l Command Information--This table describes any licensing requirements, command modes and platforms for
which this command is applicable. For more information about available licenses, see the Licenses chapter of the AOS-W 6.2 User Guide.
Connecting to the Switch
This section describes how to connect to the switch to use the CLI.
Serial Port Connection
The serial port is located on the front panel of the switch. Connect a terminal or PC/workstation running a terminal emulation program to the serial port on the switch to use the CLI. Configure your terminal or terminal emulation program to use the following communication settings.
Baud Rate 9600
Data Bits 8
Parity None
Stop Bits 1
Flow Control None
The Alcatel-Lucent OAW-4x50 switch supports baud rates between 9600 and 115200.
Telnet or SSH Connection
Telnet or SSH access requires that you configure an IP address and a default gateway on the switch and connect the switch to your network. This is typically performed when you run the Initial Setup on the switch, as described in the AOS-W 6.2 Quick Start Guide. In certain deployments, you can also configure a loopback address for the switch; see interface loopback on page 322 for more information.
Configuration changes on Master Switches
Some commands can only be issued when connected to a master switch. If you make a configuration change on a master switch, all connected local switches will subsequently update their configurations as well. You can manually synchronize all of the switches at any time by saving the configuration on the master switch.
8 | Introduction
AOS-W 6.2 | Reference Guide
CLI Access
When you connect to the switch using the CLI, the system displays its host name followed by the login prompt. Log in using the admin user account and the password you entered during the Initial Setup on the switch (the password displays as asterisks). For example: (host) User: admin Password: *****
When you are logged in, the user mode CLI prompt displays. For example:
(host) >
User mode provides only limited access for basic operational testing such as running ping and traceroute.
Certain management functions are available in enable (also called "privileged") mode. To move from user mode to enable mode requires you to enter an additional password that you entered during the Initial Setup (the password displays as asterisks). For example: (host) > enable Password: ******
When you are in enable mode, the > prompt changes to a pound sign (#): (host) #
Configuration commands are available in config mode. Move from enable mode to config mode by entering configure terminal at the # prompt:
(host) # configure terminal Enter Configuration commands, one per line. End with CNTL/Z
When you are in basic config mode, (config) appears before the # prompt: (host) (config) #
There are several other sub- command modes that allow users to configure individual interfaces, subinterfaces, loopback addresses, GRE tunnels and cellular profiles. For details on the prompts and the available commands for each of these modes, see Appendix A: Command Modes on page 1250.
Command Help
You can use the question mark (?) to view various types of command help. When typed at the beginning of a line, the question mark lists all the commands available in your current mode or sub-mode. A brief explanation follows each command. For example: (host) > ?
enable logout ping traceroute
Turn on Privileged commands Exit this session. Any unsaved changes are lost. Send ICMP echo packets to a specified IP address. Trace route to specified IP address.
When typed at the end of a possible command or abbreviation, the question mark lists the commands that match (if any). For example:
(host) > c?
clear clock configure copy
Clear configuration Configure the system clock Configuration Commands Copy Files
AOS-W 6.2 | Reference Guide
Introduction | 9
If more than one item is shown, type more of the keyword characters to distinguish your choice. However, if only one item is listed, the keyword or abbreviation is valid and you can press tab or the spacebar to advance to the next keyword.
When typed in place of a parameter, the question mark lists the available options. For example:
(host) # write ? erase file memory terminal <cr>
Erase and start from scratch Write to a file in the file system Write to memory Write to terminal
The <cr> indicates that the command can be entered without additional parameters. Any other parameters are optional.
Command Completion
To make command input easier, you can usually abbreviate each key word in the command. You need type only enough of each keyword to distinguish it from similar commands. For example: (host) # configure terminal
could also be entered as: (host) # con t
Three characters (con) represent the shortest abbreviation allowed for configure. Typing only c or co would not work because there are other commands (like copy) which also begin with those letters. The configure command is the only one that begins with con.
As you type, you can press the spacebar or tab to move to the next keyword. The system then attempts to expand the abbreviation for you. If there is only one command keyword that matches the abbreviation, it is filled in for you automatically. If the abbreviation is too vague (too few characters), the cursor does not advance and you must type more characters or use the help feature to list the matching commands.
Deleting Configuration Settings
Use the no command to delete or negate previously-entered configurations or parameters.
l To view a list of no commands, type no at the enable or config prompt followed by the question mark. For example: (host) (config) # no?
l To delete a configuration, use the no form of a configuration command. For example, the following command removes a configured user role: (host) (config) # no user-role <name>
l To negate a specific configured parameter, use the no parameter within the command. For example, the following commands delete the DSCP priority map for a priority map configuration: (host) (config) # priority-map <name> (host) (config-priority-map) # no dscp priority high
Saving Configuration Changes
Each Alcatel-Lucent switch contains two different types of configuration images.
l The running-config holds the current switch configuration, including all pending changes which have yet to be saved. To view the running-config, use the following command:
(host) # show running-config
10 | Introduction
AOS-W 6.2 | Reference Guide
l The startup config holds the configuration which will be used the next time the switch is rebooted. It contains all the options last saved using the write memory command. To view the startup-config, use the following command:
(host) # show startup-config
When you make configuration changes via the CLI, those changes affect the current running configuration only. If the changes are not saved, they will be lost after the switch reboots. To save your configuration changes so they are retained in the startup configuration after the switch reboots, use the following command in enable mode:
(host) # write memory Saving Configuration...
Saved Configuration
Both the startup and running configurations can also be saved to a file or sent to a TFTP server for backup or transfer to another system.
Commands That Reset the Switch or AP
If you use the CLI to modify a currently provisioned and running radio profile, those changes take place immediately; you do not reboot the switch or the AP for the changes to affect the current running configuration. Certain commands, however, automatically force the switch or AP to reboot. You may want to consider current network loads and conditions before issuing these commands, as they may cause a momentary disruption in service as the unit resets. Note also that changing the lms-ip parameter in an AP system profile associated with an AP group will cause all APs in that AP group to reboot.
Table 1: Reset Commands
Commands that Reset an AP
Commands that Reset a Switch
l ap-regroup l ap-rename l apboot l provision-ap l ap wired-ap-profile <profile> forward-mode {bridge|split-
tunnel|tunnel} l wlan virtual-ap <profile-name> {aaa-profile <profile-name>
|forward-mode {tunnel|bridge|split-tunnel|decrypt-tunnel} |ssid-profile <profile-name>|vlan <vlan>...} l ap system-profile <profile> {bootstrap-threshold <number> |lms-ip <ipaddr> |} l wlan ssid-profile <profile-name> {battery-boost|denybcast|essid|opmode|strict-svp |wepkey1 <key> |wepkey2 <key>|wepkey3 <key>|wepkey4 <key>|weptxkey <index> |wmm |wmm-be-dscp <best-effort>|wmm-bk-dscp <background>|wmm-ts-min-inact-int <milliseconds>|wmmvi-dscp <video>|wmm-vo-dscp <voice>|wpa-hexkey <psk> |wpa-passphrase <string> } l wlan dotllk <profile-name> {bcn-measurementmode|dot11k-enable|force-dissasoc
l reload
Typographic Conventions
The following conventions are used throughout this manual to emphasize important concepts:
AOS-W 6.2 | Reference Guide
Introduction | 11
Table 2: Text Conventions Type Style
Italics Boldface Commands <angle brackets>
[square brackets] {Item_A|Item_B} {ap-name <ap-name>}|{ipaddr <ipaddr>}
Description
This style is used to emphasize important terms and to mark the titles of books.
This style is used to emphasize command names and parameter options when mentioned in the text.
This fixed-width font depicts command syntax and examples of commands and command output.
In the command syntax, text within angle brackets represents items that you should replace with information appropriate to your specific situation. For example: ping <ipaddr> In this example, you would type "ping" at the system prompt exactly as shown, followed by the IP address of the system to which ICMP echo packets are to be sent. Do not type the angle brackets.
In the command syntax, items enclosed in brackets are optional. Do not type the brackets.
In the command examples, single items within curled braces and separated by a vertical bar represent the available choices. Enter only one choice. Do not type the braces or bars.
Two items within curled braces indicate that both parameters must be entered together. If two or more sets of curled braces are separated by a vertical bar, like in the example to the left, enter only one choice Do not type the braces or bars.
Command Line Editing
The system records your most recently entered commands. You can review the history of your actions, or reissue a recent command easily, without having to retype it.
To view items in the command history, use the up arrow key to move back through the list and the down arrow key to move forward. To reissue a specific command, press Enter when the command appears in the command history. You can even use the command line editing feature to make changes to the command prior to entering it. The command line editing feature allows you to make corrections or changes to a command without retyping. Table 1 lists the editing controls. To use key shortcuts, press and hold the Ctrl button while you press a letter key.
Table 3: Line Editing Keys
Key
Effect
Description
Ctrl A
Home
Move the cursor to the beginning of the line.
Ctrl B or the left arrow
Back
Move the cursor one character left.
Ctrl D
Delete Right
Delete the character to the right of the cursor.
Ctrl E
End
Move the cursor to the end of the line.
12 | Introduction
AOS-W 6.2 | Reference Guide
Key Ctrl F or the right arrow Ctrl K Ctrl N or the down arrow Ctrl P or up arrow Ctrl T
Ctrl U Ctrl W
Ctrl X
Effect Forward Delete Right Next Previous Transpose Clear Delete Word Delete Left
Description Move the cursor one character right.
Delete all characters to the right of the cursor.
Display the next command in the command history.
Display the previous command in the command history.
Swap the character to the left of the cursor with the character to the right of the cursor.
Clear the line.
Delete the characters from the cursor up to and including the first space encountered.
Delete all characters to the left of the cursor.
Specifying Addresses and Identifiers in Commands
This section describes addresses and other identifiers that you can reference in CLI commands.
Table 4: Addresses and Identifiers
Address/Identifier Description
IP address
For any command that requires entry of an IP address to specify a network entity, use IPv4 network address format in the conventional dotted decimal notation (for example, 10.4.1.258).
Netmask address
For subnet addresses, specify a netmask in dotted decimal notation (for example, 255.255.255.0).
Media Access Control For any command that requires entry of a device's hardware address, use the
(MAC) address
hexadecimal format (for example, 00:05:4e:50:14:aa).
Service Set Identifier (SSID)
A unique character string (sometimes referred to as a network name), consisting of no more than 32 characters. The SSID is case-sensitive (for example, WLAN01).
Basic Service Set Identifier (BSSID)
This entry is the unique hard-wireless MAC address of the AP. A unique BSSID applies to each frequency-- 802.11a and 802.11g--used from the AP. Use the same format as for a MAC address.
Extended Service Set Typically the unique logical name of a wireless network. If the ESSID includes
Identifier (ESSID)
spaces, you must enclose the name in quotation marks.
Fast Ethernet or Gigabit Ethernet interface
Any command that references a Fast Ethernet or Gigabit Ethernet interface requires that you specify the corresponding port on the switch in the format <slot>/<port>: <slot> is always 1, except when referring to interfaces on the OAW-6000 switch.For the OAW-6000switch, the four slots are allocated as follows: l Slot 0: Contains an OmniAccess Supervisor Card III. l Slot 1: Contains an OmniAccess Supervisor Card III.
AOS-W 6.2 | Reference Guide
Introduction | 13
Address/Identifier
Description
l Slot 2: Contains an OmniAccess Supervisor Card III. l Slot 3: Can contain either a OmniAccess Supervisor Card III or a line card. <port> refers to the network interfaces that are embedded in the front panel of the OAW-4x04 Series switch, OmniAccess Supervisor Card III, or a line card installed in the OAW-6000 switch. Port numbers start at 0 from the left-most position. Use the show port status command to obtain the interface information currently available from a switch.
Contacting Alcatel-Lucent
Table 5: Alcatel-Lucent Contacts
Contact Center Online
l Main Site
http://www.alcatel-lucent.com/enterprise
l Support Site
https://service.esd.alcatel-lucent.com
l Email
esd.support@alcatel-lucent.com
Service & Support Contact Center Telephone
l North America
1-800-995-2696
l Latin America
1-877-919-9526
l Europe
+33 (0) 38 855 6929
l Asia Pacific
+65 6240 8484
l Worldwide
1-818-878-4507
14 | Introduction
AOS-W 6.2 | Reference Guide
aaa authentication captive-portal
aaa authentication captive-portal <profile> auth-protocol mschapv2|pap|chap black-list <black-list> clone <source-profile> default-guest-role <role> default-role <role> enable-welcome-page guest-logon ip-addr-in-redirection <ipaddr> login-page <url> logon-wait {cpu-threshold <percent>}|{maximum-delay <seconds>}|{minimum-delay <seconds>} logout-popup-window max-authentication-failures <number> no ... protocol-http proxy host <ipaddr> port <port> redirect-pause <seconds> redirect-url <url> server-group <group-name> show-acceptable-use-policy show-fqdn single-session switchip-in-redirection-url <ipaddr> user-logon user-vlan-in-redirection-url <vlan> welcome-page <url> white-list <white-list>
Description
This command configures a Captive Portal authentication profile.
Syntax
Parameter <profile>
authentication-protocol mschapv2|pap|chap
black-list
Description
Range
Default
Name that identifies an instance of the -- profile. The name must be 1-63 characters.
"default"
This parameter specifies the type of authentication required by this profile, PAP is the default authentication type
mschapv2 pap pap chap
Name of an existing black list on an
--
--
IPv4 or IPv6 network destination. The
black list contains websites
(unauthenticated) that a guest cannot
access.
Specify a netdestination host or subnet
to add that netdestination to the captive
portal blacklist.
AOS-W 6.2 | Reference Guide
aaa authentication captive-portal | 15
Parameter
clone default-guest-role default-role <role>
enable-welcomepage guest-logon switchip-in-redirection-url <ipaddr>
login-page <url> logon-wait
cpu-threshold <percent> maximum-delay <seconds>
Description
Range
If you have not yet defined a netdestination, use the CLI command netdestination to define a destination host or subnet before you add it to the blacklist.
NOTE: This parameter requires the Public Access license.
Name of an existing Captive Portal
--
profile from which parameter values are
copied.
Role assigned to guest.
--
Role assigned to the Captive Portal
--
user when that user logs in. When both
user and guest logons are enabled, the
default role applies to the user logon;
users logging in using the guest
interface are assigned the guest role.
Displays the configured welcome page before the user is redirected to their original URL. If this option is disabled, redirection to the web URL happens immediately after the user logs in.
enabled/ disabled
Enables Captive Portal logon without authentication.
enabled/ disabled
Sends the switch's interface IP address -- in the redirection URL when external captive portal servers are used. An external captive portal server can determine the switch from which a request originated by parsing the `switchip' variable in the URL. This parameter requires the Public Access license.
URL of the page that appears for the
--
user logon. This can be set to any URL.
Configure parameters for the logon wait 1-100 interval.
CPU utilization percentage above which the logon wait interval is applied when presenting the user with the logon page.
1-100
Maximum time, in seconds, the user will have to wait for the logon page to pop up if the CPU load is high. This works in conjunction with the Logon wait CPU utilization threshold parameter.
1-10
Default
-- guest guest
enabled
disabled --
/auth/index. html 60% 60% 10 seconds
16 | aaa authentication captive-portal
AOS-W 6.2 | Reference Guide
Parameter minimum-delay <seconds>
logout-popupwindow
max-authentication-failures <number> no protocol-http
redirect-pause <secs>
redirect-url <url>
server-group <group-name> show-fqdn
show-acceptable-use-policy single-session switchip-in-redirection-url
Description
Range
Minimum time, in seconds, the user will have to wait for the logon page to pop up if the CPU load is high. This works in conjunction with the Logon wait CPU utilization threshold parameter.
1-10
Enables a pop-up window with the Logout link that allows the user to log out. If this option is disabled, the user remains logged in until the user timeout period has elapsed or the station reloads.
enabled/ disabled
Maximum number of authentication failures before the user is blacklisted.
0-10
Negates any configured parameter.
--
Use HTTP protocol on redirection to the Captive Portal page. If you use this option, modify the captive portal policy to allow HTTP traffic.
enabled/ disabled
Time, in seconds, that the system remains in the initial welcome page before redirecting the user to the final web URL. If set to 0, the welcome page displays until the user clicks on the indicated link.
1-60
URL to which an authenticated user will -- be directed. This parameter must be an absolute URL that begins with either http:// or https://.
Name of the group of servers used to
--
authenticate Captive Portal users. See
aaa server-group on page 82.
Allows the user to see and select the fully-qualified domain name (FQDN) on the login page. The FQDNs shown are specified when configuring individual servers for the server group used with captive portal authentication.
enabled/ disabled
Show the acceptable use policy page before the logon page.
enabled/ disabled
Allows only one active user session at a -- time.
Sends the switch's IP address in the redirection URL when external captive portal servers are used. An external captive portal server can determine the switch from which a request originated by parsing the `switchip' variable in the URL.
enabled/ disabled
Default 5 seconds
enabled
0 -- disabled (HTTPS is used) 10 seconds
--
-- disabled
disabled disabled disabled
AOS-W 6.2 | Reference Guide
aaa authentication captive-portal | 17
Parameter
Description
Range
user-logon
Enables Captive Portal with authentication of user credentials.
enabled/ disabled
user-vlan-in-redirection-url <ipaddr>
Add the user VLAN in the redirection URL. This parameter requires the Public Access license.
enabled disabled
user-vlan-redirection-url
Sends the user's VLAN ID in the
--
redirection URL when external captive
portal servers are used.
welcome-page <url>
URL of the page that appears after
--
logon and before redirection to the web
URL. This can be set to any URL.
white-list <white-list>
Name of an existing white list on an
--
IPv4 or IPv6 network destination. The
white list contains authenticated
websites that a guest can access. If you
have not yet defined a netdestination,
use the CLI command netdestination to
define a destination host or subnet
before you add it to the whitelist
Default enabled disabled
--
/auth/welcome.html --
Usage Guidelines
You can configure the Captive Portal authentication profile in the base operating system or with the Next Generation Policy Enforcement Firewall (PEFNG) license installed. When you configure the profile in the base operating system, the name of the profile must be entered for the initial role in the AAA profile. Also, when you configure the profile in the base operating system, you cannot define the default-role.
Example
The following example configures a Captive Portal authentication profile that authenticates users against the switch's internal database. Users who are successfully authenticated are assigned the auth-guest role.
To create the auth-guest user role shown in this example, the PEFNG license must be installed in the switch. aaa authentication captive-portal guestnet
default-role auth-guest user-logon no guest-logon server-group internal
Command History
Version AOS-W 3.0 AOS-W 6.0 AOS-W 6.1 AOS-W 6.2
Description Command introduced. The max-authentication-failures parameter no longer requires a license. The sygate-on-demand, black-list and white-list parameters were added. the auth-protocol parameter was added, and the user-chap parameter was deprecated.
18 | aaa authentication captive-portal
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing
Base operating system, except for noted parameters
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa authentication captive-portal | 19
aaa authentication dot1x
aaa authentication dot1x {<profile>|countermeasures} ca-cert <certificate> cert-cn-lookup clear clone <profile> eapol-logoff enforce-suite-b-128 enforce-suite-b-192 framed-mtu <mtu> heldstate-bypass-counter <number> ignore-eap-id-match ignore-eapolstart-afterauthentication machine-authentication blacklist-on-failure|{cache-timeout <hours>}|enable| {machine-default-role <role>}|{user-default-role <role>} max-authentication-failures <number> max-requests <number> multicast-keyrotation no ... opp-key-caching reauth-max <number> reauthentication server {server-retry <number>|server-retry-period <seconds>} server-cert <certificate> termination {eap-type <type>}|enable|enable-token-caching|{inner-eap-type (eap- gtc|eapmschapv2)}|{token-caching-period <hours>} timer {idrequest_period <seconds>}|{mkey-rotation-period <seconds>}|{quiet-period <seconds>}|{reauth-period <seconds>}|{ukey-rotation-period <seconds>}|{wpa- groupkeydelay <seconds>}|{wpa-key-period <milliseconds>}|wpa2-key-delay <milliseconds> tls-guest-access tls-guest-role <role> unicast-keyrotation use-session-key use-static-key validate-pmkid voice-aware wep-key-retries <number> wep-key-size {40|128} wpa-fast-handover wpa-key-retries xSec-mtu <mtu>
Description
This command configures the 802.1X authentication profile.
Syntax
Parameter <profile>
clear
Description
Range Default
Name that identifies an instance of the profile. -- The name must be 1-63 characters.
"default"
Clear the Cached PMK, Role and VLAN
--
--
entries. This command is available in enable
mode only.
20 | aaa authentication dot1x
AOS-W 6.2 | Reference Guide
Parameter countermeasures
ca-cert <certificate> cert-cn-lookup
eapol-logoff enforce-suite-b-128 enforce-suite-b-192 framed-mtu <MTU> heldstate-bypass-counter <number>
ignore-eap-idmatch ignore-eapol start-afterauthentication machine-authentication
blacklist-on-failure cache-timeout <hours>
Description
Range Default
Scans for message integrity code (MIC)
--
failures in traffic received from clients. If there
are more than 2 MIC failures within 60
seconds, the AP is shut down for 60 seconds.
This option is intended to slow down an
attacker who is making a large number of
forgery attempts in a short time.
disabled
CA certificate for client authentication. The CA --
--
certificate needs to be loaded in the switch.
If you use client certificates for user
--
--
authentication, enable this option to verify that
the certificate's common name exists in the
server. This parameter is disabled by default.
Enables handling of EAPOL-LOGOFF messages.
--
disabled
Configure Suite-B 128 bit or more security level authentication enforcement
disabled
Configure Suite-B 192 bit or more security level authentication enforcement
disabled
Sets the framed MTU attribute sent to the authentication server.
5001500
1100
(This parameter is applicable when 802.1X
0-3
0
authentication is terminated on the switch,
also known as AAA FastConnect.) Number of
consecutive authentication failures which,
when reached, causes the switch to not
respond to authentication requests from a
client while the switch is in a held state after
the authentication failure. Until this number is
reached, the switch responds to authentication
requests from the client even while the switch
is in its held state.
Ignore EAP ID during negotiation.
--
disabled
Ignores EAPOL-START messages after authentication.
(For Windows environments only) These parameters set machine authentication: NOTE: This parameter requires the PEFNG license.
Blacklists the client if machine authentication fails.
The timeout, in hours, for machine authentication.
--
disabled
--
disabled
1-1000 24 hours (1 day)
AOS-W 6.2 | Reference Guide
aaa authentication dot1x | 21
Parameter
Description
Range Default
enable
Select this option to enforce machine
--
authentication before user authentication. If
selected, either the machine-default-role or
the user-default-role is assigned to the user,
depending on which authentication is
successful.
disabled
machine-default-role <role> Default role assigned to the user after
--
guest
completing only machine authentication.
user-default-role <role>
Default role assigned to the user after 802.1X -- authentication.
guest
max-authentication-failures
Number of times a user can try to login with
0-5
<number>
wrong credentials after which the user is
blacklisted as a security threat. Set to 0 to
disable blacklisting, otherwise enter a non-
zero integer to blacklist the user after the
specified number of failures.
0 (disabled)
max-requests <number>
Maximum number of times ID requests are sent to the client.
1-10
3
multicast-key rotation
Enables multicast key rotation
--
disabled
no
Negates any configured parameter.
--
--
opp-key-caching
Enables a cached pairwise master key (PMK) -- derived with a client and an associated AP to be used when the client roams to a new AP. This allows clients faster roaming without a full 802.1X authentication.
NOTE: Make sure that the wireless client (the 802.1X supplicant) supports this feature. If the client does not support this feature, the client will attempt to renegotiate the key whenever it roams to a new AP. As a result, the key cached on the switch can be out of sync with the key used by the client.
enabled
reauth-max <number>
Maximum number of reauthentication attempts.
1-10
3
reauthentication
Select this option to force the client to do a
--
802.1X reauthentication after the expiration of
the default timer for reauthentication. (The
default value of the timer is 24 hours.) If the
user fails to reauthenticate with valid
credentials, the state of the user is cleared.
If derivation rules are used to classify 802.1X-
authenticated users, then the reauthentication
timer per role overrides this setting.
disabled
reload-cert
Reload Certificate for 802.1X termination. This --
--
command is available in enable mode only.
server
Sets options for sending authentication requests to the authentication server group.
22 | aaa authentication dot1x
AOS-W 6.2 | Reference Guide
Parameter
Description
Range Default
server-retry <number>
Maximum number of authentication requests 0-3
2
that are sent to server group.
server-retry-period <seconds> Server group retry interval, in seconds.
5-
30
65535 seconds
server-cert <certificate>
Server certificate used by the switch to authenticate itself to the client.
--
--
termination
Sets options for terminating 802.1X authentication on the switch.
eap-type <type>
The Extensible Authentication Protocol (EAP) method, either EAP-PEAP or EAP-TLS.
eappeap/ eap-tls
eappeap
enable
Enables 802.1X termination on the switch.
--
disabled
enable-token -caching
If you select EAP-GTC as the inner EAP
--
method, you can enable the switch to cache
the username and password of each
authenticated user. The switch continues to
reauthenticate users with the remote
authentication server, however, if the
authentication server is not available, the
switch will inspect its cached credentials to
reauthenticate users.
disabled
inner-eap-type eap-gtc|eapmschapv2
When EAP-PEAP is the EAP method, one of the following inner EAP types is used:
EAP-Generic Token Card (GTC): Described in RFC 2284, this EAP method permits the transfer of unencrypted usernames and passwords from client to server. The main uses for EAP-GTC are one-time token cards such as SecureID and the use of LDAP or RADIUS as the user authentication server. You can also enable caching of user credentials on the switch as a backup to an external authentication server.
EAP-Microsoft Challenge Authentication Protocol version 2 (MS-CHAPv2): Described in RFC 2759, this EAP method is widely supported by Microsoft clients.
eapgtc/eapmschapv2
eapmschap v2
token-caching-period <hours>
If you select EAP-GTC as the inner EAP method, you can specify the timeout period, in hours, for the cached information.
(any)
24 hours
timer
Sets timer options for 802.1X authentication:
idrequestperiod <seconds>
Interval, in seconds, between identity request retries.
165535
30 seconds
mkey-rotation-period <seconds>
Interval, in seconds, between multicast key rotation.
60-
1800
864000 seconds
quiet-period <seconds>
Interval, in seconds, following failed authentication.
1-
30
65535 seconds
AOS-W 6.2 | Reference Guide
aaa authentication dot1x | 23
Parameter reauth-period <seconds>
ukey-rotation-period <seconds> wpa-groupkey -delay <milliseconds> wpa-key-period <milliseconds> wpa2-key-delay <milliseconds> tls-guest-access tls-guest-role <role>
unicast-keyrotation use-session-key use-static-key validate-pmkid
voice-aware
wep-key-retries <number> wep-key-size wpa-fast-handover
Description
Range Default
Interval, in seconds, between reauthentication attempts, or specify server to use the serverprovided reauthentication period.
60864000
86400 seconds (1 day)
Interval, in seconds, between unicast key rotation.
60-
900
864000 seconds
Interval, in milliseconds, between unicast and multicast key exchanges.
0-2000
0 ms (no delay)
Interval, in milliseconds, between each WPA key exchange.
10005000
1000 ms
Set the delay between EAP-Success and unicast key exchange.
1-2000
0 ms (no delay)
Enables guest access for EAP-TLS users with -- valid certificates.
disabled
User role assigned to EAP-TLS guest.
--
NOTE: This parameter requires the PEFNG
license.
guest
Enables unicast key rotation.
--
disabled
Use RADIUS session key as the unicast WEP -- key.
disabled
Use static key as the unicast/multicast WEP
--
key.
disabled
This parameter instructs the switch to check
--
the pairwise master key (PMK) ID sent by the
client. When this option is enabled, the client
must send a PMKID in the associate or
reassociate frame to indicate that it supports
OKC or PMK caching; otherwise, full 802.1X
authentication takes place. (This feature is
optional, since most clients that support OKC
and PMK caching do not send the PMKID in
their association request.)
disabled
Enables rekey and reauthentication for
--
VoWLAN clients.
NOTE: The Next Generation Policy Enforced
Firewall license must be installed.
enabled
Number of times WPA/WPA2 key messages
1-5
3
are retried.
Dynamic WEP key size, either 40 or 128 bits.
40 or 128
128 bits
Enables WPA-fast-handover. This is only
--
applicable for phones that support WPA and
fast handover.
disabled
24 | aaa authentication dot1x
AOS-W 6.2 | Reference Guide
Parameter wpa-key-retries
xSec-mtu <mtu>
Description
Set the Number of times WPA/WPA2 Key Messages are retried
Sets the size of the MTU for xSec.
Range Default
--
disabled
10241500
1300 bytes
Usage Guidelines
The 802.1X authentication profile allows you to enable and configure machine authentication and 802.1X termination on the switch (also called "AAA FastConnect").
In the AAA profile, specify the 802.1X authentication profile, the default role for authenticated users, and the server group for the authentication.
Examples
The following example enables authentication of the user's client device before user authentication. If machine authentication fails but user authentication succeeds, the user is assigned the restricted "guest" role: aaa authentication dot1x dot1x
machine-authentication enable machine-authentication machine-default-role computer machine-authentication user-default-role guest
The following example configures an 802.1X profile that terminates authentication on the switch, where the user authentication is performed with the switch's internal database or to a "backend" non-802.1X server: aaa authentication dot1x dot1x
termination enable
Command History
Version AOS-W 3.0 AOS-W 6.1
Description
Command introduced.
The cert-cn-lookup, enforce-suite-b-128 and enforce-suite-b-192 parameters were introduced.
Command Information
Platforms All platforms
Licensing
Command Mode
Base operating system. The voice-aware parameter requires the PEFNG license
Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa authentication dot1x | 25
aaa authentication mac
aaa authentication mac <profile> case upper|lower clone <profile> delimiter {colon|dash|none} max-authentication-failures <number> no ...
Description
This command configures the MAC authentication profile.
Syntax
Parameter <profile> case
clone <profile> delimiter max-authentication-failures <number> no
Description
Range Default
Name that identifies an instance of the profile. -- The name must be 1-63 characters.
"default"
The case (upper or lower) used in the MAC string sent in the authentication request. If there is no delimiter configured, the MAC address in lower case is sent in the format xxxxxxxxxxxx, while the MAC address in upper case is sent in the format XXXXXXXXXXXX.
upper|lo- lower wer
Name of an existing MAC profile from which --
--
parameter values are copied.
Delimiter (colon, dash, or none) used in the MAC string.
colon|dash| none
none
Number of times a client can fail to authenticate before it is blacklisted. A value of 0 disables blacklisting.
0-10
0 (disabled)
Negates any configured parameter.
--
--
Usage Guidelines
MAC authentication profile configures authentication of devices based on their physical MAC address. MAC-based authentication is often used to authenticate and allow network access through certain devices while denying access to all other devices. Users may be required to authenticate themselves using other methods, depending upon the network privileges.
Example
The following example configures a MAC authentication profile to blacklist client devices that fail to authenticate. aaa authentication mac mac-blacklist
max-authentication-failures 3
26 | aaa authentication mac
AOS-W 6.2 | Reference Guide
Command History
Release AOS-W 3.0 AOS-W 3.3.1.8
Modification
Command introduced
The max-authentication-failures parameter was allowed in the base operating system. In earlier versions of AOS-W, the max-authentication-failures parameter required the Wireless Intrusion Protection license
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa authentication mac | 27
aaa authentication mgmt
aaa authentication mgmt default-role {guest-provisioning|location-api-mgmt|network-operations|no-access|readonly|root} enable no ... server-group <group>
Description
This command configures authentication for administrative users.
Syntax
Parameter default-role
default guest-provisioning location-api-mgmt network-operations no-access read-only enable
mchapv2
no server-group <group>
Description
Range
Select a predefined management role to
--
assign to authenticated administrative
users:
Default superuser role
--
Guest provisioning role
--
Location API role
--
Network operations role
--
No commands are accessible for this role --
Read-only role
--
Enables authentication for administrative users.
enabled| disabled
Enable MSCHAPv2
enabled| disabled
Negates any configured parameter.
--
Name of the group of servers used to
--
authenticate administrative users. See aaa
server-group on page 82.
Default default
-- -- -- -- -- -- disabled
disabled
-- default
Usage Guidelines
If you enable authentication with this command, users configured with the mgmt-user command must be authenticated using the specified server-group. You can configure the management authentication profile in the base operating system or with the PEFNG license installed.
Example
The following example configures a management authentication profile that authenticates users against the switch's internal database. Users who are successfully authenticated are assigned the read-only role. aaa authentication mgmt
28 | aaa authentication mgmt
AOS-W 6.2 | Reference Guide
default-role read-only server-group internal
Command History
Release AOS-W 3.0 AOS-W 3.2 AOS-W 3.3
Modification Command introduced The network-operations role was introduced. The location-api-mgmt role was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa authentication mgmt | 29
aaa authentication-server internal
aaa authentication-server internal use-local-switch
Description
This command specifies that the internal database on a local switch be used for authenticating clients.
Usage Guidelines
By default, the internal database in the master switch is used for authentication. This command directs authentication to the internal database on the local switch where you run the command.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master or local switches
30 | aaa authentication-server internal
AOS-W 6.2 | Reference Guide
aaa authentication-server ldap
aaa authentication-server ldap <server> admin-dn <name> admin-passwd <string> allow-cleartext authport <port> base-dn <name> clone <server> enable filter <filter> host <ipaddr> key-attribute <string> max-connection <number> no ... preferred-conn-type ldap-s|start-tls|clear-text timeout <seconds>
Description
This command configures an LDAP server.
Syntax
Parameter <server> admin-dn <name>
admin-passwd <string> allow-cleartext
authport <port>
base-dn <name> clone <server> enable filter <filter>
Description
Name that identifies the server.
Distinguished name for the admin user who has read/search privileges across all of the entries in the LDAP database (the user does not need write privileges but should be able to search the database and read attributes of other users in the database).
Password for the admin user.
Range Default
--
--
--
--
--
--
Allows clear-text (unencrypted) communication with the LDAP server.
enabled| disabled
disabled
Port number used for authentication. Port 636 will 1-65535 389 be attempted for LDAP over SSL, while port 389 will be attempted for SSL over LDAP, Start TLS operation and clear text.
Distinguished Name of the node which contains the --
--
entire user database to use.
Name of an existing LDAP server configuration
--
--
from which parameter values are copied.
Enables the LDAP server.
--
Filter that should be applied to search of the user in -- the LDAP database. The default filter string is (objectclass=*).
(objectclass=*)
AOS-W 6.2 | Reference Guide
aaa authentication-server ldap | 31
Parameter
Description
Range Default
host <ip-addr>
IP address of the LDAP server, in dotted-decimal
--
--
format.
key-attribute <string>
Attribute that should be used as a key in search for -- the LDAP server. For Active Directory, the value is sAMAccountName.
sAMAccountName
max-connection
Maximum number of simultaneous non-admin con- --
--
nections to an LDAP server.
no
Negates any configured parameter.
--
--
preferred-conn-type
Preferred connection type. The default order of connection type is: 1. ldap-s 2. start-tls 3. clear-text The switch will first try to contact the LDAP server using the preferred connection type, and will only attempt to use a lower-priority connection type if the first attempt is not successful. NOTE: You enable the allow-cleartext option before you select clear-text as the preferred connection type. If you set clear-text as the preferred connection type but do not allow cleartext, the switch will only use ldap-s or start-tls to contact the LDAP server.
ldap-s start-tls cleartext
ldap-s
timeout <seconds>
Timeout period of a LDAP request, in seconds.
1-30
20 seconds
Usage Guidelines
You configure a server before you can add it to one or more server groups. You create a server group for a specific type of authentication (see aaa server-group on page 82).
Example
The following command configures and enables an LDAP server: aaa authentication-server ldap ldap1
host 10.1.1.243 base-dn cn=Users,dc=1m,dc=corp,dc=com admin-dn cn=corp,cn=Users,dc=1m,dc=corp,dc=com admin-passwd abc10 key-attribute sAMAccountName filter (objectclass=*) enable
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
32 | aaa authentication-server ldap
AOS-W 6.2 | Reference Guide
aaa authentication-server radius
aaa authentication-server radius <server> acctport <port> authport <port> clone <server> enable host <ipaddr>|<FQDN> key <psk> mac-lowercase nas-identifier <string> nas-ip <ipaddr> no ... retransmit <number> service-type-framed-user source-interface vlan <vlan> timeout <seconds> use-ip-for-calling-station use-md5
Description
This command configures a RADIUS server.
Syntax
Parameter <server> acctport <port> authport <port> clone <server>
enable host
<ipaddr> <FQDN>
key <psk>
mac-lowercase nas-identifier <string>
Description
Range
Name that identifies the server.
--
Accounting port on the server.
1-65535
Authentication port on the server
1-65535
Name of an existing RADIUS server
--
configuration from which parameter values are
copied.
Enables the RADIUS server.
--
Identify the RADIUS server either by its IP
--
address or fully qualified domain name.
IPv4 of the RADIUS server.
--
Fully qualified domain name (FQDN) of the
--
RADIUS server. The maximum supported length
is 63 characters.
Shared secret between the switch and the
--
authentication server. The maximum length is
128 characters.
Send MAC addresses as lowercase.
--
Network Access Server (NAS) identifier to use in -- RADIUS packets.
Default -- 1813 1812 --
-- -- -- --
--
-- --
AOS-W 6.2 | Reference Guide
aaa authentication-server radius | 33
Parameter
Description
Range
nas-ip <ip-addr>
NAS IP address to send in RADIUS packets.
--
You can configure a "global" NAS IP address
that the switch uses for communications with all
RADIUS servers. If you do not configure a
server-specific NAS IP, the global NAS IP is
used. To set the global NAS IP, enter the ip
radius nas-ip <ipaddr> command.
no
Negates any configured parameter.
--
retransmit <number>
Maximum number of retries sent to the server by 0-3 the switch before the server is marked as down.
service-type-framed-user Send the service-type as FRAMED-USER
--
instead of LOGIN-USER. This option is disabled
by default
source-interface vlan <vlan>
This option associates a VLAN interface with the -- RADIUS server to allow the server-specific source interface to override the global configuration.
l If you associate a Source Interface (by entering a VLAN number) with a configured server, then the source IP address of the packet will be that interface's IP address.
l If you do not associate the Source Interface with a configured server (leave the field blank), then the IP address of the global Source Interface will be used.
timeout <seconds>
Maximum time, in seconds, that the switch waits 1-30 before timing out the request and resending it.
use-ip-for-calling-station
Use an IP address instead of a MAC address for -- calling station IDs. This option is disabled by default.
use-md5
Use MD5 hash of cleartext password.
--
Default --
-- 3 disabled --
5 seconds disabled disabled
Usage Guidelines
You configure a server before you can add it to one or more server groups. You create a server group for a specific type of authentication (see aaa server-group on page 82).
Example
The following command configures and enables a RADIUS server: aaa authentication-server radius radius1
host 10.1.1.244 key qwERtyuIOp enable
34 | aaa authentication-server radius
AOS-W 6.2 | Reference Guide
Command History
Version AOS-W 3.0 AOS-W 6.0 AOS-W 6.1
Modification Command introduced. RADIUS server can be identified by its qualified domain name (FQDN). The source-interface parameter was added.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa authentication-server radius | 35
aaa authentication-server tacacs
aaa authentication-server tacacs <server> clone <server> enable host <host> key <psk> no ... retransmit <number> session-authorization tcp-port <port> timeout <seconds>
Description
This command configures a TACACS+ server.
Syntax
Parameter
Description
Range
<server>
Name that identifies the server.
--
clone <server>
Name of an existing TACACS server configuration -- from which parameter values are copied.
enable
Enables the TACACS server.
--
host <host>
IPv4 of the TACACS server.
--
key
Shared secret to authenticate communication
--
between the TACACS+ client and server.
no
Negates any configured parameter.
--
retransmit <number> Maximum number of times a request is retried.
0-3
sessionauthorization
Enables TACACS+ authorization.Session-
--
authorization turns on the optional authorization
session for admin users.
tcp-port <port>
TCP port used by the server.
1-65535
timeout <timeout>
Timeout period of a TACACS request, in seconds. 1-30
Default -- --
-- -- -- 3 disabled
49 20 seconds
Usage Guidelines
You configure a server before you can add it to one or more server groups. You create a server group for a specific type of authentication (see aaa server-group on page 82).
Example
The following command configures, enables a TACACS+ server and enables session authorization:
aaa authentication-server tacacs tacacs1 clone default host 10.1.1.245
36 | aaa authentication-server tacacs
AOS-W 6.2 | Reference Guide
key qwERtyuIOp enable session-authorization
Command History
Version AOS-W 3.0 AOS-W 6.0
Description Command introduced. session-authorization parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa authentication-server tacacs | 37
aaa authentication-server windows
aaa authentication-server windows <windows_server_name> clone <source> domain <domain> enable host <ipaddr> no
Description
This command configures a windows server for stateful-NTLM authentication.
Syntax
Parameter <windows_server_name>
clone <source> domain <domain> enable host <ipaddr> no
Description Name of the windows server. You will use this name when you add the windows server to a server group. Name of a Windows Server from which you want to make a copy. The Windows domain for the authentication server. Enables the Windows server. IP address of the Windows server. Delete command.
Usage Guidelines
You must define a Windows server before you can add it to one or more server groups. You create a server group for a specific type of authentication (see aaa server-group on page 82). Windows servers are used for stateful-NTLM authentication.
Example
The following command configures and enables a windows server: aaa authentication-server windows IAS_1
host 10.1.1.245 enable
Command History
This command was available in AOS-W 3.4.1
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
38 | aaa authentication-server windows
AOS-W 6.2 | Reference Guide
aaa authentication stateful-dot1x
aaa authentication stateful-dot1x default-role <role> enable no ... server-group <group> timeout <seconds>
Description
This command configures 802.1X authentication for clients on non-Alcatel-Lucent APs.
Syntax
Parameter
Description
default-role <role> Role assigned to the 802.1X user upon login. NOTE: The PEFNG license must be installed.
enable
Enables 802.1X authentication for clients on nonAlcatel-Lucent APs. Use no enable to disable stateful 8021.X authentication.
no
Negates any configured parameter.
server-group <group>
Name of the group of RADIUS servers used to authenticate the 802.1X users. See aaa servergroup on page 82.
timeout <seconds> Timeout period, in seconds.
Range -- --
-- --
1-20
Default guest enabled
-- --
10 seconds
Usage Guidelines
This command configures 802.1X authentication for clients on non-Alcatel-Lucent APs. The switch maintains user session state information for these clients.
Example
The following command assigns the employee user role to clients who successfully authenticate with the server group corp-rad: aaa authentication stateful-dot1x
default-role employee server-group corp-rad
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa authentication stateful-dot1x | 39
aaa authentication stateful-dot1x clear
aaa authentication stateful-dot1x clear
Description
This command clears automatically-created control path entries for 802.1X users on non-Alcatel-Lucent APs.
Syntax
No parameters.
Usage Guidelines
Run this command after changing the configuration of a RADIUS server in the server group configured with the aaa authentication stateful-dot1x command. This causes entries for the users to be created in the control path with the updated configuration information.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
40 | aaa authentication stateful-dot1x clear
AOS-W 6.2 | Reference Guide
aaa authentication stateful-ntlm
aaa authentication stateful-ntlm <profile-name> clone default-role <role> enable server-group <server-group> timeout <timeout>
Description
This command configures stateful NT LAN Manager (NTLM) authentication.
Syntax
Parameter clone default-role
no server-group <servergroup> timeout <timeout>
Description Create a copy of an existing stateful NTLM profile Select an existing role to assign to authenticated users. Negates any configured parameter. Name of a server group.
Range -- --
-- --
Default -- guest
-- default
Amount of time, in seconds, before the request times out.
1-20 seconds
10 seconds
Usage Guidelines
NT LAN Manager (NTLM) is a suite of Microsoft authentication and session security protocols. You can use a stateful NTLM authentication profile to configure a switch to monitor the NTLM authentication messages between clients and an authentication server. The switch can then use the information in the Server Message Block (SMB) headers to determine the client's username and IP address, the server IP address and the client's current authentication status. If the client successfully authenticates via an NTLM authentication server, the switch can recognize that the client has been authenticated and assign that client a specified user role. When the user logs off or shuts down the client machine, the user will remain in the authenticated role until the user's authentication is aged out.
The Stateful NTLM Authentication profile requires that you specify a server group which includes the servers performing NTLM authentication, and a default role to be assigned to authenticated users. For details on defining a windows server used for NTLM authentication, see aaa authentication-server windows.
Example
The following example configures a stateful NTLM authentication profile that authenticates clients via the server group "Windows1." Users who are successfully authenticated are assigned the "guest2" role. aaa authentication stateful-ntlm
default-role guest2 server-group Windows1
Command History
Command introduced in AOS-W 3.4.1
AOS-W 6.2 | Reference Guide
aaa authentication stateful-ntlm | 41
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
42 | aaa authentication stateful-ntlm
AOS-W 6.2 | Reference Guide
aaa authentication via auth-profile
aaa authentication via auth-profile <profile> clone <source> default-role <default-role> desc <description> max-authentication-failures <max-authentication-failures> no server-group <server-group>
Description
This command configures the VIA authentication profile.
Syntax
Parameter clone <source>
default-role <default-role>
desc <description> max-authentication-failures <maxauthentication-failures>
server-group <server-group>
Description
Default
Name of an existing profile from which configuration values are copied.
Name of the default VIA authentication profile.
Description of this profile for reference. -
Number of times VIA will prompt user to 3 login due to incorrect credentials. After the maximum authentication attempts failures VIA will exit.
Server group against which the user is authenticated.
Usage Guidelines
Use this command to create VIA authentication profiles and associate user roles to the authentication profile.
Example
(host) (config) #aaa authentication via auth-profile default (host) (VIA Authentication Profile "default") #default-role example-via-role (host) (VIA Authentication Profile "default") #desc "Default VIA Authentication Profile" (host) (VIA Authentication Profile "default") #server-group "via-server-group"
Command History
Command introduced in 5.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master or local switches
AOS-W 6.2 | Reference Guide
aaa authentication via auth-profile | 43
aaa authentication via connection-profile
aaa authentication via connection-profile <profile> admin-logoff-script admin-logon-script allow-user-disconnect allow-whitelist-traffic auth_domain_suffix auth-profile <auth-profile> auth_doman_suffix auto-launch-supplicant auto-login auto-upgrade banner-message-reappear-timeout <mins> client-logging client-netmask <client-netmask> client-wlan-profile <client-wlan-profile> position <position> clone switches-load-balance csec-gateway-url <URL> csec-http-ports <comma separated port numbers> dns-suffix-list <dns-suffix-list> domain-pre-connect enable-csec enable-fips enable-supplicant ext-download-url <ext-download-url> ike-policy <ike-policy> ikev2-policy ikev2-proto ikev2auth ipsec-cryptomap map <map> number <number> ipsecv2-cryptomap lockdown-all-settings max-reconnect-attempts <max-reconnect-attempts> minimized max-timeout <value> minimized no save-passwords server split-tunneling suiteb-crypto support-email tunnel validate-server-cert whitelist windows-credentials
Description
This command configures the VIA connection profile.
44 | aaa authentication via connection-profile
AOS-W 6.2 | Reference Guide
Syntax
Parameter admin-logoff-script admin-logon-script allow-user-disconnect allow-whitelist-traffic auth_domain_suffix
auto-launch-supplicant auth-profile <auth-profile> admin-logoff-script
admin-logon-script
auto-login auto-upgrade
banner-message-reappear-timeout client-logging client-netmask <client-netmask>
Description
Default
Enables VIA logoff script.
Disabled
Enables VIA logon script.
Disabled
Enable or disable users to disconnect their Enabled VIA sessions.
If enabled, this feature will block network access until the VIA VPN connection is established.
Disabled
Enables a domain suffix on VIA Authen-
--
tication, so client credentials are sent as
domainname\username instead of just user-
name.
Allows you to connect automatically to a configured WLAN network.
Disabled
This is the list of VIA authentication profiles -- that will be displayed to users in the VIA client.
Specify the name of the script that must be -- executed when the VIA connection is disconnected. The script must reside on the user / client system.
Specify the name of the script that must be -- executed when the VIA connection is established. The script must reside on the user / client system.
Enable or disable VIA client to auto login and establish a secure connection to the switch.
Enabled
Enable or disable VIA client to automatically upgrade when an updated version of the client is available on the switch.
Enabled
Timeout value, in minutes, after which the user session will end and the VIA Login banner message reappears.
1440 minutes
Enable or disable VIA client to auto login and establish a secure connection to the switch.
Enabled
The network mask that has to be set on the client after the VPN connection is established.
255.255.255.255
AOS-W 6.2 | Reference Guide
aaa authentication via connection-profile | 45
Parameter client-wlan-profile <client-wlanprofile>
position <position> clone switches-load-balance
server addr <addr> <internal-ip <internal-ip> desc <description>
csec-gateway-url csec-http-ports
domain-preconnect
dns-suffix-list <dns-suffix-list>
enable-csec enable-fips enable-supplicant
Description
Default
A list of VIA client WLAN profiles that needs --
to be pushed to the client machines that
use Windows Zero Config (WZC) to
configure or manage their wireless
--
networks.
Create a copy of connection profile from an -- another VIA connection profile.
Enable this option to allow the VIA client to failover to the next available selected randomly from the list as configured in the VIA Servers option. If disabled, VIA will failover to the next in the sequence of ordered list of VIA Servers.
Disabled
l Address: This is the public IP address or --
the DNS hostname of the VIA switch.
Users will connect to remote server using this IP address or the hostname. --
l Internal IP Address: This is the IP
address of any of the VLAN interface IP -- addresses belongs to this switch.
l Description: This is a human-readable
description of the switch.
--
Specify the content security service
--
providers URL here. You must provide a
fully qualified domain name.
Specify the ports (separated by comma)
--
that will be monitored by the content
security service provider.
Do not add space before or after the
comma.
Enable this option to allow users with lost or expired passwords to establish a VIA connection to corporate network. This option authenticates the user's device and establishes a VIA connection that allows users to reset credentials and continue with corporate access.
Enabled
The DNS suffix list (comma separated) that has be set on the client once the VPN connection is established. .
None
Use this option to enable the content
--
security service.
Enable the VIA (Federal Information Processing Standard) FIPS module so VIA checks for FIPS compliance during startup.
Disabled
If enabled, VIA starts in bSec mode using L2 suite-b cryptography. This option is disabled by default.
Disabled
46 | aaa authentication via connection-profile
AOS-W 6.2 | Reference Guide
Parameter ext-download-url <ext-download-url> ike-policy <ike-policy> ikev2-policy ikev2-proto ikev2auth
ipsec-cryptomap map <map> number <number>
ipsecv2-cryptomap lockdown-all-settings max-reconnect-attempts <maxreconnect-attempts> max-timeout value <value> minimized
save-passwords server split-tunneling
Description
Default
End users will use this URL to download
--
VIA on their computers.
List of IKE policies that the VIA Client has to -- use to connect to the switch.
List of IKE V2 policies that the VIA Client
--
has to use to connect to the switch
Enable this to use IKEv2 protocol to establish VIA sessions.
Disabled
Use this option to set the IKEv2 authentication method. By default user certificate is used for authentication. The other supported methods are EAPMSCHAPv2, EAP-TLS. The EAP authentication is done on an external RADIUS server.
User Certificates
List of IPsec crypto maps that the VIA client -- uses to connect to the switch. These IPsec
Crypto Maps are configured in the CLI
--
using the crypto-local ipsec-map
<ipsec-map-name> command.
--
List of IPSec V2 crypto maps that the VIA
--
client uses to connect to the switch.
Allows you to lockdown all user configured Disabled. settings.
The maximum number of re-connection
3
attempts by the VIA client due to
authentication failures.
The maximum time (minutes) allowed before the VIA session is disconnected.
1440 min
Use this option to keep the VIA client on a -- Microsoft WIndows operating system minimized to system tray.
Enable or disable users to save passwords Enabled entered in VIA.
Configure VIA servers.
Enable or disable split tunneling.
off
l If enabled, all traffic to the VIA tunneled
networks will go through the switch and
the rest is just bridged directly on the
client.
l If disabled, all traffic will flow through the
switch.
AOS-W 6.2 | Reference Guide
aaa authentication via connection-profile | 47
Parameter suiteb-crypto
support-email tunnel address <address>
address <address> netmask <netmask> validate-server-cert whitelist addr
addr <addr> netmask <netmask> description <description> windows-credentials
Description
Default
Use this option to enable Suite-B cryptography. See RFC 4869 for more information about Suite-B cryptography.
Disabled
The support e-mail address to which VIA users will send client logs.
None
A list of network destination (IP address and --
netmask) that the VIA client will tunnel
through the switch. All other network destinations will be reachable directly by
--
the VIA client. Enter tunneled IP address
and its netmask.
--
Enable or disable VIA from validating the server certificate presented by the switch.
Enabled
Specify a hostname or IP address and net- -- work mask to define a whitelist of users allowed to access the networkif the allowwhitelist-traffic option is enabled
Host name of IP address of a client
--
Netmask, in dotted decimal format
--
(Optional) description of the client
--
Enable or disable the use of the Windows credentials to login to VIA. If enabled, the SSO (Single Sign-on) feature can be utilized by remote users to connect to internal resources.
Enabled
Usage Guidelines
Issue this command to create a VIA connection profile. A VIA connection profile contains settings required by VIA to establish a secure connection to the switch. You can configure multiple VIA connection profiles. A VIA connection profile is always associated to a user role and all users belonging to that role will use the configured settings. If you do not assign a VIA connection profile to a user role, the default connection profile is used.
Example
The following example shows a simple VIA connection profile:
(host) (config) #aaa authentication via connection-profile "via" (host) (VIA Connection Profile "via") #server addr 202.100.10.100 internal-ip 10.11.12.13 desc "VIA Primary" position 0 (host) (VIA Connection Profile "via") #auth-profile "default" position 0 (host) (VIA Connection Profile "via") #tunnel address 10.0.0.0 netmask 255.255.255.0 (host) (VIA Connection Profile "via") #split-tunneling (host) (VIA Connection Profile "via") #windows-credentials (host) (VIA Connection Profile "via") #client-netmask 255.0.0.0 (host) (VIA Connection Profile "via") #dns-suffix-list mycorp.com (host) (VIA Connection Profile "via") #dns-suffix-list example.com (host) (VIA Connection Profile "via") #support-email via-support@example.com
48 | aaa authentication via connection-profile
AOS-W 6.2 | Reference Guide
Command History
Release AOS-W 5.0 AOS-W 6.1
AOS-W 6.1.3.2 AOS-W 6.2
Modification
Command introduced
The following commands were introduced: l admin-logon-script l admin-logoff-script l ikev2-policy l ikev2-proto l ikev2-auth l ipsecv2-crypto l minimized l suiteb-crypto
The auth_domain_suffix parameter was introduced.
The following commands were introduced: l allow-whitelist-traffic l banner-message-reappear-timeout l switches-load-balancing l enable-fips l enable-supplicant l whitelist
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master or local switches
AOS-W 6.2 | Reference Guide
aaa authentication via connection-profile | 49
aaa authentication via global-config
aaa authentication via global-config no ssl-fallback-enable
Description
The global config option allows to you to enable SSL fallback mode. If the SSL fallback mode is enabled the VIA client will use SSL to create a secure connection.
Syntax
Parameter no ssl-fallback-enable
Description
Default
Disable SSL fallback option
--
Use this option to enable an SSL fallback connection. Disabled
Example
(host) (config) #aaa authentication via global-config
Command History
Command introduced in 5.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master or local switches
50 | aaa authentication via global-config
AOS-W 6.2 | Reference Guide
aaa authentication via web-auth
aaa authentication via web-auth default auth-profile <auth-profile> position <position> clone <source> no
Description
A VIA web authentication profile contains an ordered list of VIA authentication profiles. The web authentication profile is used by end users to login to the VIA download page (https://<server-IP-address>/via) for downloading the VIA client. Only one VIA web authentication profile is available. If more than one VIA authentication profile is configured, users can view this list and select one during the client login.
Syntax
Parameter auth-profile <auth-profile>
position <position>
Description
The name of the VIA authentication profile
The position of the profile to specify the order of selection.
Default -- --
clone <source>
Duplicate an existing authentication profile.
--
Example
(host) (config) #aaa authentication via web-auth default (host) (VIA Web Authentication "default") #auth-profile default position 0
Command History
Command introduced in 5.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master or local switches
AOS-W 6.2 | Reference Guide
aaa authentication via web-auth | 51
aaa authentication vpn
aaa authentication vpn <profile-name> cert-cn-lookup clone <source> default-role <guest> max-authentication-failures <number> no ... server-group <group>
Description
This command configures VPN authentication settings.
Syntax
Parameter <profile-name>
cert-cn-lookup
clone <source> default-role <role> max-authentication-failures <number> no server-group <group>
Description
Default
There are three VPN profiles: default, default-rap or -- default-cap. This allows users to use different AAA servers for VPN, RAP and CAP clients. NOTE: The default and default-rap profiles are configurable. The default-cap profile is not configurable and is predefined with the default settings.
If you use client certificates for user authentication,
--
enable this option to verify that the certificate's
common name exists in the server. This parameter is
enabled by default in the default-cap and default-rap
VPN profiles, and disabled by default on all other
VPN profiles.
Copies data from another VPN authentication profile. -- Source is the profile name from which the data is copied.
Role assigned to the VPN user upon login. NOTE: This parameter requires the Policy Enforcement Firewall for VPN Users (PEFV) license.
guest
Maximum number of authentication failures before the user is blacklisted. The supported range is 1-10 failures. A value of 0 disables blacklisting. NOTE: This parameter requires the RFProtect license.
0 (disabled)
Negates any configured parameter.
--
Name of the group of servers used to authenticate VPN users. See aaa server-group on page 82.
internal
Usage Guidelines
This command configures VPN authentication settings for VPN, RAP and CAP clients.Use the vpdn group command to configure Layer-2 Tunneling Protocol and Internet Protocol Security (L2TP/IPsec) or a Point-to-Point Tunneling Protocol (PPTP) VPN connection. (See vpdn group l2tp on page 1480.)
52 | aaa authentication vpn
AOS-W 6.2 | Reference Guide
Example
The following command configures VPN authentication settings for the default-rap profile: aaa authentication vpn default-rap
default-role guest clone default max-authentication-failures 0 server-group vpn-server-group
The following message appears when a user tries to configure the non-configurable default-cap profile: (host) (config) #aaa authentication vpn default-cap Predefined VPN Authentication Profile "default-cap" is not editable
Command History
Version AOS-W 3.0 AOS-W 5.0 AOS-W 6.1
Description Command introduced. The default-cap and default-rap profiles were introduced. The cert-cn-lookup parameter was introduced.
Command Information
Platforms All platforms
Licensing
Base operating system, except for noted parameters. The default-role parameter requires the Policy Enforcement Firewall for VPN Users (PEFV) license.
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa authentication vpn | 53
aaa authentication wired
aaa authentication wired no ... profile <aaa-profile>
Description
This command configures authentication for a client device that is directly connected to a port on the switch.
Syntax
Parameter
no
profile <aaaprofile>
Description
Negates any configured parameter.
Name of the AAA profile that applies to wired authentication. This profile must be configured for a Layer-2 authentication, either 802.1X or MAC. See aaa profile on page 73.
Usage Guidelines
This command references an AAA profile that is configured for MAC or 802.1X authentication. The port on the switch to which the device is connected must be configured as untrusted.
Example
The following commands configure an AAA profile for dot1x authentication and a wired profile that references the AAA profile: aaa profile sec-wired
dot1x-default-role employee dot1x-server-group sec-svrs aaa authentication wired profile sec-wired
Related Commands
Command vlan
Description
Assign an AAA profile to an individual VLAN to enable role-based access for wired clients connected to an untrusted VLAN or port on the switch.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
54 | aaa authentication wired
AOS-W 6.2 | Reference Guide
aaa authentication wispr
aaa authentication wispr agent string clone default-role <role> logon-wait {cpu-threshold <cpu-threshold>}|{maximum-delay <maximum-delay>}|{minimum-delay <minimum-delay>} no ... max-authentication-failures server-group <server-group> wispr-location-id-ac <wispr-location-id-ac> wispr-location-id-cc <wispr-location-id-cc> wispr-location-id-isocc <wispr-location-id-isocc> wispr-location-id-network <wispr-location-id-network> wispr-location-name-location <wispr-location-name-location> wispr-location-name-operator-name <wispr-location-name-operator>
Description
This command configures WISPr authentication with an ISP's WISPr RADIUS server.
Syntax
Parameter agent string
clone default-role logon-wait
CPU-threshold <cpu-threshold> max-authentication-failures
maximum-delay <maximum-delay>
minimum-delay <minimum-delay>
Description
User Agent String to be registered for use in WISPR Profile. Max User Agent String len: 32 characters.Max number of User Agent string: 32.
Copy data from another WISPr Authentication Profile.
Default role assigned to users that complete WISPr authentication.
Configure the CPU utilization threshold that will trigger logon wait maximum and minimum times
Percentage of CPU utilization at which the maximum and minimum login wait times are enforced. Range: 1-100%.Default: 60%.
Maximum auth failures before user is blacklisted. Range: 0-10. Default: 0.
If the switch's CPU utilization has surpassed the CPU-threshold value, the maximum-delay parameter defines the minimum number of seconds a user will have to wait to retry a login attempt. Range: 1-10 seconds. Default: 10 seconds.
If the switch's CPU utilization has surpassed the CPU-threshold value, the minimum-delay parameter defines the minimum number of seconds a user will have to wait to retry a login attempt. Range: 1-10 seconds. Default: 5 seconds.
AOS-W 6.2 | Reference Guide
aaa authentication wispr | 55
Parameter
wispr-location-id-ac <wispr-location-id-ac>
wispr-location-id-cc <wispr-location-id-cc>
Description The E.164 Area Code in the WISPr Location ID.
The 1-3 digit E.164 Country Code in the WISPr Location ID.
wispr-location-id-isocc <wispr-location-id- The ISO Country Code in the WISPr Location ID. isocc>
wispr-location-id-network <wispr-location- The SSID/network name in the WISPr Location ID. id-network>
wispr-location-name-location <wisprlocation-name-location>
A name identifying the hotspot location. If no name is defined, the default ap-name is used.
wispr-location-name-operator-name <wispr-location-name-operator>
A name identifying the hotspot operator.
Usage Guidelines
WISPr authentication allows a "smart client" to remain authenticated on the network when they roam between Wireless Internet Service Providers, even if the wireless hotspot uses an ISP for which the client may not have an account.
If you are hotstpot operator using WISPr authentication, and a client that has an account with your ISP attempts to access the Internet at your hotspot, then your ISP's WISPr AAA server authenticates that client directly, and allows the client access on the network. If, however, the client only has an account with a partner ISP, then your ISP's WISPr AAA server will forward that client's credentials to the partner ISP's WISPr AAA server for authentication. Once the client has been authenticated on the partner ISP, it will be authenticated on your hotspot's own ISP, as per their service agreements. Once your ISP sends an authentication message to the switch, the switch assigns the default WISPr user role to that client.
AOS-W supports the following smart clients, which enable client authentication and roaming between hotspots by embedding iPass Generic Interface Specification (GIS) redirect, proxy, authentication and logoff messages within HTLM messages to the switch.
l iPass l Bongo l Trustive l weRoam l AT&T
A WISPr authentication profile includes parameters to define RADIUS attributes, the default role for authenticated WISPr users, maximum numbers of authenticated failures and logon wait times. The WISPr-Location-ID sent from the switch to the WISPr RADIUS server will be the concatenation of the ISO Country Code, E.164 Country Code, E.164 Area Code and SSID/Zone parameters configured in this profile.
The parameters to define WISPr RADIUS attributes are specific to the RADIUS server your ISP uses for WISPr authentication; contact your ISP to determine these values. You can find a list of ISO and ITU country and area codes at the ISO and ITU websites www.iso.org and http://www.itu.int.
A Boingo smart client uses a NAS identifier in the format <CarrierID>_<VenueID> for location identification. To support Boingo clients, you must also configure the NAS identifier parameter in the Radius server profile for the WISPr server
56 | aaa authentication wispr
AOS-W 6.2 | Reference Guide
Example
The following commands configure an WISPr authentication profile: aaa authentication wispr
default-role authuser max-authentication-failures 5 server-group wispr1 wispr-location-id-ac 408 wispr-location-id-cc 1 wispr-location-id-isocc us wispr-location-id-network <wispr-location-id-network> wispr-location-name-location <wispr-location-name-location> wispr-location-name-operator-name <wispr-location-name-location>
Command History
This command was available in AOS-W 3.4.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master or local switches
AOS-W 6.2 | Reference Guide
aaa authentication wispr | 57
aaa bandwidth-contract
aaa bandwidth-contract <name> {kbits <kbits>|mbits <mbits>}
Description
This command configures a bandwidth contract.
Syntax
Parameter <name> kbits <bits>
mbits <bits>
Description
Name that identifies this bandwidth contract.
Limit the traffic rate for this bandwidth contract to a specified number of kilobits per second.
Limit the traffic rate for this bandwidth contract to a specified number of megabits per second.
Range -- 256-2000000
1-2000
Usage Guidelines
You can apply a configured bandwidth contract to a user role or to a VLAN. When you apply a bandwidth contract to a user role (see user-role on page 1462), you specify whether the contract applies to upstream traffic (from the client to the switch) or downstream traffic (from the switch to the client). You can also specify whether the contract applies to all users in a specified user role or per-user in a user role. When you apply a bandwidth contract to a VLAN (see interface vlan on page 336), the contract limits multicast traffic and does not affect other data. This is useful because an AP can only send multicast traffic at the rate of the slowest associated client. Thus excessive multicast traffic will fill the buffers of the AP, causing frame loss and poor voice quality. Generally, every system should have a bandwidth contract of 1 Mbps or even 700 Kbps and it should be applied to all VLANs with which users are associated, especially those VLANs that pass through the upstream router. The exception are VLANs that are used for high speed multicasts, where the SSID is configured without low data rates.
Example
The following command creates a bandwidth contract that limits the traffic rate to 1 Mbps: aaa bandwidth-contract mbits 1
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
58 | aaa bandwidth-contract
AOS-W 6.2 | Reference Guide
aaa derivation-rules
aaa derivation-rules user <name> no ... set {aaa-profile|role|vlan} condition <rule-type> <attribute> <value> set-value {<role>|<vlan>} [description <rule description>][position <number>]
Description
This command configures rules which assigns a AAA profile, user role or VLAN to a client based upon the client's association with an AP. A user role cannot be assigned by an AAA derivation rule unless the switch has an installed PEFNG license.
Syntax
Parameter <name> no set {role|vlan} condition <rule-type>
<attribute><value>
set-value <role>|<vlan> description position
Description
Name that identifies this set of user derivation rules.
Negates a configured rule.
Specify whether the action of the rule is to set the role or the VLAN.
Condition that should be checked to derive role/VLAN
For a rule that sets an AAA profile, use the user-vlan rule type. For a role or VLAN user derivation rule, select one of the following rules: l bssid: BSSID of access point. l dhcp-option: Use DHCP signature matching to assign a role or VLAN. l dhcp-option-77: Enable DHCP packet processing. l encryption-type: Encryption method used by station. l essid: ESSID of access point. l location: user location (ap name). l macaddr: MAC address of user. NOTE: If you use the dhcp-option rule type, best practices are to enable the enforce-dhcp option in the AAA profile referenced by AP group's Virtual AP profile.
Specify one of the following conditions: l contains: Check if attribute contains the string in the <value> parameter. l ends-with: Check if attribute ends with the string in the <value> parameter. l equals: Check if attribute equals the string in the <value> parameter. l not-equals: Check if attribute is not equal to the string in the <value>
parameter. l starts-with: Check if attribute starts with the string in the <value> parameter.
Specify the user role or VLAN ID to be assigned to the client if the above condition is met.
Describes the user derivation rule. This parameter is optional and has a 128 character maximum.
Position of this rule relative to other rules that are configured.
AOS-W 6.2 | Reference Guide
aaa derivation-rules | 59
Usage Guidelines
The user role can be derived from attributes from the client's association with an AP. User-derivation rules are executed before the client is authenticated.
You configure the user role to be derived by specifying condition rules; when a condition is met, the specified user role is assigned to the client. You can specify more than one condition rule; the order of rules is important as the first matching condition is applied. You can also add a description of the rule.
The table below describes the conditions for which you can specify a user role or VLAN.
Rule Type
Condition
Value
bssid: Assign client to a role or VLAN based upon the BSSID of AP to which client is associating.
One of the following: l contains l ends with l equals l does not equal l starts with
MAC address (xx:xx:xx:xx:xx:xx)
dhcp-option: Assign client to a role or VLAN based upon the DHCP signature ID.
One of the following: l equals l starts with
DHCP signature ID. Note: This string is not case sensitive.
dhcp-option-77: Assign client to a role or VLAN based upon the user class identifier returned by DHCP server.
equals
string
encryption-type: Assign client to a role or VLAN based upon the encryption type used by the client.
One of the following: l equals l does not equal
l Open (no encryption) l WPA/WPA2 AES l WPA-TKIP (static or dynamic) l Dynamic WEP l WPA/WPA2 AES PSK l Static WEP l xSec
essid: Assign client to a role or VLAN based upon the ESSID to which the client is associated
One of the following: l contains l ends with l equals l does not equal l starts with l value of (does not
take string; attribute value is used as role)
string
location: Assign client to a role or VLAN based upon the ESSID to which the client is associated
One of the following: l equals l does not equal
string
macaddr: MAC address of the client
One of the following: l contains l ends with l equals l does not equal l starts with
MAC address (xx:xx:xx:xx:xx:xx)
60 | aaa derivation-rules
AOS-W 6.2 | Reference Guide
The device identification feature allows you to assign a user role or VLAN to a specific device type by identifying a DHCP option and signature for that device. If you create a user rule with the DHCP-Option rule type, the first two characters in the Value field must represent the hexadecimal value of the DHCP option that this rule should match, while the rest of the characters in the Value field indicate the DHCP signature the rule should match. To create a rule that matches DHCP option 12 (host name), the first two characters of the in the Value field must be the hexadecimal value of 12, which is 0C. To create a rule that matches DHCP option 55, the first two characters in the Value field must be the hexadecimal value of 55, which is 37.
The following table describes some of the DHCP options that are useful for assigning a user role or VLAN..
DHCP Option 12 55 60 81
Description Host name Parameter Request List Vendor Class Identifier Client FQDN
Hexidecimal Equivalent 0C 37 3C 51
To identify DHCP strings used by an individual device, access the command-line interface in config mode and issue the following command to include DHCP option values for DHCP-DISCOVER and DHCP-REQUEST frames in the switch's log files:
logging level debugging network process dhcpd
Now, connect the device you want to identify to the network, and issue the CLI command show log network. The sample below is an example of the output that may be generated by this command.
Be aware that each device type may not have a unique DHCP fingerprint signature. For example, devices from different manufacturers may use vendor class identifiers that begin with similar strings. If you create a DHCP-Option rule that uses the starts-with condition instead of the equals condition, the rule may assign a role or VLAN to more than one device type.
(host) (config) #show log network all | include DISCOVER Feb 26 02:50:34 :202534: <DBUG> |dhcpdwrap| |dhcp| Datapath vlan1: DISCOVER 00:19:d2:01:0b:84 Options 74:01 3d:010019d2010b84 0c:736861626172657368612d39393730 3c:4d53465420352e30 37:010f03062c2e2f1f21f92b Feb 26 02:50:42 :202534: <DBUG> |dhcpdwrap| |dhcp| Datapath vlan1: DISCOVER 00:19:d2:01:0b:84 Options 74:01 3d:010019d2010b84 0c:736861626172657368612d39393730 3c:4d53465420352e30 37:010f03062c2e2f1f21f92b Feb 26 02:50:42 :202534: <DBUG> |dhcpdwrap| |dhcp| Datapath vlan1: DISCOVER 00:19:d2:01:0b:84 Options 74:01 3d:010019d2010b84 0c:736861626172657368612d39393730 3c:4d53465420352e30 37:010f03062c2e2f1f21f92b Feb 26 02:53:03 :202534: <DBUG> |dhcpdwrap| |dhcp| Datapath vlan10: DISCOVER 00:26:c6:52:6b:7c Options 74:01 3d:010026c6526b7c 0c:41525542412d46416c73653232 3c:4d53465420352e30 37:010f03062c2e2f1f21f92b 2b:dc00 ...
(host) (config) #show log network all| include REQUEST Feb 26 02:53:04 :202536: <DBUG> |dhcpdwrap| |dhcp| Datapath vlan10: REQUEST 00:26:c6:52:6b:7c reqIP=10.10.10.254 Options 3d:010026c6526b7c 36:0a0a0a02 0c:41525542412d46416c73653232 51:00000041525542412d46416c736532322e73757279612e636f6d 3c:4d53465420352e30 37:010f03062c2e2f1f21f92b 2b:dc0100 Feb 26 02:53:04 :202536: <DBUG> |dhcpdwrap| |dhcp| Datapath vlan10: REQUEST 00:26:c6:52:6b:7c reqIP=10.10.10.254 Options 3d:010026c6526b7c 36:0a0a0a02 0c:41525542412d46416c73653232 51:00000041525542412d46416c736532322e73757279612e636f6d 3c:4d53465420352e30 37:010f03062c2e2f1f21f92b 2b:dc0100
AOS-W 6.2 | Reference Guide
aaa derivation-rules | 61
Feb 26 02:56:02 :202536: <DBUG> |dhcpdwrap| |dhcp| Datapath vlan10: REQUEST 00:26:c6:52:6b:7c reqIP=10.10.10.254 Options 3d:010026c6526b7c 0c:41525542412d46416c73653232 51:00000041525542412d46416c736532322e73757279612e636f6d 3c:4d53465420352e30 37:010f03062c2e2f1f21f92b 2b:dc0100
Examples
The following command sets the client's user role to "guest" if the client associates to the "Guest" ESSID. The rule description indicates that is was created for special customers.
aaa derivation-rules user derive1 set role condition essid equals Guest set-value guest description createdforspecialcustomers
The example rule shown below sets a user role for clients whose host name (DHCP option 12) has a value of 6C6170746F70, which is the hexadecimal equivalent of the ASCII string "laptop". The first two digits in the Value field are thehexadecimal value of 12 (which is 0C), followed by the specific signature to be matched aaa derivation-rules user device-role
set role condition dhcp-option equals 0C6C6170746F70 set-value laptop_role
Command History
Version AOS-W 3.0 AOS-W 6.0 AOS-W 6.1
Description Command introduced. Description parameter was introduced. DHCP-Option rule type was introduced.
Command Information
Platforms All platforms
Licensing
Command Mode
Base operating system. The PEFNG license must be installed for a user role to be assigned.
Config mode on master switches
62 | aaa derivation-rules
AOS-W 6.2 | Reference Guide
aaa dns-query-interval
aaa dns-query-interval <minutes>
Description
Configure how often the switch should generate a DNS request to cache the IP address for a RADIUS server identified via its fully qualified domain name (FQDN).
Syntax
Parameter <minutes>
Description
Specify, in minutes, the interval between DNS requests sent from the switch to the DNS server. By default, DNS requests are sent every 15 minutes. Range: 1-1440 minutes
Usage Guidelines
If you define a RADIUS server using the FQDN of the server rather than its IP address, the switch will periodically generate a DNS request and cache the IP address returned in the DNS response. Issue this command to configure the frequency of these requests.
Example
This command configures a DNS query interval of 30 minutes. (host) # aaa dns-query-interval 30
Related Commands
To view the current DNS query interval, issue the command show aaa dns-query-interval.
Command History
This command was available in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config mode on local and master switches
AOS-W 6.2 | Reference Guide
aaa dns-query-interval | 63
aaa inservice
aaa inservice <server-group> <server>
Description
This command designates an "out of service" authentication server to be "in service".
Syntax
Parameter <server-group> <server>
Description Server group to which this server is assigned. Name of the configured authentication server.
Usage Guidelines
By default, the switch marks an unresponsive authentication server as "out of service" for a period of 10 minutes (you can set a different time limit with the aaa timers dead-time command). The aaa inservice command is useful when you become aware that an "out of service" authentication server is again available before the dead-time period has elapsed. (You can use the aaa test-server command to test the availability and response of a configured authentication server.)
Example
The following command sets an authentication server to be in service: aaa inservice corp-rad rad1
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
64 | aaa inservice
AOS-W 6.2 | Reference Guide
aaa ipv6 user add
aaa ipv6 user add <ipv6addr> authentication-method {dot1x|stateful-dot1x} mac <macaddr> name <username> profile <aaa-profile> role <role>
Description
This command manually assigns a user role or other values to a specified IPv6 client.
Syntax
Parameter <ipv6addr> authentication-method
dot1x stateful-dot1x mac <macaddr> name <username> profile <aaa-profile> role <role>
Description IPv6 address of the user to be added. Authentication method for the client. 802.1X authentication. Stateful 802.1X authentication. MAC address of the client. Name of the client. AAA profile for the client. User role for the client.
Usage Guidelines
This command should only be used for troubleshooting issues with a specific IPv6 client. This command allows you to manually assign a client to a role. For example, you can create a role "debugging" that includes a policy to mirror session packets to a specified destination for further examination, then use this command to assign the "debugging" role to a specific client. Use the aaa ipv6 user delete command to remove the client or device from the role. Note that issuing this command does not affect ongoing sessions that the client may already have. For example, if a client is in the "employee" role when you assign them to the "debugging" role, the client continues any sessions allowed with the "employee" role. Use the aaa ipv6 user clear-sessions command to clear ongoing sessions.
Example
The following commands create a role that logs HTTPS traffic, then assign the role to a specific IPv6 client: ip access-list session ipv6-log-https
any any svc-https permit log user-role ipv6-web-debug
session-acl ipv6-log-https
In enable mode: aaa ipv6 user add 2002:d81f:f9f0:1000:e409:9331:1d27:ef44 role ipv6-web-debug
AOS-W 6.2 | Reference Guide
aaa ipv6 user add | 65
Command History
This command was available in AOS-W 3.3.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
66 | aaa ipv6 user add
AOS-W 6.2 | Reference Guide
aaa ipv6 user clear-sessions
aaa ipv6 user clear-sessions <ipaddr>
Description
This command clears ongoing sessions for the specified IPv6 client.
Syntax
Parameter <ipaddr>
Description IPv6 address of the client.
Usage Guidelines
This command clears any ongoing sessions that the client already had before being assigned a role with the aaa ipv6 user add command.
Example
The following command clears ongoing sessions for an IPv6 client: aaa user clear-sessions 2002:d81f:f9f0:1000:e409:9331:1d27:ef44
Command History
This command was available in AOS-W 3.3.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
aaa ipv6 user clear-sessions | 67
aaa ipv6 user delete
aaa ipv6 user delete {<ipaddr>|all|mac <macaddr>|name <username>|role <role>}
Description
This command deletes IPv6 clients, users, or roles.
Syntax
Parameter <ipv6addr> all mac name role
Description IPv6 address of the client to be deleted. Deletes all connected IPv6 clients. MAC address of the IPv6 client to be deleted. Name of the IPv6 client to be deleted. Role of the IPv6 client to be deleted.
Usage Guidelines
This command allows you to manually delete clients, users, or roles. For example, if you used to the aaa ipv6 user add command to assign a user role to an IPv6 client, you can use this command to remove the role assignment.
Example
The following command a role: aaa ipv6 user delete role web-debug
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
68 | aaa ipv6 user delete
AOS-W 6.2 | Reference Guide
aaa ipv6 user logout
aaa ipv6 user logout <ipaddr>
Description
This command logs out an IPv6 client.
Syntax
Parameter <ipv6addr>
Description IPv6 address of the client to be logged out.
Usage Guidelines
This command logs out an authenticated IPv6 client. The client must reauthenticate.
Example
The following command logs out an IPv6 client: aaa user logout 2002:d81f:f9f0:1000:e409:9331:1d27:ef44
Command History
This command was available in AOS-W 3.3.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
aaa ipv6 user logout | 69
aaa password-policy mgmt
aaa password-policy mgmt enable no password-lock-out password-lock-out-time password-max-character-repeat. password-min-digit password-min-length password-min-lowercase-characters password-min-special-character password-min-uppercase-characters password-not-username
Description
Define a policy for creating management user passwords.
Syntax
Parameter enable password-lock-out password-lock-out-time
password-max-characterrepeat password-min-digit
Description
enable the password management policy
The number of failed attempts within a 3 minute window that causes the user to be locked out for the period of time specified by the password-lock-out-time parameter. Range: 0-10 attempts. By default, the password lockout feature is disabled, and the default value of this parameter is 0 attempts.
The number of minutes a user who has exceeded the maximum number of failed password attempts is locked out of the network. After this period has passed, the lockout is cleared without administrator intervention. Range: 1 min to 1440 min (24 hrs). Default: 3. NOTE: When a management user gets locked out, that event is logged in the switch log file. The management user lockout warning message can have any one of the following warning IDs. l 125060 = Password policy locked out a management user
created via the mgmt-user command in the serial console CLI. l 125061 = Password policy locked out a management user
created via the WebUI or the mgmt-user command in the Telnet/SSH CLI. l 133109 = Password policy locked out a management user created via the local-userdb command in the CLI.
The maximum number of consecutive repeating characters allowed in a management user password. Range: 0-10 characters. By default, there is no limitation on the numbers of character that can repeat within a password, and the parameter has a default value of 0 characters.
The minimum number of numeric digits required in a management user password. Range: 0-10 digits. By default, there is no requirement for numerical digits in a password, and the parameter has a default value of 0.
70 | aaa password-policy mgmt
AOS-W 6.2 | Reference Guide
Parameter password-min-length
password-min-lowercasecharacters
password-min-specialcharacter
password-min-uppercasecharacters
password-not-username
Description
The minimum number of characters required for a management user password Range: 6-64 characters. Default: 6.
The minimum number of lowercase characters required in a management user password. Range: 0-10 characters. By default, there is no requirement for lowercase letters in a password, and the parameter has a default value of 0.
The minimum number of special characters required in a management user password. Range: 0-10 characters. By default, there is no requirement for special characters in a password, and the parameter has a default value of 0. See Usage Guidelines below for a list of allowed and disallowed special characters
The minimum number of uppercase characters required in a management user password. Range: 0-10 characters. By default, there is no requirement for uppercase letters in a password, and the parameter has a default value of 0.
Password cannot be the management users' current username or the username spelled backwards.
Usage Guidelines
By default, the password for a management user has no requirements other than a minimum length of 6 alphanumeric or special characters.You do not need to configure a different management user password policy unless your company enforces a best practices password policy for management users with root access to network equipment.
The table below lists the special characters allowed and not allowed in any management user password
Allowed Characters exclamation point: ! underscore: _ at symbol: @ pound sign: # dollar sign: $ percent sign: % caret: ^ ampersand: & star: * greater and less than symbols: < >
Disallowed Characters Parenthesis: ( ) apostrophe: ' semi-colon: ; dash: equals sign: = slash: / question mark: ?
AOS-W 6.2 | Reference Guide
aaa password-policy mgmt | 71
Allowed Characters curled braces: { } straight braces: [ ] colon : period: . pipe: | plus sign: + tilde: ~ comma: , accent mark: `
Disallowed Characters
Example
The following command sets a management password policy that requires the password to have a minimum of nine characters, including one numerical digit and one special character: aaa password-policy mgmt
enable password-min-digit 1 password-min-length 9 password-min-special-characters 1
Related Commands
Command
show aaa password-policy mgmt
Description
Use show aaa password-policy mgmt to show the current management password policy
Mode Enable mode
Command History
This command was available in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
72 | aaa password-policy mgmt
AOS-W 6.2 | Reference Guide
aaa profile
aaa profile <profile> authentication-dot1x <dot1x-profile> authentication-mac <mac-profile> clone <profile> devtype-classification dot1x-default-role <role> dot1x-server-group <group> enforce-dhcp initial-role <role> l2-auth-fail-through mac-default-role <role> mac-server-group <group> no ... radius-accounting <group> radius-interim-accounting rfc-3576-server <ipaddr> sip-authentication-role <role> user-derivation-rules <profile> wired-to-wireless-roam xml-api-server <ipaddr>
Description
This command configures the authentication for a WLAN.
Syntax
Parameter
Description
Default
<profile>
Name that identifies this instance of the profile. The name must be 1-63 characters.
"default"
authentication-dot1x <dot1xprofile>
Name of the 802.1X authentication profile
--
associated with the WLAN. See aaa authentication
dot1x on page 20.
authentication-mac <mac-profile> Name of the MAC authentication profile associated -- with the WLAN. See aaa authentication mac on page 26.
clone <profile>
Name of an existing AAA profile configuration from -- which parameter values are copied.
devtype-classification
The device identification feature can automatically identify different client device types and operating systems by parsing the User-Agent strings in a client's HTTP packets. When the devtypeclassification parameter is enabled, the output of the show user and show user-table commands shows each client's device type, if that client device can be identified.
enabled
dot1x-default-role <role>
Configured role assigned to the client after 802.1X authentication. If derivation rules are present, the role assigned to the client through these rules take precedence over the default role.
guest
AOS-W 6.2 | Reference Guide
aaa profile | 73
Parameter dot1x-server-group <group> enforce-dhcp
initial-role <role> l2-auth-fail-through mac-default-role <role>
mac-server-group group no radius-accounting <group> radius-interim-accounting
rfc-3576-server <ip-addr>
sip-authentication-role <role> user-derivation-rules <profile> wired-to-wireless-roam xml-api-server <ip-addr>
Description
Default
NOTE: This parameter requires the PEFNG license.
Name of the server group used for 802.1X
--
authentication. See aaa server-group on page 82.
When you enable this option, clients must complete a DHCP exchange to obtain an IP address. Best practices are to enable this option, when you use the aaa derivation-rules command to create a rule with the DHCP-Option rule type. This parameter is disabled by default.
disabled
Role for unauthenticated users.
logon
To select different authentication method if one fails disabled
Configured role assigned to the user when the device is MAC authenticated. If derivation rules are present, the role assigned to the client through these rules take precedence over the default role. NOTE: This parameter requires the PEFNG license.
guest
Name of the server group used for MAC
--
authentication. See aaa server-group on page 82.
Negates any configured parameter.
--
Name of the server group used for RADIUS
--
accounting. See aaa server-group on page 82.
By default, the RADIUS accounting feature sends only start and stop messages to the RADIUS accounting server. Issue the interim-radiusaccounting command to allow the switch to send Interim-Update messages with current user statistics to the server at regular intervals.
disabled
IP address of a RADIUS server that can send user
--
disconnect and change-of-authorization messages,
as described in RFC 3576, "Dynamic Authorization
Extensions to Remote Dial In User Service
(RADIUS)". See aaa rfc-3576-server on page 80.
NOTE: This parameter requires the PEFNG license.
Configured role assigned to a session initiation protocol (SIP) client upon registration. NOTE: This parameter requires the PEFNG license.
guest
User attribute profile from which the user role or
--
VLAN is derived.
Keeps user authenticated when roaming from the wired side of the network.
enabled
IP address of a configured XML API server. See aaa -- xml-api on page 99. NOTE: This parameter requires the PEFNG license.
74 | aaa profile
AOS-W 6.2 | Reference Guide
Usage Guidelines
The AAA profile defines the user role for unauthenticated users, the default user role for MAC or 802.1X authentication, and user derivation rules. The AAA profile contains the authentication profile and authentication server group.
There are predefined AAA profiles available: default-dot1x, default-mac-auth, and default-open, that have the parameter values shown in the following table.
Parameter
authentication-dot1x authentication-mac dot1x-default-role dot1x-server-group initial-role mac-default-role mac-server-group radius-accounting rfc-3576-server user-derivation-rules wired-to-wireless roam
default-dot1x
default N/A authenticated N/A logon guest default N/A N/A N/A enabled
default-macauth
default-open
N/A
N/A
default
N/A
guest
guest
N/A
N/A
logon
logon
authenticated guest
default
default
N/A
N/A
N/A
N/A
N/A
N/A
enabled
enabled
Example
The following command configures an AAA profile that assigns the "employee" role to clients after they are authenticated using the 802.1X server group "radiusnet". aaa profile corpnet
dot1x-default-role employee dot1x-server-group zachjennings
Command History
Version AOS-W 3.1 AOS-W 3.4.1
AOS-W 6.1
Description
Command introduced.
License requirements changed in AOS-W 3.4.1, so the sip-authentication-role parameter required the Policy Enforcement Firewall license instead of the Voice Services Module license required in earlier versions.
The radius-interim-accounting, devtype-classification and enforce-dhcp parameters were introduced.
AOS-W 6.2 | Reference Guide
aaa profile | 75
Command Information
Platforms All platforms
Licensing
Base operating system, except for noted parameters
Command Mode Config mode on master switches
76 | aaa profile
AOS-W 6.2 | Reference Guide
aaa query-user
aaa query-user <ldap-server-name> <user-name>
Description
Troubleshoot an LDAP authentication failure by verifying that the user exists in the ldap server database.
Syntax
Parameter <ldap-server-name> <user-name>
Description Name of an LDAP server. Name of a user whose LDAP record you want to view.
Usage Guidelines
If the Admin-DN binds successfully but the wireless user fails to authenticate, issue this command to troubleshoot whether the problem is with the wireless network, the switch, or the ldap server. The aaa query-user <ldap_ server_name> <username> command to makes the switch send a search query to find the user. If that search fails in spite of the user being in the LDAP database, it is most probable that the base DN where the search was started was not correct. In such case, it is advisable to make the base DN at the root of the ldap tree.
Example
The example below shows part of the output for an LDAP record for the username JDOE.
(host) #aaa query-user eng JDOE objectClass: top objectClass: person objectClass: organizationalPerson objectClass: user cn: John Doe sn: Doe userCertificate: 0\202\005\2240\202\004|\240\003\002\001\002\002\012H\011\333K userCertificate: 0\202\005\2240\202\004|\240\003\002\001\002\002\012]\350\346F userCertificate: 0\202\005\2240\202\004|\240\003\002\001\002\002\012\023\001\017\240 userCertificate: 0\202\005\2240\202\004|\240\003\002\001\002\002\012\031\224/\030 userCertificate: 0\202\005~0\202\004f\240\003\002\001\002\002\012\031\223\246\022 userCertificate: 0\202\005\2240\202\004|\240\003\002\001\002\002\012\037\177\374\305 givenName: JDE distinguishedName: CN=John Doe,CN=Users,DC=eng,DC=net instanceType: 4 whenCreated: 20060516232817.0Z whenChanged: 20081216223053.0Z displayName: John Doe uSNCreated: 24599 memberOf: CN=Cert_Admins,CN=Users,DC=eng,DC=net memberOf: CN=ATAC,CN=Users,DC=eng,DC=net uSNChanged: 377560 department: eng name: John Doe ...
Command History
This command was available in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
aaa query-user | 77
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
78 | aaa query-user
AOS-W 6.2 | Reference Guide
aaa radius-attributes
aaa radius-attributes add <attribute> <attribute-id> {date|integer|ipaddr|string} [vendor <name> <vendor-id>]
Description
This command configures RADIUS attributes for use with server derivation rules.
Syntax
Parameter add <attribute> <attribute-id> date integer ipaddr string vendor
Description Adds the specified attribute name (alphanumeric string), associated attribute ID (integer), and type (date, integer, IP address, or string). Adds a date attribute. Adds a integer attribute. Adds a IP address attribute. Adds a string attribute. (Optional) Display attributes for a specific vendor name and vendor ID.
Usage Guidelines
Add RADIUS attributes for use in server derivation rules. Use the show aaa radius-attributes command to display a list of the current RADIUS attributes recognized by the switch. To add a RADIUS attribute to the list, use the aaa radius-attributes command.
Example
The following command adds the VSA "Alcatel-Lucent-User-Role": aaa radius-attributes add Alcatel-Lucent-User-Role 1 string vendor Alcatel-Lucents 14823
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa radius-attributes | 79
aaa rfc-3576-server
aaa rfc-3576-server <ipaddr> clone <server> key <psk> no ...
Description
This command configures a RADIUS server that can send user disconnect and change-of-authorization (CoA) messages, as described in RFC 3576, "Dynamic Authorization Extensions to Remote Dial In User Service (RADIUS)".
Syntax
Parameter <ipaddr> clone <server>
key <psk>
no
Description
IP address of the server.
Name of an existing RFC 3576 server configuration from which parameter values are copied.
Shared secret to authenticate communication between the RADIUS client and server.
Negates any configured parameter.
Usage Guidelines
The disconnect and change-of-authorization messages sent from the server to the switch contains information to identify the user for which the message is sent. The switch supports the following attributes for identifying the users who authenticate with a RFC 3576 server:
l user-name: Name of the user to be authenticated l framed-ip-address: User's IP address l calling-station-id: Phone number of a station that originated a call l accounting-session-id: Unique accounting ID for the user session.
If the authentication server sends both supported and unsupported attributes to the switch, the unknown or unsupported attributes will be ignored. If no matching user is found the switch will send a 503: Session Not Found error message back to the RFC 3576 server.
Example
The following command configures an RFC 3576 server: aaa rfc-3576-server 10.1.1.245
clone default key P@$$w0rD;
80 | aaa rfc-3576-server
AOS-W 6.2 | Reference Guide
Related Commands
Command aaa profilerfc-3576-server <ip-addr> show aaa state user
Description Associate an RFC-3576 server to a AAA profile.
View information for a user whose session timeout is altered by a RFC 3576 server.
Command History
Version AOS-W 3.0
Description Comand introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa rfc-3576-server | 81
aaa server-group
aaa server-group <group> allow-fail-through auth-server <name> [match-authstring contains|equals|starts-with <string>] [match<string>] [position <number>] [trim-fqdn] clone <group> no ... set role|vlan condition <attribute> contains|ends-with|equals|not-equals|starts-with <string> set-value <set-value-str> [position <number>]
fqdn
Description
This command allows you to add a configured authentication server to an ordered list in a server group, and configure server rules to derive a user role, VLAN ID or VLAN name from attributes returned by the server during authentication.
Syntax
Parameter <group> allow-fail-through
auth-server <name> match-authstring
contains equals starts-with
Description
Default
Name that identifies the server group. The name must be 32 -- characters or less.
When this option is configured, an authentication failure with the first server in the group causes the switch to attempt authentication with the next server in the list. The switch attempts authentication with each server in the ordered list until either there is a successful authentication or the list of servers in the group is exhausted.
disabled
Name of a configured authentication server.
--
This option associates the authentication server with a match -- rule that the switch can compare with the user/client information in the authentication request. With this option, the user/client information in the authentication request can be in any of the following formats: <domain>\<user> <user>@<domain> host/<pc-name>.<domain> An authentication request is sent to the server only if there is a match between the specified match rule and the user/client information.You can configure multiple match rules for an authentication server.
contains: The rule matches if the user/client information
--
contains the specified string.
The rule matches if the user/client information exactly
--
matches the specified string.
The rule matches if the user/client information starts with the -- specified string.
82 | aaa server-group
AOS-W 6.2 | Reference Guide
Parameter match-fqdn <string>
position <number> trim-fqdn
clone no set role|vlan
condition contains ends-with equals not-equals starts-with set-value value-of
Description
Default
This option associates the authentication server with a
--
specified domain. An authentication request is sent to the
server only if there is an exact match between the specified
domain and the <domain> portion of the user information
sent in the authentication request. With this option, the user
information must be in one of the following formats:
<domain>\<user>
<user>@<domain>
Position of the server in the server list. 1 is the top.
(last)
This option causes the user information in an authentication -- request to be edited before the request is sent to the server. Specifically, this option: removes the <domain>\ portion for user information in the <domain>\<user> format removes the @<domain> portion for user information in the <user>@<domain> format
Name of an existing server group from which parameter
--
values are copied.
Negates any configured parameter.
--
Assigns the client a user role, VLAN ID or VLAN name based -- on attributes returned for the client by the authentication server. Rules are ordered: the first rule that matches the configured condition is applied. VLAN IDs and VLAN names cannot be listed together.
Attribute returned by the authentication server.
--
The rule is applied if and only if the attribute value contains -- the specified string.
The rule is applied if and only if the attribute value ends with -- the specified string.
The rule is applied if and only if the attribute value equals the -- specified string.
The rule is applied if and only if the attribute value is not
--
equal to the specified string.
The rule is applied if and only if the attribute value begins
--
with the specified string.
User role or VLAN applied to the client when the rule is
--
matched.
Sets the user role or VLAN to the value of the attribute
--
returned. The user role or VLAN ID returned as the value of
the attribute must already be configured on the switch when
the rule is applied.
Usage Guidelines
You create a server group for a specific type of authentication or for accounting. The list of servers in a server group is an ordered list, which means that the first server in the group is always used unless it is unavailable (in which
AOS-W 6.2 | Reference Guide
aaa server-group | 83
case, the next server in the list is used). You can configure servers of different types in a server group, for example, you can include the internal database as a backup to a RADIUS server. You can add the same server to multiple server groups. There is a predefined server group "internal" that contains the internal database.
Example
The following command configures a server group "corp-servers" with a RADIUS server as the main authentication server and the internal database as the backup. The command also sets the client's user role to the value of the returned "Class" attribute. aaa server-group corp-servers
auth-server radius1 position 1 auth-server internal position 2 set role condition Class value-of
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
84 | aaa server-group
AOS-W 6.2 | Reference Guide
aaa sygate-on-demand (deprecated)
aaa sygate-on-demand remediation-failure-role <role>
Description
This command configures the user role assigned to clients that fail Sygate On-Demand Agent (SODA) remediation.
Command History
Version AOS-W 3.0 AOS-W 3.4
Description Command introduced Command deprecated
AOS-W 6.2 | Reference Guide
aaa sygate-on-demand (deprecated) | 85
aaa tacacs-accounting
aaa tacacs-accounting server-group <group> command {action|all|configuration|show} mode {enable|disable}
Description
This command configures reporting of commands issued on the switch to a TACACS+ server group.
Syntax
Parameter
Description
Range
server-group <group> The TACACS server group to which the reporting is -- sent.
command
The types of commands that are reported to the
--
TACACS server group.
action
Reports action commands only.
--
all
Reports all commands.
--
configuration
Reports configuration commands only
--
show
Reports show commands only
--
mode
Enables accounting for the server group.
enable/ disable
Default --
--
-- -- -- -- disabled
Usage Guidelines
You must have previously configured the TACACS+ server and server group (see aaa authentication-server tacacs on page 36 and aaa server-group on page 82).
Example
The following command enables accounting and reporting of configuration commands to the server-group "tacacs1": aaa tacacs-accounting server-group tacacs1 mode enable command configuration
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
86 | aaa tacacs-accounting
AOS-W 6.2 | Reference Guide
aaa test-server
aaa test-server {mschapv2|pap} <server> <username> <passwd>
Description
This command tests a configured authentication server.
Syntax
Parameter mschapv2 pap <server> <username> <passwd>
Description Use MSCHAPv2 authentication protocol. Use PAP authentication protocol. Name of the configured authentication server. Username to use to test the authentication server. Password to use to test the authentication server.
Usage Guidelines
This command allows you to check a configured RADIUS authentication server or the internal database. You can use this command to check for an "out of service" RADIUS server.
Example
The following commands adds a user in the internal database and verifies the configuration: local-userdb add kgreen lkjHGfds aaa test-server pap internal kgreen lkjHGfds
Authentication successful
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
aaa test-server | 87
aaa timers
aaa timers dead-time <minutes> idle-timeout <time> [seconds] logon-lifetime <0-255> stats-timeout <time> [seconds]
Description
This command configures the timers that you can apply to clients and servers.
Syntax
Parameter dead-time <minutes>
idle-timeout <1-15300>
logon-lifetime stats-timeout
Description
Range Default
Maximum period, in minutes, that the switch considers an unresponsive authentication server to be "out of service".
This timer is only applicable if there are two or more authentication servers configured on the switch. If there is only one authentication server configured, the server is never considered out of service and all requests are sent to the server.
If one or more backup servers are configured and a server is unresponsive, it is marked as out of service for the dead time; subsequent requests are sent to the next server on the priority list for the duration of the dead time. If the server is responsive after the dead time has elapsed, it can take over servicing requests from a lower-priority server; if the server continues to be unresponsive, it is marked as down for the dead time.
0-50
10 minutes
Maximum number of minutes after which a client is considered idle if there is no user traffic from the client.
The timeout period is reset if there is a user traffic. If there is no IP traffic in the timeout period or there is no 802.11 traffic as indicated in the station ageout time that is set in the wlan ssid profile, the client is aged out. Once the timeout period has expired, the user is removed immediately and no ping request is sent. If the seconds parameter is not specified, the value defaults to minutes.
1 to 255 minutes (30 to 15300 seconds)
5 minutes (300 seconds)
Maximum time, in minutes, that unauthenticated clients are allowed to remain logged on.
0-255
5 minutes
User Interim stats timeout value. If the secondssparameter is not specified, the value defaults to minutes.
5-10 minutes( 300 to 600 seconds)
10 minutes (600 seconds)
Usage Guidelines
These parameters can be left at their default values for most implementations.
88 | aaa timers
AOS-W 6.2 | Reference Guide
Example
The following command changes the idle time to 10 minutes: aaa timers idle-timeout 10
Related Commands
(host) (config) #show aaa timers (host) (config) #show datapath user table
Command History
Version AOS-W 3.0 AOS-W 3.4
Description Command introduced Idle timeout values and defaults changed
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa timers | 89
aaa trusted-ap
aaa trusted-ap <macaddr>
Description
This command configures a trusted non-Alcatel-Lucent AP.
Syntax
Parameter <macaddr>
Description MAC address of the AP
Usage Guidelines
This command configures a non-Alcatel-Lucent AP as a trusted AP.
Example
The following command configures a trusted non-Alcatel-Lucent AP: aaa trusted-ap 00:40:96:4d:07:6e
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
90 | aaa trusted-ap
AOS-W 6.2 | Reference Guide
aaa user add
aaa user add <ipaddr> [<nusers>] [authentication-method {dot1x|mac|stateful-dot1x|vpn| web}] [mac-addr <macaddr>] [name <username>] [profile <aaa_profile>] [role <role>]
Description
This command manually assigns a user role or other values to a specified client or device.
Syntax
Parameter <ipaddr> <nusers> authentication-method
dot1x mac-addr stateful-dot1x vpn web mac <macaddr> name <username> profile <aaa_profile> role <role>
Description IP address of the user to be added. Number of users to create starting with <ipaddr>. Authentication method for the user. 802.1X authentication. MAC authentication. Stateful 802.1X authentication. VPN authentication. Captive portal authentication. MAC address of the user. Name for the user. AAA profile for the user. Role for the user.
Usage Guidelines
This command should only be used for troubleshooting issues with a specific client or device. This command allows you to manually assign a client or device to a role. For example, you can create a role "debugging" that includes a policy to mirror session packets to a specified destination for further examination, then use this command to assign the "debugging" role to a specific client. Use the aaa user delete command to remove the client or device from the role.
Note that issuing this command does not affect ongoing sessions that the client may already have. For example, if a client is in the "employee" role when you assign them to the "debugging" role, the client continues any sessions allowed with the "employee" role. Use the aaa user clear-sessions command to clear ongoing sessions.
Example
The following commands create a role that logs HTTPS traffic, then assign the role to a specific client: ip access-list session log-https
any any svc-https permit log user-role web-debug
session-acl log-https
In enable mode:
AOS-W 6.2 | Reference Guide
aaa user add | 91
aaa user add 10.1.1.236 role web-debug
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
92 | aaa user add
AOS-W 6.2 | Reference Guide
aaa user clear-sessions
aaa user clear-sessions <ipaddr>
Description
This command clears ongoing sessions for the specified client.
Syntax
Parameter <ip-addr>
Description IP address of the user.
Usage Guidelines
This command clears any ongoing sessions that the client already had before being assigned a role with the aaa user add command.
Example
The following command clears ongoing sessions for a client: aaa user clear-sessions 10.1.1.236
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
aaa user clear-sessions | 93
aaa user delete
aaa user delete {<ipaddr>|all|mac <macaddr>|name <username>|role <role>}
Description
This command deletes clients, users, or roles.
Syntax
Parameter <ipaddr> all mac name role
Description IP address of the client to be deleted. Deletes all connected clients. MAC address of the client to be deleted. Name of the client to be deleted. Role of the client to be deleted.
Usage Guidelines
This command allows you to manually delete clients, users, or roles. For example, if you used to the aaa user add command to assign a user role to a client, you can use this command to remove the role assignment.
Example
The following command a role: aaa user delete role web-debug
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
94 | aaa user delete
AOS-W 6.2 | Reference Guide
aaa user fast-age
aaa user fast-age
Description
This command enables fast aging of user table entries.
Syntax
No parameters.
Usage Guidelines
When this feature is enabled, the switch actively sends probe packets to all users with the same MAC address but different IP addresses. The users that fail to respond are purged from the system. This command enables quick detection of multiple instances of the same MAC address in the user table and removal of an "old" IP address. This can occur when a client (or an AP connected to an untrusted port on the switch) changes its IP address.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa user fast-age | 95
aaa user logout
aaa user logout <ipaddr>
Description
This command logs out a client.
Syntax
Parameter <ipaddr>
Description IP address of the client to be logged out.
Usage Guidelines
This command logs out an authenticated client. The client must reauthenticate.
Example
The following command logs out a client: aaa user logout 10.1.1.236
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
96 | aaa user logout
AOS-W 6.2 | Reference Guide
aaa user monitor
aaa user monitor <ipaddr>
Description
This command checks to see whether an authenticated user's attributes differ from those in the SOS.
Syntax
Parameter <ipaddr>
Description IP address of the user whose attributes are being checked.
Usage Guidelines
This command installs a timer that polls the SOS every 60 seconds and checks the following: l L3 ACLs l Upstream bandwidth contract l Downstream bandwidth contract
Example
The following command checks user SOS attributes: aaa user monitor 10.1.1.236
Command History
This command was available in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
aaa user monitor | 97
aaa user stats-poll
aaa user stats-poll <secs>
Description
This command enables user statistics polling. If enabled, AOS-W will poll user data verify that user information in the switch datapath is in synchronization with the data in the switch's authentication module.
Syntax
Parameter <secs>
Description
This command enables user statistics polling, and defines the time interval between polls. The supported range is 60-600 seconds.
Example
The following command enables user statistics polling with an interval of 10 minutes: aaa user stats-poll 600
Command History
This command was introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
98 | aaa user stats-poll
AOS-W 6.2 | Reference Guide
aaa xml-api
aaa xml-api server <ipaddr> clone <server> default-authentication-role <role> key <key> no ...
Description
This command configures an external XML API server.
Syntax
Parameter server clone
key
default-authentication-role <role> no
Description
IP address of the external XML API server.
Name of an existing XML API server configuration from which parameter values are copied.
Preshared key to authenticate communication between the switch and the XML API server.
Name of the role to be assigned to users after completing XML server authorization.
Negates any configured parameter.
Usage Guidelines
XML API is used for authentication and subscriber management from external agents. This command configures an external XML API server. For example, an XML API server can send a blacklist request for a client to the switch. The server configured with this command is referenced in the AAA profile for the WLAN (see aaa profile on page 73). Contact your Alcatel-Lucent representative for more information about using the XML API.
Example
The following configures an XML API server: aaa xml-api server 10.210.1.245
key qwerTYuiOP
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing PEFNG license
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
aaa xml-api | 99
adp
adp discovery {disable|enable} igmp-join {disable|enable} igmp-vlan <vlan>
Description
This command configures the Alcatel Discovery Protocol (ADP).
Syntax
Parameter discovery igmp-join
igmp-vlan
Description Enables or disables ADP on the switch.
Enables or disables sending of Internet Group Management Protocol (IGMP) join requests from the switches. VLAN to which IGMP reports are sent.
Range enabled/ disabled enabled/ disabled
--
Default enabled
enabled
0 (default route VLAN used)
Usage Guidelines
Alcatel-Lucent APs send out periodic multicast and broadcast queries to locate the master switch. If the APs are in the same broadcast domain as the master switch and ADP is enabled on the switch, the switch automatically responds to the APs' queries with its IP address. If the APs are not in the same broadcast domain as the master switch, you need to enable multicast on the network. You also need to make sure that all routers are configured to listen for IGMP join requests from the switch and can route the multicast packets. Use the show adp config command to verify that ADP and IGMP join options are enabled on the switch.
Example
The following example enables ADP and the sending of IGMP join requests on the switch: adp discovery enable igmp-join enable
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
100 | adp
AOS-W 6.2 | Reference Guide
am
am scan <ipaddr> <channel> [bssid <bssid>] am test <ipaddr> {suspect-rap bssid <bssid> match-type <match-type> match-method <method>|wired-mac {add|remove {bssid <bssid>|enet-mac <enet-mac>} mac <mac>}
Description
These commands enable channel scanning or testing for the specified air monitor.
Syntax
Parameter scan <channel>
bssid test suspect-rap match-type
match-method
wired-mac
enet-mac mac
Description
Range
IP address of the air monitor to be scanned.
--
Channel to which the scanning is tuned. Set to 0 to -- enable scanning of all channels.
BSSID of the air monitor.
--
IP address of the air monitor to be tested.
--
Tests suspect-rap feature.
--
Match type.
eth-wm | ap-wm | eth-gwwm
Match method.
equal | plus-one | minusone
Tests the rogue AP classification feature.
--
Specifies the Wired MAC table.
Specifies the Ethernet MAC table.
--
Specifies the MAC entry to add/remove from either -- the Wired MAC table or the Ethernet MAC table.
Usage Guidelines
These commands are intended to be used with an Alcatel-Lucent AP that is configured as an air monitor. You should not use the am test command unless instructed to do so by an Alcatel-Lucent representative.
Example
The following command sets the air monitor to scan all channels: (host) (config) #am scan 10.1.1.244 0
Command History:
Release AOS-W 3.0 AOS-W 3.3.1
Modification Command introduced Support for the wired-mac and associated parameters was introduced.
AOS-W 6.2 | Reference Guide
am | 101
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master switches
102 | am
AOS-W 6.2 | Reference Guide
ap-group
ap-group <group> ap-system-profile <profile> authorization-profile <profile> clone <profile> dot11a-radio-profile <profile> dot11a-traffic-mgmt-profile <profile> dot11g-radio-profile <profile> dot11g-traffic-mgmt-profile <profile> enet0-port-profile <profile> enet1-port-profile <profile> enet2-port-profile <profile> enet3-port-profile <profile> enet4-port-profile <profile> event-thresholds-profile <profile> ids-profile <profile> mesh-cluster-profile <profile> priority <priority> mesh-radio-profile <profile> no ... regulatory-domain-profile <profile> rf-optimization-profile <profile> virtual-ap <profile> voip-cac-profile <profile>
Description
This command configures an AP group.
Syntax
Parameter <group>
ap-system-profile
authorization-profile clone dot11a-radio-profile
dot11a-traffic-mgmtprofile dot11g-radio-profile
Description
Range
Name that identifies the AP group. The name
--
must be 1-63 characters.
NOTE: You cannot use quotes (") in the AP
group name.
Configures AP administrative operations, such -- as logging levels. See ap system-profile on page 157.
Restrictive group for unauthorized AP.
--
Name of an existing AP group from which
--
profile names are copied.
Configures 802.11a radio settings and load
--
balancing for the AP group; contains the ARM
profile. See rf dot11a-radio-profile on page 525.
Configures bandwidth allocation. See wlan
--
traffic-management-profile on page 1552.
Configures 802.11g radio settings and load
--
balancing for the AP group; contains the ARM
profile. See rf dot11a-radio-profile on page 525.
Default "default"
"default"
-- -- "default"
-- "default"
AOS-W 6.2 | Reference Guide
ap-group | 103
Parameter
Description
Range
dot11g-traffic-mgmtprofile
Configures bandwidth allocation. See wlan
--
traffic-management-profile on page 1552.
enet0-port-profile
Configures the duplex and speed of the
--
Ethernet interface 0 on the AP. For information
on how these profiles are defined, see ap
wired-port-profile on page 167.
enet1-port-profile
Configures the duplex and speed of the
--
Ethernet interface 1 on the AP. For information
on how these profiles are defined, see ap
wired-port-profile on page 167.
enet2-port-profile
Configures the duplex and speed of an
--
Ethernet interface 2 on the AP. These profiles
are defined using the command ap wired-port-
profile on page 167.
enet3-port-profile
Configures the duplex and speed of an
--
Ethernet interface 3 on the AP. These profiles
are defined using the command ap wired-port-
profile on page 167.
enet4-port-profile
Configures the duplex and speed of an
--
Ethernet 4 interface on the AP. For information
on how these profiles are defined, see ap
wired-port-profile on page 167.
event-thresholds-profile
Configures Received Signal Strength Indication -- (RSSI) metrics. See rf event-thresholds-profile on page 542.
ids-profile
Configures Alcatel-Lucent's Intrusion Detection -- System (IDS). See ids profile on page 298.
mesh-cluster-profile
Configures the mesh cluster profile for mesh
--
nodes that are members of the AP group. There
is a "default" mesh cluster profile; however, it is
not applied until you provision the mesh node.
See ap mesh-cluster-profile on page 132.
priority
Configures the priority of the mesh cluster profile. If more than two mesh cluster profiles are configured, mesh points use this number to identify primary and backup profile(s). The lower the number, the higher the priority.
1-16
mesh-radio-profile
Configures the 802.11g and 802.11a radio
--
settings for mesh nodes that are members of
the AP group. See ap mesh-ht-ssid-profile on
page 134.
Commands to configure mesh for outdoor APs
require the Outdoor Mesh license.
no
Negates any configured parameter.
--
regulatory-domain-profile Configures the country code and valid
--
channels. See ap regulatory-domain-profile on
page 148.
Default -- "default" "default" "default" "default" "default" "default" "default" "default"
1
"default"
-- "default"
104 | ap-group
AOS-W 6.2 | Reference Guide
Parameter rf-optimization-profile
virtual-ap
voip-cac-profile
Description
Range
Configure coverage hole and interference
--
detection. See rf optimization-profile on page
547.
One or more profiles, each of which configures -- a specified WLAN. See wlan virtual-ap on page 1557.
Configures voice over IP (VoIP) call admission -- control (CAC) options. See wlan voip-cacprofile on page 1565. This parameter requires the PEFNG license.
Default "default"
"default"
"default"
Usage Guidelines
AP groups are at the top of the configuration hierarchy. An AP group collects virtual AP definitions and configuration profiles, which are applied to APs in the group.
Example
The following command configures a virtual AP profile to the "default" AP group: (host)(config) #ap-group default
virtual-ap corpnet
Related Commands
View AP group settings using the command show ap-group.
Command History:
Release AOS-W 3.0 AOS-W 3.2 AOS-W 3.4.1 AOS-W 5.0 AOS-W 6.0
Modification Command introduced Support for the mesh parameters was introduced The voip-cac-profile parameter required the PEF license. The voip-cac-profile parameter requires the PEFV license. The enet-port-profile parameters parameters were introduced.
Command Information
Platforms All platforms
Licensing
Base operating system, except for noted parameters
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ap-group | 105
ap-leds
ap-leds {all | ap-group <ap-group> | ap-name <ap-name> | ip-addr <ip address> | wired-mac <mac address>} {global blink|normal}|{local blink|normal}
Description
This command allows you to set the behavior of an AP's LEDs.
Syntax
Parameter all ap-group <ap-group> ap-name <ap-name> ip-addr <ip-addr> wired-mac <mac-addr> global local blink normal
Description Controls the LED behavior for all APs Controls the LED behavior for APs in the specified group Controls the LED behavior for the AP with the specified name Controls the LED behavior for the AP with the specified IP address Controls the LED behavior for the AP with the specified MAC address Selects all APs on all switches Selects all APs registered on this switch Causes the LEDs to blink for identification Restores the LEDs to their normal behavior
Usage Guidelines
Use the ap-leds command to make the LEDs on a defined set of APs either blink or display in the currently configured LED operating mode. Note that if the LED operating mode defined in the AP's system profile is set to "off", then the normal parameter in the ap-leds command will disable the LEDs. If the LED operating mode in the AP system profile is set to "normal" then the normal parameter in this command will allow the LEDs light as usual.
Example
The following command causes all local APs to blink their LEDs for identification purposes: ap-leds all local blink
Command History
Release AOS-W 3.0
Modification Command introduced
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master or local switches
106 | ap-leds
AOS-W 6.2 | Reference Guide
ap-name
ap-name <name> ap-system-profile <profile> authorization-profile <profile> clone <profile> dot11a-radio-profile <profile> dot11a-traffic-mgmt-profile <profile> dot11g-radio-profile <profile> dot11g-traffic-mgmt-profile <profile> enet0-profile <profile> enet1-profile <profile> event-thresholds-profile <profile> exclude-mesh-cluster-profile-ap <profile> exclude-virtual-ap <profile> ids-profile <profile> mesh-cluster-profile <profile> priority <priority> mesh-radio-profile <profile> no ... regulatory-domain-profile <profile> rf-optimization-profile <profile> snmp-profile <profile> virtual-ap <profile> voip-cac-profile <profile>
Description
This command configures a specific AP.
Syntax
Parameter
Description
Default
<name>
Name that identifies the AP. By default, an AP's name can
--
either be the AP's Ethernet MAC address, or if the AP has
been previously provisioned with an earlier version of AOS-
W, a name in the format <building>.<floor>.<location>. The
name must be 1-63 characters.
NOTE: You cannot use quotes (") in the AP name.
ap-system-profile
Configures AP administrative operations, such as logging levels. See ap system-profile on page 157.
"default"
authorization-profile
Restrictive group for unauthorized AP.
--
clone
Name of an existing AP name from which profile names are -- copied.
dot11a-radio-profile
Configures 802.11a radio settings for the AP group; contains "default" the ARM profile. See rf dot11a-radio-profile on page 525.
dot11a-traffic-mgmt-profile Configures bandwidth allocation. See wlan traffic-
--
management-profile on page 1552.
dot11g-radioprofile
Configures 802.11g radio settings for the AP group; contains "default" the ARM profile. See rf dot11a-radio-profile on page 525.
AOS-W 6.2 | Reference Guide
ap-name | 107
Parameter dot11g-trafficmgmt-profile enet0-profile enet1-profile event-thresholds-profile exclude-mesh-clusterprofile-ap exclude-virtual-ap ids-profile mesh-cluster-profile
priority
mesh-radio-profile
no regulatory-domain-profile rf-optimization -profile snmp-profile virtual-ap voip-cac-profile
Description
Default
Configures bandwidth allocation. See wlan traffic-
--
management-profile on page 1552.
Configures the duplex and speed of the Ethernet 0 interface on the AP. See ap enet-link-profile on page 123.
"default"
Configures the duplex and speed of the Ethernet 1 interface on the AP. See ap enet-link-profile on page 123.
"default"
Configures Received Signal Strength Indication (RSSI) metrics. See rf event-thresholds-profile on page 542.
"default"
Excludes the specified mesh cluster profile from this AP.
--
The Secure Enterprise Mesh license must be installed.
Excludes the specified virtual AP profiles from this AP.
Configures Alcatel-Lucent's Intrusion Detection System (IDS). "default" See ids profile on page 298.
Configures the mesh cluster profile for the AP (mesh node). There is a "default" mesh cluster profile; however, it is not applied until you provision the mesh node. See ap meshcluster-profile on page 132. The Secure Enterprise Mesh license must be installed.
"default"
Configures the priority of the mesh cluster profile. If more than 1 two mesh cluster profiles are configured, mesh points use this number to identify primary and backup profile(s). The supported range of values is 1-16. The lower the number, the higher the priority.
Configures the 802.11g and 802.11a radio settings for the AP (mesh node). See ap mesh-ht-ssid-profile on page 134. The Secure Enterprise Mesh license must be installed.
"default"
Negates any configured parameter.
--
Configures the country code and valid channels. See ap regulatory-domain-profile on page 148.
"default"
Configures load balancing and coverage hole and interference detection. See rf optimization-profile on page 547.
"default"
Configures SNMP-related parameters. See ap snmp-profile (deprecated) on page 152.
"default"
One or more profiles, each of which configures a specified WLAN. See wlan virtual-ap on page 1557.
"default"
Configures voice over IP (VoIP) call admission control (CAC) options. See wlan voip-cac-profile on page 1565. This parameter requires the PEFNG license.
"default"
Usage Guidelines
Profiles that are applied to an AP group can be overridden on a per-AP name basis, and virtual APs can be added or excluded on a per-AP name basis. If a particular profile is overridden for an AP, all parameters from the overriding
108 | ap-name
AOS-W 6.2 | Reference Guide
profile are used. There is no merging of individual parameters between the AP and the AP group to which the AP belongs.
Example
The following command excludes a virtual AP profile from a specific AP: (host) (config) #ap-name 00:0b:86:c0:cf:d8
exclude-virtual-ap corpnet
Related Commands
View AP settings using the command show ap-name.
Command History
Release AOS-W 3.0 AOS-W 3.2 AOS-W 3.4.1
Modification
Command introduced
Support for mesh parameters was introduced.
License requirements changed in AOS-W 3.4.1, so the voip-cac-profile parameter required the PEF license instead of the Voice Services Module license required in earlier versions.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ap-name | 109
ap-regroup
ap-regroup {ap-name <name>|serial-num <num>|wired-mac <macaddr>} <group>
Description
This command moves a specified AP into a group.
Syntax
Parameter ap-name serial-num wired-mac <group>
Description Name of the AP. Serial number of the AP. MAC address of the AP. Name that identifies the AP group. The name must be 1-63 characters.
Default -- -- -- "default"
Usage Guidelines
All APs discovered by the switch are assigned to the "default" AP group. An AP can belong to only one AP group at a time. You can move an AP to an AP group that you created with the ap-group command.
This command automatically reboots the AP.
Example
The following command moves an AP to the `corpnet' group: (host)(config) #ap-regroup wired-mac 00:0f:1e:11:00:00 corpnet
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master switches
110 | ap-regroup
AOS-W 6.2 | Reference Guide
ap-rename
ap-rename {ap-name <name>|serial-num <num>|wired-mac <macaddr>} <new-name>
Description
This command changes the name of an AP to the specified new name.
Syntax
Parameter ap-name serial-num wired-mac <new-name>
Description Current name of the AP. Serial number of the AP. MAC address of the AP. New name for the AP. The name must be 1-63 characters. NOTE: You cannot use quotes (") in the AP name.
Usage Guidelines
An AP name must be unique within your network.
This command automatically reboots the AP.
Example
The following command renames an AP: (host) (config) #ap-rename wired-mac 00:0f:1e:11:00:00 building3-lobby
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master switches
AOS-W 6.2 | Reference Guide
ap-rename | 111
ap debug radio-event-log
ap debug radio-event log [start|stop|show] [ap-name <name>|ip-addr <ip-addr>]| ip6-addr <ip6addr>] radio <0|1> size <size-of-log> events [all|ani|hex|rcfind|rcupdate|rx|size|text|tx {<hexformat>}]
Description
Start and stops radio event log capture for debugging purposes, and sends a pktlog file to a dump server in the case of stop.
Syntax
Parameter start stop
ap-name ip-addr ip6-addr radio size
events all ani hex rcfind rcupdate rx text tx
hex format
Description Start wifi radio event log. Stop radio event log and send file to dump server. AP for radio event log capture. IP address for radio event log capture. IPv6 address for radio event log capture. Radio index. Radio log size.
Classification of event type to capture. All events in radio. Adaptive Noise Immunity control event in radio. Hex format of event. Tx rate control event in radio. Tx Rate update event in radio. Rx status register event in radio. Text record event in radio. Tx control and Tx status register event in radio. Specify the event in hexadecimal format.
Range -- --
-- -- -- 0 or 1 102410485760 bytes(1KB10MB). -- -- -- -- -- -- -- -- -- --
Default -- --
-- -- -- -- Default:3145728 bytes(3MB)
-- -- -- -- -- -- -- -- -- --
Example
The following command starts and stops a wifi radio event log:
112 | ap debug radio-event-log
AOS-W 6.2 | Reference Guide
#ap debug radio-event-log start ap-name 6c:f3:7f:c6:71:90 radio 0 events all #ap debug radio-event-log stop ap-name 6c:f3:7f:c6:71:90 radio 0 #show ap debug radio-event-log status ap-name 6c:f3:7f:c6:71:90
Command History
Release AOS-W 6.2
Modification Command introduced
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
ap debug radio-event-log | 113
ap debug radio-registers dump
ap debug radio-registers dump [ap-name <name>|ip-addr <ip-addr>|ip6-addr <ip6-addr>] [filename <filename> {all|interrupt|qcu |radio}]
Description
This command allows you to collect all or specific radio register information into a separate file.
Syntax
Parameter ap-name ip-addr ip6-addr
filename all interrupt qcu radio
Description Name of Access Point Collect radio register information for this specific AP radio. Collect radio register information for the spectrum monitor assigned to this ipv6 address. Name of file where information is collected. All registers interrupted. Interrupt related registers. Collect QCU information. Radio ID (0 or 1)
Usage Guidelines
This command collects specified radio-register information for debugging purposes, dumps the registers into a local file, and will automatically transfer the file to the dump-server that is configured in 'ap-system-profile.'
Example
The following command collects all radio registers from myap1 into a file called myradioregfile.: #ap debug radio-registers dump ap-name myap1 filename myradioregfile all
Command History
Introduced in AOS-W6.2.
Command Information
Platforms 802.11n-capable APs
Licensing Base operating system
Command Mode Enable mode on master switches
114 | ap debug radio-registers dump
AOS-W 6.2 | Reference Guide
ap packet-capture
ap packet-capture [open-port|close-port] <port>
ap packet-capture raw-start [<ap-name|ip-addr|ip6-addr>] <target-ip> <target-port> <format> radio <0|1> channel <channel> maxlen <maxlen>
ap packet-capture interactive [<ap-name|ip-addr|ip6-addr>] <filter-spec> <target-ip> <targetport> radio <0|1> channel <channel>
ap packet-capture [clear|stop|pause|resume][<ap-name|ip-addr|ip6-addr>] <pcap-id> radio <0|1>
show ap packet-capture status <ap-name|ip-addr|ip6-addr>
Description
These commands manage WiFi packet capture (PCAP) on Alcatel-Lucent APs. The WiFi packets are encapsulated in a UDP header and sent to a client running a packet analyzer like Wildpacket's Airopeek, Omnipeek, or Wireshark.
Syntax
Parameter open-port close-port raw-start
<ipaddr> <target-ipaddr> <target-port> <format>
channel maxlen interactive <filter-spec> clear pause
Description
(CPSEC CAPs and RAPs only) Enable or allow access to this UDP port on the AP for packet capture purposes.
(CPSEC CAPs and RAPs only) Close or disallow access to this UDP port on the AP for packet capture purposes.
Stream packets from the driver to a client running the packet analyzer.
IP address of the AP.
IP address of the client running the packet analyzer.
UDP port number on the client station where the captured packets are sent.
Specify a number to indicate one of the following formats for captured packets: l 0 : pcap l 1 : peek l 2 : airmagnet l 3 : pcap+radio header l 4 : ppi
(Optional/Applicable only in Air Monitor mode) Number of a radio channel to tune into to capture packets.
(Optional) Limit the length of 802.11 frames to include in the capture to a specified maximum.
Start an interactive packet capture session between an AP and a client running a packet analyzer.
Packet Capture filter specification. See Usage Guidelines for details.
Clears the packet capture session.
Pause a packet capture session.
AOS-W 6.2 | Reference Guide
ap packet-capture | 115
Parameter stop resume
<pcap-id>
Description Stop a packet capture session. Resume a packet capture session. ID of the PCAP session.
Usage Guidelines
These commands direct an Alcatel-Lucent AP to send WiFi packet captures to a client packet analyzer utility such as Airmagnet, Wireshark and so on, on a remote client.
Before using these commands, you need to start the packet analyzer utility on the client and open a capture window for the port from which you are capturing packets. The packet analyzer cannot be used to control the flow or type of packets sent from Alcatel-Lucent APs.
The packet analyzer processes all packets. However, you can apply display filters on the capture window to control the number and type of packets being displayed. In the capture window, the timestamp displayed corresponds to the time that the packet is recevied by the client and is not synchronized with the time on the Alcatel-Lucent AP.
Filter specification (used in ap packet-capture interactive) supports the following:
- type (beacon/rts/cts/data/ack/ctrl/mgmt/all) - sta (mac address) - bss (mac address) - da (mac address) - sa (mac address) - dir (tods, fromds) - retry (1, 0) - frag (1, 0) - wep (1, 0)
Filter spec examples: (type eq beacon) or ((sta eq 000000010203) and (dir eq tods)) (type == data) && ((sta = 000000010203) || (sta == 000000010203)) (type != beacon) (wep nq 1) (type eq all)
Examples
The following command starts a raw packet capture session for the AP ly115 on radio 0, and sends the packets to the client at 10.64.102.4 on port 5000. (host) (config) #ap packet-capture raw-start ap-name ly115 10.64.102.4 5000 0 radio 0 Packet capture has started for pcap-id:1
The following commands start an interactive packet capture session for the AP ap1.
#ap packet-capture open-port 5555
116 | ap packet-capture
AOS-W 6.2 | Reference Guide
#ap packet-capture interactive ap-name ap1 "type eq all" 192.168.0.3 5555 radio 0
The output of the command in the example below displays packet capture session statistics for the AP ap1. In this example, the output has been divided into multiple sections to better fit on the pages of this document. In the actual command-line interface, it will appear in a single, long table.
#show ap packet-capture status ap-name ap1
Packet Capture Sessions at ap1, IP 10.3.44.167
----------------------------------------------
pcap-id filter
type
intf
channel max-pkts
------- ------
----
----
------- --------
1
type eq all interactive 6c:f3:7f:ba:65:70 153
0
max-pkt-size num-pkts status
url target
Radio ID
------------ -------- ------
------
------
65536
3759
in-progress 192.168.0.3/5555 0
Related Commands
To view the status of outstanding packet capture (pcap) sessions, use show ap packet-capture status.
Command History
Version AOS-W3.0 AOS-W3.4
AOS-W6.2
Change Command Introduced
The maxlen parameter was introduced, and the pcap start command deprecated.
Name changed from pcap to ap packet capture.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Works in Access Point, Air Monitor, and Spectrum Monitor modes on all AP models in enable mode.
AOS-W 6.2 | Reference Guide
ap packet-capture | 117
ap authorization-profile
ap authorization-profile <profile> authorization-group <profile>
Description
This command defines a temporary configuration profile for remote APs that are not yet authorized on the network.
Syntax
Parameter
authorization-profile <profile>
authorization-group <profile>
Description
Name of this instance of the profile. The name must be 1-63 characters.
Name of a configuration profile to be assigned to the group unauthorized remote APs.
Range --
--
Default "default"
"NoAuthApGroup"
Usage Guidelines
The AP authorization-profile specifies which configuration should be assigned to a remote AP that has been provisioned but not yet authenticated at the remote site. By default, these yet-unauthorized APs are put into the temporary AP group authorization-group and assigned the predefined profile NoAuthApGroup. This configuration allows a user to connect to an unauthorized remote AP via a wired port then enter a corporate username and password. Once a valid user has authorized the remote AP, the AP will be permanently marked as authorized on the network and will will then download the configuration assigned to that AP by it's permanent AP group.
Example
The following command creates a new authorization profile with a non-default configuration for unauthorized remote APs: ap authorization-profile default2
authorization-group NoAuthApGroup2
Command History
Release AOS-W 5.0
Modification Command introduced
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master or local switches
118 | ap authorization-profile
AOS-W 6.2 | Reference Guide
apboot
apboot {all [global|local]|ap-group <group> [global|local]|ap-name <name>|ip-addr <ipaddr>|wired-mac <macaddr>}
Description
This command reboots the specified APs.
Syntax
Parameter all global local
ap-group global local
ap-name ip-addr wired-mac
Description Reboot all APs. Reboot APs on all switches. Reboot only APs registered on this switch. This is the default. Reboot APs in a specified group. Reboot APs on all switches. Reboot only APs registered on this switch. This is the default. Reboot the AP with the specified name. Reboot the AP at the specified IP address. Reboot the AP at the specified MAC address.
Default all global local
ap-group global local
ap-name ip-addr wired-mac
Usage Guidelines
You should not normally need to use this command as APs automatically reboot when you reprovision them. Use this command only when directed to do so by your Alcatel-Lucent representative.
Example
The following command reboots a specific AP: (host)(config)# apboot ap-name Building3-Lobby
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master switches
AOS-W 6.2 | Reference Guide
apboot | 119
apconnect
apconnect {ap-name <name>|bssid <bssid>|ip-addr <ipaddr>} parent-bssid <bssid>
Description
This command instructs a mesh point to disconnect from its current parent and connect to a new parent.
Syntax
Parameter ap-name <name> bssid <bssid> ip-addr <ipaddr> parent-bssid <bssid>
Description Specify the name of the mesh point to be connected to a new parent. Specific the BSSID of the mesh point to be connected to a new parent. Specific the IP address of the mesh point to be connected to a new parent. BSSID of the parent to which the mesh point should connect.
Usage Guidelines
To maintain a mesh topology created using the apconnect command, Alcatel-Lucent suggests setting the mesh reselection-mode to reselect-never, otherwise the normal mesh reselection mechanisms could break up the selected topology.
Example
The following command connects the mesh point "meshpoint1" to a new parent with the specified BSSID. (host) (config) #apconnect ap-name meshpoint1 parent-bssid 00:12:6d:03:1c:f1
Related Commands
Command
ap mesh-radioprofilereselectionmodereselect-never
Description
Use this command to prevent the AP from reselecting a new parent.
Mode Enable or Config mode
Command History
This command was introduced in AOS-W 3.4.1
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master switches
120 | apconnect
AOS-W 6.2 | Reference Guide
apdisconnect
apdisconnect {ap-name <name>|bssid <bssid>|ip-addr <ipaddr>}
Description
This command disconnects a mesh point from its parent.
Syntax
Parameter ap-name bssid ip-addr
Description Specifies the name of the parent AP. Specifies the BSSID of the parent AP. Specifies the IP address of the parent AP.
Usage Guidelines
Each mesh point learns about the mesh portal from its parent (a mesh node that is part of the path to the mesh portal). This command directs a mesh point to disassociate from its parent. The mesh point will attempt to associate with another neighboring mesh node, if available. The old parent is not eligible for re-association for 60 seconds after disconnection.
Example
The following command disconnects a specific mesh point from its parent: (host) (config) #apdisconnect ap-name meshpoint1
Related Commands
Command apconnect
Description
This command connects a mesh point to a new specified parent.
Mode Enable or Config mode
Command History
This command was introduced in AOS-W 3.2
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master switches
AOS-W 6.2 | Reference Guide
apdisconnect | 121
apflash [deprecated]
apflash all|{ap-group <group>}|{ap-name <name>}|{ip-addr <ipaddr>}|{wired-mac <macaddr>} global|local [backup-partition] [server <ipaddr>]
Description
This command reflashes the specified AP. Starting with AOS-W 6.1, this command can only be run by AlcatelLucent Technical Support or users in support mode.
Command History
Version AOS-W 3.0 AOS-W 6.0 AOS-W 6.1
Description Command introduced The global and local parameters were introduced. Command deprecated
122 | apflash [deprecated]
AOS-W 6.2 | Reference Guide
ap enet-link-profile
ap enet-link-profile <profile> clone <profile> dot3az duplex {auto|full|half} no ... speed {10|100|1000|auto}
Description
This command configures an AP Ethernet link profile.
Syntax
Parameter <profile> clone dot3az
duplex no speed
Description
Range
Name of this instance of the profile. The name
--
must be 1-63 characters.
Name of an existing Ethernet Link profile from
--
which parameter values are copied.
Enable support for the 803.az Energy Efficient Ethernet (EEE) standard, which allows the APs to consume less power during periods of low data activity.
Only OAW-AP130 Series APs support this feature. If this feature is enabled for an APs group, any APs in the group that do not support 803.az will ignore this setting.
The duplex mode of the Ethernet interface, either full/half/auto full, half, or auto-negotiated.
Negates any configured parameter.
--
The speed of the Ethernet interface, either 10 Mbps, 100 Mbps, 1000 Mbps (1 Gbps), or autonegotiated.
10/100/1000/auto
Default "default" --
disabled
auto
-- auto
Usage Guidelines
This command configures the duplex and speed of the Ethernet port on the AP. The configurable speed is dependent on the port type.
Example
The following command configures the Ethernet link profile for full-duplex and 100 Mbps: ap enet-link-profile enet
duplex full speed 100
AOS-W 6.2 | Reference Guide
ap enet-link-profile | 123
Command History
Release AOS-W 3.0 AOS-W 3.3 AOS-W 6.2
Modification Command introduced Support for 1000 Mbps (1 Gbps) Ethernet port speed was introduced. Support for the dot3az parameter was introduced.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master switches
124 | ap enet-link-profile
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
ap enet-link-profile | 125
ap lldp med-network-policy-profile
ap lldp med-network-policy-profile <profile> application-type guest-voice|guest-voice-signaling|softphone-voice|streaming-video|videoconferencing|video-signaling|voice|voice-signaling clone <profile> dscp <dscp> l2-priority <l2-priority> no ... tagged vlan <vlan>
Description
Define an LLDP MED network policy profile that defines DSCP values and L2 priority levels for a voice or video application.
Syntax
Parameter
Description
Range
application-type
Specify the type of application that this profile manages. -
guest-voice
Use this application type if the AP services a separate
-
voice network for guest users and visitors.
guest-voice-signaling Use this application type if the AP is part of a network
-
that requires a different policy for guest voice signaling
than for guest voice media. Do not use this application
type if both the same network policies apply to both
guest voice and guest voice signaling traffic.
softphone-voice streaming-video video-conferencing video-signaling voice
Use this application type if the AP supports voice
-
services using softphone software applications on
devices such as PCs or laptops.
Use this application type if the AP supports broadcast or multicast video or other streaming video services that require specific network policy treatment. This application type is not recommended for video applications that rely on TCP with buffering.
Use this application type of the AP supports video
-
conferencing equipment that provides real-time,
interactive video/audio services.
Use this application type if the AP is part of a network
-
that requires a different policy for video signaling than
for the video media. Do not use this application type if
both the same network policies apply to both video and
video signaling traffic.
Use this application type if the AP services IP
-
telephones and other appliances that support interactive
voice services.
NOTE: This is the default application type.
126 | ap lldp med-network-policy-profile
AOS-W 6.2 | Reference Guide
Parameter voice-signaling
clone <profile> dscp
l2-priority <L2priority> no ... tagged
vlan <vlan>
Description
Range
Use this application type if the AP is part of a network
-
that requires a different policy for voice signaling than for
the voice media. Do not use this application type if both
the same network policies apply to both voice and voice
signaling traffic.
Make a copy of an existing profile by specifying that
-
profile name.
Select a Differentiated Services Code Point (DSCP) priority value for the specified application type by specifying a value from 0-63, where 0 is the lowest priority level and 63 is the highest priority.
0-63 Default is 0
Select a 802.1p priority level for the specified application type, by specifying a value from 0-7, where 0 is the lowest priority level and 7 is the highest priority.
0-7 Default is 0
Issue this command to negate any setting or return a
-
configured parameter it to its default value.
Specifies if the policy applies to a to a VLAN that is tagged with a VLAN ID or untagged. The default value is untagged.
NOTE: When an LLDP-MED network policy is defined for use with an untagged VLAN, then the L2 priority field is ignored and only the DSCP value is used.
Default is untagged
Specify a VLAN by VLAN ID (0-4094) or VLAN name.
Default is 0
Usage Guidelines
LLDP-MED (media endpoint devices) is an extension to LLDP that supports interoperability between VoIP devices and other networking clients. LLDP-MED network policy discovery lets end-points and network devices advertise their VLAN IDs (e.g. voice VLAN), priority levels, and DSCP values. AOS-W supports a maximum of eight LLDP MED Network Policy profiles.
Creating an LLDP MED network policy profile does not apply the configuration to any AP or AP interface or interface group. To apply the LLDP-MED network policy profile, you must associate it to an LLDP profile, then apply that LLDP profile to an AP wired port profile.
Example
The following commands create a LLDP MED network policy profile for streaming video applications and marks streaming video as high-priority traffic.
(host) (config) ap lldp med-network-policy-profile vid-stream (host) (AP LLDP-MED Network Policy Profile "vid-stream") dscp 48 (host) (AP LLDP-MED Network Policy Profile "vid-stream")l2-priority 6 (host) (AP LLDP-MED Network Policy Profile "vid-stream")tagged (host) (AP LLDP-MED Network Policy Profile "vid-stream")vlan 10 (host) (AP LLDP-MED Network Policy Profile "vid-stream")!
Next, the LLDP MED network policy profile is assigned to an LLDP profile, and the LLDP profile is associated with an AP wired-port profile.
(host) (config) ap lldp profile video1 (host) (AP LLDP Profile "video1")lldp-med-network-policy-profile vid-stream (host) (AP LLDP Profile "video1")! (host) (config)ap wired-port-profile corp2
AOS-W 6.2 | Reference Guide
ap lldp med-network-policy-profile | 127
(host) (AP wired port profile "corp2")lldp-profile video1
Command History
This command was introduced in AOS-W 6.2.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master switches
128 | ap lldp med-network-policy-profile
AOS-W 6.2 | Reference Guide
ap lldp profile
ap lldp profile <profile> clone <profile> dot1-tlvs port-vlan|vlan-name dot3-tlvs link-aggregation|mac|mfs|power lldp-med-network-policy-profile <profile> lldp-med-tlvs capabilities|inventory|network-policy no ... optional-tlvs capabilities|management-address|port-description|system-description|systemname receive transmit transmit-hold <transmit-hold> transmit-interval <transmit-interval>
Description
Define an LLDP profile that specifies the type-length-value (TLV) elements to be sent in LLDP PDUs.
Syntax
Parameter clone <profile> dot1-tlvs
port-vlan
vlan-name
dot3-tlvs link-aggregation mac
mfs power
Description
Make a copy of an existing LLDP profile.
Specify which of the following 802.1 TLVs the AP will send in LLDP PDUs. By default, the AP will send all 802.1 TLVs.
Transmit the LLDP 802.1 port VLAN TLV. If the native VLAN is configured on the port, the port-vlan TLV will send that value, otherwise it will send a value of "0".
Transmit the LLDP 802.1 VLAN name TLV. The AP sends a value of "Unknown" for VLAN 0, or "VLAN <number>" for nonzero VLAN numbers.
Specify which of the following 802.3 TLVs the AP will send in LLDP PDUs. By default, the AP will send all 802.3 TLVs.
Transmit the 802.3 link aggregation TLV to indicate that link aggregation is not supported.
Transmit the 802.3 MAC/PHY Configuration/Status TLV to indicate the AP interface's duplex and bit rate capacity and current duplex and bit rate settings.
Transmit the 802.3 Maximum Frame Size (MFS) TLV to show the AP's maximum frame size capability.
Transmit the 802.3 Power Via media dependent interface (MDI) TLV to show the power support capabilities of the AP interface. NOTE: This parameter is supported by the OAW-RAP3WNP and OAW-AP130 Series only.
AOS-W 6.2 | Reference Guide
ap lldp profile | 129
Parameter lldp-med-network-policy-profile <profile> lldp-med-tlvs
capabilities
inventory
network-policy
optional-tlvs capabilities management-address port-description system-description system-name
receive transmit transmit-hold <transmit-hold>
transmit-interval <transmitinterval>
Description
Specify the LLDP MED Network Policy profile to be associated with this LLDP profile.
Specify which of the following LLDP-MED TLVs the AP will send in LLDP PDUs. The AP will not send any LLDP-MED TLVs by default.
Transmit the LLDP-MED capabilities TLV. The AP will automatically send this TLV if any of the other LLDP-MED TLVs are enabled.
Transmit the LLDP-MED inventory TLV. NOTE: An AP can't send this TLV unless it also sends the LLDPMED capabilities TLV.
Transmit the LLDP-MED network-policy TLV. NOTE: An AP can't send this TLV unless it also sends the LLDPMED capabilities TLV.
Specify which of the following optional TLVs the AP will send in LLDP PDUs.
Transmit the system capabilities TLV to indicate which capabilities are supported by the AP.
Transmit a TLV that indicates the AP's management IP address, in either IPv4 or IPV6 format.
Transmit a TLV that gives a description of the AP's wired port in an alphanumeric format.
Transmit a TLV that describes the AP's model number and software version
Transmit a TLV that sends the AP name or wired MAC address.
Issue this command to enable LLDP PDU reception. This parameter is enabled by default.
Issue this command to enable LLDP PDU transmission. This parameter is enabled by default.
Enter a value from 1-100. This value is multiplied by the transmit interval to determine the number of seconds to cache learned LLDP information before that information is cleared. If the transmit-hold value is at the default value of 4, and the transmit interval is at its default value of 30 seconds, then learned LLDP information will be cached for 4 x 30 seconds, or 120 seconds.
The interval between LLDP TLV transmission seconds. The supported range is 1-3600 seconds and the default value is 30 seconds.
Usage Guidelines
Link Layer Discovery Protocol (LLDP), is a Layer-2 protocol that allows network devices to advertise their identity and capabilities on a LAN. Wired interfaces on Alcatel-Lucent APs support LLDP by periodically transmitting LLDP
130 | ap lldp profile
AOS-W 6.2 | Reference Guide
Protocol Data Units (PDUs) comprised of type-length-value (TLV) elements. Use this command to specify which TLVs should be sent by the AP interface associated with the LLDP profile.
Example
The following command configures an LLDP profile allows the AP interface to send the port-vlan and vlan-name TLVs. ap lldp profile 8021TLVs
dot1-tlvs port-vlan dot1-tlvs vlan-name
Command History
This command was introduced in AOS-W 6.2.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ap lldp profile | 131
ap mesh-cluster-profile
ap mesh-cluster-profile <profile> clone <profile> cluster <name> no ... opmode [opensystem | wpa2-psk-aes] rf-band {a | g} wpa-hexkey <wpa-hexkey> wpa-passphrase <wpa-passphrase>
Description
This command configures a mesh cluster profile used by mesh nodes.
Syntax
Parameter <profile> clone cluster
no opmode
rf-band
Description
Range
Default
Name of this instance of the profile. The name must -- be 1-63 characters.
"default"
Name of an existing mesh cluster profile from
--
--
which parameter values are copied.
Indicates the mesh cluster name. The name can
--
have a maximum of 32 characters, and is used as
the MSSID for the mesh cluster. When you first
create a new mesh cluster profile, the profile uses
the default cluster name "Alcatel-Lucent-mesh".
Use the cluster parameter to define a new, unique
MSSID before you assign APs or AP groups to the
mesh cluster profile.
NOTE: If you want a mesh cluster to use WPA2PSK-AES encryption, do not use spaces in the mesh cluster name, as this may cause errors in mesh points associated with that mesh cluster.
To view existing mesh cluster profiles, use the CLI command show ap mesh-cluster-profile.
"AlcatelLucent-mesh"
Negates any configured parameter.
--
--
Configures one of the following types of data encryption. l opensystem--No authentication or encryption. l wpa2-psk-aes--WPA2 with AES encryption
using a pershared key. Best practices are to select wpa2-psk-aes and use the wpa-passphrase parameter to select a passphrase. Keep the passphrase in a safe place.
opensystem opensystem wpa2-psk-aes
Configures the RF band in which multiband mesh a
a
nodes should operate:
g
a = 5 GHz
g = 2.4 GHz
Best practices are to use 802.11a radios for mesh
deployments.
132 | ap mesh-cluster-profile
AOS-W 6.2 | Reference Guide
Parameter wpa-hexkey wpa-passphrase
Description Configures a WPA pre-shared key. Sets the WPA password that generates the PSK.
Range -- --
Default -- --
Usage Guidelines
Mesh cluster profiles are specific to mesh nodes (APs configured for mesh) and provide the framework of the mesh network. You must define and configure the mesh cluster profile before configuring an AP to operate as a mesh node. You can configure multiple mesh cluster profiles to be used within a mesh cluster. You must configure different priority levels for each mesh cluster profile. See ap-group or ap-name for more information about priorities. Cluster profiles, including the "default" profile, are not applied until you provision your APs for mesh.
Example
The following command configures a mesh cluster profile named "cluster1" for the mesh cluster "headquarters:" ap mesh-cluster-profile cluster1
cluster headquarters
Related Commands
To view a complete list of mesh cluster profiles and their status, use the following command: show ap mesh-cluster-profile To view the settings of a specific mesh cluster profile, use the following command:
show ap mesh-cluster-profile <name>
Command History
This command was introduced in AOS-W 3.2.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ap mesh-cluster-profile | 133
ap mesh-ht-ssid-profile
ap mesh-ht-ssid-profile <profile-name> 40MHz-enableba-amsdu-enable clone <source> high-throughput-enable ldpc legacy-stations max-rx-a-mpdu-size max-tx-a-mpdu-size min-mpdu-start-spacing mpdu-agg no short-guard-intvl-20Mhz short-guard-intvl-40Mhz stbc-rx-streams stbc-tx-streams supported-mcs-set txbf-comp-steering txbf-delayed-feedback txbf-explicit-enable txbf-immediate-feedback txbf-noncomp-steering txbf-sounding-interval
Description
This command configures a mesh high-throughput SSID profile used by mesh nodes.
Syntax
Parameter <profile-name>
40MHz-enable ba-amsdu-enable clone <source> high-throughputenable
Description
Range
Enter the name of an existing mesh highthroughput SSID profile to modify that profile, or enter a new name or create a new mesh highthroughput profile. The mesh high-throughput profile can have a maximum of 32 characters.
To view existing high-throughput SSID radio profiles, use the command show ap mesh-radioprofile.
Enable or disable the use of 40 MHz channels. This parameter is enabled by default.
Enable/Disable Receive AMSDU in BA negotiation.
Copy configuration information from a source profile into the currently selected profile
Enable or disable high-throughput (802.11n) features on this SSID. This parameter is enabled by default.
Default default
enabled disabled
enabled
134 | ap mesh-ht-ssid-profile
AOS-W 6.2 | Reference Guide
Parameter ldpc legacy-stations max-tx-a-mpdu-size max-rx-a-mpdu-size min-mpdu-startspacing
mpdu-agg
short-guard-intvl20Mhz
short-guard-intvl40Mhz
Description
Range
Default
If enabled, the AP will advertise Low-density Parity Check (LDPC) support. LDPC improves data transmission over radio channels with high levels of background noise.
enabled
Allow or disallow associations from legacy (nonHT) stations. By default, this parameter is enabled (legacy stations are allowed).
enabled
Maximum size of a transmitted aggregate MPDU, 1576 -65535 in bytes.
Maximum size of a received aggregate MPDU, in bytes.
8191, 16383, 32767, 65535
Minimum time between the start of adjacent MPDUs within an aggregate MPDU, in microseconds.
0 (No restriction on MDPU start spacing), .25 µsec, .5 µsec, 1 µsec, 2 µsec, 4 µsec
0 µsec
Enable or disable MAC protocol data unit (MPDU) aggregation.
High-throughput mesh APs are able to send aggregated MAC protocol data units (MDPUs), which allow an AP to receive a single block acknowledgment instead of multiple ACK signals. This option, which is enabled by default, reduces network traffic overhead by effectively eliminating the need to initiate a new transfer for every MPDU.
enabled
Enable or disable use of short (400ns) guard interval for OAW-AP130 Series APs in 20 MHz mode.
A guard interval is a period of time between transmissions that allows reflections from the previous data transmission to settle before an AP transmits data again. An AP identifies any signal content received inside this interval as unwanted inter-symbol interference, and rejects that data.
The 802.11n standard specifies two guard intervals: 400ns (short) and 800ns (long). Enabling a short guard interval can decrease network overhead by reducing unnecessary idle time on each AP. Some outdoor deployments, may, however require a longer guard interval. If the short guard interval does not allow enough time for reflections to settle in your mesh deployment, inter-symbol interference values may increase and degrade throughput.
This parameter is enabled by default.
enabled
Enable or disable use of short (400ns) guard interval in 40 MHz mode.
enabled
AOS-W 6.2 | Reference Guide
ap mesh-ht-ssid-profile | 135
Parameter
stbc-rx-streams stbc-tx-streams supported-mcs-set
Description
Range
A guard interval is a period of time between transmissions that allows reflections from the previous data transmission to settle before an AP transmits data again. An AP identifies any signal content received inside this interval as unwanted inter-symbol interference, and rejects that data.
The 802.11n standard specifies two guard intervals: 400ns (short) and 800ns (long). Enabling a short guard interval can decrease network overhead by reducing unnecessary idle time on each AP. Some outdoor deployments, may, however require a longer guard interval. If the short guard interval does not allow enough time for reflections to settle in your mesh deployment, inter-symbol interference values may increase and degrade throughput.
This parameter is enabled by default.
Controls the maximum number of spatial streams 0-1 usable for STBC reception. 0 disables STBC reception, 1 uses STBC for MCS 0-7. Higher MCS values are not supported. (Supported on the OAW-AP90 series, OAW-AP130 Series, OAW-AP68, OAW-AP175 and OAW-AP105 only. The configured value will be adjusted based on AP capabilities.)
Controls the maximum number of spatial streams 0-1 usable for STBC transmission. 0 disables STBC transmission, 1 uses STBC for MCS 0-7. Higher MCS values are not supported. (Supported on OAW-AP90 series, OAW-AP175, OAW-AP130 Series and OAW-AP105 only. The configured value will be adjusted based on AP capabilities.)
A list of Modulation Coding Scheme (MCS) values or ranges of values to be supported on this SSID. The MCS you choose determines the channel width (20MHz vs. 40MHz) and the number of spatial streams used by the mesh node. The default value is 1-15; the complete set of supported values. To specify a smaller range of values, enter a hyphen between the lower and upper values. To specify a series of different values, separate each value with a comma. Examples: 2-10 1,3,6,9,12 Range: 0-15.
1-15
Default
1 1 1-15
Guidelines
The mesh high-throughput profile defines settings unique to 802.11n-capable, high-throughput APs. If none of the APs in your mesh deployment are 802.11n-capable APs, you do not need to configure a high-throughput SSID profile.
If you modify a currently provisioned and running high-throughput SSID profile, your changes take effect immediately. You do not reboot the switch or the AP.
136 | ap mesh-ht-ssid-profile
AOS-W 6.2 | Reference Guide
Example
The following command configures a mesh high-throughput SSID profile named "HT1" and sets some non-default settings for MAC protocol data unit (MPDU) aggregation: (host) (config) #ap mesh-ht-ssid-profile HT1
max-rx-a-mpdu-size 32767 max-tx-a-mpdu-size 32767 min-mpdu-start-spacing .25
Related Commands
To view a complete list of mesh high-throughput SSID profiles and their status, use the following command: (host) (config) #show ap mesh-ht-ssid-profile To view the settings of a specific mesh radio profile, use the following command:
(host) (config) #show ap mesh-ht-ssid-profile <name>
Command History
Version AOS-W 3.4 AOS-W 6.1
Description
Command introduced
The short-guard-intvl-20Mhz, ldpc, stbc-rx-streams and stbc-rx-streams parameters were introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ap mesh-ht-ssid-profile | 137
ap mesh-radio-profile
ap mesh-radio-profile <profile> a-tx rates [6|9|12|18|24|36|48|54] allowed-vlans <vlan-list> children <children> clone <profile>eapol-rate-opt g-tx rates [1|2|5|6|9|11|12|18|24|36|48|54] heartbeat-threshold <count> hop-count <hop-count> link-threshold <count> max-retries <max-retries> mesh-ht-ssid-profile mesh-mcast-opt mesh-survivability metric-algorithm {best-link-rssi|distributed-tree-rssi} mpv <vlan-id> no ... reselection-mode {reselect-anytime|reselect-never|startup-subthreshold| subthreshold-only} rts-threshold <rts-threshold>
Description
This command configures a mesh radio profile used by mesh nodes.
Syntax
Parameter <profile> allowed-vlans
<vlan-list> a-tx rates
children clone eapol-rate-opt
Description
Range
Name of this instance of the profile. The name -- must be 1-63 characters.
Specify a list of VLAN IDs that can be used by a mesh link on APs associated with this mesh radio profile
A comma-separated list of VLAN IDs. You can also specify a range of VLAN IDs using a dash (for example, 14095)
Indicates the transmit rates for the 802.11a radio.
The AP attempts to use the highest transmission rate to establish a mesh link. If a rate is unavailable, the AP goes through the list and uses the next highest rate.
6, 9, 12, 18, 24, 36, 48, 54 Mbps
Indicates the maximum number of children a mesh node can accept.
1-64
Name of an existing mesh radio profile from which parameter values are copied.
Issue this command to choose a more conservative rate for EAPOL frames and mesh echoes.
enabled disabled
Default "default"
6, 9, 12, 18, 24, 36, 48, 54 Mbps 64
disabled
138 | ap mesh-radio-profile
AOS-W 6.2 | Reference Guide
Parameter g-tx rates
heartbeatthreshold hop-count link-threshold
mesh-ht-ssid-profile max-retries mesh-mcast-opt
mesh-survivability
metricalgorithm best-link-
rssi distributed-
tree-rssi
Description
Range
Indicates the transmit rates for the 802.11b/g radio.
The AP attempts to use the highest transmission rate to establish a mesh link. If a rate is unavailable, the AP goes through the list and uses the next highest rate.
1, 2, 5, 6, 9, 11, 12, 18, 24, 36, 48, 54
Indicates the maximum number of heartbeat
1-255
messages that can be lost between neighboring
mesh nodes.
Indicates the maximum hop count from the mesh portal.
1-32
Indicates the minimal RSSI value. If the RSSI value is below this threshold, the link may be considered a sub-threshold link. A subthreshold link is a link whose average RSSI value falls below the configured threshold.
If this occurs, the mesh node may try to find a better link on the same channel and cluster (only neighbors on the same channel are considered).
The supported threshold is hardware dependent, with a practical range of 10-90.
hardware dependent
High-throughput SSID Profile for the mesh feature.
Maximum number of times a mesh node can re- 0-15 send a packet.
Enables or disables scanning of all active stations currently associated to a mesh point to select the lowest transmission rate based on the slowest connected mesh child. When enabled, this setting dynamically adjusts the multicast rate to that of the slowest connected mesh child. Multicast frames are not sent if there are no mesh children. Best practices are to use the default value.
Allow mesh points and portals to become active -- even if the switch cannot be reached by bridging LAN traffic. This is a beta feature that is disabled by default; it should not be enabled unless you are instructed to do so by AlcatelLucent technical suppport.
Specifies the algorithm used by a mesh node to -- select its parent. Best practices are to use the default value distributed-tree-rssi.
Selects the parent with the strongest RSSI,
--
regardless of the number of children a potential
parent has.
Selects the parent based on link-RSSI and
--
node cost based on the number of children.
Default 1, 2, 5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps
10
8 12
default 4 times enabled
distributedtreerssi
distributedtreerssi --
--
AOS-W 6.2 | Reference Guide
ap mesh-radio-profile | 139
Parameter mpv no reselection-mode
reselect-anytime
reselect-never startupsubthreshold
Description
Range
This option evenly distributes the mesh points over high quality uplinks. Low quality uplinks are selected as a last resort.
This parameter is experimental and reserved for 0-4094 future use.
Negates any configured parameter.
--
Specifies the method used to find a better mesh link. Best practices are to use the default value startup-subthreshold.
(see below)
Mesh points using the reselect-anytime
--
reselection mode perform a single topology
readjustment scan within 9 minutes of startup
and 4 minutes after a link is formed. If no better
parent is found, the mesh point returns to its
original parent. This initial scan evaluates more
distant mesh points before closer mesh points,
and incurs a dropout of 5-8 seconds for each
mesh point.
After the initial startup scan is completed,
connected mesh nodes evaluate mesh links
every 30 seconds. If a mesh node finds a better
uplink, the mesh node connects to the new
parent to create an improved path to the mesh
portal.
Connected mesh nodes do not evaluate other -- mesh links to create an improved path to the mesh portal.
Mesh points using the startup-subthreshold
--
reselection mode perform a single topology
readjustment scan within 9 minutes of startup
and 4 minutes after a link is formed. If no better
parent is found, the mesh point returns to its
original parent. This initial startup scan
evaluates more distant mesh points before
closer mesh points, and incurs a dropout of 5-8
seconds for each mesh point. After that time,
each mesh node evaluates alternative links if
the existing uplink falls below the configured
threshold level (the link becomes a sub-
threshold link). Best practices are to use the
default startup-subthreshold value.
NOTE: Starting with AOS-W 3.4.1, if a mesh
point using the startup-subthreshold mode
reselects a more distant parent because its
original, closer parent falls below the
acceptable threshold, then as long as that mesh
point is connected to that more distant parent, it
will seek to reselect a parent at the earlier
distance (or less) with good link quality. For
example, if a mesh point disconnects from a
mesh parent 2 hops away and subsequently
reconnects to a mesh parent 3 hops away, then
the mesh point will continue to seek a
Default 0 (disabled) -- startup-sub threshold --
-- --
140 | ap mesh-radio-profile
AOS-W 6.2 | Reference Guide
Parameter subthreshold-only
rts-threshold
Description
Range
connection to a mesh parent with both an acceptable link quality and a distance of two hops or less, even if the more distant parent also has an acceptable link quality.
Connected mesh nodes evaluate alternative
--
links only if the existing uplink becomes a sub-
threshold link.
NOTE: Starting with AOS-W 3.4.1, if a mesh
point using the subthreshold-only mode
reselects a more distant parent because its
original, closer parent falls below the
acceptable threshold, then as long as that mesh
point is connected to that more distant parent, it
will seek to reselect a parent at the earlier
distance (or less) with good link quality. For
example, if a mesh point disconnects from a
mesh parent 2 hops away and subsequently
reconnects to a mesh parent 3 hops away, then
the mesh point will continue to seek a
connection to a mesh parent with both an
acceptable link quality and a distance of two
hops or less, even if the more distant parent
also has an acceptable link quality.
Defines the packet size sent by mesh nodes. Mesh nodes transmitting frames larger than this threshold must issue request to send (RTS) and wait for other mesh nodes to respond with clear to send (CTS) to begin transmission. This helps prevent mid-air collisions.
256-2,346
Default --
2,333 bytes
Usage Guidelines
Mesh radio profiles are specific to mesh nodes (APs configured for mesh) and determine the radio frequency/channel used by mesh nodes to establish mesh links and the path to the mesh portal. You can configure multiple radio profiles; however, you select and deploy only one radio profile per mesh cluster. Radio profiles, including the "default" profile, are not active until you provision your APs for mesh. If you modify a currently provisioned and running radio profile, your changes take place immediately. You do not reboot the switch or the AP.
Example
The following command creates a mesh radio profile named "radio2" and associates a mesh high-throughput profile named meshHT1: (host) (config) #ap mesh-radio-profile radio2
mesh-ht-ssid-profile meshHT1
Related Commands
To view a complete list of mesh radio profiles and their status, use the following command: (host) (config) #show ap mesh-radio-profile To view the settings of a specific mesh radio profile, use the following command: (host) (config) #show ap mesh-radio-profile <name>
AOS-W 6.2 | Reference Guide
ap mesh-radio-profile | 141
Command History
Release AOS-W 3.2 AOS-W 3.2.0.x, 3.3.1.x AOS-W 3.3 AOS-W 3.3.2 AOS-W 3.4
AOS-W 6.1
Modification
Command introduced.
The tx-power default increased from 14 to 30 dBm.
The heartbeat-threshold default increased from 5 to 10 heartbeat messages.
The mesh-mcast-opt parameter was introduced.
The mesh-ht-ssid-profile parameter was introduced The 11a-portal-channel, 11g-portal-channel, beacon-period and tx-power parameters were deprecated. These settings can now be configured via the rf dot11a-radio-profile and rf dot11g-radio-profile commands.
The eapol-rate-opt parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
142 | ap mesh-radio-profile
AOS-W 6.2 | Reference Guide
ap provisioning-profile
ap provisioning-profile <profile> apdot1x-passwd apdot1x-username clone cellular_nw_preference g-only|4g-only|advanced|auto link-priority-cellular link-priority-ethernet master clear|{set <masterstr>} no pppoe-passwd pppoe-service-name pppoe-user remote-ap reprovision uplink-vlan <uplink-vlan> usb-dev usb-dial usb-init usb-modeswitch "-v <default_vendor> -p <default_product> -V <target_vendor> -P <target_ product> -M <message_content>" usb-passwd usb-power-mode auto|enable|disable usb-tty usb-tty-control usb-type usb-user
Description
This command defines a provisioning profile for an AP or group of APs.
Syntax
Parameter apdot1x-passwd apdot1x-username clone <source> link-priority-cellular <linkpriority-cellular>
clone <source>
Description
Range
Password of the AP to authenticate to 802.1X using -- PEAP
Username of the AP to authenticate to 802.1X using -- PEAP
Clone an existing ap provisioning profile
--
Set the priority of the cellular uplink. By default, the cellular uplink is a lower priority than the wired uplink; making the wired link the primary link and the cellular link the secondary or backup link.
Configuring the cellular link with a higher priority than your wired link priority will set your cellular link as the primary switch link.
0-255
Set the priority of the wired uplink. Each uplink type has an associated priority; wired ports having the highest priority by default.
0-255
Default -- -- -- 0
0
AOS-W 6.2 | Reference Guide
ap provisioning-profile | 143
Parameter cellular_nw_preference g-only|4g-only| advanced|auto
link-priority-cellular <linkpriority-cellular>
Description
Range
The Cellular Network Preference setting introduced in AOS-W 6.2.1.0 allows you to select how the modem should operate.
l auto (default): In this mode, modem firmware will control the cellular network service selection; so the cellular network service failover and fallback is not interrupted by the remote AP (RAP).
l 3g_only: Locks the modem to operate only in 3G.
l 4g_only: Locks the modem to operate only in 4G.
l advanced: The RAP controls the cellular network service selection based on an Received Signal Strength Indication (RSSI) threshold-based approach. Initially the modem is set to the default auto mode. This allows the modem firmware to select the available network. The RAP determines the RSSI value for the available network type (for example 4G), checks whether the RSSI is within required range, and if so, connects to that network. If the RSSI for the modem's selected network is not within the required range, the RAP will then check the RSSI limit of an alternate network (for example, 3G), and reconnect to that alternate network. The RAP will repeat the above steps each time it tries to connect using a 4G multimode modem in this mode.
Change the FQDN or IP address for the master
--
switch.
Default --
set <masterstr>
clear
no pppoe-passwd
pppoe-servicename pppoe-user remote-ap
reprovision
reset-bootinfo
Specify the or IP address or FQDN for the master
--
--
switch.
Clear the definition for the master switch in this
--
--
profile.
Negates any configured parameter.
--
--
Point-to-Point Protocol over Ethernet (PPPoE)
--
--
password for the AP.
PPPoE service name for the AP.
--
--
PPPoE username for the AP.
--
--
Specifies that the profile is to be associated with a --
--
remote AP using certificates.
Provisions one or more APs with the values in the --
--
provisioning profile.
Restores factory default provisioning parameters to --
--
the specified AP.
NOTE: This parameter can only be used on the
144 | ap provisioning-profile
AOS-W 6.2 | Reference Guide
Parameter
Description
Range Default
master switch.
uplink-vlan <uplink-vlan>
If you configure an uplink VLAN on an AP
0(
0
connected to a port in trunk mode, the AP sends
dis-
and receives frames tagged with this VLAN on its
abled) to
Ethernet uplink.
4095
By default, an AP has an uplink vlan of 0, which
disables this feature.
NOTE: If an AP is provisioned with an uplink VLAN,
it must be connected to a trunk mode port or the
AP's frames will be dropped.
usb-dev
The USB device identifier.
--
--
usb-dial
The dial string for the USB modem. This parameter --
--
only needs to be specified if the default string is not
correct.
usb-init
The initialization string for the USB modem. This
--
--
parameter only needs to be specified if the default
string is not correct.
usb-modeswitch "-v <default_
USB cellular devices on remote APs typically
--
--
vendor> -p <default_product> - register as modems, but may occasionally register
V <target_vendor> -P <target_ product> -M <message_content>"
as a mass-storage device. If a remote AP cannot recognize its USB cellular modem, use the usbmodeswitch command to specify the parameters for
the hardware model of the USB cellular data-card.
NOTE: You must enclose the entire modeswitch
parameter string in quotation marks.
usb-passwd
A PPP password, if provided by the cellular service --
--
provider
usb-power-mode auto| ena-
Set the USB power mode to control the power to the --
--
ble|disable
USB port.
usb-power-mode auto| enable|disable
Set the USB power mode to control the power to the USB port.
usb-tty
The TTY device path for the USB modem. This
--
--
parameter only needs to be specified if the default
path is not correct.
usb-tty-control
The TTY device control path for the USB modem.
--
--
This parameter only needs to be specified if the
default path is not correct.
usb-type
Select one of the following USB driver types.
--
l acm : ACM driver
l airprime: Airprime driver
l beceem-wimax: Beceem driver for 4G-WiMAX
l hso: HSO driver for newer Option USB types
l none : Disable 3G or 2G network on USB
l option: Use Option driver
l pantech-3g: PANTECH USB driver for 3G/2G
devices
l sierra-evdo:EVDO Sierra Wireless driver
l sierra-gsm: GSM Sierra Wireless driver
none
AOS-W 6.2 | Reference Guide
ap provisioning-profile | 145
Parameter usb-user
Description
Range
The PPP username provided by the cellular service -- provider
Default --
Usage Guidelines
The AP provisioning profile allows you to define a set of provisioning parameters to an AP group. These settings can be saved or assigned to an AP group via the command ap-group <group> provisioning-profile <profile>.
In order to enable cellular uplink for a remote AP (RAP), the RAP must have the device driver for the USB data card and the correct configuration parameters. AOS-W includes device drivers for the most common hardware types, but you can use the usb commands in this profile to configure a RAP to recognize and use an unknown USB modem type.
Related Commands
Command provision-ap
Description
Change provisioning parameters for an individual AP. This command does not save the provisioning parameters settings in a reusable profile.
Example
The following commands create a provisioning profile named profile_branch, in which the cellular link is the primary uplink because it has a higher priority than the Ethernet link:
(host) (config) #ap provision-profile profile_branch link-priority-cellular 2 link-priority-ethernet 1 usb-type acm usb-modeswitch "-v 0x106c -p 0x3b06 -V 0x106c -P 0x3717 -M 5534243b82e238c24000000800008ff020000000000000000000000000000"
Command History
Release AOS-W 3.0 AOS-W 3.4
AOS-W 6.0 AOS-W 6.1
Modification
Command introduced
Introduced support for the following parameters: l usb-dev l usb-dial l usb-init l usb-passwd l usb-tty l usb-type l usb-user l link-priority-cellular l link-priority-ethernet
The uplink-vlan parameter was introduced.
The following new parameters were introduced for provisioning APs for 802.1X authentication: l apdot1x-passwd
146 | ap provisioning-profile
AOS-W 6.2 | Reference Guide
Release AOS-W 6.2.1.0
Modification
l apdot1x-username The following new parameters were introduced for provisioning Remote APs using USB modems: l usb-modeswitch l 4g-usb-type
The cellular_nw_preference parameter was introduced for provisioning multimode modems, and the 4g-usb-type parameter was deprecated. Specify a 2/3G or 4G modem type using the usb-type parameter.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ap provisioning-profile | 147
ap regulatory-domain-profile
ap regulatory-domain-profile <profile> clone <profile> country-code <code> no ... valid-11a-40mhz-channel-pair <valid-11a-40mhz-channel-pair> valid-11a-channel <num> valid-11g-40mhz-channel-pair <valid-11g-40mhz-channel-pair> valid-11g-channel <num>
Description
This command configures an AP regulatory domain profile.
Syntax
Parameter
Description
Range
Default
<profile>
Name of this instance of the profile. The
--
--
name must be 1-63 characters.
clone
Name of an existing regulatory domain
--
--
profile from which parameter values are
copied.
country-code
Code that represents the country in which the -- APs will operate. The country code determines the 802.11 wireless transmission spectrum.
Improper country code assignment can disrupt wireless transmissions. Most countries impose penalties and sanctions for operators of wireless networks with devices set to improper country codes.
country code configured on the master switch during initial setup
no
Negates any configured parameter.
--
--
valid-11a-40mhz-channelpair
Specify a channel pair valid for 40 MHz operation in the 802.11a frequency band for the specified regulatory domain. The two channels must be separated by a dash. Example: 36-40 44-48 52-56
country code determines supported channel pairs
Note: Changing the country code causes the valid channel lists to be reset to the defaults for the country.
valid-11achannel
Enter a single 802.11a channel number for 20 MHz operation within the specified regulatory domain.
country code determines supported channels
Note: Changing the country code causes the valid channel lists to be reset to the defaults for the country.
valid-11g-40mhz-channelpair
Specify a channel pair valid for 40 MHz operation in the 802.11g frequency band for the specified regulatory domain. The two channels must be separated by a dash. Example:
country code determines supported channel pairs
148 | ap regulatory-domain-profile
AOS-W 6.2 | Reference Guide
Parameter
valid-11gchannel
Description
1-5 2-6 7-11
Enter a single 802.11g channel number for 20 MHz operation within the specified regulatory domain.
Range
Default
Note: Changing the country code causes the valid channel lists to be reset to the defaults for the country.
country code determines supported channels
Note: Changing the country code causes the valid channel lists to be reset to the defaults for the country.
Usage Guidelines
This profile configures the country code and valid channels for operation of APs. The list of valid channels only affects the channels that may be selected by ARM or by the switch when no channel is configured. Channels that are specifically configured in the AP radio settings profile (see rf dot11a-radio-profile or rf dot11g-radio-profile) must be valid for the country and the AP model.
A switch shipped to certain countries, such as the U.S. and Israel, cannot terminate APs with regulatory domain profiles that specify different country codes from the switch. For example, if a switch is designated for the U.S., then only a regulatory domain profile with the "US" country code is valid; setting APs to a regulatory domain profile with a different country code will result in the radios not coming up. For switches in other countries, you can mix regulatory domain profiles on the same switch; for example, one switch can support APs in Japan, Taiwan, China, and Singapore.
In order for an AP to boot correctly, the country code configured in the AP regulatory domain profile must match the country code of the LMS. If none of the channels supported by the AP have received regulatory approval by the country whose country code you selected, the AP will revert to Air Monitor mode.
Examples
The following command configures the regulatory domain profile for APs in Japan: (host) (config) #ap regulatory-domain-profile rd1
country-code JP
The following command configures a regulatory domain profile for APs in the United States and specifies that the channel pair of 36 and 40, is allowed for 40 MHz mode of operation on the 5 GHz frequency band: (host) (config) #ap regulatory-domain-profile usa1
country-code US valid-11a-40mhz-channel-pair 36-40
The following command configures a regulatory domain profile for APs in the United States and specifies that the channel pair of 5 and 1, is allowed for 40 MHz mode of operation on the 2.4 GHz frequency band: (host) (config) #ap regulatory-domain-profile usa1
country-code US valid-11g-40mhz-channel-pair 1-5
Related Commands
To view the supported channels, use the show ap allowed-channels command.
AP configuration settings related to the IEEE 802.11n standard are configurable for Alcatel-Lucent's OAW-AP120 series access points, which are IEEE 802.11n standard compliant devices.
AOS-W 6.2 | Reference Guide
ap regulatory-domain-profile | 149
Command History
Release AOS-W 3.0 AOS-W 3.3
AOS-W 5.0
Modification
Command introduced
Support for the IEEE 802.11n standard, including channel pairs for 40 MHz mode of operation, was introduced
The valid-11a-40mhz-channel-pair and valid-11g-40mhz-channel-pair parameters no longer support the + and - parameters that allowed you to define a primary and backup channel within the channel pair.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
150 | ap regulatory-domain-profile
AOS-W 6.2 | Reference Guide
ap remove-r1-key
ap remove-r1-key <sta-mac> [ap-name <ap-name> | bssid <bssid> | ip-addr <ip-addr>]
Description
This command removes the r1 key from an AP.
Syntax
Parameter
Description
<sta-mac>
MAC address of the client.
ap-name <ap-name> Name of the AP.
bssid <bssid>
BSSID of the AP.
ip-addr <ip-addr>
IP address of the AP.
Usage Guidelines
Use this command to remove an r1 key from an AP when the AP does not have a cached r1 key during Fast BSS Transition roaming.
Examples
The following command configures the regulatory domain profile for APs in Japan: (host) #ap remove_r1_key 00:50:43:21:01:b8 ap-name MAcage-105-GL
Execute the following command to check if the r1 key is removed from the AP: (host) #show ap remote debug r1_key ap-name MAcage-105-GL Stored R1 Keys -------------Station MAC Mobility Domain ID Validity Duration R1 Key ----------- ------------------ ----------------- ------
Related Commands
To check if the r1 key is removed from an AP, use the show ap remote debug r1_key command:
Command History
Introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
ap remove-r1-key | 151
ap snmp-profile (deprecated)
Description
This command configures an SNMP profile for APs.
Command History
Version AOS-W 3.0 AOS-W 3.4
Modification Command introduced Command deprecated
152 | ap snmp-profile (deprecated)
AOS-W 6.2 | Reference Guide
ap snmp-user-profile (deprecated)
ap snmp-user-profile <profile> auth-passwd <password> auth-prot {md5|none|sha} clone <profile> no ... priv-passwd <password> user-name <name>
Description
This command configures an SNMPv3 user profile for APs.
Command History
Version AOS-W 3.0 AOS-W 3.4
Modification Command introduced Command deprecated
AOS-W 6.2 | Reference Guide
ap snmp-user-profile (deprecated) | 153
ap spectrum clear-webui-view-settings
ap spectrum clear-webui-view-settings
Description
Clear a saved spectrum dashboard view.
Syntax
no parameters
Usage Guidelines
Saved spectrum view preferences may not be backwards compatible with the spectrum analysis dashboard in earlier versions of AOS-W. If you downgrade to an earlier version of AOS-W and your client is unable to load a saved spectrum view in the spectrum dashboard, access the CLI in enable mode and issue this command to delete the saved spectrum views and display default view settings in the spectrum dashboard.
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing RF Protect license
Command Mode Config mode on master or local switches
154 | ap spectrum clear-webui-view-settings
AOS-W 6.2 | Reference Guide
ap spectrum local-override
no override ap-name <ap-name> spectrum-band 2ghz|5ghz
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Syntax
Parameter override ap-name <apname>
spectrum band
Description
Range
name of an AP whose radio -- should be converted to a spectrum monitor radio
Spectrum band or portion of the band to be monitored by the spectrum monitor radio
2GHz (channels 1-14) 5GHz(channels 36-64, 100140 and 149-165).
Default --
2Ghz
Usage Guidelines
There are two ways to change an OAW-AP104, OAW-AP105, OAW-AP175, OAW-AP120 Series, OAW-AP130 Series, or OAW-AP90 series into a spectrum monitor. You can assign that AP to a 802.11a and 802.11g radio profile that is already set to spectrum mode, or you can temporarily change the AP into a spectrum monitor using a local spectrum override profile. When you use a local spectrum override profile to override an AP's mode setting, that AP will begin to operate as a spectrum monitor, but will remain associated with its previous 802.11a and 802.11g radio profiles. If you change any parameter (other than the overridden mode parameter) in the spectrum monitor's 802.11a or 802.11 radio profiles, the spectrum monitor will immediately update with the change. When you remove the local spectrum override, the spectrum monitor will revert back to its previous mode, and remain assigned to the same 802.11a and 802.11 radio profiles as before.
Related Commands
Command
Description
Mode
show ap spectrum localoverride
This command shows a list of AP radios currently converted to spectrum monitors via the spectrum local-override list
Config mode on master or local switches
Command History
Release AOS-W 6.0 AOS-W 6.2
Modification
Command introduced
The spectrum-band parameter supports a 5ghz value, allowing an AP to monitor the entire 5 Ghz radio band. Previous versions of AOS-W supported 5ghz-lower, 5ghz-middle and 5ghz-upper settings.
AOS-W 6.2 | Reference Guide
ap spectrum local-override | 155
Command Information
Platforms All platforms
Licensing RF Protect license
Command Mode Config mode on master switches
156 | ap spectrum local-override
AOS-W 6.2 | Reference Guide
ap system-profile
ap system-profile <profile> aeroscout-rtls-server ip-addr <ipaddr> port <port> [include-unassoc-sta] am-scan-rf-band [a | g | all] bkup-lms-ip <ipaddr> bkup-lms-ipv6 <ipaddr> bootstrap-threshold <number> clone <profile> dns-domain <domain> double-encrypt dump-server <server> heartbeat-dscp <number> led-mode normal|off lms-hold-down-period <seconds> lms-ip <ipaddr> lms-ipv6 <ipaddr> lms-preemption maintenance-mode max-request-retries <number> mtu <bytes> native-vlan-id <vlan> no ... number_ipsec_retries rap-bw-total rap-bw-resv-1 rap-bw-resv-2 rap-bw-resv-3 rap-dhcp-default-router <ipaddr> rap-dhcp-dns-server <ipaddr> rap-dhcp-lease <days> rap-dhcp-pool-end <ipaddr> rap-dhcp-pool-netmask <netmask> rap-dhcp-pool-start <ipaddr> rap-dhcp-server-id <ipaddr> rap-dhcp-server-vlan <vlan> rap-local-network-access request-retry-interval <seconds> rf-band <band> rtls-server ip-addr <ipaddr> port <port> key <key> station-message-frequency [include-unassoc-sta] session-acl <acl> syscontact <name> telnet
<seconds>
Description
This command configures an AP system profile.
Syntax
Parameter <profile>
Description
Name of this instance of the profile. The name must be 1-63 characters.
Range --
Default "default"
AOS-W 6.2 | Reference Guide
ap system-profile | 157
Parameter aeroscout-rtlsserver am-scan-rf-band
a g all ip-addr port bkup-lms-ip bkup-lms-ipv6 bootstrapthreshold
clone dns-domain double-encrypt
dump-server heartbeat-dscp
Description
Range
Enables the AP to send RFID tag information to -- an AeroScout real-time asset location (RTLS) server.
Scanning band for multiple RF radios
a, g, all
Set the scanning band to 802.11a only
--
Set the scanning band to 802.11g only
--
Set the scanning band to apply to all bands
--
IP address of the AeroScout server to which
--
location reports are sent.
Port number on the AeroScout server to which -- location reports are sent.
In multi-switch networks, specifies the IP
--
address of a backup to the IP address specified
with the lms-ip parameter.
In multi-switch ipv6 networks, specifies the IPv6 -- address of a backup to the IPv6 address specified with the lms-ipv6 parameter.
Number of consecutive missed heartbeats on a GRE tunnel (heartbeats are sent once per second on each tunnel) before an AP rebootstraps. On the switch, the GRE tunnel timeout is 1.5 x bootstrap-threshold; the tunnel is torn down after this number of seconds of inactivity on the tunnel.
1-65535
Name of an existing AP system profile from
--
which parameter values are copied.
Name of domain that is resolved by corporate
--
DNS servers. Use this parameter when
configuring split tunnel.
This parameter applies only to remote APs. Use -- double encryption for traffic to and from a wireless client that is connected to a tunneled SSID.
When enabled, all traffic is re-encrypted in the IPsec tunnel. When disabled, the wireless frame is only encapsulated inside the IPsec tunnel.
All other types of data traffic between the switch and the AP (wired traffic and traffic from a splittunneled SSID) are always encrypted in the IPsec tunnel.
(For debugging purposes.) Specifies the server -- to receive a core dump generated when an AP process crashes.
Define the DSCP value of AP heartbeats.
0-63
Default -- all all all all -- -- -- -- 8
-- -- disabled
-- 0
158 | ap system-profile
AOS-W 6.2 | Reference Guide
Parameter
led-mode normal off
lms-hold-downperiod lms-ip
lms-ipv6
lms-preemption maintenancemode
Description
Range
Use this feature to prioritize AP heartbeats and prevent the AP from losing connectivity with the switch over high-latency or low-bandwidth WAN connections.
The operating mode for the AP LEDs. This option is available on all 802.11n indoor AP platforms.
Display LEDs in normal mode.
Turn off all LEDs.
Time, in seconds, that the primary LMS must be available before an AP returns to that LMS after failover.
1-3600
In multi-switch networks, this parameter
--
specifies the IP address of the local
management switch (LMS)--the Alcatel-Lucent
switch--which is responsible for terminating user
traffic from the APs, and processing and
forwarding the traffic to the wired network. This
can be the IP address of the local or master
switch.
When using redundant switchs as the LMS, set
this parameter to be the VRRP IP address to
ensure that APs always have an active IP
address with which to terminate sessions.
NOTE: If the LMS-IP is blank, the access point will remain on the switch that it finds using methods like DNS or DHCP. If an IP address is configured for the LMS IP parameter, the AP will be immediately redirected to the switch at that address.
In multi-switch ipv6 networks, specifies the IPv6 -- address of the local management switch (LMS) --the switch--which is responsible for terminating user traffic from the APs, and processing and forwarding the traffic to the wired network. This can be the IP address of the local or master switch.
When using redundant switchs as the LMS, set this parameter to be the VRRP IP address to ensure that APs always have an active IP address with which to terminate sessions.
Automatically reverts to the primary LMS IP
--
address when it becomes available.
Enable or disable AP maintenance mode. This setting is useful when deploying, maintaining, or upgrading the network.
Default normal 600 seconds --
--
disabled disabled
AOS-W 6.2 | Reference Guide
ap system-profile | 159
Parameter
max-request-re tries
mtu native-vlan-id
no number-ipsec-retries
rap-bw-total rap-bw-resv-1 rap-bw-resv-2 rap-bw-resv-3 rap-dhcpdefault-router rap-dhcp-dnsserver rap-dhcp-lease
rap-dhcp-poolend rap-dhcp-poolnetmask rap-dhcp-poolstart
Description
Range
If enabled, APs stop flooding unnecessary traps and syslog messages to network management systems or network operations centers when deploying, maintaining, or upgrading the network. The switch still generates debug syslog messages if debug logging is enabled.
Maximum number of times to retry APgenerated requests, including keepalive messages. After the maximum number of retries, the AP either tries the IP address specified by the bkup-lms-ip (if configured) or reboots.
1-65535
MTU, in bytes, on the wired link for the AP.
10241578
Native VLAN for bridge mode virtual APs
--
(frames on the native VLAN are not tagged with
802.1q tags).
Negates any configured parameter.
--
The number of times the AP will attempt to recreate an IPsec tunnel with the master switch before the AP will reboot. A value of 0 disables the reboot.
1-1000
This is the total reserved uplink bandwidth (in
--
Kilobits per second).
Session ACLs with uplink bandwidth
--
reservation in kilobits per second. You can
specify up to three session ACLs to reserve uplink bandwidth. The sum of the three uplink
--
bandwidths should not exceed the rap-bw-
total value.
--
IP address for the default DHCP router.
--
Default
10
-- 1 -- 360
-- -- -- -- 192.168.11.1
IP address of the DNS server.
--
192.168.11.1
The amount of days that the assigned IP address is valid for the client. Specify the lease in <days>. 0 indicates the IP address is always valid; the lease does not expire.
0-30
Configures a DHCP pool for remote APs. This is -- the last IP address of the DHCP pool.
Configures a DHCP pool for remote APs. This is -- the netmask used for the DHCP pool.
Configures a DHCP pool for remote APs. This is -- the first IP address of the DHCP pool.
0
192.168.11.254 255.255.255.0 192.168.11.2
160 | ap system-profile
AOS-W 6.2 | Reference Guide
Parameter rap-dhcp-server-id
Description IP address used as the DHCP server identifier.
Range --
Default 192.168.11.1
rap-dhcp-server-vlan
rap-local-network-access request-retryinterval
rf-band
rtls-server ip-addr port key station-messagefrequency
session-acl
syscontact telnet
VLAN ID of the remote AP DHCP server used if -- the switch is unavailable. This VLAN enables the DHCP server on the AP (also known as the remote AP DHCP server VLAN). If you enter the native VLAN ID, the DHCP server is unavailable.
Enable or disable local network access across -- VLANs in a Remote-AP.
Interval, in seconds, between the first and second retries of AP-generated requests. If the configured interval is less than 30 seconds, the interval for subsequent retries is increased up to 30 seconds.
1-65535
For APs that support both a and b/g RF bands, a/g RF band in which the AP should operate: l g = 2.4 GHz l a = 5 GHz
Enables the AP to send RFID tag information to -- an RTLS server.
IP address of the server to which location
--
reports are sent.
Port number on the server to which location
--
reports are sent.
Shared secret key.
--
Indicates how often packets are sent to the server.
5-3600
Session ACL configured with the ip access-list -- session command. NOTE: This parameter requires the PEFNG license.
SNMP system contact information.
--
Enable or disable telnet to the AP.
--
--
disabled 10 seconds
g
-- -- -- -- 30 seconds --
-- disabled
Usage Guidelines
The AP system profile configures AP administrative operations, such as logging levels.
Example
The following command sets the LMS IP address in an AP system profile: (host) (config) #ap system-profile local1
lms-ip 10.1.1.240
AOS-W 6.2 | Reference Guide
ap system-profile | 161
Command History
Release AOS-W 3.0 AOS-W 3.2 AOS-W 3.3.2
AOS-W 5.0 AOS-W 6.0
Modification
Command introduced
Support for additional RTLS servers and remote AP enhancements was introduced.
l Maintenance-mode parameter was introduced. l Multiple remote AP DHCP server enhancements were introduced. l Support for RFprotect server and backup server configuration was introduced. l The mms-rtls-server parameter was deprecated in AOS-W 3.3.2.
The master-ip, rfprotect-server-ip and rfprotect-bkup-server parameters were deprecated.
Added support for the option to set the RF scanning band (am-scan-rf-band). The keepalive-interval parameter was deprecated.
Command Information
Platforms All platforms
Licensing
Base operating system, except for noted parameters
Command Mode Config mode on master switches
162 | ap system-profile
AOS-W 6.2 | Reference Guide
ap wipe out flash
ap wipe out flash ap-name <ap-name> ip-addr <ip-addr>
Description
Overwrite the entire AP compact flash, destroying its contents (including the current image file).
Syntax
Parameter ap-name
ip-addr
Description
Wipe out the flash of the AP with the specified name.
Wipe out the flash of the AP with the specified IP address.
Range --
--
Default --
--
Usage Guidelines
Use this command only under the supervision of Alcatel-Lucent technical support. If you delete the current image in the AP's flash memory, the AP will not function until you reload another image.
Command History
This command was introduced in AOS-W 3.3.2.
Command Information
Platforms
All platforms running AOS-W 3.3.2.x-FIPS or later.
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ap wipe out flash | 163
ap wired-ap-profile
ap wired-ap-profile <profile> broadcast clone <profile> forward-mode {bridge|split-tunnel|tunnel} no ... switchport access vlan <vlan> | {mode access|trunk} |trunk {allowed vlan <list>| add <list> | except <list> | remove <list>}| native vlan <vlan> trusted wired-ap-enable
Description
This command configures a wired AP profile.
Syntax
Parameter <profile> broadcast clone forward-mode
tunnel bridge
split-tunnel
no
Description
Name of this instance of the profile. The name must be 1-63 characters.
Forward broadcast traffic to this tunnel.
Name of an existing wired AP profile from which parameter values are copied.
This parameter controls whether data is tunneled to the switch using generic routing encapsulation (GRE), bridged into the local Ethernet LAN (for remote APs), or a combination thereof depending on the destination (corporate traffic goes to the switch, and Internet access remains local). All forwarding modes support band steering, TSPEC/TCLAS enforcement, 802.11k and station blacklisting.
In this default forwarding mode, the AP handles all 802.11 association requests and responses, but sends all 802.11 data packets, action frames and EAPOL frames over a GRE tunnel to the switch for processing. The switch removes or adds the GRE headers, decrypts or encrypts 802.11 frames and applies firewall rules to the user traffic as usual.
802.11 frames are bridged into the local Ethernet LAN. When a remote AP or campus AP is in bridge mode, the AP handles all 802.11 association requests and responses, encryption/decryption processes, and firewall enforcement. The 802.11e and 802.11k action frames are also processed by the AP, which then sends out responses as needed. An AP in bridge mode supports only the 802.1X authentication type. NOTE: Virtual APs in bridge mode using static WEP should use key slots 2-4 on the switch. Key slot 1 should only be used with Virtual APs in tunnel mode.
802.11 frames are either tunneled or bridged, depending on the destination (corporate traffic goes to the switch, and Internet access remains local). An AP in split-tunnel mode supports only the 802.1X authentication type. An AP in split-tunnel forwarding mode handles all 802.11 association requests and responses, encryption/decryption, and firewall enforcement. The 802.11e and 802.11k action frames are also processed by the AP, which then sends out responses as needed. NOTE: Virtual APs in split-tunnel mode using static WEP should use key slots 2-4 on the switch. Key slot 1 should only be used with Virtual APs in tunnel mode.
Negates any configured parameter.
164 | ap wired-ap-profile
AOS-W 6.2 | Reference Guide
Parameter switchport access mode trunk allowed
trunk native
trusted wired-ap-enable
Description
Configures the switching mode characteristics for the port.
The VLAN to which the port belongs. The default is VLAN 1.
The mode for the port, either access or trunk mode. The default is access mode.
Allows multiple VLANs on the port interface. You must define this parameter using VLAN IDs or VLAN names VLAN IDs and VLAN names cannot be listed together.
The native VLAN for the port (frames on the native VLAN are not tagged with 802.1q tags).
Sets port as either trusted or untrusted. The default setting is untrusted.
Enables the wired AP. The wired AP is disabled by default.
Usage Guidelines
This command is only applicable to Alcatel-Lucent APs that support a second Ethernet port. The wired AP profile configures the second Ethernet port (enet1) on the AP. For mesh deployments, this command is applicable to all Alcatel-Lucent APs configured as mesh nodes. If you are using mesh to join multiple Ethernet LANs, configure and enable bridging on the mesh point Ethernet port. Mesh nodes only support bridge mode and tunnel mode on their wired ports (enet0 or enet1). Split tunnel mode is not supported. Use the bridge mode to configure bridging on the mesh point Ethernet port. Use tunnel mode to configure secure jack operation on the mesh node Ethernet port. When configuring the Ethernet ports on APs with multiple Ethernet ports, note the following requirements: l If configured as a mesh portal, connect enet0 to the switch to obtain an IP address. The wired AP profile controls
enet1.Only enet1 supports secure jack operation. l If configured as a mesh point, the same wired AP profile will control both enet0 and enet1.
Example
The following command configures the enet1 port on a multi-port AP as a trunk port: (host) (config) #ap wired-ap-profile wiredap1
switchport mode trunk switchport trunk allowed 4,5
Command History
Release AOS-W 3.0 AOS-W 3.2 AOS-W 6.0
Modification Command introduced The split-tunnel forwarding mode was introduced. Wired ports on campus APs support bridge forwarding mode.
AOS-W 6.2 | Reference Guide
ap wired-ap-profile | 165
Command Information
Platforms All platforms
Licensing
Base operating system, except for noted parameters
Command Mode Config mode on master switches
166 | ap wired-ap-profile
AOS-W 6.2 | Reference Guide
ap wired-port-profile
ap wired-port-profile <profile> aaa-profile <profile> authentication-timeout <seconds> clone enet-link-profile <profile> lldp-profile <profile> no rap-backup shutdown wired-ap-profile <profile>
Description
This command configures a wired port profile.
Syntax
Parameter aaa-profile <profile> authentication-timeout
clone <profile> enet-link-profile <profile> lldp-profile <profile>
no rap-backup
shutdown wired-ap-profile <profile>
Description
Name of a AAA profile to be used by devices connecting to the AP's wired port.
Authentication timeout value, in seconds, for devices connecting the AP's wired port. The supported range is 1-65535 seconds, and the default value is 20 seconds.
Create a new AP wired port profile based upon the values of an existing profile.
Specify an Ethernet link profile to be used by devices associated with this wired port profile. The Ethernet link profile defines the duplex value and speed to be used by the port.
Specify an LLDP profile to be used by devices associated with this wired port profile. The LLDP profile specifies the type-length-value (TLV) elements to be sent in LLDP PDUs.
Negates any defined parameter
Use the rap-backup parameter to use the wired port on a Remote AP for local connectivity and troubleshooting when the AP cannot reach the switch. If the AP is not connected to the switch, no firewall policies will be applied when this option is enabled. (The AAA profile will be applied when the AP is connected to switch).
Disable the wired AP port.
Name of a wired AP profile to be used by devices connecting the AP's wired port. The wired AP profile defines the forwarding mode and switchport values used by the port.
Usage Guidelines
This command is only applicable to APs with Ethernet ports. Issue this command to enable or disable the wired port, define an AAA profile for wired port devices, and associate the port with an ethernet link profile that defines its speed and duplex values.
AOS-W 6.2 | Reference Guide
ap wired-port-profile | 167
Example
The following command defines a AAA profile for wired port devices: (host) (config) #ap wired-port-profile wiredport1
aaa-profile default-open authentication-timeout 30 wired-ap-profile wiredap1
Command History
This command was introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing
Base operating system, except for noted parameters
Command Mode Config mode on master switches
168 | ap wired-port-profile
AOS-W 6.2 | Reference Guide
arp
arp <ipaddr> <macaddr>
Description
This command adds a static Address Resolution Protocol (ARP) entry.
Syntax
Parameter <ipaddr> <macaddr>
Description IP address of the device to be added. Hardware address of the device to be added, in the format xx:xx:xx:xx:xx:xx.
Usage Guidelines
If the IP address does not belong to a valid IP subnetwork, the ARP entry is not added. If the IP interface that defines the subnetwork for the static ARP entry is deleted, you will be unable to use the arp command to overwrite the entry's current values; use the no arp command to negate the entry and then enter a new arp command.
Example
The following command configures an ARP entry: (host) (config) #arp 10.152.23.237 00:0B:86:01:7A:C0
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
arp | 169
audit-trail
audit-trail [all]
Description
This command enables an audit trail.
Syntax
Parameter all
Description
Enables audit trail for all commands, including enable mode commands. The audit-trail command without this option enables audit trail for all commands in configuration mode.
Usage Guidelines
By default, audit trail is enabled for all commands in configuration mode. Use the show audit-trail command to display the content of the audit trail.
Example
The following command enables an audit trail: (host) (config) #audit-trail
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
170 | audit-trail
AOS-W 6.2 | Reference Guide
backup
backup {flash|pcmcia}
Description
This command backs up compressed critical files in flash.
Syntax
Parameter flash pcmcia
Description
Backs up flash directories to flashbackup.tar.gz file.
Backs up flash images to external PCMCIA flash card. This option can only be executed on switches that have a PCMCIA slot.
Usage Guidelines
Use the restore flash command to untar and uncompress the flashbackup.tar.gz file.
Example
The following command backs up flash directories to the flashbackup.tar.gz file: (host)(config) #backup flash
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config modes on master switches
AOS-W 6.2 | Reference Guide
backup | 171
banner motd
banner motd <delimiter> <textString>
Description
This command defines a text banner to be displayed at the login prompt when a user accesses the switch.
Syntax
Parameter <delimiter> <textString>
Description
Range
Indicates the beginning and end of the banner text. --
The text you want displayed.
up to 1023 characters
Usage Guidelines
The banner you define is displayed at the login prompt to the switch. The banner is specific to the switch on which you configure it. The WebUI displays the configured banner at its login prompt, but you cannot use the WebUI to configure the banner.
The delimiter is a single character that indicates the beginning and the end of the text string in the banner. Select a delimiter that is not used in the text string you define, because the switch ends the banner when it sees the delimiter character repeated.
There are two ways of configuring the banner message:
l Enter a space between the delimiter and the beginning of the text string. The text can include any character except a quotation mark ("). Use quotation marks to enclose your text if you are including spaces (spaces are not recognized unless your text string is enclosed in quotation marks; without quotation marks, the text is truncated at the first space). You can also use the delimiter character within quotation marks.
l Press the Enter key after the delimiter to be placed into a mode where you can simply enter the banner text in lines of up to 255 characters, including spaces. Quotation marks are ignored.
Example
The following example configures a banner by enclosing the text within quotation marks: (host)(config) #banner motd * "Welcome to my switch. This switch is in the production network, so please do not save configuration changes. Zach Jennings is awesome. Maintenance will be performed at 7:30 PM, so please log off before 7:00 PM."*
The following example configures a banner by pressing the Enter key after the delimiter: (host)(config) #banner motd * Enter TEXT message [maximum of 1023 characters]. Each line in the banner message should not exceed 255 characters. End with the character '*'.
Welcome to my switch. This switch is in the production network, so please do not save configuration changes. Zach Jennings is awesome. Maintenance will be performed at 7:30 PM, so please log off before 7:00 PM.*
The banner display is as follows: Welcome to my switch. This switch is in the production network, so please do not save configuration changes. Zach Jennings is awesome. Maintenance will be performed at 7:30 PM, so please log off before 7:00 PM.
172 | banner motd
AOS-W 6.2 | Reference Guide
Command History
This command was introduced in AOS-W 1.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
banner motd | 173
boot
boot cf-test [fast | read-only | read-write] config-file <filename> remote-node [all|ip-address <A.B.C.D] system partition [0 | 1] verbose
Description
Configure the boot options for the switch and the remote node.
Syntax
Parameter cf-test
fast read-only read-write config-file <filename> remote-node all ip address <A.B.C.D> system 0 | 1
verbose
Description Sets the type of compact flash test to run when booting the switch. Performs a fast test, which does not include media testing. Performs a read-only media test. Performs a read-write media test. Sets the configuration file to use when booting the switch. Specifies the name of the configuration file from which to boot the switch. Reloads the remote node switch. Reloads all remote nodes on the network. Reloads on the remote node specified by its IP address.
Enter the keyword system followed by the partition number (0 or 1) that you want the switch to use during the next boot (login) of the switch. NOTE: A switch reload is required before the new boot partition takes effect. Prints extra debugging information at boot.
Usage Guidelines
Use the following options to control the boot behavior of the switch: l cf-test--Test the flash during boot. l config-file--Set the configuration file to use during boot. l system--Specify the system partition to use during the switch's next boot (login). l verbose--Print extra debugging information during boot. The information is sent to the screen at boot time.
Printing the extra debugging information is disabled using the no boot verbose command.
Example
The following command uses the configuration file january-config.cfg the next time the switch boots: boot config-file january-config.cfg
174 | boot
AOS-W 6.2 | Reference Guide
The following command uses system partition 1 the next time the switch boots: boot system partition 1
Command History
AOS-W 1.0 AOS-W 6.0
Modification Introduced for the first time. The remote-node parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master switches
AOS-W 6.2 | Reference Guide
boot | 175
cellular profile
cellular profile <profile_name> dialer <group> driver acm|hso|option|sierra import <address> modeswitch {eject <params>}|rezero no priority <1-255> serial <sernum> tty <ttyport> user <login> password <password> vendor <vend_id> product <prod_id>
Description
Create new profiles to support new USB modems or to customize USB characteristics.
Syntax
Parameter cellular profile <profile_name> dialer <group> driver acm|hso|option|sierra
import <address> modeswitch {eject <params>}|rezero
no priority <1-255>
Description
Enter the keywords cellular profile followed by your profile name. This command changes the configuration mode and the command line prompt changes to:
host (config-cellular <profile_name>)#
Enter the keyword dialer followed by a group name to specify the dialing parameters for the carrier. The parameters tend to be common between service providers on the same type of network (CDMA vs. GSM) as displayed in the show dialer group command.
Enter the keyword driver followed by one of the driver options: l acm: Linux ACM driver. l hso: Option High Speed driver. l option: Option USB data card driver (default). l sierra: Sierra Wireless driver.
Enter the keyword import followed by the USB device address as displayed in the show usb command. Import retrieves the vendor/product serial numbers from the USB device list and populates them into the profile.
Enter the keyword modeswitch followed by either: l eject followed by the CDROM device. l rezero: Send SCSI CDROM rezero command. Certain cellular devices must be modeswitched before the modem switches to data mode.
Enter the keyword no to negate the command and revert back to the defaults.
Enter the keyword priority to override the default cellular priority (100). Range: 1 to 255. Default: 100
176 | cellular profile
AOS-W 6.2 | Reference Guide
Parameter
Description
serial <sernum>
Enter the keyword serial followed by the USB device serial number
tty <ttyport>
Enter the keyword tty followed by the Modem TTY port (i.e. ttyUSB0, ttyACM0)
user <login> password <password>
Enter the keyword user followed by your login, and then enter the keyword password followed by your password to establish user name authentication.
vendor <vend_id> product <prod_id> in hex
Enter the keyword vendor followed by the vendor ID in hexadecimal (see show usb on page 1310) and then enter the keyword product followed by the product ID listed in the show usb command.
Usage Guidelines
The cellular modems are plug-and-play and support most native USB modems. Cellular modems are activated only if it is the uplink with the highest priority (see show uplink on page 1309). However, new profiles can be created using this command to support new data cards or to customize card characteristics.
Command History
Introduced in AOS-W 3.4.
Command Information
Platforms OAW-4306 Series switches
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
cellular profile | 177
cfgm
cfgm {mms config {enable|disable}|set config-chunk <kbytes>|set heartbeat <seconds>|set maximum-updates <number>|snapshot-timer <minutes>|sync-command-blocks <number>|synctypecomplete|sync-type snapshot}
Description
This command configures the configuration module on the master switch.
Syntax
Parameter set config-chunk
set heartbeat set maximum-updates
snapshot-timer sync-command-blocks sync-type complete sync-type snapshot
Description
Range
Maximum packet size, in Kilobytes, that is sent every second to the local switch whenever the master switch sends a configuration to the local. If the connection between the master and local is slow or uneven, you can lower the size to reduce the amount of data that needs to be retransmitted. If the connection is very fast and stable, you can increase the size to make the transmission more efficient.
1-100
Interval, in seconds, at which heartbeats are sent. You can increase the interval to reduce traffic load.
10-300
Maximum number of local switches that can be updated at the same time with configuration changes. You can decrease this value if you have a busy network. You can increase this value to improve configuration synchronization.
2-25
Interval, in minutes, that the local switch waits for a configuration download from the master upon bootup or startup before loading the last snapshot configuration.
5-60
To configure the number of command-list blocks. 1-3 Each block contains a list of global configuration commands for each write-mem operation.
The master sends full configuration file to the
--
local.
The master sends only the incremental con-
--
figuration to the local.
NOTE: By default, this configuration is enabled.
Default 10 Kbytes
10 seconds 5
5 minutes 3 -- Enable
Usage Guidelines
By default, OV-MM-SW configuration updates on the switch are disabled to prevent any alterations to the switch configuration.
You need to explicitly enable OV-MM-SW configuration updates for the switch to accept configuration changes from OV-MM-SW. When OV-MM-SW configuration updates are enabled, global configuration changes can only be done from OV-MM-SW and are not available on the master switch. You can use the cfgm mms config disable command
178 | cfgm
AOS-W 6.2 | Reference Guide
if the switch loses connectivity to the OmniVista Mobility Manager Software and you must enter a configuration change on the master switch.
Example
The following command allows configuration updates from the OmniVista Mobility Manager Software: (host)(config) #cfgm mms config enable
Command History
This command was introduced in AOS-W 3.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
cfgm | 179
clear
clear aaa acl ap arp counters crypto datapath dot1x fault gab-db ip ipc ipv6 loginsession master-local-entry master-local-session port provisioning-ap-list provisioning-params rap-wml update-counter voice vpdn wms
Description
This command clears various user-configured values from your running configuration.
Syntax
Parameter aaa
authenticationserver
state
acl hits
Description
Clear all values associated with authentication profile.
Provide authentication server details to clear values specific to an authentication server or all authentication server. Parameters: l all--to clear all server statistics. l internal--to clear Internal server statistics. l radius--to clear RADIUS server statistics. l tacacs--to clear TACACS server statistics.
Clear internal status of authentication modules. Parameters: l configuration--clear all configured objects. l debug-statistics--clear debug statistics. l messages--clear authentication messages that were sent and received.
Clear ACL statistics.
Clear ACL hit statistics
180 | clear
AOS-W 6.2 | Reference Guide
Parameter ap
arm mesh port remote arp counters fastethernet gigabitethernet tunnel vrrp datapath
dot1x
fault gap-db
Description
Clear all AP related information.
Clear information on AP.
Clear all mesh commands.
Toggle the link on the specified port.
Clear all information related to remote configuration.
Clear all ARP table information. You can either clear all information or enter the IP address of the ARP entry to clear a specific value.
Clear all interface configuration values.
Clears configuration related to fastethernet ports.
Clears configuration related to fastethernet ports.
Clears all tunnel configuration values on interface ports.
Clears all VRRP configuration values on interface ports.
Clears all configuration values and statistics for the following datapath modules. l application l bridge l bwm l crypto l dma l frame l hardware l ip-reassembly l maintenance l message-queue l route l route-cache l session l station l tunnel l user l wifi-reassembly l wmm
Clears all 802.1X specific counters and supplicant statistics. Use the following parameters: l counters l supplicant-info
Clears all SNMP fault configuration.
Clears global AP database. This command is often used to clear all stale AP records. Use the following parameters: l ap-name l lms
AOS-W 6.2 | Reference Guide
clear | 181
Parameter ip
ipc ipv6
loginsession master-local-entry master-local-session port
provisioning-ap-list provisioning-params rap-wml update-counter voice
vpdn
wms
Description
l wired-mac
Clears all IP information from DHCP bindings, IGMP groups and IP mobility configuration. Use the following parameters: l dhcp l igmp l mobile
Clears all inter process communication statistics.
Clears all IPv6 session statistics, multicast listener discovery (MLD) group and member information, MLD statistics, and counters. Use the following parameters: l datapath session counters l mld group l mld stats-counters
Clears loginsession information for a specific login session, as identified by the session id.
Clears local switch information from the master switch LMS list. Specify the IP address of the local switch to be removed from master switch active LMS list.
Clear and reset master local TCP connection. Specify the IP address of either the master or local switch.
Clear all port statistics that includes link-event counters or all counters. Use the following parameters: l link-event l stats
Clear AP entries from the provisioning list.
Clear provisioning parameters and reset them to the default configuration values.
Clear wired MAC lookup cache for a DB server.
Clear all update counter statistics.
Clear all voice state information. Use the following parameters: l call-counters l call-status l statistics
n cac n tspec-enforcement
Clear all VPDN configuration for L2TP and PPTP tunnel. Use the following parameters: l tunnel l2tp id <l2tp-tunnel-id> l tunnel pptp id <pptp-tunnel-id>
Clear all WLAN management commands. Use the following parameters: l ap--clear all AP related commands. Specify the BSSID of the AP. l client--clear all wired client related commands. Specify the MAC address
of the client. l probe--clear all probe information. Specify the BSSID of the probe.
182 | clear
AOS-W 6.2 | Reference Guide
Usage Guidelines
The clear command will clear the specified parameters of their current values.
Example
The following command clears all aaa counters for all authentication servers: (host) (config) #clear aaa authentication-server all
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced
The following MLD parameters are added to the ipv6 option: l mld group l mld stats-counters
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master switches
AOS-W 6.2 | Reference Guide
clear | 183
clear wms wired-mac
clear wms wired-mac [ all | gw-mac <mac> | monitored-ap-wm <mac> | prop-eth-mac <mac> | regap-oui <mac> | system-gw-mac <mac>| system-wired-mac <mac> | wireless-device <mac>]
Description
Clear learned and collected Wired MAC information. Optionally, enter the MAC address, in nn:nn:nn:nn:nn:nn format, of the AP that has seen the Wired Mac.
Syntax
all gw-mac <mac> monitored-ap-wm <mac> prop-eth-mac <mac> reg-ap-oui <mac> system-gw-mac <mac> system-wired-mac <mac> wireless-device <mac>]
Description Clear all the learned and collected wired Mac information. Clear the gateway wired Mac information collected from the APs. Clear monitored AP wired Mac information collected fom the APs. Clear the wired Mac information collected from the APs. Clear the registered AP OUI information collected from the APs. Clear system gateway Mac information learned at the switch. Clear system wired Mac information learned at the switch. Clear routers or potential wireless devices information.
Revision History
Release AOS-W 6.1
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master switches
184 | clear wms wired-mac
AOS-W 6.2 | Reference Guide
clock append
clock clock append
Description
This command enables the timestamp feature, adding a date and time to the output of show commands.
Syntax
No parameters.
Usage Guidelines
When you enable the timestamp feature, the command-line interface includes a timestamp in the output of each show command indicating when the show command was issued. Note that the output of show clock and show log do not include timestamps, even when this feature is enabled. You can disable timestamps using the command no clock append.
Example
The following example enables the timestamp feature. (host)(config) #clock append
Command History
This command was introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode
AOS-W 6.2 | Reference Guide
clock append | 185
clock set
clock clock set <year><month><day><time>
Description
This command sets the date and time.
Syntax
Parameter year month day time
Description
Range
Sets the year. Requires all 4 digits.
Numeric
Sets the month. Requires the first three letters of the month.
Alphabetic
Sets the day.
1-31
Sets the time. Specify hours, minutes, and seconds separated by Numeric spaces.
Usage Guidelines
You can configure the year, month, day, and time. You must configure all four parameters. Specify the time using a 24-hour clock. You must specify the seconds.
Example
The following example configures the clock to January 1st of 2007, at 1:03:52 AM. (host)(config) #clock set 2007 jan 1 1 3 52
Command History
This command was introduced in AOS-W 1.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
186 | clock set
AOS-W 6.2 | Reference Guide
clock summer-time recurring
clock summer-time <WORD> [recurring] <1-4> <start day> <start month> <hh:mm> first <start day> <start month> <hh:mm> last <start day> <start month> <hh:mm> <1-4> <end day> <end month> <hh:mm> first <end day> <end month> <hh:mm> last <end day> <end month> <hh:mm> [<-23 - 23>]
Description
Set the software clock to begin and end daylight savings time on a recurring basis.
Syntax
Parameter WORD 1-4
first last start day start month hh:mm -23 - 23
Description
Range
Enter the abbreviation for your time zone. For example, PDT for Pacific 3-5 characters Daylight Time.
Enter the week number to start/end daylight savings time. For
1-4
example, enter 2 to start daylight savings time on the second week of
the month.
Enter the keyword first to have the time change begin or end on the
--
first week of the month.
Enter the keyword last to have the time change begin or end on the
--
last week of the month.
Enter the weekday when the time change begins or ends.
SundaySaturday
Enter the month when the time change begins or ends.
JanuaryDecember
Enter the time, in hours and minutes, that the time change begins or ends.
24 hours
Hours offset from the Universal Time Clock (UTC).
-23 - 23
Usage Guidelines
This command subtracts exactly 1 hour from the configured time.
The WORD can be any alphanumeric string, but cannot start with a colon (:). A WORD longer than five characters is not accepted. If you enter a WORD containing punctuation, the command is accepted, but the timezone is set to UTC.
You can configure the time to change on a recurring basis. To do so, set the week, day, month, and time when the change takes effect (daylight savings time starts). You must also set the week, day, month, and time when the time changes back (daylight savings time ends).
The start day requires the first three letters of the day. The start month requires the first three letters of the month.
You also have the option to set the number of hours by which to offset the clock from UTC. This has the same effect as the clock timezone command.
AOS-W 6.2 | Reference Guide
clock summer-time recurring | 187
Example
The following example sets daylight savings time to occur starting at 2:00 AM on Sunday in the second week of March, and ending at 2:00 AM on Sunday in the first week of November. The example also sets the name of the time zone to PST with an offset of UTC - 8 hours. clock summer-time PST recurring 2 Sun Mar 2:00 first Sun Nov 3:00 -8
Command History
This command was introduced in AOS-W 1.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
188 | clock summer-time recurring
AOS-W 6.2 | Reference Guide
clock timezone
clock timezone <name> <-23 to 23>
Description
This command sets the time zone on the switch.
Syntax
Parameter <name> -23 to 23
Description Name of the time zone. Hours offset from UTC.
Range 3-5 characters -23 to 23
Usage Guidelines
The name parameter can be any alphanumeric string, but cannot start with a colon (:). A time zone name longer than five characters is not accepted. If you enter a time zone name containing punctuation, the command is accepted, but the time zone is set to UTC.
Example
The following example configures the timezone to PST with an offset of UTC - 8 hours. clock timezone PST -8
Command History
This command was introduced in AOS-W 1.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
clock timezone | 189
cluster-member-custom-cert
cluster-member-custom-cert member-mac <mac> ca-cert <ca> server-cert <cert> suite-b <gcm-128 | gcm-256>]
Description
This command sets the switch as a control plane security cluster root, and specifies a custom user-installed certificate for authenticating cluster members.
Syntax
Parameter member-mac <ca> ca-cert <ca> ca-cert <ca> server-cert <cert> suite-b
Description
MAC address of the cluster member
Name of the CA certificate uploaded via the WebUI
Name of the CA certificate uploaded via the WebUI
Name of the server certificate uploaded via the WebUI.
To use Suite-B encryption in the secure communication between the cluster root and cluster member, specify one of the following Suite-B algorithms l gcm-128: Encryption using 128-bit AES-GCM l gcm-256: Encryption using 256-but AES-GCM
Usage Guidelines
If your network includes multiple master switches each with their own hierarchy of APs and local switches, you can allow APs from one hierarchy to failover to any other hierarchy by defining a cluster of master switches. Each cluster will have one master switch as its cluster root, and all other master switches as cluster members.
To define a switch as a cluster root, issue one of the following commands on that switch:
l cluster-member-custom-cert: Define the switch as a cluster root, and select a user-installed certificate to authenticate that cluster member.
l cluster-member-factory-cert: Define the switch as a cluster root, and select a factory-installed certificate to authenticate that cluster member.
l cluster-member-ip : Define the switch as a cluster root, and set the IPsec key to authenticate that cluster member.
For information on installing certificates on your switch, refer to the Management Utilities chapter of the AOS-W User Guide.
Example
The following example selects a customer installed certificate for cluster member authentication. (host)(config) # cluster-member-custom-cert member-mac 00:1E:37:CB:D4:52 ca-cert cacert1 server-cert servercert1
190 | cluster-member-custom-cert
AOS-W 6.2 | Reference Guide
Related Commands
Parameter
Description
Mode
control-planesecurity
Configure the control plane security profile.
Config mode
show cluster-config
Show the multi-master cluster configuration for the control Enable mode plane security feature.
show cluster-switches Issue this command on a master switch using control plane security in a multi-master environment to show other the other switches to which it is connected.
Enable mode
Command History.
Introduced in AOS-W 6.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on cluster root switches
AOS-W 6.2 | Reference Guide
cluster-member-custom-cert | 191
cluster-member-factory-cert
cluster-member-factory-cert member-mac <mac>
Description
This command sets the switch as a control plane security cluster root, and specifies a custom user-installed certificate for authenticating cluster members.
Syntax
Parameter <mac>
Description MAC address of the user-installed certificate on the cluster member
Usage Guidelines
If your network includes multiple master switches each with their own hierarchy of APs and local switches, you can allow APs from one hierarchy to failover to any other hierarchy by defining a cluster of master switches. Each cluster will have one master switch as its cluster root, and all other master switches as cluster members.
To define a switch as a cluster root, issue one of the following commands on that switch:
l cluster-member-custom-cert: Define the switch as a cluster root, and select a user-installed certificate to authenticate that cluster member.
l cluster-member-factory-cert: Define the switch as a cluster root, and select a factory-installed certificate to authenticate that cluster member.
l cluster-member-ip : Define the switch as a cluster root, and set the IPsec key to authenticate that cluster member.
For information on installing certificates on your switch, refer to the Management Utilities chapter of the AOS-W User Guide.
Example
The following command sets the switch on which you issue command as a root switch, and adds the switch172.21.18.18 as a cluster member with the IPsec key ipseckey1: (host) (config) #cluster-member-factory-cert member-mac 00:1E:37:CB:D4:52
Related Commands
Parameter
Description
Mode
control-planesecurity
Configure the control plane security profile.
Config mode
show cluster-config
Show the multi-master cluster configuration for the control Enable mode plane security feature.
show cluster-switches Issue this command on a master switch using control plane security in a multi-master environment to show other the other switches to which it is connected.
Enable mode
192 | cluster-member-factory-cert
AOS-W 6.2 | Reference Guide
Command History
Introduced in AOS-W 6.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on cluster root switches
AOS-W 6.2 | Reference Guide
cluster-member-factory-cert | 193
cluster-member-ip
cluster-member-ip <ip-address> ipsec <key>
Description
This command sets the switch as a control plane security cluster root, and specifies the IPsec key for a cluster member.
Syntax
Parameter <ip-address>
ipsec <key>
Description
Switch IP address of a control plane security cluster member. You can also use the IP address 0.0.0.0 to set a single IPsec key for all cluster members.
Configure the value of the IPsec key for secure communication between the cluster root and the specified cluster member. The key must be between 6-64 characters.
Usage Guidelines
If your network includes multiple master switches each with their own hierarchy of APs and local switches, you can allow APs from one hierarchy to failover to any other hierarchy by defining a cluster of master switches. Each cluster will have one master switch as its cluster root, and all other master switches as cluster members.
The master switch operating as the cluster root will use the control plane security feature to create a self-signed certificate, then certify it's own local switches and APs. Next, the cluster root will send the certificate to each cluster member, which in turn certifies their own local switches and APs. Since all switches and APs in the cluster get their certificates from the cluster root, they will all have the same trust anchor, and the APs can switch to any other switch in the cluster and still remain connected to the secure network.
Issue the cluster-member-ip command on the switch you want to define as the cluster root to set the IPsec key for secure communication between the cluster root and each cluster member. Use the IP address 0.0.0.0 in this command to set a single IPsec key for all member switches, or repeat this command as desired to define a different IPsec key for each cluster member.
Once the cluster root has defined an IPsec key for all cluster members, you must access each of the member switches and issue the command cluster-root-ip to define the IPsec key for communication to the cluster root.
Example
The following command sets the switch on which you issue command as a root switch, and adds the switch172.21.18.18 as a cluster member with the IPsec key ipseckey1: (host) (config) #cluster-member-ip 172.21.18.18 ipsec ipseckey1
Related Commands
Parameter control-plane-security
Description Configure the control plane security profile.
Mode Config mode
194 | cluster-member-ip
AOS-W 6.2 | Reference Guide
Parameter show cluster-config
show cluster-switches
Description
Show the multi-master cluster configuration for the control plane security feature.
Issue this command on a master switch using control plane security in a multi-master environment to show other the other switches to which it is connected.
Mode Enable mode
Enable mode
Command History
Introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on cluster root switches
AOS-W 6.2 | Reference Guide
cluster-member-ip | 195
cluster-root-ip
cluster-root-ip <ip-address> ipsec <key> ipsec-custom-cert root-mac1 <mac1> [root-mac2 <mac2>] ca-cert <ca> server-cert <cert> [suite-b <gcm-128 | gcm-256>] ipsec-factory-cert root-mac-1 <mac> [root-mac-1 <mac>]
Description
This command sets the switch as a control plane security cluster member, and defines the IPsec key or certificate for secure communication between the cluster member and the switch's cluster root.
Syntax
Parameter <ip-address>
ipsec <key>
ipsec-factory-cert
root-mac-1 <mac> root-mac-2 <mac> ipsec-custom-cert
root-mac-1 <mac> root-mac-2 <mac>
ca-cert <ca> server-cert <cert> suite-b
Description
The IP address of control plane security cluster root switch. To set a single IPsec key for all member switches in the cluster use the IP address 0.0.0.0.
Set the value of the IPsec pre-shared key for communication with the cluster root. This parameter must be have the same value as the IPsec key defined for the cluster member via the cluster-member-ip command.
Use a factory-installed certificate for secure communication between the cluster root and the specified cluster member by specifying the MAC address of the certificate.
Specify MAC address of the cluster root.
Specify MAC address of the redundant cluster Root.
Use a custom user-installed certificate for secure communication between the cluster root and the specified cluster member.
Specify the MAC address of the cluster-root's certificate.
(Optional) If your network has multiple master switches, use this parameter to specify he MAC address of the redundant cluster-root's certificate.
Name of the CA certificate uploaded via the WebUI
Name of the server certificate uploaded via the WebUI.
To use Suite-B encryption in the secure communication between the cluster root and cluster member, specify one of the following Suite-B algorithms l gcm-128: Encryption using 128-bit AES-GCM l gcm-256: Encryption using 256-but AES-GCM
Usage Guidelines
If your network includes multiple master switches each with their own hierarchy of APs and local switches, you can allow APs from one hierarchy to failover to any other hierarchy by defining a cluster of master switches. Each cluster will have one master switch as its cluster root, and all other master switches as cluster members.
The master switch operating as the cluster root will use the control plane security feature to create a self-signed certificate, then certify it's own local switches and APs. Next, the cluster root will send the certificate to each cluster
196 | cluster-root-ip
AOS-W 6.2 | Reference Guide
member, which in turn certifies their own local switches and APs. Since all switches and APs in the cluster get their certificates from the cluster root, they will all have the same trust anchor, and the APs can switch to any other switch in the cluster and still remain connected to the secure network. Issue the cluster-member-ip command on the switch you want to define as the cluster root to select the certificate or define the IPsec key for secure communication between the cluster root and each cluster member.
Once the cluster root has defined an IPsec key or certificate for all cluster members, you must access each of the member switches and issue the command cluster-root-ip to define the IPsec key or certificate for communication to the cluster root.
For information on installing certificates on your switch, refer to the Management Utilities chapter of the AOS-W User Guide.
Example
The following command defines the IPsec key for communication between the cluster member and the root switch172.21.45.22: (host) (config) #cluster-root-ip 172.21.45.22 ipsec ipseckey1
Related Commands
Parameter
Description
Mode
control-planesecurity
Configure the control plane security profile.
Config mode
show cluster-config
Show the multi-master cluster configuration for the control Enable mode plane security feature.
show cluster-switches Issue this command on a master switch using control plane security in a multi-master environment to show other the other switches to which it is connected.
Enable mode
Command History
Release AOS-W 5.0 AOS-W 6.1
Modification
Command introduced.
The ipsec-factory-cert and ipsec-custom-cert parameters were introduced to allow certificate-based authentication of cluster members.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on cluster member switches
AOS-W 6.2 | Reference Guide
cluster-root-ip | 197
configure terminal
configure terminal
Description
This command allows you to enter configuration commands.
Syntax
No parameters.
Usage Guidelines
Upon entering this command, the enable mode prompt changes to: (host) (config) # To return to enable mode, enter Ctrl-Z or exit.
Example
The following command allows you to enter configuration commands: (host) # configure terminal
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
198 | configure terminal
AOS-W 6.2 | Reference Guide
control-plane-security
control-plane-security auto-cert-allow-all auto-cert-allowed-addrs <ipaddress-start> <ipaddress-end> auto-cert-prov cpsec-enable no ...
Description
Configure the control plane security profile by identifying APs to receive security certificates.
Syntax
Parameter auto-cert-allow-all
auto-cert-allowed-addrs <ipaddress-start> <ipaddress-end>
auto-cert-prov
cpsec-enable
Description
When you issue the control-plane-security auto-certallow-all command, the switch will send a certificate to all associated APs when auto certificate provisioning is enabled. When disabled, the switch sends certificates only to APs whose IP addresses are in the ranges specified by auto-cert-allowed-addrs.
Use this command to define a specific range of AP IP addresses. The switch will send certificates to the APs in this IP range when auto certificate provisioning is enabled. Identify a range by entering the starting IP address and the ending IP address in the range, separated by a single space. You can repeat this command as many times as necessary to define multiple IP ranges.
Issue this command to enable automatic certificate provisioning. When this feature is enabled, the switch will attempt to send certificates to associated APs. To disable this feature, use the command no auto-certprov. Automatic certificate provisioning is disabled by default
Issue this command to enable control plane security. To disable this feature, use the command no cpsecenable. Control plane security is enabled by default.
Usage Guidelines
Switches enabled with control plane security will only send certificates to APs that you have identified as valid APs on the network. If you are confident that all campus APs currently on your network are valid APs, you can configure automatic certificate provisioning to send certificates from the switch to each campus AP, or to all campus APs within a specific range of IP addresses. If you want closer control over each AP that gets certified, you can manually add individual campus APs to the secure network by adding each AP's information to a campus AP whitelist.
Example
The following command defines a range of IP addresses that should receive certificates from the switch, and enables the control plane security feature: (host)(config) # control-plane-security
auto-cert-allowed-addrs 10.21.18.10 10.21.10.90
AOS-W 6.2 | Reference Guide
control-plane-security | 199
cpsec-enable
Related Commands
Command show control-plane-security
Description
Show the current configuration of the control plane security profile.
Mode Config mode
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Config mode on master or local switches
200 | control-plane-security
AOS-W 6.2 | Reference Guide
controller-ip
controller-ip [loopback|vlan <VLAN ID>] no ...
Description
This command sets the switch IP to the loopback interface address or a specific VLAN interface address.
Syntax
Parameter loopback vlan
VLAN ID
Description Sets the switch IP to the loopback interface. Set the switch IP to a VLAN interface. Specifies the VLAN interface ID.
Default disabled -- --
Usage Guidelines
This command allows you to set the switch IP to the loopback interface address or a specific VLAN interface address. If the switch IP command is not configured then the switch IP defaults to the loopback interface address. If the loopback interface address is not configured then the first configured VLAN interface address is selected. Generally, VLAN 1 is the factory default setting and thus becomes the switch IP address.
Example
The following command sets the switch IP address to VLAN interface 6. (host) (config) #controller-ip vlan 6
Related Commands
(host) (config) #show controller-ip
Command History
This command was introduced in AOS-W 3.4
Command Information
Platform Available on all platforms
License Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
controller-ip | 201
controller-ipv6
controller-ipv6 [loopback|vlan <VLAN ID>] no ...
Description
This command sets the default IPv6 address of the switch to the IPv6 loopback interface address or a specific VLAN interface address.
Syntax
Parameter loopback vlan
VLAN ID
Description Sets the switch IP to the loopback interface. Set the switch IP to a VLAN interface. Specifies the VLAN interface ID.
Default disabled -- --
Usage Guidelines
This command allows you to set the default IPv6 address of the switch to the IPv6 loopback interface address or a specific IPv6 VLAN interface address. If the switch IPv6 command is not configured then the switch IP defaults to the loopback interface address. If the loopback interface address is not configured then the first configured VLAN interface address is selected. Generally, VLAN 1 is the factory default setting and thus becomes the switch IP address.
Example
The following command sets the switch IP address to VLAN interface 6. (host) (config) #controller-ipv6 vlan 6
Related Commands
(host) (config) #show controller-ipv6
Command History
This command is introduced in AOS-W 6.1.
Command Information
Platform Available on all platforms
License Base operating system
Command Mode Config mode on master switches
202 | controller-ipv6
AOS-W 6.2 | Reference Guide
copy
copy flash: <srcfilename> {flash: <destfilename> | scp: <scphost> <username> <destfilename> tftp: <tftphost> <destfilename> | usb: partition {0|1} <destfilename>} ftp: <ftphost> <user> <filename> system: partition {0|1} | running-config {flash: <filename> | ftp: <ftphost> <user> <password> <filename>
[<remote-dir>] | startup-config | tftp: <tftphost> <filename>} | scp: <scphost> <username> <filename> {flash: <destfilename>| system: partition [0|1]}| startup-config {flash: <filename> | tftp: <tftphost> <filename>} | system: partition {<srcpartition> 0|1} [<destpartition> 0 | 1] | tftp: <tftphost> <filename> {flash: <destfilename> | system: partition [0|1]} usb: partition <partition-number> <filename> flash: <destfilename>
Description
This command copies files to and from the switch.
Syntax
Parameter flash:
srcfilename flash: destfilename tftp: tftphost usb: partition ftp: ftphost user filename 0|1 running-config flash: filename ftp:
Description Copy the contents of the switch's flash file system, the system image, to a specified destination. Full name of the flash file to be copied. Copy the file to the flash file system. Specify the new name of the copied file. Copy the file to a TFTP server. Specify the IP address or hostname of the TFTP server. Copy the file to an attached USB storage device. Specify the partition on the USB device. Copy a file from the FTP server. Specify the IP address or hostname of the FTP server. User account name required to access the FTP server. Full name of the file to be copied. Specify the system partition to save the file. Copy the active, running configuration to a specified destination. Copy the configuration to the flash file system. Specify the new name of the copied configuration file. Using FTP, copy the configuration to an FTP server.
AOS-W 6.2 | Reference Guide
copy | 203
Parameter ftphost user password remote-dir startup-config tftp: tftphost scp:
scphost username filename flash: destfilename system: startup-config flash: filename tftp: tftphost system: srcpartition destpartition tftp:
tftphost filename flash: destfilename
Description Specify the IP address of the FTP server. User account name required to access the FTP server. Password required to access the FTP server. Specify a remote directory, if needed. Copy the active, running configuration to the start-up configuration. Using TFTP, copy the configuration to a TFTP server Specify the IP address or hostname of the TFTP server. Copy an AOS-W image file or file from the flash file system using the Secure Copy protocol. The SCP server or remote host must support SSH version 2 protocol. Specify the IP address of the SCP server or remote host. User account name required to access the SCP server or remote host. Specify the absolute path of the filename to be copied. Copy the file to the flash file system. Specify the new name of the copied file. Copy the file to the system partition. Copy the startup configuration to a specified flash file or to a TFTP server. Copy the file to the flash file system. Specify the new name of the copied startup configuration file. Using TFTP, copy the startup configuration to a TFTP server Specify the IP address or hostname of the TFTP server. Copy the specified system partition Disk partition from which to copy the system data, as either 0 or 1. Disk partition to copy the system data to, as either 0 or 1. Copy a file from the specified TFTP server to either the switch or another destination. This command is typically used when performing a system restoration, or to pull a specified file name into the wms database. Specify the IP address or hostname of the TFTP server. Full name of the file to be copied. Copy the file to the flash file system Specify the new name of the copied file.
204 | copy
AOS-W 6.2 | Reference Guide
Parameter system usb: partition filename flash: destfilename
Description Copy the file to the system partition. Copy a file from an attached USB device to the flash file system. Specify the partition on the USB device. Full name of the file to be copied. Copy the file to the flash file system Specify the new name of the copied file.
Usage Guidelines
Use this command to save back-up copies of the configuration file to an FTP or TFTP server, or to load a saved file from an FTP or TFTP server.
Three partitions reside on the file system flash. Totalling 256MB, the three partitions provide space to hold the system image files (in partitions 1 and 2 which are 45MB each) and user files (in partition 3, which is 165MB). System software runs on the system partitions; the database, DHCP, startup configuration, and logs are positioned on the user partition.
To restore a database, copy the database from the network server and import the database.
To restore a configuration file, copy the file from network server to the switch's flash system then copy the file from the flash system to the system configuration. This ensures that you do not accidentally overwrite your system startup configuration file.
Unlike the switch's flash, the USB device has more than two partitions; not just 0 and 1. When copying a file from a USB device, you must know which partition the target file is on. Use the show storage command to identify the location of the file to identify the correct USB partition.
Example
The following commands copy the configuration file named engineering from the TFTP server to the switch's flash file system and then uses that file as the startup configuration. This example assumes the startup configuration file is named default.cfg: (host) (config) #copy tftp: 192.0.2.0 engineering flash: default.bak copy flash: default.bak flash: default.cfg
Command History
This command was introduced in AOS-W 1.0.
AOS-W 1.0 AOS-W 6.2
Modification Introduced for the first time. The USB parameters introduced.
AOS-W 6.2 | Reference Guide
copy | 205
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config modes on master switches
206 | copy
AOS-W 6.2 | Reference Guide
cp-bandwidth-contract
cp-bandwidth-contract <name> {mbits <1..2000>}|{kbits <256..2000000>}
Description
This command configures a bandwidth contract traffic rate which can then be associated with a whitelist session ACL.
Syntax
Parameter <name> mbits <1..2000> kbits <256..2000000>
Description Name of a bandwidth contract. Set a bandwidth rate inn mbits/seconds. Set a bandwidth rate in kbits/seconds.
Example
The following example configures a bandwidth contract named "cp-rate" with a rate of 10,000Kbps. (host)(config) #cp-bandwidth-contract cp-rate kbits 10000
Related Commands
Command show cp-bwcontracts
firewall cp
Description
Mode
Display a list of Control Processor (CP) bandwidth Enable or Config modes contracts for whitelist ACLs.
This command creates a new whitelist ACL and
Enable or Config modes
can associate a bandwidth contract with that ACL.
Command History
This command was introduced in AOS-W 3.4
Command Information
Platforms All platforms
Licensing
Command Mode
This command requires the PEFNG Config mode on master switches license.
AOS-W 6.2 | Reference Guide
cp-bandwidth-contract | 207
crypto-local ipsec sa-cleanup
crypto-local ipsec sa-cleanup
Description
Issue this command to clean IPsec security associations (SAs).
Syntax
No parameters
Usage Guidelines
Use this command to remove old IPsec security associations if remote APs on your network still use an old SA after upgrading to a newer version of AOS-W.
Command History
This command was introduced in AOS-W 6.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
208 | crypto-local ipsec sa-cleanup
AOS-W 6.2 | Reference Guide
crypto dynamic-map
crypto dynamic-map <name> <priority> no ... set pfs {group1|group2|group19|group20} set security-association lifetime seconds <seconds> set transform-set <name1> [<name2>] [<name3>] [<name4>] version v1|v2
Description
This command configures a new or existing dynamic map.
Syntax
Parameter <name> <priority> no
set pfs
Description Range
Name of the -- map.
Priority of the 1-10000 map.
Negates a
--
configured
parameter.
Enables
--
Perfect
Forward
Secrecy
(PFS) mode.
Use one of
the following:
l group1:
768-bit
Diffie
Hellman
prime
modulus
group.
l group2:
1024-bit
Diffie
Hellman
prime
modulus
group.
l group19:
256-bit
random
Diffie
Hellman
ECP
modulus
group.
l group20:
384-bit
random
Default -- 10000 --
group1
AOS-W 6.2 | Reference Guide
crypto dynamic-map | 209
Parameter
Description Range
Diffie Hellman ECP modulus group.
set security-association lifetime seconds <seconds>
Configures the lifetime, in seconds, for the security association (SA).
300-86400
set transform-set
Name of the -- transform set for this dynamic map. You can specify up to four transform sets. You configure transform sets with the crypto ipsec transform-set command.
version
Specify the -- version of IKE protocol the switch uses to set up a security association (SA) in the IPsec protocol suite
l v1:IKEv1
l v2: IKEv2
Default no limit defaulttransform
v1
Usage Guidelines
Dynamic maps enable IPsec SA negotiations from dynamically addressed IPsec peers. Once you have defined a dynamic map, you can optionally associate that map with the default global map using the command crypto map global-map.
Example
The following command configures a dynamic map: (host) (config)# crypto dynamic-map dmap1 100 set pfs group2 set security-association lifetime seconds 300
210 | crypto dynamic-map
AOS-W 6.2 | Reference Guide
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced
The version parameter was introduced. The pfs parameter was modified to support the group19 and group20 PFS group values.
Command Information
Platforms All platforms
Licensing
Command Mode
The group19 and group20 PFS options requires the Advanced Cryptography (ACR) license. All other parameters are available in the base operating system.
Config mode on master switches
AOS-W 6.2 | Reference Guide
crypto dynamic-map | 211
crypto ipsec
crypto ipsec mtu <max-mtu> transform-set <transform-set-mtu> esp-3des|esp-aes128|esp-aes128-gcm|esp-aes192|espaes256|esp-aes256-gcm|esp-des esp-md5-hmac|esp-null-hmac|esp-sha-hmac}
Description
This command configures IPsec parameters.
Syntax
Parameter
Description
mtu <max-mtu>
Configure the IPsec Maximum Transmission Unit (MTU) size. The supported range is 1024 to 1500 and the default is 1500.
transform-set <transform-set- Create or modify a transform set. mtu>
esp-3des
Use ESP with 168-bit 3DES encryption.
esp-aes128
Use ESP with 128-bit AES encryption.
esp-aes128-gcm
Use ESP with 128-bit AES-GCM encryption.
esp-aes192
Use ESP with 192-bit AES encryption.
esp-aes256
Use ESP with 256-bit AES encryption.
esp-aes256-gcm
Use ESP with 256-bit AES-GCM encryption.
esp-des
Use ESP with 56-bit DES encryption.
esp-md5-hmac
Use ESP with the MD5 (HMAC variant) authentication algorithm
esp-null-hmac
Use ESP with no authentication. This option is not recommended.
esp-sha-hmac
Use ESP with the SHA (HMAC variant) authentication algorithm.
Usage Guidelines
Define the Maximum Transmission Unit (MTU) size allowed for network transmissions using IPsec security, and create or edit transform sets that define a specific encryption and authentication type.
Example
The following command configures 3DES encryption and MD5 authentication for a transform set named set2: (host) (config)# crypto ipsec transform-set set2 esp-3des esp-md5-hmac
212 | crypto ipsec
AOS-W 6.2 | Reference Guide
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced.
The esp-aes128-gcm and esp-aes256-gcm transform-set parameters were introduced.
Command Information
Platforms All platforms
Licensing
Command Mode
The esp-aes128-gcm and esp-aes56-gcm transform-set parameters require the Advanced Cryptography (ACR) license. All other parameters are available in the base OS.
Config mode on master switches
AOS-W 6.2 | Reference Guide
crypto ipsec | 213
crypto isakmp
crypto isakmp address <peer-address> netmask <mask>} disable eap-passthrough eap-mschapv2|eap-peap|eap-tls enable groupname <name> key <keystring> address <peer-address> netmask <mask> udpencap-behind-natdevice enable|disable packet-dump
Description
This command configures Internet Key Exchange (IKE) parameters for the Internet Security Association and Key Management Protocol (ISAKMP).
Syntax
Parameter address
<peer-address> netmask
<mask> disable eap-passthrough
enable groupname
<name> key
<keystring>
address <peer-address>
netmask <mask>
Description
Configure the IP address for the group key.
IP address for the group key, in dotted-decimal format.
Configure the IP netmask for the group key.
Subnet mask for the group key.
Disable IKE processing.
Select one of the following authentication types for IKEv2 user authentication using EAP. l eap-mschapv2 l eap-peap l eap-tls
Enable IKE processing.
Configure the IKE Aggressive group name. Aggressive-mode IKE is a 3packet IKE exchange that does not provide identity-protection, but is faster, because fewer messages are exchanged.
Name of the IKE aggressive group.
Configure the IKE preshared key.
Configure the value of the IKE PRE-SHARED key. The key must be between 6-64 characters long.
Configure the IP address for the group key.
An IP for the group key, in dotted-decimal format.
Configure the netmask for the group key IP address.
A subnet mask, in dotted-decimal format
214 | crypto isakmp
AOS-W 6.2 | Reference Guide
Parameter udpencap-behindnatdevice
enable
disable packet-dump
Description
Configure NAT-T if switch is behind NAT device. (For Windows VPN Dialer only)
Enable Nat-T. This is the recommended setting if the switch is behind a NAT device.
Disable Nat-T.
Issue this command in enable mode to troubleshoot an IPsec tunnel establishment by looking at the packet exchanges between the switch and the remote AP or the other IPsec peer. The packet dump output is saved to a file named ike.pcap. NOTE: This is a testing feature only, and should not be enabled on a production network. To disable this feature, use the command no crypto isakmp packet-dump.
Usage Guidelines
Use this command to configure the IKE pre-shared key, set the EAP authentication method for IKEv2 clients using EAP user authentication, and enable source NAT if the IP addresses of clients need to be translated to access the network.
Example
The following command configures an ISAKMP peer IP address and subnet mask. After configuring an ISAKMP address and netmask, you will be prompted to enter the IKE preshared key. (host)(config) #crypto isakmp address 10.3.14.21 netmask 255.255.255.0 Key:*******Re-Type Key:*******
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced. The eap-passthrough parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
crypto isakmp | 215
crypto isakmp policy
crypto isakmp policy authentication pre-share|rsa-sig|ecdsa-256|ecdsa-384 encryption 3DES|AES128|AES192|AES256|DES group 1|2|19|20 hash md5|sha|sha1-96|sha2-256-128|sha2-384-192 prf PRF-HMAC-MD5|PRF-HMAC-SHA1|PRF-HMAC-SHA256|PRF-HMAC-SHA384 lifetime <seconds> version v1|v2
Description
This command configures Internet Key Exchange (IKE) policy parameters for the Internet Security Association and Key Management Protocol (ISAKMP).
Syntax
Parameter policy
<priority>
authentication pre-share
rsa-sig ecdsa-256 ecdsa-384 encryption 3DES AES128 AES192 AES256 DES group 1
2 19
Description Configure an IKE policy Specify a number from 1 to 10,000 to define a priority level for the policy. The higher the number, the higher the priority level. Configure the IKE authentication method. Use Pre Shared Keys for IKE authentication. This is the default authentication type. Use RSA Signatures for IKE authentication. Use ECDSA-256 signatures for IKE authentication. Use ECDSA-384 signatures for IKE authentication. Configure the IKE encryption algorithm. Use 168-bit 3DES-CBC encryption algorithm. This is the default encryption value. Use 128-bit AES-CBC encryption algorithm. Use 192-bit AES-CBC encryption algorithm. Use 256-bit AES-CBC encryption algorithm. Use 56-bit DES-CBC encryption algorithm. Configure the IKE Diffie Hellman group. Use the 768-bit Diffie Hellman prime modulus group. This is the default group setting. Use the 1024-bit Diffie Hellman prime modulus group. Use the 256-bit random Diffie Hellman ECP modulus group.
216 | crypto isakmp policy
AOS-W 6.2 | Reference Guide
Parameter 20
hash md5 sha SHA1-96
Description Use the 384-bit random Diffie Hellman ECP modulus group
Use MD5 as the hash algorithm. Use SHA-1 as the hash algorithm. This is the default policy algorithm. Use SHA1-96 as the hash algorithm.
SHA2-256-128 SHA2-384-192 prf
lifetime <seconds> version
Use SHA2-256-128 as the hash algorithm.
Use SHA2-384-192 as the hash algorithm.
Set one of the following pseudo-random function (PRF) values for an IKEv2 policy: l PRF-HMAC-MD5 (default) l PRF-HMAC-SHA1 l PRF-HMAC-SHA256 l PRF-HMAC-SHA384
Specify the lifetime of the IKE security association (SA), from 300 - 86400 seconds.
Specify the version of IKE protocol for the IKE policy l v1: IKEv1 l v2: IKEv2
Usage Guidelines
To define settings for a ISAKMP policy, issue the command crypto isakmp policy <priority> then press Enter. The CLI will enter config-isakmp mode, which allows you to configure the policy values.
Example
The following command configures an ISAKMP peer IP address and subnet mask.. After configuring an ISAKMP address and netmask, you will be prompted to enter the IKE preshared key. (host)(config) #crypto isakmp policy1 (host)(config-isakmp) #auth rsa-sig Key:*******Re-Type Key:*******
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced.
The following parameters were introduced. l authentication ecdsa-256 l authentication ecdsa-384 l hash sha1-96 l hash sha2-256-128 l hash sha2-384-192 l prf
AOS-W 6.2 | Reference Guide
crypto isakmp policy | 217
Command Information
Platforms Licensing
All platforms
The following settings require the Advanced Cryptogram (ACR) license: l hash algorithm: SHA-256-128, SHA-384-192 l Diffie-Hellman (DH) Groups: 19 and 20 l Pseudo-Random Function (PRF): PRF-HMAC-SHA256, PRF-HMAC-
SHA384 l Authentication: ecdsa-256 and ecdsa-384
All other parameters are supported in the base OS.
Command Mode
Config mode on master switches
218 | crypto isakmp policy
AOS-W 6.2 | Reference Guide
crypto-local ipsec-map
crypto-local
crypto-local ipsec-map <map> <priority> dst-net <ipaddr> <mask> force-natt no ... local-fqdn <local_id_fqdn> peer-cert-dn <peer-dn> peer-fqdn any-fqdn|{peer-fqdn <peer-id-fqdn>} peer-ip <ipaddr> pre-connect {disable|enable} set ca-certificate <cacert-name> set pfs {group1|group2|group19|group20} set security-association lifetime seconds <seconds> set server-certificate <cert-name> set transform-set <name1> [<name2>] [<name3>] [<name4>] src-net <ipaddr> <mask> trusted {disable|enable} version v1|v2 vlan <vlan>
Description
This command configures IPsec mapping for site-to-site VPN.
Syntax
Parameter <map> <priority> dst-net force-natt
no local-fqdn <local_id_fqdn>
peer-cert-dn <peer-dn>
Description
Range
Default
Name of the IPsec map.
--
--
Priority of the entry.
1-
--
9998
IP address and netmask for the destination network.
--
--
Include this parameter to always
--
--
enforce UDP 4500 for IKE and
IPsec. This option is disabled by
default.
Negates a configured parameter.
--
--
If the local switch has a dynamic IP address, you must specify the fully qualified domain name (FQDN) of the switch to configure it as a initiator of IKE aggressive-mode.
If you are using IKEv2 to establish a site-to-site VPN to a statically addressed remote peer, identify the peer device by entering its certificate subject name in the Peer Certificate Subject Name field
AOS-W 6.2 | Reference Guide
crypto-local ipsec-map | 219
Parameter peer-ip <ipaddr>
peer-fqdn any-fqdn fqdn-id <peer-id-fqdn>
pre-connect set ca-certificate <cacert-name> set pfs
220 | crypto-local ipsec-map
Description
Range
Default
If you are using IKEv1 to establish a --
--
site-to-site VPN to a statically
addressed remote peer, identify the
peer device by enteringIP address
of the peer gateway.
NOTE: If you are configuring an
IPsec map for a static-ip switch with
a dynamically addressed remote
peer, you must leave the peer
gateway set to its default value of
0.0.0.0.
For site-to-site VPNs with dynamically addressed peers, specify a fully qualified domain name (FQDN) for the switch.
anyfqdn fqdnid
anyfqdn
If the switch is defined as a dynamically addressed responder, you can select any-fqdn to make the switch a responder for all VPN peers,
Specify the FQDN of a peer to make the switch a responder for one specific initiator only.
Enables or disables pre-connection.
enable/ disable
disabled
User-defined name of a trusted CA --
--
certificate installed in the switch.
Use the show crypto-local pki
TrustedCA command to display the
CA certificates that have been
imported into the switch.
If you enable Perfect Forward Secrecy (PFS) mode, new session keys are not derived from previously used session keys. Therefore, if a key is compromised, that compromised key will not affect any previous session keys. To enable this feature, specify one of the following Perfect Forward Secrecy modes:
l group1 : 768-bit Diffie Hellman prime modulus group.
l group2: 1024-bit Diffie Hellman prime modulus group.
l group19: 256-bit random Diffie Hellman ECP modulus group. (For IKEv2 only)
l group20: 384-bit random Diffie Hellman ECP modulus group. (For IKEv2 only)
group1 group2 group19 group20
disabled
AOS-W 6.2 | Reference Guide
Parameter set security-association lifetime seconds <seconds> set server-certificate <cert-name>
set transform-set <name1>
src-net <ipaddr> <mask> trusted version v1|v2
vlan <vlan>
Description
Range
Default
Configures the lifetime, in seconds, for the security association (SA).
30086400
7200 seconds
User-defined name of a server
--
--
certificate installed in the switch.
Use the show crypto-local pki
ServerCert command to display the
server certificates that have been
imported into the switch.
Name of the transform set for this
--
IPsec map. One transform set name
is required, but you can specify up
to four transform sets. Configure
transform sets with the crypto ipsec
transform-set command.
defaulttransform
IP address and netmask for the source network.
--
--
Enables or disables a trusted tunnel.
enable/ disable
disabled
Select the IKE version for the IPsec
v1
map.
l v1: IKEv1
l v2: IKEv2
VLAN ID. Enter 0 for the loopback.
1-
--
4094
Usage Guidelines
You can use switches instead of VPN concentrators to connect sites at different physical locations.
You can configure separate CA and server certificates for each site-to-site VPN. You can also configure the same CA and server certificates for site-to-site VPN and client VPN. Use the show crypto-local ipsec-map command to display the certificates associated with all configured site-to-site VPN maps; use the tag <map> option to display certificates associated with a specific site-to-site VPN map.
AOS-W supports site-to-site VPNs with two statically addressed switches, or with one static and one dynamically addressed switch. By default, site-to-site VPN uses IKE Main-mode with Pre-Shared-Keys to authenticate the IKE SA. This method uses the IP address of the peer, and therefore will not work for dynamically addressed peers.
To support site-site VPN with dynamically addressed devices, you must enable IKE Aggressive-Mode with Authentication based on a Pre-Shared-Key. A switch with a dynamic IP address must be configured to be the initiator of IKE Aggressive-mode for Site-Site VPN, while the switch with a static IP address must be configured as the responder of IKE Aggressive-mode.
Examples
The following commands configures site-to-site VPN between two switches: (host) (config) #crypto-local ipsec-map sf-chi-vpn 100
src-net 101.1.1.0 255.255.255.0 dst-net 100.1.1.0 255.255.255.0
AOS-W 6.2 | Reference Guide
crypto-local ipsec-map | 221
peer-ip 172.16.0.254 vlan 1 trusted
(host) (config) #crypto-local ipsec-map chi-sf-vpn 100 src-net 100.1.1.0 255.255.255.0 dst-net 101.1.1.0 255.255.255.0 peer-ip 172.16.100.254 vlan 1 trusted
For a dynamically addressed switch that initiates IKE Aggressive-mode for Site-Site VPN:
(host) (config)crypto-local ipsec-map <name> <priority> src-net <ipaddr> <mask> dst-net <ipaddr> <mask> peer-ip <ipaddr> local-fqdn <local_id_fqdn> vlan <id> pre-connect enable|disable trusted enable
For the Pre-shared-key: crypto-local isakmp key <key> address <ipaddr> netmask <mask>
For a static IP switch that responds to IKE Aggressive-mode for Site-Site VPN:
(host) (config)crypto-local ipsec-map <name2> <priority> src-net <ipaddr> <mask> dst-net <ipaddr> <mask> peer-ip 0.0.0.0 peer-fqdn fqdn-id <peer_id_fqdn> vlan <id> trusted enable
For the Pre-shared-key: crypto-local isakmp key <key> fqdn <fqdn-id>
For a static IP switch that responds to IKE Aggressive-mode for Site-Site VPN with One PSK for All FQDNs:
(host) (config)crypto-local ipsec-map <name2> <priority> src-net <ipaddr> <mask> peer-ip 0.0.0.0 peer-fqdn any-fqdn vlan <id> trusted enable
For the Pre-shared-key for All FQDNs: crypto-local isakmp key <key> fqdn-any
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced.
The peer-cert-dn and peer-fqdn parameters were introduced. The set pfs command introduced the group19 and group20 parameters.
222 | crypto-local ipsec-map
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing
Command Mode
The group19 and group20 PFS options requires the Advanced Cryptography (ACR) license. All other parameters are available in the base operating system.
Config mode on master switches
AOS-W 6.2 | Reference Guide
crypto-local ipsec-map | 223
crypto-local isakmp ca-certificate
crypto-local isakmp ca-certificate <cacert-name>
Description
This command assigns the Certificate Authority (CA) certificate used to authenticate VPN clients.
Syntax
Parameter ca-certificate
Description
User-defined name of a trusted CA certificate installed in the switch. Use the show crypto-local pki TrustedCA command to display the CA certificates that have been imported into the switch.
Usage Guidelines
You can assign multiple CA certificates. Use the show crypto-local isakmp ca-certificate command to view the CA certificates associated with VPN clients.
Example
This command configures a CA certificate: crypto-local isakmp ca-certificate TrustedCA1
Command History
This command was introduced in AOS-W 3.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
224 | crypto-local isakmp ca-certificate
AOS-W 6.2 | Reference Guide
crypto-local isakmp certificate-group
crypto-local isakmp certificate-group server-certificate <server_certificate> ca-certificate <ca_cert-name>
Description
The command configures an IKE Certificate Group for VPN Clients.
Syntax
Parameter
Description
server-certificate <server-certificate> The IKE server certificate name for VPN clients.
ca-certificate <ca-cert-name>
The IKE CA Certificate for this server certificate.
Range
1-64 characters
1-64 characters
Default --
--
Usage Guidelines
This feature allows you to create a certificate group so you can access multiple types of certificates on the same switch.
Example
This command configures a certificate group that consists of server certificate named newtest with the CA certificate TrustedCA. crypto-local isakmp certificate-group server-certificate newtest ca-certificate TrustedCA
Command History
This command was introduced in AOS-W 6.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
crypto-local isakmp certificate-group | 225
crypto-local isakmp dpd
crypto-local isakmp dpd idle-timeout <seconds> retry-timeout <seconds> retry-attempts <number>
Description
This command configures IKE Dead Peer Detection (DPD) on the local switch.
Syntax
Parameter idle-timeout retry-timeout retry-attempts
Description Idle timeout, in seconds. Retry interval, in seconds. Number of retry attempts.
Range 10-3600 2-60 3-10
Default 22 seconds 2 seconds 3
Usage Guidelines
DPD is enabled by default on the switch for site-to-site VPN.
Example
This command configures DPD parameters: crypto-local isakmp dpd idle-timeout 60 retry-timeout 3 retry-attempts 5
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
226 | crypto-local isakmp dpd
AOS-W 6.2 | Reference Guide
crypto-local isakmp key
crypto-local isakmp key <key> {address <peer-ipaddr> netmask <mask>}|{fqdn <ike-id-fqdn>} |fqdn-any
Description
This command configures the IKE preshared key on the local switch for site-to-site VPN.
Syntax
Parameter key <key> address <peer-ipaddr> netmask <mask> fqdn <ike-id-fqdn> fqdn-any
Description IKE preshared key value, between 6-64 characters. IP address for the preshared key. Netmask for the preshared key. Configure the PSK for the specified FQDN. Configure the PSK for any FQDN.
Usage Guidelines
This command configures the IKE preshared key.
Example
The following command configures an IKE preshared key for site-to-site VPN: crypto-local isakmp key R8nD0mK3y address 172.16.100.1 netmask 255.255.255.255
Command History
Version AOS-W 3.0 AOS-W 3.4
Modification Command introduced. The fqdn and fqdn-any parameters were introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
crypto-local isakmp key | 227
crypto-local isakmp permit-invalid-cert
crypto-local isakmp permit-invalid-cert
Description
This command allows invalid or expired certificates to be used for site-to-site VPN.
Syntax
No parameters.
Usage Guidelines
This command allows invalid or expired certificates to be used for site-to-site VPN.
Command History
This command was introduced in AOS-W 3.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
228 | crypto-local isakmp permit-invalid-cert
AOS-W 6.2 | Reference Guide
crypto-local isakmp sa-cleanup
crypto-local isakmp sal-cleanup
Description
This command enables the cleanup of IKE SAs.
Syntax
No parameters.
Usage Guidelines
This command removes expired ISAKMP SAs from the switch.
Command History
This command was introduced in AOS-W 6.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
crypto-local isakmp sa-cleanup | 229
crypto-local isakmp server-certificate
crypto-local isakmp server-certificate <cert-name>
Description
This command assigns the server certificate used to authenticate the switch for VPN clients using IKEv1 or IKEv2
Syntax
Parameter server-certificate
Description
User-defined name of a server certificate installed in the switch. Use the show crypto-local pki ServerCert command to display the server certificates that have been imported into the switch.
Usage Guidelines
This certificate is only for VPN clients and not for site-to-site VPN clients. You can assign separate server certificate for use with VPN clients using IKEv1 and clients using IKEv2. Use the show crypto-local isakmp servercertificate command to view the server certificate associated with VPN clients. You must import and configure server certificates separately on master and local switches.
There is a default server certificate installed in the switch, however this certificate does not guarantee security for production networks. Best practices is to replace the default certificate with a custom certificate issued for your site or domain by a trusted CA. You can use the WebUI to generate a Certificate Signing Request (CSR) to submit to a CA and then import the signed certificate received from the CA into the switch. For more information, see "Managing Certificates" in the AOS-W User Guide.
Example
This command configures a server certificate: crypto-local isakmp server-certificate MyServerCert
Command History
This command was introduced in AOS-W 3.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
230 | crypto-local isakmp server-certificate
AOS-W 6.2 | Reference Guide
crypto-local isakmp xauth
crypto-local isakmp xauth
Description
This command enables IKE XAuth for VPN clients.
Syntax
No parameters.
Usage Guidelines
The no crypto-local isakmp xauth command disables IKE XAuth for VPN clients. This command only applies to VPN clients that use certificates for IKE authentication. If you disable XAuth, then a VPN client that uses certificates will not be authenticated using username/password. You must disable XAuth for Cisco VPN clients using CAC Smart Cards.
Example
This command disables IKE XAuth for Cisco VPN clients using CAC Smart Cards: no crypto-local isakmp xauth
Command History
This command was introduced in AOS-W 3.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
crypto-local isakmp xauth | 231
crypto-local pki
crypto-local pki CRL <name> <filename> IntermediateCA <name> <filename> OCSPResponderCert <certname> <filename> OCSPSignerCert <certname> <filename> PublicCert <name> <filename> ServerCert <name> <filename> TrustedCA <name> <filename> global-oscp-signer-cert rcp <name>
Issue this command to configure a local certificate, OCSP signer or responder certificate and Certificate Revocation List (CRL). You can also list revocation checkpoints and enable the responder service.
Syntax
Parameter CRL
<name> <filename> IntermediateCA <name> <filename> OCSPResponderCert <certname> <filename> OCSPSignerCert <certname> <filename> PublicCert
<certname> <filename> ServerCert
Description Specifies a Certificate Revocation list. Validation of the CRL is done when it imported through the WebUI (requires the CA to have been already present). CRLs can only be imported through the WebUI.
Name of the CRL.
Original imported filename of the CRL.
Configures an intermediate CA certificate
Name of the intermediate CA certificate.
Original imported filename of the CRL.
Configures a OCSP responder certificate.
Name of responder certificate.
Original imported filename of the responder certificate.
Configures a OCSP signer certificate.
Name of the signer certificate.
Original imported filename of the signer certificate.
Public key of a certificate. This allows an application to identify an exact certificate.
Name of the signer certificate.
Original imported filename of the signer certificate.
Server certificate. This certificate must contain both a public and a private key (the public and private keys must match). You can import a server certificate in either PKCS12 or x509 PEM format; the certificate is stored in x509 PEM DES encrypted format on the switch.
232 | crypto-local pki
AOS-W 6.2 | Reference Guide
Parameter
Description
<certname>
Name of the signer certificate.
<filename>
Original imported filename of the signer certificate.
TrustedCA
Trusted CA certificate. This can be either a root CA or intermediate CA. AlcatelLucent encourages (but does not require) an intermediate CA's signing CA to be the switch itself.
<certname>
Name of the signer certificate.
<filename>
Original imported filename of the signer certificate.
global-ocsp-signer-cert
Specifies the global OCSP signer certificate to use when signing OCSP responses if there is no check point specific OSCP signer certificate present. If the ocsp-signer-cert is not specified, OCSP responses are signed using the global OCSP signer certificate. If this is not present, than an error message is sent out to clients.
NOTE: The OCSP signer certificate (if configured) takes precedence over the global OCSP signer certificate as this is check point specific.
rcp <name>
Specifies the revocation check point. A revocation checkpoint is automatically created when a TrustedCA or IntermediateCA certificate is imported on the switch.
service-ocsp-responder
This is a global knob that turns the OCSP responder on or off. The default is off (disabled). To enable this option a CRL must be configured for this revocation checkpoint as this is the source of revocation information in the OCSP responses.
Usage Guidelines
This command lets you configure the switch to perform real-time certificate revocation checks using the Online Certificate Status Protocol (OCSP) or traditional certificate validation using the Certificate Revocation List (CRL) client. Refer to the Certificate Revocation chapter in the AOS-W 6.2 User Guide for more information on how to configure this feature using both the WebUI and CLI.
Example
This example configures the switch as an OCSP responder.
The revocation check point is specified as CAroot. (The revocation check point CAroot was automatically created when the CAroot certificate was previously uploaded to this switch.) The OCSP signer certificate is RootCA-Ocsp_ signer. The CRL file is Security1-WIN-05PRGNGEKAO-CA-unrevoked.crl The OCSP responder is enabled. crypto-local pki service-ocsp-responder crypto-local pki rcp CARoot
ocsp-signer-cert RootCA-Ocsp_signer crl-location file Security1-WIN-05PRGNGEKAO-CA-unrevoked.crl enable-ocsp-responder
Related Commands
Command
Description
crypto-local pki rcp Specifies the certificates that are used to sign OCSP responses for this revocation check point
Mode Config mode
AOS-W 6.2 | Reference Guide
crypto-local pki | 233
Command
show crypto-local pki
Description
This command shows local certificate, OCSP signer or responder certificate and CRL data and statistics.
Mode Config mode
Command History
Version AOS-W 3.2 AOS-W 6.1
Modification
Command introduced.
The following parameters were introduced: l CRL l Intermediate CA l OCSPResponderCert l OCSPSignerCert l global-ocsp-signer-cert l rcp l service-ocsp-responder
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master or local switches
234 | crypto-local pki
AOS-W 6.2 | Reference Guide
crypto-local pki rcp
crypto-local pki rcp <name> [crl-location <file>]|[enable-ocsp-responder]|[ocsp-responder-cert <ocsp-respondercert>]|[ocsp-signer-cert <ocsp-signer-cert>]| [ocsp-url <ocsp-url>]|[revocation-check [None|<method1>|<method2>]]
Description
Use this command to specify the certificates used to sign OCSP for the revocation check point.
Syntax
Parameter rcp
crl-location <file> enable-ocsp-responder ocsp-responder-cert <ocspresponder-cert> ocsp-signer-cert <ocsp-signercert>
ocsp-url <ocsp-url>
revocation-check None <method1> <method2>
Description
Specifies the revocation check point. A revocation checkpoint is automatically created when a TrustedCA or IntermediateCA certificate is imported on the switch.
Location of the CRL that is used for the rcp. The specified CRL filename must be previously imported onto the switch before using this option.
Enables the OCSP Responder for this revocation checkpoint. The default is disabled.
Specifies the certificate that is used to verify OCSP responses. The certificate name has to be one of the certificates shown as output when the CLI command show crypto-local pki ocsprespondercert is used.
Specifies the certificate that is used to sign OCSP responses for this revocation check point. The OCSP signer certificate must be previously imported on to the switch (using the WebUI). The OCSP signer cert can be the same trusted CA as the check point, a designated OCSP signer certificate issued by the same CA as the check point or some other local trusted authority. If the ocsp-signer-cert is not specified, OCSP responses are signed using the global OCSP signer certificate. If that is not present, than an error message is sent out to clients. NOTE: The OCSP signer certificate (if configured) takes precedence over the global OCSP signer certificate as this is check point specific.
Configures the OCSP Server URL. The URL has to be in the form of http://my.responder.com/path. This parameter can contain only one responder URL at time.
Configures the revocation check methods used for this rcp. Options include: l None (default)- No revocation checks are performed for
certificates being verified against this trusted CA. l CRL- CRL is used for the revocation check method. l OCSP- OCSP is used for the revocation check method. You can configure one fallback method.
AOS-W 6.2 | Reference Guide
crypto-local pki rcp | 235
Usage Guidelines
This command lets you configure the check methods that are used for this revocation check point.. You can configure the switch to perform real-time certificate revocation checks using the Online Certificate Status Protocol (OCSP) or traditional certificate validation using the Certificate Revocation List (CRL) client. Refer to the Certificate Revocation chapter in the AOS-W 6.2 User Guide for more information on how to configure this feature using both the WebUI and CLI.
Example
This example configures an OCSP client with the revocation check method as OCSP with CRL configured as the back up method.
The OCSP responder certificate is configured as RootCA-Ocsp_responder. The corresponding OCSP responder service is available at http://10.4.46.202/ocsp. The revocation check method is OCSP with CRL configured as the back up method.
crypto-local pki rcp CARoot ocsp-responder-cert RootCA-Ocsp_responder ocsp-url http://10.4.46.202/ocsp crl-location file Security1-WIN-05PRGNGEKAO-CA-unrevoked.crl revocation-check ocsp crl
Related Commands
Command crypto-local pki
show crypto-local pki
Description
This command configures a local certificate, OCSP signer or responder certificate and Certificate Revocation List (CRL). You can also list revocation checkpoints and enable the responder service.
This command shows local certificate, OCSP signer or responder certificate and CRL data and statistics.
Mode Config mode
Config mode
Command History
Version AOS-W 3.2 AOS-W 6.1
Modification
Command introduced.
The following parameters were introduced: l CRL l Intermediate CA l OCSPResponderCert l OCSPSignerCert l global-ocsp-signer-cert l rcp l service-ocsp-responder
236 | crypto-local pki rcp
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master or local switches
AOS-W 6.2 | Reference Guide
crypto-local pki rcp | 237
crypto map global-map
crypto map global-map <map-number> ipsec-isakmp {dynamic <dynamic-map-name>}|{ipsec <ipsecmap-name>}
Description
This command configures the default global map.
Syntax
Parameter
Description
<map-number>
dynamic
Use a dynamic map.
<dynamic-map-name>} Name of the dynamic map.
ipsec
Use a IPsec map.
<ipsec-map-name>
Name of an IPsec map.
Usage Guidelines
This command identifies the dynamic or ipsec map used as the default global map. If you have not yet defined a dynamic or ipsec map, issue the command crypto map global-map or crypto-local ipsec-map to define map parameters.
Example
The following command configures the global map with the dynamic map named dynamic_map_2.
(host)(config) #crypto map global-map 2 ipsec-isakmp dynamic dynamic_map_2
Command History
This command was introduced in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
238 | crypto map global-map
AOS-W 6.2 | Reference Guide
crypto pki
crypto pki csr {rsa key_len <key_val> |{ec curve-name <key_val>} common_name <common_val> country <country_val> state_or_province <state> city <city_val> organization <organization_val> unit <unit_val> email <email_val>
Description
Generate a certificate signing request (CSR) for the captive portal feature.
Syntax
Parameter
Description
rsa key_len <key_val>
Generate a certificate signing request with a Rivest, Shamir and Adleman (RSA) key with one of the following supported RSA key lengths: l 1024 l 2048 l 4096
ec curve-name <key_val>
Generate a certificate signing request with an elliptic-curve (EC) key, with one of the following EC types: l secp256r1 l secp384r1
common_name <common_val>
Specify a common name, e.g., www.yourcompany.com.
country <country_val>
Specify a country name, e.g., US or CA.
state_or_province <state>
Specify the name of a state or province.
city <city_val>
Specify the name of a city.
organization <organization_val> Specify the name of an organization unit, e.g., sales.
unit <unit_val>
Specify a unit value, e.g. EMEA.
email <email_val>
Specify an email address, in the format name@mycompany.com.
Usage Guidelines
Use this command in enable mode to generate a CSR for the Captive Portal feature. Display the CSR output by entering the command show crypto pki csr. Note that this command will only generate CSR on a switch running AOS-W 3.x or later. Earlier versions require that you generate the certificate externally.
Example
The following command configures a CSR for a user with the email address jdoe@example.com.
(host)(config) #crypto pki csr key 1024 common_name www.example.lcom country US state_or_ province ca city Sunnyvale organization engineering unit pubs email jdoe@example.com
AOS-W 6.2 | Reference Guide
crypto pki | 239
Command History
Release AOS-W 3.1 AOS-W 6.1
Modification
Command introduced.
The ec curve-name parameter was introduced to support certificate signing requests using an elliptic-curve (EC) key
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
240 | crypto pki
AOS-W 6.2 | Reference Guide
crypto pki-import
crypto pki-import {der|pem|pfx|pkcs12|pkcs7} {CRL|IntermediateCA|OCSPResponderCert|OCSPSignerCert|PublicCert|ServerCert|TrustedCA} <name>
Description
Import certificates for the captive portal feature.
Syntax
Parameter der
CRL <name> IntermediateCA <name> OCSPResponderCert <name> OCSPSignerCert <name> PublicCert <name> ServerCert <name> TrustedCA <name> pem
pfx
pkcs12
pkcs7
Description Import the following certificates in DER format. Import a CRL. Import an intermediate CA certificate. Import an OCSP Responder certificate.
Import an OCSP Signer certificate. Import a public certificate. Import a server certificate. Import a trusted CA certificate. Import a certificate in x509 PEM format. See certificate types under the der parameter. Import a certificate in PFX format. See certificate types under the der parameter. Import a certificate in PKCS12 format.See certificate types under the derparameter. Import a certificate in PKCS7 format. See certificate types under the der parameter.
Usage Guidelines
Use this command in enable mode to install a CSR for the Captive Portal feature.
Example
The following command installs a server certificate in DER format. (host)(config) #crypto pki-import der ServerCert cert_20
AOS-W 6.2 | Reference Guide
crypto pki-import | 241
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced.
The CRL, IntermediateCA, OCSPResponderCert, OCSPSignerCert parameters were added.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
242 | crypto pki-import
AOS-W 6.2 | Reference Guide
database synchronize
database synchronize {[period <minutes>][rf-plan-data]}
Description
This command manually synchronizes the database between a pair of redundant master switches and includes RF Plan data when synchronizing with standby.
Syntax
Parameter period
<minutes> rf-plan-data
Description Configures the interval for automatic database synchronization. Interval in minutes. Range is 1 -- 25200 minutes. Includes the RF Plan data when synchronizing with standby mode.
Usage Guidelines
This command takes effect immediately. If a peer is not configured, the switch displays an error message. Use the database synchronize period command in config mode to configure the interval for automatic database synchronization. Use the database synchronize rf-plan-data command to include RF plan data when synchronizing in standby mode.
Example
The following commands cause the database on the active master switch to synchronize with the standby in 25 minute intervals. The synchronization includes RF plan data. (host) (config) #database synchronize period 25 (host) (config) #database synchronize rf-plan-data
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config modes on master switches
AOS-W 6.2 | Reference Guide
database synchronize | 243
delete
delete {filename <filename>|ssh-host-addr <ipaddr>|ssh-known-hosts}
Description
This command deletes a file or RSA signature entry from flash.
Syntax
Parameter filename ssh-host-addr
ssh-known -hosts
Description
Name of the file to be deleted.
Deletes the entry stored in flash for the RSA host signature created when you run the copy scp command.
Deletes all entries stored in flash for the RSA host signatures created when you run the copy scp command.
Usage Guidelines
To prevent running out of flash file space, you should delete files that you no longer need. The copy scp command creates RSA signatures whenever it connects to a new host. These host signatures are stored in the flash file system.
Example
The following command deletes a file: (host) #delete filename december-config-backup.cfg The following command deletes an RSA signature entry from flash: (host) #delete ssh-host-addr 10.100.102.101 The following command deletes all RSA signature entries from flash: (host) #delete ssh-known-hosts
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
244 | delete
AOS-W 6.2 | Reference Guide
destination
destination <STRING> <A.B.C.D> [invert]
Description
This command configures the destination name and address.
Syntax
Parameter STRING A.B.C.D invert
Description Destination name. Destination IP address or subnet. Specifies all destinations except this one.
Range Alphanumeric -- --
Usage Guidelines
You can configure the name and IP address of the destination. You can optionally configure the subnet, or invert the selection.
Example
The following example configures a destination called "Home" with an IP address of 10.10.10.10. (host) (config) #destination Home 10.10.10.10
Command History
Release AOS-W 1.0 AOS-W 3.0
Modification Command introduced Replaced with netdestination command.
Command Information
Availability Can be used only on the master switch.
License
Requires the PEF NG license
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
destination | 245
dir
dir
Description
This command displays a list of files stored in the flash file system.
Syntax
No parameters.
Usage Guidelines
Use this command to view the system files associated with the switch.
Output from this command includes the following:
l The first column contains ten place holders that display the file permissions. n First place holder: Displays - for a file or d for directory. n Next three place holders: Display file owner permissions: r for read access, w for write access permissions, x for executable. n Following three place holders: Display member permissions: r for read access or x for executable. n Last three place holders: Display non-member permissions: r for read access or x for executable.
l The second column displays the number of links the file has to other files or directories. l The third column displays the file owner. l The fourth column displays group/member information. l The remaining columns display the file size, date and time the file was either created or last modified, and the file
name.
Example
The following command displays the files currently residing on the system flash:
(host) #dir
The following is sample output from this command:
-rw-r--r--rw-r--r--rw-r--r--rw-r--r--rw-r--r--rw-r--r--rw-r--r--
1 root 1 root 1 root 1 root 1 root 1 root 2 root
root root root root root root root
9338 Nov 20 10:33 class_ap.csv 1457 Nov 20 10:33 class_sta.csv 16182 Nov 14 09:39 config-backup.cfg 14174 Nov 9 2005 default-backup-11-8-05.cfg 16283 Nov 9 12:25 default.cfg 22927 Oct 25 12:21 default.cfg.2006-10-25_20-21-38 19869 Nov 9 12:20 default.cfg.2006-11-09_12-20-22
Command History
Introduced in AOS-W 1.0
Command Information
Platform Available on all platforms
License
Available in the base operating system
Command Mode
Enable and Config modes on local or master switches
246 | dir
AOS-W 6.2 | Reference Guide
dynamic-ip
dynamic-ip restart
Description
This command restarts the PPPoE or DHCP process.
Syntax
No parameters.
Usage Guidelines
This command can be used to renegotiate DHCP or PPPoE parameters. This can cause new addresses to be assigned on a VLAN where the DHCP or PPPoE client is configured.
Command History
This command was introduced in AOS-W 3.0
Command Information
Platform Available on all platforms
License
Command Mode
Available in the base operating system Enable mode on master switches
AOS-W 6.2 | Reference Guide
dynamic-ip | 247
eject usb
eject usb:
Description
Use this command to eject a USB device from your switch.
Usage Guidelines
Use this command to safely remove an external USB device,
Example
(host) #eject usb:
Command History
Command introduced in AOS-W 6.2
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
User mode on master or local switches in enable mode.
248 | eject usb
AOS-W 6.2 | Reference Guide
enable
enable
Description
This user mode command switches the switch into enable mode. The enable mode allows you to access privileged commands.
Usage Guidelines
To enter enable mode, you are prompted for the password configured during the switch's initial setup. Passwords display as asterisks (*) when you enter them. To change the password, use the config mode enable secret command. If you lose or forget the enable mode password, resetting the default admin user password also resets the enable mode password to "enable". See the AOS-W User Guide for more information about resetting the admin and enable mode passwords. When you are in enable mode, the CLI prompt ends with the hash (#) character.
Example
The following example allows you to enter enable mode on the switch. (host) >enable Password: ****** (host) #
Command History
Command introduced in AOS-W 1.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
User mode on master or local switches
AOS-W 6.2 | Reference Guide
enable | 249
enable bypass
enable bypass no enable bypass
Description
This config mode command allows you to bypass the enable password prompt and go directly to the privileged command mode.
Usage Guidelines
Use this command when you want to access the privileged mode directly after logging in to the switch and not be prompted to enter an enable mode password. To restore the enable mode password prompt, use the config mode command. no enable bypass.
Example
The following example allows bypass the enable mode password prompt. (host) #configure terminal Enter Configuration commands, one per line. End with CNTL/Z
(host) (config) #enable bypass (host) (config) #
Command History
Version AOS-W 6.0
Modification Command introduced
Command Information
Platform Available on all platforms
License
Available in the base operating system
Command Mode
Config mode on master or local switches
250 | enable bypass
AOS-W 6.2 | Reference Guide
enable secret
enable secret
Description
This config mode command allows you to change the password for enable mode.
Usage Guidelines
Use this command to change the password for enable mode. To reset the password to the factory default of "enable", use the no enable command.
The password must not contain a space and special characters.
Example
The following example allows you to change the password for enable mode. (host) #configure terminal Enter Configuration commands, one per line. End with CNTL/Z
(host) (config) #enable secret Password:****** Re-Type password: ****** (host) (config) #
Command History
Version AOS-W 1.0 AOS-W 3.3.2
Modification Command introduced Updated with restriction of the secret phase
Command Informatio
Platform Available on all platforms
License
Available in the base operating system
Command Mode
Config mode on master or local switches
AOS-W 6.2 | Reference Guide
enable secret | 251
encrypt
encrypt {disable|enable}
Description
This command allows passwords and keys to be displayed in plain text or encrypted.
Syntax
Parameter disable enable
Description Passwords and keys are displayed in plain text Passwords and keys are displayed encrypted
Default -- enabled
Usage Guidelines
Certain commands, such as show crypto isakmp key, display configured key information. Use the encrypt command to display the key information in plain text or encrypted.
Example
The following command allows passwords and keys to be displayed in plain text: (host) #encrypt disable
Command History
Introduced in AOS-W 3.0
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Enable mode on master or local switches
252 | encrypt
AOS-W 6.2 | Reference Guide
esi group
esi group <name> [no]|[ping <attributes>]|[server <server>]
Description
This command configures an ESI group.
Syntax
Parameter no ping
server
Description
Negates any configured parameter.
Specify the name of a set of ping checking attributes defined via the command esi ping. Only one set is allowed.
Specify the name of a server to be added or removed from the ESI group. You define ESI servers via the command esi server.
Usage Guidelines
Use the show esi group command to show ESI group information.
Example
The following command sets up the ESI group named "fortinet." (host) (config) #esi group fortinet
ping default server forti_1
Command History
Introduced in AOS-W 2.5
Command Information
Platform Available on all platforms
License Requires the PEFNG license
Command Mode
Config mode on master or local switches
AOS-W 6.2 | Reference Guide
esi group | 253
esi parser domain
esi parser domain <name> [no] | [peer <peer-ip>] | [server <ipaddr>]
Description
This command configures an ESI syslog parser domain.
Syntax
Parameter no peer
server
Description
Negates any configured parameter
(Optional.) Specify the IP address of an another switch in this domain. These switches are notified when the user cannot be found locally. This command is needed only when multiple switches share a single ESI server
Specify the IP address of the ESI server to which the switch listens.
Usage Guidelines
The ESI parser is a generic syslog parser on the switch that accepts syslog messages from external third-party appliances such as anti-virus gateways, content filters, and intrusion detection systems. It processes syslog messages according to user-defined rules and takes configurable actions on the corresponding system users. ESI servers (see esi server on page 261) are configured into domains to which ESI syslog parser rules (see esi parser rule on page 255) are applied. Use the show esi parser domains command to show ESI parser domain information.
Example
The following commands configure a virus syslog parser domain named "fortinet" which contains the ESI server "forti_1" with the trusted IP address configured using the command esi server. (host) (config) #esi parser domain fortinet server 10.168.172.3
Command History
Introduced in AOS-W 3.1.
Command Information
Platform Available on all platforms
License Requires the PEFNG license
Command Mode
Config mode on master or local switches
254 | esi parser domain
AOS-W 6.2 | Reference Guide
esi parser rule
esi parser rule <rule_name> [condition <expression>] | [domain <name>] | [enable] [match {ipaddr <expression> | mac <expression> | user <expression> }] | [no] | [position <position>] | [set {blacklist | role <role>} | [test {msg <msg> | file <filename>}]
Description
This command creates or changes an ESI syslog parser rule.
Syntax
Parameter condition domain enables match
no position set
test
Description
Specifies the REGEX (regular expression) pattern that uniquely identifies the syslog.
(Optional.) Specify the ESI syslog parser domain to which this rule applies. If not specified, the rule matches with all configured ESI servers.
Enables this rule. Note: The condition, user match, and set action parameters must be configured before the rule can be enabled.
Specifies the user identifier to match, where ipaddr, mac, and user take a REGEX pattern that uniquely identifies the user.
Negates any configured parameter.
Specifies the rule's priority position.
Specifies the action to take: blacklist the user or change the user role. Note: The role entity should be configured before it is accepted by the ESI rule.
Test the regular expression output configured in the esi parser rules command. You can test the expressions against a specified syslog message, or test the expression against a sequence of syslog messages contained in a file.
Range -- --
--
--
-- 132; 1 highest --
--
Default -- -- Not enabled --
-- -- --
--
Usage Guidelines
The user creates an ESI rule by using characters and special operators to specify a pattern that uniquely identifies a syslog message. This "condition" defines the type of message and the ESI domain to which this message pertains. The rule contains three major fields:
l Condition: The pattern that uniquely identifies the syslog message type.
AOS-W 6.2 | Reference Guide
esi parser rule | 255
l User: The username identifier. It can be in the form of a name, MAC address, or IP address. l Action: The action to take when a rule match occurs.
Once a condition match occurs, no further rule-matching will be made. For the matching rule, only one action can be defined.
For more details on the character-matching operators, repetition operators, and expression anchors used to defined the search or match target, refer to the External Services Interface chapter in the AOS-W 6.2 User Guide .
Use the show esi parser rules command to show ESI parser rule information. Use the show esi parser stats command to show ESI parser rule statistical information
Examples
The following command sets up the Fortigate virus rule named "forti_rule." This rule parses the virus detection syslog scanning for a condition match on the log_id value (log_id=) and a match on the IP address (src=).
(host) (config) #esi parser rule forti_rule condition "log_id=[0-9]{10}[ ]" match ipaddr "src=(.*)[ ]" set blacklist domain fortinet enable
In this example, the corresponding ESI expression is:
< Sep 26 18:30:02 log_id=0100030101 type=virus subtype=infected src=1.2.3.4 >
The following example of the test command tests a rule against a specified single syslog message.
test msg "26 18:30:02 log_id=0100030101 type=virus subtype=infected src=1.2.3.4"
< 26 18:30:02 log_id=0100030101 type=virus subtype=infected src=1.2.3.4 >
=====
Condition:
Matched with rule "forti_rule"
User:
ipaddr = 1.2.3.4
=====
The following example of the test command tests a rule against a file named test.log, which contains several syslog messages.
test file test.log
< Sep 26 18:30:02 log_id=0100030101 type=virus subtype=infected src=1.2.3.4 >
==========
Condition:
Matched with rule "forti_rule"
User:
ipaddr = 1.2.3.4
==========
< Oct 18 10:43:40 cli[627]: PAPI_Send: To: 7f000001:8372 Type:0x4 Timed out. >
==========
Condition:
No matching rule condition found
==========
< Oct 18 10:05:32 mobileip[499]: <500300> <DBUG> |mobileip| Station 00:40:96:a6:a1:a4,
10.0.100.103: DHCP FSM received event: RECEIVE_BOOTP_REPLY current: PROXY_DHCP_NO_PROXY,
next: PROXY_DHCP_NO_PROXY >
==========
Condition:
No matching rule condition found
==========
Command History
Introduced in AOS-W 3.1
256 | esi parser rule
AOS-W 6.2 | Reference Guide
Command Information
Platform Available on all platforms.
License Requires the PEFNG license
Command Mode
Config mode on master and local switches
AOS-W 6.2 | Reference Guide
esi parser rule | 257
esi parser rule-test
esi parser rule-test [file <filename>] | [msg <msg>]
Description
This command allows you to test all of the enabled parser rules.
Syntax
Parameter Description
file
Tests against a specified file containing more than one syslog message.
msg
Tests against a syslog message, where <msg> is the message text.
Usage Guidelines
You can test the enabled parser rules against a syslog message input, or run the expression through a file system composed of syslog messages. The command shows the match result as well as the user name parsed for each message.
Example
The following command tests against a specified single syslog message. (host) (config) #esi parser rule-test msg "26 18:30:02 log_ id=0100030101 type=virus subtype=infected src=1.2.3.4"
< 26 18:30:02 log_id=0100030101 type=virus subtype=infected src=1.2.3.4 >
=====
Condition:
Matched with rule "forti_rule"
User:
ipaddr = 1.2.3.4
=====
The following command tests against a file named test.log, which contains several syslog messages. esi parser rule-test file test.log
< Sep 26 18:30:02 log_id=0100030101 type=virus subtype=infected src=1.2.3.4 >
==========
Condition:
Matched with rule "forti_rule"
User:
ipaddr = 1.2.3.4
==========
< Oct 18 10:43:40 cli[627]: PAPI_Send: To: 7f000001:8372 Type:0x4 Timed out. >
==========
Condition:
No matching rule condition found
==========
< Oct 18 10:05:32 mobileip[499]: <500300> <DBUG> |mobileip| Station 00:40:96:a6:a1:a4,
10.0.100.103: DHCP FSM received event: RECEIVE_BOOTP_REPLY current: PROXY_DHCP_NO_PROXY,
next: PROXY_DHCP_NO_PROXY >
==========
Condition:
No matching rule condition found
==========
258 | esi parser rule-test
AOS-W 6.2 | Reference Guide
Command History
Introduced in AOS-W 3.1
Command Information
Platform Available on all platforms
License Requires the PEFNG license
Command Mode
Config mode on master and local switches
AOS-W 6.2 | Reference Guide
esi parser rule-test | 259
esi ping
esi ping <ping-name> [frequency <seconds>] | [no] | [retry-count <count>] | [timeout <seconds>] |
Description
This command specifies the ESI ping health check configuration.
Syntax
Parameter frequency no retry-count timeout
Description Specifies the ping frequency in seconds. Negates any configured parameter Specifies the ping retry count Specifies the ping timeout in seconds.
Usage Guidelines
Use the show esi ping command to show ESI ping information.
Example
The following command specifies the ping health check attributes. (host) (config) #esi ping default
frequency 5 retry-count 2 timeout 2
Command History
Introduced in AOS-W 2.5
Command Information
Platform Available on all platforms
License Requires the PEFNG license
Range 165536 -- 165536 165536
Default
-- 2 2
Command Mode
Config mode on master and local switches
260 | esi ping
AOS-W 6.2 | Reference Guide
esi server
esi server <name> [dport <tcp-udp-port>] | [mode {bridge | nat | route}] | [no] | [trusted-ip-addr <ip-addr> [health-check]] | [trusted-port <slot/port>] | [untrusted-ip-port <ip-addr> [health-check]] | [untrusted-port <slot/port>]
Description
This command configures an ESI server.
Syntax
Parameter
Description
dport
Specifies the NAT destination TCP/UDP port.
mode
Specifies the ESI server mode of operation: bridge, nat, or route
no
Negates any configured parameter.
trusted-ip-addr
Specifies the server IP address on the trusted network. As an option, you can also enable a health check on the specified address
trusted-port
Specifies the port connected to the trusted side of the ESI server; slot/port format.
untrusted-ip-addr Specifies the server IP address on the untrusted network. As an option, you can also enable a health check on the specified address
untrusted-port
Specifies the port connected to the untrusted side of the ESI server.
Usage Guidelines
Use the show esi server command to show ESI server information.
Example
The following command specifies the ESI server attributes. (host) (config) #esi server forti_1
mode route trusted-ip-addr 10.168.172.3 untrusted-ip-addr 10.168.171.3
Command History
Introduced in AOS-W 2.5.
AOS-W 6.2 | Reference Guide
esi server | 261
Command Information
Platform Available on all platforms
License Requires the PEFNG license
Command Mode
Config mode on master and local switches
262 | esi server
AOS-W 6.2 | Reference Guide
exit
exit
Description
This command exits the current CLI mode.
Syntax
No parameters.
Usage Guidelines
Upon entering this command in a configuration sub-mode, you are returned to the configuration mode. Upon entering this command in configuration mode, you are returned to the enable mode. Upon entering this command in enable mode, you are returned to the user mode. Upon entering this command in user mode, you are returned to the user login.
Example
The following sequence of exit commands return the user from the interface configuration sub-mode to the user login: (host) (config-if) #exit (host) (config) #exit (host) #exit (host) >exit User:
Command History
Introduced in AOS-W 3.0
Command Information
Platform Available on all platforms
License
Available in the base operating system
Command Mode
Available in the following command modes: l User l Enable l Config l Config sub-modes
AOS-W 6.2 | Reference Guide
exit | 263
export
export gap-db <filename>
Description
This command exports the global AP database to the specified file.
Syntax
Parameter <filename>
Description Name of the file to which the global AP database is exported.
Usage Guidelines
This command is intended for system troubleshooting. You should run this command only when directed to do so by an Alcatel-Lucent support representative. The global AP database resides on a master switch and contains information about known APs on all switches in the system. You can view the contents of the global AP database with the show ap database command.
Example
The following command exports the global AP database to a file: (host) #export gap-db global-ap-db
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platform Available on all platforms
License
Available in the base operating system
Command Mode Enable mode on master switches.
264 | export
AOS-W 6.2 | Reference Guide
firewall
firewall {allow-tri-session|amsdu|attack-rate {cp <rate>|ping <number>|session <number>}|broadcastfilter-arp|cp|bwcontracts-subnet-broadcast|cp-bandwidth-contract|tcp-syn <number>|bwcontracts-subnet-broadcast |deny-inter-user-bridging |deny-inter-usertraffic|disable-ftp-server |disable-ftp-server| disable-stateful-h323| disable-statefulsccp-processing|disable-stateful-sip-processing |disable-stateful-ua-processing|disablestateful-vocera-processing|drop-ip-fragments| |enable-per-packet-logging |enforce-tcp-handshake|enforce-tcp-sequence|gre-call-idprocessing|imm-fb|local-valid-users|log-icmp-error|prevent-dhcp-exhaustion|prohibit-arpspoofing|prohibit-ip-spoofing |prohibit-rst-replay|public-access|session-idle-timeout <seconds>|session-mirror-destination {ip-address <ipaddr>|session-tunnel-fib|port <slot>/<port>} |shape-mcastfirew|voip-wmm-content-enforcement}
Description
This command configures firewall options on the switch.
Syntax
Parameter allow-tri-session
amsdu attack-rate broadcast-filter-arp
bwcontracts-subnet-broadcast
Description
Range
Allows three-way session when performing -- destination NAT. This option should be enabled when the switch is not the default gateway for wireless clients and the default gateway is behind the switch. This option is typically used for captive portal configuration.
Aggregated Medium Access Control Service Data Units (AMSDU) packets are dropped if this option is enabled.
Sets rates which, if exceeded, can indicate -- a denial of service attack.
If enabled, all broadcast ARP requests are -- converted to unicast and sent directly to the client. You can check the status of this option using the show ap active and the show datapath tunnel command. If enabled, the output will display the letter a in the flags column.
NOTE: This parameter is deprecated. Use the virtual AP profile to configure this setting.
Applies bw contracts to local subnet
--
broadcast traffic.
Default disabled
disabled -- disabled
--
cp cp-bandwidth-contract
See firewall cp on page 270
See firewall cp-bandwidth-contract on page 272
AOS-W 6.2 | Reference Guide
firewall | 265
Parameter deny-inter-user-bridging
deny-inter-user-traffic
Description
Range
Prevents the forwarding of Layer2 traffic
--
between wired or wireless users. You can
configure user role policies that prevent
Layer3 traffic between users or networks
but this does not block Layer2 traffic. This
option can be used to prevent traffic, such
as Appletalk or IPX from being forwarded. If
enabled, traffic (all non-IP traffic) to
untrusted port or tunnel is also blocked.
Denies downstream traffic between users in -- a wireless network (untrusted users) by disallowing layer2 and layer3 traffic. This parameter does not depend on the deny-
inter-user-bridging parameter being enabled or disabled.
Default disabled
disabled
disable-ftp-server
disable-stateful-h323processing disable-stateful-sccp-processing disable-stateful-sip-processing
disable-stateful-ua-processing disable-stateful-vocera-processing drop-ip-fragments
enable-bridging enable-per-packet-logging
Disables the FTP server on the switch.
--
Enabling this option prevents FTP transfers.
Enabling this option could cause APs to not
boot up. You should not enable this option
unless instructed to do so by an Alcatel-
Lucent representative.
Disables stateful H.323 processing.
--
Disables SCCP processing.
--
Disables monitoring of exchanges between -- a voice over IP or voice over WLAN device and a SIP server. This option should be enabled only when thee is no VoIP or VoWLAN traffic on the network.
Disables stateful UA processing.
--
Disables stateful VOCERA processing.
--
When enabled, all IP fragments are
--
dropped. You should not enable this option
unless instructed to do so by an Alcatel-
Lucent representative.
Enables bridging when the switch is in fac- -- tory default.
Enables logging of every packet if logging -- is enabled for the corresponding session rule. Normally, one event is logged per session. If you enable this option, each packet in the session is logged. You should not enable this option unless instructed to do so by an Alcatel-Lucent representative, as doing so may create unnecessary overhead on the switch.
disabled
disabled disabled disabled
disabled disabled disabled
disabled disabled
266 | firewall
AOS-W 6.2 | Reference Guide
Parameter enforce-tcp-handshake
enforce-tcp-sequence gre-call-id-processing imm-fb local-valid-users log-icmp-error prevent-dhcp-exhaustion
prohibit-arp-spoofing prohibit-ip-spoofing
prohibit-rst-replay
Description
Range
Prevents data from passing between two
--
clients until the three-way TCP handshake
has been performed. This option should be
disabled when you have mobile clients on
the network as enabling this option will
cause mobility to fail. You can enable this
option if there are no mobile clients on the
network.
Enforces the TCP sequence numbers for all -- packets.
Creates a unique state for each PPTP
--
tunnel. Do not enable this option unless
instructed to do so by a technical support
representative.
Immediately free buffers on OAW-4x50
--
switches. Do not enable this option unless
instructed to do so by a technical support
representative.
Adds only IP addresses, which belong to a -- local subnet, to the user-table.
Logs received ICMP errors. Do not enable -- this option unless instructed to do so by a technical support representative.
Enable check for DHCP client hardware
--
address against the packet source MAC
address. This command checks the frame's
source-MAC against the DHCPv4 client
hardware address and drops the packet if it
does not match. Enabling this feature pre-
vents a client from submitting multiple
DHCP requests with different hardware
addresses, thereby preventing DHCP pool
depletion.
Detects and prohibits arp spoofing. When
--
this option is enabled, possible arp
spoofing attacks are logged and an SNMP
trap is sent.
Detects IP spoofing (where an intruder
--
sends messages using the IP address of a
trusted client). When this option is enabled,
source and destination IP and MAC
addresses are checked; possible IP
spoofing attacks are logged and an SNMP
trap is sent.
Closes a TCP connection in both directions -- if a TCP RST is received from either direction. You should not enable this option unless instructed to do so by an AlcatelLucent representative.
Default disabled
disabled disabled --
disabled disabled disabled
disabled enabled in IPv4 disabled in IPv6 disabled
AOS-W 6.2 | Reference Guide
firewall | 267
Parameter
Description
Range
public-access
Enables a public access mode.
--
session-idle-timeout
Time, in seconds, that a non-TCP session can be idle before it is removed from the session table. You should not modify this option unless instructed to do so by an Alcatel-Lucent representative.
16-259
session-mirror-destination
Destination to which mirrored packets are -- sent. This option is used only for troubleshooting or debugging. Packets can be mirrored in multiple ACLs, so only a single copy is mirrored if there is a match within more than one ACL. You can configure the following l Ethertype to be mirrored with the
Ethertype ACL mirror option. See ip access-list eth on page 344. l IP flows to be mirrored with the session ACL mirror option. See ip access-list session on page 362. l MAC flows to be mirrored with the MAC ACL mirror option. See ip access-list mac on page 360. If you configure both an IP address and a port to receive mirrored packets, the IP address takes precedence.
session-mirror-ipsec
Configures session mirroring of all frames -- that are processed by IPsec. Frames are sent to IP address specified by the sessionmirror-destination option.This option is used only for troubleshooting or debugging.
session-tunnel-fib
Enable session-tunnel based forwarding.
--
NOTE: Best practices is to enable this
parameter only during maintenance
window or off-peak production hours. On
the M3, this parameter only enables tunnel-
based forwarding, as session-based
forwarding does not apply to this platform.
session-voip-timeout
Idle session timeout, in seconds, for sessions that are marked as voice sessions. If no voice packet exchange occurs over a voice session for the specified time, the voice session is removed.
16-300
shape-mcast
Enables multicast optimization and
--
provides excellent streaming quality
regardless of the amount of VLANs or IP
IGMP groups that are used.
voip-wmm-voip-content-enforcement If traffic to or from the user is inconsistent
--
with the associated QoS policy for voice, the
traffic is reclassified to best effort and data
path counters incremented.
This parameter requires the PEFNG
license.
Default -- 15 seconds --
disabled disabled
300 seconds disabled disabled
268 | firewall
AOS-W 6.2 | Reference Guide
Usage Guidelines
This command configures global firewall options on the switch.
Example
The following command disallows forwarding of non-IP frames between users: firewall deny-inter-user-bridging
Related Commands
(host) (config) #show firewall
Command History
Release AOS-W 3.0 AOS-W 3.2 AOS-W 3.3 AOS-W 3.3.2 AOS-W 3.4
Modification
Command introduced.
The wmm-voip-content-enforcement parameter was introduced.
The session-mirror-destination parameter was modified.
The local-valid-users parameter was added.
The voip-proxy-arp parameter was renamed to broadcast-filter-arp and it does not require a Voice license. The prohibit-arp-spoofing parameter was added. The deny-inter-user-traffic parameter was added.
AOS-W 6.0 AOS-W 6.1
AOS-W 6.2 AOS-W 6.2.1
The shape-mcast parameter was added.
The funtionality of the prohibit-ip-spoofing feature was enhanced. In previous versions of AOS-W, this feature checked only the source IP and the source MAC address in the frame. Starting with AOS-W 6.1, this feature also checks the destination IP and the destination MAC address in the frame. The parameter amsdu was added.
The parameter clear-sessions-role-update was deprecated.
The imm-fb parameter was introduced.
Command Information
Platform Available on all platforms
License
Command Mode
Base operating system except the
public-access and voipwmm-voip-contentenforcement parameters which require the PEFNG license.
Config mode on master switches
AOS-W 6.2 | Reference Guide
firewall | 269
firewall cp
firewall cp deny|permit <ip-addr><ip-mask>|any|{host <ip-addr>} proto{<ip-protocol-number> ports <start port number><end port number>}|ftp|http|https|icmp|snmp|ssh|telnet|tftp[bandwidth-contract <name>]
no...
Description
This command creates whitelist session ACLs. Whitelist ACLs consist of rules that explicitly permit or deny session traffic from being forwarded or not to the switch. This prohibits traffic from being automatically forwarded to the switch if it was not specifically denied in a blacklist.The maximum number of entries allowed in the whitelist is 64.
Syntax
Parameter
Description
deny|permit <ip-addr><ip-mask>
Specifies the entry to reject (deny) on the session ACL whitelist. Specifies an entry that is allowed (permit) on the session ACL whitelist.
any
Specifies any IPv4 source address.
host <ip-addr>
Indicates a specific IPv4 source address.
proto
Protocol that the session traffic is using.
IP protocol number
Specifies the IP protocol number that is permitted or denied.
start port
Specifies the starting port, in the port range, on which session traffic is running.
last port
Specifies the last port, in the port range, on which session traffic is running.
ftp
Specifies the File Transfer Protocol.
http
Specifies the Hypertext Trasfer Protocol.
https
Specifies the Secure HTTP Protocol.
icmp
Specifies the Internet Control Message Protocol.
snmp
Specifies the Simple Network Management Protocol.
ssh
Specifies the Secure Shell.
telnet
Specifies the Telnet protocol.
tftp
Specifies the Trivial File Transfer Protocol.
bandwidth-contract <name> Specify the name of a bandwidth contract defined via the cp-bandwidth-contract command.
Range --
-- -- -- 1-255
1-65535
1-65535
-- -- -- -- --
-- -- -- --
Default --
-- -- -- --
--
--
-- -- -- -- --
-- -- -- --
270 | firewall cp
AOS-W 6.2 | Reference Guide
Usage Guidelines
This command turns the session ACL from a blacklist to a whitelist. A rule must exist that explicitly permits the session before it is forwarded to the switch and the last rule in the list denies everything else.
Example
The following command creates a whitelist ACL that allows on with the source address as 10.10.10.10 and the source mask as 2.2.2.2. The protocol is FTP and the the bandwidth contract name is mycontract. (host) (config-fw-cp) #permit 10.10.10.10 2.2.2.2 proto ftp bandwidth-contract name mycontract The following command creates a a whitelist ACL entry that denies traffic using protocol 2 on port 5000 from being forwarded to the switch: (host) (config-fw-cp) #deny proto 6 ports 5000 6000
Related Commands
Command show firewall-cp cp-bandwidth-contract
Description
Show Control Processor (CP) whitelist ACL info.
This command configures a bandwidth contract traffic rate which can then be associated with a whitelist session ACL.
Mode Enable or Config modes Enable or Config modes
Command History
AOS-W 3.4 AOS-W 6.2
Modification
Command introduced.
The permit <ip-addr><ip-mask> parameter was added. The deny <ip-addr> parameter was added. The any parameter was added. The host parameter was added. The ftp, http, https, icmp, snmp, ssh, telnet and tftp parameters were added.
Command Information
Platform Available on all platforms
License
Command Mode
Base operating system, except for noted Config mode on master
parameters
switches
AOS-W 6.2 | Reference Guide
firewall cp | 271
firewall cp-bandwidth-contract
firewall cp-bandwidth-contract {auth|route|sessmirr|trusted-mcast|trusted-ucast |untrusted-mcast|untrusted-ucast} <Rate>
Description
This command configures bandwidth contract traffic rate limits to prevent denial of service attacks.
Syntax
Parameter auth
route sessmirr
trusted-mcast trusted-ucast untrusted-mcast untrusted-ucast
Description Specifies the traffic rate limit that is forwarded to the authentication process. Specifies the traffic rate limit that needs ARP requests. Specifies the session mirrored traffic forwarded to the switch. Specifies the trusted multicast traffic rate limit. Specifies the trusted unicast traffic rate limit. Specifies the untrusted multicast traffic rate limit. Specifies the untrusted unicast traffic rate limit.
Range 1-200 Mbps
Default 1
1-200 Mbps 1 1-200 Mbps 1
1-200 Mbps 2 1-200 Mbps 80 1-200 Mbps 2 1-200 Mbps 10
Usage Guidelines
This command configures firewall bandwidth contract options on the switch.
Example
The following command disallows forwarding of non-IP frames between users: (host) (config) #firewall deny-inter-user-bridging
Related Commands
(host) (config) #show firewall
Command History
Introduced in AOS-W 3.4
Command Information
Platform Available on all platforms
License
This command requires the PEFNG license
Command Mode
Config mode on master switches
272 | firewall cp-bandwidth-contract
AOS-W 6.2 | Reference Guide
firewall-visibility
firewall-visibility no ...
Description
Enables or disables policy enforcement firewall visibility feature.
Syntax
No parameters.
Usage Guideline
When you enable this feature, the Firewall Monitoring page on the Dashboard tab of the WebUI displays the summary of all sessions in the switch aggregated by users, devices, destinations, applications, WLANs, and roles.
Example
The following command enables firewall visibility. (host)(config) #firewall-visibility
Related Commands
Command
Description
Mode
show firewall-visibility Displays the policy enforcement firewall visibility Config or Enable mode process state and status information
Command History
This command is introduced in AOS-W 6.2.
Command Information
Platforms
OAW-4504XM, OAW-4604, OAW-4704, OAW-6000, and OAW-4x50 switches
Licensing
This command requires the PEFNG license
Command Mode Config mode on master or local switch
AOS-W 6.2 | Reference Guide
firewall-visibility | 273
gateway health-check disable
gateway health-check disable
Description
Disable the gateway health check.
Usage Guidelines
The gateway health check feature can only be enabled by Alcatel-Lucent Technical Support. This command disables the gateway health check, and should only be issued under the guidance of the support staff.
Related Commands
Command
show gateway healthcheck
Description
Display the current status of the gateway health-check feature
Mode
This command is available in Config and Enable mode on master and local switches
(host) (config) #show gateway health-check
History
Introduced in AOS-W 3.4
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master or local switches.
274 | gateway health-check disable
AOS-W 6.2 | Reference Guide
guest-access-email
guest-access-email smtp-port smtp-server no...
Description
This command configures the SMTP server which is used to send guest email. Guest email is generated when a guest user account is created or when the Guest Provisioning user sends guest user account email a later time.
Syntax
Parameter smtp-port
<Port number> smtp-server
<IP-Address> no
Description
Identifies the SMTP port through which the guestaccess email is sent.
The SMTP port number.
The SMTP server to which the switch sends the guest-access email.
The SMTP server's IP address.
Deletes the command configuration
Range --
Default --
165535
25
--
--
--
--
--
--
Usage Guidelines
As part of the guest provisioning feature, the guest-access-email command allows you to set up the SMTP port and server that process guest provisioning email. This email process sends email to either the guest or the sponsor whenever a guest user account is created or when the Guest Provisioning user manually sends email from the Guest Provisioning page.
Example
The following command creates a guest-access email profile and sends guest user email through SMTP server IP address 1.1.1.1 on port 25. (host) (config) #guest-access-email (host) (Guest-access Email Profile) # (host) (Guest-access Email Profile) #smtp-port 25 (host) (Guest-access Email Profile) #smtp-server 1.1.1.1
Related Commands
(host) #show guest-access-email (host) #local-userdb-guest add (host) #local-userdb-guest modify (host) #show local-userdb-guest
Command History
AOS-W 3.4
Modification Introduced for the first time.
AOS-W 6.2 | Reference Guide
guest-access-email | 275
Command Information
Platform Available on all platforms
License Available in the base operating system.
Command Mode Config mode on master switches.
276 | guest-access-email
AOS-W 6.2 | Reference Guide
halt
halt
Description
This command halts all processes on the switch.
Syntax
No parameters.
Usage Guidelines
This command gracefully stops all processes on the switch. You should issue this command before rebooting or shutting down to avoid interrupting processes.
Command History
Introduced in AOS-W 3.0
Command Information
Platform Available on all platforms
License Available in the base operating system.
Command Mode
Enable mode on master and local switches.
AOS-W 6.2 | Reference Guide
halt | 277
help
help
Description
This command displays help for the CLI.
Syntax
No parameters.
Usage Guidelines
This command displays keyboard editing commands that allow you to make corrections or changes to the command without retyping. You can also enter the question mark (?) to get various types of command help: l When typed at the beginning of a line, the question mark lists all commands available in the current mode. l When typed at the end of a command or abbreviation, the question mark lists possible commands that match. l When typed in place of a parameter, the question mark lists available options.
Example
The following command displays help: (host) #help
Command History
Available in AOS-W 3.0
Command Information
Platform
License
Available on all platforms Available in the base operating system
Command Mode
Available in the following command modes: l User l Enable l Config
278 | help
AOS-W 6.2 | Reference Guide
hostname
hostname <hostname>
Description
This command changes the hostname of the switch.
Syntax
Parameter hostname
Description The hostname of the switch
Range 1-63
Default See below
Usage Guidelines
The hostname is used as the default prompt. You can use any alphanumeric character, punctuation, or symbol character. To use spaces, plus symbols (+), question marks (?), or asterisks (*), enclose the text in quotes. The default names for the following switches are: l OmniAccess 4306 WLAN Switch: OAW-4306 l OmniAccess 6000 WLAN Switch: OAW-6000 l OmniAccess 4504 WLAN Switch: OAW-4504 l OmniAccess 4604 WLAN Switch: OAW-4604 l OmniAccess 4704 WLAN Switch: OAW-4704
Example
The following example configures the switch hostname to "Switch 1". hostname "Switch 1"
Command History
Introduced in AOS-W 1.0
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Config mode on master and local switches
AOS-W 6.2 | Reference Guide
hostname | 279
ids ap-classification-rule change
id-classification-rule <rule-name> check-min-discovered-aps classify-to-type [neighbor | suspected-rogue] clone conf-level-incr discovered-ap-cnt <discovered-ap-cnt> match-ssids no snr-max <value> snr-min <value> ssid <ssid>
Description
Configure the AP classification rule profile.
Syntax
Parameter <rule-name>
check-min-discovered-aps
classify-to-type [neighbor | suspectedrogue]
clone
conf-level-incr
discovered-ap-cnt <discovered-ap-cnt>
match-ssids
no snr-max <value> snr-min <value> ssid <ssid>
Description
Range
Enter the AP classification rule profile
--
name.
Have the rule check for the minimum number of APs
true false
Specify if the type the AP will be classified, -- neighbor or suspected-rogue, if the rule is matched.
Copy data from another AP classification -- rule profile
Increase the confidence level (in percentage) when the rule matches
0-100
Enter the keyword discovered-ap-cnt followed by the number of APs to be discovered.
0-100
Match SSIDs; match or do not match
true false
Negates any configured parameter
--
Use the maximum SNR value
0-100
Use the minimum SNR value
0-100
Enter the keyword ssid followed by the
--
SSID string to be matched or excluded
Default --
true
suspectedrogue --
5
0
false
-- 0 0 --
Usage Guidelines
AP classification rule configuration is performed only on a master switch. If AMP is enabled via the mobility-manager command, then processing of the AP classification rules is disabled on the master switch. A rule is identified by its
280 | ids ap-classification-rule change
AOS-W 6.2 | Reference Guide
ASCII character string name (32 characters maximum). The AP classification rules have one of the following specifications: l SSID of the AP l SNR of the AP l Discovered-AP-Count or the number of APs that can see the AP Once you have created an AP classification rule, but must ienable it by adding it to the IDS AP Matching Rules profile: ids ap-rule-matching
rule-name <name>
SSID specification
Each rule can have up to 6 SSID parameters. If one or more SSIDs are specified in a rule, an option of whether to match any of the SSIDs, or to not match all of the SSIDs can be specified. The default is to check for a match operation.
SNR specification
Each rule can have only one specification of the SNR. A minimum and/or maximum can be specified in each rule and the specification is in SNR (db).
Discovered-AP-Count specification
Each rule can have only one specification of the Discovered-AP-Count. Each rule can specify a minimum or maximum of the Discovered-AP-count. The minimum or maximum operation must be specified if the DiscoveredAP-count is specified. The default setting is to check for the minimum discovered-AP-count.
Example
The following example configures the AP Configuration Rule Profile named "rule1", then enables the rule by adding it to the IDS AP Matching Rules profile. (host) (config) #ids ap-classification-rule rule1 (host) (IDS AP Classification Rule Profile "rule1") #check-min-discovered-aps (host) (IDS AP Classification Rule Profile "rule1") #classify-to-type neighbor (host) (IDS AP Classification Rule Profile "rule1") ! (host) (config) #ap-rule-matching rule-name rule1
Command History
Release AOS-W 6.0
Modification Command introduced
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ids ap-classification-rule change | 281
ids ap-rule-matching
no rule-name
Description
Configure the IDS active AP rules profile by enabling an AP classification rule.
Syntax
Parameter no rule-name
Description Negates any configured parameter Name of the IDS AP classification rule
Usage Guidelines
This command activates an active AP rule created by the ids ap-classification-rule change command. You must create the rule before you can activate it.
Example
(host) (IDS Active AP Rules Profile) #rule-name rule2
Command History
Release AOS-W 6.0
Modification Command introduced
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
282 | ids ap-rule-matching
AOS-W 6.2 | Reference Guide
ids dos-profile
ids
ids dos-profile <profile> ap-flood-inc-time <seconds> ap-flood-quiet-time <seconds> ap-flood-threshold <number> assoc-rate-thresholds <number> auth-rate-thresholds <number> block-ack-dos-quiet-time chopchop-quiet-time client-ht-40mhz-intol-quiet-time <seconds> client-flood-inc-time client-flood-quiet-time client-flood-threshold client-ht-40mhz-intolerance clone <profile> cts-rate-quiet-time cts-rate-threshold cts-rate-time-interval deauth-rate-thresholds <number> detect-ap-flood detect-block-ack-dos detect-chopchop-attack detect-client-flood detect-cts-rate-anomaly detect-disconnect-station detect-eap-rate-anomaly detect-fata-jack-attack detect-ht-40mhz-intolerance detect-invalid-address detect-malformed-association-request detect-malformed-auth-frame detect-malformed-htie detect-malformed-large-duration detect-omerta-attack detect-overflow-eapol-key detect-overflow-ie detect-power-save-dos-attack detect-rate-anomalies detect-rts-rate-anomaly detect-tkip-replay-attack disassoc-rate-thresholds <number> disconnect-deauth-disassoc-threshold disconnect-sta-assoc-resp-threshold disconnect-sta-quiet-time <seconds> eap-rate-quiet-time <seconds> eap-rate-threshold <number> eap-rate-time-interval <seconds> fata-jack-quiet-time invalid-address-combination-quiet-time malformed-association-request-quiet-time malformed-auth-frame-quiet-time malformed-htie-quiet-time malformed-large-duration-quiet-time no ... omerta-quiet-time omerta-threshold overflow-eapol-key-quiet-time overflow-ie-quiet-time power-save-dos-min-frames
AOS-W 6.2 | Reference Guide
ids dos-profile | 283
power-save-dos-quiet-time power-save-dos-threshold probe-request-rate-thresholds <number> probe-response-rate-thresholds <number> rts-rate-quiet-time rts-rate-threshold rts-rate-time-interval spoofed-deauth-blacklist tkip-replay-quiet-time
Description
This command configures traffic anomalies for denial of service (DoS) attacks.
Syntax
Parameter <profile> ap-flood-inc-time ap-flood-quiet-time
ap-flood-threshold assoc-rate-thresholds auth-rate-thresholds block-ack-dos-quiet-time
chopchop-quiet-time client-ht-40mhz-intol-quiettime <seconds>
client-flood-inc-time
Description
Range
Name that identifies an instance of the -- profile. The name must be 1-63 characters.
Time, in seconds, during which a configured number of fake AP beacons must be received to trigger an alarm.
0-36000
After an alarm has been triggered by a fake AP flood, the time, in seconds, that must elapse before an identical alarm may be triggered.
60-360000
Number of fake AP beacons that must be received within the flood increase time to trigger an alarm.
0-100,000
Rate threshold for associate request
--
frames.
Rate threshold for authenticate frames. --
Time to wait, in seconds, after detecting an attempt to reset the receive window using a forged block ACK add.
60-360000 seconds
Time to wait, in seconds, after detecting a ChopChop attack after which the check can be resumed.
60-360000 seconds
Controls the quiet time (when to stop reporting intolerant STAs if they have not been detected), in seconds, for detection of 802.11n 40 MHz intolerance setting.
60-360000 seconds
Number of consecutive seconds over which the client count is more than the threshold.
0-36000 seconds
Default "default"
3600 seconds
900 seconds
50
--
-- 900 seconds
900 seconds
900 seconds
3 seconds
284 | ids dos-profile
AOS-W 6.2 | Reference Guide
Parameter client-flood-quiet-time client-flood-threshold clone cts-rate-quiet-time cts-rate-threshold cts-rate-time-interval deauth-rate-thresholds detect-ap-flood
detect-block-ack-dos detect-chopchop-attack detect-client-flood detect-cts-rate-anomaly detect-disconnect-station
detect-eap-rate-anomaly
Description
Range
Time to wait, in seconds, after detecting a client flood before continuing the check.
60-360000 seconds
Threshold for the number of spurious clients in the system.
0-100000
Copy data from another IDS Denial Of -- Service Profile.
Time to wait, in seconds, after detecting a CTS rate anomaly after which the check can be resumed.
60-360000 seconds
Number of CTS control packets over the time interval that constitutes an anomaly.
0-100000
Time interval, in seconds, over which the packet count should be checked.
1-120 seconds
Rate threshold for deauthenticate
--
frames.
Enables detection of flooding with fake AP beacons to confuse legitimate users and to increase the amount of processing needed on client operating systems.
true false
Enable/disable detection of attempts to reset traffic receive windows using forged Block ACK Add messages.
true false
Enable/disable detection of ChopChop true
attack.
false
Enable/disable detection of client flood true
attack.
false
Enable/disable detection of CTS rate anomaly.
true false
In a station disconnection attack, an attacker spoofs the MAC address of either an active client or an active AP. The attacker then sends deauthenticate frames to the target device, causing it to lose its active association.
Use this command to enable the detection of disconnect station attack.
true false
Enables Extensible Authentication Protocol (EAP) handshake analysis to detect an abnormal number of authentication procedures on a channel and generate an alarm when this condition is detected.
true false
Default 900 seconds 150 -- 900 seconds 5000
5 seconds -- false
true
false disable disable enable
false
AOS-W 6.2 | Reference Guide
ids dos-profile | 285
Parameter
Description
Range
detect-fata-jack-attack
Enable/disable detection of FATA-Jack true
attack
false
detect-ht-40mhz-intolerance
Enables or disables detection of 802.11n 40 MHz intolerance setting, which controls whether stations and APs advertising 40 MHz intolerance will be reported.
true false
detect-invalid-address
Enable/disable detection of invalid address combinations
true false
detect-malformed-associationrequest
Enable/disable detection of malformed true
association requests.
false
detect-malformed-auth-frame
Enable/disable detection of malformed true
authentication frames
false
detect-malformed-htie
Enable/disable detection of malformed true
HT IE
false
detect-malformed-large-duration Enable/disable detection of unusually large durations in frames
true false
detect-omerta-attack
Enable/disable detection of Omerta attack
true false
detect-overflow-eapol-key
Enable/disable detection of overflow EAPOL key requests
true false
detect-overflow-ie
Enable/disable detection of overflow Information Elements (IE)
true false
detect-power-save-dos-attack
Enable/disable detection of Power Save DoS attack
true false
detect-rate-anomalies
Enable/disable detection of rate anomalies
true false
detect-rts-rate-anomaly
Enable/disable detection of RTS rate anomaly
true false
detect-tkip-replay-attack
Enable/disable detection of TKIP replay attack
true false
disassoc-rate-thresholds
Rate threshold for disassociate frames. --
disconnect-deauth-disassocthreshold
Rate thresholds for Disassociate frames
1-50
disconnect-sta-assoc-respthreshold
The number of successful Association Response or Reassociation response frames seen in an interval of 10 seconds that should trigger this event.
1-30
Default enable false
false disable disable false true enable disable disable enable disable disable disable -- 8 5
286 | ids dos-profile
AOS-W 6.2 | Reference Guide
Parameter
Description
Range
disconnect-sta-quiet-time
After a station disconnection attack is detected, the time, in seconds, that must elapse before another identical alarm can be generated.
60360000seconds
eap-rate-quiet-time
After an EAP rate anomaly alarm has been triggered, the time, in seconds, that must elapse before another identical alarm may be triggered.
60-360000
eap-rate-threshold
Number of EAP handshakes that must be received within the EAP rate time interval to trigger an alarm.
0-100000
eap-rate-time-interval
Time, in seconds, during which the configured number of EAP handshakes must be received to trigger an alarm.
1-120 seconds
fata-jack-quiet-time
Time to wait, in seconds, after detecting a FATA-Jack attack after which the check can be resumed.
60-360000 seconds
invalid-address-combinationquiet-time
Time to wait, in seconds, after detecting an invalid address combination after which the check can be resumed.
60-360000 seconds
malformed-association-requestquiet-time
Time to wait, in seconds, after detecting a malformed association request after which the check can be resumed.
60-360000 seconds
malformed-auth-frame-quiet-time
Time to wait, in seconds, after detecting a malformed authentication frame after which the check can be resumed.
60-360000 seconds
malformed-htie-quiet-time
Time to wait, in seconds, after detecting a malformed HT IE after which the check can be resumed.
60-360000 seconds
malformed-large-duration-quiettime
Time to wait, in seconds, after detecting a large duration for a frame after which the check can be resumed.
60-360000 seconds
no
Negates any configured parameter.
--
omerta-quiet-time
Time to wait, in seconds, after detecting an Omerta attack after which the check can be resumed.
60-360000 seconds
omerta-threshold
The Disassociation packets received by a station as a percentage of the number of data packets sent, in an interval of 10 seconds.
1-100
Default 900 seconds
900 seconds
60
3 seconds
900 seconds
900 seconds
900 seconds
900 seconds
900 seconds
900 seconds
-- 900 seconds
10%
AOS-W 6.2 | Reference Guide
ids dos-profile | 287
Parameter overflow-eapol-key-quiet-time overflow-ie-quiet-time power-save-dos-min-frames
power-save-dos-quiet-time power-save-dos-threshold
probe-request-rate-thresholds probe-response-rate-thresholds rts-rate-quiet-time rts-rate-threshold rts-rate-time-interval spoofed-deauth-blacklist
tkip-replay-quiet-time
Description
Range
Time to wait, in seconds, after detecting a overflow EAPOL key request after which the check can be resumed.
60-360000 seconds
Time to wait, in seconds, after detecting a overflow IE after which the check can be resumed.
60-360000 seconds
The minimum number of Power Management OFF packets that are required to be seen from a station, in intervals of 10 second, in order for the Power Save DoS check to be done.
1-1000
Time to wait, in seconds, after detecting a Power Save DoS attack after which the check can be resumed.
60-360000 seconds
The Power Management ON packets sent by a station as a percentage of the Power Management OFF packets sent, in intervals of 10 second, which will trigger this event.
1- 100 %
Rate threshold for probe request
--
frames.
Rate threshold for probe response
--
frames.
Time to wait, in seconds, after detecting an RTS rate anomaly after which the check can be resumed.
60-360000 seconds
Number of RTS control packets over the time interval that constitutes an anomaly.
0-100000
Time interval, in seconds, over which the packet count should be checked.
1-120 seconds
Enables detection of a deauth attack initiated against a client associated to an AP. When such an attack is detected, the client is quarantined from the network to prevent a man-in-themiddle attack from being successful.
true false
Time to wait, in seconds, after detecting a TKIP replay attack after which the check can be resumed.
60-360000 seconds
Default 900 seconds
900 seconds 120
900 seconds 80%
-- -- 900 seconds 5000
5 seconds false
900 seconds
Usage Guidelines
DoS attacks are designed to prevent or inhibit legitimate clients from accessing the network. This includes blocking network access completely, degrading network service, and increasing processing load on clients and network equipment.
288 | ids dos-profile
AOS-W 6.2 | Reference Guide
Example
The following command enables a detection in the DoS profile named "floor2": (host) (config) #ids dos-profile floor2 (host) (IDS Denial Of Service Profile "floor2") detect-ap-flood
Command History
Release AOS-W 3.0 AOS-W 3.3 AOS-W 3.4 AOS-W 6.0 AOS-W 6.1
Modification
Command Introduced.
Updated with support for high-throughput IEEE 802.11n standard.
detect-disconnect-sta and disconnect-sta-quiet-time parameters deprecated.
Deprecated predefined profiles and added numerous DoS profile options
Added the following parameter in support of Detection of the Meiners Power Save DoS attack, including event notification to the user.
detect-power-save-dos-attack power-save-dos-min-frames power-save-dos-quiet-time power-save-dos-threshold
Deprecated Predefined Profiles
Deprecated DOS profile: l ids-dos-disabled l ids-dos-low-setting l ids-dos-medium-setting l ids-dos-high-setting
Command Information
Platform Available on all platforms
License Requires the RFprotect license
Command Mode
Config mode on master switches
AOS-W 6.2 | Reference Guide
ids dos-profile | 289
ids general-profile
ids general-profile <profile-name> adhoc-ap-inactivity-timeout adhoc-ap-max-unseen-timeout ap-inactivity-timeout <seconds> ap-max-unseen-timeout clone <profile> ids-events [logs-and-traps | logs-only | none | traps-only] min-pot-ap-beacon-rate <percent> min-pot-ap-monitor-time <seconds> mobility-manager-rtls mon-stats-update-interval no ... send-adhoc-info-to-controller signature-quiet-time <seconds> sta-inactivity-timeout <seconds> stats-update-interval <seconds> wired-containment wired-containment-ap-adj-mac wired-containment-susp-l3-rogue wireless-containment [deauth-only | none | tarpit-all-sta | tarpit-non-valid-sta] wired-containment-ap-adj-mac wireless-containment-debug
Description
Configure an IDS general profile.
Syntax
Parameter <profile-name> adhoc-ap-inactivity-timeout
adhoc-ap-max-unseen-timeout
ap-inactivity-timeout
Description
Ran- Defge ault
Name that identifies an
--
instance of the profile. The
name must be 1-63
characters.
"default"
Ad hoc (IBSS) AP inactivity timeout in number of scans.
536000 seconds
5 seconds
Ageout time in seconds since ad hoc (IBSS) AP was last seen.
536000 seconds
5 seconds
Time, in seconds, after which an AP is aged out.
536000 seconds
5 seconds
290 | ids general-profile
AOS-W 6.2 | Reference Guide
Parameter ap-max-unseen-timeout clone ids-events [logs-and-traps | logs-only | none | traps-only]
min-pot-ap-beacon-rate
min-pot-ap-monitor-time mobility-manager-rtls mon-stats-update-interval no send-adhoc-info-to-controller signature-quiet-time
Description
Ran- Defge ault
Ageout time, in seconds, since AP was last seen.
536000 seconds
600 seconds
Name of an existing IDS --
--
general profile from which
parameter values are
copied.
Enable or disable IDS
--
event generation from the
AP. Event generation from
the AP can be enabled for
syslogs, traps, or both.
This does not affect
generation of IDS
correlated events on the
switch.
logsandtraps
Minimum beacon rate acceptable from a potential AP, in percentage of the advertised beacon interval.
0-
25%
100
Minimum time, in seconds, a potential AP has to be up before it is classified as a real AP.
236000
2 seconds
Enable/disable RTLS communication with the configured mobilitymanager
enabled disabled
disabled
Time interval, in seconds, for AP to update the switch with stats for monitored devices. Minimum is 60.
60360000
seconds
60 seconds
Negates any configured
--
--
parameter.
Enable or disable sending ena- dis-
Adhoc information to the ble able
switch from the AP.
dis-
able
After a signature match is detected, the time to wait, in seconds, to resume checking.
60360000
seconds
900 seconds
AOS-W 6.2 | Reference Guide
ids general-profile | 291
Parameter sta-inactivity-timeout sta-max-unseen-timeout stats-update-interval wired-containment wired-containment-ap-adj-mac wired-containment-susp-l3-rogue
292 | ids general-profile
Description
Time, in seconds, after which a station is aged out.
Ageout time, in seconds, since station was last seen. Minimum is 5.
Ran- Defge ault
30360000
seconds
60 seconds
536000 seconds
5 seconds
Interval, in seconds, for the AP to update the switch with statistics. This setting takes effect only if the OmniVista Mobility Manager Software is configured. Otherwise, statistics update to the switch is disabled.
60360000
seconds
60 seconds
Enable containment from the wired side.
true false false
Enable/disable wired containment of MACs offset by one from APs BSSID.
true false false
The basic wired
true
containment feature
enabled using the wired-
containment on page 292
command contains layer-3
APs whose wired interface
MAC addresses are either
the same as (or one
character off from) their
BSSIDs. This feature can
also identify and contain
an AP with a preset wired
MAC address that is
completely different from
the AP's BSSID if the the
MAC address that the AP
provides to wireless
clients as the `gateway
MAC' is offset by one
character from its wired
MAC address.
NOTE: This feature
requires that the following
wired-containment
parameter in the ids
general-profile is also
enabled, and that the
confidence level of the
false
AOS-W 6.2 | Reference Guide
Parameter
Description
Ran- Defge ault
suspected rogue exceeds the level configured by the suspect-roguecontainment and suspectrogue-conf-level parameters in the ids unauthorized-deviceprofile.
wireless-containment [deauth-only | none | tarpitall-sta | tarpit-non-valid-sta]
Enable wireless
--
containment including
Tarpit Shielding. Tarpit
shielding works by
steering a client to a tarpit
so that the client
associates with it instead
of the AP that is being
contained.
deauth-only--Containment
using deauthentication
only
none--Disable wireless
containment
tarpit-all-sta--Wireless
containment by tarpit of all
stations
tarpit-non-valid-sta--
Wireless containment by
tarpit of non-valid clients
deauthonly
wireless-containment-debug
Enable/disable debug of containment from the wireless side.
Note: Enabling this debug option will cause containment to not function properly.
true false
false
Usage Guidelines
This command configures general IDS profile attributes.
Example
The following command enables containments in the general IDS profile: (host) (config) #ids general-profile floor7 (host) (IDS General Profile "floor7") #wired-containment (host) (IDS General Profile "floor7") #wireless-containment tarpit-all-sta (host) (IDS General Profile "floor7") #wireless-containment-debug
Command History
Version AOS-W 3.0
Description Command Introduced
AOS-W 6.2 | Reference Guide
ids general-profile | 293
Version AOS-W 5.0 AOS-W 6.0
Description mobility-manager-rtls parameter introduced Deprecated predefined profiles and added numerous General profile options
Deprecated Predefined Profiles
Deprecated General profiles: l ids-general-disabled l ids-general-high-setting
Command Information
Platform
License
Available on all platforms Requires the RFprotect license.
Command Mode Config mode on master switches
294 | ids general-profile
AOS-W 6.2 | Reference Guide
ids impersonation-profile
ids impersonation-profile <name> ap-spoofing-quiet-time beacon-diff-threshold <percent> beacon-inc-wait-time <seconds> beacon-wrong-channel-quiet-time clone <profile> detect-ap-impersonation detect-ap-spoofing detect-beacon-wrong-channel detect-hotspotter hotspotter-quiet-time no ... protect-ap-impersonation
Description
This command configures anomalies for impersonation attacks.
Syntax
Parameter <profile> ap-spoofing-quiet-tim beacon-diff-threshold beacon-inc-wait-time beacon-wrong-channel-quiettime clone detect-ap-impersonation
detect-ap-spoofing
Description
Range
Name that identifies an instance of the
--
profile. The name must be 1-63 characters.
Time to wait in seconds after detecting AP Spoofing after which the check can be resumed. Minimum is wait time is 60.
Percentage increase in beacon rates that triggers an AP impersonation event.
0-100
Time, in seconds, after the beacon
--
difference threshold is crossed before an
AP impersonation event is generated.
Time to wait, in seconds, after detecting a beacon with the wrong channel after which the check can be resumed.
60360000 seconds
Name of an existing IDS impersonation
--
profile from which parameter values are
copied.
Enables detection of AP impersonation. In -- AP impersonation attacks, the attacker sets up an AP that assumes the BSSID and ESSID of a valid AP. AP impersonation attacks can be done for man-in-the-middle attacks, a rogue AP attempting to bypass detection, or a honeypot attack.
Enable/disable AP Spoofing detection
--
Default "default" 60 seconds 50% 3 seconds 900 seconds --
true
enable
AOS-W 6.2 | Reference Guide
ids impersonation-profile | 295
Parameter detect-beacon-wrong-channel detect-hotspotter hotspotter-quiet-time
no protect-ap-impersonation
Description
Enable/disable detection of beacons advertising the incorrect channel
Enable/disable detection of the Hotspotter attack to lure away valid clients.
Time to wait in seconds after detecting an attempt to Use the Hotspotter tool against clients.
Negates any configured parameter.
When AP impersonation is detected, both the legitimate and impersonating AP are disabled using a denial of service attack.
Range --
--
60360000 seconds -- --
Default disable
disable
900 seconds
-- false
Usage Guidelines
A successful man-in-the-middle attack will insert an attacker into the data path between the client and the AP. In such a position, the attacker can delete, add, or modify data, provided he has access to the encryption keys. Such an attack also enables other attacks that can learn a client's authentication credentials. Man-in-the-middle attacks often rely on a number of different vulnerabilities.
Example
The following command enables detections in the impersonation profile: (host) (config) #ids impersonation-profile floor1 (host) (IDS Impersonation Profile "floor1") #detect-beacon-wrong-channel (host) (IDS Impersonation Profile "floor1") #detect-ap-impersonation
Command History
Version AOS-W 3.0 AOS-W 3.4
AOS-W 6.0
Modification Command Introduced
detect-sequence-anomaly, sequence-diff, sequence-quiet-time, sequence-time-tolerance parameters deprecated.
Deprecated predefined profiles and added numerous Impersonation profile options
Deprecated Predefined Profiles
IDS Impersonation profile: l ids-impersonation-disabled l ids-impersonation-high-setting
Command Information
Platform
Available on all platforms
License Requires the RFprotect license
Command Mode Config mode on master switches
296 | ids impersonation-profile
AOS-W 6.2 | Reference Guide
ids management-profile
event-correlation [logs-and-traps | logs-only | none | traps-only]
event-correlation-quiet-time <value>
Description
Mange the event correlation.
Syntax
Parameter
event-correlation logs-and-traps logs-only none traps-only
event-correlation-quiet-time <value>
Description
Range
Correlation mode for IDS event traps and syslogs (logs). Event correlation can be enabled with generation of correlated logs, traps, or both. To disable correlation, enter the keyword none.
Default
logs-andtraps
Time to wait, in seconds, after generating a correlated event after which the event could be raised again. This only applies to events that are repeatedly raised by an AP.
30360000 seconds
900 seconds
Usage Guidelines
Manage the events correlation for IDS event traps and syslogs (logs).
Example
(host) (config) #ids management-profile (host) (IDS Management Profile) #event-correlation-quiet-time 30 (host) (IDS Management Profile) #event-correlation logs-and-traps
Command History
Release AOS-W 6.0
Modification Command introduced
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ids management-profile | 297
ids profile
ids profile <name> clone <profile> dos-profile <profile> general-profile <profile> impersonation-profile <profile> no ... signature-matching-profile <profile> unauthorized-device-profile <profile>
Description
This command defines a set of IDS profiles.
Syntax
Parameter <profile> clone dos-profile general-profile impersonation-profile
no signature-matching-profile
unauthorized-device-profile
Description
Default
Name that identifies an instance of the profile. The name must be 1-63 characters.
"default"
Name of an existing IDS profile from which parameter -- values are copied.
Name of a IDS denial of service profile to be applied to "default" the AP group/name. See ids dos-profile on page 283.
Name of an IDS general profile to be applied to the AP "default" group/name. See ids general-profile on page 290.
Name of an IDS impersonation profile to be applied to the AP group/name. See ids impersonation-profile on page 295.
"default"
Negates any configured parameter.
--
Name of an IDS signature matching profile to be applied to the AP group/name. See ids signaturematching-profile on page 302
"default"
Name of an IDS unauthorized device profile to be applied to the AP group/name. See ids unauthorizeddevice-profile on page 307.
"default"
Usage Guidelines
This command defines a set of IDS profiles that you can then apply to an AP group (with the ap-group command) or to a specific AP (with the ap-name command).
Example
The following command defines a set of IDS profiles: (host) (config) #ids profile floor2 (host) (IDS Profile "floor2") #dos-profile dos1
general-profile general1 impersonation-profile mitm1 signature-matching-profile sig1
298 | ids profile
AOS-W 6.2 | Reference Guide
unauthorized-device-profile unauth1
Command History
Version AOS-W 3.0 AOS-W 6.0
Modification Command Introduced Deprecated predefined profiles
Deprecated Predefined Profile
Deprecated Profile for levels: disabled, high, medium, and low l ids-disabled l ids-high-setting l ids-medium-setting l ids-low-setting
Command Information
Platform Available on all platforms
License Requires the RFprotect license
Command Mode
Config mode on master switches.
AOS-W 6.2 | Reference Guide
ids profile | 299
ids rate-thresholds-profile
ids rate-thresholds-profile <name> channel-inc-time <seconds> channel-quiet-time <seconds> channel-threshold clone <profile> no ... node-quiet-time <seconds> node-threshold <number> node-time-interval <seconds>
Description
This command configures thresholds that are assigned to the different frame types for rate anomaly checking.
Syntax
Parameter <profile> channel-inc-time channel-quiet-time
channel-threshold clone no node-quiet-time
node-threshold node-time-interval
Description
Range
Name that identifies an instance of the profile. The name -- must be 1-63 characters.
Time, in seconds, in which the threshold must be exceeded in order to trigger an alarm.
0360000 seconds
After a channel rate anomaly alarm has been triggered, the time that must elapse before another identical alarm may be triggered. This option prevents excessive messages in the log file.
60360000
Number of a specific type of frame that must be exceeded any within a specific interval in an entire channel to trigger an alarm.
Name of an existing IDS rate thresholds profile from which -- parameter values are copied.
Negates any configured parameter.
--
After a node rate anomaly alarm has been triggered, the time, in seconds, that must elapse before another identical alarm may be triggered. This option prevents excessive messages in the log file.
60360000
Number of a specific type of frame that must be exceeded within a specific interval for a particular client MAC address to trigger an alarm.
0100000 frames
Time, in seconds, in which the threshold must be exceeded in order to trigger an alarm.
1-120
Default "default"
15 seconds
900 seconds
300
--
-- 900 seconds
200
15 seconds
Usage Guidelines
A profile of this type is attached to each of the following 802.11 frame types in the IDS denial of service profile: l Association frames l Disassociation frames l Deauthentication frames
300 | ids rate-thresholds-profile
AOS-W 6.2 | Reference Guide
l Probe Request frames l Probe Response frames l Authentication frames
Example
The following command configures frame thresholds: (host) (config) #ids rate-thresholds-profile Lobby (host) (IDS Rate Thresholds Profile "Lobby") #channel-threshold 250
Command History
Version AOS-W 3.0 AOS-W 6.0
Modification Command Introduced Deprecated predefined profiles
Deprecated Predefined Profiles
Deprecated the predefined profile with probe-request-response-threshold.
Command Information
Platform Available on all platforms
License Requires the RFprotect license
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ids rate-thresholds-profile | 301
ids signature-matching-profile
ids signature-matching-profile <name> clone <profile> no ... signature <profile>
Description
This command contains defined signature profiles.
Syntax
Parameter <profile>
clone
no signature
Description
Name that identifies an instance of the profile. The name must be 1-63 characters.
Name of an existing IDS signature matching profile from which parameter values are copied.
Negates any configured parameter.
Name of a signature profile. See ids signature-profile on page 304.
Default "default"
--
-- --
Usage Guidelines
You can include one or more predefined signature profiles or a user-defined signature profile in a signature matching profile.
Example
The following command configures a signature matching profile: (host) (config) IDS signature matching LobbyEast (host) (IDS Signature Matching Profile "LobbyEast") #signature Null-Probe-Response
Command History
Version AOS-W 3.0 AOS-W 6.0
Modification Command Introduced Deprecated predefined profiles
Deprecated Predefined Profiles
Deprecated Signature Matching profile: l factory-default-signatures
302 | ids signature-matching-profile
AOS-W 6.2 | Reference Guide
Command Information
Platform Available on all platforms
License Requires the RFprotect license
Command Mode
Config mode on master switches
AOS-W 6.2 | Reference Guide
ids signature-matching-profile | 303
ids signature-profile
ids signature-profile <name> bssid <macaddr> clone <profile> dst-mac <macaddr> frame-type {assoc|auth|beacon|control|data|deauth|disassoc|mgmt|probe-request|proberesponse no ... payload <pattern> [offset <number>] seq-num <number> src-mac <macaddr>
Description
This command configures signatures for wireless intrusion detection.
Syntax
Parameter <profile>
bssid clone
dst-mac frame-type
assoc auth beacon control data deauth disassoc mgmt probe-request probe-response ssid
Description
Default
Name that identifies an instance of the profile. The name must be 1-63 characters.
"default"
BSSID field in the 802.11 frame header.
--
Name of an existing IDS signature profile from which parameter -- values are copied.
Destination MAC address in the 802.11 frame header.
--
Type of 802.11 frame. For each type of frame, further parameters -- can be specified to filter and detect only the required frames.
Association frame type
Authentication frame type
Beacon frame type
All control frames
All data frames
Deauthentication frame type
Disassociation frame type
Management frame type
Frame type is probe request
Frame type is probe response
For beacon, probe-request, and probe-response frame types,
--
specify the SSID as either a string or hex pattern.
304 | ids signature-profile
AOS-W 6.2 | Reference Guide
Parameter ssid-length
no payload <pattern>
offset seq-num src-mac
Description
For beacon, probe-request, and probe-response frame types, specify the length, in bytes, of the SSID. Maximum length is 32 bytes.
Negates any configured parameter.
Pattern at a fixed offset in the payload of an 802.11 frame. Specify the pattern to be matched as a string or hex pattern. Maximum length is 32 bytes.
When a payload pattern is configured, specify the offset in the payload where the pattern is expected to be found in the frame.
Sequence number of the frame.
Source MAC address in the 802.11 frame header.
Default --
-- --
-- -- --
Example
The following command configures a signature profile: (host) (config) #ids signature-profile floor4 (host) (IDS Signature Profile "floor4") #frame-type assoc (host) (IDS Signature Profile "floor4") #src-mac 00:00:00:00:00:00
Usage Guidelines
The following describes the configuration for the predefined signature profiles:
Signature Profile AirJack ASLEAP Deauth-Broadcast
Netstumbler Generic
Netstumbler Version 3.3.0x
Null-Probe-Response
Parameter frame-type frame-type frame-type dst-mac payload payload payload
payload frame-type
Value beacon ssid = AirJack beacon ssid = asleap deauth ff:ff:ff:ff:ff:ff offset=3 pattern=0x00601d offset=6 pattern=0x0001 offset=3 pattern=0x00601d
offset=12 pattern=0x000102 probe-response ssid length = 0
Command History
Version AOS-W 3.0
Modification Command Introduced
AOS-W 6.2 | Reference Guide
ids signature-profile | 305
Command Information
Platform Available on all platforms
License Requires the RFprotect license
Command Mode Config mode on master switches
306 | ids signature-profile
AOS-W 6.2 | Reference Guide
ids unauthorized-device-profile
ids unauthorized-device-profile <name> adhoc-using-valid-ssid-quiet-time <seconds> allow-well-known-mac [hsrp|iana|local-mac|vmware|vmware1|vmware2|vmware3] cfg-valid-11a-channel <channel> cfg-valid-11g-channel <channel> classification clone <profile> detect-adhoc-network detect-adhoc-using-valid-ssid detect-bad-wep detect-ht-greenfield detect-invalid-mac-oui detect-misconfigured-ap detect-sta-assoc-to-rogue detect-unencrypted-valid-client detect-valid-client-misassociation detect-valid-ssid-misuse detect-windows-bridge detect-wireless-bridge detect-wireless-hosted-network mac-oui-quiet-time <seconds> no ... oui-classification overlay-classification privacy prop-wm-classification protect-adhoc-enhanced protect-adhoc-network protect-high-throughput protect-ht-40mhz protect-misconfigured-ap protect-ssid protect-valid-sta x protect-windows-bridge protect-wireless-hosted-network require-wpa rogue-containment suspect-rogue-conf-level <level> suspect-rogue-containment unencrypted-valid-client-quiet-time valid-and-protected-ssid <ssid> valid-oui <oui> valid-wired-mac <macaddr> wireless-bridge-quiet-time <seconds> wireless-hosted-network-quiet-time
Description
This command configures detection of unauthorized devices, as well as rogue AP detection and containment.
AOS-W 6.2 | Reference Guide
ids unauthorized-device-profile | 307
Syntax
Parameter <profile> adhoc-using-valid-ssid-quiettime allow-well-known-mac
cfg-valid-11a-channel
Description
Range Default
Name that identifies an instance of the profile. -- The name must be 1-63 characters.
"default"
Time to wait, in seconds, after detecting an adhoc network using a valid SSID, after which the check can be resumed.
60360000
900 seconds
Allows devices with known MAC addresses to --
--
classify rogues APs.
Depending on your network, configure one or
more of the following options for classifying
rogue APs:
l hsrp--Routers configured for HSRP, a Cisco-proprietary redundancy protocol,
with the HSRP MAC OUI 00:00:0c.
l iana--Routers using the IANA MAC OUI 00:00:5e.
l local-mac--Devices with locally administered MAC addresses starting with 02.
l vmware--Devices with any of the following VMWare OUIs: 00:0c:29, 00:05:69, or 00:50:56
l vmware1--Devices with VMWare OUI 00:0c:29.
l vmware2--Devices with VMWare OUI 00:05:69.
l vmware3--Devices with VMWare OUI 00:50:56.
If you modify an existing configuration, the
new configuration overrides the original
configuration. For example, if you configure
allow-well-known-mac hsrp and then
configure allow-well-known-mac iana,
the original configuration is lost. To add more
options to the original configuration, include
all of the required options, for example:
allow-well-known-mac hsrp iana.
Use caution when configuring this command. If the neighboring network uses similar routers, those APs might be classified as rogues. If containment is enabled, clients attempting to associate to an AP classified as a rogue are disconnected through a denial of service attack.
To clear the well known MACs in the system, use the following commands:
l clear wms wired-mac:This clears all of
the learned wired MAC information on the
switch.
l reload: This reboots the switch.
List of valid 802.11a channels that third-party 34-165 N/A APs are allowed to use.
308 | ids unauthorized-device-profile
AOS-W 6.2 | Reference Guide
Parameter cfg-valid-11g-channel classification
clone detect-adhoc-network detect-adhoc-using-validssid detect-bad-wep
detect-ht-greenfield detect-invalid-mac-oui
detect-misconfigured-ap
detect-sta-assoc-to-rogue detect-unencrypted-validclient
Description
Range Default
List of valid 802.11b/g channels that thirdparty APs are allowed to use.
1-14
N/A
Enable/disable rogue AP classification. A
--
true
rogue AP is one that is unauthorized and
plugged into the wired side of the network.
Any other AP seen in the RF environment that
is not part of the valid enterprise network is
considered to be interfering -- it has the
potential to cause RF interference but it is not
connected to the wired network and thus
does not represent a direct threat.
Name of an existing IDS rate thresholds
--
--
profile from which parameter values are
copied.
Enable detection of adhoc networks.
--
false
Enable/disable detection of adhoc networks -- using valid/protected SSIDs
enable
Enables detection of WEP initialization
--
vectors that are known to be weak and/or
repeating. A primary means of cracking WEP
keys is to capture 802.11 frames over an
extended period of time and search for
implementations that are still used by many
legacy devices.
false
Enables or disables detection of high-
--
throughput devices advertising greenfield
preamble capability.
false
Enables checking of the first three bytes of a -- MAC address, known as the organizationally unique identifier (OUI), assigned by the IEEE to known manufacturers. Often clients using a spoofed MAC address do not use a valid OUI and instead use a randomly generated MAC address. Enabling MAC OUI checking causes an alarm to be triggered if an unrecognized MAC address is in use.
false
Enables detection of misconfigured APs. An -- AP is classified as misconfigured if it is classified as valid and does not meet any of the following configurable parameters:
- valid channels - encryption type - list of valid AP MAC OUIs - valid SSID list
false
Enable/disable detection of station association to rogue AP.
enable
Enable/disable detection of unencrypted valid -- clients.
enable
AOS-W 6.2 | Reference Guide
ids unauthorized-device-profile | 309
Parameter detect-valid-client-m isassociation
detect-valid-ssid-misuse detect-windows-bridge detect-wireless-bridge detect-wireless-hosted-network
mac-oui-quiet-time no oui-classification overlay-classification privacy prop-wm-classification protect-adhoc-enhanced
Description
Range Default
Enable/disable detection of misassociation
--
between a valid client and an unsafe AP. This
setting can detect the following
misassociation types:
l MisassociationToRogueAP
l MisassociationToExternalAP
l MisassociationToHoneypotAP
l MisassociationToAdhocAP
l MisassociationToHostedAP
enable
Enable/disable detection of Interfering or
--
Neighbor APs using valid/protected SSIDs.
disable
Enables detection of Windows station bridging.
--
true
Enables detection of wireless bridging.
--
false
If enabled, this feature can detect the
--
presence of a wireless hosted network.
When a wireless hosted network is detected
this feature sends a "Wireless Hosted
Network" warning level security log message
and the wlsxWirelessHostedNetworkDetected
SNMP trap.
If there are clients associated to the hosted
network, this feature will send a "Client
Associated To Hosted Network" warning level
security log message and the
wlsxClien-
tAssociatedToHostedNetworkDetected SNMP
trap.
enable
Time, in seconds, that must elapse after an invalid MAC OUI alarm has been triggered before another identical alarm may be triggered.
60360000 seconds
900 seconds
Negates any configured parameter.
--
--
Enable/disable OUI based rogue AP classification
--
enable
Enable/disable overlay rogue AP classification
--
enable
Enables encryption as a valid AP configuration.
--
false
Enable/disable rogue AP classification through propagated wired MACs
--
true
Enables advanced protection from adhoc
--
networks, including adhoc networks in open
mode. When enhanced adhoc containment is
carried out, a new repeatable event, syslog
and SNMP trap will be generated for each
containment event.
false
310 | ids unauthorized-device-profile
AOS-W 6.2 | Reference Guide
Parameter
Description
Range Default
protect-adhoc-network
Enables protection from adhoc networks.
--
When adhoc networks are detected, they are
disabled using a denial of service attack.
false
protect-high-throughput
Enables or disables protection of highthroughput (802.11n) devices.
--
false
protect-ht-40mhz
Enables or disables protection of high-
--
throughput (802.11n) devices operating in 40
MHz mode.
false
protect-misconfigured-ap
Enables protection of misconfigured APs.
--
false
protect-ssid
Enables use of SSID by valid APs only.
--
false
protect-valid-sta
When enabled (true), does not allow valid
--
stations to connect to a non-valid AP.
false
protect-windows-bridge
Enable/disable protection of a windows
--
disabled
station bridging
protect-wireless-hosted-network When you enable the wireless hosted
--
network protection feature, the switch
enforces containment on a wireless hosted
network by launching a denial of service
attack to disrupt associations between a
Windows 7 software-enabled Access Point
(softAP) and a client, and disrupt associations
between the client that is hosting the softAP
and any access point to which the host
connects.
When a wireless hosted network triggers this
feature, wireless hosted network protection
sends the Wireless Hosted Network
Containment and
Host of Wireless Network Containment
warning level security log messages, and the
wlsxWirelessHostedNetworkContainment
and wlsxHostOfWirelessNetworkContainment
SNMP traps.
NOTE: The existing generic containment
SNMP traps and log messages will also be
sent when Wireless Hosted Network
Containment or Host of Wireless Network
Containment is enforced.
disabled
require-wpa
When enabled (true), any valid AP that is not -- using WPA encryption is flagged as misconfigured.
false
rogue-containment
Rogue APs can be detected (see
--
classification) but are not automatically
disabled. This option automatically shuts
down rogue APs. When this option is enabled
(true), clients attempting to associate to an AP
classified as a rogue are disconnected
through a denial of service attack.
false
suspect-rogue-conf-level
Confidence level of suspected Rogue AP to trigger containment.
50100%
60%
AOS-W 6.2 | Reference Guide
ids unauthorized-device-profile | 311
Parameter
suspect-rogue-containment
unencrypted-valid-clientquiet-time valid-and-protected-ssid valid-oui valid-wired-mac wireless-bridge-quiet-time wireless-hosted-network-quiettime
Description
Range Default
When an AP is classified as a suspected rogue AP, it is assigned a 50% confidence level. If multiple APs trigger the same events that classify the AP as a suspected rogue, the confidence level increases by 5% up to 95%.
In combination with suspected rogue containment, this option configures the threshold by which containment should occur. Suspected rogue containment occurs only when the configured confidence level is met.
Suspected rogue APs are treated as
--
interfering APs, thereby the switch attempts to
reclassify them as rogue APs. Suspected
rogue APs are not automatically contained. In
combination with the configured confidence
level (see suspect-rogue-conf-level), this
option contains the suspected rogue APs.
false
Time to wait, in seconds, after detecting an unencrypted valid client after which the check can be resumed.
60360000 seconds
900 seconds
List of valid and protected SSIDs.
--
--
List of valid MAC OUIs.
--
--
List of MAC addresses of wired devices in the --
--
network, typically gateways or servers.
Time, in seconds, that must elapse after a wireless bridge alarm has been triggered before another identical alarm may be triggered.
60360000 seconds
900 seconds
The wireless hosted network detection feature sends a log message and trap when a wireless hosted network is detected. The quiet time defined by this parameter sets the amount of time, in seconds, that must elapse after a wireless hosted network log message or trap has been triggered before an identical log message or trap can be sent again.
60360000 seconds
900 seconds
Usage Guidelines
Unauthorized device detection includes the ability to detect and disable rogue APs and other devices that can potentially disrupt network operations.
Example
The following command copies the settings from the ids-unauthorized-device-disabled profile and then enables detection and protection from adhoc networks: (host) (config) #ids unauthorized-device-profile floor7 (host) (IDS Unauthorized Device Profile "floor7") #unauth1 (host) (IDS Unauthorized Device Profile "floor7") #clone ids-unauthorized-device-disable (host) (IDS Unauthorized Device Profile "floor7") #detect-adhoc-network (host) (IDS Unauthorized Device Profile "floor7") #protect-adhoc-network
312 | ids unauthorized-device-profile
AOS-W 6.2 | Reference Guide
Command History
Release AOS-W 3.0 AOS-W 3.3
AOS-W 6.0 AOS-W 6.1
AOS-W 6.2
Modification
Command introduced
Update with support for the high-throughput IEEE 802.11n standard. Also, introduced allow-well-known-mac, suspect-rogue-conf-level, and suspectrogue-containment parameters.
Deprecated predefined profiles
Added the detect-valid-ssid-misuse parameter to internally generate a list of valid SSIDs to use in addition to the user configured list of Valid and Protected SSIDs.
Added the following parameters l protect-adhoc-enhanced l detect-wireless-hosted-network l wireless-hosted-network-quiet-time l protect-wireless-hosted-network
Deprecated Predefined Profiles
IDS Unauthorized Device profile: l ids-unauthorized-device-disabled l ids-unauthorized-device-medium-setting l ids-unauthorized-device-high-setting
Command Information
Platform Available on all platforms
License Requires the RFprotect license
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ids unauthorized-device-profile | 313
ids wms-general-profile
wms general adhoc-ap-ageout-interval <adhoc-ap-ageout-interval> ap-ageout-interval <ap-ageout-interval> collect-stats learn-ap learn-system-wired-macs no persistent-neighbor persistent-valid-sta poll-interval <poll-interval> poll-retries <poll-retries> propagate-wired-macs sta-ageout-interval <sta-ageout-interval> stat-update
Description
This command configures the WLAN management system (WMS).
Syntax
Parameter
Description
Range
adhoc-ap-ageoutinterval <adhoc-ap-ageoutinterval>
Time, in minutes, that an adhoc (IBSS) AP
?
remains unseen before it is deleted (ageout) from
the database.
ap-ageout-interval <ap-ageout-interval>
Time, in minutes, that an AP remains unseen by
?
any probes before it is deleted from the database.
collect-stats
Enables collection of statistics (up to 25,000
--
entries) on the master switch for monitored APs
and clients. This only applies when OV-MM-SW is
not configured.
learn-ap
Enables "learning" of non-Alcatel-Lucent APs.
--
learn-system-wired-macs Enable or disable "learning" of wired MACs at the -- switch.
no
Negates any configured parameter.
--
persistent-neighbor
Do not age out known AP neighbors.
--
persistent-valid-sta
Do not age out valid stations.
--
poll-interval <poll-interval>
Interval, in milliseconds, for communication between the switch and Alcatel-Lucent AMs. The switch contacts the AM at this interval to download AP to station associations, update policy configuration changes, and download AP and station statistics.
(any)
poll-retries <poll-retries>
Maximum number of failed polling attempts before (any) the polled AM is considered to be down.
Default 30 minutes
30 minutes
disabled
disabled disabled
-- disabled ? 60000 milliseconds (1 minute)
2
314 | ids wms-general-profile
AOS-W 6.2 | Reference Guide
Parameter
propagate-wiredmacs
sta-ageout-interval <sta-ageout-interval>
stat-update
Description
Range
Enables the propagation of the gateway wired
--
MAC information.
Time, in minutes, that a client remains unseen by ? any probes before it is deleted from the database.
Enables statistics updating in the database.
--
Default enabled 30 minutes enabled
Usage Guidelines
By default, non-Alcatel-Lucent APs that are connected on the same wired networks as Alcatel-Lucent APs are classified as "rogue" APs. Enabling AP learning classifies non-Alcatel-Lucent APs as "valid" APs. Typically, you would want to enable AP learning in environments with large numbers of existing non-Alcatel-Lucent APs and leave AP learning enabled until all APs in the network have been detected and classified as valid. Then, disable AP learning and reclassify any unknown APs as interfering.
VLAN Trunking In deployments where Alcatel-Lucent APs are not placed on every VLAN and where it is not possible to truck all
VLANs to an Alcatel-Lucent AP, enable the parameter learned-system-wired-mac. When this is enabled, AOS-W is able to classify rogues on all the VLANs that belong to the Alcatel-Lucentswitch, as long as Alcatel-Lucent APs can see the rogues in the air. If there are VLANs in the network residing on a third party switch and if those VLANs are trunked to a port on the Alcatel-Lucentswitch, enabling this feature will allow detection of rogues on those VLANs as well.
Master/Local
When learned-system-wired-mac is enabled in a master/local deployment, the learning of Wired and Gateway MACs will happen at each local switch. For topologies with local switches in geographical locations, the local switch collects the Wired and Gateway MAC info and passes it to the APs that are connected to it. Even though the locals do the collection of Wired and Gateway MACs, the master is still be responsible for classification.
Example
The following command enables AP learning: (host)(IDS WMS General Profile) #learn-ap
To disable AP learning: (host)(IDS WMS General Profile) #no learn-ap
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced Added parameter learned-system-wired-mac
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ids wms-general-profile | 315
316 | ids wms-general-profile
AOS-W 6.2 | Reference Guide
Interface cellular
interface cellular ip access-group <name> session
Description
This command allows you to specify an ingress or egress ACL to the cellular interface of an EVDO modem.
Syntax
Parameter <name>
Description
Enter the name or number of the access group you want to apply to the EVDO modem.
Example
(host) (config-cell)#ip access-group 3 session
Related Command
Command
Description
show interface cellular List the Access groups configured on the cellular interface access-group
Command History
Release AOS-W 5.0
Modification Command introduced
Command Information
Platforms OAW-4306 Series
Licensing Base operating system
Command Mode Configuration Mode (config-cell)
AOS-W 6.2 | Reference Guide
Interface cellular | 317
interface fastethernet | gigabitethernet
interface
interface {fastethernet|gigabitethernet} <slot>/<port> description <string> duplex {auto|full|half} ip access-group <acl> {in|out|session {vlan <vlanId>}} tunneled-node-port no ... poe [cisco] port monitor {fastethernet|gigabitethernet} <slot>/<port> priority-map <name> shutdown spanning-tree [cost <value>] [port-priority <value>] [portfast] speed {10|100|auto} switchport {access vlan <vlan>|mode {access|trunk}| trunk {allowed vlan {<vlans>|add <vlans>|all|except <vlans>|remove <vlans>}| native vlan <vlan>}} trusted {vlan <word>} xsec {point-to-point <macaddr> <key> allowed vlan <vlans> [<mtu>]|vlan <vlan>}
Description
This command configures a FastEthernet or GigabitEthernet interface on the switch.
Syntax
Parameter <slot> <port>
description duplex ip access-group
in out session tunneled-node-port no
Description
Range
Default
<slot> is always 1 except for the OAW-6000 switches, --
--
where the slots can be 0, 1, 2, or 3.
Number assigned to the network interface embedded --
--
in the switch.Port numbers start at 0 from the left-most
position.
String that describes this interface.
--
--
Transmission mode on the interface: full or half-duplex auto/full/half auto or auto to automatically adjust transmission.
Applies the specified access control list (ACL) to the
--
--
interface. Use the ip access-list command to configure
an ACL.
NOTE: This parameter requires the PEFNG license.
Applies ACL to interface's inbound traffic.
--
--
Applies ACL to interface's outbound traffic.
--
--
Applies session ACL to interface and optionally to a
--
--
selected VLAN associated with this port.
Enable tunneled node capability on the interface.
--
disabled
Negates any configured parameter.
--
--
318 | interface fastethernet | gigabitethernet
AOS-W 6.2 | Reference Guide
Parameter poe
cisco port monitor priority-map
shutdown spanning-tree
cost
port-priority
portfast speed switchport
access vlan mode trunk
trusted
Description
Range
Default
Enables Power-over-Ethernet (PoE) on the interface. --
enabled
Enables Cisco-style PoE on the interface.
--
disabled
Monitors another interface on the switch.
--
--
Applies a priority map to the interface. Use the priority- --
--
map command to configure a priority map which
allows you to map ToS and CoS values into high
priority traffic queues.
Causes a hard shutdown of the interface.
--
--
Enables Rapid spanning tree or Per-VLAN spanning -- tree
enabled
Administrative cost associated with the spanning tree. 1-65535
19 (Fast Ethernet) 4 (Gigabit Ethernet)
Spanning tree priority of the interface. A lower setting 0-255
128
brings the port closer to root port position (favorable for
forwarding traffic) than does a higher setting. This is
useful if ports may contend for root position if they are
connected to an identical bridge.
Enables forwarding of traffic from the interface.
--
disabled
Sets the interface speed: 10 Mbps, 100 Mbps, or auto configuration.
10|100|auto auto
Sets switching mode parameters for the interface.
--
--
Sets the interface as an access port for the specified
--
1
VLAN. The interface carries traffic only for the specified
VLAN.
Sets the mode of the interface to access or trunk mode access|trun- access
only.
k
Sets the interface as a trunk port for the specified
--
--
VLANs. A trunk port carries traffic for multiple VLANs
using 802.1q tagging to mark frames for specific
VLANs. You can include all VLANs configured on the
switch, or add or remove specified VLANs. Specify
native to identify the native VLAN for the trunk mode
interface. Frames on the native VLAN are not 802.1q
tagged.
Set this interface and range of VLANs to be trusted.
--
VLANs not included in the trusted range of VLANs will
be, by default, untrusted.
enabled
AOS-W 6.2 | Reference Guide
interface fastethernet | gigabitethernet | 319
Parameter
vlan <word>
xsec point-to-point allowed vlan mtu vlan
Description
Range
Trusted ports and VLANs are typically connected to internal controlled networks, while untrusted ports connect to third-party APs, public areas, or other networks to which access controls should be applied. When Alcatel-Lucent APs are attached directly to the switch, set the port to be trusted.
Sets the supplied range of VLANs as trusted. All remaining become untrusted automatically. For example, If you set a VLAN range as: vlan 1-10, 100-300, 301, 305-400, 501-4094 Then all VLANs in this range are trusted and all others become untrusted by default. You can also use the no trusted vlan command to explicitly make an individual VLAN untrusted. The no trusted vlan command is additive and adds given vlans to the existing untrusted vlan set. However, if you execute the trusted vlan <word> command, it overrides any earlier untrusted VLANs or a range of untrusted VLANs and creates a new set of trusted VLANs. NOTE: A port supports a user VLAN range from 14094. If you want to set all VLANs (1-4094) on a port as untrusted then mark the port itself as untrusted. By default the port and all its associated VLANs are trusted.
1-4094
Enables and configures the Extreme Security (xSec)
--
protocol.
NOTE: You must purchase and install the xSec
software module license in the switch.
MAC address of the switch that is the xSec tunnel
--
termination point, and the 16-byte shared key used to
authenticate the switches to each other. The key must
be the same on both switches.
VLANs that are allowed on the xSec tunnel.
--
(Optional) MTU size for the xSec tunnel.
--
xSec VLAN ID. For switch-to-switch communications, both switches must belong to the same VLAN.
1-4094
Default
--
-- -- -- -- --
Usage Guidelines
Use the show port status command to obtain information about the interfaces available on the switch.
Example
The following commands configure an interface as a trunk port for a set of VLANs: (host) (config) # interface fastethernet 1/2 (host) (config-range)# switchport mode trunk (host) (config-range)# switchport trunk native vlan 10 (host) (config-range)# switchport trunk allowed vlan 1,10,100
The following commands configure trunk port 1/2 with test-acl session for VLAN 2. (host) (config) # interface range fastethernet 1/2 (host) (config-range)# switchport mode trunk (host) (config-range)# ip access-group
320 | interface fastethernet | gigabitethernet
AOS-W 6.2 | Reference Guide
(host) (config-range) # ip access-group test session vlan 2
Related Commands
(host) #show interface {fastethernet|gigabitethernet} <slot>/<port> (host) #show datapath port vlan-table <slot>/<port>
Command History
Release AOS-W 3.0 AOS-W 3.4
AOS-W 3.4.1 AOS-W 6.1
Modification Command introduced The trusted VLAN and ip access-group session vlan parameters were introduced. The trusted vlan <word> parameter was added.
The parameter muxport was changed to tunneled-node-port
Command Information
Platforms All platforms
Licensing
Command Mode
This command is available in the base operating system. The ip access-group parameter requires the PEFNG license. The xsec parameter requires the xSec license.
Config mode on master and local switches
AOS-W 6.2 | Reference Guide
interface fastethernet | gigabitethernet | 321
interface loopback
interface loopback ip address <ipaddr> ipv6 address <ipv6-prefix> no ...
Description
This command configures the loopback address on the switch.
Syntax
Parameter ip address
ipv6 address no
Description Host IP address in dotted-decimal format. This address should be routable from all external networks.
Host IPv6 address that is routable from all external networks.
Negates any configured parameter.
Usage Guidelines
If configured, the loopback address is used as the switch's IP address. If you do not configure a loopback address for the switch, the IP address assigned to VLAN 1 is used as the switch's IP address. After you configure or modify a loopback address, you need to reboot the switch.
Example
The following command configures a loopback address: (host) (config) #interface loopback
ip address 10.2.22.220
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced The parameter ipv6 address was added.
Command Information
Platforms All platforms
Licensing
Command Mode
This command is available in the Config mode on master and local
base operating system
switches
322 | interface loopback
AOS-W 6.2 | Reference Guide
interface mgmt
interface mgmt dhcp ip address <ipaddr> <netmask> ipv6 address <ipv6-prefix/prefix-length> no ... shutdown
Description
This command configures the out-of-band Ethernet management port on an OAW-6000 switch.
Syntax
Parameter
Description
dhcp
Enables DHCP on the interface.
ip address
Configures an IP address and netmask on the interface.
ipv6 address <ipv6-prefix/prefix- Configures an IPv6 address on the interface. length>
no
Negates any configured parameter.
shutdown
Causes a hard shutdown of the interface.
Usage Guidelines
This command applies to the OmniAccess Supervisor Card III. Use the show interface mgmt command to view the current status of the management port.
Example
The following command configures an IP address on the management interface: (host) (config) #interface mgmt
ip address 10.1.1.1 255.255.255.0
Platform Availability
This command is only available on the OAW-6000 switch.
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced The parameter ipv6 address was added.
AOS-W 6.2 | Reference Guide
interface mgmt | 323
Command Information
Platforms OAW-6000 switches
Licensing Base operating system
Command Mode
Config mode on master and local switches
324 | interface mgmt
AOS-W 6.2 | Reference Guide
interface port-channel
interface port-channel <id> add {fastethernet|gigabitethernet} <slot>/<port> del {fastethernet|gigabitethernet} <slot>/<port> ip access-group <acl> {in|out|session {vlan <vlanId>}} no ... shutdown spanning-tree [portfast] switchport {access vlan <vlan>|mode {access|trunk}| trunk {allowed vlan {<vlans>|add <vlans>|all|except <vlans>|remove <vlans>| native vlan <vlan>} trusted {vlan <word>} xsec {point-to-point <macaddr> <key> allowed vlan <vlans> [<mtu>]|vlan <vlan>}
Description
This command configures an Ethernet port channel.
Syntax
Parameter port-channel add
del ip access-group
in out session no shutdown spanning-tree portfast switchport access vlan
Description
Range
Default
ID number for this port channel.
0-7
--
Adds the specified FastEthernet or GigabitEthernet interface --
--
to the port channel.
You cannot specify both FastEthernet and GigabitEthernet
interfaces for the same port channel.
Deletes the specified Fastethernet or Gigabitethernet interface to the port channel.
--
--
Applies the specified access control list (ACL) to the
--
--
interface. Use the ip access-list command to configure an
ACL.
NOTE: This command requires the PEFNG license.
Applies ACL to interface's inbound traffic.
--
--
Applies ACL to interface's outbound traffic.
--
--
Applies session ACL to interface and optionally to a selected --
--
VLAN associated with this port.
Negates any configured parameter.
--
--
Causes a hard shutdown of the interface.
--
--
Enables spanning tree.
--
--
Enables forwarding of traffic from the interface.
--
--
Sets switching mode parameters for the interface.
--
--
Sets the interface as an access port for the specified VLAN. --
--
The interface carries traffic only for the specified VLAN.
AOS-W 6.2 | Reference Guide
interface port-channel | 325
Parameter mode trunk native
trusted
vlan <word>
xsec point-to-point allowed vlan mtu vlan
Description
Range
Default
Sets the mode of the interface to access or trunk mode only. --
--
Sets the interface as a trunk port for the specified VLANs. A --
--
trunk port carries traffic for multiple VLANs using 802.1q
tagging to mark frames for specific VLANs. You can include
all VLANs configured on the switch, or add or remove
specified VLANs.
Specifies the native VLAN for the trunk mode interface.
--
--
Frames on the native VLAN are not 802.1q tagged.
Set this interface and range of VLANs to be trusted. VLANs -- not included in the trusted range of VLANs will be, by default, untrusted.
Trusted ports and VLANs are typically connected to internal controlled networks, while untrusted ports connect to thirdparty APs, public areas, or other networks to which access controls should be applied. When Alcatel-Lucent APs are attached directly to the switch, set the port to be trusted.
disabled
Sets the supplied range of VLANs as trusted. All remaining 1-4094 -- become untrusted automatically. For example, if you set a VLAN range as: vlan 1-10, 100-300, 301, 305-400, 501-4094 Then all VLANs in this range are trusted and all others become untrusted by default. You can also use the no trusted vlan command to explicitly make an individual VLAN untrusted. The no trusted vlan command is additive and adds given vlans to the existing untrusted vlan set. However, if you execute the trusted vlan <word>command, it overrides any earlier untrusted VLANs or a range of untrusted VLANs and creates a new set of trusted VLANs. NOTE: A port supports a user VLAN range from 1-4094. If you want to set all VLANs (1-4094) on a port as untrusted then mark the port itself as untrusted. By default the port and all its associated VLANs are trusted.
Enables and configures the Extreme Security (xSec)
--
--
protocol.
NOTE: You must purchase and install the xSec software
module license in the switch.
MAC address of the switch that is the xSec tunnel
--
--
termination point, and the 16-byte shared key used to
authenticate the switches to each other. The key must be the
same on both switches.
VLANs that are allowed on the xSec tunnel.
--
--
(Optional) MTU size for the xSec tunnel.
--
--
xSec VLAN ID. For switch-to-switch communications, both switches must belong to the same VLAN.
1-4094 --
Usage Guidelines
A port channel allows you to aggregate ports on a switch. You can configure a maximum of 8 port channels per supported switch with a maximum of 8 interfaces per port channel.
326 | interface port-channel
AOS-W 6.2 | Reference Guide
Note the following when setting up a port channel between a switch and a Cisco switch (such as a Catalyst 6500 Series Switch): l There must be no negotiation of the link parameters. l The port-channel mode on the Cisco switch must be "on".
Example
The following command configures a port channel: (host) (config) #interface port channel 7
add fastethernet 1/1 add fastethernet 1/2
Command History
Release AOS-W 3.0 AOS-W 3.4
AOS-W 3.4.1
Modification Command introduced
The trusted VLAN and ip access-group session vlan parameters were introduced.
The trusted vlan <word> parameter was added.
Command Information
Platforms
OAW-4324 and OAW-6000 switch, and
Licensing
Command Mode
This command is available in the base operating system. The ipaccess-group parameter requires the PEFNG license. The xsec parameter requires the xSec license.
Config mode on master and local switches
AOS-W 6.2 | Reference Guide
interface port-channel | 327
interface-profile voip-profile
interface-profile voip-profile <profile-name> clone <source> no{...} voip-dot1p <priority> voip-dscp <value> voip-mode [auto-discover | static] voip-vlan <VLAN-ID>
Description
This command creates a VoIP profile that can be applied to any interface or an interface group.
Syntax
Parameter <profile-name>
voip-dot1p <priority> voip-dscp <value> voip-mode [auto-discover | static]
voip-vlan <vlan id>
Description Name of the VoIP profile.
Specifies the dot1p priority. Specifies the DSCP value for the voice VLAN Specifies the mode of VoIP operation. l auto-discover - Operates VoIP on auto
discovery mode. l static - Operates VoIP on static mode. Specifies the Voice VLAN ID.
Range
Default
1-32
--
char-
acters;
cannot
begin
with a
numeric
char-
acter
--
--
--
--
--
static
--
--
Usage Guidelines
Use this command to create VoIP VLANs for VoIP phones. Creating a VoIP profile does not apply the configuration to any interface or interface group. To apply the VoIP profile, use the interface gigabitethernet and interface-group commands.
Example
The following command configures a VoIP profile: interface-profile voip-profile VoIP_PHONES voip-dot1p 100 voip-dscp 125 voip-mode auto-discover voip-vlan 126
328 | interface-profile voip-profile
AOS-W 6.2 | Reference Guide
Command History
This command was introduced in AOS-W
Release AOS-W 6.2
Modification Command introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
interface-profile voip-profile | 329
interface range
interface range {fastethernet|gigabitethernet} <slot>/<port>-<port> duplex {auto|full|half} ip access-group <acl> {in|out|session {vlan <vlanId>}} no ... poe [cisco] shutdown spanning-tree [cost <value>] [port-priority <value>] [portfast] speed {10|100|auto} switchport {access vlan <vlan>|mode {access|trunk}| trunk {allowed vlan {<vlans>|add <vlans>|all|except <vlans>|remove <vlans>}| native vlan <vlan>}} trusted {vlan <word>}
Description
This command configures a range of FastEthernet or GigabitEthernet interfaces on the switch.
Syntax
Parameter range
duplex
ip access-group
in out session
no poe
cisco shutdown spanning-tree
cost
Description
Range
Default
Range of Ethernet ports in the format <slot>/<port>-
--
--
<port>.
Transmission mode on the interface: full- or halfduplex or auto to automatically adjust transmission.
auto/full/hal- auto f
Applies the specified access control list (ACL) to the
--
--
interface. Use the ip access-list command to configure
an ACL.
Applies ACL to interface's inbound traffic.
--
--
Applies ACL to interface's outbound traffic.
--
--
Applies session ACL to interface and optionally to a
--
--
selected VLAN associated with this port.
Negates any configured parameter.
--
--
Enables Power-over-Ethernet (PoE) on the interface. --
--
Enables Cisco-style PoE on the interface.
--
--
Causes a hard shutdown of the interface.
--
--
Enables spanning tree.
--
--
Administrative cost associated with the spanning tree. 1-65535
--
330 | interface range
AOS-W 6.2 | Reference Guide
Parameter port-priority
portfast speed switchport
access vlan mode trunk
trusted
vlan <word>
Description
Range
Default
Spanning tree priority of the interface. A lower setting brings the port closer to root port position (favorable for forwarding traffic) than does a higher setting. This is useful if ports may contend for root position if they are connected to an identical bridge.
0-255
Enables forwarding of traffic from the interface.
--
--
Sets the interface speed: 10 Mbps, 100 Mbps, or auto 10|100|aut- auto
configuration.
o
Sets switching mode parameters for the interface.
--
--
Sets the interface as an access port for the specified
--
--
VLAN. The interface carries traffic only for the
specified VLAN.
Sets the mode of the interface to access or trunk mode --
--
only.
Sets the interface as a trunk port for the specified
--
--
VLANs. A trunk port carries traffic for multiple VLANs
using 802.1q tagging to mark frames for specific
VLANs. You can include all VLANs configured on the
switch, or add or remove specified VLANs. Specify
native to identify the native VLAN for the trunk mode
interface. Frames on the native VLAN are not 802.1q
tagged.
Set this interface and range of VLANs to be trusted.
--
VLANs not included in the trusted range of VLANs will
be, by default, untrusted.
Trusted ports and VLANs are typically connected to
internal controlled networks, while untrusted ports
connect to third-party APs, public areas, or other
networks to which access controls should be applied.
When Alcatel-Lucent APs are attached directly to the
switch, set the port to be trusted.
enabled
Sets the supplied range of VLANs as trusted. All
1-4094
--
remaining become untrusted automatically.
For example, If you set a VLAN range as:
vlan 1-10, 100-300, 301, 305-400, 501-4094
Then all VLANs in this range are trusted and all others
become untrusted by default. You can also use the no
trusted vlan command to explicitly make an individual
VLAN untrusted. The no trusted vlan command is
additive and adds given vlans to the existing untrusted
vlan set.
However, if you execute the trusted vlan <word>
command, it overrides any earlier untrusted VLANs or
a range of untrusted VLANs and creates a new set of
trusted VLANs.
NOTE: A port supports a user VLAN range from 1-
4094. If you want to set all VLANs (1-4094) on a port
as untrusted then mark the port itself as untrusted. By
default the port and all its associated VLANs are
trusted.
AOS-W 6.2 | Reference Guide
interface range | 331
Usage Guidelines
Use the show port status command to obtain information about the interfaces available on the switch.
Example
The following command configures a range of interface as a trunk port for a set of VLANs: interface range fastethernet 1/12-15
switchport mode trunk switchport trunk native vlan 10 switchport trunk allowed vlan 1,10,100
Command History
Release AOS-W 3.0 AOS-W 3.4
AOS-W 3.4.1
Modification Command introduced
The trusted VLAN and ip access-group session vlan parameters were introduced.
The trusted vlan <word> parameter was added.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
332 | interface range
AOS-W 6.2 | Reference Guide
interface tunnel
interface tunnel <number> description <string> inter-tunnel-flooding ip address <ipaddr> <netmask> mtu <mtu> no ... shutdown trusted tunnel checksum|destination <ipaddr>|keepalive [<interval> <retries>]|key <key>|mode gre {<protocol>|ip}|source {<ipaddr>|loopback|vlan <vlan>}|vlan <vlans>
Description
This command configures a tunnel interface.
Syntax
Parameter tunnel description inter-tunnelflooding ip address mtu no shutdown trusted
tunnel checksum destination
Description Identification number for the tunnel. String that describes this interface. Enables inter-tunnel flooding.
Range
Default
1-
--
2147483647
--
Tunnel
Interface
--
enabled
IP address of the tunnel. This represents the
--
--
entrance to the tunnel.
MTU size for the interface.
1024 - 9216 --
Negates any configured parameter.
--
--
Causes a hard shutdown of the interface.
--
--
Set this interface and range of VLANs to be trusted. -- VLANs not included in the trusted range of VLANs will be, by default, untrusted.
Trusted ports and VLANs are typically connected to internal controlled networks, while untrusted ports connect to third-party APs, public areas, or other networks to which access controls should be applied. When Alcatel-Lucent APs are attached directly to the switch, set the port to be trusted.
disabled
Configures tunneling.
--
mode gre
ip
Enables end-to-end checksum of packets that pass -- through the tunnel.
disabled
Destination IP address for the tunnel endpoint.
--
--
AOS-W 6.2 | Reference Guide
interface tunnel | 333
Parameter keepalive
<interval> <retries> key mode gre
source
vlan
Description
Range
Default
Enables sending of periodic keepalive frames on
--
the tunnel to determine the tunnel status (up or
down). You can optionally set the interval at which
keepalive frames are sent, and the number of times
the frames are resent before a tunnel is considered
to be down.
disabled
(Optional) Number of seconds at which keepalive frames are sent.
1-86400
10 seconds
(Optional) Number of consecutive times that the
0-1024
3
keepalives fail before the tunnel is considered to be
down.
Key used to authenticate packets on the tunnel.
0-
--
4294967295
Specifies generic route encapsulation (GRE) type. --
--
You configure either a 16-bit protocol number (for
Layer-2 tunnels) or ip (for a Layer-3 tunnel). The 16-
bit protocol number uniquely identifies a Layer-2
tunnel. The switches at both endpoints of the tunnel
must be configured with the same protocol number.
The local endpoint of the tunnel on the switch. This --
--
can be one of the following:
l specified IP address
l the loopback interface configured on the switch
l specified VLAN
VLANs to be included in this tunnel.
--
--
Usage Guidelines
You can configure a GRE tunnel between an Alcatel-Lucent switch and another GRE-capable device. Layer-3 GRE tunnel type is the default (tunnel mode gre ip). You can direct traffic into the tunnel using a static route (specify the tunnel as the next hop for a static route) or a session-based access control list (ACL).
Example
The following command configures a tunnel interface: (host) (config) #interface tunnel 200
ip address 10.1.1.1 255.255.2550 tunnel source loopback tunnel destination 20.1.1.242 tunnel mode gre ip
Command History
Release AOS-W 3.0 AOS-W 3.2
Modification Command introduced The keepalive parameter was introduced.
334 | interface tunnel
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config mode on master and local switches
AOS-W 6.2 | Reference Guide
interface tunnel | 335
interface vlan
interface vlan <vlan> bandwidth-contract <name> bcmc-optimization description <string> ip address {<ipaddr> <netmask>|dhcp-client|{internal}|pppoe}|helper-address <ipaddr>|igmp|local-proxy-arp|[nat inside]|{ospf area <id>}routing}| pppoe-max-segment-site <number>| pppoe-password|pppoe-service-name|pppoe-username|routing ipv6 {address <ipv6-address> link-local | [<ipv6-prefix>/<prefix-length> | eui-64]| mld [snooping] | nd {ra [dns | enable | hop-limit | interval | life-time | managed-config-flag | mtu | other-config-flag | preference | prefix] | reachable-time <value> | retransmit-time <value>}} mtu multimode-auth no ... operstate up option-82 mac essid shutdown suppress-arp
Description
This command configures a VLAN interface.
Syntax
Parameter vlan bandwidth-contract
bcmc-optimization
description ip
address
Description
Rang- Defau-
e
lt
VLAN ID number.
1-
--
4094
Name of the bandwidth contract to be
--
--
applied to this VLAN interface. When
applied to a VLAN, the contract only limits
multicast traffic and does not affect other
data. Use the aaa bandwidth-contract
command to configure a bandwidth contract.
Enables broadcast and multicast traffic
--
optimization to prevent flooding of broadcast
and multicast traffic on VLANs. If this feature
is enabled on uplink ports, any switch-
generated Layer-2 packets will be dropped.
disabled
String that describes this interface.
--
802.1-
Q
VLAN
Configures IPv4 for this interface.
Configures the IP address for this interface, --
--
which can be one of the following:
<ipaddr> <netmask>
l dhcp-client: use DHCP to obtain the IP
address
l internal: IP address allocated from the
336 | interface vlan
AOS-W 6.2 | Reference Guide
Parameter
helper-address
igmp local-proxy-arp nat inside ospf pppoe-max-segment-site pppoe-password pppoe-service-name pppoe-username routing
ipv6 address mld snooping nd {ra | reachable-time | retransmit-time}
AOS-W 6.2 | Reference Guide
Description
Rang- Defau-
e
lt
Remote Node Profile. l pppoe: use PPPoE to obtain the IP
address
IP address of the DHCP server for relaying --
--
DHCP requests for this interface. If the
DHCP server is on the same subnetwork as
this VLAN interface, you do not need to
configure this parameter.
Enables IGMP and/or IGMP snooping on
--
--
this interface.
Enables local proxy ARP.
--
--
Enables source network address translation --
--
(NAT) for all traffic routed from this VLAN.
Define an OSPF area. See ip ospf on page --
--
389 for complete details on this command.
Configures the TCP maximum segment size 128
--
in bytes.
Configures the PAP password on the
180 --
PPPoE Access Concentrator for the switch.
Configures the PPPoE service name.
180 --
Configures the PAP username on the
180 --
PPPoE Access Concentrator for the switch.
Enables layer-3 forwarding on the VLAN
--
interface. To disable layer-3 forwarding, you
must configure the IP address for the
interface and specify no ip routing.
(enabled)
Configures IPv6 for this interface.
--
--
Configures the link local address or the
--
--
global unicast adress for this interface.
Enables Multicast Listener Discovery (MLD) --
--
snooping on this interface.
Configures the IPv6 neighbor discovery
--
--
options.
l ra--configures the following router
advertizement options:
l dns--Configures IPv6 recursive DNS
server
l enable--Enables IPv6 RA
l hop-limit--Configures RA hop-limit
l interval--Configures RA interval
l life-time--Configures RA lifetime
l managed-config-flag--Enables hosts to
use DHCP server for stateful address
autoconfiguration
interface vlan | 337
Parameter
no mtu multimode-auth operstate up option-82 mac
essid shutdown suppress-arp
Description
Rang- Defau-
e
lt
l mtu--Configures maximum transmission unit for RA
l other-config-flag--Enables hosts to use DHCP server for other non-address stateful autoconfiguration
l preference--Configures a router preference
l prefix--Configures IPv6 RA prefix l reachable-time--configures neighbor
discovery reachable time l retransmit-time--configures neighbor
discovery retransmit time
Negates any configured parameter.
--
--
MTU setting for the VLAN.
1024- -- 1500
MultiMode Authentication Support on VLAN --
--
Set the state of the interface to be up.
--
--
Allows a DHCP relay agent to insert circuit --
--
specific information into a request that is
being forwarded to a DHCP server.
The switch, when acting as a DHCP relay
agent, needs to be able to insert information
about the AP and SSID through which a
client is connecting into the DHCP request.
Many service providers use this mechanism
to make access control decisions. You can
include only the MAC address or MAC
address and ESSID.
ESSID is an alphanumeric name that uniquely identifies a wireless network.
--
--
Causes a hard shutdown of the interface.
--
--
Prevents flooding of ARP broadcasts on all --
--
the untrusted interfaces.
Usage Guidelines
All ports on the switch are assigned to VLAN 1 by default. Use the interface fastethernet|gigabitethernet command to assign a port to a configured VLAN. User the show interface vlan and show user commands to view DHCP option-82 related output.
Example
The following command configures a VLAN interface: (host) (config) #interface vlan 16
ip address 10.26.1.1 255.255.255.0 ip helper-address 10.4.1.22
Command History
This command was introduced in AOS-W 3.0
338 | interface vlan
AOS-W 6.2 | Reference Guide
Release AOS-W 3.0 AOS-W 3.3 AOS-W 3.4
AOS-W 6.0
AOS-W 6.1 AOS-W 6.2
Modification
Command introduced
The ipv6 parameters were introduced.
The igmp snooping parameter was deprecated. For information on configuring IGMP snooping in AOS-W 3.4 or later, see interface vlan ip igmp proxy on page 342.
The pppoe-max-segment-site, pppoe-password, pppoe-servicename and pppoe-password parameters were introduced.
The option-82 parameter was introduced.
The nd parameter for configuring neighbor discovery and router advertizement options was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
interface vlan | 339
interface vlan ipv6 address
interface vlan <vlan ID> ipv6 address <ipv6-address> link-local | [<ipv6-prefix>/<prefix-length> | eui-64] ipv6 {address <ipv6-address> link-local | [<ipv6-prefix>/<prefix-length> | eui-64]| mld [snooping] | nd {ra [dns | enable | hop-limit | interval | life-time | managed-config-flag | mtu | other-config-flag | preference | prefix] | reachable-time <value> | retransmit-time <value>}}
Description
This command configures the IPv6 link local address or the global unicast address, and the IPv6 router advertisement parameters for this interface.
Syntax
Parameter
Description
Range
<ipv6 address> link-local Configures the specified IPv6 address as the
--
link local address for this interface.
<ipv6-prefix>/<prefixlength>
Specify the IPv6 prefix/prefix-length to configure -- the global unicast address for this interface.
eui-64
Specify this optional parameter to configure the -- global unicast address in Extended Universal Identifier 64 bit format (EUI-64) for this interface.
nd
Configures the IPv6 neighbor discovery options --
for router advertizement functionality.
ra
Configures the following router advertisement
--
options:
l dns--Configures IPv6 recursive DNS server.
l enable--Enables IPv6 RA.
l hop-limit--Configures RA hop-limit.
l interval--Configures RA interval.
l life-time--Configures RA lifetime.
l managed-config-flag--Enables hosts to use
DHCP server for stateful address
autoconfiguration
l mtu--Configures maximum transmission unit
for RA.
l other-config-flag--Enables hosts to use
DHCP server for other non-address stateful
autoconfiguration.
l preference--Configures a router preference.
l prefix--Configures IPv6 RA prefix.
reachable-time <value>
Configures the neighbor discovery reachable time in msec.
0 - 3,600, 000
retransmit-time <value> Configures the neighbor discovery retransmit time in msec.
0 - 3,600, 000
Default -- -- -- -- --
0
Usage Guidelines
You can use this command to configure the IPv6 link local address and the global unicast address for this interface.
340 | interface vlan ipv6 address
AOS-W 6.2 | Reference Guide
Example
The following example configures the link local address for the VLAN 1. (host) (conf)# interface vlan 1
(config-subif)#ipv6 address fe80::b:8600:50d:7700 link-local
The following example configures the global unicast address in EUI-64 format for the VLAN 1. (host) (conf)# interface vlan 1
(config-subif)#ipv6 address 2001:DB8:0:3::/64 eui-64
Command History
Release AOS-W 6.1 AOS-W 6.2
Modification
This command was introduced.
The nd parameter for configuring neighbor discovery and router advertisement options was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
interface vlan ipv6 address | 341
interface vlan ip igmp proxy
interface vlan <vlan> ip igmp snooping|{proxy fastethernet|gigabitethernet <slot>/<port>}
Description
This command enables IGMP and/or IGMP snooping on this interface, or configures a VLAN interface for uninterrupted streaming of multicast traffic.
Syntax
Parameter snooping
proxy fastethernet gigabitethernet <slot>/<port>
Description
Enable IGMP snooping. The IGMP protocol enables an router to discover the presence of multicast listeners on directly-attached links. Enable IGMP snooping to limit the sending of multicast frames to only those nodes that need to receive them.
Enable IGMP on this interface.
Enable IGMP proxy on the FastEthernet (IEEE 802.3) interface.
Enable IGMP proxy on the GigabitEthernet (IEEE 802.3) interface.
Any command that references a Fast Ethernet or Gigabit Ethernet interface requires that you specify the corresponding port on the switch in the format <slot>/<port>. <slot> is always 1, except when referring to interfaces on the OAW-6000 switch. For the OAW-6000 switch, the four slots are allocated as follows: l Slot 0: contains a OmniAccess Supervisor Card III. l Slot 1: can contain either an OmniAccess Supervisor Card III, or a line card. l Slot 2: can contain either a OmniAccess Supervisor Card III or a line card.. l Slot 3: can contain either a OmniAccess Supervisor Card III or a line card. <port> refers to the network interfaces that are embedded in the front panel of the OAW-4x04 Series switch, OmniAccess Supervisor Card III, or a line card installed in the OAW-6000 switch. Port numbers start at 0 from the left-most position.
Usage Guidelines
The newer IGMP proxy feature and the older IGMP snooping feature cannot be enabled at the same time, as both features add membership information to multicast group table. For most multicast deployments, you should enable the IGMP Proxy feature on all VLAN interfaces to manage all the multicast membership requirements on the switch. If IGMP snooping is configured on some of the interfaces, there is a greater chance that multicast information transfers may be interrupted.
Example
The following example configures IGMP proxy for vlan 2. IGMP reports from the switch would be sent to the upstream router on fastethernet port 1/3. (host) (conf)# interface vlan 2
(conf-subif)# ip igmp proxy fastethernet 1/3
342 | interface vlan ip igmp proxy
AOS-W 6.2 | Reference Guide
Related Commands
This release of AOS-W supports version 1 of the Multicast Listener Discovery (MLD) protocol (MLDv1). MLDv1, defined in RFC 2710, is derived from version 2 of the IPv4 Internet Group Management Protocol (IGMPv2) Issue the command interface vlan <vlan> ipv6 mld to enable the MLD protocol and allow an IPv6 router to discover the presence of multicast listeners on directly-attached links. Use the CLI command interface vlan <vlan> ipv6 mld snooping, and the IPv6 router will send multicast frames to only those nodes that need to receive them.
Command History
This command was introduced in AOS-W 3.4
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
interface vlan ip igmp proxy | 343
ip access-list eth
ip
ip access-list eth {<number>|<name>} deny {<ethtype> [<bits>]|any} [mirror] [position} no ... permit {<ethtype> [<bits>]|any} [mirror][position]
Description
This command configures an Ethertype access control list (ACL).
Syntax
Parameter eth deny
no permit
Description
Range
Enter a name, or a number in the specified range.
200-299
Reject the specified packets, which can be one of the following:
--
l Ethertype in decimal or hexadecimal (0-65535) and optional wildcard (0-
65535)
l any: match any Ethertype
Optionally, you can configure the mirror parameter, which mirrors packets to a
datapath or remote destination, or set the position of the ACL. The default
position is last, a position of 1 puts the ACL at the top of the list.
Negates any configured parameter.
--
Allow the specified packets, which can be one of the following:
--
l Ethertype in decimal or hexadecimal (0-65535) and optional wildcard (0-
65535)
l any: match any Ethertype
Optionally, you can configure the mirror parameter, which mirrors packets to a
datapath or remote destination, or set the position of the ACL. The default
position is last, a position of 1 puts the ACL at the top of the list.
Usage Guidelines
The Ethertype field in an Ethernet frame indicates the protocol being transported in the frame. This type of ACL filters on the Ethertype field in the Ethernet frame header, and is useful when filtering non-IP traffic on a physical port. This ACL can be used to permit IP frames while blocking other non-IP protocols such as IPX or Appletalk. If you configure the mirror option, define the destination to which mirrored packets are sent in the firewall policy. For more information, see firewall on page 265.
Example
The following command configures an Ethertype ACL: (host) (config) #ip access-list eth 200
deny 809b
344 | ip access-list eth
AOS-W 6.2 | Reference Guide
Command History
Release AOS-W 3.0 AOS-W 3.3
Modification Command introduced The mirror parameter was introduced.
Command Information
Platform Available on all platforms
License Requires the PEFNG license.
Command Mode
Config mode on master switches
AOS-W 6.2 | Reference Guide
ip access-list eth | 345
ipv6 cp-redirect-address
ipv6 cp-redirect-address <ip6addr> | disable
Description
This command configures a redirect address for captive portal.
Syntax
Parameter <ip6addr> disable
Description This address should be routable from all external networks. Disables automatic DNS resolution for captive portal.
Usage Guidelines
This command redirects wireless clients that are on different VLANs (from the switch's IP address) to the captive portal on the switch. If you have the Next Generation Policy Enforcement Firewall (PEFNG) license installed in the switch, modify the captive portal session ACL to permit HTTP/S traffic to the destination cp-redirect-address <ip6addr> instead of mswitch. If you do not have the PEFNG license installed in the switch, the implicit captive-portal-profile ACL is automatically modified when you issue this command.
Example
The following command configures a captive portal redirect address: (host) (config) #ipv6 cp-redirect-address
Command History
Introduced in AOS-W 6.1
Command Information
Platform Available on all platforms
License
Available in the base operating system
Command Mode Config mode on master switches
346 | ipv6 cp-redirect-address
AOS-W 6.2 | Reference Guide
ipv6 default-gateway
ipv6 default-gateway <ipv6-address> <cost>
Description
This command configures an IPv6 default gateway.
Syntax
Parameter
<ipv6address>
cost
Description Specify the IPv6 address of the default gateway.
Specify the distance metric to select the routing protocol that determines the way to learn the route.
Usage Guidelines
This command configures an IPv6 default gateway.
Example
The following command configures an IPv6 default gateway: (host) (config) #ipv6 default-gateway 2cce:205:160:100::fe 1
Command History
Introduced in AOS-W 6.1
Command Information
Platform Available on all platforms
License
Available in the base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ipv6 default-gateway | 347
348 | ipv6 default-gateway
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
ipv6 default-gateway | 349
ipv6 enable
ipv6 enable
Description
This command enables IPv6 packet processing globally. This option is disabled by default.
Syntax
No parameters.
Usage Guidelines
This command enables IPv6 packet processing globally.
Command History
This command was introduced in AOS-W 6.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Config mode on master switches
350 | ipv6 enable
AOS-W 6.2 | Reference Guide
ipv6 firewall
ipv6 firewall attack-rate {ping <number>|session <number>|tcp-syn <number>} deny-inter-user-bridging | drop-ip-fragments | enable-per-packet-logging | enforce-tcp-handshake | prohibit-ip-spoofing | prohibit-rst-replay | session-idle-timeout <seconds> | session-mirror-destination {ip-address <ipaddr>}|{port <slot/<port>}
Description
This command configures firewall options on the switch for IPv6 traffic.
Syntax
Parameter attack-rate
ping
session
tcp-syn
deny-inter-userbridging
drop-ip-frag ments enable-per-pac ket-logging
Description
Range
Sets rates which, if exceeded, can indicate a denial of service attack.
Number of ICMP pings per second, which if exceeded, can indicate a denial of service attack. Recommended value is 4
1-255
Number of TCP or UDP connection requests per second, which if exceeded, can indicate a denial of service attack. Recommended value is 32.
1-255
Number of TCP SYN messages per second, which if exceeded, can indicate a denial of service attack. Recommended value is 32.
1-255
Prevents the forwarding of Layer-2 traffic between wired -- or wireless users. You can configure user role policies that prevent Layer-3 traffic between users or networks but this does not block Layer-2 traffic. This option can be used to prevent Appletalk or IPX traffic from being forwarded.
When enabled, all IP fragments are dropped. You
--
should not enable this option unless instructed to do so
by an Alcatel-Lucent representative.
Enables logging of every packet if logging is enabled for -- the corresponding session rule. Normally, one event is logged per session. If you enable this option, each packet in the session is logged. You should not enable this option unless instructed to do so by an AlcatelLucent representative, as doing so may create unnecessary overhead on the switch.
Default -- -- -- disabled
disabled disabled
AOS-W 6.2 | Reference Guide
ipv6 firewall | 351
Parameter
Description
Range
enforce-tcphandshake
Prevents data from passing between two clients until the -- three-way TCP handshake has been performed. This option should be disabled when you have mobile clients on the network as enabling this option will cause mobility to fail. You can enable this option if there are no mobile clients on the network.
prohibit-ipspoofing
Detects IP spoofing (where an intruder sends messages -- using the IP address of a trusted client). When this option is enabled, IP and MAC addresses are checked; possible IP spoofing attacks are logged and an SNMP trap is sent.
prohibit-rst-re play
Closes a TCP connection in both directions if a TCP
--
RST is received from either direction. You should not
enable this option unless instructed to do so by an
Alcatel-Lucent representative.
session-idletimeout
Time, in seconds, that a non-TCP session can be idle before it is removed from the session table. You should not modify this option unless instructed to do so by an Alcatel-Lucent representative.
16-259
session-mirrordestination
Destination to which mirrored session packets are sent. -- The destination can be either an IPv4 address or a switch port. You configure IPv6 flows to be mirrored with the mirror option of the ipv6 access-list session command. Use this option only for troubleshooting or debugging.
ip-address <ipaddr> Send mirrored session packets to the specified IP address
port <slot>/<port>
Send mirrored session packets to the specified switch port.
Default disabled
disabled
disabled 15 seconds --
Usage Guidelines
This command configures global firewall options on the switch for IPv6 traffic.
Example
The following command disallows forwarding of non-IP frames between IPv6 clients: (host) (config) #ipv6 firewall deny-inter-user-bridging
Command History
Version AOS-W 3.3 AOS-W 6.1
Description
Command introduced
The ipv6 firewall enable command was deprecated. Use the command ipv6 enable to enable/disable ipv6 packet/firewall processing on the switch.
352 | ipv6 firewall
AOS-W 6.2 | Reference Guide
Command Information
Platform Available on all platforms
License
Command Mode
Available in the base operating system, except Config mode on master
for noted parameters
switches
AOS-W 6.2 | Reference Guide
ipv6 firewall | 353
ipv6 mld
ipv6 mld query-interval query-response-interval robustness-variable
Description
This command configures the IPv6 MLD (Multi-listener discovery) parameters.
Syntax
Parameter
Description
query-interval
Specify the time interval in seconds (1-65535) between general queries sent by the querier. The default value is 125 seconds. By varying this value, you can tune the number of MLD messages on the link; larger values cause MLD queries to be sent less often.
query-responseinterval
Specify the maximum response delay in deciseconds (1/10 seconds) that can be inserted into the periodic general queries. The default value is 100 deciseconds. By varying this value, you can tune the burstiness of MLD messages on the link; larger values make the traffic less bursty, as node responses are spread out over a larger interval. NOTE: The number of seconds represented by this value must be less than the query interval.
robustness-variable
Specify a value between 2 to 10. The default value is 2. The robustness variable allows you to tune for the expected packet loss on a link. If a link is expected to be lossy, you can increase this value. NOTE: You must not configure the robustness variable as 0 or 1.
Usage Guidelines
You can modify the default values of the MLD parameters for IPv6 MLD snooping. You must enable IPv6 MLD snooping for these values to take effect. For more information on enabling IPv6 MLD snooping, see interface vlan on page 336.
Example
The following command configures the query interval of 200 seconds for IPv6 MLD snooping: (host) (config) #ipv6 mld (host) (config-mld) # query-interval 200
Command History
Introduced in AOS-W 6.1
Command Information
Platform Available on all platforms
License
Available in the base operating system
Command Mode Config mode on master switches
354 | ipv6 mld
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
ipv6 mld | 355
ipv6 neighbor
ipv6 neighbor <ipv6addr> vlan <vlan#> <mac>
Description
This command configures an IPv6 static neighbor on a VLAN interface.
Syntax
Parameter <ipv6addr>
vlan <vlan#>
<mac>
Description Specify the IPv6 address of the neighbor entry. Specify the VLAN ID.
Specify the 48-bit hardware address of the neighbor entry.
Usage Guidelines
You can configure an IPv6 static neighbor on a VLAN interface.
Example
The following command configures an IPv6 static neighbor on VLAN 1: (host) (config) #ipv6 neighbor 2cce:205:160:100::fe vlan 1 00:0b:86:61:13:28
Command History
Introduced in AOS-W 6.1
Command Information
Platform Available on all platforms
License
Available in the base operating system
Command Mode Config mode on master switches
356 | ipv6 neighbor
AOS-W 6.2 | Reference Guide
ipv6 route
ipv6 route <ipv6-prefix/prefix-length> <ipv6-next-hop> <cost>
Description
This command configures static IPv6 routes on the switch.
Syntax
Parameter <ipv6-prefix/prefixlength>
<ipv6-next-hop>
<cost>
Description Specify the IPv6 address and the prefix length of the destination.
Specify the next-hop IPv6 address or null 0 to terminate or discard the packets. Specify the distance metric to select the routing protocol that determines the way to learn the route.
Usage Guidelines
You can configure static IPv6 routes on the switch.
Example
The following command configures a static IPv6 route on the switch: (host) (config) #ipv6 route 2cce:205:160:100::fe/<64> 2cce:205:160:100::ff 1
Command History
Introduced in AOS-W 6.1
Command Information
Platform Available on all platforms
License
Available in the base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ipv6 route | 357
ip access-list extended
ip access-list extended {<number>|<name>} deny <protocol> <source> <dest> ipv6 no ... permit <protocol> <source> <dest>
Description
This command configures an extended access control list (ACL). To configure IPv6 specific rules, use the ipv6 keyword for each rule.
Syntax
Parameter extended
Description Enter a name, or a number in the specified range.
ipv6 deny
<protocol>
<source> <dest> no permit <protocol>
<source>
Use the ipv6 keyword to add IPv6 specific rules.
Reject the specified packets.
Protocol, which can be one of the following: l Protocol number between 0-255 l any: any protocol l icmp: Internet Control Message Protocol l igmp: Internet Gateway Message Protocol l tcp: Transmission Control Protocol l udp: User Datagram Protocol
Source, which can be one of the following: l Source address (IPv4 or IPv6) and wildcard l any: any source l host: specify a single host IP address
Destination, which can be one of the following: l Destination address (IPv4 or IPv6) and wildcard l any: any destination l host: specify a single host IP address
Negates any configured parameter.
Allow the specified packets.
Protocol, which can be one of the following: l Protocol number between 0-255 l any: any protocol l icmp: Internet Control Message Protocol l igmp: Internet Gateway Message Protocol l tcp: Transmission Control Protocol l udp: User Datagram Protocol
Source, which can be one of the following: Source address (IPv4 or IPv6) and wildcard any: any source
Range 100-199, 2000-2699 -- -- --
--
--
-- --
--
358 | ip access-list extended
AOS-W 6.2 | Reference Guide
Parameter <dest>
Description
host: specify a single host IP address
Destination, which can be one of the following: Destination address (IPv4 or IPv6) and wildcard any: any destination host: specify a single host IP address
Range --
Usage Guidelines
Extended ACLs are supported for compatibility with router software from other vendors. This ACL permits or denies traffic based on the source or destination IP address or IP protocol.
Example
The following command configures an extended ACL: (host) (config) #ip access-list extended 100
deny any host 1.1.21.245 any
Command History
This command was available in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Requires the PEFNG license
Command Mode
Config mode on master switches
AOS-W 6.2 | Reference Guide
ip access-list extended | 359
ip access-list mac
ip access-list mac {<number>|<name>} deny {<macaddr>[<wildcard>]|any|host <macaddr>} [mirror] no ... permit {<macaddr>[<wildcard>]|any|host <macaddr>} [mirror]
Description
This command configures a MAC access control list (ACL).
Syntax
Parameter mac deny
no permit
Description
Configures a MAC access list. Enter a name, or a number in the specified range.
Reject the specified packets, which can be the following: MAC address and optional wildcard any: any packets host: specify a MAC address Optionally, you can configure the mirror parameter, which mirrors packets to a datapath or remote destination.
Negates any configured parameter.
Allow the specified packets, which can be the following: MAC address and optional wildcard any: any packets host: specify a MAC address Optionally, you can configure the mirror parameter, which mirrors packets to a datapath or remote destination.
Range 700-799, 12001299 --
-- --
Usage Guidelines
MAC ACLs allow filtering of non-IP traffic. This ACL filters on a specific source MAC address or range of MAC addresses. If you configure the mirror option, define the destination to which mirrored packets are sent in the firewall policy. For more information, see firewall on page 265.
Example
The following command configures a MAC ACL: (host) (config) #ip access-list mac 700
deny 11:11:11:00:00:00
Command History
Release AOS-W 3.0 AOS-W 3.3
Modification Command introduced The mirror parameter was introduced.
360 | ip access-list mac
AOS-W 6.2 | Reference Guide
Command Information
Platform Available on all platforms
License Requires the PEFNG license
Command Mode Config mode
AOS-W 6.2 | Reference Guide
ip access-list mac | 361
ip access-list session
ip access-list session <accname> <source> <dest> <service> <action> [<extended action>] ipv6 [alias | any | host | network | user] no ...
Description
This command configures an access control list (ACL) session. To create IPv6 specific rules, use the ipv6 keyword.
Syntax
Parameter <accname> ipv6 <source>
<dest>
<service>
<action>
Description
Name of an access control list session.
Use the ipv6 keyword to create IPv6 specific rules.
The traffic source, which can be one of the following: alias: specify the network resource (use the netdestination command to configure aliases; use the show netdestination command to see configured aliases) any: match any traffic host: specify a single host IP address localip: specify the local IP address to match traffic network: specify the IP address and netmask user: represents the IP address of the user
The traffic destination, which can be one of the following: alias: specify the network resource (use the netdestination command to configure aliases; use the show netdestination command to see configured aliases) any: match any traffic host: specify a single host IP address localip: specify the local IP address to match traffic network: specify the IP address and netmask user: represents the IP address of the user
Network service, which can be one of the following: IP protocol number (0-255) name of a network service (use the show netservice command to see configured services) any: match any traffic tcp: specify the TCP port number (0-65535) udp: specify the UDP port number (0-65535)
Action if rule is applied, which can be one of the following: deny: Reject packets dst-nat: Performs destination NAT on packets. Forward packets from source network to destination; re-mark them with destination IP of the target network. This action functions in tunnel/decrypt-tunnel forwarding mode. User should configure the NAT pool in the switch. dual-nat: Performs both source and destination NAT on packets. Source IP and destination IP is changed as per the NAT pool configured. This action functions in tunnel/decrypttunnel forwarding mode. User should configure the NAT pool in the switch. permit: Forward packets. redirect: Specify the location to which packets are redirected, which can be one of the following: l Datapath destination ID (0-65535).
362 | ip access-list session
AOS-W 6.2 | Reference Guide
Parameter <extended ac tion>
no
Description
l esi-group: Specify the ESI server group configured with the esi group command. l tunnel: Specify the ID of the tunnel configured with the interface tunnel command. route: Specify the next hop to which packets are routed, which can be one of the following: l dst-nat: Destination IP changes to the IP configured from the NAT pool. This action
functions in bridge/split-tunnel forwarding mode. User should configure the NAT pool in the switch. l src-nat:Source IP changes to RAP's external IP. This action functions in bridge/splittunnel forwarding mode and uses implied NAT pool. src-nat: Performs source NAT on packets. Source IP changes to the outgoing interface IP address (implied NAT pool) or from the pool configured (manual NAT pool). This action functions in tunnel/decrypt-tunnel forwarding mode.
Optional action if rule is applied, which can be one of the following: blacklist: blacklist user if ACL gets applied. classify-media: Monitors user UDP packets to classify them as media and tag accordingly.
Use this parameter only for voice and video signaling and control sessions as it causes deep packet inspection of all UDP packets from/to users.
disable-scanning: pause ARM scanning while traffic is present. Note that you must enable "VoIP Aware Scanning" in the ARM profile for this feature to work. dot1p-priority: specify 802.1p priority (0-7) log: generate a log message mirror: mirror all session packets to datapath or remote destination If you configure the mirror option, define the destination to which mirrored packets are sent in the firewall policy. For more information, see firewall on page 265. next-hop-list: Route packet to the next hop in the list. position: specify the position of the rule (1 is first, default is last) queue: assign flow to priority queue (high/low) send-deny-response: if <action> is deny, send an ICMP notification to the source time-range: specify time range for this rule (configured with time-range command) tos: specify ToS value (0-63)
Negates any configured parameter.
Usage Guidelines
Session ACLs define traffic and firewall policies on the switch. You can configure multiple rules for each policy, with rules evaluated from top (1 is first) to bottom. The first match terminates further evaluation. Generally, you should order more specific rules at the top of the list and place less specific rules at the bottom of the list. The ACL ends with an implicit deny all. To configure IPv6 rules, use the ipv6 keyword followed by the regular ACL keywords.
Example
The following command configures a session ACL that drops any traffic from 10.0.0.0 subnetwork: ip access-list session drop-from10
network 10.0.0.0 255.0.0.0 any any
The following command configures a session ACL with IPv4 and IPv6 address: (host) (config)#ip access-list session common (host) (config-sess-common)#host 10.12.13.14 any any permit (host) (config-sess-common)#ipv6 host 11:12:11:11::2 any any permit
The following example displays information for an ACL. (host) (config-sess-common)#show ip access-list common ip access-list session common
common
AOS-W 6.2 | Reference Guide
ip access-list session | 363
-------
Priority Source
Destination Service Action ... Queue TOS 8021P ...
ClassifyMedia IPv4/6
-------- ------
----------- ------- ------ ... ----- --- ----- ... ---------
---- ------
1
10.12.13.14
any
any
permit ... Low
...
4
2
11:12:11:11::2 any
any
permit ... Low
...
6
Command History
Introduced in AOS-W 3.0
Command Information
Platform Available on all platforms
License Requires the PEFNG license
Command Mode Config mode on master switches
364 | ip access-list session
AOS-W 6.2 | Reference Guide
ip access-list standard
ip access-list standard {<number>|<name>} deny {<ipaddr> <wildcard>|any|host <ipaddr>} no ... permit {<ipaddr> <wildcard>|any|host <ipaddr>}
Description
This command configures a standard access control list (ACL).
Syntax
Parameter standard ipv6 deny
no permit
Description
Range
Enter a name, or a number in the specified range.
1-99, 1300-1399
Use the ipv6 keyword to create IPv6 specific standard rules.
Reject the specified packets, which can be the following: -- IP address and optional wildcard any: any packets host: specify a host IP address
Negates any configured parameter.
--
Allow the specified packets, which can be the following: -- IP address and optional wildcard any: any packets host: specify a host IP address
Usage Guidelines
Standard ACLs are supported for compatibility with router software from other vendors. This ACL permits or denies traffic based on the source address of the packet.
Example
The following command configures a standard ACL: (host) (config) #ip access-list standard 1
permit host 10.1.1.244
Command History
Introduced in AOS-W 3.0
Command Information
Platform Available on all platforms
License Requires the PEFNG license
Command Mode
Config mode on master switches
AOS-W 6.2 | Reference Guide
ip access-list standard | 365
ip cp-redirect-address
ip cp-redirect-address <ipaddr> | disable
Description
This command configures a redirect address for captive portal.
Syntax
Parameter <ipaddr>
disable
Description
Host address with a 32-bit netmask. This address should be routable from all external networks.
Disables automatic DNS resolution for captive portal.
Usage Guidelines
This command redirects wireless clients that are on different VLANs (from the switch's IP address) to the captive portal on the switch. If you have the Next Generation Policy Enforcement Firewall (PEFNG) license installed in the switch, modify the captive portal session ACL to permit HTTP/S traffic to the destination cp-redirect-address <ipaddr> instead of mswitch. If you do not have the PEFNG license installed in the switch, the implicit captive-portal-profile ACL is automatically modified when you issue this command.
Example
The following command configures a captive portal redirect address: (host) (config) #ip cp-redirect-address
Command History
Introduced in AOS-W 3.0
Command Information
Platform Available on all platforms
License
Available in the base operating system
Command Mode Config mode on master switches
366 | ip cp-redirect-address
AOS-W 6.2 | Reference Guide
ip default-gateway
ip default-gateway <ipaddr>|{import cell|dhcp|pppoe}|{ipsec <name>} <cost>
Description
This command configures the default gateway for the switch.
Syntax
Parameter <ipaddr> import
cell dhcp pppoe ipsec <name> <cost>
Description IP address of the default gateway. Use a gateway IP address obtained through the cell interface, DHCP or PPPoE. The default gateway is imported into the routing table and removed when the uplink is no longer active.
Use a gateway IP address obtained through the cell interface.
Use a gateway IP address obtained DHCP.
Use a gateway IP address obtained through PPPoE. Define a static route using an ipsec map. Distance metric for this route.
Usage Guidelines
You can use this command to set the default gateway to the IP address of the interface on the upstream router or switch to which you connect the switch. If you define more than one dynamic gateway type, you must also define a cost for the route to each gateway. The switch will first attempt to obtain a gateway IP address using the option with the lowest cost. If the switch is unable to obtain a gateway IP address, it will then attempt to obtain a gateway IP address using the option with the next-lowest path cost.
Example
The following command configures the default gateway for the switch: (host) (config) #ip default-gateway 10.1.1.1
Command History
Introduced in AOS-W 3.0
Command Information
Platform
License
Available on all platforms Available in the base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ip default-gateway | 367
ip dhcp excluded-address
ip dhcp excluded-address <low-ipaddr> [<high-ipaddr>]
Description
This command configures an excluded address range for the DHCP server on the switch.
Syntax
Parameter <low-ipaddr>
<high-ipaddr>
Description
Low end of range of IP addresses. For example, you can enter the IP address of the switch so that this address is not assigned.
High end of the range of IP addresses.
Usage Guidelines
Use this command to specifically exclude certain addresses from being assigned by the DHCP server. It is good practice to exclude any statically assigned addresses.
Example
The following command configures an excluded address range: ip dhcp excluded-address 192.168.1.1 192.168.1.255
Command History
Introduced in AOS-W 3.0
Command Information
Platform Available on all platforms
License Available in base operating system
Command Mode
Config mode on master switches
368 | ip dhcp excluded-address
AOS-W 6.2 | Reference Guide
ip dhcp pool
ip dhcp pool <name> default-router <ipaddr> ... dns-server {<ipaddr> ... |import} domain-name <name> lease <days> <hours> <minutes> netbios-name-server {<ipaddr> ... |import} network <ipaddr> {<netmask>|<prefix>} no ... option <code> ip <ipaddr> pooltype ipupsell|private|public vendor-class-identifier
Description
This command configures a DHCP pool on the switch.
Syntax
Parameter default-router
dns-server <address> import
domain-name lease
netbios-nameserver
<address> import network
no option
pooltype
vendor-classidentifier
Description
IP address of the default router for the DHCP client. The client should be on the same subnetwork as the default router. You can specify up to eight IP addresses.
IP address of the DNS server, which can be one of the following:
IP address of the DNS server. You can specify up to eight IP addresses.
Use the DNS server address obtained through PPPoE or DHCP.
Domain name to which the client belongs.
The amount of time that the assigned IP address is valid for the client. Specify the lease in <days> <hours> <minutes>.
IP address of the NetBIOS Windows Internet Naming Service (WINS) server, which can be one of the following:
IP address of the WINS server. You can specify up to eight IP addresses.
Use the NetBIOS name server address obtained through PPPoE or DHCP.
Range of addresses that the DHCP server may assign to clients, in the form of <ipaddr> and <netmask> or <ipaddr> and <prefix> (/n).
Negates any configured parameter.
Client-specific option code and IP address. See RFC 2132, "DHCP Options and BOOTP Vendor Extensions".
Configure one of the following DHCP Pool types l ipupsell: Configure the DHCP pool as an IP upsell pool l private: Configure the DHCP pool as private l public: Configure the DHCP pool as public
Send the ArubaAP vendor ID to clients.
AOS-W 6.2 | Reference Guide
ip dhcp pool | 369
Usage Guidelines
A DHCP pool should be created for each IP subnetwork for which DHCP services should be provided. DHCP pools are not specifically tied to VLANs, as the DHCP server exists on every VLAN. When the switch receives a DHCP request from a client, it examines the origin of the request to determine if it should respond. If the IP address of the VLAN matches a configured DHCP pool, the switch answers the request.
Example
The following command configures a DHCP pool: (host) (config) #ip dhcp pool floor1
default-router 10.26.1.1 dns-server 192.168.1.10 domain-name floor1.test.com lease 0 8 0 network 10.26.1.0 255.255.255.0
Command History
Introduced in AOS-W 3.0
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Config mode on master switches
370 | ip dhcp pool
AOS-W 6.2 | Reference Guide
ip domain lookup
ip domain lookup
Description
This command enables Domain Name System (DNS) hostname to address translation.
Syntax
There are no parameters for this command.
Usage Guidelines
This command is enabled by default. Use the no form of this command to disable.
Example
The following command enables DNS hostname translation: (host)(config) #ip domain lookup
Command History
This command was available in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Config mode on master switches
AOS-W 6.2 | Reference Guide
ip domain lookup | 371
ip domain-name
ip domain-name <name>
Description
This command configures the default domain name.
Syntax
Parameter domain-name
Description Name used to complete unqualified host names. Do not specify the leading dot (.).
Usage Guidelines
The switch uses the default domain name to complete hostnames that do not contain domain names. You must have at least one domain name server configured on the switch (see ip name-server on page 387).
Example
The following command configures the default domain name: (host) (config) #ip domain-name yourdomain.com
Command History
This command was available in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Config mode on master switches
372 | ip domain-name
AOS-W 6.2 | Reference Guide
ip igmp
ip igmp last-member-query-count <number> last-member-query-interval <seconds> max-members-per-group <val> query-interval <seconds> query-response-interval <.1 seconds> quick-client-convergence robustness-variable <2-10> startup-query-count <number> startup-query-interval <seconds> version-1-router-present-timeout <seconds>
Description
This command configures Internet Group Management Protocol (IGMP) timers and counters.
Syntax
Parameter last-member-query-count last-member-query-interval max-members-per-group query-interval
query-response-interval
quick-client-convergence robustness-variable startup-query-count startup-query-interval
version-1-router-presenttimeout
Description
Range Default
Number of group-specific queries that the switch 1-65535 2 sends before assuming that there are no local group members.
Maximum time, in seconds, that can elapse between group-specific query messages.
1-65535 10 seconds seconds
Configure maximum members per group.
1-65535 300
Interval, in seconds, at which the switch sends host-query messages to the multicast group address 224.0.0.1 to solicit group membership information.
1-65535 125 seconds seconds
Maximum time, in 1/10th seconds, that can elapse between when the switch sends a hostquery message and when it receives a response. This must be less than the queryinterval.
1-65535 seconds
100 (10 seconds)
Trigger IGMP reports from client during roaming. --
--
Increase this value to allow for expected packet 2-10
2
loss on a subnetwork.
Number of queries that the switch sends out on 1-65535 2 startup, separated by startup-query-interval. The default is the robustness-variable value.
Interval, in seconds, at which the switch sends general queries on startup.
1-65535 seconds
1/4 of the query interval
Timeout, in seconds, if a version 1 IGM router is 1-65535 400
detected.
seconds seconds
AOS-W 6.2 | Reference Guide
ip igmp | 373
Usage Guidelines
IGMP is used to establish and manage IP multicast group membership. See RFC 3376, "Internet Group Management Protocol, version 3" for more information.
Example
The following command configures IGMP: (host) (config) #ip igmp
query-interval 130
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced Added parameters: max-members-per-group and quick-client-convergence
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Config mode on master switches
374 | ip igmp
AOS-W 6.2 | Reference Guide
ip local
ip local pool <name> <start-ipaddr> [<end-ipaddr>]
Description
This command configures a local IP pool for Layer-2 Tunnel Protocol (L2TP).
Syntax
Parameter pool <start-ipaddr> <end-ipaddr>
Description Name for the address pool. Starting IP address for the pool. (Optional) Ending IP address for the pool.
Usage Guidelines
VPN clients can be assigned IP addresses from the L2TP pool.
Example
The following command configures an L2TP pool: (host) (config) #ip local pool 10.1.1.1 10.1.1.99
Command History
This command was available in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ip local | 375
ip mobile active-domain
ip mobile
ip mobile active-domain <name>
Description
This command configures the mobility domain that is active on the switch.
Syntax
Parameter active-domain
Description Name of the mobility domain.
Usage Guidelines
All switches are initially part of the "default" mobility domain. If you use the "default" mobility domain, you do not need to specify this domain as the active domain on the switch. However, once you assign a switch to a user-defined domain, the "default" mobility domain is no longer an active domain on the switch.
Example
The following command assigns the switch to a user-defined mobility domain: (host) (config) #ip mobile active-domain campus1
Command History
This command was available in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Config mode on master switches
376 | ip mobile active-domain
AOS-W 6.2 | Reference Guide
ip mobile domain
ip mobile domain <name> description <description> hat <subnetwork> <mask> <vlan> <ha-ipaddr> <desc> no ...
Description
This command configures the mobility domain on the switch.
Syntax
Parameter domain description hat
<subnetwork> <mask> <vlan>
<ha-ipaddr> <desc>
no
Description Name of the mobility domain. Description of the mobility domain. Configures a home agent table (HAT) entry. Subnet that requires mobility service. Netmask for the IP address. VLAN ID. The VLAN ID must be the VLAN number on the home agent. The supported range of VLAN IDs is 1-4096.. IP address of the home agent. Description of a HAT entry. The description can be a maximum of 30 characters (including spaces). Negates any configured parameter.
Usage Guidelines
You configure the HAT on a master switch; the mobility domain information is pushed to all local switches that are managed by the same master.
HAT entries map subnetworks or VLANs and the home agents. The home agent is typically the switch's IP address. The home agent's IP address must be routable; that is, all switches that belong to the same mobility domain must be able to reach the home agent's IP address.
The switch looks up information in the HAT to obtain the IP address of the home agent for a mobile client. Because there can be multiple home agents on a subnetwork, the HAT can contain more than one entry for the same subnetwork.
Example
The following command configures HAT entries:
(host) (mobility-domain) #ip mobile domain east_building (host) (mobility-domain) #hat 10.11.1.0 255.255.255.0 120 10.11.1.200 description "East building entries" (host) (mobility-domain) #show ip mobile domain east_building Mobility Domains:, 1 domain(s) ------------------------------
AOS-W 6.2 | Reference Guide
ip mobile domain | 377
Domain name east_building
Home Agent Table, 1 subnet(s)
subnet
mask
VlanId Home Agent
Description
--------------- --------------- ------ --------------- -------------------------
10.11.1.0
255.255.255.0 120 10.11.1.200
East building entries
Command History
Release AOS-W 3.0 AOS-W 6.0
AOS-W 3.4.1
Modification Command available.
A new parameter, description is added for providing more information about a HAT entry.
vlan range parameter introduced.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Config mode on master switches
378 | ip mobile domain
AOS-W 6.2 | Reference Guide
ip mobile foreign-agent
ip mobile foreign-agent {lifetime <seconds> | max-visitors <number> | registrations {interval <msecs> | retransmits <number>}}
Description
This command configures the foreign agent for IP mobility.
Syntax
Parameter lifetime max-visitors registrations
interval retransmits
Description
Range
Requested lifetime, in seconds, as per RFC 3344, "IP 10-65534 Mobility Support for IPv4".
Maximum number of active visitors.
0-5000
Frequency at which re-registration messages are sent to the home agent:
Retransmission interval, in milliseconds
100-10000
Maximum number of times the foreign agent attempts 0-5 mobile IP registration message exchanges before giving up.
Default 180 seconds 5000
1000 milliseconds 3
Usage Guidelines
A foreign agent is the switch which handles all mobile IP communication with a home agent on behalf of a roaming client.
Example
The following command configures the foreign agent: (host) (config) #ip mobile foreign-agent registration interval 10000
Command History
This command was available in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ip mobile foreign-agent | 379
ip mobile home-agent
ip mobile home-agent {max-bindings <number>|replay <seconds>}
Description
This command configures the home agent for IP mobility.
Syntax
Parameter max-bindings
replay
Description
Range Default
Maximum number of mobile IP bindings. This option is an additional limitation to control the maximum number of roaming users. When the limit is reached, registration requests from the foreign agent fail which causes a mobile client to set a new session on the visited switch, which will become its home switch.
0-5000
5000
Time difference, in seconds, for timestamp-based replay protection, as described by RFC 3344, "IP Mobility Support for IPv4". 0 disables replay.
0-300
7 seconds
Usage Guidelines
A home agent for a mobile client is the switch where the client first appears when it joins the mobility domain. The home agent is the single point of contact for the client when it roams.
Example
The following command configures the home agent: (host) (config) #ip mobile home-agent replay 100
Command History
This command was available in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Config mode on master switches
380 | ip mobile home-agent
AOS-W 6.2 | Reference Guide
ip mobile packet-trace
ip mobile packet-trace <mac-address>
Description
This command enables packet tracing for the given mac address.
Use this command with caution. It replaces the existing users with user entries from the imported file.
Syntax
Platform <mac-address>
License The MAC address of the host
Usage Guidelines
Executing this command enables packet tracing for the given mac address. This is used for troubleshooting purposes only.
Example
The following command enables packet tracing for the host: (host) (config) #ip mobile packet-trace 00:40:96:a6:a1:a4
Command History
This command was available in AOS-W 3.4.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ip mobile packet-trace | 381
ip mobile proxy
ip mobile proxy auth-sta-roam-only | block-dhcp-release | dhcp {max-requests <number>|transaction-hold <seconds>|transaction-timeout <seconds>}| event-threshold <number> | log-trail | no-service-timeout <seconds> | on-association | refresh-stale-ip stale-timeout <seconds> | stand-alone-AP | trail-length <number> |trail-timeout <seconds>
Description
This command configures the proxy mobile IP module in a mobility-enabled switch.
Syntax
Parameter auth-sta-roamonly
block-dhcp-re lease
dhcp aggressivetransaction
ignore-options
max-requests transaction-
hold
transactiontimeout
event-threshold
Description
Range Default
Allows a client to roam only if has been authenticated. -- If a client has not been authenticated, no mobility service is offered if it roams to a different VLAN or switch.
enabled
Determines whether DHCP release packets generated -- from the client should be dropped or forwarded to the DHCP server. Blocking the packets prevents the DHCP server from assigning the same IP address to another client until the lease has expired.
disabled
Configures proxy DHCP
--
--
Terminate proxy DHCP state machine on a transaction id change. New bootp request will kick start a new DHCP state machine. NOTE: Best practices is to keep this parameter at the default setting
0-65534 25
Enables support for devices that use DHCP with zero -- options (For example, Symbol). NOTE: Best practices is to keep this parameter at the default setting
disabled
Maximum number of BOOTP packets that are allowed to be handled during one DHCP session.
0-65534 25
Hold time, in seconds, on proxy DHCP state after completion of DHCP transaction (DHCP ACK) was forwarded to the client. This option ensures that late BOOTP replies reach the station and that a retransmitted BOOTP request does not trigger a new proxy DHCP session.
1-600
5 seconds
Maximum time allowed for a proxy DHCP session to complete.
10-600
60 seconds
Maximum number of mobility events (events that can trigger mobility) handled per second. Mobility events above this threshold are ignored. This helps to control frequent mobility state changes when the client bounces back and forth on APs before settling down.
1-65535 25
382 | ip mobile proxy
AOS-W 6.2 | Reference Guide
Parameter log-trail no-service-time out on-association
refresh-stale-ip stale-timeout
stand-alone-AP
trail-length trail-timeout
Description
Range Default
Enables logging at the notification level for mobile
--
client moves.
enabled
Time, in seconds, after which mobility service expires. If nothing has changed from the previous state, the client is given another bridge entry but it will have limited connectivity.
3060000
180 seconds
Mobility move detection is performed when the client -- associates with the switch instead of when the client sends packets. Enabled by default. Mobility on association can speed up roaming and improve connectivity for devices that do not send many uplink packets out that can trigger mobility. Downside is security; an association is all it takes to trigger mobility. This is irrelevant unless layer-2 security is enforced.
enabled
Mobility forces station to renew its stale IP (assuming its DHCP) by deauthorizing the station.
Number of seconds the mobility state is retained after the loss of connectivity. This allows authentication state and mobility information to be preserved on the home agent switch. The default is 60 seconds but can be safely increased. Note that in many case a station state is deleted without waiting for the stale timeout; user delete from management, foreign agent to foreign agent handoff, etc. (This is different from the noservice-timeout; no-service-timeout occurs up front while the stale-timeout begins when mobility service is provided but the connection is disrupted for some reason.)
30-3600
60 seconds
Enables support for third party or standalone APs.
--
When this is enabled, broadcast packets are not used
to trigger mobility and packets from untrusted
interfaces are accepted.
If mobility is enabled, you must also enable standalone
AP for the client to connect to the switch's untrusted
port. If the switch learns wired users via the following
methods, enable standalone AP:
l Third party AP connected to the switch through the
untrusted port.
l Clients connected to ENET1 on APs with two
ethernet ports.
l Wired user connected directly to the switch's
untrusted port.
disabled
Specifies the maximum number of entries (client moves) stored in the user mobility trail.
1-100
30
Specifies the maximum interval, in seconds, an inactive mobility trail is held.
12086400
3600 seconds
Usage Guidelines
The proxy mobile IP module in a mobility-enabled switch detects when a mobile client has moved to a foreign network and determines the home agent for a roaming client. The proxy mobile IP module performs the following functions:
AOS-W 6.2 | Reference Guide
ip mobile proxy | 383
l Derives the address of the home agent for a mobile client from the HAT using the mobile client's IP address. If there is more than one possible home agent for a mobile client in the HAT, the proxy mobile IP module uses a discovery mechanism to find the current home agent for the client.
l Detects when a mobile client has moved. Client moves are detected based on ingress port and VLAN changes and mobility is triggered accordingly. For faster roaming convergence between AP(s) on the same switch, it is recommended that you keep the "on-association" option enabled. This helps trigger mobility as soon as 802.11 association packets are received from the mobile client.
Example
The following command enables the packet trace for the given MAC address: ip mobile packet-trace 00:40:96:a6:a1:a4
Command History
Version AOS-W 3.0 AOS-W 6.2
Modification
Command introduced.
The re-home parameter was deprecated as the re-homing functionality is no longer available.
Command Information
Platform Available on all platforms
License Available in the base operating system.
Command Mode Config mode on master switches
384 | ip mobile proxy
AOS-W 6.2 | Reference Guide
ip mobile revocation
ip mobile revocation {interval <msec>|retransmits <number>
Description
This command configures the frequency at which registration revocation messages are sent.
Syntax
Parameter interval
retransmits
Description
Retransmission interval, in milliseconds.
Maximum number of times the home agent or foreign agent attempts mobile IP registration/revocation message exchanges before giving up.
Range
Default
100-10000 1000
ms
ms
0-5
3
Usage Guidelines
A home agent or foreign agent can send a registration revocation message, which revokes registration service for the mobile client. For example, when a mobile client roams from one foreign agent to another, the home agent can send a registration revocation message to the first foreign agent so that the foreign agent can free any resources held for the client.
Example
The following command configures registration revocation messages: (host) (config) #ip mobile revocation interval 2000
Command History
This command was available in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system.
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ip mobile revocation | 385
ip mobile trail (deprecated)
ip mobile trail {host IP address | host MAC address}
Description
This command configures the capture of association trail for all devices.
Command History
Version AOS-W 3.0 AOS-W 6.1
Description Command introduced Command deprecated
386 | ip mobile trail (deprecated)
AOS-W 6.2 | Reference Guide
ip name-server
ip name-server <ipaddr>
Description
This command configures servers for name and address resolution.
Syntax
Parameter <ip-addr>
Description IP address of the server.
Usage Guidelines
You can configure up to six servers using separate commands. Specify one or more servers when you configure a default domain name (see ip domain-name on page 372).
Example
The following command configures a name server: ip name-server 10.1.1.245
Command History
This command was available in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system.
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ip name-server | 387
ip nat
ip nat pool <name> <start-ipaddr> <end-ipaddr> [<dest-ipaddr>]
Description
This command configures a pool of IP addresses for network address translation (NAT).
Syntax
Parameter pool <start-ipaddr> <end-ipaddr> <dest-ipaddr>
Description Name of the NAT pool. IP address that defines the beginning of the range of source NAT addresses in the pool. IP address that defines the end of the range of source NAT addresses in the pool. Destination NAT IP address.
Usage Guidelines
This command configures a NAT pool which you can reference in a session ACL rule (see ip access-list session on page 362).
Example
The following command configures a NAT pool: (host) (config) #ip nat pool 2net 2.1.1.1 2.1.1.125
Command History
This command was available in AOS-W 3.0.
Command Information
Platform Available on all platforms
License
This command requires the PEFNG license.
Command Mode
Config mode on master and local switches
388 | ip nat
AOS-W 6.2 | Reference Guide
ip ospf
ip ospf area|{authentication message-digest | cost <cost> | dead-interval <seconds> | hellointerval <seconds> | message-digest-key <keyid> <passwd> | priority <number> | retransmitinterval <seconds> |transmit-delay <seconds>
Description
Configure OSPF on the VLAN interface.
Syntax
Parameter
Description
Range
Default
area
Enable OSPF on a specific interface by entering the IP address of the router that will use OSPF.
authentication message-digest Set the OSPF authentication mode to message digest.
disabled
cost <cost>
Set the cost associated with the OSPF traffic on an interface.
1 to 65535 1
dead-interval <seconds>
Set the elapse interval (seconds) since 1 to 65535 40 the last hello-packet was received from seconds the router. After the interval elapses, the neighboring routers declare the router dead.
hello-interval <seconds>
Set the elapse interval (seconds) between hello packets sent on the interface.
1 to 65535 10 seconds
message-digest-key <keyid> <passwd>
Enable OSPF MD5 authentication and set the key identification and a character string password.
<keyid> = 1 to 256
No default
priority <number>
Set the priority number of the interface to 0 to 255
1
determine the DR.
retransmit-interval <seconds> Set the retransmission time between link 1 to 65535 5
state advertisements for adjacencies
seconds
belonging to the interface.
NOTE: Set the time interval long enough
to prevent unnecessary retransmissions.
transmit-delay <seconds>
Set the elapse time before retransmitting 1 to 65535 1
link state update packets on the
seconds
interface.
Usage Guidelines
When configuring OSPF over multiple vendors, use this command to ensure that all routers use the same cost. Otherwise, OSPF may route improperly.
AOS-W 6.2 | Reference Guide
ip ospf | 389
Related Commands
Command show ip ospf
Description View the OSPF configuration
Command History
Release AOS-W 3.4
Modification Command introduced
Command Information
Platforms All Platforms
Licensing Base operating system
Command Mode
Configuration Interface Mode (configsubif)
390 | ip ospf
AOS-W 6.2 | Reference Guide
ip pppoe-max-segment-size (deprecated)
ip pppoe-max-segment-size <mss>
Description
This command configures the maximum TCP segment size (mss), in bytes, for Point-to-Point Protocol over Ethernet (PPPoE) data.
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced Command deprecated
AOS-W 6.2 | Reference Guide
ip pppoe-max-segment-size (deprecated) | 391
ip pppoe-password (deprecated)
ip pppoe-password <password>
Description
This command configures the PPP over Ethernet (PPPoE) password.
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced Command deprecated
392 | ip pppoe-password (deprecated)
AOS-W 6.2 | Reference Guide
ip pppoe-service-name (deprecated)
ip pppoe-service-name <service_name>
Description
This command configures the PPP over Ethernet (PPPoE) service name.
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced Command deprecated
AOS-W 6.2 | Reference Guide
ip pppoe-service-name (deprecated) | 393
ip pppoe-username (deprecated)
ip pppoe-username <username>
Description
This command configures the PPP over Ethernet (PPPoE) username.
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced Command deprecated
394 | ip pppoe-username (deprecated)
AOS-W 6.2 | Reference Guide
ip radius
ip radius {nas-ip <ipaddr>|rfc-3576-server udp-port <port>|source-interface {loopback|vlan <vlan>}
Description
This command configures global parameters for configured RADIUS servers.
Syntax
Parameter nas-ip
rfc-3576-server
udp-port source-inter face
loopback vlan
Description
Range Default
NAS IP address to send in RADIUS packets. A server-specific --
--
NAS IP configured with the aaa authentication-server
radius command supersedes this configuration.
Configures the UDP port to receive requests from a RADIUS
--
--
server that can send user disconnect and change-of-
authorization messages, as described in RFC 3576, "Dynamic
Authorization Extensions to Remote Dial In User Service
(RADIUS)". See the aaa rfc-3576-server command to configure
the server.
NOTE: This parameter can only be used on the master switch.
UDP port to receive server requests.
0-
3799
65535
Interface for all outgoing RADIUS packets. The IP address of
--
--
the specified interface is included in the IP header of RADIUS
packets. The interface can be one of the following:
The loopback interface.
--
--
The specified VLAN.
--
--
Usage Guidelines
This command configures global RADIUS server parameters. If the aaa authentication-server radius command configures a server-specific NAS IP, the server-specific IP address is used instead.
Example
The following command configures a global NAS IP address sent in RADIUS packets: (host) (config) #ip radius nas-ip 192.168.1.245
Command History
This command was available in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
ip radius | 395
Command Information
Platform Available on all platforms
License
Command Mode
The ip radius rfc-3576-server udp-port command requires the PEFNG license. Other commands are available in the base operating system.
Config mode on master and local switches
396 | ip radius
AOS-W 6.2 | Reference Guide
ip route
ip route <destip> <destmask> {<nexthop> [<cost>]|ipsec <name>|null 0}
Description
This command configures a static route on the switch.
Syntax
Parameter <destip> <destmask> <nexthop> [<cost>]
ipsec <name>
null 0
Description
Enter the destination prefix address in dotted decimal format (A.B.C.D).
Enter the destination prefix mask address in dotted decimal format (A.B.C.D).
Enter the forwarding router address in dotted decimal format (A.B.C.D). Optionally, enter the distance metric (cost) for this route. The cost prioritizes routing to the destination. The lower the cost, the higher the priority.
Enter the keyword ipsec followed by the ipsec map name to use a static ipsec route map.
Enter the key word null 0 to designate a null interface.
Usage Guidelines
This command configures a static route on the switch other than the default gateway. Use the ip default-gateway command to set the default gateway to the IP address of the interface on the upstream router or switch to which you connect the switch.
Example
The following command configures a static route: (host) (config) #ip route 172.16.0.0 255.255.0.0 10.1.1.1
Command History
This command was available in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Config mode on master and local switches
AOS-W 6.2 | Reference Guide
ip route | 397
lacp group
lacp group <group_number> mode {active | passive}
Description
Enable Link Aggregation Control Protocol (LACP) and configure LACP on the interface.
Parameter <group_number>
mode {active | passive}
Description
Enter the link aggregation group (LAG) number. Range: 0-7
Enter the keyword mode followed by either the keyword active or passive. l Active mode--the interface is in active negotiating state. LACP runs on any
link that is configured to be in the active state. The port in an active mode also automatically initiates negotiations with other ports by initiating LACP packets. l Passive mode--the interface is not in an active negotiating state. LACP runs on any link that is configured in a passive state. The port in a passive mode responds to negotiations requests from other ports that are in an active state. Ports in passive state respond to LACP packets.
Usage Guidelines
LACP is disabled by default; this command enables LACP. If the group number assigned contains static port members, the command is rejected.
Related Command
Command
Description
show lacp
View the LACP configuration status
show lacp sys-id
View the LACP system ID information
show interface port-channel View information on a specified port channel interface
Command History
Release AOS-W 3.4.1
Modification Command introduced
Command Information
Platform All Platforms
Licensing Base operating system
Command Mode
Configuration Interface Mode (config-if) for Master and Local switches
398 | lacp group
AOS-W 6.2 | Reference Guide
lacp port-priority
lacp port-priority <priority_value>
Description
Configure the LACP port priority.
Syntax
Parameter <priority value>
Description
Enter the port-priority value. The higher the value number the lower the priority. Range: 1 to 65535 Default: 255
Usage Guidelines
Set the port priority for LACP.
Related Commands
Command
Description
lacp group
Enable LACP and configure on the interface
show lacp
View the LACP configuration status
show lacp sys-id
View the LACP system ID information
show interface port-channel View information on a specified port channel interface
Command History
Release AOS-W 3.4.1
Modification Command introduced
Command Information
Platform All Platforms
Licensing Base operating system
Command Mode
Configuration Interface Mode (config-if) for Master and Local switches
AOS-W 6.2 | Reference Guide
lacp port-priority | 399
lacp system-priority
lacp system-priority <priority_value>
Description
Configure the LACP system priority.
Syntax
Parameter <priority_value>
Description
Enter the system priority value. The higher the value number the lower the priority. Range: 1 to 65535 Default: 32768
Usage Guidelines
Set the LACP system priority.
Related Commands
Command
Description
lacp group
Enable LACP and configure on the interface
show lacp
View the LACP configuration status
show lacp sys-id
View the LACP system ID information
show interface port-channel View information on a specified port channel interface
Command History
Release AOS-W 3.4.1
Modification Command introduced
Command Information
Platforms All Platforms
Licensing Base operating system
Command Mode
Configuration Mode (config) for Master and Local switches
400 | lacp system-priority
AOS-W 6.2 | Reference Guide
lacp timeout
lacp timeout {long | short}
Description
Configure the timeout period for the LACP session.
Syntax
Parameter long
short
Description
Enter the keyword long to set the LACP session to 90 seconds. This is the default.
Enter the keyword short to set the LACP session to 3 seconds.
Usage Guidelines
The timeout value is the amount of time that a port-channel interface waits for a LACPDU (Link Aggregation Control Protocol data unit) from the remote system before terminating the LACP session. The default time out value is 90 seconds (long).
Related Commands
Command
Description
lacp group
Enable LACP and configure on the interface
show lacp
View the LACP configuration status
show lacp sys-id
View the LACP system ID information
show interface port-channel View information on a specified port channel interface
Command History
Release AOS-W 3.4.1
Modification Command introduced
Command Information
Platforms All Platforms
Licensing Base operating system
Command Mode
Configuration Interface Mode (config-if) for Master and Local switches
AOS-W 6.2 | Reference Guide
lacp timeout | 401
lcd-menu
lcd-menu [no] disable menu [maintenance [factory-default| media-eject| qui-quick-setup | media-eject | system-halt | system-reboot | upgrade-image [parition0 | partition1]| upload-config]]
Description
This command allows you to enable or disable the LCD menu either completely or for specific operations.
Syntax
Parameter
Description
lcd-menu
Enters the LCD menu configuration mode.
no
Delete the specified LCD menu option.
disable
Disables (or enables) the complete LCD menu.
maintenance
Disables (or enables) the maintenance LCD menu.
factory-default Disables (or enables) the return to factory default option in the LCD menu.
media-eject
Disables (or enables) the media eject option in the LCD menu.
system-halt
Disables (or enables) the system halt option in the LCD menu.
system-reboot
Disables (or enables) the system reboot in the LCD menu.
upgrade-image
Disables (or enables) the upgrade image option in the LCD menu.
partition 0 partition 1
Disables (or enables) image upgrade on the specified partition (0 or 1).
upload-config
Disables (or enables) the upload config option in the LCD menu.
Default
Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled
Usage Guidelines
You can use this command to disable executing the maintenance operations using the LCD menu. You can use the no form of these commands to enable the specific LCD menu. For example, the following commands enable system halt and system reboot options:
(host) (config) #lcd-menu (host) (lcd-menu) #no disable menu maintenance system-halt (host) (lcd-menu) #no disable menu maintenance system-reboot
You can use the following show command to display the current LCD settings:
(host)#show lcd-menu lcd-menu -------Menu ---menu maintenance upgrade-image partition0 menu maintenance upgrade-image partition1 menu maintenance system-reboot reboot-stack menu maintenance system-reboot reboot-local
Value ----enabled enabled enabled enabled
402 | lcd-menu
AOS-W 6.2 | Reference Guide
menu maintenance system-halt halt-stack menu maintenance system-halt halt-local menu maintenance upgrade-image menu maintenance upload-config menu maintenance factory-default menu maintenance media-eject menu maintenance system-reboot menu maintenance system-halt menu maintenance gui-quick-setup menu maintenance menu
enabled enabled enabled enabled enabled enabled enabled enabled enabled enabled enabled
Example
The following example disables the LCD menu completely:
(host) #configure terminal (host) (config) #lcd-menu (host) (lcd-menu) #disable menu
The following example disables executing the specified maintenance operation using the LCD menu:
(host) #configure terminal
(host) (config) #lcd-menu
(host) (lcd-menu) #disable menu maintenance ?
factory-default
Disable factory default menu
gui-quick-setup
Disable quick setup menu on LCD
media-eject
Disable media eject menu on LCD
system-halt
Disable system halt menu on LCD
system-reboot
Disable system reboot menu on LCD
upgrade-image
Disable image upgrade menu on LCD
upload-config
Disable config upload menu on LCD
(host) (lcd-menu) #disable menu maintenance upgrade-image ?
partition0
Disable image upgrade on partition 0
partition1
Disable image upgrade on partition 1
Command History
Introduced in AOS-W 6.2
Command Information
Platform OAW-4x50 switch only.
License
Available in the base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
lcd-menu | 403
license
license {add <key>|del <key>|export <filename>|import <filename>|report <filename>}
Description
This command allows you to install, delete, and manage software licenses on the switch.
Syntax
Parameter add del export import
report
Description
Installs the software license key in the switch. The key is normally sent to you via email.
Removes the software license key from the switch. The key is normally sent to you via email.
Exports the license database on the switch to the specified file in flash.
Replaces the license database on the switch with the specified file in flash. The system serial numbers referenced in the imported file must match the numbers on the switch.
Saves a license report to the specified file in flash.
Usage Guidelines
Obtain an Alcatel-Lucent software license certificate from your Alcatel-Lucent sales representative or authorized reseller. Use the certificate ID and the system serial number to obtain a software license key which you install in the switch.
Users that are not very familiar with this procedure may wish to use the License Management page in the WebUI to install and manage licenses on the switch.
Example
The following command adds a license key on the switch: license add 890BobXs-cVPCb3aJ-7FbCijhZ-BuQPtuI4-RjLJW6Pl-n5K
Command History
Introduced in AOS-W 3.0
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Enable mode on master and local switches
404 | license
AOS-W 6.2 | Reference Guide
local-custom-cert
local-custom-cert local-mac <lmac> ca-cert <ca> server-cert <cert> suite-b <gcm-128 | gcm-256>
Description
This command configures the user-installed certificate for secure communication between a local switch and a master switch.
Syntax
Parameter <lmac> ca-cert <ca>
server-cert <cert>
suite-b
Description
MAC address of the local switch's user-installed certificate.
User-defined name of a trusted CA certificate installed on the local switch. Use the show crypto-local pki TrustedCA command to display the CA certificates that have been imported into the switch.
User-defined name of a server certificate installed on the local switch. Use the show crypto-local pki ServerCert command to display the server certificates that have been imported into the switch.
If you configure your master switches to use IKEv2 and custom-installed certificates, you can optionally use Suite-B cryptographic algorithms for IPsec encryption. Specify one of the following options: l gcm-128 Use 128-bit AES-GCM Suite-B encryption l gcm-256 Use 256-bit AES-GCM Suite-B encryption
Usage Guidelines
Use this command on a master switch to configure the custom certificate for communication with a local switch. On the local switch, use the masterip command to configure the IP address and certificates for the master switch. If your master and local switches use certificates for authentication, the IPsec tunnel will be created using IKEv2.
Example
The following command configures the local switch with a user-installed certificate: (host) (config) #local-custom-cert local-mac 00:16:CF:AF:3E:E1 ca-cert cacert1 server-cert servercert1
Related Commands
Command
show local-certmac
Description
Display the IP, MAC address and certificate configuration of local switches in a master-local configuration
Mode
Config mode on master switches.
Command History
Introduced in AOS-W 6.1
AOS-W 6.2 | Reference Guide
local-custom-cert | 405
Command Information
Platform
Available on all platforms
License
The suite-b gcm-128 and suite-b gcm-256 encryption options for IPsec custom certificates requires the Advanced Cryptography (ACR) license. All other parameters are available in the base operating system
Command Mode
Config mode on master switches
406 | local-custom-cert
AOS-W 6.2 | Reference Guide
local-factory-cert
local-factory-cert local-mac <lmac>
Description
This command configures the factory-installed certificate for secure communication between a local switch and a master switch.
Syntax
Parameter <lmac>
Description MAC address of the local switch's factory-installed certificate.
Usage Guidelines
Use this command on a master switch to configure the factory certificate for communication with a local switch. On the local switch, use the masterip command to configure the IP address and certificates for the master switch. If your master and local switches use certificates for authentication, the IPsec tunnel will be created using IKEv2.
Example
The following command configures the local switch with a factory-installed certificate: (host) (config) #local-factory-cert local-mac 00:16:CF:AF:3E:E1
Related Commands
Command
show local-certmac
Description
Display the IP, MAC address and certificate configuration of local switches in a master-local configuration
Mode
Config mode on master switches.
Command History
Introduced in AOS-W 6.1
Command Information
Platform Available on all platforms
License
Command Mode
Available in the base operating system Config mode on master switches
AOS-W 6.2 | Reference Guide
local-factory-cert | 407
local-userdb-ap add
local-userdb-ap add mac-address <macaddr> ap-group <group> ap-name <ap-name> description <desc> full-name <full-name> remote-ip <ip-addr>
Description
This command adds a AP entry to the remote AP database.
Syntax
Parameter mac-address <mac-address>
ap-group <ap-group> ap-name <ap-name> description <description>
full-name <full-name>
Description
MAC address of the AP whose whitelist database entry you want to modify.
AP group of the AP.
Name of the AP.
Description of the AP. If the description includes spaces, it must be enclosed within quotation marks.
Name of the client using the AP.
Usage Guidelines
You can manually change or disable entries from the remote AP whitelist to temporarily revoke an AP's secure access to the network.
Example
The following command adds a remote AP whitelist entry for an AP with the MAC address 00:16:CF:AF:3E:E1: (host) (config) #local-userdb-ap add mac-address 00:16:CF:AF:3E:E1 ap-group corp12 ap-name AP42 description "Adding new AP to first floor"
Command History
AOS-W 3.0
Modification Command introduced
408 | local-userdb-ap add
AOS-W 6.2 | Reference Guide
local-userdb-guest add
local-userdb-guest
local-userdb-guest add {generate-username|username <name>} {generate-password|password <passwd>} [comment <g_comments>][email <email>] [expiry {duration <minutes>|time <hh/mm/yyy> <hh:mm>}] [guest-company <g_company>][guest-fullname <g_fullname>][guest-phone <g-phone>][mode disable][opt-field-1 <opt1>][opt-field-2 <opt2>][opt-field-3 <opt3>][opt-field-4 <opt4>] [sponsor-dept <sp_dept>][sponsor-mail <sp_email>][sponsor-fullname <sp_fullname>][sponsor-name <sp_name>] [start-time <mm/dd/yyyy> <hh.mm>]
Description
This command creates a guest user in a local user database.
Syntax
Parameter generate-username username generate-password password
comments email expiry duration
time guest-company
guest-fullname guest-phone mode
Description Automatically generate and add a guest username. Add the specified guest username.
Automatically generate a password for the username. Add the specified password for the username.
Comments added to the guest user account. Email address for the guest user account. Expiration for the user account. If this is not set, the account does not expire. Duration, in minutes, for the user account.
Date and time, in mm/dd/yyy and hh:mm format, that the user account expires. Name of the guest's company. NOTE: A guest is the person who needs guest access to the company's Alcatel-Lucent wireless network. The guest's full name. The guest's phone number. Enables or disables the user account,
Range --
1 64 characters
--
Default -- --
--
6 128
--
characters
--
--
--
--
--
no
expiration
1-
--
214748364-
7
--
--
--
Disable
AOS-W 6.2 | Reference Guide
local-userdb-guest add | 409
Parameter opt-field-1
opt-field-2 opt-field-3 opt-field-4 sponsor-dept
sponsor-email sponsor-fullname sponsor-name start-time
Description
Range
This category can be used for some other purpose. -- For example, the optional category fields can be used for another person, such as a "Supervisor." You can enter username, full name, department and Email information into the optional fields.
Same as opt-field-1.
--
Same as opt-field-1.
--
Same as opt-field-1.
--
The guest sponsor's department name.
--
NOTE: A sponsor is the guest's primary contact for
the visit.
The sponsor's email address.
--
The sponsor's full name.
--
The sponsor's name.
--
Date and time, in mm/dd/yyy and hh:mm format, the -- guest account begins.
Default --
-- -- -- --
-- -- -- --
Usage Guidelines
When you specify the internal database as an authentication server, client information is checked against the user accounts in the internal database. You can modify an existing user account in the internal database with the localuserdb-guest modify command, or delete an account with the local-userdb-guest del command. By default, the internal database in the master switch is used for authentication. Issue the aaa authenticationserver internal use-local-switch command to use the internal database in a local switch; you then need to add user accounts to the internal database in the local switch.
Example
The following command adds a guest user in the internal database with an automatically-generated username and password: (host) #local-userdb-guest add generate-username generate-password expiry none
The following information is displayed when you enter the command: GuestConnect Username: guest-5433352 Password: mBgJ6764 Expiration: none
Related Commands
Command show local-userdbguest
show local-userdb
Description
Show the parametesr configured using the local-userdb-guest command.
Show the parameters configured using the local-userdb command.
Mode Enable and Config modes
Enable and Config modes
410 | local-userdb-guest add
AOS-W 6.2 | Reference Guide
Command History
Introduced in AOS-W 3.4.
Command Information
Platform Available on all platforms
License
Available in the base operating system. The role parameter requires the PEFNG license.
Command Mode
Enable and config modes on master switches.
AOS-W 6.2 | Reference Guide
local-userdb-guest add | 411
local-userdb-remote-node
localuserdb
local-userdb-remote-node add mac-address <mac-address> remote-node-profile <remote-node-profile>
del mac-address <mac-address>
Description
This command adds a Remote Node to the Remote Node whitelist. You can also delete the whitelist entry using this command.
Syntax
Parameter mac-address <mac-address>
remote-node-profile <remotenode-profile>
Description
MAC address of the Remote Node in colon-separated six-octet format.
The Remote Node configuration profile to be assigned to that Remote Node.
Range
--
1 64 characters
Default --
--
Usage Guidelines
A Remote Node-master can only assign a configuration profile to a Remote Node in its Remote Node whitelist. To assign a different configuration to an unprovisioned Remote Node, you must delete the whitelist entry and create a new Remote Node whitelist entry with the correct Remote Node configuration profile. A remote-node profile has to be validated before it is configured and pushed to a Remote Node.
Example
This example adds the Remote Node profile named Location-1 to the Remote Node whitelist. (remote-node-master) #local-userdb-remote-node add mac-address 00:16:CF:AF:3E:E1 remote-nodeprofile Location_1 This example removes a Remote Node from the Remote Node whitelist. (remote-node-master)(config) #local-userdb-remote-node del mac-address 00:16:CF:AF:3E:E1
Related Commands
Command remote-node-localip remote-node-masterip remote-node-profile
Description
Configures security for all Remote Node and Remote Switch control traffic
Configures security for the Remote Node master IP address.
The remote-node-profile command lets you create a Remote Node profile.
Mode Config modes Config mode Config mode
412 | local-userdb-remote-node
AOS-W 6.2 | Reference Guide
Command
Description
Mode
show remote-node
Shows Remote Node configuration, dhcp instance, license usage and running configuration information.
Enable and Config mode
show remote-node-dhcp-pool Shows Remote Node dhcp pool configuration information.
Enable and Config mode
show remote-node-profile
Shows Remote Node profile status information.
Enable and Config mode
show local-userdb-remotenode
The output of this command lists the MAC address and assigned Remote Node-profile for of each Remote Node associated with that Remote Node master.
Enable and Config mode
Command History
AOS-W 6.0
Modification Command introduced.
Command Information
Platform Available on all platforms
License Available in the base operating system.
Command Mode Enable mode on master switches.
AOS-W 6.2 | Reference Guide
local-userdb-remote-node | 413
local-userdb add
localuserdb
local-userdb add {generate-username|username <name>} {generate-password|password <passwd>} [comment <g_comments>][email <email>] [expiry {duration <minutes>|time <hh/mm/yyy> <hh:mm>}] [guest-company <g_company>][guest-fullname <g_fullname>][guest-phone <g-phone>][mode disable] [opt-field-1 <opt1>][opt-field-2 <opt2>][opt-field-3 <opt3>][opt-field-4 <opt4>][[remote-ip <ip-addr>][role <role>][sponsor-dept <sp_dept>][sponsor-mail <sp_email>][sponsor-fullname <sp_ fullname>][sponsor-name <sp_name>] [start-time <mm/dd/yyyy> <hh.mm>]
Description
This command creates a user account entry in the switch's internal database.
Syntax
Parameter generate-username username generate-password password
comments email expiry duration
time guest-company
guest-fullname guest-phone mode
Description Automatically generate and add a username. Add the specified username.
Automatically generate a password for the username. Add the specified password for the username.
Comments added to the user account. Email address for the user account. Expiration for the user account. If this is not set, the account does not expire. Duration, in minutes, for the user account.
Date and time, in mm/dd/yyy and hh:mm format, that the user account expires. Name of the guest's company. NOTE: A guest is the person who needs guest access to the company's Alcatel-Lucent wireless network. The guest's full name. The guest's phone number. Enables or disables the user account,
Range --
1 64 characters
--
Default -- --
--
6 128
--
characters
--
--
--
--
--
no
expiration
1-
--
214748364-
7
--
--
--
Disable
414 | local-userdb add
AOS-W 6.2 | Reference Guide
Parameter opt-field-1
opt-field-2 opt-field-3 opt-field-4 remote-ip role
sponsor-dept
sponsor-email sponsor-fullname sponsor-name start-time
Description
Range
This category can be used for some other purpose. -- For example, the optional category fields can be used for another person, such as a "Supervisor." You can enter username, full name, department and Email information into the optional fields.
Same as opt-field-1.
--
Same as opt-field-1.
--
Same as opt-field-1.
--
IP address assigned to the remote peer.
Role for the user. This role takes effect when the
--
internal database is specified in a server group
profile with a server derivation rule. If there is no
server derivation rule configured, then the user is
assigned the default role for the authentication
method.
The guest sponsor's department name
--
NOTE: A sponsor is the guest's primary contact for
the visit.
The sponsor's email address.
--
The sponsor's full name.
--
The sponsor's name.
--
Date and time, in mm/dd/yyy and hh:mm format, the -- guest account begins.
Default --
-- -- --
guest
--
-- -- -- --
Usage Guidelines
When you specify the internal database as an authentication server, client information is checked against the user accounts in the internal database. You can modify an existing user account in the internal database with the localuserdb modify command, or delete an account with the local-userdb del command.
By default, the internal database in the master switch is used for authentication. Issue the aaa authenticationserver internal use-local-switch command to use the internal database in a local switch; you then need to add user accounts to the internal database in the local switch.
Example
The following command adds a user account in the internal database with an automatically-generated username and password: (host) #local-userdb add generate-username generate-password expiry duration 480
The following information is displayed when you enter the command: GuestConnect Username: guest4157 Password: cDFD1675 Expiration: 480 minutes
AOS-W 6.2 | Reference Guide
local-userdb add | 415
Related Commands
Command show local-userdb
show local-userdbguest
mgmt-user
Description
Mode
Use this command to show the parameters displayed in the output of this command.
Enable and Config modes
Use this command to show the parameters displayed in the output of the local-userdb-guest add command.
Enable and Config modes
Use the webui-cacert <certificate name> command if you want an external authentication server to derive the management user role. This is helpful if there are a large number of users who need to be authenticated.
Use the mgmt-user webui-cacert <certificate_
name>serial <number> <username> <role> command if you want the authentication process to use previously configured certificate name and serial number to derive the user role.
Config mode
Command History
AOS-W 3.0 AOS-W 3.4
Modification Introduced for the first time. The guest, sponsor and optional field parameters were added.
Command Information
Platform Available on all platforms
License
Available in the base operating system. The role parameter requires the PEFNG license.
Command Mode Enable mode on master switches.
416 | local-userdb add
AOS-W 6.2 | Reference Guide
localip
localip <ipaddr> ipsec <key>
Description
This command configures the IP address and preshared key for the local switch on a master switch.
Syntax
Parameter <ipaddr>
ipsec <key>
Description
IP address of the local switch. Use the 0.0.0.0 address to configure a global preshared key for all inter-switch communications.
To establish the master-local IPsec tunnel using IKEv1, enter a preshared key between 6-64 characters.
Usage Guidelines
Use this command on a master switch to configure the IP address and preshared key or certificates for communication with a local switch. On the local switch, use the masterip command to configure the IP address and preshared key for the master switch. If your master and local switches use a pre-shared key for authentication, they will create the IPsec tunnel using IKEv1.
Example
The following command configures the local switch with a pre-shared key: (host) (config) #localip 0.0.0.0 ipsec gw1234xyz
Command History
Command introduced in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
localip | 417
local-userdb-ap del
local-userdb-ap del mac-address <mac-addr> ap-group ap-name description full-name mode remote-ip
Description
This command deletes a AP entry from the remote AP database.
Syntax
Parameter
mac-address <macaddr>
Description MAC address of the AP to be removed from the AP database.
Usage Guidelines
Issue this command to permanently delete any AP entries from the remote AP database. To temporarily revoke a lost or stolen remote AP to prevent unauthorized users from accessing the company's corporate network, use the command local-userdb-ap revoke.
Example
The example below deletes an AP from the remote AP whitelist. (host)(config) #local-userdb-ap del mac-addr 00:0b:86:c3:58:38
Related Commands
Command
Description
lacp group
Enable LACP and configure on the interface
show lacp
View the LACP configuration status
show lacp sys-id
View the LACP system ID information
show interface port-channel View information on a specified port channel interface
Command History
Version AOS-W 3.0 AOS-W 6.2
Modification Command introduced. Command replaced by .
418 | local-userdb-ap del
AOS-W 6.2 | Reference Guide
local-userdb-ap modify
local-userdb-ap modify mac-address <macaddr> ap-name <ap-name> description <desc> full-name <full-name> remote-ip <ip-addr>
Description
Modify an AP entry in the remote AP whitelist.
Syntax
Parameter mac-address <mac-address>
ap-group <ap-group> ap-name <ap-name> description <description>
full-name <full-name> mode enable|disable
Description MAC address of the AP whose whitelist database entry you want to modify.
AP group of the AP.
Name of the AP.
Description of the AP. If the description includes spaces, it must be enclosed within quotation marks.
Name of the client using the AP.
Enable or disable the AP without deleting it from the database.
Usage Guidelines
You can manually change or disable entries from the AP whitelist to temporarily revoke an AP's secure access to the network.
Example
The following command modifies a AP whitelist entry for an AP with the MAC address 00:16:CF:AF:3E:E1: (host) (config) #local-userdb-ap modify mac-address 00:16:CF:AF:3E:E1
description "AP moved to second floor"
Command History
AOS-W 3.0
Modification Command introduced.
AOS-W 6.2 | Reference Guide
local-userdb-ap modify | 419
local-userdb-ap revoke
local-userdb-ap revoke mac-address <macaddr> revoke-comment <comment>
Syntax
Parameter
Description
mac-address <macaddr>
MAC address of the AP to be removed from the AP database.
revoke-comment <com- Text string describing why the AP was revoked. ment>
Description
Revoke a lost or stolen remote AP to prevent unauthorized users from accessing the company's corporate network. To permanently remove an AP from the whitelist, use the command local-userdb-ap del.
Example
The example below revokes an A's entry from the remote AP whitelist. (host)(config) #local-userdb-ap revoke mac-addr 00:0b:86:c3:58:38 revoke-comment "removing this AP from the 1st floor"
Command History
AOS-W 3.0
Modification Command introduced.
420 | local-userdb-ap revoke
AOS-W 6.2 | Reference Guide
local-userdb del
local-userdb {del username <name>|del-all}
Description
This command deletes entries in the switch's internal database.
Syntax
Parameter del username del-all
Description Deletes the user account for the specified username. Deletes all entries in the internal database.
Usage Guidelines
User account entries created with expirations are automatically deleted from the internal database at the specified expiration. Use this command to delete an entry before its expiration or to delete an entry that was created without an expiration.
Example
The following command deletes a specific user account entry: (host)#local-userdb del username guest4157
Command History
Introduced in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Enable mode on master switches.
AOS-W 6.2 | Reference Guide
local-userdb del | 421
local-userdb export
local-userdb export <filename>
Description
This command exports the internal database to a file.
Use this command with caution. It replaces the existing users with user entries from the imported file.
Syntax
Parameter export
Description Saves the internal database to the specified file in flash.
Usage Guidelines
After using this command, you can use the copy command to transfer the file from flash to another location.
Example
The following command saves the internal database to a file: (host)#local-userdb export jan-userdb
Command History
Introduced in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Enable mode on master switches.
422 | local-userdb export
AOS-W 6.2 | Reference Guide
local-userdb fix-database
local-userdb fix-database
Description
This command deletes and reinitializes the internal database.
Syntax
No parameters.
Usage Guidelines
Before using this command, you can save the internal database with the local-userdb export command.
Command History
Introduced in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Enable mode on master switches.
AOS-W 6.2 | Reference Guide
local-userdb fix-database | 423
local-userdb-guest del
local-userdb-guest {del username <name>|del-all}
Description
This command deletes entries in the switch's internal database.
Syntax
Parameter del username del-all
Description Deletes the user account for the specified username. Deletes all entries in the internal database.
Usage Guidelines
User account entries created with expirations are automatically deleted from the internal database at the specified expiration. Use this command to delete an entry before its expiration or to delete an entry that was created without an expiration.
Example
The following command deletes a specific user account entry: (host) #local-userdb-guest del username guest4157
Command History
Introduced in AOS-W 3.4.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Enable and config modes on master switches.
424 | local-userdb-guest del
AOS-W 6.2 | Reference Guide
local-userdb-guest modify
local-userd-guest modify username <name> [comments <g_comments>][email <email>] [expiry {duration <minutes>|time <hh/mm/yyy> <hh:mm>}] [guest-company <g_company>][guest-fullname <g_ fullname>][guest-phone <g-phone>][mode disable][opt-field-1 <opt1>][opt-field-2 <opt2>][optfield-3 <opt3>][opt-field-4 <opt4>][password <passwd][sponsor-dept <sp_dept>][sponsor-mail <sp_email>][sponsor-fullname <sp_fullname>][sponsor-name <sp_name>][start-time <mm/dd/yyyy> <hh.mm>]
Description
This command modifies an existing guest user entry in the switch's internal database.
Syntax
Parameter username
comments email expiry duration
time guest-company
guest-fullname guest-phone mode opt-field-1
opt-field-2 opt-field-3 opt-field-4 password
Description
Range
Default
Name of the existing user account entry.
1 64
--
characters
Comments added to the user account.
--
--
Email address for the use account.
--
--
Expiration for the user account. If this is not set, the
--
account does not expire.
no expiration
Duration, in minutes, for the user account.
1-
--
214748364-
7
Date and time, in mm/dd/yyy and hh:mm format, that
--
--
the user account expires.
Name of the guest's company. NOTE: A guest is the person who needs guest access to the company's Alcatel-Lucent wireless network.
The guest's full name.
The guest's phone number.
Enables or disables the user account,
--
Disable
This category can be used for some other purpose.
--
--
For example, the optional category fields can be used
for another person, such as a "Supervisor." You can
enter username, full name, department and Email
information into the optional fields.
Same as opt-field-1.
--
--
Same as opt-field-1.
--
--
Same as opt-field-1.
--
--
User's password
1 6
--
characters
AOS-W 6.2 | Reference Guide
local-userdb-guest modify | 425
Parameter sponsor-dept
sponsor-email sponsor-fullname sponsor-name start-time
Description
Range
The guest sponsor's department name
--
NOTE: A sponsor is the guest's primary contact for the
visit.
The sponsor's email address.
--
The sponsor's full name.
--
The sponsor's name.
--
Date and time, in mm/dd/yyy and hh:mm format, the
--
guest account begins.
Default --
-- -- -- --
Usage Guidelines
Use the show local-userdb-guest command to view the current user account entries in the internal database.
Example
The following command disables an guest user account in the internal database: (host)local-userdb-guest modify username guest4157 mode disable
Command History
Introduced in AOS-W 3.4.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Enable and config modes on master switches.
426 | local-userdb-guest modify
AOS-W 6.2 | Reference Guide
local-userdb-guest send-email
local-userdb-guest send-email <username> [to-guest][to-sponsor]
Description
This command causes the switch to send email to the guest and/or sponsor any time a guest user is created.
Syntax
Parameter <username>
to-guest to-sponsor
Description Name of the guest
Allows you to send email to the guest user's address. Allows you to send email to the sponsor's email address.
Range Default
1 64
--
characters
--
--
--
--
Usage Guidelines
This command allows the guest provisioning user or network administrator to causes the switch to send email to the guest and/or sponsor any time a guest user is created.
Example
The following command causes the switch to send an email to the sponsor alerting them that the guest user "Laura" was just created. (host)# local-userdb-guest send-email Laura to-sponsor
Command History
Introduced in AOS-W 3.4.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
local-userdb-guest send-email | 427
local-userdb import
local-userdb import <filename>
Description
This command replaces the internal database with the specified file from flash.
Syntax
Parameter import
Description Replaces the internal database with the specified file.
Usage Guidelines
This command replaces the contents of the internal database with the contents in the specified file. The file must be a valid internal database file saved with the local-userdb export command.
Example
The following command imports the specified file into the internal database: (host)#local-userdb import jan-userdb
Command History
Introduced in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Enable mode on master switches.
428 | local-userdb import
AOS-W 6.2 | Reference Guide
local-userdb maximum-expiration
local-userdb maximum-expiration <minutes>
Description
This command configures the maximum time, in minutes, that a guest account in the internal database can remain valid.
Syntax
Parameter maximum-expiration
Description
Maximum time, in minutes, that a guest account in the internal database can remain valid.
Range
12147483647
Usage Guidelines
The user in the guest-provisioning role cannot create guest accounts that expire beyond the configured maximum time. This command is not available to the user in the guest-provisioning role.
Example
The following command sets the maximum time for guest accounts in the internal database to 8 hours (480 minutes): (host)(config)#local-userdb maximum-expiration 480
Command History
Introduced in AOS-W 3.0.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Configuration mode on master switches.
AOS-W 6.2 | Reference Guide
local-userdb maximum-expiration | 429
local-userdb modify
local-userdb modify username <name> [comments <g_comments>][email <email>] [expiry {duration <minutes>|time <hh/mm/yyy> <hh:mm>}] [guest-company <g_company>][guest-fullname <g_fullname>] [guest-phone <g-phone>][mode disable][opt-field-1 <opt1>][opt-field-2 <opt2>][opt-field-3 <opt3>][opt-field-4 <opt4>][remote-ip <ip-addr>][role <role>][sponsor-dept <sp_dept>][sponsormail <sp_email>][sponsor-fullname <sp_fullname>][sponsor-name <sp_name>][start-time <mm/dd/yyyy> <hh.mm>]
Description
This command modifies an existing user account entry in the switch's internal database.
Syntax
Parameter username
comments email expiry duration
time guest-company
guest-fullname guest-phone mode opt-field-1
opt-field-2 opt-field-3 opt-field-4 remote-ip role
Description
Range
Default
Name of the existing user account entry.
1 64
--
characters
Comments added to the user account.
--
--
Email address for the use account.
--
--
Expiration for the user account. If this is not set, the
--
account does not expire.
no expiration
Duration, in minutes, for the user account.
1-
--
214748364-
7
Date and time, in mm/dd/yyy and hh:mm format, that
--
--
the user account expires.
Name of the guest's company. NOTE: A guest is the person who needs guest access to the company's Alcatel-Lucent wireless network.
The guest's full name.
The guest's phone number.
Enables or disables the user account,
--
Disable
This category can be used for some other purpose.
--
--
For example, the optional category fields can be used
for another person, such as a "Supervisor." You can
enter username, full name, department and Email
information into the optional fields.
Same as opt-field-1.
--
--
Same as opt-field-1.
--
--
Same as opt-field-1.
--
--
IP address assigned to the remote peer.
Role for the user.
--
guest
430 | local-userdb modify
AOS-W 6.2 | Reference Guide
Parameter
sponsor-dept
sponsor-email sponsor-fullname sponsor-name start-time
Description
Range
This parameter requires the PEFNG license.
The guest sponsor's department name
--
NOTE: A sponsor is the guest's primary contact for the
visit.
The sponsor's email address.
--
The sponsor's full name.
--
The sponsor's name.
--
Date and time, in mm/dd/yyy and hh:mm format, the
--
guest account begins.
Default
--
-- -- -- --
Usage Guidelines
Use the show local-userdb command to view the current user account entries in the internal database.
Example
The following command disables an existing user account in the internal database: (host)# local-userdb modify username guest4157 mode disable
Command History
AOS-W 3.0 AOS-W 3.4
Modification Introduced for the first time. The guest, sponsor and optional parameters were added.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Enable mode on master switches.
AOS-W 6.2 | Reference Guide
local-userdb modify | 431
local-userdb send-to-guest
local-userdb send-to-guest
Description
This command automatically sends email to the guest when the guest user is created.
Syntax
No parameters.
Usage Guidelines
A guest is the person who needs guest access to the company's Alcatel-Lucent wireless network. Email is sent directly to the guest after the guest user is created. When configuring the guest provisioning feature, the guest user is generally created by Guest Provisioning user. This is the person who is responsible for signing in guests at your company.
Example
(host)(config) #local-userdb send-to-guest
Command History
Introduced in AOS-W 3.4.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Configuration mode on master switches.
432 | local-userdb send-to-guest
AOS-W 6.2 | Reference Guide
local-userdb send-to-sponsor
local-userdb send-to-sponsor
Description
This command automatically sends email to the guest's sponsor when the guest user is created.
Syntax
No parameters.
Usage Guidelines
The sponsor is the guest's primary contact. Email is sent directly to the guest's sponsor after the guest user is created. When configuring the guest provisioning feature, the sponsor is generally created by the Guest Provisioning user. This is the person who responsible for signing in guests at your company.
Example
(host)(config)#local-userdb send-to-sponsor
Command History
Introduced in AOS-W 3.4.
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Configuration mode on master switches.
AOS-W 6.2 | Reference Guide
local-userdb send-to-sponsor | 433
location
location <string>
Description
This command configures the location of the switch.
Syntax
Parameter location
Description A text string that specifies the system location.
Usage Guidelines
Use this command to indicate the location of the switch. You can use a combination of numbers, letters, characters, and spaces to create the name. To include a space in the name, use quotation marks to enclose the text string. To change the existing name, enter the command with a different string. To unconfigure the location, enter "" at the prompt.
Example
The following command configures the location: (host) (config) #location "Building 10, second floor, room 21E"
Command History
Introduced in AOS-W 3.0
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Config mode on master switches
434 | location
AOS-W 6.2 | Reference Guide
logging
logging <ipaddr>[facility]|[severity]|[type>]
Description
Use this command to specify the IP address of the remote logging server, facility, severity, and the type.
Syntax
Parameter facility
severity type
Description To set the remote logging server facility.
To set the remote logging server severity. To set the remote logging server message type.
Range local 0 to local7
--
--
Default --
-- --
Usage Guidelines
The local use facilities (local0, local1, local2, local3, local4, local5, local6, and local7) are not reserved for specific message-generating sources, and can be used for sending syslog messages. Use the show logging command to verify that the device sends logging messages.
Example
The following command adds the remote logging server with the IP address 10.1.2.3 with a user log type using local4. (host) (config) #logging 1.1.1.1 user facility local4
Command History
Introduced in AOS-W 6.0
Command Information
Platform Available on all platforms
License
Command Mode
Available in the base operating system Config mode on master switches
AOS-W 6.2 | Reference Guide
logging | 435
logging facility
logging facility <facility>
Description
Use this command to set the facility to use when logging to the remote syslog server.
Syntax
Parameter <facility>
Description The facility to use when logging to a remote syslog server.
Range local0 to local7
Usage Guidelines
The local use facilities (local0, local1, local2, local3, local4, local5, local6, and local7) are not reserved for specific message-generating sources, and can be used for sending syslog messages.
Example
The following command sets the facility to local4. (host) (config) #logging facility local4
Command History
Introduced in AOS-W 2.5
Command Information
Platform Available on all platforms
License
Command Mode
Available in the base operating system Config mode on master switches
436 | logging facility
AOS-W 6.2 | Reference Guide
logging level
logging level <level> <category> [process <process>] [subcat <subcategory>]
Description
Use this command to set the categories or subcategories and the severity levels of messages that are logged.
Syntax
Parameter
Description
<level>
The message severity level, which can be one of the following (in order of severity level):
emergencies
(0) Panic conditions that occur when the system becomes unstable.
alerts
(1) Any condition requiring immediate attention and correction.
critical
(2) Any critical conditions, such as hard drive errors.
errors
(3) Error conditions.
warnings
(4) Warning messages.
notifications (5) Significant events of a non-critical and normal nature.
informational (6) Messages of general interest to system users.
debugging
(7) Messages containing information for debugging purposes.
<category>
Message category, which can be one of the following:
ap-debug
AP troubleshooting messages. You must specify a debug value.
network
Network messages.
security
Security messages.
system
System messages.
user
User messages.
user-debug
User troubleshooting messages. You must specify a MAC address.
wireless
Wireless messages.
process
Switch process, which can be one of the following:
aaa
AAA logging
ads
Anomaly detection
approc
AP processes
authmgr
User authentication
AOS-W 6.2 | Reference Guide
logging level | 437
Parameter cfgm crypto cts dbsync dhcpd esi fpapps httpd l2tp licensemgr localdb mobileip packetfilter pim pppoed pptp processes profmgr publisher rfm snmp stm syslogdwrap traffic vrrpd wms
subcat
Description Configuration Manager VPN (IKE/IPsec) Transport service Database synchronization DHCP packets External Services Interface Layer 2 and 3 control Apache L2TP License manager Local database Mobile IP Packet filtering of messaging and control frames Protocol Independent Multicast PPPoE PPTP Run-time processes Profile Manager Publish subscribe service RF Troubleshooting Manager SNMP Station management Syslogd wrap Traffic VRRP Wireless management (master switch only) Message subcategory, which depends upon the message category specified. The following lists the subcategories available for each message category: l ap-debug: all l network: all, dhcp, mobility, packet-dump l security: aaa, all, dot1x, firewall, ike, mobility, packet-trace, vpn, webserver l system: all, configuration, messages, snmp, webserver
438 | logging level
AOS-W 6.2 | Reference Guide
Parameter
Description
l user: all, captive-portal, dot1x, radius, vpn l user-debug: all, configuration l wireless: all
Usage Guidelines
There are eight logging severity levels, each with its associated types of messages. Each level also includes the levels below it. For example, if you set the logging level to informational (6), all messages from level 0 through level 5 (from emergencies through notifications) are also logged. The warnings severity level is set by default for all message categories.
Only the logging level warnings security subcat ids and logging level warnings security subcat ids-ap subcategories are enabled by default. Other subcategories are not generated by default even their severity is warning or higher. Issue the logging level command to enable all other message subcategories.
Example
The following command logs critical system messages. logging level critical system
Command History
Introduced in AOS-W 2.5
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode
Config mode on master and local switches
AOS-W 6.2 | Reference Guide
logging level | 439
loginsession
loginsession timeout <minutes>
Description
This command configures the time management session (via Telnet or SSH) remains active without user activity.
Syntax
Parameter timeout
Description
Number of seconds or minutes that a management session remains active without any user activity.
Range
5-60 minutes or 13600 seconds, 0 to disable
Default 15 minutes
Usage Guidelines
The management user must re-login to the switch after a Telnet or SSH session times out. If you set the timeout value to 0, sessions do not time out. The TCP session timeout for wireless and wired user sessions through the switch is 15 minutes; this timeout for user sessions is not configurable.
ExampleThe following command configures management sessions on the switch to not time out:
(host) (config) #loginsession timeout 0
Command History
This command was available in AOS-W 3.0
Command Information
Platform Available on all platforms
License Requires the PEFNG license
Command Mode
Config mode on master switches
440 | loginsession
AOS-W 6.2 | Reference Guide
logout
logout
Description
This command exits the current CLI session.
Syntax
No parameters.
Usage Guidelines
Use this command to leave the current CLI session and return to the user login.
Example
The following command exits the CLI session: (host) >logout User:
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode User mode on local or master switches
AOS-W 6.2 | Reference Guide
logout | 441
mac-address-table
mac-address-table static <macaddr> {fastethernet|gigabitethernet} <slot>/<port> vlan <vlan>
Description
This command adds a static entry to the MAC address table.
Syntax
Parameter <macaddr> <slot> <port>
vlan
Description
Range
Media Access Control (MAC) address, in the format xx:xx:xx:xx:xx:xx. --
<slot> is always 1 except for the OAW-6000Switch, where the slots can -- be 1, 2, or 3.
Number assigned to the network interface embedded in the switchor in the line card installed in the OAW-6000Switch. Port numbers start at 0 from the left-most position.
ID number of the VLAN.
1-4094
Usage Guidelines
The MAC address table is used to forward traffic between ports on the switch. The table includes addresses learned by the switch. This command allows you to manually enter static addresses that are bound to specific ports and VLANs.
Example
The following command configures a MAC address table entry: (host) (config) #mac-address-table static 00:0b:86:f0:05:60 fastethernet 1/12 vlan 22
Command History
Available in AOS-W 3.0
Command Information
Platform
License
Available on all platforms Available in the base operating system
Command Mode Config mode on master and local switches
442 | mac-address-table
AOS-W 6.2 | Reference Guide
master-redundancy master-vrrp
master-redundancy master-vrrp <id>
Description
This command associates a VRRP instance with master switch redundancy.
Syntax
Parameter <id>
Description
The virtual router ID for the VRRP instance configured with the vrrp command.
Range 1-255
Usage Guidelines
To maintain a highly redundant network, you can use a switch as a standby for the master switch. The underlying protocol used is VRRP which you configure using the vrrp command.
Example
The following command configures VRRP for the initially preferred master switch:
(host) (config) #vrrp 22 vlan 22 ip address 10.200.22.254 priority 110 preempt description Preferred-Master tracking master-up-time 30 add 20 no shutdown
master-redundancy master-vrrp 22 peer-ip-address 192.168.2.1 ipsec qwerTY012
The following shows the corresponding VRRP configuration for the peer switch.
(host) (config) #vrrp 22 vlan 22 ip address 10.200.22.254 priority 100 preempt description Backup-Master tracking master-up-time 30 add 20 no shutdown
master-redundancy master-vrrp 22
peer-ip-address 192.168.22.1 ipsec qwerTY012
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
master-redundancy master-vrrp | 443
masterip
masterip <ipaddr> ipsec <key> [interface uplink|{vlan <id>}] [fqdn <fqdn>] ipsec-custom-cert master-mac1 <mac1> [master-mac2 <mac2>] ca-cert <ca> server-cert <cert> [interface uplink|{vlan <id>}] [fqdn <fqdn>] [suite-b gcm-128|gcm-256] ipsec-factory-cert master-mac1 <mac1> [master-mac2 <mac2>] [interface uplink|{vlan <id>}] [fqdn <fqdn>]
Description
This command configures the IP address and preshared key or certificate for the master switch on a local switch.
Syntax
Parameter <ipaddr> ipsec <key> ipsec-custom-cert
master-mac1 <mac1> master-mac2 <mac2> ca-cert <ca>
server-cert <cert>
interface uplink vlan <id>
fqdn <fqdn> suite-b
ipsec-factory-cert
Description
IP address of the master switch.
To establish the master-local IPsec tunnel using IKEv1, enter a preshared key between 6-64 characters.
Use a custom-installed certificate on the master switch to establish a masterlocal IPsec tunnel using IKEv2.
The MAC address of the certificate on the Master.
(Optional) the MAC address of the certificate on the backup master switch.
User-defined name of a trusted CA certificate installed on the master switch. Use the show crypto-local pki TrustedCA command to display the CA certificates that have been imported into the switch.
User-defined name of a server certificate installed on the master switch. Use the show crypto-local pki ServerCert command to display the server certificates that have been imported into the switch.
Specify the uplink or VLAN interface on the master switch to initiate IKE.
Use the master switch's current active uplink to initiate IKE.
Specify a VLAN interface on the master switch to initiate IKE. If you do not specify a VLAN, the switch IP will be used.
Identify a dynamically addressed local switch by entering the Fully Qualified Domain Name (FQDN) of the switch.
If you configure your master and local switches to use IKEv2 and custominstalled certificates, you can optionally use Suite-B cryptographic algorithms for IPsec encryption. Specify one of the following options: l gcm-128 Use 128-bit AES-GCM Suite-B encryption l gcm-256 Use 256-bit AES-GCM Suite-B encryption
Use the factory-installed certificate on the master switch to establish a masterlocal IPsec tunnel using IKEv2.
444 | masterip
AOS-W 6.2 | Reference Guide
Parameter master-mac1 <mac1> master-mac2 <mac2> interface uplink vlan <id>
fqdn <fqdn>
Description The MAC address of the certificate on the Master.
(Optional) the MAC address of the certificate on the backup master switch.
Specify the uplink or VLAN interface on the master switch to initiate IKE.
Use the master switch's current active uplink to initiate IKE.
Specify a VLAN interface on the master switch to initiate IKE. If you do not specify a VLAN, the switch IP will be used.
Identify a dynamically addressed local switch by entering the Fully Qualified Domain Name (FQDN) of the switch.
Usage Guidelines
Use this command on a local switch to configure the IP address and preshared key or certificate for secure communication with the master switch. On the master switch, use the localip command to configure the IP address and preshared key or certificate for a local switch.
Changing the IP address of the master on a local switch requires a reboot of the local switch
If your master and local switches use a pre-shared key for authentication, they will create the IPsec tunnel using IKEv1. If your master and local switches use certificates for authentication, the IPsec tunnel will be created using IKEv2.
Example
The following command configures the master switch with a pre-shared key: (host) (config) #masterip 10.1.1.250 ipsec gw1234567
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced.
The ipsec-factory-cert and ipsec-custom-cert parameters were introduced to allow certificate-based authentication of master and local switches.
Command Information
Platform
License
Command Mode
Available on all platforms
The suite-b gcm-128 and suite-b gcm-256 encryption options for IPsec custom certificates requires the Advanced Cryptography (ACR) license. All other parameters are available in the base operating system
Available in Config mode on local switches
AOS-W 6.2 | Reference Guide
masterip | 445
master-redundancy peer-ip
master-redundancy peer-ip <ipaddr> ipsec <key> ipsec-custom-cert master-mac <mac> ca-cert <ca> server-cert <cert> [suite-b gcm-128|gcm256] ipsec-factory-cert master-mac <mac>
Description
This command configures the IP address and preshared key or certificate for a redundant master switch on another master switch.
Syntax
Parameter <ipaddr> ipsec <key> ipsec-custom-cert
master-mac <mac> ca-cert <ca>
server-cert <cert> suite-b
ipsec-factory-cert master-mac <mac>
Description
IP address of the redundant switch. Use the 0.0.0.0 address to configure a global preshared key for all inter-switch communications.
To establish the master-master IPsec tunnel using IKEv1, enter a preshared key between 6-64 characters.
Use a custom-installed certificate on the switch to establish the master-master IPsec tunnel using IKEv2
The MAC address of the certificate on the redundant master switch.
User-defined name of a trusted CA certificate installed on the redundant master switch. Use the show crypto-local pki TrustedCA command to display the CA certificates that have been imported into the switch.
User-defined name of a server certificate installed on on the redundant master switch. Use the show crypto-local pki ServerCert command to display the server certificates that have been imported into the switch.
If you configure your master switches to use IKEv2 and custom-installed certificates, you can optionally use Suite-B cryptographic algorithms for IPsec encryption. Specify one of the following options: l gcm-128 Use 128-bit AES-GCM Suite-B encryption l gcm-256 Use 256-bit AES-GCM Suite-B encryption
Use the factory-installed certificate on the master switch to establish a master-local IPsec tunnel using IKEv2.
The MAC address of the certificate on the redundant master switch.
Usage Guidelines
Use this command on a master switch to configure the IP address and preshared key or certificates for communication with a redundant master switch. If your master switches use a pre-shared key for authentication, they will create the IPsec tunnel using IKEv1. If your master and local switches use certificates for authentication, the IPsec tunnel will be created using IKEv2.
Example
The following command configures the local switch on a master switch:
446 | master-redundancy peer-ip
AOS-W 6.2 | Reference Guide
(host) (config) #peer-ip 10.4.62.5 ipsec-custom-cert master-mac 00:02:2D:11:55:4D ca-cert cacert1 server-cert server1
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced.
The ipsec-factory-cert and ipsec-custom-cert parameters were introduced to allow certificate-based authentication of master and local switches.
Command Information
Platform Available on all platforms
License
Command Mode
The suite-b gcm-128 and suite-b gcm-256 encryption options for IPsec custom certificates requires the Advanced Cryptography (ACR) license. All other parameters are available in the base operating system
Config mode on master switches
AOS-W 6.2 | Reference Guide
master-redundancy peer-ip | 447
mgmt-server
wlan
mgmt-server type {amp|other} primary-server <ip-addr>
Description
Register a management server with the switch by specifying the IP address of an AirWave Management Server or any other server that should receive messages from the switch using the Application Monitoring (AMON) protocol.
Syntax
Parameter amp other primary-server <ip-addr>
Description
Define any other type of management server. IP address of the primary management server.
Example
The following command defines a primary and secondary Airwave Management server. (host) (config) #mgmt-server type amp primary-server 192.168.6.2
Command History
AOS-W 3.4 AOS-W 6.1
Modification Command introduced. The secondary-server parameter was deprecated.
Command Information
Platforms All platforms
Licensing
Command Mode Config mode on master switches
448 | mgmt-server
AOS-W 6.2 | Reference Guide
mgmt-user
mgmt-user <username> <role> <password> mgmt-user localauth-disable mgmt-user ssh-pubkey client-cert <certificate> <username> <role> mgmt-user webui-cacert <certificate_name> serial <number> <username> <role>
Description
This command configures an administrative user.
Syntax
Parameter <username>
<role>
<password>
localauth-disable ssh-pubkey
client-cert
Description
Name of the user. You can create a maximum of 10 management users. NOTE: If you configure a root management user, you can use special characters except for double-byte characters.
Role assigned to the user. Predefined roles include: l guest-provisioning: Allows the user to create guest accounts
on a special WebUI page. l location-api-mgmt: Permits access to location API
information. You can log into the CLI; however, you cannot use any CLI commands. l network-operations: Permits access to Monitoring, Reports, and Events pages in the WebUI. You can log into the CLI; however, you can only use a subset of CLI commands to monitor the switch. l read-only: Permits access to CLI show commands or WebUI monitoring pages only. l root: Permits access to all management functions on the switch.
NOTE: You are prompted for the <password> for this user after you type in <role> and press Enter. The password must have a minimum of six characters. You can use special characters in the management user password. The restrictions are as follows: l You cannot use double-byte characters l You cannot use the question mark (?) l You cannot use white space <space >
Disables authentication of management users based on the results returned by the authentication server. To cancel this setting, use the no form of the command: no mgmt-user localauth-disable To verify if authentication of local management user accounts is enabled or disabled, use the following command: show mgmt-user local-authentication-mode
Configures certificate authentication of administrative users using the CLI through SSH.
Name of the X.509 client certificate for authenticating administrative users using SSH.
Default -- --
--
Enabled -- --
AOS-W 6.2 | Reference Guide
mgmt-user | 449
Parameter <username> <role>
webui-cacert
<certificate_name>
serial <username> <role>
Description
Default
Name of the user.
--
Role assigned to the authenticated user.
--
The client certificate for authenticating administrative users using -- the WebUI.
The CA certificate. If configured, certificate authentication and
--
authorization are automatically completed using an
authentication server.
Serial number of the client certificate.
--
Name of the user.
--
Role assigned to the authenticated user.
--
Usage Guidelines
You can configure client certificate authentication of WebUI or SSH management users (by default, only username/password is used). To configure certificate authentication for the WebUI or SSH, use the web-server mgmt-auth certificate or ssh mgmt-auth public-key commands, respectively. Use webui-cacert <certificate name> command if you want an external authentication server to derive the management user role. This is helpful if there are a large number of users who need to be authenticated. Or, use the mgmt-user webui-cacert <certificate_name> serial <number> <username> <role> if you want the authentication process to use previously configured certificate name and serial number to derive the user role.
Example
See the web-server and ssh command descriptions for examples of certificate and public key authentication. The following command configures a management user and role: (host) (config) #mgmt-user zach_jennings root Password: ***** Re-Type password: *****
Command History
Release AOS-W 3.0 AOS-W 3.1 AOS-W 3.2 AOS-W 3.3 AOS-W 3.4
Modification Command introduced The ssh-pubkey and webui-cacert parameters were introduced. The network-operations role was introduced. The location-api-mgmt role and localauth-disable parameters were introduced. The webui-cacert <certificate name> parameter had additional functionality introduced.
Command Information
Platforms All platforms
450 | mgmt-user
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
mobility-manager
mobility-manager <ipaddr> user <username> <password> [interval <secs>] [retrycount <number>] [udp-port <port>] [rtls <rtls-udp-port>] trap-version {1|2c|3}
Description
This command allows the switch to communicate with an OV-MM-SW server.
Syntax
Parameter <ipaddr> user
interval retrycount
udp-port rtls
trap-version
Description
Range
IP address of the OV-MM-SW server.
--
Name and SNMP password for the OV-MM-SW
--
server user.
Round-trip time, in seconds, to trap server.
1-65535
Number of retries to the OV-MM-SW server before giving up.
1-65535
UDP port number for trap server.
0-65535
UDP port number on which RSSI location data should be received from APs.
0-65535
Allows the you to specify the SNMP trap version by 1, 2c, or 3 the remote trap receiver.
Default -- --
60 seconds 3
162 8000
3
Usage Guidelines
This command needs to be configured before the switch can communicate with the OV-MM-SW server. This command performs three tasks:
l Configures the IP address of the OV-MM-SW server. In previous AOS-W releases, this was done with the mobility-server command.
l Creates an SNMP version 3 user profile with the configured <username> and <password>. This allows SNMP SETs from the OV-MM-SW server to be received by the switch. The authentication protocol is Secure Hash Algorithm (SHA) and Data Encryption Standard (DES) is used for encryption. If <username> and <password> match an existing SNMP v3 user profile, the existing one is used. Otherwise, a new profile is created. This username and password must be used when adding this switch to the OV-MM-SW server in the OV-MMSW Dashboard.
l Allows SNMP traps and notifications to be sent to the OV-MM-SW server IP address, by adding this OV-MM-SW server as a trap receiver.
l Optionally enables the OV-MM-SW server to function as a Real Time Location System (RTLS) server to receive location information via APs from RTLS tags or other devices.
Use the show mobility-manager command to check the current status of the configured OV-MM-SW servers.
Example
The following command configures the IP address and SNMP user profile for the OV-MM-SW server: (host) (config)# mobility-manager 10.2.1.245 user mms-user my-password.
AOS-W 6.2 | Reference Guide
mobility-manager | 451
Command History
This command was introduced in AOS-W 3.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
452 | mobility-manager
AOS-W 6.2 | Reference Guide
netdestination
netdestination <name> description <description6> host <ipaddr> [position <number>] invert name network <ipaddr> <netmask> [position <number>] no ... range <start-ipaddr> <end-ipaddr> [position <number>]
Description
This command configures an alias for an IPv4 network host, subnetwork, or range of addresses.
Syntax
Parameter <name> description host invert
network no range
Description
Name for this host or domain. Maximum length is 63 characters.
Description about the this destination up to 128 characters long.
Configures a single IPv4 host and its position in the list.
Specifies that the inverse of the network addresses configured are used. For example, if a network of 172.16.0.0 255.255.0.0 is configured, this parameter specifies that the alias matches everything except this subnetwork.
An IPv4 subnetwork consisting of an IP address and netmask.
Negates any configured parameter.
A range of IPv4 addresses consisting of sequential addresses between a lower and an upper value. The maximum number of addresses in the range is 16. If larger ranges are needed, convert the range into a subnetwork and use the network parameter.
Usage
Aliases can simplify configuration of session ACLs, as you can use an alias when specifying the traffic source and/or destination it in multiple session ACLs. Once you configure an alias, you can use it to manage network and host destinations from a central configuration point, because all policies that reference the alias will be updated automatically when you change the alias.
When using the invert option, use caution when defining multiple aliases, as entries are processed one at a time. As an example, consider a netdestination configured with the following two network hosts: netdestination dest1 invert network 1.0.0.0 255.0.0.0 network 2.0.0.0 255.0.0.0
A frame from http://1.0.0.1 would match the first alias entry, (which allows everything except for 1.0.0.0/8) so the frame would be rejected. However, it would then be compared against the second alias, which allows everything except for 2.0.0.0/8, and the frame would be permitted.
Example
The following command configures an alias for an internal network:
AOS-W 6.2 | Reference Guide
netdestination | 453
(host) (config) #netdestination Internal network 10.1.0.0 255.255.0.0
Command History
Release AOS-W 3.0 AOS-W 6.1 AOS-W 6.2
Modification Command introduced Host functionality now only supports IPv4 subnets. Name parameter has maximum character length.
Command Information
Platforms All platforms
Licensing
Command Mode
Requires the Policy Enforcement Config mode on master switches Firewall license.
454 | netdestination
AOS-W 6.2 | Reference Guide
netdestination6
netdestination6 <name> description <description6> host <ipaddr> [position <number>] invert name network <ipaddr> <netmask> [position <number>] no ... range <start-ipaddr> <end-ipaddr> [position <number>]
Description
This command configures an alias for an IPv6 network host, subnetwork, or range of addresses.
Syntax
Parameter Description
Default
<name>
Name of the IPv6 destination host or subnetwork up to 63 characters long.
description Description about the IPv6 netdestination up to 128 characters long.
-
host
Configures a single IPv6 host and position in the list.
--
invert
Specifies that the inverse of the network addresses configured are used. For
--
example, if a network of fe80:0:0:0:0:0:ac10:0/128 is configured, this parameter
specifies that the alias matches everything except this subnetwork.
network
An IPv6 subnetwork consisting of an IP address and netmask.
--
no
Negates any configured parameter.
--
range
A range of IPv6 addresses consisting of sequential addresses between a lower and -- an upper value. The maximum number of addresses in the range is 16. If larger ranges are needed, convert the range into a subnetwork and use the network parameter.
Usage Guidelines
Aliases can simplify configuration of session ACLs, as you can use an alias when specifying the traffic source and/or destination. Once you configure an alias, you can use it in multiple session ACLs.
When using the invert option, use caution when defining multiple aliases, as entries are processed one at a time. As an example, consider a netdestination configured with the following two network hosts: netdestination6 dest1 invert network 2002:0:0:0:0:0:100:0/128 network 2002:0:0:0:0:0:200:0/128
A frame from http://1.0.0.1 would match the first alias entry, (which allows everything except for 2002:0:0:0:0:0:100:0/128) so the frame would be rejected. However, it would then be compared against the second alias, which allows everything except for 2002:0:0:0:0:0:200:0/128, and the frame would be permitted.
Example
The following command configures an alias for an internal network: (host) (config) #netdestination6 Internal
AOS-W 6.2 | Reference Guide
netdestination6 | 455
network fe80:0:0:0:0:0:a01:0/128
Command History
Release AOS-W 6.1 AOS-W 6.2
AOS-W 6.2
Modification Command introduced
A new field, description has been introduced to provide a description about the netdestination up to 128 characters long.
Maximum length allowed for netdestination6 <name> is now 63 characters.
Command Information
Platforms All platforms
Licensing
Command Mode
Requires the Policy Enforcement Config mode on master switches Firewall license.
456 | netdestination6
AOS-W 6.2 | Reference Guide
netexthdr
netexthdr <alias-name> eh <eh-type> deny | permit
Description
This command allows you to edit the packet filter options in the extension header (EH).
Syntax
Parameter
Description
<alias-name> eh <ehtype>
deny permit
Specify the EH alias name.
Specify one of the following EH types: l <0-255>: Matches the IPv6 next header type l authentication: Matches the IPv6 authentication header l dest-option: Matches the IPv6 destination-option header l esp: Matches the IPv6 encapsulation security payload header l fragment: Matches the IPv6 fragment header l hop-by-hop: Matches the IPv6 hop-by-hop header l mobility: Matches the IPv6 mobility header l routing: Matches the IPv6 routing header
Denies the IPv6 packets matching the specified extended header type.
Permits the IPv6 packets matching the specified extended header type. NOTE: By default, all the EH types are supported in the default EH.
Default
default --
-- --
Usage Guidelines
AOS-W firewall is enhanced to process the IPv6 extension header (EH) to enable IPv6 packet filtering. You can filter the incoming IPv6 packets based on the EH type. You can edit the packet filter options in the default EH, using this command. By default, the default EH alias permits all EH types.
Example
The following command denies the IPv6 packets matching the specified extended header type in the default EH: (host) (config) #netexthdr default (host) (config-exthdr) #eh authentication deny
Related Commands
(host) #show netexthdr <alias-name>
Command History
Release AOS-W 6.1
Modification Command introduced
AOS-W 6.2 | Reference Guide
netexthdr | 457
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Config mode on master switches
458 | netexthdr
AOS-W 6.2 | Reference Guide
netservice
netservice <name> <protocol>|tcp|udp {list <port>,<port>}|{<port> [<port>]} [ALG <service>]
Description
This command configures an alias for network protocols.
Syntax
Parameter netservice <protocol> tcp udp
list <port>, <port> <port> [<port>]
ALG <service>
Description
Range
Name for this alias.
--
IP protocol number.
0-255
Configure an alias for a TCP protocol
Configure an alias for a UDP protocol
Specify a list of non-contiguous port numbers, by entering up to six port numbers, separated by commas.
0-65535
TCP or UDP port number. You can specify a single port number, or define a port range by specifying both the lower and upper port numbers.
0-65535
Application-level gateway (ALG) for this alias.
--
Specify one of the following service types: l dhcp: Service is DHCP
l dns: Service is DNS l ftp: Service is FTP l h323: Service is H323 l noe: Service is Alcatel NOE l rtsp: Service is RTSP l sccp: Service is SCCP l sip: Service is SIP l sips: Service is Secure SIP l svp: Service is SVP l tftp: Service is TFTP l vocera: Service is VOCERA
Usage Guidelines
Aliases can simplify configuration of session ACLs, as you can use an alias when specifying the network service. Once you configure an alias, you can use it in multiple session ACLs.
Example
The following command configures an alias for a network service: (host) (config) #netservice HTTP tcp 80
AOS-W 6.2 | Reference Guide
netservice | 459
Command History
Version AOS-W 3.0 AOS-W 6.0
Modification Command introduced. The list parameter for defining non-contiguous ports was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
460 | netservice
AOS-W 6.2 | Reference Guide
network-printer [deprecated]
network-printer [max-clients <2-20> | max-clients-per-host <1-20> | max-jobs <1-1000>]
Description
This command allows you to configure client and print job for the USB printer connected to a OAW-4306 Seriesswitch.
Syntax
Parameter
Description
max-clients
Specify the maximum number of clients that can use the printer. Currently, the OAW-4306 Series supports a maximum of 20 concurrent clients.
max-clients-per-host Specify the maximum number of concurrent clients for a single host. Currently, the OAW-4306 Series supports a maximum of 20 concurrent clients.
max-jobs
Specify the maximum number of jobs that can be saved in the memory Currently, the OAW-4306 Seriesswitch will support a storage of 1000 jobs.
Usage Guidelines
Use this command in the config mode. In the enable mode, you can use the network-printer delete <printer-name> job <job-id> command to delete print jobs in specific printer.
Command History
Release AOS-W 3.4 AOS-W 6.2
Modification Command introduced. Command deprecated.
Command Information
Platforms OAW-4306 Series
Licensing Base operating system
Command Mode Config or enable mode
AOS-W 6.2 | Reference Guide
network-printer [deprecated] | 461
network-storage [deprecated]
network-storage [share <share-name>] share [usb: disk <disk-name> <filesystem-path> mode {read-only | read-write} no share
Description
This command allows you to perform the following operation on a network share: l Configure a file system path for the shareThis allows users to access the share from their computer. l Remove the share access using the no share command.
Syntax
Parameter share
Description
Enter a name for the share on the switch. After you enter this command, the CLI mode will shift to operations on that share.
Usage Guidelines
To access the share, you must create a filesystem path to the share. enter: (host) (config-network-storage share)# share usb: disk <disk name> <filesystem path> mode
Where, disk name is the name of the disk. You can also specify the disk alias instead of the disk name. filesystem path is the path to access the share. This path contains the partition name and the shared folder name. mode is the permission settings. You can either specify read-only or read-write modes.
Example
The following command associates a share to a file system path and configures the access mode.
(host) (config-network-storage share)#share usb: disk Maxtor1TB Maxtor-Basics_Desktop-
2HBADMJ4_p1/documents mode read-write
(host) (config-network-storage share)#show network-storage shares
NAS Shares
----------
Disk Name Partition Name Folder Name Share Name Share Path
Share Mode Status
--------- -------------- ----------- ---------- ----------
--------- ------
Maxtor1TB MxDocs
docum
p1/documents Read-Write Active
Command History
Release AOS-W 3.4 AOS-W 6.2
Modification Command introduced. Command deprecated.
462 | network-storage [deprecated]
AOS-W 6.2 | Reference Guide
Command Information
Platforms OAW-4306 Series
Licensing Base operating system
Command Mode Enable mode
AOS-W 6.2 | Reference Guide
network-storage [deprecated] | 463
ntp authenticate
ntp authenticate
Description
This command enables or disables NTP authentication.
Syntax
No parameters.
Usage Guidelines
Network Time Protocol (NTP) authentication enables the switch to authenticate the NTP server before synchronizing local time with server. This helps identify secure servers from fradulent servers. This command has to be enabled for NTP authentication to work.
Example
The following command configures an NTP server: (host) (config) #ntp authenticate
Command History
Release AOS-W 6.1
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
464 | ntp authenticate
AOS-W 6.2 | Reference Guide
ntp authentication-key
ntp authentication-key <key-id> md5 <keyvalue>
Description
This command configures a key identifier and secret key and adds them into the database. NTP authentication works with a symmetric key configured by user. The key is shared by the client (Alcatel-Lucentswitch) and an external NTP server.
Syntax
Parameter <key-id>
md5 <keyvalue>
Description
The key identifier is a string that is shared by the client (AlcatelLucentswitch) and an external NTP server. This value is added into the database.
The key value is a secret string, which along with the key identifier, is used for authentication. This is added into the database.
Default --
--
Usage Guidelines
NTP authentication works with a symmetric key configured by user. The key is shared by the client (AlcatelLucentswitch) and an external NTP server. This command adds both the key identifier and secret string into the database.
Example
The following command configures the NTP authentication key. The key identifier is 12345 and the shared secret is 67890. Both key identifier and shared secret: (host) (config) #ntp authentication-key 12345 md5 67890
Command History
Release AOS-W 6.1
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ntp authentication-key | 465
ntp server
#ntp server <server-ip> [iburst] [key <key-id>]
Description
This command configures a Network Time Protocol (NTP) server.
Syntax
Parameter <ipaddr> iburst
key <key-id>
Description
IP address of the NTP server, in dotted-decimal format.
(Optional) This parameter causes the switch to send up to ten queries within the first minute to the NTP server. This option is considered "aggressive" by some public NTP servers.
This is the key identifier used to authenticate the NTP server. This needs to match the key identifier configured in the ntp authentication-key command.
Default -- disabled
--
Usage Guidelines
You can configure the switch to set its system clock using NTP by specifying one or more NTP servers.
Example
The following command configures an NTP server using the iburst optional parameter and using a key identifier "123456." (host) (config) #ntp server 10.1.1.245 iburst key 12345
Command History
Release AOS-W 1.0 AOS-W 3.0 AOS-W 6.1
Modification Command introduced The iburst parameter was introduced The key parameter was introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
466 | ntp server
AOS-W 6.2 | Reference Guide
ntp trusted-key
ntp trusted-key <keyid>
Description
This command configures an additional subset of trusted keys which can be used for NTP authentication.
Syntax
Parameter <keyid>
Description An additional trusted string that can be used for authentication
Default --
Usage Guidelines
You can configure additional subset of keys which are trusted and can be used for NTP authentication.
Example
The following command configures an additional trusted key(84956) which can be used for NTP authentication. (host) (config) #ntp trusted-key 84956
Command History
Release AOS-W 6.1
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
ntp trusted-key | 467
packet-capture
packet-capture [other {disable | enable}] [sysmsg {all | disable | <opcodes>] [tcp {all | disable | <ports>}] [udp {all | disable | <ports>]]
Description
Use this command to enable or disable packet capturing and set packet capturing options for a single packet capture session.
Syntax
Parameter other
sysmsg tcp ports
udp ports
Description
Default
Enable or disable all other types of packets. Specify up to ten comma-separated opcodes to capture; use all to sniff all opcodes; use disable to bypass the all setting. All CLI ports are always skipped.
Enabled
Enable or disable internal messaging packets.
Disabled
Enable or disable TCP packet capturing. Specify up to ten comma-separated ports to capture; use all to sniff all TCP ports; use disable to bypass the all setting. All CLI ports are always skipped.
Disabled
Enable or disable UDP packet capturing. Specify up to ten comma-separated ports to capture; use all to sniff all UDP ports; use disable to bypass the all setting. All CLI ports are always skipped.
Disabled
Usage Guidelines
This command applies to control path packets; not datapath packets. Packets can be retrieved through the tar log command; look for the filter.pcap file. This command activates packet capture options on the current switch. They are not saved and applied across switches. If you do want to enable a packet capture session without setting values that can be saved and used for another session, use the command packet-capture. The related command packet-capture-defaults lets you define a set of packet capture options that will run every time you enable the packet capture feature.
Example
The following command enables packet capturing for debugging a wireless WEP station doing VPN. This example uses the following parameters and values: l Station up/down: sysmsg opcode 30 l WEP key plumbing: sysmsg opcode 29 l DHCP: sysmsg opcode 90 l IKE: UDP port 500 and 4500 l Layer 2 Tunneling Protocol (L2TP): UDP port 1701 (host) #packet-capture sysmsg 30,29,90 udp 500,4500,1701,1812,1645
Command History
This command was introduced in AOS-W 2.3.
468 | packet-capture
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
packet-capture | 469
packet-capture-defaults
packet-capture-defaults [other{disable|enable}] [sysmsg{all|disable|<opcodes>] [tcp {all|disable|<ports>}] [udp{all|disable|<ports>]]
Description
Use this command to enable or disable packet capturing and define a set of default packet capturing options on the control path for debugging purposes.
Syntax
Parameter other
sysmsg tcp ports
udp ports
Description
Default
Enable or disable all other types of packets. Specify up to ten comma-separated opcodes to capture; use all to sniff all opcodes; use disable to bypass the all setting. All CLI ports are always skipped.
Enabled
Enable or disable internal messaging packets.
Disabled
Enable or disable TCP packet capturing. Specify up to ten comma-separated ports to capture; use all to sniff all TCP ports; use disable to bypass the all setting. All CLI ports are always skipped.
Disabled
Enable or disable UDP packet capturing. Specify up to ten comma-separated ports to capture; use all to sniff all UDP ports; use disable to bypass the all setting. All CLI ports are always skipped.
Disabled
Usage Guidelines
This command applies to control path packets; not datapath packets. Packets can be retrieved through the tar log command; look for the filter.pcap file. This command activates packet capture options on the current switch. They are not saved and applied across switches.
Example
The following command sets the default packet capture values to debug a wireless WEP station doing VPN. Once these default settings are defined, you can use the packet-capture command to enable packet capturing with these values. This example uses the following parameters and values: l Station up/down: sysmsg opcode 30 l WEP key plumbing: sysmsg opcode 29 l DHCP: sysmsg opcode 90 l IKE: UDP port 500 and 4500 l Layer 2 Tunneling Protocol (L2TP): UDP port 1701 packet-capture-defaults sysmsg 30,29,90 udp 500,4500,1701,1812,1645
Use the show packet-capture command to show the current action and the default values. (host) show packet-capture
Current Active Packet Capture Actions(current switch) =====================================================
470 | packet-capture-defaults
AOS-W 6.2 | Reference Guide
Packet filtering TCP with 2 port(s) enabled: 2 1
Packet filtering UDP with 1 port(s) enabled: 1
Packet filtering for internal messaging opcodes disabled. Packet filtering for all other packets disabled.
Packet Capture Defaults(across switches and reboots if saved) ============================================================ Packet filtering TCP with 2 port(s) enabled:
2 1 Packet filtering UDP with 1 port(s) enabled: 1
Command History
This command was introduced in AOS-W 2.3.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
packet-capture-defaults | 471
page
page <length>
Description
This command sets the number of lines of text the terminal will display when paging is enabled.
Syntax
Parameter length
Description Specifies the number of lines of text displayed.
Range 24 - 100
Usage Guidelines
Use this command in conjunction with the paging command to specify the number of lines of text to display. For more information on the pause mechanism that stops the command output from printing continuously to the terminal, see paging on page 473. If you need to adjust the screen size, use your terminal application to do so.
Example
The following command sets 80 as the number of lines of text displayed: (host) (config) #page 80
Command History
This command was introduced in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config and Enable mode on master switches
472 | page
AOS-W 6.2 | Reference Guide
paging
paging
Description
This command stops the command output from printing continuously to the terminal.
Syntax
No parameters
Usage Guidelines
By default, paging is enabled. With paging enabled, there is a pause mechanism that stops the command output from printing continuously to the terminal. If paging is disabled, the output prints continuously to the terminal. To disable paging, use the no paging command. You must be in enable mode to disable paging. The paging setting is active on a per-user session. For example, if you disable paging from the CLI, it only affects that session. For new or existing sessions, paging is enabled by default. You can also configure the number of lines of text displayed when paging is enabled. For more information, refer to the command page on page 472. If you need to adjust the screen size, use your terminal application to do so.
Example
The following command enables paging: (host) (config) #paging
Command History
This command was introduced in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config and Enable mode on master switches
AOS-W 6.2 | Reference Guide
paging | 473
panic
panic {clear | info {file <filename> <symbolfile>|nvram <symbolfile>} | list {file <filename>|nvram} | save <filename>}
Description
This command manages information created during a system crash.
Syntax
Parameter clear info list save
Description Removes panic information from non-volatile random access memory (NVRAM). Displays the content of specified panic files. Lists panic information in the specified file in flash or in NVRAM. Saves panic information from NVRAM into the specified file in flash.
Usage Guidelines
To troubleshoot system crashes, use the panic save command to save information from NVRAM into the specified file, then use the panic clear command to clear the information from NVRAM.
Example
The following command lists panic information in NVRAM: (host) #panic list nvram
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
474 | panic
AOS-W 6.2 | Reference Guide
papi-security (deprecated)
papi-security key <key> [enhanced-security] no...
Description
The papi-security command enforces advanced security options and provides an enhanced level of security.
The best practice is to refrain from modifying these settings unless advised to do so by Alcatel-Lucent technical support.
Syntax
Parameter key
key
Description The key authenticates the messages between systems. The key string.
enhanced-security Allows you to use the enhanced security mode. This mode causes the system to reject messages when an incorrect key is used.
no key
Reverts to the default key.
Default -- Range: 10 64 characters disabled
--
Usage Guidelines
This command allows you to use advanced options which regulate the switch and AP communication. One way PAPI messages are authenticated is through a shared secret key. The papi-security command lets you configure a key on the master switch which then distributes it to other switches and APs, thus allowing each site to have a unique key. If no key is configured, then the switch uses the default key. When enhanced-security mode is disabled, any AP can obtain the current shared secret key. When enhanced-security mode is enabled, an AP is not updated with the new shared secret key unless the AP knows the previous key and the AP is updated with the new key within one hour of the key creation.
Make sure that the enhanced-security mode is disabled before installing new APs.
If an AP cannot be authenticated because it has the wrong key, the show ap database command displays a "Bad key" status.
Example
This example sets a unique shared secret key called "testkey123" on the master switch. (host) (config) #papi-security (host) (PAPI Security Profile) # (host) (PAPI Security Profile) #key testkey123 (host) (PAPI Security Profile) #exit
AOS-W 6.2 | Reference Guide
papi-security (deprecated) | 475
Related Commands
(host)(config) #show papi-security (host)(config) #show ap database
Command History
AOS-W 3.4 AOS-W 6.2
Modification Command introduced. Command deprecated
Command Information
Platform Available on all platforms
License Base operating system
Command Mode Config mode on master switches
476 | papi-security (deprecated)
AOS-W 6.2 | Reference Guide
pcap (deprecated)
pcap {raw-start <ipaddr> <target-ipaddr> <target-port> <format> [bssid <bssid>] [channel <number>] [maxlen <maxlen>]}|{interactive <am-ip> <filter> <target-ipaddr> <target-port> [bssid <bssid>][channel <number>]}|{clear|pause|resume|stop <am-ip> <id> [bssid <bssid>]}
Description
These commands manage packet capture (PCAP) on Alcatel-Lucent air monitors.
Syntax
Parameter raw-start
<ipaddr> <target-ipaddr>
<target-port> <format>
bssid <bssid>
channel maxlen
<maxlen> interactive
<am-ip> <filter-spec> <target-ipaddr> <target-port> bssid
<bssid> channel
Description Stream raw packets to an external viewer. IP address of the air monitor collecting packets. IP address of the client station running Wildpacket's AiroPeek monitoring application. UDP port number on the client station where the captured packets are sent. Specify a number to indicate one of the following formats for captured packets: l 0 : pcap l 1 : peek l 2 : airmagnet l 3 : pcap+radio header l 4 : ppi (Optional) BSSID of the Air Monitor interface for the PCAP session. BSSID of the Air Monitor Interface, which is usually its MAC address. (Optional) Number of a radio channel to tune into to capture packets (Optional) Limit the length of 802.11 frames to include in the capture to a specified maximum. (Optional) Maximum number of packets to be captured. Start an interactive packet capture session. IP address of the air monitor collecting packets. Packet Capture filter specification.
(Optional) Specify the BSSID of the Air Monitor interface for the PCAP session. BSSID of the Air Monitor Interface, which is usually its MAC address. (Optional) Number of a radio channel to tune into to capture packets
AOS-W 6.2 | Reference Guide
pcap (deprecated) | 477
Parameter clear pause resume start stop
<am-ip> <id> bssid
<bssid>
Description Clears the packet capture session. Pause a packet capture session. Resume a packet capture session. Start a new packet capture session. Stop a packet capture session. IP address of the air monitor collecting packets. ID of the PCAP session. (Optional) Specify the BSSID of the Air Monitor interface for the PCAP session. BSSID of the Air Monitor Interface, which is usually its MAC address.
Usage Guidelines
These commands direct an Alcatel-Lucent air monitor to send packet captures to the Wildpacket's AiroPeek monitoring application on a remote client. The AiroPeek application listens for packets sent by the air monitor.
The following pcap commands are available:
Command clear pause resume start stop
Description Clears the packet capture session. Pause a packet capture session. Resume a packet capture session. Start a new packet capture session. Stop a packet capture session.
Before using these commands, you need to start the AiroPeek application on the client and open a capture window for the air monitor. The AiroPeek application cannot be used to control the flow or type of packets sent from AlcatelLucent air monitors.
The AiroPeek application processes all packets, however, you can apply display filters on the capture window to control the number and type of packets being displayed. In the capture window, the time stamp displayed corresponds to the time that the packet is received by the client and is not synchronized with the time on the AlcatelLucent air monitor.
Example
The following command starts a raw packet capture session for the air monitor at 10.100.100.1 and sends the packets to the client at 192.168.22.44 on port 604 with pcap format: (host) (config) #pcap raw-start 10.100.100.1 192.168.22.44 604 0
478 | pcap (deprecated)
AOS-W 6.2 | Reference Guide
Command History
Version AOS-W 3.0 AOS-W 3.4
AOS-W 6.2
Change
Command Introduced
The maxlen parameter was introduced, and the pcap start command deprecated.
Functionality with 2 new parameters, now subsumed by the ap packet capture command.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
pcap (deprecated) | 479
ping
ping <ipaddress> | ipv6 {<global-address> | interface vlan <vlanid> <linklocal-address>}
Description
This command sends five ICMP echo packets to the specified ip address. You can also ping the specified IPv6 address.
Syntax
Parameter <ipaddress> ipv6
<global-address> interface vlan <vlanid> <linklocal-address>
Description Destination IP Address Specify this parameter to ping an IPv6 address. Specify the IPv6 global address. Specify the IPv6 link local address of a specific VLAN interface.
Usage Guidelines
You can send five ICMP echo packets to a specified IP address. The switch times out after two seconds. You can also ping the specified IPv6 address.
Examples
The following example pings 10.10.10.5. (host) #ping 10.10.10.5 The sample switch output is: Press 'q' to abort. Sending 5, 100-byte ICMP Echos to 10.10.10.5, timeout is 2 seconds:!!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 0.408/0.5434/1.073 ms
The following example pings the specified IPv6 global address:
(host) #ping ipv6 2005:d81f:f9f0:1001::14
The sample switch output is:
Press 'q' to abort. Sending 5, 100-byte ICMPv6 Echos to 2005:d81f:f9f0:1001::14, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 0.309/0.3726/0.463 ms
480 | ping
AOS-W 6.2 | Reference Guide
Command History
Release AOS-W 1.0 AOS-W 6.1
Modification Command introduced Introduced ipv6 parameter to provide support for IPv6.
This command was introduced in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
User, Enable, and Config modes on master switches
AOS-W 6.2 | Reference Guide
ping | 481
pkt-trace
pkt-trace acl <acl-name> {enable|disable} [trace {cptrace|pktrace} [trace-mask <tmask>]]]
Description
Enable packet tracing in the datapath. Use this feature only under the supervision of Alcatel-Lucent technical support.
Syntax
Parameter <acl-name> enable disable cptrace pktrace tracemask <tmask>
Description Enable packet tracing for the specified access-control list. Enable packet tracing for the ACL. Disable packet tracing for the ACL. Send packet trace data into the Control Processor. Write packet trace data in the packet. Specify the trace mask. This value will be provided by Alcatel-Lucent technical support.
Example
The following example enables packet tracing for the traffic matching the acl stateful-dot1x. (host) #pkt-trace acl stateful-dot1x enable trace cptrace trace-mask <val>
Command History
This command was introduced in AOS-W 3.4.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
482 | pkt-trace
AOS-W 6.2 | Reference Guide
policer-profile (deprecated)
policer-profile <profile-name> cbs {k | m | g} cir <cir> clone <source> ebs [k | m | g] exceed-action drop | permit | remark exceed-profile <policerProfile> no.. violate-action drop | permit violate-profile <profile-name>
Description
This command configures a Policer profile to manage the transmission rate of a class of traffic based on user-defined criteria.
Command History
Release AOS-W 6.2
Modification Command deprecated.
AOS-W 6.2 | Reference Guide
policer-profile (deprecated) | 483
pkt-trace-global
pkt-trace-global {enable|disable} [trace-mask <tmask>]
Description
Enable global packet tracing in the datapath. Use this feature only under the supervision of Alcatel-Lucent technical support.
Syntax
Parameter <acl-name> enable disable tracemask <tmask>
Description Enable packet tracing for the specified access-control list. Enable global packet tracing for the ACL. Disable global packet tracing for the ACL. Specify a trace mask. Use this feature only under the supervision of Alcatel-Lucent technical support.
Example
The following command enables the global packet tracing for all traffic. (host) (config) #pkt-trace-global enable
Command History
This command was introduced in AOS-W 3.4.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
484 | pkt-trace-global
AOS-W 6.2 | Reference Guide
pptp ip local pool
pptp ip local pool <pool> <ipaddr> [<end-ipaddr>]
Description
This command configures an IP address pool for VPN users using Point-to-Point Tunneling Protocol (PPTP).
Syntax
Parameter <pool> <ipaddr> <end-ipaddr>
Description User-defined name for the address pool. Starting IP address for the pool. Ending IP address for the pool.
Usage Guidelines
If VPN is used as an access method, you specify the pool from which the user's IP address is assigned when the user negotiates a PPTP session. Use the show vpdn pptp local command to see the used and free addresses in the pool. PPTP is an alternative to IPsec that is supported by various hardware platforms. PPTP is considered to be less secure than IPsec but also requires less configuration. You configure PPTP with the vpdn command.
Example
The following command configures an IP address pool for PPTP VPN users: (host) (config) #pptp ip local pool pptp-pool1 172.16.18.1 172.16.18.24
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
pptp ip local pool | 485
priority-map
priority-map <name> dot1p <priority> high dscp <priority> high no ...
Description
This command configures the Type of Service (ToS) and Class of Service (CoS) values used to map traffic into high priority queues.
Syntax
Parameter <name> dot1p
dscp
no
Description
User-defined name of the priority map.
IEEE 802.1p priority value, or a range of values separated by a dash (-).
Differentiated Services Code Point (DSCP) priority value, or a range of values separated by a dash (-).
Negates any configured parameter.
Range -- 0-7
0-63
--
Usage Guidelines
This command allows you to prioritize inbound traffic that is already tagged with 802.1p and/or IP ToS in hardware queues. You apply configured priority maps to ports on the switch (using the interface fastethernet or interface gigbitethernet command). This causes the switch to inspect inbound traffic on the port; when a matching QoS tag is found, the packet or flow is mapped to the specified queue.
Example
The following commands configure a priority map and apply it to a port: (host) (config) #priority-map pri1
dscp 4-20 high dscp 60 high dot1p 4-7 high interface gigabitethernet 1/24 priority-map pri1
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
486 | priority-map
AOS-W 6.2 | Reference Guide
process monitor
process monitor log|restart|
Description
The process monitor validates the integrity of processes every 120 seconds. If a process does not respond during three consecutive 120-second timeout intervals, that process is flagged as nonresponsive and the process monitor will create a log message, restart the process or reboot the switch
Syntax
Parameter log
restart
Description
The process monitor creates a log message when a process fails to responding properly. This is the default behavior for the process monitor
This parameter enables strict behavior for runtime processes. When you enable this option, the process monitor will restart processes that fail to responding properly.
Usage Guidelines
The CLI command process monitor log enables logging for process monitoring. By default, whenever a process does not update a required file or send a heartbeat pulse within the required time limit, the process monitor records a critical log message, but does not restart any process. If you want the configure watchdog to restart a process once it fails to respond, use the CLI command process monitor restart.
Example
The following changes the default process monitor behavior, so the process monitor restarts nonresponsive processes. (host) #process monitor restart
Related Commands
The show process monitor statistics command displays the current status of all the processes running under the process monitor watchdog. A partial example of the output of this command is shown below: host) (config) #show process monitor statistics
Process Monitor Statistics -------------------------Name
---/mswitch/bin/arci-cli-helper /mswitch/bin/fpcli /mswitch/bin/packet_filter /mswitch/bin/certmgr /mswitch/bin/dbstart /mswitch/bin/cryptoPOST /mswitch/bin/sbConsoled /mswitch/bin/pubsub /mswitch/bin/cfgm /mswitch/bin/syslogdwrap /mswitch/bin/aaa
State
----PROCESS_RUNNING PROCESS_RUNNING PROCESS_RUNNING PROCESS_RUNNING PROCESS_RUNNING PROCESS_RUNNING PROCESS_RUNNING PROCESS_RUNNING PROCESS_RUNNING PROCESS_RUNNING PROCESS_RUNNING
Restarts
-------0 0 0 0 0 0 0 0 0 0 0
Timeout Value Timeout
Chances
------------- ---------------
120
3
120
3
120
3
120
3
120
3
120
3
120
3
120
3
120
3
120
3
120
3
AOS-W 6.2 | Reference Guide
process monitor | 487
/mswitch/bin/fpapps
PROCESS_RUNNING 0
120
3
/mswitch/bin/pim
PROCESS_RUNNING 0
120
3
/mswitch/bin/lic
Command History
Release AOS-W 3.4 AOS-W 3.4
Modification Command introduced The process restart command was deprecated.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
488 | process monitor
AOS-W 6.2 | Reference Guide
prompt
prompt <prompt>
Description
This command changes the prompt text.
Syntax
Parameter prompt
Description The prompt text displayed by the switch.
Range 164
Default <hostname>
Usage Guidelines
You can use any alphanumeric character, punctuation, or symbol character. To use spaces, plus symbols (+), question marks (?), or asterisks (*), enclose the text in quotes. You cannot alter the parentheses that surround the prompt text, or the greater-than (>) or hash (#) symbols that indicate user or enable CLI mode.
Example
The following example changes the prompt text to "It's a new day!". (host) (config) #prompt "It's a new day!" (It's a new day!) (config) #
Command History
This command was introduced in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
prompt | 489
provision-ap
provision-ap a-ant-bearing <bearing> a-ant-gain <gain> a-ant-tilt-angle <angle> a-antenna {1|2|both} altitude <altitude> ap-group <group> ap-name <name> apdot1x-passwd <string> apdot1x-username <name> cellular_nw_preference g-only|4g-only|advanced|auto copy-provisioning-params {ap-name <name> | ip-addr <ipaddr>} dns-server-ip <ipaddr> dns-server-ip6 <ipv6 address> domain-name <name> external-antenna fqln <name> g-ant-bearing <bearing> g-ant-gain <gain> g-ant-tilt-angle <angle> g-antenna {1|2|both} gateway <ipaddr> gateway6 <ipv6-address> ikepsk <key> installation default|indoor|outdoor ip6addr <ipv6-address> ip6prefix <ipv6-prefix> ipaddr <ipaddr> latitude <location> link-priority-cellular link-priority-ethernet longitude <location> master {<name>|<ipaddr>} mesh-role {mesh-point|mesh-portal|none|remote-mesh-portal} mesh-sae {sae-disable|sae-enable} netmask <netmask> no ... pap-passwd <string> pap-user <name> pppoe-chap-secret<key> pppoe-passwd <string> pppoe-service-name <name> pppoe-user <name> read-bootinfo {ap-name <name>|ip-addr <ipaddr>|wired-mac <macaddr>} reprovision {all|ap-name <name>|ip-addr <ipaddr>|serial-num <string>| wired-mac <macaddr>} reset-bootinfo {ap-name <name>|ip-addr <ipaddr>|wired-mac <macaddr>} server-ip <ipaddr> sch-mode-radio-0 sch-mode-radio-1 server-name <name> set-ikepsk-by-addr <ip-addr> syslocation <string> uplink-vlan <uplink-vlan> usb-dev <usb-dev> usb-dial <usb-dial> usb-init <usb-init> usb-passwd <usb-passwd>
490 | provision-ap
AOS-W 6.2 | Reference Guide
usb-power-mode auto|enable|disable usb-tty <usb-tty> usb-tty-control <usb-tty-control> usb-type <usb-type> usb-user <usb-user>
Description
This command provisions or reprovisions an AP.
Syntax
Parameter
Description
Range
a-ant-bearing
a-ant-gain a-ant-tilt-angle
a-antenna
altitude
ap-group ap-name apdot1x-passwd apdot1x-username cellular_nw_preference g-only|4g-only| advanced|auto
Determines the horizontal coverage distance of the 802.11a (5GHz) antenna from True North. From a planning perspective, the horizontal coverage pattern does not consider the elevation or vertical antenna pattern. NOTE: This parameter is supported on outdoor APs only. If you use this parameter to configure an indoor AP, an error message is displayed.
0-360 Decimal Degrees
Antenna gain for 802.11a (5GHz) antenna.
--
Directs the angle of the 802.11a (5GHz) antenna for optimum coverage. Use a - (negative) value for downtilt and a + (positive) value for uptilt. NOTE: This parameter is supported on outdoor APs only. If you use this parameter to configure an indoor AP, an error message is displayed.
-90 to +90 Decimal Degrees
Antenna use for 5 GHz (802.11a) frequency band. l 1: Use antenna 1 l 2: Use antenna 2 l both: Use both antennas (default)
1, 2, both (default)
Altitude, in meters, of the AP.
--
NOTE: This parameter is supported on outdoor APs only. If you use
this parameter to configure an indoor AP, an error message is
displayed.
Name of the AP group to which the AP belongs.
--
Name of the AP to be provisioned.
--
Password of the AP to authenticate to 802.1X using PEAP.
--
Username of the AP to authenticate to 802.1X using PEAP.
--
The Cellular Network Preference setting introduced in AOS-W 6.2.1.0 -- allows you to select how the modem should operate.
l auto (default): In this mode, modem firmware will control the cellular network service selection; so the cellular network service failover and fallback is not interrupted by the remote AP (RAP).
l 3g_only: Locks the modem to operate only in 3G. l 4g_only: Locks the modem to operate only in 4G.
AOS-W 6.2 | Reference Guide
provision-ap | 491
Parameter
copy-provisioning-params
dns-server-ip dns-server-ip6 domain-name external-anten na fqln g-ant-bearing
g-ant-gain g-ant-tilt-angle
g-antenna gateway gateway6 ikepsk
Description
Range
l advanced: The RAP controls the cellular network service selection based on an Received Signal Strength Indication (RSSI) threshold-based approach. Initially the modem is set to the default auto mode. This allows the modem firmware to select the available network. The RAP determines the RSSI value for the available network type (for example 4G), checks whether the RSSI is within required range, and if so, connects to that network. If the RSSI for the modem's selected network is not within the required range, the RAP will then check the RSSI limit of an alternate network (for example, 3G), and reconnect to that alternate network. The RAP will repeat the above steps each time it tries to connect using a 4G multimode modem in this mode.
Initializes the provisioning-params workspace with the current
--
provisioning parameters of the specified AP, The provisioning
parameters of the AP must have previously been retrieved with the
read-bootinfo option.
NOTE: This parameter can only be used on the master switch.
IP address of the DNS server for the AP.
--
IPv6 address of the DNS server for the AP.
--
Domain name for the AP.
--
Use an external antenna with the AP.
--
Fully-qualified location name (FQLN) for the AP, in the format
--
<APname.floor.building.campus>.
Determines the horizontal coverage distance of the 802.11g (2.4GHz) antenna from True North. From a planning perspective, the horizontal coverage pattern does not consider the elevation or vertical antenna pattern. NOTE: This parameter is supported on outdoor APs only. If you use this parameter to configure an indoor AP, an error message is displayed.
0-360 decimal degrees
Antenna gain for 802.11g (2.4GHz) antenna.
--
Directs the angle of the 802.11g (2.4GHz) antenna for optimum coverage. Use a - (negative) value for downtilt and a + (positive) value for uptilt. NOTE: This parameter is supported on outdoor APs only. If you use this parameter to configure an indoor AP, an error message is displayed.
-90 to +90 Decimal Degrees
Antenna use for 2.4 GHz (802.11g) frequency band. l 1: Use antenna 1 l 2: Use antenna 2 l both: Use both antennas
1, 2, both
IP address of the default gateway for the AP.
--
IPv6 address of the default gateway for the AP.
--
IKE preshared key for the AP.
--
492 | provision-ap
AOS-W 6.2 | Reference Guide
Parameter installation
ip6addr ip6prefix ipaddr latitude
link-priority-cellular <link-priority-cellular>
link-priority-ethernet <link-priority-ethernet>
Description
Range
Specify the type of installation (indoor or outdoor). The default parameter automatically selects an installation mode based upon the AP model type.
default indoor outdoor
Static IPv6 address of the AP.
--
The prefix of static IPv6 address of the AP.
--
Static IP address for the AP.
--
Latitude coordinates of the AP. Use the format: Degrees, Minutes,
--
Seconds (DMS). For example: 37 22 00 N
Set the priority of the cellular uplink. By default, the cellular uplink is a -- lower priority than the wired uplink; making the wired link the primary link and the cellular link the secondary or backup link. Configuring the cellular link with a higher priority than your wired link priority will set your cellular link as the primary switch link.
Set the priority of the wired uplink. Each uplink type has an
--
associated priority; wired ports having the highest priority by default.
longitude master mesh-role mesh-sae
netmask no pap-passwd
Longitude coordinates of the AP. Use the DMS format.
--
For example: 122 02 00 W
Name or IP address of the master switch.
--
Configure the AP to operate as a mesh node. You assign one of three -- roles: mesh portal, mesh point or remote mesh point. If you select "none," the AP operates as a thin AP.
Enable or disable Simultaneous Authentication of Equals (SAE) on a -- mesh network. This option offers enhanced security over the default wpa2-psk-aes mesh security setting, and provides secure, attackresistant authentication using a pre-shared key. SAE supports simultaneous initiation of a key exchange, allowing either party to initiate an exchange or both parties to initiate a key exchange simultaneously
To use the SAE feature, you must enable this parameter on all mesh nodes (points and portals) in the network, to prevent mesh link connectivity issues.
NOTE: This is a Beta feature only. This parameter should be kept "disabled" for this release.
Netmask for the IP address.
--
Negates any configured parameter.
--
Password Authentication Protocol (PAP) password for the AP.
--
You can use special characters in the PAP password. Following are
the restrictions:
l You cannot use double-byte characters
l You cannot use a tilde (~)
l You cannot use a tick (`)
l If you use quotes (single or double), you must use the backslash
(\) before and after the password
AOS-W 6.2 | Reference Guide
provision-ap | 493
Parameter
Description
Range
pap-user
PAP username for the AP.
--
pppoe-chap-secret
PPPoE CHAP secret key for the AP.
--
pppoe-passwd
Point-to-Point Protocol over Ethernet (PPPoE) password for the AP. --
pppoe-service-
PPPoE service name for the AP.
--
name
pppoe-user
PPPoE username for the AP.
--
read-bootinfo
Retrieves current provisioning parameters of the specified AP.
--
NOTE: This parameter can only be used on the master switch.
reprovision
Provisions one or more APs with the values in the provisioning-
--
params workspace. To use reprovision, you must use read-bootinfo
to retrieve the current values of the APs into the provisioning-ap-list.
NOTE: This parameter can only be used on the master switch.
reset-bootinfo
Restores factory default provisioning parameters to the specified AP. -- NOTE: This parameter can only be used on the master switch.
sch-mode-radio-0
If you are provisioning an 802.11n-capable AP, you can issue the sch-mode-radio-0 command to enable single-chain mode for the selected radio. AP radios in single-chain mode will transmit and receive data using only legacy rates and single-stream HT rates up to MCS 7. This setting is disabled by default.
sch-mode-radio-1
If you are provisioning an 802.11n-capable AP, you can issue the sch-mode-radio-1 command to enable single-chain mode for the selected radio. AP radios in single-chain mode will transmit and receive data using only legacy rates and single-stream HT rates up to MCS 7. This setting is disabled by default.
server-ip
IP address of the switch from which the AP boots.
server-name
DNS name of the switch from which the AP boots.
set-ikepsk-by-addr
Set a IKE preshared key to correspond to a specific IP address.
syslocation
User-defined description of the location of the AP.
uplink-vlan <uplink-vlan>
If you configure an uplink VLAN on an AP connected to a port in trunk mode, the AP sends and receives frames tagged with this VLAN on its Ethernet uplink. By default, an AP has an uplink vlan of 0, which disables this feature. NOTE: If an AP is provisioned with an uplink VLAN, it must be connected to a trunk mode port or the AP's frames will be dropped.
usb-dev
The USB device identifier, if the device is not already supported.
usb-dial
The dial string for the USB modem. This parameter only needs to be specified if the default string is not correct.
494 | provision-ap
AOS-W 6.2 | Reference Guide
Parameter
usb-modeswitch "-v <default_vendor> -p <default_product> -V <target_vendor> -P <target_product> -M <message_content>"
Description
Range
USB cellular devices on remote APs typically register as modems, but may occasionally register as a mass-storage device. If a remote AP cannot recognize its USB cellular modem, use the usb-modeswitch command to specify the parameters for the hardware model of the USB cellular data-card.
NOTE: You must enclose the entire modeswitch parameter string in quotation marks.
usb-init
The initialization string for the USB modem. This parameter only needs to be specified if the default string is not correct.
usb-passwd
A PPP password, if provided by the cellular service provider
usb-power-mode auto| ena- Set the USB power mode to control the power to the USB port. ble|disable
usb-tty
The TTY device path for the USB modem. This parameter only needs to be specified if the default path is not correct.
usb-tty-control
The TTY device control path for the USB modem. This parameter only needs to be specified if the default path is not correct.
usb-type
Specify the USB driver type. l acm: Use ACM driver l airprime: Use Airprime driver l any: Use any USB driver that supports device l beceem-wimax: Use Beceem driver for 4G-WiMAX l ether-lte: Use CDC Ether driver for 4G-LTE l hso: Use HSO driver for newer Option l option: Use Option driver l sierra-evdo: Use EVDO Sierra Wireless driver l sierra-gsm: Use GSM Sierra Wireless driver l pantech-lte: Use Pantech driver for 4G-LTE
usb-user
The PPP username provided by the cellular service provider
Usage Guidelines
You do not need to provision APs before installing and using them. The exceptions are outdoor APs, which have antenna gains that you must provision before they can be used, and APs configured for mesh. You must provision the AP before you install it as a mesh node in a mesh deployment.
Users less familiar with this process may prefer to use the Provisioning page in the WebUI to provision an AP.
Provisioned or reprovisioned values do not take effect until the AP is rebooted. APs reboot automatically after they are successfully reprovisioned.
In order to enable cellular uplink for a remote AP (RAP), the RAP must have the device driver for the USB data card and the correct configuration parameters. AOS-W includes device drivers for the most common hardware types, but you can use the usb commands in this profile to configure a RAP to recognize and use an unknown USB modem type.
Provisioning a Single AP
To provision a single AP:
1. Use the read-bootinfo option to read the current information from the deployed AP you wish to reprovision.
AOS-W 6.2 | Reference Guide
provision-ap | 495
2. Use the show provisioning-ap-list command to see the AP to be provisioned. 3. Use the copy-provisioning-params option to copy the AP's parameter values to the provisioning-params
workspace. 4. Use the provision-ap options to set new values. Use the show provisioning-params command to display
parameters and values in the provisioning-params workspace. Use the clear provisioning-params command to reset the workspace to default values. 5. Use the reprovision option to provision the AP with the values in provisioning-params workspace. The AP automatically reboots.
Provisioning Multiple APs at a Time
You can change parameter values for multiple APs at a time, however, note the following:
l You cannot provision the following AP-specific options on multiple APs: n ap-name n ipaddr n pap-user n pap-passwd n ikepsk If any of these options are already provisioned on the AP, their values are retained when the AP is reprovisioned.
l The values of the server-name, a-ant-gain, or g-ant-gain options are retained if they are not reprovisioned. l All other values in the provisioning-params workspace are copied to the APs.
To provision multiple APs at the same time:
1. Use the read-bootinfo to read the current information from each deployed AP that you wish to provision.
The AP parameter values are written to the provisioning-ap-list. To reprovision multiple APs, the APs must be present in the provisioning-ap-list. Use the show provisioning-ap-list command to see the APs that will be provisioned. Use the clear provisioning-ap-list command to clear the provisioning-ap-list.
2. Use the copy-provisioning-params option to copy an AP's parameter values to the provisioning-params workspace.
3. Use the provision-ap options to set new values. Use the show provisioning-params command to display parameters and values in the provisioning-params workspace. Use the clear provisioning-params command to reset the workspace to default values.
4. Use the reprovisionall option to provision the APs in the provisioning-ap-list with the values in provisioningparams workspace. All APs in the provisioning-ap-list automatically reboot.
The following are useful commands when provisioning one or more APs:
l show|clear provisioning-ap-list displays or clears the APs that will be provisioned. l show|clear provisioning-params displays or resets values in the provisioning-params workspace. l show ap provisioning shows the provisioning parameters an AP is currently using.
Example
The following commands change the IP address of the master switch on the AP: (host) (config) #provision-ap
read-bootinfo ap-name lab103 show provisioning-ap-list copy-provisioning-params ap-name lab103
496 | provision-ap
AOS-W 6.2 | Reference Guide
master 10.100.102.210 reprovision ap-name lab103
Command History
Release AOS-W 3.0 AOS-W 3.2 AOS-W 3.4
AOS-W 5.0 AOS-W 6.0 AOS-W 6.1 AOS-W 6.2
AOS-W 6.2.1.0
Modification
Command introduced
Introduced support for the mesh parameters, additional antenna parameters, and AP location parameters.
Introduced support for the following parameters: l installation l mesh-sae l set-ikepsk-by-addr l usb-dev l usb-dial l usb-init l usb-passwd l usb-tty l usb-type l usb-user l link-priority-cellular l link-priority-ethernet
The mesh-sae parameter no longer has the sae-default option. Use the sae-disable option to return this parameter to its default disabled setting.
The uplink-vlan parameter was introduced.
The following new parameters were introduced for provisioning IPv6 APs: l dns-server-ip6 l ip6addr l ip6prefix l gateway6
The following new parameters were introduced for provisioning APs in singlechain mode: l sch-mode-radio-0 l sch-mode-radio-1 The following new parameters were introduced for provisioning APs for 802.1X authentication: l apdot1x-passwd l apdot1x-username The following new parameters were introduced for provisioning Remote APs using USB modems: l usb-modeswitch l 4g-usb-type
The cellular_nw_preference parameter was introduced for provisioning multimode modems, and the 4g-usb-type parameter was deprecated. Specify a 2/3G or 4G modem type using the usb-type parameter.
AOS-W 6.2 | Reference Guide
provision-ap | 497
Command Information
Platforms
All platforms, except for the parameters noted in the Syntax table.
Licensing
Base operating system, except for the parameters noted in the Syntax table.
Command Mode Config mode on master switches
498 | provision-ap
AOS-W 6.2 | Reference Guide
qos-profile (deprecated)
qos-profile <profile-name> clone <source> dot1p <priority> drop-precedence {high | low} dscp <rewrite-value> no traffic-class <traffic-class-value>
Description
This command configures a QoS profile to assign TC/DP, DSCP, and 802.1p values to an interface or policer profile.
Command History
Release AOS-W 6.2
Modification Command deprecated.
AOS-W 6.2 | Reference Guide
qos-profile (deprecated) | 499
rap-wml
rap-wml<server-name> [ageout <period>] [cache{disable|enable}] [db-name <name>] [ip-addr<ipaddr>] [password <password>] [type {mssql|mysql}] [user <name>]
Description
Use this command to specify the name and attributes of a MySQL or an MSSQL server.
Syntax
Parameter ageout cache db-name
ip-addr no password type user
Description
Default
(Optional) Specifies the cache ageout period, in seconds.
0
(Optional) Enables the cache, or disables the cache.
Disabled
(Optional) Specifies the name of the MySQL or MSSQL
--
database.
(Optional) Specifies the IP address of the named MSSQL server. 0.0.0.0
Negates any configured parameter.
--
(Optional) Specifies the password required for database login.
--
(Optional) Specifies the server type.
--
(Optional) Specifies the user name required for database login. --
Usage Guidelines
Use the show rap-wml cache command to show the cache of all lookups for a database server. Use the show rapwml servers command to show the database server state. Use the show rap-wml wired-mac command to show wired MAC discovered on traffic through the AP.
Example
This example configures a MySQL server and sets up associated rap-wml table attributes. (host) (config) #rap-wml mysqlserver type mysql ip-addr 10.4.11.10 db-name automatedtestdatabase user sa password sa rap-wml table mysqlserver mactest_undelimited mac timestamp-column time 600 rap-wml table mysqlserver mactest_delimited mac delimiter : timestamp-column time 600
This example configures an MSSQL server and sets up associated rap-wml table attributes. (host) (config) #rap-wml mssqlserver type mssql ip-addr 10.4.11.11 db-name automatedtestdatabase user sa password sa rap-wml table mssqlserver mactest_undelimited mac timestamp-column time 600 rap-wml table mssqlserver mactest_delimited mac delimiter : timestamp-column time 600
Command History
This command was introduced in AOS-W 2.0.
500 | rap-wml
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing
Command Mode
Requires the RF Protect license. Config mode on master switches
AOS-W 6.2 | Reference Guide
rap-wml | 501
rap-wml table
rap-wml table <server-name> <table-name> <column-name> {[delimiter <char>] | [timestamp-column <timestamp-column-name> <lookup-time>]}
Description
Use this command to specify the name and attributes of the database table to be used for lookup.
Syntax
Parameter
Description
Default
server-name
Specifies the database server name (created using the rap-wml -- <server-name> command.
table-name
Specifies the database table name.
--
column-name
Specifies the database column name with the MAC address.
--
delimiter
Specifies the optional delimiter character for the MAC address in the database.
No delimiter
no
Negates the rap-wml table for the named server.
--
timestamp-column
Specify the database column name with the timestamp last
--
seen.
timestamp-column-nam- Specify the database column name with the timestamp last
--
e
seen.
lookup-time
Specifies how far back--in seconds--to look for the MAC
0
address. Use 0 seconds to lookup everything.
Usage Guidelines
Use the rap-wml <servername> command to configure a MySQL or an MSSQL server, then use the rap-wml table command to configure the associated database table for the server.
Example
This example configures a MySQL server and sets up associated rap-wml table attributes for that server. (host) (config) #rap-wml mysqlserver type mysql ip-addr 10.4.11.10 db-name automatedtestdatabase user sa password sa rap-wml table mysqlserver mactest_undelimited mac timestamp-column time 600 rap-wml table mysqlserver mactest_delimited mac delimiter : timestamp-column time 600
This example configures an MSSQL server and sets up associated rap-wml table attributes for that server. (host) (config) # rap-wml mssqlserver type mssql ip-addr 10.4.11.11 db-name automatedtestdatabase user sa password sa rap-wml table mssqlserver mactest_undelimited mac timestamp-column time 600 rap-wml table mssqlserver mactest_delimited mac delimiter : timestamp-column time 600
Command History
This commands was introduced in AOS-W 2.0.
502 | rap-wml table
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing
Command Mode
Requires the RF Protect license. Config mode on master switches
AOS-W 6.2 | Reference Guide
rap-wml table | 503
reload-peer-sc
reload-peer-sc
Description
This command performs a reboot of the OAW-6000 switch module.
Command History
Version AOS-W 6.1
Description Command deprecated
504 | reload-peer-sc
AOS-W 6.2 | Reference Guide
reload
reload
Description
This command performs a reboot of the switch.
Syntax
No parameters.
Usage Guidelines
Use this command to reboot the switch if required after making configuration changes or under the guidance of Alcatel-Lucent Networks customer support. The reload command powers down the switch, making it unavailable for configuration. After the switch reboots, you can access it via a local console connected to the serial port, or through an SSH, Telnet, or WebUI session. If you need to troubleshoot the switch during a reboot, use a local console connection. After you use the reload command, the switch prompts you for confirmation of this action. If you have not saved your configuration, the switch returns the following message: Do you want to save the configuration (y/n): l Enter y to save the configuration. l Enter n to not save the configuration. l Press [Enter] to exit the command without saving changes or rebooting the switch. If your configuration has already been saved, the switch returns the following message: Do you really want to reset the system(y/n): l Enter y to reboot the switch. l Enter n to cancel this action. The command will timeout if you do not enter y or n.
Example
The following command assumes you have already saved your configuration and you must reboot the switch: (host) (config) #reload The switch returns the following messages: Do you really want to reset the system(y/n): y System will now restart! ... Restarting system.
Command History
This command was introduced in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing
Command Mode
Base operating system Enable and Config modes on master switches
AOS-W 6.2 | Reference Guide
reload | 505
remote-node-local-factory-cert
localuserdb
remote-node-local-factory-cert
Description
Configure factory certificates for secure traffic between Remote-Node-Masters and Remote-Nodes.
Syntax
No parameters
Usage Guidelines
Issue this command on a Remote-Node Master to use a factory-installed certificate to authenticate a Remote-Node.
Example
The following command configures the local remote node on a master remote node: (host) (config) remote-node-local-factory-certs
Command History
Introduced in AOS-W 6.1
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Config mode on master switches
506 | remote-node-local-factory-cert
AOS-W 6.2 | Reference Guide
remote-node-localip
localuserdb
remote-node-localip <remote-node-switch-ip> ipsec KEY <keyword>
Description
This command configures the switch-IP address and preshared key for the local Remote Node on a master Remote Node.
Syntax
Parameter
<remote-node-switchip>
ipsec <keyword>
Description
Switch-IP address of the local remote node. Use the 0.0.0.0 address to configure a global preshared key for all inter-switch communications.
Preshared key, which must be between 6-64 characters.
Usage Guidelines
Use this command on a master remote node to configure the switch-IP address and preshared key for communication with a local remote node. On the local remote node, the pre-shared key is configured in the setup wizard during the initial boot. The pre-shared keys for both the master and local switches must match. On the local remote node, use the remote-node-masterip command to configure the switch-IP address and preshared key for the master remote node.
Example
The following command configures the local remote node on a master remote node: (host) (config) remote-node-localip 172.16.0.254 ipsec rhyopevs
Command History
Introduced in AOS-W 6.0
Command Information
Platform Available on all platforms
License Available in the base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
remote-node-localip | 507
remote-node-masterip
remote-node-masterip <masterip> ipsec key <pre-shared key> ipsec-factory-cert
Description
This command configures the IP address and preshared key or factory-installed certificate for the Remote-Node Master on a local Remote Node.
Syntax
Parameter
Description
<masterip>
IP address of the master Remote Node.
ipsec <key>
Secure communication between a Remote-Node and Remote-Node master by defining a preshared key, which must be between 6-64 characters.
ipsec-factory-cert Secure communication between a Remote-Node and Remote-Node master by identifying a factory-installed certificate on the Remote-Node Master.
Usage Guidelines
Use this command on a local Remote Node to configure the IP address and preshared key for communication with the master Remote Node. On the master switch, use the remote-node-localip command to configure the IP address and preshared key for a local Remote Node.
Changing the IP address of the master on a local Remote Node requires a reboot of the local Remote Switch.
Example
The following command configures the Remote-Node Master on a local Remote Node: (host) (config) #remote-node-masterip 172.16.0.254 ipsec rhyopevs
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced.
The ipsec-factory-cert parameter was introduced to allow certificate-based authentication of Remote-Node Masters.
Command Information
Platform
License
Available on all platforms Available in the base operating system
Command Mode
Config mode on local Remote Nodes.
508 | remote-node-masterip
AOS-W 6.2 | Reference Guide
remote-node-profile
remote-node-profile <remote-node-profile-name> aaa authentication-server internal use-local-switch
cellular profile <profile-name>
clone <profile-name>
switch-ip vlan <id> ip address
dialer group <name>
instance <remote-node-mac-address>
interface cellular [{fastethernet|gigabitethernet} <slot>/<port>] |[loopback]| [port-channel <id>]|[tunnel <1-2147483647>|vlan <id>]
ip [default-gateway <ipaddr>]|{import cell|dhcp|pppoe}|{ipsec <name>} <cost>}|[domain lookup|domain-name <name>]|[name-server <ipaddr>]|[nat pool <name> <start-ipaddr> <endipaddr> <dest-ipaddr>|[radius {nas-ip <ipaddr>]|[rfc-3576-server udp-port <port>]|[sourceinterface {loopback|vlan <vlan>}]|[route <destip> <destmask> {<nexthop> [<cost>]]|[ipsec <name>|null 0}]
ipv6 enable|route <ipv6-prefix/prefix-length> <ipv6-next-hop> <cost> logging <ipaddr>|facility <facility>|level <level> <category> [process <process>] [subcat <subcategory>]
mgmt-server [type {amp|other}]|[primary-server <ip-addr>] mgmt-user [<username> <role> <password>]|[localauth-disablessh-pubkey client-cert <certificate> <username> <role>]|[webui-cacert <certificate_name> serial <number> <username> <role>]
mobility-manager <ipaddr> user <username> <password> [interval <secs>]|[retrycount <number>] [udp-port <port>] [rtls <rtls-udp-port>] trap-version {1|2c|3} model <model_type>
no
priority-map <name>
remote-node-dhcp-pool <pool-name>|pool-type {vlan <id>}|tunnel|range startip <start-ip> endip <end-ip> num_hosts
router ospf enable {area <area-id>|redistribute vlan [<vlan-ids>|add <vlan-ids>|remove <vlan-ids>] |router-id <rtr-id> |subnet exclude <addr>}
snmp-server community <string>|enable trap|engine-id|host <ipaddr> version {1 <name> udpport <port>}|2c|{3 <name>} [inform] [interval <seconds>] [retrycount <number>] [udp-port <port>]}|inform queue-length <size>|source|stats|trap enable|disable|{source <ipaddr>}|user <name> [auth-prot {md5|sha} <password>] [priv-prot {AES|DES} <password>]
spanning-tree [forward-time <value> | hello-time <value> | max-age <value> | priority <value> | vlan range <WORD>|
syscontact <syscontact>
syslocation <syslocation>
uplink {cellular priority <prior>}|disable|enable|{wired priority <prior>}|{wired vlan <id>}
AOS-W 6.2 | Reference Guide
remote-node-profile | 509
validate
vlan <id> [<description>]|[<name> <vlan-ids>]|[range <range>]|[wired aaa-profile <profile>]
vrrp <id> {advertise <interval>|authentication <password>|description <text>|ip address <ipaddr>|preempt|priority <level>|shutdown} tracking interface {fastethernet <slot>/<port>|gigabitethernet <slot>/<port>}{sub <value>}|tracking master-up-time <duration> add <value>|tracking vlan <vlanid> {sub <value>}|tracking vrrp-master-state <vrid> add <value>|vlan <vlanid>}
Description
The remote-node-profile command lets you create a Remote Node profile. Once in Remote Node profile configuration mode, you can issue any of the following commands to define the values you want to assign to that profile.
Syntax
Parameter aaa cellular profile <name> clone <profile-name> switch-ip vlan <id> ip address
dialer group <name> instance
interface
Description
Configure authentication server using an internal server. For details, see aaa authentication-server internal on page 30.
Cellular interface profile associated with this Remote Node profile. For details, see cellular profile on page 176.
Use this command to copy a Remote Node profile to this profile.
Select one of the following parameters for the VLAN interface dhcp-client: The remote node will use DHCP to obtain IP address internal: Then remote node IP will be derived from the remote node DHCP pool. pppoe: Use PPPoE to obtain IP address
Dialer group profile associated with this Remote Node profile.
Configure the Remote Node MAC address to associate the Remote Node to this profile. When you create a new Remote Node profile, enter the remote-node profile instance command first.
Configure the Remote Node interface l cellular--Configure the cellular Interface. l fastethernet--Configure the FastEthernet (IEEE 802.3)
interface. l gigabitethernet--Configure the GigabitEthernet Interface. l loopback--Configure the Loopback Interface. l port-channel--Configure the Ethernet channel of interfaces. l tunnel--Configure the Tunnel interface. l vlan --Configure the Switch VLAN Virtual Interface. NOTE: The VLAN ID mapped using the "interface vlan <id> ip address" command can use the following parameters to define how the switch-ip is derived:
n dhcp-client: The remote node will use DHCP to obtain IP address
510 | remote-node-profile
AOS-W 6.2 | Reference Guide
Parameter
ip
ipv6 logging mgmt-server mgmt-user mobility-manager model <model_type>
no priority-map <name> remote-node-dhcp-pool <pool_name>
Description
n internal: Then remote node IP will be derived from the remote node DHCP pool.
n pppoe: Use PPPoE to obtain IP address For details on using this command, see interface fastethernet | gigabitethernet on page 318
Configure the Interface Internet Protocol configuration sub commands. For details, see command descriptions beginning with ip default-gateway on page 367. l default-gateway l domain lookup l domain-name l name-server l nat l radius l route
Configure the Global IPv6 configuration sub commands. For details, see command descriptions beginning with ipv6 enable on page 350. l enable l route X:X:X:X::X/<0-128>
Set the logging level up to which messages are logged. l A.B.C.D l facility l level For details on using this command, see logging on page 435
Register Mgmt Server IP Address with the switch.This could be AirWave Management Server or any other server that would like to receive messages from the switch using AMON protocol. For details on using this command, see mgmt-server on page 448.
Configure a management user. For details on using this command, see mgmt-user on page 449.
Configure a mobility manager. For details on using command, see mobility-manager on page 451.
Switch model associated to the Remote Node profile, where <model-type> is one of the following switch model types: l OAW-4504XM l OAW-4604 l OAW-4704 l OAW-4306 l OAW-4306G
Delete a remote node profile.
Priority Map specification, used to prioritize the incoming packets on an interface. For details on using this command, see priority-map on page 486.
Name of the DHCP pool.
AOS-W 6.2 | Reference Guide
remote-node-profile | 511
Parameter pool-type {vlan <id>}|tunnel <id> <start-ip> <end-ip> num_hosts
router ospf <area-id> snmp-server spanning-tree syscontact <syscontact> syslocation <syslocation> uplink validate
vlan vrrp
Description
Specify whether you are creating a pool of IP addresses for RN VLANs or RN tunnels.
The ID number of the VLAN associated with the RN.
IP addresses at the start and end of the RN's address range, in dotted-decimal format.
IP address at the end of the RN's address range, in dotteddecimal format.
Maximum number of hosts supported by an RN using this pool.
Enables and configures OSPF. Configure an OSP area, control distribution of default information, redistribute the route, configure the Router ID and specific the subnet.
Enables SNMP and modifies SNMP parameters. For details on using this command, see snmp-server on page 1433.
Create a Spanning Tree Subsystem. For details on using this command, see spanning-tree (Global Configuration) on page 1435.
Configures the name of the system contact for the switch. Enter an alphanumeric string that specifies the name of the system contact.
Configures the name of the system location for the switch. Enter an alphanumeric string that specifies the name of the system location.
Define an uplink manager configuration. For details on using this command, see uplink on page 1459.
After you have defined configuration settings for a Remote Node profile, you must activate that profile by issuing the command remote-node-profile <profile-name> validate to validate that the configuration has a correctly defined uplink, model type, and an interface type supported by the Remote Node model. You cannot assign a Remote Node configuration profile to a Remote Node until that profile has been activated.
Create a Remote Node VLAN Virtual Interface vlan. For details on using this command, see vlan on page 1469.
Define a Virtual Router Redundancy Protocol (VRRP) configuration. For details on using this command, see vrrp on page 1487.
Usage Guidelines
Use the remote-node-profile command to create a Remote Node profile. You define configuration settings for each Remote Node through a Remote Node profile on the Remote Node-master. The Remote Node-master must be a master switch.
512 | remote-node-profile
AOS-W 6.2 | Reference Guide
Related Commands
Command
Description
Mode
remote-node-localip
Configures security for all Remote Node and Remote Switch control traffic
Enable and Config mode
remote-node-masterip
Configures security for the Remote Node master IP address.
Enable and Config mode
local-userdb-remote-node
This command adds a Remote Node to the Remote Node whitelist. You can also delete the whitelist entry using this command.
Enable and Config mode
show remote-node
Shows Remote Node configuration, dhcp instance, license usage and running configuration information.
Enable and Config mode
show remote-node-dhcp-pool Shows Remote Node dhcp pool configuration information.
Enable and Config mode
show remote-node-profile
Shows Remote Node profile status information.
Enable and Config mode
show local-userdb-remotenode
The output of this command lists the MAC address and assigned remote-node-profile for each Remote Switch associated with that Remote Switch master.
Enable and Config mode
Command History
AOS-W 6.0 AOS-W 6.1
Modification
Command introduced.
The switch-ip loopback parameter was deprecated. The following parameters were added: l ipv6 l mgmt-server l mobility-manager l snmp-server l syscontact l syslocation
Command Information
Platform Available on all platforms
License Available in the base operating system.
Command Mode
Enable and Config modes on master switches.
AOS-W 6.2 | Reference Guide
remote-node-profile | 513
rename
rename <filename> <newfilename>
Description
This command renames an existing system file.
Syntax
Parameter filename newfilename
Description An alphanumeric string that specifies the current name of the file on the system. An alphanumeric string that specifies the new name of the file on the system.
Usage Guidelines
Use this command to rename an existing system file on the switch. You can use a combination of numbers, letters, and punctuation (periods, underscores, and dashes) to rename a file. The new name takes affect immediately. Make sure the renamed file uses the same file extension as the original file. If you change the file extension, the file may be unrecognized by the system. For example, if you have an existing file named upgrade.log, the new file must include the .log file extension. You cannot rename the active configuration currently selected to boot the switch. If you attempt to rename the active configuration file, the switch returns the following message: Cannot rename active configuration file To view a list of system files, and for more information about the directory contents, see dir on page 246.
Example
The following command changes the file named test_configuration to deployed_configuration: (host) (config) #rename test_configuration deployed_configuration
Command History
This command was introduced in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Eanble and Config modes on master switches
514 | rename
AOS-W 6.2 | Reference Guide
restore
restore flash
Description
This command restores flash directories backed up to the flashbackup.tar.gz file.
Syntax
Parameter flash
Description Restores flash directories from the flashbackup.tar.gz file.
Usage Guidelines
Use the backup flash command to tar and compress flash directories to the flashbackup.tar.gz file.
Example
The following command restores flash directories from the flashbackup.tar.gz file: (host) #restore flash
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
restore | 515
rf am-scan-profile
<profile-name> clone <profile> dwell-time-active-channel dwell-time-other-reg-domain-channel dwell-time-rare-channel dwell-time-reg-domain-channel no scan-mode
Description
Configure an Air Monitor (AM) scanning profile.
Syntax
Parameter <profile-name>
clone <profile>
dwell-time-active-channel
dwell-time-other-reg-domainchannel dwell-time-rare-channel dwell-time-reg-domain-channel
no scan-mode
all-reg-domain
rare
reg-domain
Description
Range
Default
Name of this instance of the profile.
1-63
--
characters
Copy data from another AM scanning --
--
profile
Dwell time (in ms) for channels where 100-32768 ms 500 ms there is wireless activity.
Dwell time (in ms) for channels not in the APs regulatory domain.
100-32768 ms 250 ms
Dwell time (in ms) for rare channels.
100-32768 ms 100 ms
Dwell time (in ms ) for AP's Regulatory 100-32768 ms 250 ms domain channels
Delete the command
--
--
Set the scanning mode for the radio. --
--
Scan channels in all regulatory
--
--
domain
Scan all channels (all regulatory
--
--
domains and rare channels)
Scan channels in the APs regulatory --
--
domain
Command History
Release AOS-W 6.0
Modification Command introduced
516 | rf am-scan-profile
AOS-W 6.2 | Reference Guide
Command Information
Platforms All Platforms
Licensing RFProtect
Command Mode Configuration Mode (config)
AOS-W 6.2 | Reference Guide
rf am-scan-profile | 517
rft
rft test profile antenna-connectivity ap-name <name> [dest-mac <macaddr> [phy {a|g}| radio {0|1}]]
rft test profile link-quality {ap-name <name> dest-mac <macaddr> [phy {a|g}| radio {0|1}] | bssid <bssid> dest-mac <macaddr> | ip-addr <ipaddr> dest-mac <macaddr> [phy {a|g}|radio {0|1}]}
rft test profile raw {ap-name <name> dest-mac <macaddr> [phy {a|g}|radio {0|1}] | bssid <bssid> dest-mac <macaddr> | ip-addr <ipaddr> dest-mac <macaddr> [phy {a|g}|radio {0|1}]}
Description
This command is used for RF troubleshooting.
Syntax
Parameter ap-name dest-mac phy radio bssid ip-addr
Description Name of the AP that performs the test. MAC address of the client to be tested. 802.11 type, either a or g. Radio ID, either 0 or 1. BSSID of the AP that performs the test. IP address of the AP that performs the test.
Range -- -- a|g 0|1 --
Syntax
Usage Guidelines
This command can run predefined test profiles for antenna connectivity, link quality, or raw testing. You should only run these commands when directed to do so by an Alcatel-Lucent support representative.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
518 | rft
AOS-W 6.2 | Reference Guide
rf arm-profile
rf rf arm-profile <profile>
40MHz-allowed-bands {All|None|a-only|g-only} acceptable-coverage-index <number> active-scan (not intended for use) assignment {disable|maintain|multi-band|single-band} backoff-time <seconds> client-aware clone <profile> error-rate-threshold <percent> error-rate-wait-time <seconds> free-channel-index <number> ideal-coverage-index <number> load-aware-scan-threshold max-tx-power <dBm> min-scan-time <# of scans> min-tx-power <dBm> mode-aware multi-band-scan no ... noise-threshold noise-wait-time ota-updates ps-aware-scan rogue-ap-aware scan-interval <seconds> scan mode all-reg-domain|reg-domain scanning video-aware-scan voip-aware-scan
Description
This command configures the Adaptive Radio Management (ARM) profile.
Syntax
Parameter <profile> 40MHz-allowed- bands
All None
Description
Range
Default
Name of this instance of the profile. The name -- must be 1-63 characters.
"default"
The specified setting allows ARM to determine if 40 MHz mode of operation is allowed on the 5 GHz or 2.4 GHz frequency band only, on both frequency bands, or on neither frequency band.
All/None/ a-only/g-only
a-only
Allows 40 MHz channels on both the 5 GHZ (802.11a) and 2.4 GHZ (802.11b/g) frequency bands.
Disallows use of 40 MHz channels.
AOS-W 6.2 | Reference Guide
rf arm-profile | 519
Parameter a-only g-only
acceptable-cov erage-index
active-scan
assignment
disable maintain multi-band single-band backoff-time client-aware
clone error-ratethreshold error-rate-wait -time
520 | rf arm-profile
Description
Range
Default
Allows use of 40 MHz channels on the 5 GHZ (802.11a) frequency band only.
Allows use of 40 MHz channels on the 2.4 GHZ (802.11b/g) frequency band only.
The minimal coverage that the AP should try to 1-6
4
achieve on its channel. The denser the AP
deployment, the lower this value should be.
This setting applies to multi-band
implementations only.
When the Active Scan checkbox is selected, an AP initiates active scanning via probe request. This option elicits more information from nearby APs, but also creates additional management traffic on the network. Active Scan is disabled by default, and should not be enabled except under the direct supervision of Alcatel-Lucent Support.
Default: disabled
disabled
Activates one of four ARM channel/power
--
assignment modes.
single-band (new installations only)
Disables ARM channel/power assignments.
Maintains existing channel assignments.
Computes ARM assignments for both 5 GHZ (802.11a) and 2.4 GHZ (802.11b/g) frequency bands.
Computes ARM assignments for a single band.
Time, in seconds, an AP backs off after requesting a new channel or power.
120-3600
240 seconds
If the Client Aware option is enabled, the AP
--
does not change channels if there is active
client traffic on that AP. If Client Aware is
disabled, the AP may change to a more optimal
channel, but this change may also disrupt
current client traffic.
enabled
Name of an existing ARM profile from which
--
--
parameter values are copied.
The percentage of errors in the channel that triggers a channel change. Recommended value is 50%.
0-100
50%
Time, in seconds, that the error rate has to be at least the error rate threshold to trigger a channel change.
1-2,147,483, 647 Recommended Values: 1-100
30 seconds
AOS-W 6.2 | Reference Guide
Parameter free-channelindex ideal-coverageindex load-aware-scanthreshold
max-tx-power
min-scan-time
min-tx-power
mode-aware
multi-band-scan
Description
Range
Default
The difference in the interference index
10-40
25
between the new channel and current channel
must exceed this value for the AP to move to a
new channel. The higher this value, the lower
the chance an AP will move to the new
channel. Recommended value is 25.
The coverage that the AP should try to achieve 2-20
10
on its channel. The denser the AP deployment,
the lower this value should be. Recommended
value is 10.
Load aware ARM preserves network resources during periods of high traffic by temporarily halting ARM scanning if the load for the AP gets too high.
The Load Aware Scan Threshold is the traffic throughput level an AP must reach before it stops scanning. The supported range for this setting is 0-20000000 bytes/second. (Specify 0 to disable this feature.)
1250000 bytes/second
Maximum effective isotropic radiated power (EIRP) from 3 to 33 dBm in 3 dBm increments. You may also specify a special value of 127 dBm for regulatory maximum to disable power adjustments for environments such as outdoor mesh links. This value takes into account both radio transmit power and antenna gain.
Higher power level settings may be constrained by local regulatory requirements and AP capabilities.
3, 6, 9, 12, 15, 18, 21, 24, 27, 30, 33, 127
127 dBm
Minimum number of times a channel must be scanned before it is considered for assignment. The supported range for this setting is 0-2,147, 483,647 scans. Best practices are to configure a Minimum Scan Time between 1-20 scans.
Default: 8 scans
1-2,147,483, 647 Recommended Values: 1-20
8 scans
Minimum effective isotropic radiated power (EIRP) from 3 to 33 dBm in 3 dBm increments. You may also specify a special value of 127 dBm for regulatory minimum. This value takes into account both radio transmit power and antenna gain.
Higher power level settings may be constrained by local regulatory requirements and AP capabilities.
3, 6, 9, 12, 15, 18, 21, 24, 27, 30, 33, 127
9 dBm
If enabled, ARM will turn APs into Air Monitors -- (AMs) if it detects higher coverage levels than necessary. This helps avoid higher levels of interference on the WLAN. Although this setting is disabled by default, you may want to enable this feature if your APs are deployed in close proximity (e.g. less than 60 feet apart).
disabled
When enabled, single-radio APs try to scan
--
across bands for rogue AP detection.
enabled
AOS-W 6.2 | Reference Guide
rf arm-profile | 521
Parameter no noise-threshold noise-wait-time ota-updates
ps-aware-scan rogue-ap-aware scan-interval
scan-mode scanning
522 | rf arm-profile
Description
Range
Negates any configured parameter.
--
Maximum level of noise in a channel that triggers a channel change (-dBm).
0-2,147,483, 647
Recommended Values: 0-80 -dBm
Minimum time in seconds the noise level has to 1-3600 exceed the Noise Threshold before it triggers a seconds channel change.
The ota-updates option allows an AP to get
--
information about its RF environment from its
neighbors, even the AP cannot scan. If this
feature is enabled, when an AP on the network
scans a foreign (non-home) channel, it sends
other APs an Over-the-Air (OTA) update in an
802.11 management frame that contains
information about the scanning AP's home
channel, the current transmission EIRP value
of its home channel, and one-hop neighbors
seen by that AP.
Default: enabled
When enabled, the AP will not scan if Power
--
Save is active.
When enabled, the AP will try to contain off-
--
channel rogue APs.
If Scanning is enabled, the Scan Interval defines how often the AP will leave its current channel to scan other channels in the band.
Off-channel scanning can impact client performance. Typically, the shorter the scan interval, the higher the impact on performance. If you are deploying a large number of new APs on the network, you may want to lower the Scan Interval to help those APs find their optimal settings more quickly. Raise the Scan Interval back to its default setting after the APs are functioning as desired.
0-2,147,483, 647 Recommended Values: 0-30
Select the scan mode for the AP. l all-reg-domain: The AP scans channels
within all regulatory domains. This is the default setting. l reg-domain:Limit the AP scans to just the regulatory domain for that AP.
The Scanning checkbox enables or disables
--
AP scanning across multiple channels.
Disabling this option also disables the
following scanning features:
l Multi Band Scan
l Rogue AP Aware
l Voip Aware Scan
l Power Save Scan
Default -- 75 -dBm
120 seconds enabled
disabled disabled 10 seconds
all-regdomain
enabled
AOS-W 6.2 | Reference Guide
Parameter video-aware-scan
voip-aware-scan
Description
Range
Do not disable Scanning unless you want to disable ARM and manually configure AP channel and transmission power.
As long as there is at least one video frame
--
every 100 mSec the AP will reject an ARM
scanning request. Note that for each radio
interface, video frames must be defined in one
of two ways:
l Classify the frame as video traffic via a
session ACL.
l Enable WMM on the WLAN's SSID profile
and define a specific DSCP value as a
video stream. Next, create a session ACL to
tag the video traffic with the that DSCP
value.
Alcatel-Lucent's VoIP Call Admission Control -- (CAC) prevents any single AP from becoming congested with voice calls. When you enable CAC, you should also enable voip-aware-scan parameter in the ARM profile, so the AP will not attempt to scan a different channel if one of its clients has an active VoIP call. This option requires that scanning is also enabled.
Default enabled
disabled
Usage Guidelines
Adaptive Radio Management (ARM) is a radio frequency (RF) resource allocation algorithm that allows each AP to determine the optimum channel selection and transmit power setting to minimize interference and maximize coverage and throughput. This command configures an ARM profile that you apply to a radio profile for the 5 GHz or 2.4 GHz frequency band (see rf dot11a-radio-profile on page 525 or rf dot11g-radio-profile on page 533).
The default ARM scanning interval is determined by the scan-interval parameter in the ARM profile. If the AP does not have any associated clients (or if most of its clients are inactive) the ARM feature will dynamically readjust this default scan interval, allowing the AP obtain better information about its RF neighborhood by scanning non-home channels more frequently. Starting with AOS-W 6.2, if an AP attempts to scan a non-home channel but is unsuccessful, the AP will make additional attempts to rescan that channel before skipping it and continuing on to other channels.
Using Adaptive Radio Management (ARM) in a Mesh Network
When a mesh portal operates on a mesh network, the mesh portal determines the channel used by the mesh feature. When a mesh point locates an upstream mesh portal, it will scan the regulatory domain channels list to determine the channel assigned to it, for a mesh point always uses the channel selected by its mesh portal. However, if a mesh portal uses an ARM profile enabled with a single-band or multi-band channel/power assignment and the scanning feature, the mesh portal will scan the configured channel lists and the ARM algorithm will assign the proper channel to the mesh portal.
If you are using ARM in your network, is important to note that mesh points, unlike mesh portals, do not scan channels. This means that once a mesh point has selected a mesh portal or an upstream mesh point, it will tune to this channel, form the link, and will not scan again unless the mesh link gets broken. This provides good mesh link stability, but may adversely affect system throughput in networks with mesh portals and mesh points. When ARM assigns optimal channels to mesh portals, those portals use different channels, and once the mesh network has formed and all the mesh points have selected a portal (or upstream mesh point), those mesh points will not be able to detect other portals on other channels that could offer better throughput. This type of suboptimal mesh network may
AOS-W 6.2 | Reference Guide
rf arm-profile | 523
form if, for example, two or three mesh points select the same mesh portal after booting, form the mesh network, and leave a nearby mesh portal without any mesh points. Again, this will not affect mesh functionality, but may affect total system throughput.
Example
The following command configures VoIP-aware scanning for the arm-profile named "voice-arm:" (config) (host) #rf arm-profile voice-arm
voip-aware-scan
Command History
Release AOS-W 3.0 AOS-W 3.3. AOS-W 3.3.2 AOS-W 3.4.1
AOS-W 6.1
Modification Command introduced Support for the high-throughput IEEE 802.11n standard was introduced
Support for the wait-time parameter was removed.
The voip-aware-scan parameter no longer requires a license, and is available in the base OS. The ps-aware-scan parameter is now disabled by default.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
524 | rf arm-profile
AOS-W 6.2 | Reference Guide
rf dot11a-radio-profile
rf dot11a-radio-profile <profile> am-scan-profile <profile-name> arm-profile <profile> beacon-period <milliseconds> beacon-regulate cap-reg-eirp <cap-reg-eirp> cell-size-reduction <cell-size-reduction> channel <num|num+|num-> channel-reuse {static|dynamic|disable} channel-reuse-threshold clone <profile> csa csa-count <number> disable-arm-wids-function dot11h high-throughput-enable ht-radio-profile <profile> interference-immunity maximum-distance <maximum-distance> mgmt-frame-throttle-interval <seconds> mgmt-frame-throttle-limit <number> mode {ap-mode|am-mode|spectrum-mode} no ... radio-enable slb-mode channel|radio slb-threshold slb-update-interval <secs> spectrum-load-bal-domain spectrum-load-balancing spectrum-monitoring spectrum-profile <profile> tpc-power <tpc-power> tx-power <dBm>
Description
This command configures AP radio settings for the 5 GHz frequency band, including the Adaptive Radio Management (ARM) profile and the high-throughput (802.11n) radio profile.
Syntax
Parameter <profile> am-scan-profile <name> arm-profile
Description
Name of this instance of the profile. The name must be 1-63 characters.
Configure an Air Monitor (AM) scanning profile
Configures Adaptive Radio Management (ARM) feature. See rf arm-profile on page 519.
Range -- -- --
Default "default" "default" "default"
AOS-W 6.2 | Reference Guide
rf dot11a-radio-profile | 525
Parameter beacon-period beacon-regulate cap-reg-eirp <cap-regeirp>
cell-size-reduction <cell-size-reduction>
channel
Description
Range
Default
Time, in milliseconds, between successive beacon transmissions. The beacon advertises the AP's presence, identity, and radio characteristics to wireless clients.
60 (minimum)
100 milliseconds
Enabling this setting introduces randomness -- in the beacon generation so that multiple APs on the same channel do not send beacons at the same time, which causes collisions over the air.
disabled
Work around a known issue on Cisco 7921G telephones by specifying a cap for a radio's maximum equivalent isotropic radiated power (EIRP). When you enable this parameter, even if the regulatory approved maximum for a given channel is higher than this EIRP cap, the AP radio using this profile will advertise only this capped maximum EIRP in its radio beacons.
131 dBm.
The cell size reduction feature allows you manage dense deployments and to increase overall system performance and capacity by shrinking an AP's receive coverage area, thereby minimizing co-channel interference and optimizing channel reuse. This value should only be changed if the network is experiencing performance issues. The possible range of values for this feature is 0-55 dB. The default 0 dB reduction allows the radio to retain its current default Rx sensitivity value.
1-5 5dB
Values from 1 dB - 55 dB reduce the power level that the radio can hear by that amount. If you configure this feature to use a nondefault value, you must also reduce the radio's transmission (Tx) power to match its new received (Rx) power level. Failure to match a device's Tx power level to its Rx power level can result in a configuration that allows the radio to send messages to a device that it cannot hear.
0 dB
Channel number for the AP 802.11a/802.11n Depends on --
physical layer. The available channels
regulatory
depend on the regulatory domain (country). domain
Channel number configuration options for 20
MHz and 40 MHz modes:
l num: Entering a channel number disables
40 MHz mode and activates 20 MHz
mode for the entered channel.
l num+: Entering a channel number with a
plus (+) sign selects a primary and
secondary channel for
40 MHz mode. The number entered
becomes the primary channel and the
secondary channel is determined by
increasing the primary channel number
526 | rf dot11a-radio-profile
AOS-W 6.2 | Reference Guide
Parameter channel-reuse
channel-reuse-threshold clone
Description
Range
by 4. Example: 157+ represents 157 as the primary channel and 161 as the secondary channel.
l num-: Entering a channel number with a minus (-) sign selects a primary and secondary channel for 40 MHz mode. The number entered becomes the primary channel and the secondary channel is determined by decreasing the primary channel number by 4. Example: 157- represents 157 as the primary channel and 153 as the secondary channel.
NOTE: 20 MHz clients are allowed to associate when a primary and secondary channel are configured; however, the client will only use the primary channel.
When you enable the channel reuse feature, it can operate in either of the following three modes; static, dynamic or disable. (This feature is disabled by default.)
l Static mode: This mode of operation is a coverage-based adaptation of the Clear Channel Assessment (CCA) thresholds. In the static mode of operation, the CCA is adjusted according to the configured transmission power level on the AP, so as the AP transmit power decreases as the CCA threshold increases, and vice versa.
l Dynamic mode: In this mode, the Clear Channel Assessment (CCA) thresholds are based on channel loads, and take into account the location of the associated clients. When you set the Channel Reuse This feature is automatically enabled when the wireless medium around the AP is busy greater than half the time. When this mode is enabled, the CCA threshold adjusts to accommodate transmissions between the AP its most distant associated client.
l Disable mode: This mode does not support the tuning of the CCA Detect Threshold.
enabled disabled
RX Sensitivity Tuning Based Channel Reuse Threshold, in - dBm.
If the Rx Sensitivity Tuning Based Channel reuse feature is set to static mode, this parameter manually sets the AP's Rx sensitivity threshold (in -dBm). The AP will filter out and ignore weak signals that are below the channel threshold signal strength.
If the value is set to zero, the feature will automatically determine an appropriate threshold.
Depends on regulatory domain
Name of an existing radio profile from which -- parameter values are copied.
Default enabled
-- --
AOS-W 6.2 | Reference Guide
rf dot11a-radio-profile | 527
Parameter csa
csa-count disable-arm-widsfunction
dot11h high-throughput-enable ht-radio-profile interference-immunity
Description
Range
Channel Switch Announcement (CSA), as
--
defined by IEEE 802.11h, allows an AP to
announce that it is switching to a new
channel before it begins transmitting on that
channel.
Clients must support CSA in order to track the
channel change without experiencing
disruption.
Number of CSA announcements that are sent 1-16 before the AP begins transmitting on the new channel.
Disables Adaptive Radio Management (ARM) and Wireless IDS functions. These can be disabled if a small increase in packet processing performance is desired. If a radio is configured to operate in Air Monitor mode, then these functions are always enabled irrespective of this option. CAUTION: Use carefully, since this effectively disables ARM and WIDS
1-16
Enable advertisement of 802.11d (Country
--
Information) and 802.11h (TPC or Transmit
Power Control) capabilities This parameter is
disabled by default.
Enables high-throughput (802.11n) features -- on a radio using the 5 GHz frequency band.
Name of high-throughput radio profile to use -- for configuring high-throughput support on the 5 GHz frequency band. See rf ht-radioprofile on page 545.
Set a value for 802.11 Interference Immunity. The default setting for this parameter is level 2. When performance drops due to interference from non-802.11 interferers (such as DECT or Bluetooth devices), the level can be increased up to level 5 for improved performance. However, increasing the level makes the AP slightly "deaf" to its surroundings, causing the AP to lose a small amount of range. The levels for this parameter are: l Level-0: no ANI adaptation. l Level-1: noise immunity only. l Level-2: noise and spur immunity. This is
the default setting l Level-3: level 2 and weak OFDM
immunity. l Level-4: level 3 and FIR immunity. l Level-5: disable PHY reporting. NOTE: Do not raise the noise immunity feature's default setting if the channel-reusethreshold on page 527 feature is also enabled. A level-3 to level-5 Noise Immunity setting is not compatible with the Channel
Level-0 Level-15
Default disabled
4 4
disabled enabled "default-a" Level-2
528 | rf dot11a-radio-profile
AOS-W 6.2 | Reference Guide
Parameter maximum-distance
mgmt-frame-throttleinterval
mgmt-frame-throttlelimit mode
ap-mode am-mode spectrum-mode
no radio-enable slb-mode channel|radio
Description
Range
Reuse feature.
Maximum distance between a client and an AP or between a mesh point and a mesh portal, in meters. This value is used to derive ACK and CTS timeout times. A value of 0 specifies default settings for this parameter, where timeouts are only modified for outdoor mesh radios which use a distance of 16km. The upper limit for this parameter varies, depending on the 20/40 MHz mode for a 5 GHz frequency band radio: l 20MHz mode: 58km l 40MHz mode: 27km Note that if you configure a value above the supported maximum, the maximum supported value will be used instead. Values below 600m will use default settings.
0-57km (40MHz mode)
0-27km (20MHz mode)
Averaging interval for rate limiting management frames in seconds. Zero disables rate limiting.
Note: This parameter only applies to AUTH and ASSOC/RE-ASSOC management frames.
0-60
Maximum number of management frames allowed in each throttle interval. NOTE: This parameter only applies to AUTH and ASSOC/RE-ASSOC management frames.
0-999999
One of the operating modes for the AP.
Device provides transparent, secure, highspeed data communications between wireless network devices and the wired LAN.
Device behaves as an air monitor to collect statistics, monitor traffic, detect intrusions, enforce security policies, balance traffic load, self-heal coverage gaps, etc.
Device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
This parameter is only available for AP models OAW-AP92, OAW-AP93, OAWAP105, OAW-AP175, OAW-AP120 Series, and the OAW-AP130 Series.
Negates any configured parameter.
--
Enables or disables radio configuration.
--
SLB Mode allows control over how to balance clients. Select one of the following options l channel: Channel-based load-balancing
balances clients across channels. This is
Default 0 meters
1 second interval 20 frames per interval ap-mode
-- enabled channel
AOS-W 6.2 | Reference Guide
rf dot11a-radio-profile | 529
Parameter
Description
Range
Default
the default load-balancing mode l radio: Radio-based load-balancing
balances clients across APs
slb-update-interval <secs>
Specify how often spectrum load balancing calculations are made (in seconds). The default value is 30 seconds.
12147483647 seconds
30 seconds
spectrum-load-bal-domain Define a spectrum load balancing domain to --
--
manually create RF neighborhoods.
Use this option to create RF neighborhood
information for networks that have disabled
Adaptive Radio Management (ARM)
scanning and channel assignment.
l If spectrum load balancing is enabled in a
802.11a radio profile but the spectrum
load balancing domain is not defined,
AOS-W uses the ARM feature to calculate
RF neighborhoods.
l If spectrum load balancing is enabled in a
802.11a radio profile and a spectrum load
balancing domain isalso defined, AP
radios belonging to the same spectrum
load balancing domain will be considered
part of the same RF neighborhood for
load balancing, and will not recognize RF
neighborhoods defined by the ARM
feature.
spectrum-load-balancing
The Spectrum Load Balancing feature helps -- optimize network resources by balancing clients across channels, regardless of whether the AP or the switch is responding to the wireless clients' probe requests.
If enabled, the switch compares whether or not an AP has more clients than its neighboring APs on other channels. If an AP's client load is at or over a predetermined threshold as compared to its immediate neighbors, or if a neighboring Alcatel-Lucent AP on another channel does not have any clients, load balancing will be enabled on that AP. This feature is disabled by default.
NOTE: The spectrum load balancing feature available in AOS-W 3.4.x and later releases completely replaces the AP load balancing feature available in earlier versions of AOSW. When you upgrade to AOS-W 3.4.x or later, you must manually configure the spectrum load balancing settings, as the AP load balancing feature can no longer be used, and any previous AP load balancing settings will not be preserved.
disabled
530 | rf dot11a-radio-profile
AOS-W 6.2 | Reference Guide
Parameter spectrum-monitoring
spectrum-profile <profile> tpc-power tx-power
Description
Range
Issue this command to turn an OAW-AP130 -- Series in ap-mode into a hybrid AP. An AP in hybrid AP mode will continue to serve clients as an access point while it scans and analyzes spectrum analysis data for a single radio channel. For further details on using hybrid APs and spectrum monitors to examine the radio frequency (RF) environment in which the Wi-Fi network is operating, refer to the Spectrum Analysis chapter of the AOS-W User Guide.
Specify the rf spectrum profile used by hybrid -- APs and spectrum monitors. This profile sets the spectrum band and device ageout times used by a spectrum monitor or hybrid AP radio. For details, see rf spectrum-profile on page 549.
The transmit power advertised in the TPC IE of beacons and probe responses. Range: 051 dBm
0-51 dBm
Sets the initial transmit power (dBm) on which the AP operates, unless a better choice is available through either calibration or from RF Plan. This parameter can be set from 0 to 51 in .5 dBm increments, or set to the regulatory maximum value of 127 dBm. Transmission power may be further limited by regulatory domain constraints and AP capabilities.
0-51 dBm, 127 dBm
Default default
default 15 dBm 14 dBm
Usage Guidelines
This command configures radios that operate in the 5 GHz frequency band, which includes radios utilizing the IEEE 802.11a or IEEE 802.11n standard. Channels must be valid for the country configured in the AP regulatory domain profile (see ap regulatory-domain-profile on page 148).
To view the supported channels, use the show ap allowed-channels command.
Examples
The following command configures APs to operate in AM mode for the selected dot11a-radio-profile named "samplea:" (host) (config) #rf dot11a-radio-profile samplea mode am-mode
The following command configures APs to operate in high-throughput (802.11n) mode on the 5 Ghz frequency band for the selected dot11a-radio profile named "samplea" and assigns a high-throughout radio profile named "default-a:" (host) (config) #rf dot11a-radio-profile samplea
high-throughput-enable ht-radio-profile default-a
The following command configures a primary channel number of 157 and a secondary channel number of 161 for 40 MHz mode of operation for the selected dot11a-radio profile named "samplea:" (host) (config) #rf dot11a-radio-profile samplea
channel <157+>
AOS-W 6.2 | Reference Guide
rf dot11a-radio-profile | 531
Command History
Release AOS-W 3.0 AOS-W 3.3.2 AOS-W 3.4
AOS-W 3.4.1 AOS-W 3.4.2 AOS-W 6.0
AOS-W 6.1 AOS-W 6.1.3.2
Modification
Command introduced
Introduced support for the high-throughput IEEE 802.11n standard.
Support for the following parameters: l Spectrum load balancing l Spectrum load balancing domain l RX Sensitivity Tuning Based Channel Reuse l RX Sensitivity Threshold l ARM/WIDS Override
The maximum-distance parameter was introduced.
The beacon-regulate parameter was introduced.
Support for the following parameters: l am-scan-profile l cap-reg-eirp l slb-mode l slb-update-interval
The spectrum-monitoring and slb-threshold parameters were introduced.
The cell-size-reduction parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
532 | rf dot11a-radio-profile
AOS-W 6.2 | Reference Guide
rf dot11g-radio-profile
rf dot11g-radio-profile <profile> am-scan-profile <profile-name> arm-profile <profile> beacon-period <milliseconds> beacon-regulate cap-reg-eirp <cap-reg-eirp> cell-size-reduction <cell-size-reduction> channel <num|num+|num-> channel-reuse {static|dynamic|disable} channel-reuse-threshold clone <profile> csa csa-count <number> disable-arm-wids-function dot11b-protection dot11h high-throughput-enable ht-radio-profile <profile> interference-immunity maximum-distance <maximum-distance> mgmt-frame-throttle-interval <seconds> mgmt-frame-throttle-limit <number> mode {ap-mode|am-mode|spectrum-mode} no ... radio-enable slb-mode channel|radio slb-threshold slb-update-interval <secs> spectrum-load-bal-domain spectrum-load-balancing spectrum-monitoring spectrum-profile tpc-power <tpc-power> tx-power <dBm>
Description
This command configures AP radio settings for the 2.4 GHz frequency band, including the Adaptive Radio Management (ARM) profile and the high-throughput (802.11n) radio profile.
Syntax
Parameter <profile>
am-scan-profile <profilename> arm-profile
Description
Name of this instance of the profile. The name must be 1-63 characters.
Configure an Air Monitor (AM) scanning profile.
Configures Adaptive Radio Management (ARM) feature. See rf arm-profile on page 519.
Range -- -- --
Default "default" -- "default"
AOS-W 6.2 | Reference Guide
rf dot11g-radio-profile | 533
Parameter
Description
Range
beacon-period
Time, in milliseconds, between successive beacon transmissions. The beacon advertises the AP's presence, identity, and radio characteristics to wireless clients.
60 (minimum)
beacon-regulate
Enabling this setting introduces randomness -- in the beacon generation so that multiple APs on the same channel do not send beacons at the same time, which causes collisions over the air.
cap-reg-eirp <cap-regeirp>
Work around a known issue on Cisco 7921G telephones by specifying a cap for a radio's maximum equivalent isotropic radiated power (EIRP). When you enable this parameter, even if the regulatory approved maximum for a given channel is higher than this EIRP cap, the AP radio using this profile will advertise only this capped maximum EIRP in its radio beacons.
131 dBm.
cell-size-reduction <cellsize-reduction>
The cell size reduction feature allows you manage dense deployments and to increase overall system performance and capacity by shrinking an AP's receive coverage area, thereby minimizing co-channel interference and optimizing channel reuse. This value should only be changed if the network is experiencing performance issues. The possible range of values for this feature is 0-55 dB. The default 0 dB reduction allows the radio to retain its current default Rx sensitivity value.
Values from 1 dB - 55 dB reduce the power level that the radio can hear by that amount. If you configure this feature to use a nondefault value, you must also reduce the radio's transmission (Tx) power to match its new received (Rx) power level. Failure to match a device's Tx power level to its Rx power level can result in a configuration that allows the radio to send messages to a device that it cannot hear.
1-5 5dB
clone
Name of an existing radio profile from which -- parameter values are copied.
csa
Channel Switch Announcement (CSA), as
--
defined by IEEE 802.11h, allows an AP to
announce that it is switching to a new
channel before it begins transmitting on that
channel.
Clients must support CSA in order to track
the channel change without experiencing
disruption.
Default 100 milliseconds disabled
0 dB
-- disabled
534 | rf dot11g-radio-profile
AOS-W 6.2 | Reference Guide
Parameter csa-count channel
channel-reuse
AOS-W 6.2 | Reference Guide
Description
Range
Default
Number of CSA announcements that are
1-16
4
sent before the AP begins transmitting on
the new channel.
Channel number for the AP 802.11g/802.11n physical layer. The available channels depend on the regulatory domain (country). Channel number configuration options for 20 MHz and 40 MHz modes:
l num: Entering a channel number disables 40 MHz mode and activates 20 MHz mode for the entered channel.
l num+: Entering a channel number with a plus (+) sign selects a primary and secondary channel for 40 MHz mode. The number entered becomes the primary channel and the secondary channel is determined by increasing the primary channel number by 4. Example: 157+ represents 157 as the primary channel and 161 as the secondary channel.
l num-: Entering a channel number with a minus (-) sign selects a primary and secondary channel for 40 MHz mode. The number entered becomes the primary channel and the secondary channel is determined by decreasing the primary channel number by 4. Example: 157- represents 157 as the primary channel and 153 as the secondary channel.
NOTE: 20 MHz clients are allowed to associate when a primary and secondary channel are configured; however, the client will only use the primary channel.
Depends on -- regulatory domain
When you enable the channel reuse feature, it can operate in either of the following three modes; static, dynamic or disable. (This feature is disabled by default.)
l Static mode: This mode of operation is a coverage-based adaptation of the Clear Channel Assessment (CCA) thresholds. In the static mode of operation, the CCA is adjusted according to the configured transmission power level on the AP, so as the AP transmit power decreases as the CCA threshold increases, and vice versa.
l Dynamic mode: In this mode, the Clear Channel Assessment (CCA) thresholds are based on channel loads, and take into account the location of the associated clients. When you set the Channel Reuse This feature is automatically enabled when the wireless medium around the AP is busy greater than half the time. When this mode is enabled, the CCA threshold adjusts to
enabled disabled
enabled
rf dot11g-radio-profile | 535
Parameter channel-reuse-threshold
disable-arm-wids-function dot11b-protection
dot11h high-throughput-enable ht-radio-profile
Description
Range
Default
accommodate transmissions between the AP its most distant associated client. l Disable mode: This mode does not support the tuning of the CCA Detect Threshold.
RX Sensitivity Tuning Based Channel
depends on --
Reuse Threshold, in -dBm.
regulatory
If the Rx Sensitivity Tuning Based Channel domain
reuse feature is set to static mode, this
parameter manually sets the AP's Rx
sensitivity threshold (in -dBm). The AP will
filter out and ignore weak signals that are
below the channel threshold signal strength.
If the value is set to zero, the feature will
automatically determine an appropriate
threshold.
Disables Adaptive Radio Management
1-16
4
(ARM) and Wireless IDS functions. These
can be disabled if a small increase in packet
processing performance is desired. If a radio
is configured to operate in Air Monitor mode,
then these functions are always enabled
irrespective of this option. CAUTION: Use
carefully, since this effectively disables ARM
and WIDS
Enable or disable protection for 802.11b
--
clients. This parameter is enabled by default.
Disabling this feature may improve
performance if there are no 802.11b clients
on the WLAN.
WARNING: Disabling protection violates the
802.11 standard and may cause
interoperability issues. If this feature is
disabled on a WLAN with 802.11b clients,
the 802.11b clients will not detect an
802.11g client talking and can potentially
transmit at the same time, thus garbling both
frames.
enabled
Enable advertisement of 802.11d (Country -- Information) and 802.11h (TPC or Transmit Power Control) capabilities This parameter is disabled by default.
disabled
Enables high-throughput (802.11n) features -- on a radio using the 2.4 GHz frequency band.
enabled
Name of high-throughput radio profile to use -- for configuring high-throughput support on the 5 GHz frequency band. See rf ht-radioprofile on page 545.
"default-a"
536 | rf dot11g-radio-profile
AOS-W 6.2 | Reference Guide
Parameter interference-immunity
maximum-distance
mgmt-frame-throttleinterval mgmt-frame-throttle-limit mode
Description
Range
Set a value for 802.11 Interference Immunity. The default setting for this parameter is level 2. When performance drops due to interference from non-802.11 interferers (such as DECT or Bluetooth devices), the level can be increased up to level 5 for improved performance. However, increasing the level makes the AP slightly "deaf" to its surroundings, causing the AP to lose a small amount of range. The levels for this parameter are: l Level-0: no ANI adaptation. l Level-1: noise immunity only. l Level-2: noise and spur immunity. This is
the default setting l Level-3: level 2 and weak OFDM
immunity. l Level-4: level 3 and FIR immunity. l Level-5: disable PHY reporting. NOTE: Do not raise the noise immunity feature's default setting if the channel-reusethreshold on page 527 feature is also enabled. A level-3 to level-5 Noise Immunity setting is not compatible with the Channel Reuse feature.
Level-0 Level-5
Maximum distance between a client and an AP or between a mesh point and a mesh portal, in meters. This value is used to derive ACK and CTS timeout times. A value of 0 specifies default settings for this parameter, where timeouts are only modified for outdoor mesh radios which use a distance of 16km.
0-24km (40MHz mode)
0-54km (20MHz mode)
The upper limit for this parameter varies, depending on the 20/40 MHz mode for a 2.4GHz frequency band radio: l 20MHz mode: 54km l 40MHz mode: 24km Note that if you configure a value above the supported maximum, the maximum supported value will be used instead. Values below 600m will use default settings.
Averaging interval for rate limiting management frames in seconds. Zero disables rate limiting.
Note: This parameter only applies to AUTH and ASSOC/RE-ASSOC management frames.
0-60
Maximum number of management frames allowed in each throttle interval. NOTE: This parameter only applies to AUTH and ASSOC/RE-ASSOC management frames.
0-999999
One of the operating modes for the AP.
Default Level-2
0 meters
1 second interval 20 frames per interval ap-mode
AOS-W 6.2 | Reference Guide
rf dot11g-radio-profile | 537
Parameter
Description
Range
Default
ap-mode
Device provides transparent, secure, highspeed data communications between wireless network devices and the wired LAN.
am-mode
Device behaves as an air monitor to collect statistics, monitor traffic, detect intrusions, enforce security policies, balance traffic load, self-heal coverage gaps, etc.
spectrum-mode
Device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
no
Negates any configured parameter.
--
--
radio-enable
Enables or disables radio configuration.
--
enabled
slb-mode channel|radio
SLB Mode allows control over how to balance clients. Select one of the following options: l channel: Channel-based load-balancing
balances clients across channels. This is the default load-balancing mode l radio: Radio-based load-balancing balances clients across APs
channel
slb-threshold
If the spectrum load balancing feature is enabled, this parameter controls the percentage difference between number of clients on a channel channel that triggers load balancing. The default value is 20%, meaning that spectrum load balancing is activated when there are 20% more clients on one channel than on another channel used by the AP radio.
1-100%
20%
slb-update-interval <secs>
Specify how often spectrum load balancing calculations are made (in seconds). The default value is 30 seconds.
12147483647 seconds
30 seconds
spectrum-load-bal-domain
Define a spectrum load balancing domain to --
--
manually create RF neighborhoods.
Use this option to create RF neighborhood
information for networks that have disabled
Adaptive Radio Management (ARM)
scanning and channel assignment.
l If spectrum load balancing is enabled in
a 802.11g radio profile but the spectrum
load balancing domain is not defined,
AOS-W uses the ARM feature to
calculate RF neighborhoods.
l If spectrum load balancing is enabled in
a 802.11g radio profile and a spectrum
load balancing domain isalso defined,
AP radios belonging to the same
spectrum load balancing domain will be
considered part of the same RF
neighborhood for load balancing, and
will not recognize RF neighborhoods
538 | rf dot11g-radio-profile
AOS-W 6.2 | Reference Guide
Parameter
Description
Range
defined by the ARM feature.
spectrum-load-balancing
The Spectrum Load Balancing feature helps -- optimize network resources by balancing clients across channels, regardless of whether the AP or the switch is responding to the wireless clients' probe requests.
If enabled, the switch compares whether or not an AP has more clients than its neighboring APs on other channels. If an AP's client load is at or over a predetermined threshold as compared to its immediate neighbors, or if a neighboring Alcatel-Lucent AP on another channel does not have any clients, load balancing will be enabled on that AP. This feature is disabled by default.
NOTE: The spectrum load balancing feature available in AOS-W 3.4.x and later releases completely replaces the AP load balancing feature available in earlier versions of AOSW. When you upgrade to AOS-W 3.4.x or later, you must manually configure the spectrum load balancing settings, as the AP load balancing feature can no longer be used, and any previous AP load balancing settings will not be preserved.
spectrum-monitoring
Issue this command to turn an OAW-AP130 -- Series AP in ap-mode into a hybrid AP. An AP in hybrid AP mode will continue to serve clients as an access point while it scans and analyzes spectrum analysis data for a single radio channel. For further details on using hybrid APs and spectrum monitors to examine the radio frequency (RF) environment in which the Wi-Fi network is operating, refer to the Spectrum Analysis chapter of the AOS-W User Guide.
spectrum-profile <profile> Specify the rf spectrum profile used by
--
hybrid APs and spectrum monitors. This
profile sets the spectrum band and device
ageout times used by a spectrum monitor or
hybrid AP radio. For details, see rf spectrum-
profile on page 549.
tpc-power
The transmit power advertised in the TPC IE of beacons and probe responses. Range: 051 dBm
0-51 dBm
tx-power
Sets the initial transmit power (dBm) on which the AP operates, unless a better choice is available through either calibration or from RF Plan. This parameter can be set from 0 to 51 in .5 dBm increments, or set to the regulatory maximum value of 127 dBm. Transmission power may be further limited by regulatory domain constraints and AP capabilities.
0-51 dBm, 127 dBm
Default disabled
default default 15 dBm 14 dBm
AOS-W 6.2 | Reference Guide
rf dot11g-radio-profile | 539
Usage Guidelines
This command configures radios that operate in the 2.4 GHz frequency band, which includes radios utilizing the IEEE 802.11b/g or IEEE 802.11n standard. Channels must be valid for the country configured in the AP regulatory domain profile (see ap regulatory-domain-profile on page 148).
To view the supported channels, use the show ap allowed-channels command.
Examples
The following command configures APs to operate in AM mode for the selected dot11g-radio-profile named "sampleg:" rf dot11g-radio-profile sampleg
mode am-mode
The following command configures APs to operate in high-throughput (802.11n) mode on the 2.4 Ghz frequency band for the selected dot11g-radio profile named "sampleg" and assigns a high-throughout radio profile named "default-g:" rf dot11g-radio-profile sampleg
high-throughput-enable ht-radio-profile default-g
The following command configures a primary channel number of 1 and a secondary channel number of 5 for 40 MHz mode of operation for the selected dot11g-radio profile named "sampleg:" rf dot11g-radio-profile sampleg
channel <1+>
Command History
Release AOS-W 3.0 AOS-W 3.3.2 AOS-W 3.4
AOS-W 3.4.1 AOS-W 3.4.2 AOS-W 6.0
AOS-W 6.1 AOS-W 6.1.3.2
Modification
Command introduced
Introduced protection for 802.11b clients and support for the high-throughput IEEE 802.11n standard.
Support for the following parameters: l Spectrum load balancing l Spectrum load balancing domain l RX Sensitivity Tuning Based Channel Reuse l RX Sensitivity Threshold l ARM/WIDS Override
The maximum-distance parameter was introduced.
The beacon-regulate parameter was introduced.
Support for the following parameters: l am-scan-profile l cap-reg-eirp l slb-mode l slb-update-interval
The spectrum-monitoring and slb-threshold parameters were introduced.
The cell-size-reduction parameter was introduced.
540 | rf dot11g-radio-profile
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
rf dot11g-radio-profile | 541
rf event-thresholds-profile
rf event-thresholds-profile <profile> bwr-high-wm <percent> bwr-low-wm <percent> clone <profile> detect-frame-rate-anomalies fer-high-wm <percent> fer-low-wm <percent> ffr-high-wm <percent> ffr-low-wm <percent> flsr-high-wm <percent> flsr-low-wm <percent> fnur-high-wm <percent> fnur-low-wm <percent> frer-high-wm <percent> frer-low-wm <percent> frr-high-wm <percent> frr-low-wm <percent> no ...
Description
This command configures the event thresholds profile.
Syntax
Parameter <profile> bwr-high-wm
bwr-low-wm
clone detect-framerate-anomalies fer-high-wm
Description
Range
Name of this instance of the profile. The name
--
must be 1-63 characters.
If bandwidth in an AP exceeds this value, a bandwidth exceeded condition exists. The value represents the percentage of maximum for a given radio. (For 802.11b, the maximum bandwidth is 7 Mbps. For 802.11 a and g, the maximum is 30 Mbps.) The recommended value is 85%.
0-100
After a bandwidth exceeded condition exists, the condition persists until bandwidth drops below this value. The recommended value is 70%.
0-100
Name of an existing radio profile from which
--
parameter values are copied.
Enable or disables detection of frame rate
--
anomalies.
If the frame error rate (as a percentage of total frames in an AP) exceeds this value, a frame error rate exceeded condition exists. The recommended value is 16%.
0-100
Default "default" 0%
0% -- disabled 0%
542 | rf event-thresholds-profile
AOS-W 6.2 | Reference Guide
Parameter fer-low-wm ffr-high-wm ffr-low-wm flsr-high-wm
flsr-low-wm fnur-high-wm
fnur-low-wm frer-high-wm frer-low-wm frr-high-wm frr-low-wm no
Description
Range
After a frame error rate exceeded condition exists, the condition persists until the frame error rate drops below this value. The recommended value is 8%.
0-100
If the frame fragmentation rate (as a percentage of total frames in an AP) exceeds this value, a frame fragmentation rate exceeded condition exists. The recommended value is 16%.
0-100
After a frame fragmentation rate exceeded condition exists, the condition persists until the frame fragmentation rate drops below this value. The recommended value is 8%.
0-100
If the rate of low-speed frames (as a percentage of total frames in an AP) exceeds this value, a lowspeed rate exceeded condition exists. This could indicate a coverage hole. The recommended value is 16%.
0-100
After a low-speed rate exceeded condition exists, the condition persists until the percentage of lowspeed frames drops below this value. The recommended value is 8%.
0-100
If the non-unicast rate (as a percentage of total frames in an AP) exceeds this value, a nonunicast rate exceeded condition exists. This value depends upon the applications used on the network.
0-100
After a non-unicast rate exceeded condition exists, the condition persists until the non-unicast rate drops below this value.
0-100
If the frame receive error rate (as a percentage of total frames in an AP) exceeds this value, a frame receive error rate exceeded condition exists. The recommended value is 16%.
0-100
After a frame receive error rate exceeded condition exists, the condition persists until the frame receive error rate drops below this value. The recommended value is 8%.
0-100
If the frame retry rate (as a percentage of total frames in an AP) exceeds this value, a frame retry rate exceeded condition exists. The recommended value is 16%.
0-100
After a frame retry rate exceeded condition exists, the condition persists until the frame retry rate drops below this value. The recommended value is 8%.
0-100
Negates any configured parameter.
--
Default 0% 16% 8% 16%
8% 0%
0% 16% 8% 16% 8% --
AOS-W 6.2 | Reference Guide
rf event-thresholds-profile | 543
Usage Guidelines
The event threshold profile configures Received Signal Strength Indication (RSSI) metrics. When certain RF parameters are exceeded, these events can signal excessive load on the network, excessive interference, or faulty equipment. This profile and many of the detection parameters are disabled (value is 0) by default.
Example
The following command configures an event threshold profile: (host) (config) #rf event-thresholds-profile et1
detect-frame-rate-anomalies
Command History
This command was introduced in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
544 | rf event-thresholds-profile
AOS-W 6.2 | Reference Guide
rf ht-radio-profile
rf ht-radio-profile <profile> 40MHz-intolerance clone <profile> diversity-spreading-workaround honor-40MHz-intolerance no
Description
This command configures high-throughput AP radio settings. High-throughput features use the IEEE 802.11n standard.
Syntax
Parameter <profile>
40MHzintolerance clone honor-40MHzintolerance no diversity-spreadingworkaround
Description
Range
Name of this instance of the profile. The
--
name must be 1-63 characters.
Default Options:
l "Default-a" is generally used in
association with high-throughput devices
running on the 5 GHz frequency band,
see rf dot11a-radio-profile on page 525.
l "Default-g" is generally used in
association with high-throughput devices
running on the 2.4 GHz frequency band,
see rf dot11g-radio-profile on page 533.
l "Default" is generally used when the
same ht-radio-profile is desired for use
with both frequency bands.
Controls whether or not APs using this radio -- profile will advertise intolerance of 40 MHz operation. By default, 40 MHz operation is allowed.
Name of an existing high-throughput radio
--
profile from which parameter values are
copied.
When enabled, the radio will stop using the -- 40 MHz channels if the 40 MHz intolerance indication is received from another AP or station.
Negates any configured parameter.
--
When this feature is enabled, all legacy transmissions will be sent using a single antenna. This enables interoperability for legacy or high-throughput stations that cannot decode 802.11n cyclic shift diversity (CSD) data.
This feature is disabled by default and should be kept disabled unless necessary.
Default default-a default-g default
disabled
-- enabled
-- disabled
AOS-W 6.2 | Reference Guide
rf ht-radio-profile | 545
Usage Guidelines
The ht-radio-profile configures high-throughput settings for networks utilizing the IEEE 802.11n standard, which supports 40 MHZ channels and operates in both the 2.4 GHZ and 5 GHZ frequency bands.
Most transmissions to high throughput (HT) stations are sent through multiple antennas using cyclic shift diversity (CSD). When you enable the single-chain-legacydisable-diversity-spreadingparameter, CSD is disabled and only one antenna transmits data, even if they are being sent to high-throughput stations. Use this feature to turn off antenna diversity when the AP must support legacy clients such as Cisco 7921g VoIP phones, or older 802.11g clients (e.g. Intel Centrino clients). Note, however, that enabling this feature can reduce overall throughput rates.
The ht-radio-profile you wish to use must be assigned to a dot11a and/or dot11g-radio-profile. You can assign the same profile or different profiles to the 2.4 GHZ and 5 GHZ frequency bands. See rf dot11a-radio-profile on page 525 and rf dot11g-radio-profile on page 533.
Example
The following command configures an ht-radio-profile named "default-g" and enables 40MHz-intolerance: (host) (config) #rf ht-radio-profile default-g
40MHz-intolerance
Command History
Release AOS-W 3.0 AOS-W 3.3.2 AOS-W 3.4 AOS-W 6.2
Modification Command introduced Support for the dsss-cck-40mhz parameterwas removed Introduced the single-chain-legacy parameter. The single-chain-legacy parameter was renamed to diversity-spreadingworkaround.
Command Information
Platforms
Licensing
All platforms, but operates with IEEE 802.11n compliant devices only
Base operating system
Command Mode Config mode on master switches
546 | rf ht-radio-profile
AOS-W 6.2 | Reference Guide
rf optimization-profile
rf optimization-profile <profile-name> clone <profile> handoff-assist low-rssi-threshold <number> no ... rssi-check-frequency <number> rssi-falloff-wait-time <seconds>
Description
This command configures the RF optimization profile.
Syntax
Parameter <profile-name> clone handoff-assist
low-rssi-threshold no rssi-check-frequency
Description
Range
Name of this instance of the profile. The
--
name must be 1-63 characters.
Name of an existing optimization profile from -- which parameter values are copied.
Allows the switch to force a client off an AP -- when the RSSI drops below a defined minimum threshold.
Minimum RSSI, above which deauth should 1-255 never be sent.
Negates any configured parameter.
--
Interval, in seconds, to sample RSSI.
9-255
rssi-falloff-wait-time <seconds>
Time, in seconds, to wait with decreasing
0-8
RSSI before deauth is sent to the client. The
maximum value is 8 seconds.
Example
The following command configures an RF optimization profile: (host) (config) #rf optimization-profile Angela1 (host) (RF Optimization Profile "Angela1") #rssi-falloff-wait-time 3 (host) (RF Optimization Profile "Angela1") #rssi-check-frequency 2
Command History
Version AOS-W 3.0 AOS-W 3.4
Modification
Command introduced
The following parameters were deprecated: l ap-lb-max-retries <number>
Default "default"
--
disabled
0
-- 0 seconds 0 seconds
AOS-W 6.2 | Reference Guide
rf optimization-profile | 547
Version
AOS-W 5.0 AOS-W 6.0
Modification
l ap-lb-user-high-wm <percent> l ap-lb-user-low-wm <percent> l ap-lb-util-high-wm <percent> l ap-lb-util-low-wm <percent> l ap-lb-util-wait-time <seconds l ap-load-balancing Use the command rf dot11a-radio-profilespectrum-load-balancing and rf dot11g-radio-profilespectrum-load-balancing to enable the spectrum load balancing feature.
The following parameters were deprecated: l coverage-hole-detection hole-detection-interval l hole-good-rssi-threshold l hole-good-sta-ageout l hole-idle-sta-ageout l hole-poor-rssi-threshold
The following parameters were deprecated: l detect-association-failure l detect-interference l hole-detection-interval l hole-good-rssi-threshold l hole-good-sta-ageout l hole-idle-sta-ageout l hole-poor-rssi-threshold l interference-baseline l interference-exceed-time l interference-threshold
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
548 | rf optimization-profile
AOS-W 6.2 | Reference Guide
rf spectrum-profile
rf spectrum-profile <profile-name> age-out audio|bluetooth|cordless-ff-phone|cordless-fh-base|cordless-fh-network|genericff|generic-fh|microwave|microwave-inverter|unknown|video|wifi|xbox clone <source> no ...
Description
Define the device ageout times used by a spectrum monitor, or hybrid AP radio.
Syntax
Parameter
Description
Range
age-out
Use the age-out parameter to define the number of seconds for which a specific device type must stop sending a signal before the spectrum monitor considers that device no longer active on the network.
audio
Audio devices.
5-65535 seconds
bluetooth
Bluetooth devices. Note that this setting is applicable to 2.4GHz spectrum monitor radios only.
5-65535 seconds
cordless-ff-phone Cordless phone fixed frequency devices.
5-65535 seconds
cordless-fh-base
Cordless base frequency hopper devices.
5-65535 seconds
cordless-fh-network Cordless network frequency hopper devices.
5-65535 seconds
generic-ff
Generic fixed frequency devices.
5-65535 seconds
generic-fh
Generic frequency hopper devices.
5-65535 seconds
generic-interferer
5-65535 seconds
microwave
Microwaves. Note that this setting is applicable to 2.4GHz spectrum monitor radios only.
5-65535 seconds
microwave-inverter
Inverter-type microwaves. Note that this setting is applicable to 2.4GHz spectrum monitor radios only.
5-65535 seconds
video
Video devices.
5-65535 seconds
Default
10 sec 25 sec 10 sec 240 sec 60 sec 10 sec 25 sec 30 sec 15 sec 15 sec 60 sec
AOS-W 6.2 | Reference Guide
rf spectrum-profile | 549
Parameter wifi xbox
clone <source> no
Description
WIFI devices.
Xbox consoles. Note that this setting is applicable to 2.4GHz spectrum monitor radios only.
Make a copy of an existing spectrum profile.
Remove a spectrum profile or negate a configured parameter.
Range
5-65535 seconds
5-65535 seconds
Default 600 sec 25 sec
600 sec
Usage Guidelines
The Spectrum Analysis software module provides visibility into RF coverage, allowing you to troubleshoot RF interference and identify the 802.11 devices on the network. APs that gather spectrum data are called Spectrum Monitors, or SMs, and reference a spectrum profile that determines the band monitored by that SM radio. Note that you can only convert a radio on an AP model OAW-RAP5WN, OAW-AP105, OAW-AP175, OAW-AP120 Series, OAW-AP130 Series or OAW-AP90 Series to a spectrum monitor, and only the OAW-AP105, OAW-AP175, OAWAP120 Series, OAW-AP130 Series or OAW-AP90 Series can be configured as a hybrid AP. The spectrum analysis feature is not supported by any other AP model. Use this profile to modify default device ageout times for spectrum monitors and hybrid APs using this profile.
Example
The following command creates the spectrum profile spectrum2. (host) (config) #rf spectrum-profile spectrum2
Related Commands
show rf spectrum-profile
Command History
Release AOS-W 6.0 AOS-W 6.2
Modification
Command introduced
The spectrum-band parameter was deprecated. The following default ageout times were changed: l cordless-fh-base default timeout is 240 seconds (was 25 sect in previous releases) l cordless-fh-network default timeout is 60 sect (was 10 sect in previous releases) l generic-interferer default timeout is 30 sect (was 25 sect in previous releases) l video default timeout is 60 sect (was 10 sect in previous releases)
Command Information
Platforms All platforms
Licensing RF Protect license
Command Mode
Config mode on master and local switches
550 | rf spectrum-profile
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
rf spectrum-profile | 551
router mobile
router mobile
Description
This command enables Layer-3 (IP) mobility.
Syntax
No parameters.
Usage Guidelines
IP mobility is disabled by default on the switch. You need to use this command to enable IP mobility. This command must be executed on all switches (master and local) that need to provide support for layer-3 roaming in a mobility domain. You can disable IP mobility in a virtual AP profile with the wlan virtual-ap command (IP mobility is enabled by default in a virtual AP profile).
Example
This command enables IP mobility: (host) (config) #router mobile
Command History
Release AOS-W 3.0
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
552 | router mobile
AOS-W 6.2 | Reference Guide
router ospf
router ospf area <area-id> default-cost <cost> nssa [default-information no-redistribution | no-summary] stub [no-summary] default-information originate always redistribute vlan [<vlan-ids> | add <vlan-ids> | remove <vlan-ids>] router-id <rtr-id> subnet exclude <addr> <mask>
Description
Global OSPF configuration for the upstream router.
Syntax
Parameter area <area-id>
default-cost <cost>
nssa default-information-originate no-redistribution no-summary stub [no-summary]
default-information originate always redistribute vlan <vlan-ids>
add <vlan-ids> remove <vlan-ids> router-id <rtr-id> subnet exclude <addr> <mask>
Description
Enter the keyword area followed by the area identification, in dotted decimal format, to configure an OSPF area.
Set the summary cost of a NSSA/stub area (in route metric) Range: 0 to 16777215
Set an area as a NSSA
Originate Type 7 default into the NSSA area
Set the NSSA area for no distribution into this NSSA area
Do not send summary LSA into this NSSA area
Set an area as a Total Stub Area and optionally do not send summary LSA into this area
Control distribution of default information by distributing a default route.
Redistribute the vlan user subnet.
Add the user VLANs to the list
Remove user VLANs to the list.
Enter the router ID in IP address format.
Specify the subnet that OSPF will not advertise. Enter the subnet and mask address in dotted decimal format (A.B.C.D).
Usage Guidelines
OSPFv2 is a dynamic Interior Gateway routing Protocol (IGP) based on IETF RFC 2328. The AOS-W implementation of OSPF allows switches to deploy effectively in a Layer 3 topology. For more detailed information, refer to the OSPF Chapter in the AOS-W User Guide.
AOS-W 6.2 | Reference Guide
router ospf | 553
Example
By default OSPF will advertise all the user VLAN subnet addresses in the router LSA (Link-State Advertisement). To control the OSPF advertisement, execute the following command:
(host) (config) # router ospf subnet exclude 75.1.1.0 255.255.0.0 With the above command, any user VLAN subnet matching 75.1/16 will not be advertised in the router LSA. To return to the default advertisement, execute the command:
(host) (config) # no router ospf subnet exclude 75.1.1.0 255.255.0.0
Related Commands
Command show ip ospf
Description View OSPF configuration
Command History
Release AOS-W 3.4 AOS-W 6.0
Modification
Command introduced
Added the options: area, default-cost, nssa, and default-information originate always
Command Information
Platforms All Platforms
Licensing Base operating system
Command Mode Configuration Mode (config)
554 | router ospf
AOS-W 6.2 | Reference Guide
service
service [dhcp] [network-storage] [print-server]
Description
This command enables the DHCP server on the switch.
Syntax
Parameter dhcp network-storage print-server
Description Enables the DHCP server Enables the NAS service Enables the printer service
Default disabled disabled disabled
Usage Guidelines
You can enable and configure DHCP, DHCPv6, network-storage or print server in the switch to provide the following: l DHCP: IP addresses to wireless clients if an external DHCP server is not available. l Network-storage: To provide access to the storage devices attached to the switch. l Printer-server: To provide access to printers attached to the switch.
Example
The following command enables the DHCP server in the switch: (host) (config) #service dhcp The following command enables the NAS services in the switch: (host) (config) #service network-storage The following command enables the printer services in the switch: (host) (config) #service print-server
Command History
The DHCP command was introduced in AOS-W 3.0. The network-storage and print-server options was introduced in AOS-W 3.4
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
service | 555
show local-cert-mac
show local-cert-mac tag <mac>
Description
Display the IP, MAC address and certificate configuration of local switches in a master-local configuration.
Syntax
Parameter tag <tag>
Description IP address of the local switch or MAC address of the local switch certificate.
Usage Guidelines
By default the output of this command shows each local switch's IP and MAC address and the type of certificate used by those local switches (Custom or Factory). Use the optional tag parameter to display information for a single switch only.
Example
The output of this command shows that two local switches have a custom certificate installed.
(host) # show local-cert-mac
Local Switches configured by Local Certificate
-----------------------------------------------
Switch IP of the Local MAC address of the Local Certificate
---------------------- ------------------------------------
10.4.62.3
0B:86:F0:12:AC:15
Cert-Type ---------
CA cert -------
10.4.62.5 00:0B:86:F0:05:60 Custom Undefined
The output of this command includes the following information:
Column Switch IP of the Local MAC address of the Local Certificate Cert-Type
CA Cert
Description IP address of the local switch MAC address of the certificate on the local switch
Type of certificate used by the local switch. l Custom: User-installed, custom certificate l Factory: Factory-installed certificate Name of the Certificate Authority (CA) certificate.
556 | show local-cert-mac
AOS-W 6.2 | Reference Guide
Related Commands
Command
Description
local-factory-cert
This command configures the factory-installed certificate for secure communication between a local switch and a master switch.
local-custom-cert
This command configures a custom certificate for secure communication between a local switch and a master switch.
Mode
Enable or Config mode on master switches.
Enable or Config mode on master or local switches.
Command History
Available in AOS-W 6.1
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show local-cert-mac | 557
show remote-node-dhcp-pool
show remote-node-dhcp-pool <remote-node-profile-name>
Description
The output of this command lists shows Remote Node DHCP pool summary information.
Syntax
Parameter remote-node-profile-name
Description Name of the Remote Node profile
Usage Guidelines
Each Remote Node profile contains a Remote Node DHCP address pool, which defines a range of IP addresses allocated for Remote Node switches at a remote site, and the VLAN to be associated with those addresses. A remote-node dhcp pool is configured in the remote-note mode.
Use the show remote-node-dhcp-pool command to view a summary of Remote Node address pool information.
Example
This example shows a summary of Remote Node DHCP address pool information. (host) #show remote-node-dhcp-pool pool1
Remote Node Address Pools -------------------------------------Pool Name Type Start IP Address End IP Address --------- ---- ---------------- --------------
Domain Name -----------
Num Hosts ---------
The output of this command includes the following parameters:
Parameter
Description
Pool Name
Name of the new DHCP pool.
Type
Type of pool. This can be tunnel or vlan.
Start IP Address IP addresses at the start and end of the Remote Node's address range, in dotted-decimal format.
End IP Address
IP address at the end of the Remote Node's address range, in dotted-decimal format.
Domain Name
The DHCP domain name.
Num Hosts
Maximum number of hosts supported by a Remote Node using this pool.
Related Commands
Command remote-node-profile
Description
The remote-node-profile command lets you create a Remote Node profile.
Mode Config mode
558 | show remote-node-dhcp-pool
AOS-W 6.2 | Reference Guide
Command History
Release AOS-W 6.0
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable mode on master and local switches
AOS-W 6.2 | Reference Guide
show remote-node-dhcp-pool | 559
show remote-node-profile
show remote-node-profile
Description
The output of this command shows Remote Node profile configuration information.
Syntax
Parameter
Description
remote-node-profile-name Name of the Remote Node profile
Usage Guidelines
This show remote-node-profile command shows the configuration status of a Remote Node profile. To create a Remote Node profile, use the remote-node-profile command to create a Remote Node profile.
Example
This example shows the configuration status of Remote Node profile named "test."
(host) #show remote-node-profile ?
<remote-node-profile-name>
Profile name
|
Output Modifiers
<cr>
(host) #show remote-node-profile test
.......Vlan interface not configured for the controller-ip vlan. .......No uplink information has been configured.
remote-node-profile test remote-node-dhcp-pool newpool pool-type tunnel 0 domain-name mycorp.com range startip 0.0.0.0 endip 0.0.0.0 hosts 1 !
!
Related Commands
Command remote-node-profile
Description
The remote-node-profile command lets you create a Remote Node profile.
Mode Config mode
Command History
Release AOS-W 6.0
Modification Command introduced
560 | show remote-node-profile
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable mode on master and local switches
AOS-W 6.2 | Reference Guide
show remote-node-profile | 561
show remote-node
Description
Shows configuration and other information about the remote node.
Syntax
Parameter
Description
config <mac-address>
Shows configuration information for the remote node.
dhcp-instance <mac-address>
Shows the remote node address pool information including pool name, DHCP pool start IP address, DHCP pool mask, DHCP pool broadcast IP address, and the DHCP pool gateway IP address.
license-usage
Shows the remote node AP license usage information including the remote node MAC address, IP address and the AP, PEF and RF Protect licenses along with the last time the licenses were updated.
running-config <macaddress>
Shows the running configuration for this remote node
Usage Guidelines
Issue this command to display configuration, DHCP pool information license usage information and running configuration information for a remote node.
Examples
This example shows a remote node configuration.
(host) #show remote-node config 00:0b:86:f0:26:e0
controller-ip vlan 2 vlan 2 vlan 3 interface fastethernet "1/7"
interface fastethernet "1/7" switchport access vlan 3 interface fastethernet "1/7" trusted interface fastethernet "1/2" interface fastethernet "1/2" switchport access vlan 2 interface fastethernet "1/2" trusted interface fastethernet "1/3" interface fastethernet "1/3" switchport access vlan 2 interface fastethernet "1/3" trusted interface fastethernet "1/1" interface fastethernet "1/1" switchport access vlan 2 interface fastethernet "1/1" trusted interface vlan 3 interface vlan 3 ip address 10.3.29.79 255.255.255.0 interface vlan 2 interface vlan 2 ip address 192.167.1.1 255.255.255.240 uplink wired vlan 4 interface tunnel 1 interface tunnel 1 tunnel destination remote-node-master-ip ip route 10.100.102.217 255.255.255.255 10.3.29.254
562 | show remote-node
AOS-W 6.2 | Reference Guide
ip route 10.100.102.173 255.255.255.255 10.3.29.254 ip route 10.1.1.41 255.255.255.255 10.3.29.254 mgmt-user "admin" "root" "ade8c0d3890aa97914d926120279aef2" service dhcp ip dhcp pool vlanx domain-name mycorp.com ip dhcp pool vlanx ip dhcp pool vlanx default-router 192.167.1.1 ip dhcp pool vlanx dns-server 192.167.1.1 ip dhcp pool vlanx network 192.167.1.0 255.255.255.240 remote-node config-id 32
This example shows remote node AP license usage information.
(host) #show remote-node license-usage
Remote Node AP License Usage (license limit: 65)
------------------------------------------------
MAC Address
IP Address AP Lic. Used PEF Lic. Used
(secs. ago)
-----------
---------- ------------ -------------
------------
00:0b:86:f0:26:e0 192.167.1.1 0
0
RF Protect Lic. Used -------------------0
Last update ----------2
Related Commands
Command remote-node-profile remote-node-localip
remote-node-masterip
Description
Use this command to create a Remote Node profile.
Use this command to configure the switch-IP address and preshared key for the local Remote Node on a master Remote Node.
Use this command to configure the IP address and preshared key for the master Remote Node on a local Remote Node.
Mode Enable and Config modes Enable and Config modes
Enable and Config modes
Command History
Release AOS-W 6.0
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master and local switches
AOS-W 6.2 | Reference Guide
show remote-node | 563
show aaa authentication all
show
show aaa authentication all
Description
Show authentication statistics for your switch, including authentication methods, successes and failures.
Usage Guidelines
This command displays a general overview of authentication statistics. To view authentication information for specific profiles such as a captive-portal, MAC or 801.x authentication profile, issue the commands specific to those features.
Example
The output of this command displays an authentication overview for your switch, including the authentication methods used, and the numbers of successes or failures for each method. This example shows the numbers of authentication successes and failures for a switch using TACACS+ and RADIUS authentication methods.
(host) #show aaa authentication all
Auth Method Statistics
----------------------
Method Success Failures
------ ------- --------
tacacs
12
Command History
This command was introduced in AOS-W 3.0.
Command Information
2Radius
9
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
564 | show aaa authentication all
AOS-W 6.2 | Reference Guide
show aaa authentication captive-portal
show aaa authentication captive-portal [<profile-name>]
Description
This command shows configuration information for captive portal authentication profiles.
Syntax
Parameter <profile-name>
Description The name of an existing captive portal authentication profile.
Usage Guidelines
Issue this command without the <profile-name> parameter to display the entire Captive Portal Authentication profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
If you do not yet have any captive portal authentication profiles defined, use the command aaa authentication captive-portal to configure your captive portal profiles.
Examples
This first example shows that there are three configured captive portal profiles in the Captive Profile Authentication Profile List. The References column lists the number of other profiles with references to a captive portal authentication profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
(host) #show aaa authentication captive-portal
Captive Portal Authentication Profile List
------------------------------------------
Name
References Profile Status
----
---------- --------------
c-portal
2
remoteuser
1
portal1
1
Total: 4
Include a captive portal profile name to display a complete list of configuration settings for that profile. The example below shows settings for the captive portal profile portal1.
Captive Portal Authentication Profile "portal1" -----------------------------------------------Parameter --------Default Role Default Guest Role Server Group Redirect Pause User Login Guest Login Logout popup window Use HTTP for authentication
Value ----guest guest default 10 sec Enabled Disabled Enabled Disabled
AOS-W 6.2 | Reference Guide
show aaa authentication captive-portal | 565
Logon wait minimum wait Logon wait maximum wait logon wait CPU utilization threshold Max Authentication failures Show FQDN Use CHAP (non-standard) Login page Welcome page Show Welcome Page Add switch IP address in the redirection URL Adding user vlan in redirection URL Add a switch interface in the redirection URL Allow only one active user session White List Black List Show the acceptable use policy page
5 sec 10 sec 60 % 0 Disabled Disabled /auth/index.html /auth/welcome.html Yes Disabled Disabled N/A Disabled N/A N/A Disabled
The output of this command includes the following parameters:
Parameter Default Role Default Guest Role Server Group Redirect Pause
User Login Guest Login Logout popup window
Use HTTP for authentication
Logon wait minimum wait Logon wait maximum wait logon wait CPU utilization threshold Max Authentication failures
Description
Role assigned to the captive portal user upon login.
Guest role assigned to the captive portal user upon login.
Name of the group of servers used to authenticate captive portal users.
Time, in seconds, that the system remains in the initial welcome page before redirecting the user to the final web URL. If set to 0, the welcome page displays until the user clicks on the indicated link.
Shows whether the profile has enabled or disabled captive portal with authentication of user credentials.
Shows whether the profile has enabled or disabled captive portal guest login without authentication.
Shows whether the profile has enabled or disabled a pop-up window that allows a user to log out. If this is disabled, the user remains logged in until the user timeout period has elapsed or the station resets.
Shows whether the profile has enabled or disabled the ability to use the HTTP protocol to redirect users to the captive portal page.
Minimum time, in seconds, the user will have to wait for the logon page to pop up if the CPU load is high.
Maximum time, in seconds, the user will have to wait for the logon page to pop up if the CPU load is high.
CPU utilization percentage above which the logon wait interval is applied when directing a captive portal user with the logon page.
Maximum number of authentication failures before the user is blacklisted.
566 | show aaa authentication captive-portal
AOS-W 6.2 | Reference Guide
Parameter
Description
Show FQDN
If enabled, the user can see and select the fully-qualified domain name (FQDN) on the captive portal login page.
Authentication Protocol
This parameter specifies the type of authentication required by this profile, PAP is the default authentication type
Login page
URL of the page that appears for the user logon.
Welcome page
URL of the page that appears after logon and before the user is redirected to the web URL.
Add switch IP address in the redirection URL
If enabled, this option sends he switch's IP address in the redirection URL when external captive portal servers are used. An external captive portal server can determine the switch from which a request originated by parsing the `switchip' variable in the URL.
Adding user vlan in redirection URL
Shows the user's VLAN ID sent in the redirection URL, if enabled
Add a switch interface in the redirection URL
Shows the IP address of a switch interface added to the redirection URL, if enabled.
Allow only one active user session If enabled, only one active user session is allowed at any time. This feature is disabled by default.
White List
Shows the configured white list on an IPv4 or IPv6 network destination. The white list contains authenticated websites that a guest can access.
Black List
Shows the configured black list on an IPv4 or IPv6 network destination. The black list contains websites (unauthenticated) that a guest cannot access.
Show the acceptable use policy page
If enabled, the captive portal page will show the acceptable use policy page before the user logon page. This feature is disabled by default.
Related Commands
Command
aaa authentication captiveportal
Description
Use aaa authentication captive-portal to configure the parameters displayed in the output of this show command.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Version AOS-W 3.0
Description Command introduced
AOS-W 6.2 | Reference Guide
show aaa authentication captive-portal | 567
Version AOS-W 6.1
AOS-W 6.2
Description
The sygate-on-demand parameter was deprecated, and the white-list and black-list parameters were added
the Authentication Protocol parameter was added, and the Use CHAP parameter was deprecated.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
568 | show aaa authentication captive-portal
AOS-W 6.2 | Reference Guide
show aaa authentication captive-portal customization
show aaa authentication captive-portal customization <profile-name>
Description
Display customization settings for a captive portal profile
Syntax
Parameter <profile-name>
Description The name of an existing captive portal authentication profile.
Usage Guidelines
The this command shows how a captive portal profile has been customized with non-default configuration settings. If you do not yet have any captive portal authentication profiles defined, use the command aaa authentication captiveportal to configure your captive portal profiles
Example
The output of the following command shows how the captive portal profile c-portal has been customized. If an individual parameter has not been changed from its default settings, its value entry will be blank.
(host) #show aaa authentication captive-portal customization c-portal
Captive-Portal Customization
----------------------------
Parameter
Value
---------
-----
Login page design theme
3
Login page logo image
Login page text URL
/flash/upload/custom/ssu-guest-cp/logintext.html
Login policy text URL
/upload/custom/ssu-guest-cp/acceptableusepolicy.html
Custom page background color
Custom page background image
The output of this command includes the following parameters:
/uplo
Parameters Login page design theme
Login page logo image
Login page text Login policy text Custom page background color Custom page background image
Description
Indicates whether the switch is using one of the two predefined login page designs (1 or 2) or has a custom background (3).
Path and filename for a custom captive portal logo. This option is only available if the switch has a predefined login design.
Path and filename of the page that appears for the user logon.
Path and filename of the page that displays user policy text.
Hexadecimal value for a custom background color. This option is only available if the switch has a custom login page design theme.
Path and filename for a custom JPEG captive portal background image. This option is only available if the switch has a custom login page design theme.
AOS-W 6.2 | Reference Guide
show aaa authentication captive-portal customization | 569
Related Commands
Command
aaa authentication captiveportal
Description
If you do not yet have any captive portal profiles defined, use the command aaa authentication captive-portal to configure your captive portal profiles.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
570 | show aaa authentication captive-portal customization
AOS-W 6.2 | Reference Guide
show aaa authentication dot1x
show aaa authentication dot1x [<profile-name>|countermeasures]
Description
This command shows information for 802.1X authentication profiles.
Syntax
Parameter <profile-name> countermeasures
Description
The name of an existing 802.1X authentication profile.
Reports if WPA/WPA2 Countermeasures have been enabled for 802.1X profiles. If enabled, the AP scans for message integrity code (MIC) failures in traffic received from clients.
Usage Guidelines
Issue this command without the <profile-name> or countermeasures options to display the entire 802.1X Authentication profile list, including profile status and the number of references to each profile. Include a profile name to display detailed dot1x authentication configuration information for that profile. The countermeasures option indicates whether the 802.1X profiles have been configured for WPA/WPS2 countermeasures. If countermeasures have not been configured, the output for this command will be blank.
Examples
The following example lists all dot1x authentication profiles. The References column lists the number of other profiles with references to a 802.1X authentication profile, and the Profile Status column indicates whether the profile is predefined. User-defined 802.1X profiles will not have an entry in the Profile Status column.
(host) #show aaa authentication dot1x
802.1X Authentication Profile List
----------------------------------
Name
References Profile Status
----
---------- --------------
default
2
default-psk 1
Predefined (editable)
dot1x
5
dot1xtest
0
Total:4
To display a complete list of parameters for an individual profile, include the <profile> parameter. The example below displays some of the profile details for the authentication profile pDotix.
(host) #show aaa authentication dot1x pDot1x
802.1X Authentication Profile "pDot1x" -------------------------------------Parameter --------Max authentication failures Enforce Machine Authentication
Value ----0 Disabled
AOS-W 6.2 | Reference Guide
show aaa authentication dot1x | 571
Machine Authentication: Default Machine Role Machine Authentication Cache Timeout Blacklist on Machine Authentication Failure Machine Authentication: Default User Role Interval between Identity Requests Quiet Period after Failed Authentication Reauthentication Interval Use Server provided Reauthentication Interval Multicast Key Rotation Time Interval Unicast Key Rotation Time Interval ...
guest 24 hrs Disabled guest 30 sec 30 sec 86400 sec Disabled 1800 sec 900 sec
The output of the show aaa authentication dot1xcommand includes the following parameters:
Parameter Max authentication failures
Enforce Machine Authentication
Machine Authentication: Default Machine Role Machine Authentication Cache Timeout Blacklist on Machine Authentication Failure Machine Authentication: Default User Role Interval between Identity Requests Quiet Period after Failed Authentication Reauthentication Interval Use Server provided Reauthentication Interval Multicast Key Rotation Time Interval
Value
Number of times a user can try to login with wrong credentials after which the user is blacklisted as a security threat. Blacklisting is disabled if this parameter is set to 0.
Shows if machine authentication is enabled or disabled for Windows environments. If enabled, If enabled, either the machine-default-role or the user-default-role is assigned to the user, depending on which authentication is successful.
Default role assigned to the user after completing only machine authentication.
The timeout period, in hours, for machine authentication. After this period passes, the use will have to re-authenticate.
If enabled, the client is blacklisted if machine authentication fails.
Default role assigned to the user after 802.1X authentication.
Interval, in seconds, between identity request retries
Interval, in seconds, following failed authentication.
Interval, in seconds, between reauthentication attempts.
If enabled, 802.1X authentication will use the server-provided reauthentication period.
Interval, in seconds, between multicast key rotations.
Unicast Key Rotation Time Interval
Interval, in seconds, between unicast key rotations.
572 | show aaa authentication dot1x
AOS-W 6.2 | Reference Guide
Parameter
Value
Authentication Server Retry Interval
Server group retry interval, in seconds.
Authentication Server Retry Count
The number of server group retries.
Framed MTU
Shows the framed MTU attribute sent to the authentication server.
Number of times ID-Requests are retried
Maximum number of times ID requests are sent to the client.
Maximum Number of Reauthentication Attempts
Maximum number of reauthentication attempts.
Maximum number of times Held State can be bypassed
Number of consecutive authentication failures which, when reached, causes the switch to not respond to authentication requests from a client while the switch is in a held state after the authentication failure.
Dynamic WEP Key Message Retry Count
Number of times unicast/multicast EAPOL key messages are sent to the client.
Dynamic WEP Key Size
Dynamic WEP key size, either 40 or 128 bits.
Interval between WPA/WPA2 Key Messages
Interval, in milliseconds, between each WPA key exchange.
Delay between EAP-Success and WPA2 Unicast Key Exchange
Show the delay interval between EAP-Success and unicast key exchanges, in msec. Range: 0-2000msec. Default: 0 (no delay).
Delay between WPA/WPA2 Unicast Key and Group Key Exchange
Interval, in milliseconds, between unicast and multicast key exchanges.
Time interval after which the PMKSA will be deleted
Show the PMKSA cache interval. Time interval in Hours. Range: 1-2000. Default: 8 hrs.
WPA/WPA2 Key Message Retry Count
Number of times WPA/WPA2 key messages are retried.
Multicast Key Rotation
Shows if multicast key rotation is enabled or disabled.
Unicast Key Rotation
Shows if unicast key rotation is enabled or disabled.
Reauthentication
If enabled, this option forces the client to do a 802.1X reauthentication after the expiration of the default timer for reauthentication. (The default value of the timer is 24 hours.)
Opportunistic Key Caching
If enabled, a cached pairwise master key (PMK) is derived with a client and an associated AP and used when the client roams to a new AP.
AOS-W 6.2 | Reference Guide
show aaa authentication dot1x | 573
Parameter
Value
Validate PMKID
Shows if the Validate PMKID feature is enabled or disabled. When this option is enabled, the client must send a PMKID in the associate or reassociate frame to indicate that it supports OKC; otherwise, full 802.1X authentication takes place. (This feature is optional, since most clients that support OKC do not send the PMKID in their association request.)
Use Session Key
If enabled, the switch will use a RADIUS session key as the unicast WEP key.
Use Static Key
If enabled, the switch will use a static key as the unicast/multicast WEP key.
xSec MTU
Shows the size of the MTU for xSec.
Termination
Shows if 802.1X termination is enabled or disabled on the switch.
Termination EAP-Type
Shows the current Extensible Authentication Protocol (EAP) method, either EAP-PEAP or EAP-TLS.
Termination Inner EAP-Type
When EAP-PEAP is the EAP method, this parameter displays the inner EAP type.
Enforce Suite-B 128 bit or more security level Authentication
Shows if Suite-B 128 bit or more security level authentication enforcement is enabled or disabled.
Enforce Suite-B 192 bit security level Authentication
Shows if Suite-B 192 bit or more security level authentication enforcement is enabled or disabled.
Token Caching
If this feature enabled (and EAP-GTC is configured as the inner EAP method), token caching allows the switch to cache the username and password of each authenticated user.
Token Caching Period
Timeout period, in hours, for the cached information.
CA-Certificate
Name of the CA certificate for client authentication loaded in the switch.
Server-Certificate
Name of the Server certificate used by the switch to authenticate itself to the client.
TLS Guest Access
Shows if guest access for valid EAP-TLS users is enabled or disabled.
TLS Guest Role
User role assigned to EAP-TLS guest.
Ignore EAPOL-START after authentication
If enabled, the switch ignores EAPOL-START messages after authentication.
574 | show aaa authentication dot1x
AOS-W 6.2 | Reference Guide
Parameter
Value
Handle EAPOL-Logoff
Shows if handling of EAPOL-LOGOFF messages is enabled or disabled.
Ignore EAP ID during negotiation
If enabled, the switch will Ignore EAP IDs during negotiation.
WPA-Fast-Handover
Shows if WPA-fast-handover is enabled or disabled. This feature is only applicable for phones that support WPA.
Disable rekey and reauthentication for clients on call
Shows if the rekey and reauthentication features for voice-over-WLAN clients has been enabled or disabled.
Check certificate common name against AAA server
If enabled, this parameter verifies that the certificate's common name exists in the server. This parameter is disabled by default dot1x profiles.
Related Commands
Command aaa authentication dot1x
Description
Mode
If you do not yet have any 802.1X authentication profiles defined, use the command aaa authentication dot1x to configure your 802.1X profiles.
Config mode
Command History
Version AOS-W 3.0 AOS-W 6.1
Description
Command introduced.
The Check certificate common name against AAA server, Enforce Suite-b-128 and Enforce Suite-b-192 parameters were introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa authentication dot1x | 575
show aaa authentication mac
show aaa authentication mac [<profile-name>]
Description
This command shows information for MAC authentication profiles.Issue this command without the <profile-name> option to display the entire MAC Authentication profile list, including profile status and the number of references to each profile. Include a profile name to display detailed MAC authentication configuration information for that profile.
Syntax
Parameter <profile-name>
Description The name of an existing MAC authentication profile.
Examples
The output of the example below shows two MAC authentication profiles, default and macProfile1, which are referenced three times by other profiles. the Profile Status columns are blank, indicating that these profiles are both user-defined. (If a profile is predefined, the value Predefined appears in the Profile Status column.)
(host) #show aaa authentication dot1x pDot1x
802.1X Authentication Profile "pDot1x" -------------------------------------Parameter --------Max authentication failures Enforce Machine Authentication Machine Authentication: Default Machine Role Machine Authentication Cache Timeout Blacklist on Machine Authentication Failure Machine Authentication: Default User Role Interval between Identity Requests Quiet Period after Failed Authentication Reauthentication Interval Use Server provided Reauthentication Interval Multicast Key Rotation Time Interval Unicast Key Rotation Time Interval ...
Value ----0 Disabled guest 24 hrs Disabled guest 30 sec 30 sec 86400 sec Disabled 1800 sec 900 sec
The following example displays configuration details for the MAC authentication profile "MacProfile1," including the delimiter and case used in the authentication request, and the maximum number of times a client can fail to authenticate before it is blacklisted.
(host) #show aaa authentication mac MacProfile1
MAC Authentication Profile "MacProfile1"
----------------------------------------
Parameter
Value
---------
-----
Delimiter
colon
Case
upperMax Authentication failures 3
576 | show aaa authentication mac
AOS-W 6.2 | Reference Guide
Related Commands
Command aaa authentication mac
Description
Configure MAC authentication values on your switch.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa authentication mac | 577
show aaa authentication mgmt
show aaa authentication mgmt
Description
This command displays administrative user authentication information, including management authentication roles and servers.
Usage Guidelines
Issue this command to identify the default management role assigned to authenticated administrative users, and the name of the group of servers used to authenticate these users.
Example
The output of the following example displays management authentication information for your switch.
(host) #show aaa authentication mgmt
Management Authentication Profile
---------------------------------
Parameter
Value
---------
-----
Default Role root
Server Group ServerGroup1
Enable
Enabled
Parameter Default Role
Server Group Enable
Description
This parameter shows which of the following roles the switch uses for authentication management. l root, the super user role (default). l guest-provisioning, guest provisioning role. l network-operations, network operator role. l read-only, read only role. l location-api-mgmt, location API management role. l no-access, no commands are accessible.
The name of a server group.
The Enable parameter indicates whether or not this feature is enabled or disabled.
The output of the show aaa authentication mgmtcommand includes the following parameters: Related Commands
Command aaa authentication mgmt
Description Configure management authentication settings.
Mode Config mode
578 | show aaa authentication mgmt
AOS-W 6.2 | Reference Guide
Command History
Version AOS-W 3.0 AOS-W 6.1
Description Command introduced. The Mode parameter in the command output was renamed Enable.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa authentication mgmt | 579
show aaa authentication stateful-dot1x
show aaa authentication stateful-dot1x [config-entries]
Description
This command displays configuration settings for 802.1X authentication for clients on non-Alcatel-Lucent APs.
Syntax
Parameter config-entries
Description Display details for the AP Server configuration list.
Usage Guidelines
Issue this command to identify the default role assigned to the 802.1X user group, name of the group of RADIUS servers used to authenticate the 802.1X users, and the 802.1X authentication timeout period, in seconds.
Example
The output of the following example displays 802.1X authentication information for your switch.
(host) #show aaa authentication stateful-dot1x
Stateful 802.1X Authentication Profile
--------------------------------------
Parameter
Value
---------
-----
Default Role guest
Server Group newgroup2
Timeout
10 sec
Mode
Enabled
Parameter Default Role
Server Group Timeout Mode
Description This parameter shows which role the switch uses for 802.1X authentication management. The name of a server group. Timeout period for an authentication request, in seconds. The Mode parameter indicates whether or not this feature is enabled or disabled.
The output of this command includes the following parameters: When you include the config-entries parameter, the output shows the AP - Server Configuration List.
(host) #show aaa authentication stateful-dot1x config-entries
AP-Server Configuration List ---------------------------Cfg-Name AP-IP
Server
Shared-Secret
580 | show aaa authentication stateful-dot1x
AOS-W 6.2 | Reference Guide
-------- ----cfg22
Parameter Cfg-Name AP-IP Server Shared-Secret
10.3.14.6
-----RADIUS1
Description is a auto-generated name IP address of the AP. Name of the authentication server. Shared authentication secret.
------------secret-pwd
The output of this command includes the following parameters:
Related Commands
Command
aaa authentication statefuldot1x
Description
Use the command aaa authentication statefuldot1x to configure the settings displayed in the output of this show command.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa authentication stateful-dot1x | 581
show aaa authentication stateful-ntlm
show aaa authentication stateful-ntlm
Description
This command displays configuration settings for the Stateful NTLM Authentication profile.Issue this command without the <profile-name> option to display the entire Stateful NTLM Authentication profile list, including profile status and the number of references to each profile. Include a profile name to display detailed Stateful NTLM authentication configuration information for that profile.
Syntax
Parameter <profile-name>
Description The name of an existing Stateful NTLM authentication profile.
Usage Guidelines
Issue this command to identify the default role assigned to users who have successfully authenticated using the NT LAN Manager (NTLM) authentication protocol, the name of the group of windows servers used to authenticate these users, and the NTLM authentication timeout period, in seconds.
Examples
The output of the example below shows two stateful NTLM authentication profiles, default and NTLMprofile1, which are each referenced one time by other profiles. the Profile Status columns are blank, indicating that these profiles are both user-defined. (If a profile is predefined, the value Predefined appears in the Profile Status column.)
(host) #show aaa authentication stateful-ntlm
Stateful NTLM Authentication Profile List
-----------------------------------------
Name
References Profile Status
----
---------- --------------
default
1
NTLMprofile1
1
Total:2 The following example displays configuration details for the stateful NTLM authentication profile "default".
(host) #show aaa authentication stateful-ntlm default
Stateful NTLM Authentication Profile "default"
----------------------------------------------
Parameter
Value
---------
-----
Default Role guest
Server Group default
Mode
Disabled
Timeout
10 sec
582 | show aaa authentication stateful-ntlm
AOS-W 6.2 | Reference Guide
Parameter Default Role Server Group Mode
Timeout
Description This parameter shows the role assigned to NTLM authenticated users. The name of a windows server group. The Mode parameter indicates whether or not this authentication profile is enabled or disabled. Timeout period for an authentication request, in seconds.
The output of this command includes the following parameters:
Related Commands
Command aaa authentication stateful-ntlm
Description
Use the command aaa authentication stateful-ntlm to configure the settings displayed in the output of this show command.
Command History
This command was introduced in AOS-W 3.4.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa authentication stateful-ntlm | 583
show aaa authentication via auth-profile
show aaa authentication via auth-profile [<profile-name>]
Description
This command displays configuration settings for the VIA Authentication profile.Issue this command without the <profile-name> option to display the entire VIA Authentication profile list, including profile status and the number of references to each profile. Include a profile name to display detailed VIA authentication configuration information for that profile.
Syntax
Parameter <profile-name>
Description The name of an existing VIA authentication profile.
Usage Guidelines
Issue this command without the <profile-name> parameter to display the entire VIA Authentication profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
If you do not yet have any VIA authentication profiles defined, use the command aaa authentication via authprofile to configure your VIA authentication profiles.
Examples
This first example shows that there are three configured captive portal profiles in the Captive Profile Authentication Profile List. The References column lists the number of other profiles with references to a VIA authentication profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
(host) #show aaa authentication via auth-profile
VIA Authentication Profile List
-------------------------------
Name
References Profile Status
----
---------- --------------
default 0
via1
2
via2
1
Total:3
Include a VIA authentication profile name to display a complete list of configuration settings for that profile. The example below shows settings for the VIA authentication profile via1.
VIA Authentication Profile "via1"
---------------------------------
Parameter
Value
---------
-----
Default Role
default-via-role
Server Group
internal
Max Authentication failures 2
Description
VIA config for the MV office
584 | show aaa authentication via auth-profile
AOS-W 6.2 | Reference Guide
The output of this command includes the following parameters:
Parameter Default Role Server Group Max Authentication failures Description
Description Role assigned to the captive portal user upon login. Name of the group of servers used to authenticate captive portal users. Maximum number of authentication failures before the user is blacklisted.
Description of the VIA authentication profile.
Related Commands
Command
aaa authentication via authprofile
Description
Use aaa authentication via auth-profile to configure the parameters displayed in the output of this show command.
Mode Config mode
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa authentication via auth-profile | 585
show aaa authentication via connection-profile
show aaa authentication via connection-profile [<profile-name>]
Description
This command displays configuration settings for the VIA connection profile.Issue this command without the <profile-name> option to display the entire VIA Connection profile list, including profile status and the number of references to each profile. Include a profile name to display detailed VIA connection configuration information for that profile.
Syntax
Parameter <profile-name>
Description The name of an existing VIA connection profile.
Usage Guidelines
Issue this command without the <profile-name> parameter to display the entire VIA connection profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
If you do not yet have any VIA connection profiles defined, use the command aaa authentication via connectionprofile to configure your VIA connection profiles.
Examples
This first example shows that there are three configured connection profiles in the Captive Profile Authentication Profile List. The References column lists the number of other profiles with references to a VIA connection profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
(host) #show aaa authentication via connection-profile
VIA Connection Profile List
---------------------------
Name
References Profile Status
----
---------- --------------
connection_1 3
connection_2 1
default
0
Total:3
Include a connection profile name to display a complete list of configuration settings for that profile. The example below shows settings for the captive portal profile connection_1.
VIA Connection Profile "default" -------------------------------Parameter --------VIA Servers Client Auto-Login VIA Authentication Profiles to provision Allow client to auto-upgrade
Value ----N/A Enabled N/A Enabled
586 | show aaa authentication via connection-profile
AOS-W 6.2 | Reference Guide
VIA tunneled networks Enable split tunneling VIA Client WLAN profiles Allow client side logging VIA IKE V2 Policy VIA IKE Policy Use Windows Credentials Enable IKEv2 Use Suite B Cryptography IKEv2 Authentication method VIA IPSec V2 Crypto Map VIA IPSec Crypto Map Allow user to save passwords Enable Supplicant Enable FIPS Module Auto-launch Supplicant Lockdown All Settings Domain Suffix in VIA Authentication Enable Controllers Load Balance Enable Domain Pre-connect VIA Banner Message Reappearance Timeout(minutes) VIA Client Network Mask Validate Server Certificate VIA Client DNS Suffix List VIA max session timeout VIA Logon Script VIA Logoff Script VIA Support E-Mail Address Maximum reconnection attempts VIA external download URL Allow user to disconnect VIA Content Security Gateway URL Comma seperated list of HTTP ports to be inspected (apart from default port 80) Enable Content Security Services Keep VIA window minimized Block traffic until VPN tunnel is up Block traffic rules
The output of this command includes the following parameters:
N/A Disabled N/A Enabled Default Default Enabled Disabled Disabled user-cert default-ikev2-dynamicmap/10000 default-dynamicmap/10000 Enabled Disabled Disabled Disabled Disabled Disabled Disabled Enabled 60 255.255.255.255 Enabled N/A 1440 min N/A N/A N/A 3 N/A Enabled N/A
N/A Disabled Disabled Disabled N/A
Configuration Option
Description
VIA servers
Displays the following information about the VIA server: l Switch Hostname/IP Address: This is the public IP address or the DNS
hostname of the VIA switch. Users will connect to remote server using this IP address or the hostname. l Switch Internal IP Address: This is the IP address of any of the VLAN interface IP addresses belongs to this switch. l Switch Description: This is a human-readable description of the switch.
Client Auto-Login
Enable or disable VIA client to auto login and establish a secure connection to the switch. Default: Enabled
VIA Authentication
This is the list of VIA authentication profiles that will be displayed to users in the
Profiles to provision VIA client.
Allow client to auto- Enable or disable VIA client to automatically upgrade when an updated version
upgrade
of the client is available on the switch.
AOS-W 6.2 | Reference Guide
show aaa authentication via connection-profile | 587
Configuration Option
Description
Default: Enabled
VIA tunneled networks
A list of network destination (IP address and netmask) that the VIA client will tunnel through the switch. All other network destinations will be reachable directly by the VIA client.
Enable splittunneling
Enable or disable split tunneling. l If enabled, all traffic to the VIA tunneled networks will go through the switch
and the rest is just bridged directly on the client. l If disabled, all traffic will flow through the switch. Default: off
Allow client-side logging
Enable or disable client side logging. If enabled, VIA client will collect logs that can be sent to the support email-address for troubleshooting. Default: Enabled
VIA Client WLAN profiles
A list of VIA client WLAN profiles that needs to be pushed to the client machines that use Windows Zero Config (WZC) to configure or manage their wireless networks.
VIA IKEv2 Policy
A list of IPsec crypto maps that the VIA client uses to connect to the switch. These IPsec Crypto Maps are configured in the CLI using the crypto-local ipsecmap <ipsec-map-name> command.
VIA IKE Policy
List of IKE policies that the VIA Client has to use to connect to the switch.
Use Windows Credentials
Enable or disable the use of the Windows credentials to login to VIA. If enabled, the SSO (Single Sign-on) feature can be utilized by remote users to connect to internal resources. Default: Enabled
Enable IKEv2
Select this option to enable or disable the use of IKEv2 policies for VIA.
Use Suite B Cryptography
Select this option to use Suite B cryptography methods. You must install the Advanced Cryptography license to use the Suite B cryptography.
IKEv2 Authentication method
List of all IKEv2 authentication methods.
VIA IPSec V2 Crypto Map
List of all IPSec V2 that the VIA client uses to connect to the switch.
VIA IPsec Crypto Map
List of IPsec Crypto Map that the VIA client uses to connect to the switch. These IPsec Crypto Maps are configured in CLI using the crypto-local ipsec-map <ipsec-map-name> command.
Allow user to save passwords
Enable or disable users to save passwords entered in VIA. Default: Enabled
Enable Supplicant
If enabled, VIA starts in bSec mode using L2 suite-b cryptography. This option is disabled by default.
Enable FIPS Module
Shows if the VIA (Federal Information Processing Standard) FIPS module is enabled, so VIA checks for FIPS compliance during startup. This option is disabled by default.
Auto-Launch Supplicant
Select this option to automatically connect to a configured WLAN network.
588 | show aaa authentication via connection-profile
AOS-W 6.2 | Reference Guide
Configuration Option
Description
Lockdown All Settings If enabled, all user options on the VIA client are disabled.
Domain Suffix in VIA Authentication
Enables a domain suffix on VIA Authentication, so client credentials are sent as domainname\username instead of just username.
Enable Switches Load Balance
This option allows the VIA client to failover to the next available selected randomly from the list as configured in the VIA Servers option. If disabled, VIA will failover to the next in the sequence of ordered list of VIA Servers.
Enable Domain PreConnect
This option allows users with lost or expired passwords to establish a VIA connection to corporate network. This option authenticates the user's device and establishes a VIA connection that allows users to reset credentials and continue with corporate access.
VIA Banner Reappearance Timeout
The maximum time (in minutes) allowed before the VIA login banner reappears. Default: 1440 min
VIA Client Network Mask
The network mask that has to be set on the client after the VPN connection is established. Default: 255.255.255.255
Validate Server Certificate
Enable or disable VIA from validating the server certificate presented by the switch. Default: Enabled
VIA Client DNS Suffix List
The DNS suffix list (comma separated) that has be set on the client once the VPN connection is established. Default: None.
VIA max session timeout
The maximum time (minutes) allowed before the VIA session is disconnected. Default: 1440 min
VIA Logon Script
Name of the logon script that must be executed after VIA establishes a secure connection. The logon script must reside in the client computer.
VIA Logoff Script
Name of the log-off script that must be executed after the VIA connection is disconnected. The logoff script must reside in the client computer.
VIA Support E-mail Address
The support e-mail address to which VIA users will send client logs. Default: None.
Maximum reconnection attempts
The maximum number of re-connection attempts by the VIA client due to authentication failures. Default: 3
VIA external download End users will use this URL to download VIA on their computers. URL
Allow user to disconnect VIA
Enable or disable users to disconnect their VIA sessions. Default: Enabled
Content Security Gateway URL
If split-tunnel forwarding is enabled, access to external (non-corporate) web sites will be verified by the specified content security service provider.
Comma Separated List of HTTP Ports
Traffic from the specified ports will be verified by the content security service provider.
AOS-W 6.2 | Reference Guide
show aaa authentication via connection-profile | 589
Configuration Option Enable Content Security Services
Keep VIA window minimized
Block traffic until VPN tunnel is up
Block traffic rules
Description
Select this checkbox to enable content security service. You must install the Content Security Services licenses to use this option.
Enable this option to minimize the VIA client to system tray during the connection phase. Applicable to VIA client installed in computers running Microsoft Windows operating system.
If enabled, this feature will block network access until the VIA VPN connection is established.
Specify a hostname or IP address and network mask to define a whitelist of users to which the Block traffic until VPN tunnel is up setting will not apply.
Related Commands
Command aaa authentication via connection-profile
Description
Use aaa authentication via connectionprofile to configure the parameters displayed in the output of this show command.
Mode Config mode
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
590 | show aaa authentication via connection-profile
AOS-W 6.2 | Reference Guide
show aaa authentication via web-auth
show aaa authentication via web-auth [default]
Description
A VIA web authentication profile contains an ordered list of VIA authentication profiles. The web authentication profile is used by end users to login to the VIA download page (https://<server-IP-address>/via) for downloading the VIA client. Only one VIA web authentication profile is available. If more than one VIA authentication profile is configured, users can view this list and select one during the client login.
Syntax
No parameters.
Usage Guidelines
Issue this command to view the authentication profiles associated with the default web authentication profile. Use it without the profile name to see the list of authentication profiles.
Examples
(host) #show aaa authentication via web-auth
VIA Web Authentication List
---------------------------
Name
References Profile Status
----
---------- --------------
default 2
Total:1
(host) #show aaa authentication via web-auth default
VIA Web Authentication "default"
--------------------------------
Parameter
Value
---------
-----
VIA Authentication Profiles via1
The output of this command includes the following parameters:
Parameter
VIA Authentication Profiles
Description
This is the name of the VIA authentication profile. The value column displays the order of priority in which the profiles are displayed in the VIA client login.
Related Commands
Command
Description
aaa authentication via webauth
Use aaa authentication via web-auth to configure the parameters displayed in the output of this show command.
Mode Config mode
AOS-W 6.2 | Reference Guide
show aaa authentication via web-auth | 591
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
592 | show aaa authentication via web-auth
AOS-W 6.2 | Reference Guide
show aaa authentication vpn
show aaa authentication vpn [default|default-cap|default-rap]
Description
This command displays VPN authentication settings, including authentication roles and servers.
Usage Guidelines
Issue this command to identify the default role assigned to VPN users, the name of the group of servers used to authenticate the VPN users, and the maximum number of authentication failures allowed before the user is blacklisted.
Example
The following example displays configuration details for the VPN authentication profile default, default-cap and default-rap. (host) #show aaa authentication vpn default
VPN Authentication Profile "default"
------------------------------------
Parameter
Value
---------
-----
Default Role
default-vpn-role
Server Group
default
Max Authentication failures 2
(TechPubs) #show aaa authentication vpn default-cap
VPN Authentication Profile "default-cap" (Predefined)
-----------------------------------------------------
Parameter
Value
---------
-----
Default Role
ap-role
Server Group
internal
Max Authentication failures 0
(TechPubs) #show aaa authentication vpn default-rap
VPN Authentication Profile "default-rap" (Predefined (changed))
---------------------------------------------------------------
Parameter
Value
---------
-----
Default Role
default-vpn-role
Server Group
default
Max Authentication failures 0
Parameter Default Role Server Group Max Authentication failures
Description The default role to be assigned to VPN users. The name of the server group that performs the authentication. Number of times a user attempted to authenticate, but failed.
AOS-W 6.2 | Reference Guide
show aaa authentication vpn | 593
Related Commands
Command aaa authentication via authprofile
Description
Mode
Use the command aaa authentication via authprofile to configure the settings displayed in the output of this show command.
Config mode
Command History
Version AOS-W 3.0 AOS-W 5.0 AOS-W 6.1
Description Command introduced.
The default-cap and default-rap profiles were introduced.
The Check certificate common name against AAA server parameter was introduced.
Command Information
Platforms All platforms
Licensing
The PEFV license and the base operating system.
Command Mode
Enable or Config mode on master or local switches
594 | show aaa authentication vpn
AOS-W 6.2 | Reference Guide
show aaa authentication wired
show aaa authentication wired
Description
View wired authentication settings for a client device that is directly connected to a port onthe switch.
Usage Guidelines
This command displays the name of the AAA profile currently used for wired authentication.
Example
The following example shows the current wired profile for the switch is a profile named "secure_profile_3." (host) #show aaa authentication wired Wired Authentication Profile ---------------------------Parameter Value --------- ----AAA Profile Secure_profile_3
Related Commands
Command aaa authentication wired
Description
Use the command aaa authentication wired to configure the settings displayed in the output of this show command.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa authentication wired | 595
show aaa authentication wispr
show aaa authentication wispr <profile-name)
Description
This command shows information for a WISPr authentication profiles.Issue this command without the <profile-name> option to display the entire WISPr Authentication profile list, including profile status and the number of references to each profile. Include a profile name to display detailed WISPr authentication configuration information for that profile.
Parameter <profile-name>
Description The name of an existing MAC authentication profile.
Examples
The output of the example below shows two WISPr authentication profiles, default and WISPR1, which are referenced two times by other profiles. the Profile Status columns are blank, indicating that these profiles are both user-defined. (If a profile is predefined, the value Predefined appears in the Profile Status column.)
(host) #show aaa authentication wispr
WISPr Authentication Profile List
-------------------------------
Name
References Profile Status
----
---------- --------------
default
2
WISPr1 2
Total:2
(host) #show aaa authentication wispr WISPr1
WISPr Authentication Profile "WISPr1"
--------------------------------------
Parameter
Value
---------
-----
Default Role
guest
Server Group
default
Logon wait minimum wait
5 sec
Logon wait maximum wait
10 sec
logon wait CPU utilization threshold 60 %
WISPr Location-ID ISO Country Code US
WISPr Location-ID E.164 Country Code 1
WISPr Location-ID E.164 Area Code
408
WISPr Location-ID SSID/Zone
Corp1
WISPr Operator Name
MyCompany
WISPr Location Name
Sunnyvale
The following example displays configuration details for the WISPr authentication profile "WISPr1".
(host) #show aaa authentication wispr WISPr1
WISPr Authentication Profile "WISPr1"
--------------------------------------
Parameter
Value
596 | show aaa authentication wispr
AOS-W 6.2 | Reference Guide
--------Default Role Server Group Logon wait minimum wait Logon wait maximum wait logon wait CPU utilization threshold WISPr Location-ID ISO Country Code WISPr Location-ID E.164 Country Code WISPr Location-ID E.164 Area Code WISPr Location-ID SSID/Zone WISPr Operator Name WISPr Location Name
----guest default 5 sec 10 sec 60 % US 1 408 Corp1 MyCompany Sunnyvale
The output of this command includes the following parameters:
Parameter Default Role Server Group Logon wait minimum wait
Logon wait maximum wait
WISPr Location-ID E.164 Area Code WISPr Location-ID E.164 Country Code 1 WISPr Location-ID ISO Country Code WISPr Location-ID SSID/Zone WISPr Location Name WISPr Operator Name
Description
The default role to be assigned to users that have completed WISPr authentication.
The name of the server group that performs the authentication.
If the switch's CPU utilization has surpassed the Login wait CPU utilization threshold value, the Logon wait minimum wait parameter defines the minimum number of seconds a user will have to wait to retry a login attempt. Range: 1-10 seconds. Default: 5 seconds.
If the switch's CPU utilization has surpassed the logon wait CPU utilization threshold value, the Logon wait maximum wait parameter defines the maximum number of seconds a user will have to wait to retry a login attempt. Range: 1-10 seconds. Default: 10 seconds.
The E.164 Area Code in the WISPr Location ID.
The 1-3 digit E.164 Country Code in the WISPr Location ID.
The ISO Country Code in the WISPr Location ID.
The SSID/network name in the WISPr Location ID.
A name identifying the hotspot location. If no name is defined, the default ap-name is used.
A name identifying the hotspot operator.
Related Commands
Command aaa authentication wispr
Description
Configure WISPr authentication values on your switch.
Mode
Config mode on master or local switches.
Command History
This command was introduced in AOS-W 3.4.1.
AOS-W 6.2 | Reference Guide
show aaa authentication wispr | 597
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
598 | show aaa authentication wispr
AOS-W 6.2 | Reference Guide
show aaa authentication-server all
show aaa authentication-server all
Description
View authentication server settings for both external authentication servers and the internal switch database.
Usage Guidelines
The output of this command displays statistics for the Authentication Server Table, including the name and address of each server, server type and configured authorization and accounting ports.
Examples
The following command shows information for the internal Authentication server, and another RADIUS server named RADIUS-1. (host) #show aaa authentication-server all
Auth Server Table
-----------------
Name
Type FQDN IP addr
AuthPort
----
---- ---- -------
--------
Internal Local n/a 10.4.62.11 n/a
server Ldap n/a 0.0.0.0
389
server Radius SRVR1 127.9.9.61 1812
default Tacacs n/a 127.9.10.61 49
AcctPort -------n/a n/a 1813 n/a
Status -----Enabled Enabled Enabled Enabled
The following data columns appear in the output of this command:
Requests -------0 0 0 0
Parameter Name Type
FQDN IP addr AuthPort
AcctPort AcctPort Status Requests
Description Name of the authentication server.
The type of authentication server. AOS-W supports LDAP, RADIUS and TACACS+ servers, in addition to its own local, internal authentication server.
The Fully-Qualified Domain Name of the server, if configured.
IP address of the server, in dotted-decimal format.
Port number used for authentication. An LDAP server uses port 636 for LDAP over SSL, and port 389 for SSL over LDAP, Start TLS operation andclear text. The default RADIUS authentication port is port 1812.
Accounting port on the server. The default RADIUS accounting port is port 1813.
Accounting port on the server.
Shows whether the Authentication server is enable or disabled.
Number of authentication requests received by the server.
Command History
This command was introduced in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show aaa authentication-server all | 599
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
600 | show aaa authentication-server all
AOS-W 6.2 | Reference Guide
show aaa authentication-server internal
show aaa authentication-server internal [statistics]
Description
View authentication server settings for the internal switch database.
Examples
The output of the command below shows that the internal authentication server has been disabled
(host) #show aaa authentication-server internal
Internal Server
---------------
Host
IP addr
----
-------
Internal 10.168.254.221
Retries ------3
Timeout ------5
Status -----Disabled
The following data columns appear in the output of this command:
Parameter Host IP addr Retries
Timeout Status
Description Name of the internal authentication server. Address of the internal server, in dotted-decimal format. Number of retries allowed before the server stops attempting to authenticate a request. Timeout period, in seconds. Shows if the server is enabled of disabled
Include the statistics parameter to display additional details for the internal server.
(host) #show aaa authentication-server internal statistics
Internal Database Server Statistics
-----------------------------------
PAP Requests
8
PAP Accepts
8
PAP Rejects
0
MSCHAPv2 Requests
0
MSCHAPv2 Accepts
0
MSCHAPv2 Rejects
0
Mismatch Response
0
Users Expired
1
Unknown Response
0
Timeouts
1
AvgRespTime (ms)
0
Uptime (d:h:m)
4:3:32
SEQ first/last/free
1,255,255
The following data columns appear in the output of this command:
AOS-W 6.2 | Reference Guide
show aaa authentication-server internal | 601
Parameter PAP Requests PAP Accepts PAP Rejects MSCHAPv2 Requests MSCHAPv2 Accepts MSCHAPv2 Rejects Mismatch Response
Users Expired Unknown Response
Timeouts AvgRespTime (ms) Uptime (d:h:m) SEQ first/last/free
Description Number of PAP requests received by the internal server. Number of PAP requests accepted by the internal server. Number of PAP requests rejected by the internal server. Number of MSCHAPv2 requests received by the internal server. Number of MSCHAPv2 requests accepted by the internal server. Number of MSCHAPv2 requests rejected by the internal server. Number of times the server received an authentication response to a request after another request had been sent. Number of users that were deauthenticated because they stopped responding. Number of times the server did not recognize the response, possibly due to internal errors. Number of times that the switch timed out an authentication request. Time it takes the server to respond to an authentication request, in seconds. Time elapsed since the last server reboot. This internal buffer counter keeps track of the requests to the authentication server.
Related Commands
Command aaa authentication-server internal
Description
Issue the command aaa authentication-server internal to use the internal database on a local switch for authenticating clients.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
602 | show aaa authentication-server internal
AOS-W 6.2 | Reference Guide
show aaa authentication-server ldap
show aaa authentication-server ldap [<ldap_server_name>]
Description
Display configuration settings for your LDAP servers.
Syntax
Parameter <ldap_server_name>
Description Name that identifies an LDAP server.
Examples
The output of the example below displays the LDAP server list with the names of all the LDAP servers. The References column lists the number of other profiles that reference an LDAP server, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
(host) #aaa authentication-server ldap
LDAP Server List ---------------Name References ---- ---------ldap1 5 ldap2 3 ldap3 1
Profile Status --------------
Total:3 Include the <ldap_server_name> parameter to display additional details for an individual server. (host) #show aaa authentication-server ldap ldap1
LDAP Server "ldap1" ------------------Parameter --------Host Admin-DN Admin-Passwd Allow Clear-Text Auth Port Base-DN Filter Key Attribute Timeout Mode Preferred Connection Type
Value ----10.1.1.234 cn=corp,cn=Users,dc=1m,dc=corp,dc=com ******** Disabled 389 cn=Users,dc=1m,dc=corp,dc=com (objectclass=*) sAMAccountName 20 sec Enabled ldap-s
The output of this command includes the following parameters:
AOS-W 6.2 | Reference Guide
show aaa authentication-server ldap | 603
Parameter host Admin-DN
Admin Passwd Allow Clear-Text
Auth Port
Base-DN Filter
Key attribute Timeout Mode Preferred Connection Type
Description
IP address of the LDAP server
Distinguished name for the admin user who has read/search privileges across all of the entries in the LDAP database.
Password for the admin user.
If enabled, this parameter allows clear-text (unencrypted) communication with the LDAP server.
Port number used for authentication. Port 636 will be attempted for LDAP over SSL, while port 389 will be attempted for SSL over LDAP, Start TLS operation and clear text.
Distinguished Name of the node which contains the required user database.
Filter that should be applied to search of the user in the LDAP database (default filter string is: ì(objectclass=*)î ).
Attribute that should be used as a key in search for the LDAP server.
Timeout period of a LDAP request, in seconds.
Shows whether this server is Enabled or Disabled.
Preferred type of connection to the server. Possible values are l Clear text l LDAP-S l START-TLS
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
604 | show aaa authentication-server ldap
AOS-W 6.2 | Reference Guide
show aaa authentication-server radius
show aaa authentication-server radius [<rad_server_name>|statistics]
Description
Display configuration settings for your RADIUS servers.
Syntax
Parameter <rad_server_name>
Description Name that identifies a RADIUS server.
Examples
The output of the example below displays the RADIUS server list with the names of all the RADIUS servers. The References column lists the number of other profiles that reference a RADIUS server, and the Profile Status column indicates whether the profile is predefined. User-defined servers will not have an entry in the Profile Status column.
(host) #aaa authentication-server radius
RADIUS Server List
------------------
Name
References
----
----------
myserver 3
radius
0
servername 0
Profile Status --------------
Total:3
To view additional statistics for all RADIUS servers, include the statistics parameter. Include the <rad_server_ name> parameter to display additional details for an individual server.
(host) #show aaa authentication-server radius SMOKERAD
RADIUS Server "SMOKERAD" ------------------------
Parameter --------Host Key Auth Port Acct Port Retransmits Timeout NAS ID NAS IP Source Interface Use MD5 Mode
Value ----127.0.0.1 ******** 1812 1813 3 5 sec N/A N/A 5 Disabled Enabled
The output of this command includes the following information:
AOS-W 6.2 | Reference Guide
show aaa authentication-server radius | 605
Parameter host Key Acct Port auth port Retransmits
Timeout
NAS ID NAS IP
Source Interface Use MD5 Mode
Description IP address of the RADIUS server Shared secret between the switch and the authentication server. Accounting port on the server. Authentication port on the server. Maximum number of retries sent to the server by the switch before the server is marked as down. Maximum time, in seconds, that the switch waits before timing out the request and resending it. Network Access Server (NAS) identifier to use in RADIUS packets. NAS IP address to send in RADIUS packets. If you do not configure a serverspecific NAS IP, the global NAS IP is used. The source interface VLAN ID number. If enabled, the RADIUS server will use a MD5 hash of cleartext password. Shows whether this server is Enabled or Disabled.
The output of this command includes the following parameters:
Command History
Version AOS-W 3.0 AOS-W 6.1
Description Command introduced. The Source Interface parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
606 | show aaa authentication-server radius
AOS-W 6.2 | Reference Guide
show aaa authentication-server tacacs
show aaa authentication-server tacacs [<tacacs_server_name>]|statistics
Description
Display configuration settings for your TACACS+ servers.
Syntax
Parameter
Description
<tacacs_server_name> Name that identifies an TACACS+ server.
statistics
Displays accounting, authorization, and authentication request and response statistics for the TACACS server.
Examples
The output of the example below displays the TACACS+ server list with the names of all the TACACS+ servers. The References column lists the number of other profiles that reference a TACACS+ server, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
(host) #aaa authentication-server tacacs
TACACS Server List
----------------
Name
----
LabAuth
5
TACACS1
3
Total:2
References Profile Status ---------- --------------
Include the <tacacs_server_name> parameter to display additional details for an individual server
(host) #show aaa authentication-server tacacs tacacs1
TACACS Server "tacacs1"
---------------------
Parameter Value
--------- -----
Host
10.1.1.16
Key
********
TCP Port
49
Retransmits 3
Timeout
20 sec
Mode
Enabled
AOS-W 6.2 | Reference Guide
show aaa authentication-server tacacs | 607
Parameter host Key TCP Port Retransmits
Timeout
Mode
Description IP address of the TACACS+ server
Shared secret between the switch and the authentication server.
TCP port used by the server.
Maximum number of retries sent to the server by the switch before the server is marked as down.
Maximum time, in seconds, that the switch waits before timing out the request and resending it.
Shows whether this server is Enabled or Disabled.
The output of this command includes the following parameters:
Command History
Release AOS-W 3.0 AOS-W 6.0
Modification Command introduced The Statistics parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
608 | show aaa authentication-server tacacs
AOS-W 6.2 | Reference Guide
show aaa authentication-server windows
show aaa authentication-server windows [<windows_server_name>]
Description
Display configuration settings for your Windows servers.
Syntax
Parameter
<windows_server_ name>
Description Name that identifies a Windows server.
Examples
The output of the example below displays the Windows server list with the names of all the Windows servers used for NTLM authentication. The References column lists the number of other profiles that reference a Windows server, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
(host) #aaa authentication-server tacacs
Windows Server List ---------------Name ---NTLM Windows2
1 1
References Profile Status ---------- --------------
Total:2 Include the <windows_server_name> parameter to display additional details for an individual server.
(host) #show aaa authentication-server windows Windows2
Windows Server "windows"
------------------------
Parameter
Value
---------
-----
Host
172.21.18.170
Mode
Enabled
Windows Domain MyCompanyDomain
Parameter host Mode Windows Domain
Description IP address of the Windows server Shows whether this server is Enabled or Disabled. Name of the Windows domain to which this server is assigned.
The output of this command includes the following parameters:
AOS-W 6.2 | Reference Guide
show aaa authentication-server windows | 609
Command History
This command was introduced in AOS-W 3.4.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
610 | show aaa authentication-server windows
AOS-W 6.2 | Reference Guide
show aaa bandwidth-contracts
show aaa bandwidth-contracts
Description
This command shows the contract names, ID numbers and Rate limits for your bandwidth contracts.
Example
The output of the following command shows that the bandwidth contract VLAN has a configured rate of 6 Mbps, and the contract User has a rate of 2048 Kbps. (host) #show aaa bandwidth-contracts
Bandwidth Contracts
-------------------
Contract Id Rate (bits/second)
-------- -- ------------------
VLAN
User
2
2048000
1 6000000
Total contracts = 2 Per-user contract total = 4096 Per-user contract usage = 0
Related Commands
Command aaa bandwidth-contract
Description
Use this command to define contracts to limit traffic for a user or VLAN.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa bandwidth-contracts | 611
show aaa derivation-rules
show aaa derivation-rules [server-group <group-name>|user <name>]
Syntax
Parameter <group-name> <name>
Description Name of a server group Name of a user rule group
Description
Show derivation rules based on user information or configured for server groups.
Example
The output of the following command shows that the server group group1 has the internal database configured as its authentication server, and that there is a single rule assigned to that group. You can omit the <group-name> parameter to show a table of all your server groups.
(host) #show aaa derivation-rules server-group group1
Server Group
Name
Inservice trim-FQDN match-FQDN
----
--------- --------- ----------
Internal
Yes
No
Server Rule Table
-----------------
Priority Attribute
-------- ---------
1
Filter-Id
Rule Entries: 1
Operation --------equals
Operand ------nsFilter
Action -----set vlan
Value ----111
Total Hits ---------24
New Hits --------
The following data columns appear in the output of this command:
Parameter Name Inservice trim-FDQN
match-FDQN Priority
Attribute
Description
Name of the authentication server assigned to this server group
Specifies if the server is in service or out-of-service.
If enabled, user information in an authentication request is edited before the request is sent to the server.
If enabled, the authentication server is associated with a specified domain.
The priority in which the rules are applied. Rules at the top of the list are applied before rules at the bottom.
This is the attribute returned by the authentication server that is examined for Operation and Operand match
612 | show aaa derivation-rules
AOS-W 6.2 | Reference Guide
Parameter Operation
Operand Action Value Total Hits New Hits
Description
This is the match method by which the string in Operand is matched with the attribute value returned by the authentication server. l contains The rule is applied if and only if the attribute value contains the
string in parameter Operand. l starts-with The rule is applied if and only if the attribute value returned starts
with the string in parameter Operand. l ends-with The rule is applied if and only if the attribute value returned ends
with the string in parameter Operand. l equals The rule is applied if and only if the attribute value returned equals
the string in parameter Operand. l not-equals The rule is applied if and only if the attribute value returned is not
equal to the string in parameter Operand. l value-of This is a special condition. What this implies is that the role or VLAN
is set to the value of the attribute returned. For this to be successful, the role and the VLAN ID returned as the value of the attribute selected must be already configured on the switch when the rule is applied.
This is the string to which the value of the returned attribute is matched.
This parameter identifies whether the rule sets a server group role (set role) or a VLAN (set vlan).
Sets the user role or VLAN ID to be assigned to the client if the condition is met.
Number of times the rule has been applied since the last server reboot.
Number of times the rule has been applied since the show aaa derivation-rules command was last issued.
To display derivation rules for a user group, include the user <name> parameter. You can also display a table of all user rules by including the user parameter, but omitting the <name> parameter
(host) #show aaa derivation-rules user user44
User Rule Table
---------------
Priority Attribute Operation Operand Action
Description
-------- --------- --------- ------- ------
-
1
location equals
ap23
Value Total Hits New Hits
----- ---------- --------
set role guest 56 guestrole1
The following data columns appear in the output of this command:
------
Parameter Priority Attribute Operation
Description
The priority in which the rules are applied. Rules at the top of the list are applied before rules at the bottom.
This is the attribute returned by the authentication server that is examined for Operation and Operand match.
This is the match method by which the string in Operand is matched with the attribute value returned by the authentication server. l contains The rule is applied if and only if the attribute value contains the
string in parameter Operand. l starts-with The rule is applied if and only if the attribute value returned starts
with the string in parameter Operand.
AOS-W 6.2 | Reference Guide
show aaa derivation-rules | 613
Parameter
Operand Action Value Total Hits New Hits Description
Description
l ends-with The rule is applied if and only if the attribute value returned ends with the string in parameter Operand.
l equals The rule is applied if and only if the attribute value returned equals the string in parameter Operand.
l not-equals The rule is applied if and only if the attribute value returned is not equal to the string in parameter Operand.
l value-of This is a special condition. What this implies is that the role or VLAN is set to the value of the attribute returned. For this to be successful, the role and the VLAN ID returned as the value of the attribute selected must be already configured on the switch when the rule is applied.
This is the string to which the value of the returned attribute is matched.
This parameter identifies whether the rule sets a server group role (set role) or a VLAN (set vlan).
Sets the user role or VLAN ID to be assigned to the client if the condition is met.
Number of times the rule has been applied since the last server reboot.
Number of times the rule has been applied since the show aaa derivation-rules command was last issued.
This optional parameter describes the rule. If no description was configured then it does not appear when you view the User Table.
Related Commands
Command aaa derivation-rules
Description
Use aaa derivation-rules to define the parameters displayed in the output of this show command.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
614 | show aaa derivation-rules
AOS-W 6.2 | Reference Guide
show aaa dns-query-interval
show aaa dns-query-interval <minutes>
Description
View the configured interval between DNS requests sent from the switch to the DNS server.
Syntax
No parameters
Usage Guidelines
If you define a RADIUS server using the FQDN of the server rather than its IP address, the switch will periodically generate a DNS request and cache the IP address returned in the DNS response. By default, DNS requests are sent every 15 minute, but the interval can be changed using the aaa dns-query-period command. Issue the show aaa dns-query-period command to view the current DNS query interval.
Example
This command shows that the switch will send a DNS query every 30 minutes
(host) # show aaa dns-query-period DNS Query Interval = 30 minutes
Related Commands
To configure the DNS query interval, issue the command aaa dns-query-interval.
Command History
This command was available in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show aaa dns-query-interval | 615
show aaa fqdn-server-names
show aaa fqdn-server-names
Description
Show a table of IP addresses that have been mapped to fully qualified domain names (FQDNs).
Syntax
No parameters.
Usage Guidelines
If you define a RADIUS server using the FQDN of the server rather than its IP address, the switch will periodically generate a DNS request and cache the IP address returned in the DNS response. Issue this command to view the IP addreses that currently correlate to each RADIUS server FQDN.
Example
The output of this command shows the IP addresses for two RADIUS servers.
(host) #show aaa fqdn-server-names
Auth Server FQDN names
---------------------
FQDN
IP Address
----
myhost1.example.com
Refcount ----------
--------
192.0.2.3
2myhost2.example.com
Related Commands
To configure a RADIUS authentication server using that server's fully qualified domain name, use the command aaa authentication-server radius.
Command History
This command was available in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
616 | show aaa fqdn-server-names
AOS-W 6.2 | Reference Guide
show aaa main-profile
show aaa main-profile summary
Description
Show a summary of all AAA profiles.
Example
The output of the show aaa main-profile summary command shows roles, server group settings, and wire-towireless-roaming statistics for each AAA profile. (host) #show aaa main-profile summary
AAA Profile summary -------------------
Name ---aaa_dot1x default default guest
role ---logon logon guest
mac-auth -------macprof2 macprof2 macprof1
dot1x- rad-
UDR- ww-
enforce
auth acct XML-api RFC3576 group roam devtype -dhcp
------ ----- ------- ------- ----- ------- ------- --------
dot1x RADIUS 10.3.1.15 10.3.15.2 Usr1 Disable enabled disabled
dot1x RADIUS 10.3.1.15 10.3.15.2 Usr1 Disable enabled disabled
default RADIUS 10.3.1.15 10.3.15.2 Usr2 Disable enabled disabled
The following data columns appear in the output of this command:
Parameter Name role mac-auth dot1x-auth rad-act XML-api RFC3576
UDR-group ww-roam devtype
enforce-dhcp
Description
Name of the AAA profile.
Role for unauthenticated users.
Name of the server group used for MAC authentication.
Name of the server group used for dot1x authentication.
Name of the server group used for RADIUS authentication.
IP address of a configured XML API server.
IP address of a RADIUS server that can send user disconnect and change-ofauthorization messages, as described in RFC 3576.
Name of the user derivation rule profile.
Shows if wired-to-wireless roaming is enabled or disabled.
Shows if the device identification feature is enabled or disabled. When devtypeclassification parameter is enabled, the output of the show user and show usertable commands shows each client's device type, if that client device can be identified.
When this option is enabled, clients must complete a DHCP exchange to obtain an IP address. Best practices are to enable this option when you use the aaa derivation-rules command to create a rule with the DHCP-Option rule type. This parameter is disabled by default.
AOS-W 6.2 | Reference Guide
show aaa main-profile | 617
Related Commands
Command aaa profile
Description
Use aaa profile define the parameters displayed in the output of this show command.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
618 | show aaa main-profile
AOS-W 6.2 | Reference Guide
show aaa password-policy mgmt
show aaa password-policy mgmt [statistics]
Description
Show the current password policy for management users.
Syntax
Parameter statistics
Description
Include this optional parameter to show the numbers of failed login attempts and any lockout periods for management user accounts.
Examples
The output of the show aaa password-policy mgmt command below shows that the current password policy requires a management user to have a password with a minimum of 9 characters, including one numeric character and one special character
(host) #show aaa password-policy mgmt
Mgmt Password Policy
--------------------
Parameter Value
--------- -----
Enable password policy
Yes
Minimum password length required
9
Minimum number of Upper Case characters
0
Minimum number of Lower Case characters
0
Minimum number of Digits
1
Minimum number of Special characters (!, @, #, $, %, ^, &, *, <, >, {, }, [, ], :, ., comma,
|, +, ~, `)
1
Username or Reverse of username NOT in Password
No
Maximum Number of failed attempts in 3 minute window to lockout user
0
Time duration to lockout the user upon crossing the "lock-out" threshold
3
Maximum consecutive character repeats
0
The following data columns appear in the output of this command:
Parameter
Description
Enable password policy
Shows if the defined policy has been enabled
Minimum password length Minimum number of characters required for a management user password. The
required
default setting is 6 characters.
Minimum number of Upper Case characters
The maximum number of uppercase letters required for a management user password. By default, there is no requirement for uppercase letters in a password, and the parameter has a default value of 0.
AOS-W 6.2 | Reference Guide
show aaa password-policy mgmt | 619
Parameter
Description
Minimum number of Lower Case characters
The maximum number of lowercase letters required for a management user password. By default, there is no requirement for lowercase letters in a password, and the parameter has a default value of 0.
Minimum number of Digits
Minimum number of numeric digits required in a management user password. By default, there is no requirement for digits in a password, and the parameter has a default value of 0.
Minimum number of Special characters
Minimum number of special characters required in a management user password. By default, there is no requirement for special characters in a password, and the parameter has a default value of 0.
Username or Reverse of username NOT in Password
If Yes, a management user's password cannot be the user's username or the username spelled backwards. If No, the password can be the username or username spelled backwards.
Maximum Number of failed attempts in 3 minute window to lockout user
Number of times a user can unsuccessfully attempt to log in to the switch before that user gets locked out for the time period specified by the lock-out threshold below. By default, the password lockout feature is disabled, and the default value of this parameter is 0 attempts.
Time duration to lockout the user upon crossing the "lock-out" threshold
Amount of time a management user will be "locked out" and prevented from logging into the switch after exceeding the maximum number of failed attempts setting show above. The default lockout time is 3 minutes.
Maximum consecutive character repeats
The maximum number of consecutive repeating characters allowed in a management user password. By default, there is no limitation on the numbers of character that can repeat within a password, and the parameter has a default value of 0 characters.
(host) #show aaa password-policy mgmt statistics
Management User Table --------------------USER ROLE FAILED_ATTEMPTS ---- ---- --------------admin14 root 1
STATUS -----Locked until 12/1/2009 22:28
Include the optional statistics parameter to show failed login statistics in the Management User table. The example below shows that a single failed login attempt locked out the root user admin14, and displays the time when that user can attempt to login to the switch again.
Related Commands
Command aaa profile
Description
Use aaa profile define the parameters displayed in the output of this show command.
Mode Config mode
Command History
This command was introduced in AOS-W 3.4.2.
620 | show aaa password-policy mgmt
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa password-policy mgmt | 621
show aaa profile
show aaa profile <profile-name>
Description
Show configuration details for an individual AAA profile.
Example
The output of the following command shows roles, servers and server group settings, and wire-to-wireless-roaming statistics for each AAA profile. (host) #show aaa profile default
AAA Profile "default" --------------------Parameter --------Initial role MAC Authentication Profile MAC Authentication Default Role MAC Authentication Server Group 802.1X Authentication Profile 802.1X Authentication Default Role 802.1X Authentication Server Group L2 Authenticaion Fail Through RADIUS Accounting Server Group RADIUS Interim Accounting XML API server RFC 3576 server User derivation rules Wired to Wireless Roaming SIP authentication role Device Type Classification Enforce DHCP
Value ----guest N/A guest default default guest N/A
Disabled N/A Disabled N/A N/A N/A Enabled N/A Enabled Disabled
The following data columns appear in the output of this command:
Parameter Name Initial Role MAC Authentication Profile MAC Authentication Default Role
MAC Authentication Server Group 8021.X Authentication Profile 8021.X Authentication Default Role
Description The name of the AAA profile. Role for unauthenticated users. Name of the MAC authentication profile. Configured role assigned to the user after MAC authentication. Name of the server group used for MAC authentication. Name of the 802.1X authentication profile. Configured role assigned to the user after 802.1X authentication.
622 | show aaa profile
AOS-W 6.2 | Reference Guide
Parameter 8021.X Authentication Server Group L2 Authentication Fail Through RADIUS Accounting Server Group RADIUS Interim Accounting
XML API server RFC 3576 server
User derivation rules Wired to Wireless Roaming SIP authentication role
device type classification
enforce DHCP
Description
Name of the server group used for 802.1X authentication.
To select the other authentication method if one fails.
Name of the server group used for RADIUS authentication.
By default, the RADIUS accounting feature sends only start and stop messages to the RADIUS accounting server. If RADIUS Interim Accounting is enabled, the switch to can also end Interim-Update messages with current user statistics to the server at regular intervals.
IP address of a configured XML API server.
IP address of a RADIUS server hat can send user disconnect and change-of-authorization messages, as described in RFC 3576.
Shows whether Wired to Wireless Roaming is Enabled or Disabled.
For switchs with an installed PEFNG license, this parameter displays the configured role assigned to a session initiation protocol (SIP) client upon registration.
Shows if the device identification feature is enabled or disabled. When devtype-classification parameter is enabled, the output of the show user and show user-table commands shows each client's device type, if that client device can be identified.
When this option is enabled, clients must complete a DHCP exchange to obtain an IP address. Best practices are to enable this option when you use the aaa derivation-rules command to create a rule with the DHCP-Option rule type. This parameter is disabled by default.
Related Commands
Command aaa profile
Description
Use the command aaa profile to define AAA profiles.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa profile | 623
624 | show aaa profile
AOS-W 6.2 | Reference Guide
show aaa radius-attributes
show aaa radius-attributes
Description
Show RADIUS attributes recognized by the switch.
Example
The output of the following command shows the name, currently configured value, type, vendor and RADIUS ID for each attribute. (host) #show aaa radius-attributes
Dictionary ---------Attribute --------MS-CHAP-NT-Enc-PW Suffix Menu Acct-Session-Time Framed-AppleTalk-Zone Connect-Info Acct-Ouput-Packets Aruba-Location-Id Service-Type Rad-Length CHAP-Password Aruba-Template-User Event-Timestamp Login-Service Exec-Program-Wait Tunnel-Password Framed-IP-Netmask Acct-Output-Gigawords MS-CHAP-CPW-2 Acct-Tunnel-Packets-Lost ...
Value ----6 1004 1001 46 39 77 48 6 6 310 3 8 55 15 1039 69 9 53 4 86
Type ---String String String Integer String String Integer String Integer Integer String String Date Integer String String IP Addr Integer String Integer
Vendor -----Microsoft
Aruba Aruba
Microsoft
Id -311
14823 14823
311
Related Commands
Command aaa profile
Description
Use the command aaa profile to define AAA profiles.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa radius-attributes | 625
626 | show aaa radius-attributes
AOS-W 6.2 | Reference Guide
show aaa rfc-3576-server
show aaa rfc-3576-server [statistics|<udp-port>]
Description
Show configuration details for an RFC-3576 server, which is a RADIUS server that can send user disconnect and change-of-authorization (CoA) messages, as described in RFC 3576.
Example
This first example shows that there are two configured servers in the RFC 3567 Server List. The References column lists the number of other profiles with references to the RFC 3567 server, and the Profile Status column indicates whether the server is predefined. User-defined servers will not have an entry in the Profile Status column.
(host) #show aaa rfc-3567-server
RFC 3576 Server List
--------------------
Name
References
----
----------
10.2.14.6 2
Profile Status --------------
To view details for all RFC 3576 servers, include the statistics parameter.
(host) #show aaa rfc-3576-server statistics
RADIUS RFC 3576 Statistics
--------------------------
Statistics
10.1.2.3 10.1.2.34
----------
-------- ---------
Disconnect Requests 13
3
Disconnect Accepts 12
3
Disconnect Rejects 1
0
No Secret
0
0
No Session ID
0
0
Bad Authenticator 0
0
Invalid Request
0
0
Packets Dropped
0
2
Unknown service
0
0
CoA Requests
1
0
CoA Accepts
1
0
CoA Rejects
0
0
No permission
0
0
Packets received from unknown clients: 0
Packets received with unknown request: 0
Total RFC3576 packets Received
:0
The output of the show aaa rfc-3576-server statistics command includes the following parameters:
Parameter Disconnect Requests
Description Number of disconnect requests sent by the server.
AOS-W 6.2 | Reference Guide
show aaa rfc-3576-server | 627
Parameter Disconnect Accepts Disconnect Rejects No Secret No Session ID Bad Authenticator
Invalid Request Packets Dropped Unknown service CoA Requests CoA Accepts CoA Rejects No permission
Description Number of disconnect requests sent by the server that were accepted by the user. Number of disconnect requests sent by the server that were rejected by the user. Number of authentication requests that did not contain a RADIUS secret. Number of authentication requests that did not contain a session ID. Number of authentication requests that contained a missing or invalid authenticator field in the packet. Number of invalid requests. Number of packets dropped. Number of requests for an unknown service type. Number of requests for a Change of Authorization (CoA). Number of times a CoA request was accepted. Number of times a CoA request was rejected. Number of requests for a service that has been defined, but has not been administratively enabled.
Related Commands
Command aaa rfc-3576-server
Description Define RFC 3576 server profiles.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
628 | show aaa rfc-3576-server
AOS-W 6.2 | Reference Guide
show aaa server-group
show aaa server-group [<group-name>|summary]
Description
Show configuration details for your AAA server groups.
Syntax
Parameter <group-name>
Description The name of an existing AAA server group.
Usage Guidelines
Issue this command without the ><group-name orsummary options to display the entire server group list, including profile status and the number of references to each profile. The References column lists the number of other profiles that reference a server group, and the Profile Status column indicates whether the server group is predefined. Userdefined server groups will not have an entry in the Profile Status column. Examples
This first example shows that there are five configured server groups
(host) #show aaa server-group summary
Server Group List ----------------Name ---auth-profile-2 coltrane-server-group default group1 internal
References ---------1 1 25 0 0
Profile Status --------------
Predefined
Total:5
To view additional statistics for all server groups, include the statistics parameter.
(host) #show aaa server-group summary
Server Groups
-------------
Name
Servers Rules
----
------- -----
auth-profile-2
1
0
coltrane-server-group 1
0
default
1
0
group1
1
1
internal
1
1
hits ---0 0 0 0 0
Out-of-service --------------
The output of the show aaa server-group summary command includes the following parameters:
AOS-W 6.2 | Reference Guide
show aaa server-group | 629
Parameter name Servers Rules hits Out-of-Service
Description Name of an existing AAA server group. Number of servers in the group. Number of rules configured for the server group. Number of hits for the server's rules. Indicates whether the server is active, or out of service. Active servers may not have an entry in the Out-of-Service column.
To display detailed authorization, role and vlan statistics for an individual server group, include the name of the group for which you want more information.
(host) #show aaa server-group summary group1
Fail Through:No
Auth Servers
------------
Name
Server-Type
----
-----------
rad1
Radius
rad3
Radius
trim-FQDN --------No No
Match-Type ----------
Match-Op --------
Match-Str ---------
Role/VLAN derivation rules
---------------------------
Priority Attribute Operation
-------- --------- ---------
1
class
Operand Action Value ------- ------ -----
contains admin set role
root
The output of the show aaa server-group <group-name> command includes the following parameters:
Parameter Name Server-Type trim-FDQN Match-Type
Match-Op
Description
Specifies if the server is in service or out-of-service.
If enabled, user information in an authentication request is edited before the request is sent to the server.
If enabled, user information in an authentication request is edited before the request is sent to the server.
If the match type is authstring he authentication server associates with a match rule that the switch can compare with the user/client information in the authentication request. A fdqn match type associates the authentication server with a specified domain. An authentication request is sent to the server only if there is an exact match between the specified domain and the <domain> portion of the user information sent in the authentication request.
This is the match method by which the string in Match-Str is matched with the attribute value returned by the authentication server. l contains The rule is applied if and only if the attribute value contains the
string in parameter Operand. l starts-with The rule is applied if and only if the attribute value returned starts
630 | show aaa server-group
AOS-W 6.2 | Reference Guide
Parameter
Match-Str Priority Attribute Operation
Operand Action Value
Description
with the string in parameter Operand. l ends-with The rule is applied if and only if the attribute value returned ends
with the string in parameter Operand. l equals The rule is applied if and only if the attribute value returned equals
the string in parameter Operand. l not-equals The rule is applied if and only if the attribute value returned is not
equal to the string in parameter Operand. l value-of This is a special condition. What this implies is that the role or VLAN
is set to the value of the attribute returned. For this to be successful, the role and the VLAN ID returned as the value of the attribute selected must be already configured on the switch when the rule is applied
This is the string to which the value of the returned attribute is matched.
The priority in which role or VLAN derivation rules are applied. Rules at the top of the list are applied before rules at the bottom.
For role or VLAN derivation rules, this is the attribute returned by the authentication server that is examined for Operation and Operand match.
For role or VLAN derivation rules, this is the match method by which the string in Operand is matched with the attribute value returned by the authentication server. l contains The rule is applied if and only if the attribute value contains the
string in parameter Operand. l starts-with The rule is applied if and only if the attribute value returned starts
with the string in parameter Operand. l ends-with The rule is applied if and only if the attribute value returned ends
with the string in parameter Operand. l equals The rule is applied if and only if the attribute value returned equals
the string in parameter Operand. l not-equals The rule is applied if and only if the attribute value returned is not
equal to the string in parameter Operand. l value-of This is a special condition. What this implies is that the role or VLAN
is set to the value of the attribute returned. For this to be successful, the role and the VLAN ID returned as the value of the attribute selected must be already configured on the switch when the rule is applied.
For role or VLAN derivation rules, this is the string to which the value of the returned attribute is matched.
This parameter identifies whether the derivation rule sets a server group role (set role) or a VLAN (set vlan).
Sets the user role or VLAN ID to be assigned to the client if the rule condition is met.
Related Commands
Command aaa server-group
Description
Use aaa server-group to configure the settings displayed in the output of this show command.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show aaa server-group | 631
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
632 | show aaa server-group
AOS-W 6.2 | Reference Guide
show aaa state ap-group
show aaa state ap-group
Description
Show the names and ID numbers of your AP groups
Example
This first example shows that the selected switch has two defined AP groups.
(host) #show aaa state ap-group
AP Group Table
--------------
Name ID
---- --
ap1
1
ap2
2
Related Commands
Command aaa server-group
Description
Use aaa server-group to define the AP groups displayed in the output of this show command
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
.
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa state ap-group | 633
show aaa state configuration
show aaa state configuration
Description
Display authentication state configuration information, including the numbers of successful and failed authentications.
Example
This example shows authentication settings and values for a switch with no current users.
(host) #show aaa state configuration
Authentication State -------------------Name ---Switch IP Master IP Switch Role Current/Max/Total IPv4 Users Current/Max/Total IPv6 Users Current/Max/Total User Entries Current/Max/Total Stations Captive Portal Users 802.1x Users VPN Users MAC Users Stateful 802.1x Users Tunneled users Configured user roles Configured session ACL Configured destinations Configured services Configured Auth servers Auth server in service Radius server timeouts
Value ----10.6.2.253 10.100.103.253 local 0/6/14 0/1/1 0/4/15 121/190/367550 4 119 0
0 0
0 21 41 32 77 9 9 7062
Successful authentications -------------------------Web MAC VPN 802.1x Krb --- --- --- ------ --138 0 0 10117 0
RadAcct ------0
SecureID -------0
Stateful-802.1x --------------0
Management ---------0
Failed authentications ---------------------Web MAC VPN 802.1x Krb --- --- --- ------ --48 0 0 32235 0
RadAcct ------0
SecureID -------0
Stateful-802.1x --------------0
Management ---------0
Idled users
= 3366
Mobility
= Enabled
fast age
= Disabled
Bandwidth contracts
= 2/1
IP takeovers
= 21
Ping/SYN/Session attacks = 0/0/0
634 | show aaa state configuration
AOS-W 6.2 | Reference Guide
The output of the show aaa state configuration command includes the following parameters:
Parameter
Description
Switch IP
IP address of the local switch.
Master IP
IP address of the master switch.
Switch Role
Role assigned to the switch on which you issued the show aaa state command.
Current/Max/Total IPv4 Users
Current number of IPv4 users on the switch/Maximum number of IPv4 users that can be assigned to the switch at any time/Total number of IPv4 users that have been assigned to the switch since the last switch reboot.
Current/Max/Total IPv6 Users
Current number of IPv6 users on the switch/Maximum number of IPv6 users that can be assigned to the switch at any time/Total number of IPv6 users that have been assigned to the switch since the last switch reboot.
Current/Max/Total Users
Current number of users on the switch/Maximum number of users that can be assigned to the switch at any time/Total number of users that have been assigned to the switch since the last switch reboot.
Current/Max/Total Stations
Current number of stations registered with the switch/Maximum number of stations that can be registered with the switch at any time/Total number of stations that have registered the switch since the last switch reboot.
Captive Portal Users
Number of current users authenticated via captive portal.
802.1x Users
Number of current users authenticated via 802.1X authentication.
VPN Users
Number of current users authenticated via VPN authentication.
MAC Users
Number of current users authenticated via MAC authentication.
Stateful 802.1x Users
Number of current users authenticated via stateful 802.1X authentication.
Tunneled users
Number of stations in tunneled forwarding mode, where 802.11 frames are tunneled to the switch using generic routing encapsulation (GRE).
Configured user roles
Number of configured user roles.
Configured session ACL
Number of configured session ACLs.
Configured destinations
Number of destinations configured using the netdestination command.
Configured services
Number of service aliases configured using the netservice command.
Configured Auth servers
Number of configured authentication servers.
Auth server in service
Number of authentication servers currently in service.
Radius server timeouts
Number of times the RADIUS server did not respond to the authentication request.
AOS-W 6.2 | Reference Guide
show aaa state configuration | 635
Parameter Web MAC VPN 802.1x Krb RadAcct SecureID
Stateful-802.1x Management Idled users Mobility fast age
Bandwidth contracts IP takeovers Ping/SYN/Session attacks
Description
Total number of captive portal authentications or authentication failures since the last switch reset.
Total number of MAC authentications or authentication failures since the last switch reset.
Total number of VPN authentications or authentication failures since the last switch reset.
Total number of 802.1X authentications or authentication failures since the last switch reset.
Total number of Kerberos authentications or authentication failures since the last switch reset.
Total number of RADIUS accounting verifications or accounting failures since the last switch reset.
Number of authentication verifications or failures using methods which use one-time passwords. (For example, EAP-GTC being used as the inner EAP protocol of EAP-PEAP.)
Total number of Stateful 802.1X authentications or authentication failures since the last switch reset.
Total number of Management user authentications or authentication failures since the last switch reset.
Total number of users that are not broadcasting data to an AP.
Shows whether the IP mobility feature has been enabled or disabled on the switch.
When the fast age feature allows the switch actively sends probe packets to all users with the same MAC address but different IP addresses. The users that fail to respond are purged from the system. This parameter shows if fast aging of user table entries has been enabled or disabled.
Number of configured bandwidth contracts on the switch.
Number of times a two different stations have attempted to use the same IP address (IP spoofing).
Number of reported ping, SYN and session attacks.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
636 | show aaa state configuration
AOS-W 6.2 | Reference Guide
show aaa state debug-statistics
show aaa state debug statistics
Description
show debug statistics for switch authentication, authorization and accounting.
Syntax
No parameters.
Example
The following example displays debug statistics for a variety of authentication errors:
(host) #show aaa state debug-statistics user miss: ARP=47, 8021Q=5216, non-IP=0, zero-IP=0, loopback=0 user miss: mac mismatch=0, spoof=269 (74), drop=390, ncfg=0 user miss: non-auth opcode=0, no-l2-user=0, l2tp=0, vrrp=0, special mac=0, iap l3 user=0 Idled users = 3376 Idled users due to MAC mismatch = 0 Idled users due to SOS: wireless tunnel=0 wireless dtunnel=0 Idled users due to SOS: wired tunnel=0 wired dtunnel=0 Idled users due to SOS: other=0 Idled users due STM deauth: tunnel=0 dtunnel=0 Idled users from STM timeout: tunnel=0 dtunnel=0 Idled users from STM: other=0 Current users with STM idle flag = 0 Idle messages: SOS=0 STM deauth=0 STM timeout=0 Logon lifetime iterations = 4501, entries deleted = 121 SIP authentication messages received 29227, dropped 29227 Missing auth user deletes: 0 Captive-portal forced user deletes: 1 Mobility Stats
INTRA_MS 0, MAC mismatch 0, HA mismatch 0 INTER_MS 0, MAC mismatch 0, HA mismatch 0 MIP Update 0, Move 0, Del 0, TunAcl 0 AAA Done 0, Del 2 IPIP Loop forced Del: 0, Validate Visitor 0 Auth User rejects Received L2 User:0, IPV4 :0, IPV6:0 Auth User rejects Processed L2 User:0, IPV4 :0, IPV6:0
The output of this command includes the following parameters:
Parameter User Miss
ARP 8021q
Description
Number of ARP packets sent between the datapath and the controlpath. Number of 802.1q (VLAN tag) packets sent between the datapath and the controlpath.
AOS-W 6.2 | Reference Guide
show aaa state debug-statistics | 637
Parameter
Description
non-ip
Number of non-IP type packets sent between the datapath and the controlpath.
zero-ip
Number of packets sent without an internet protocol (IP).
loopback
If 1, the switch has a defined loopback address. If 0, a loopback address has not yet been configured.
mac mismatch
Number of users that were not authenticated due to MAC mismatches.
spoof
Number of users that were not authenticated due to spoofed IP addresses.
drop
Number of user authentication attempts that were dropped.
ncfg
Number of packets sent between datapath and controlpath, where the authentication module has not completed the initialization required to process the traffic.
Non-auth opcode
Number of packets whose opcode is non-auth opcode. This is a check to find if auth is responsible for processing received packet.
No-l2-user
Number of user packets dropped due to absence ofan L2 entry for the user.
l2tp
Number of l2tp users.
vrrp
Number of VRRP users.
special mac
Number of users with a special MAC address.
iap
Number of instant AP users.
idled users
Number of inactive stations that are not broadcasting data to an AP.
idled users due to MAC mismatch
For internal use only.
Idled users due to SOS
wireless tunnel
Number of wireless users in tunnel forwarding mode that were aged out by the switch.
wireless dtunnel
Number of wireless users in decrypt tunnel forwarding mode that were aged out by the switch.
wired tunnel
Number of wired users in tunnel forwarding mode that were aged out by the switch.
wired dtunnel
Number of wired users in decrypt tunnel forwarding mode that were aged out by the switch.
Other
Number of users using modes other than tunnel or decrypt tunnel aged out by the switch.
Idled users due STM deauth
tunnel
Number of users in tunnel forwarding mode that aged out after STM deauthentication, and timer expiration.
638 | show aaa state debug-statistics
AOS-W 6.2 | Reference Guide
Parameter
Description
dtunnel
Number of users in decrypt tunnel forwarding mode that aged out after STM deauthentication, and timer expiration.
Idled users from STM timeout
tunnel
Number of users in tunnel forwarding mode that aged out after the STM timer expired.
dtunnel
Number of users in decrypt tunnel forwarding mode that aged out after the STM timer expired.
Idled users from STM
other
Number of users in fowarding modes other than decrypt tunnel or tunnel mode that aged out after the STM timer expired.
Logon lifetime iteration
Number of users deleted for lack of activity.
SIP authentication message
Number of session initiation protocol (SIP) authentication messages received.
Missing auth user deletes
Number of users removed from the datapath by the auth module, even without a mapping entry in control path. This counter can help identify problems with messages sent between the controlpath and the datapath.
Mobility Stats
Number of different messages exchanged between the mobile IP and the auth module. NOTE: This is used for troubleshooting purposes only.
Captive-portal forced user deletes
Number of idle users deleted after captive portal authentication.
Auth User Rejects Received
L2 User
Number of authentication rejects received for L2 users from the datapath due to a failure of the operation.
IPv4
Number of authentication rejects received for IPv4 users from the datapath due to a failure of the operation.
IPv6
Number of authentication rejects received for IPv6 users from the datapath due to a failure of the operation.
Auth User Rejects Processed
L2 User
Number of authentication rejects for L2 users that were processed after the reject was received.
IPv4
Number of authentication rejects for IPv4 users that were processed after the reject was received.
IPv6
Number of authentication rejects for IPv6 users that were processed after the reject was received.
AOS-W 6.2 | Reference Guide
show aaa state debug-statistics | 639
Command History
Release AOS-W 3.0 AOS-W 6.1 AOS-W 6.2
Modification Command introduced The Mobility Stats parameter was introduced. Additional statistics for idled users and user rejects were introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local or local switches
640 | show aaa state debug-statistics
AOS-W 6.2 | Reference Guide
show aaa state messages
Description
Display numbers of authentication messages sent and received.
Syntax
No parameters.
Usage Guidelines
This command displays a general overview of authentication statistics. To view authentication information for specific profiles such as a captive-portal, MAC or 801.x authentication profile, issue the commands specific to those features.
Example
The output of this command displays tables of statistics for PAPI, RAW socket and Sibyte messages.
(host) #show aaa state messages
PAPI Messages
-------------
Msg ID Name
Since last Read
------ ----
---------------
5004 set master ip
2
7005 Set switch ip
1
7007 Set VLAN ip
5
66
delete xauth vpn users 1
Total ----2 1 5 1
RAW socket Messages
-------------------
Msg ID Name
------ ----
1
raw PAP req
33
captive portal config
59
TACACS ACCT config for cli
60
TACACS ACCT config for web
Since last Read --------------188 11113 1 1
Total ----188 11113 1 1
Sibyte Messages
---------------
Opcode Name
------ ----
2
bridge
4
session
11
ping
13
8021x
15
acl
16
ace
17
user
27
bwm
29
wkey
42
nat
43
user tmout
56
forw unenc
64
auth
94
aesccm key
111
dot1x term
Sent Since Last Read -------------------21 4877 768 114563 803 5519 781821 3 27109 1 4164 1787103 5268 17885 196813
Sent Total ---------21 4877 768 114563 803 5519 781821 3 27109 1 4164 1787103 5268 17885 196813
Recv Since Last Read -------------------0 0 768 229126 0 0 0 0 4 0 4160 0 5267 0 151161
Recv Total ---------0 0 768 229126 0 0 0 0 4 0 4160 0 5267 0 151161
AOS-W 6.2 | Reference Guide
show aaa state messages | 641
114
rand
126
eapkey
114
rand
1614 1316231
2
1614 1316231
2
1612 2632462
0
1612 2632462
0
The output of this command contains the following parameters:
Parameter
Description
Msg ID
ID number for the message type
Name
Message name
Since last Read
Number of messages received since the buffer was last read.
Total
Total number of message received since the switch was last reset.
opcode
Code number of the message type.
Sent Since last Read Number of messages sent since the buffer was last read.
Sent Total
Total number of message sent since the switch was last reset.
Recv Since last Read Number of messages received since the buffer was last read.
Recv Total
Total number of message received since the switch was last reset.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
642 | show aaa state messages
AOS-W 6.2 | Reference Guide
show aaa state station
show aaa state station <A:B:C:D:E:F>
Description
Display AAA statistics for a station.
Syntax
Parameter <A:B:C:D:E:F>
Description MAC address of a station/
Example
The example below shows statistics for a station with four associated user IP addresses. The output of this command shows station data, the AAA profiles assigned to the station, and the station's authentication method.
(host) #show aaa state station 00:21:5c:85:d0:4b Association count = 1, User count = 4 User list = 10.1.10.10 10.6.5.168 192.168.229.1 192.168.244.1 essid: ethersphere-wpa2, bssid: 00:1a:1e:8d:5b:31 AP name/group: AL40/corp1344 PHY: a, ingress=0x10e8 (tunnel 136) vlan default: 65, assigned: 0, current: 65 cached: 0, user derived: 0, vlan-how: 0 name: MYCOMPANY\tgonzales, role:employee (default:logon, cached:employee, dot1x:), role-how: 1, acl:51/0, age: 00:02:50 Authentication: Yes, status: successful, method: 802.1x, protocol: EAP-MD5, server: vortex dot1xctx:1 sap:1 Flags: mba=0 AAA prof: default-corp1344, Auth dot1x prof: default, AAA mac prof:, def role: logon ncfg flags udr 1, mac 0, dot1x 1 Born: 1233767066 (Wed Feb 4 09:04:26 2009
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show aaa state station | 643
show aaa state user
show aaa state user <A.B.C.D>
Description
Display statistics for an authenticated user.
Syntax
Parameter <A.B.C.D>
Description IP address of a user.
Example
The example below shows statics for a user with the IP address 10.1.10.11. The output of this command shows user data, the user's authentication method. and statistics for assigned roles, timers and flags.
(host) #show aaa state user 10.1.10.11 Name: MYCOMPANY\tsenter, IP: 10.1.10.11, MAC: 00:21:5c:85:d0:4a, Role:employee, ACL:51/0, Age: 00:01:46 Authentication: Yes, status: successful, method: 802.1x, protocol: EAP-MD5, server: vortex Bandwidth = No Limit Bandwidth = No Limit Role Derivation: Default VLAN Derivation: Matched user rule Idle timeouts: 0, ICMP requests sent: 0, replies received: 0, Valid ARP: 0 Mobility state: Associated, HA: Yes, Proxy ARP: No, Roaming: No Tunnel ID: 0 L3 Mob: 0 Flags: internal=0, trusted_ap=0, delete=0, l3auth=0, l2=1 mba=0 Flags: innerip=0, outerip=0, guest=0, station=0, download=1, nodatapath=0 Auth fails: 0, phy_type: a-HT, reauth: 0, BW Contract: up:0 down:0, user-how: 1 Vlan default: 65, Assigned: 0, Current: 65 vlan-how: 0 Mobility Messages: L2=0, Move=0, Inter=0, Intra=0, ProxyArp=0, Flags=0x0 Tunnel=0, SlotPort=0x1018, Port=0x10e2 (tunnel 130) Role assigned: n/a, VPN: n/a, Dot1x: Name: employee role-how: 0 Essid: ethersphere-wpa2, Bssid: 00:1a:1e:11:6b:91 AP name/group: AL31/corp1344 Phy-type: a-HT RadAcct sessionID:n/a RadAcct Traffic In 0/0 Out 0/0 (0:0/0:0:0:0,0:0/0:0:0:0) Timers: arp_reply 0, spoof reply 0, reauth 0 Profiles AAA:default-corp1344, dot1x:default, mac: CP: def-role:'logon' sip-role:'' ncfg flags udr 0, mac 0, dot1x 0 Born: 1233772328 (Wed Feb 4 10:32:08 2009)
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
644 | show aaa state user
AOS-W 6.2 | Reference Guide
show aaa sygate-on-demand (deprecated)
show aaa sysgate-on-demand
Syntax
No parameters.
Command History
Release AOS-W 3.0 AOS-W 3.4
Modification Command introduced. Command deprecated.
AOS-W 6.2 | Reference Guide
show aaa sygate-on-demand (deprecated) | 645
show aaa tacacs-accounting
show aaa tacacs-accounting
Description
Show configuration information for TACACS+ accounting servers.
Usage Guidelines
This command displays TACACS+ data for your switch if you have previously configured a TACACS+ server and server group. The output includes the current TACACS+ accounting mode (enabled or disabled), and the name of the TACACS+ server group.
Example
The output of the show aaa accounting tacacs command displays configuration information for a TACACS+ accounting server. The output of this command includes the following parameters:
(host) #show aaa accounting tacacs
TACACS Accounting Configuration
-------------------------------
Parameter
Value
---------
-----
Mode
Enabled
Commands
configuration
Server-Group tacacs1
Parameter Mode Commands
Description
Shows whether this server group is Enabled or Disabled.
Displays the types of commands that are reported to the TACACS server group. l action reports action commands only. l all reports all commands. l configuration reports configuration commands only l show reports show commands only
Server-Group
Shows whether this server is Enabled or Disabled.
Related Commands
Command aaa authentication-server tacacs
aaa server-group
Description
Configure the TACACCS+ accounting feature.
Add a configured authentication server to an ordered list in a server group, and configure server rules to derive a user role, VLAN ID or VLAN name from attributes returned by the server during authentication
Mode
Config mode
Config mode
Command History
This command was introduced in AOS-W 3.0.
646 | show aaa tacacs-accounting
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show aaa tacacs-accounting | 647
show aaa tacacs-accounting
Description
Show TACACS accounting configuration.
Syntax
No parameters.
Example
The example below shows that TACACS accounting has been enabled, and that the TACACS server is in the server group acct-server.
(host) #show aaa tacacs-accounting
TACACS Accounting Configuration
-------------------------------
Parameter
Value
---------
-----
Mode
Enabled
Server-Group acct-server
The output of this command includes the following parameters:
Parameter Mode Server-Group
Description Shows if the TACACS accounting feature is enabled or disable The server group that contains the active TACACS server.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
648 | show aaa tacacs-accounting
AOS-W 6.2 | Reference Guide
show aaa timers
Description
Show AAA timer values.
Syntax
No parameters
Example
The example below shows that the switch has all default timer values:
(host) #show aaa timers User idle timeout = 6 minutes Auth Server dead time = 10 minutes Logon user lifetime = 5 minutes
Related Commands
Command aaa timers
Description
Mode
Use aaa timers to define the settings displayed in Config mode the output of this show command.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show aaa timers | 649
show aaa web admin-port
show aaa web admin-port
Description
Show the port numbers of HTTP and HTTPS ports used for web administration.
Syntax
No parameters.
Example
The example below shows that the switch is configured to use HTTPS on port 4343 or 443, and HTTP on port 8888.
(host) #show aaa web admin-port https port = 4343 http port = 8888
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
650 | show aaa web admin-port
AOS-W 6.2 | Reference Guide
show aaa xml-api server
show aaa xml-api server [<server_ip>]
Description
Show a list of XML servers used for authentication, authorization and accounting.
Syntax
Parameter <server_ip>
Description
IP address of an XML API server. Include this parameter to see if a secret key is configured for the specified server.
Example
The output of this command shows that the switch has two configured XML API servers that are each referenced by two different AAA profiles. Note that user-defined servers will not have an entry in the Profile Status column.
(host) #show aaa xml-api statistics
XML API Server List
-------------------
Name
References Profile Status
----
---------- --------------
10.1.2.3 2
10.4.3.2 2
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show aaa xml-api server | 651
show aaa xml-api statistics
show aaa xml-api statistics
Description
Display statistics for an external XML API server.
Syntax
Parameter <server_ip>
Description IP address of XML API server.
Usage Guidelines
Issue this command to troubleshoot AAA problems and monitor usage on an XML server.
Example
The example below shows AAA statistics for an external XML server with the IP address 10.1.2.3. This command shows the number of times that a particular event has occurred per client. The first number is the total number of times that this event has occurred is displayed firs. The number of new events since the last time the counters were displayed is shown in parentheses.
(host) #show aaa xml-api statistics
Statistics
10.1.2.3
----------
--------
user_authenticate
0 (0)
user_add
0 (0)
user_delete
0 (0)
user_blacklist
0 (0)
user_query
0 (0)
unknown user
0 (0)
unknown role
0 (0)
unknown external agent
0 (0)
authentication failed
0 (0)
invalid command
0 (0)
invalid message authentication method 0 (0)
invalid message digest
0 (0)
missing message authentication
0 (0)
missing or invalid version number
0 (0)
internal error
0 (0)
client not authorized
0 (0)
Cant use VLAN IP
0 (0)
Invalid IP
0 (0)
Cant use Switch IP
0 (0)
missing MAC address
0 (0)
Packets received from unknown clients: 0 (0)
Packets received with unknown request: 0 (0)
Requests Received/Success/Failed : 0/0/0 (0/0/0)
The output of this command includes the following parameters:
652 | show aaa xml-api statistics
AOS-W 6.2 | Reference Guide
Parameter
Description
user_authenticate Number of users authenticated on the XML server since the last switch reboot.
user_add
Number of users added to the switch's user table.
user_delete
Number of users removed from the switch's user table.
user_blacklist
Number of denied user association requests.
user_query
Number of user queries performed.
unknown user
Number of unknown users.
unknown role
Number of unknown user roles.
unknown external agent
Number of requests by an unknown external agent.
authentication failed
Number of failed authentication requests.
invalid command
Number of invalid XML commands
invalid message authentication method
Number of XML commands with an invalid authentication method (when a key is configured on the switch).
invalid message digest
Number of XML commands with an invalid digest type (when a key is configured on the switch).
missing message authentication
Number of XML commands with an missing authentication method (when a key is configured on the switch).
missing or invalid Number of commands with a missing or invalid version number. The version number
version number
should always be 1.0.
internal error
Number of internal server errors
client not authorized
Number of unauthorized clients
Cant use VLAN IP
Number of time a user IP is same as the VLAN IP.
Invalid IP
Number of XML commands with an invalid IP address.
Cant use Switch IP Redirection to a IP failed, possibly because the source IP has been NATted.
missing MAC address
Number of XML commands with a missing MAC address.
Packets received from unknown clients
Number of packets received from unknown clients.
Packets received with unknown request
Number of packets received with unknown request
Requests Received/Success/Failed
Total number of requests received / number of successful requests / number of failed requests
AOS-W 6.2 | Reference Guide
show aaa xml-api statistics | 653
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
654 | show aaa xml-api statistics
AOS-W 6.2 | Reference Guide
show acl ace-table
show acl ace-table {ace <0-1999>}|{acl <1-2700>}
Description
Show an access list entry (ACE) table for an access control list (ACL).
Syntax
Parameter ace <0-1999> acl <1-2700>
Description Show a single ACE entry. Show all ACE entries for a single ACL.
Example
The following example shows that there are eighteen access control entries for ACL 1.
(host) #show acl ace-table acl 1 1020: any any 1 0-65535 0-65535 f80001:permit 1021: any any 17 0-65535 53-53 f80001:permit 1022: any any 17 0-65535 8211-8211 f80001:permit 1023: any any 17 0-65535 8200-8200 f80001:permit 1024: any any 17 0-65535 69-69 f80001:permit 1025: any any 17 0-65535 67-68 f80001:permit 1026: any any 17 0-65535 137-137 f80001:permit 1027: any any 17 0-65535 138-138 f80001:permit 1028: any any 17 0-65535 123-123 f80001:permit 1029: user 10.6.2.253 255.255.255.255 6 0-65535 443-443 f80001:permit 1030: user any 6 0-65535 80-80 d1f90,0000 f80021:permit dnat 1031: user any 6 0-65535 443-443 d1f91,0000 f80021:permit dnat 1032: any any 17 0-65535 500-500 f80001:permit 1033: any any 50 0-65535 0-65535 f80001:permit 1034: any any 17 0-65535 1701-1701 f80001:permit 1035: any any 6 0-65535 1723-1723 f80001:permit 1036: any any 47 0-65535 0-65535 f80001:permit 1037: any any 0 0-0 0-0 f180000:deny
Related Commands
Configure ACLs using the command ip access-list session.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master switches
AOS-W 6.2 | Reference Guide
show acl ace-table | 655
show acl acl-table
show acl acl-table <1-2700>
Description
Display information for a specified access control list (ACL).
Syntax
Parameter acl-table <1-2700>
Description Specify the number of the ACL for which you want to view information.
Example
The following example displays the ACL table for the switch.
(host) #show acl acl-table acl 1
AclTable -------ACL Type --- ---1 role
ACE Index --------1459
Ace Count --------18
Name ---logon
Applied ------0
Total free ACE entries = 3591 Free ACE entries at the bottom = 2552 Next ACE entry to use = 1480 (table 1) Ace entries reused 622 times ACL count 64, tunnel acl 0
Ace entries reused 373 times ACL count 64, tunnel acl 0 The output of this command displays the following parameters:
Parameter ACL Type
ACE Index ACE count
Description
Number of the specified ACL
Shows the ACL type: l role: Access list is used to define a user role. l mac: MAC ACLs allow filtering of non-IP traffic. This ACL filters on a specific
source MAC address or range of MAC addresses. l session: Session ACLs define traffic and firewall policies on the switch. l ether-type: This type of ACL filters on the Ethertype field in the Ethernet
frame header, and is useful when filtering non-IP traffic on a physical port. l standard: Standard ACLs are supported for compatibility with router
software from other vendors. This ACL permits or denies traffic based on the source address of the packet.
Starting index entry for the ACL's access control entries
Number of access control entries in the ACL
656 | show acl acl-table
AOS-W 6.2 | Reference Guide
Parameter
Description
Name
Name of the access control list
Applied
Number of times the ACL was applied to a role.
Total free ACE entries
The total number of free ACE entries. This includes available ACE entries at the bottom of the list, as well as free ACE entries in the middle of the table from previous access list entries that were later removed.
Free ACE entries at the The total number of free ACE entries at the bottom of the list. bottom
Next ACE entry to use
Ace number of the first free entry at the bottom of the list.
ACE entries reused
For internal use only.
ACL count
Total number of defined ACLs
Tunnel ACL
Total number of defined tunnel ACLs.
The following example displays the ACL table for ACL 1.
(host) #show acl ace-table acl 1
Acl Table
--------
ACL Type ACE Index Ace Count Name
--- ---- --------- --------- ----
1 role 1020
18
logon
Applied ------0
Total free ACE entries = 3591 Free ACE entries at the bottom = 2991 Next ACE entry to use = 1041 (table 1) Ace entries reused 373 times
ACL count 64, tunnel acl 0
Related Commands
Configure ACLs using the command ip access-list session.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master switches
AOS-W 6.2 | Reference Guide
show acl acl-table | 657
show acl hits
show acl hits
Description
Show internal ACL hit counters.
Syntax
No parameters.
Usage Guidelines
Issue this command to see the number of times an access control list defined a user's role, or traffic and firewall policies for a user session.
Example
In the example below, the output of the User Role ACL Hits table is shown in two separate tables to allow the output to fit on a single page of this document. In the actual switch command-line interface, the User Role ACL Hits table is shown in a single, wide table.
(host) #show acl ace-table acl 1
User Role ACL Hits
------------------
Role
Policy
----
------
logon
control
logon
control
logon
visitor
vp-control
visitor
vp-control
visitor
vp-access
visitor
vp-access
visitor
vp-access
Src --any any any any any any user any
Dst --any any any any any any mswitch-master any
User Role ACL Hits------------------
Service
Action Dest/Opcode New Hits Total Hits Index
-------
------ ----------- -------- ---------- -----
svc-icmp
permit
0
6
5052
svc-dhcp
permit
0
2
5057
0
deny
0
53
5069
svc-dns
permit
9
46079
4885
svc-dhcp
permit
0
788
4886
svc-icmp
permit
0
536
4887
svc-http
permit
0
41
4889
6 9100-9100 permit
0
31
4892
Port Based Session ACL
----------------------
Policy
Src
Dst Service Action Dest/Opcode New Hits Total Hits
Index
------
---
--- ------- ------ ----------- -------- ---------- --
---
validuser 10.1.1.0 255.255.255.0 any any
deny
0
214
4655
validuser any
any any
permit
6
2502
4656
Port ACL Hits
658 | show acl hits
AOS-W 6.2 | Reference Guide
-------------
ACL ACE New Hits Total Hits Index
--- --- -------- ---------- -----
5
22
0
The output of this command includes the following information:
Parameter Role Policy Src
Dst
Service
Action
Dest/Opcode New Hits Total Hits Index ACL ACE New Hits Total Hits Index
Description
Name of the role assigned by the ACL.
Name of the policy used by the ACL
The traffic source, which can be one of the following: l <alias>: Name of a user-defined alias for a network host, subnetwork, or
range of addresses. l any: match any traffic. l host: specify a single host IP address. l network: specify the IP address and netmask. l user: represents the IP address of the user.
The traffic destination, which can be one of the following: l <alias>: Name of a user-defined alias for a network host, subnetwork, or
range of addresses. l any: match any traffic. l host: specify a single host IP address. l network: specify the IP address and netmask. l user: represents the IP address of the user.
Network service, which can be one of the following: l IP protocol number (0-255) l name of a network service (use the show netservice command to see
configured services) l any: match any traffic l tcp: specify the TCP port number (0-65535) l udp: specify the UDP port number (0-65535)
Action if rule is applied, which can be one of the following: l deny: reject packets l dst-nat: perform destination NAT on packets l dual-nat: perform both source and destination NAT on packets l permit: forward packets l redirect: specify the location to which packets are redirected l src-nat: perform source NAT on packets
The datapath destination ID.
Number of ACL hits that occurred since this command was last issued.
Total number of ACL hits recorded since the switch last reset.
Index number of the ACL.
ACL number
ACE number
Number of times the ACL was applied since this command was last issued.
Number of times the ACL was applied since the switch was last reset.
Index number of the ACL.
AOS-W 6.2 | Reference Guide
show acl hits | 659
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master switches
660 | show acl hits
AOS-W 6.2 | Reference Guide
show adp config
show adp config
Description
Show Alcatel Discovery Protocol (ADP) configuration settings.
Syntax
No parameters.
Example
The following example shows that the switch has all default settings for ADP.
(host) #show adp config
ADP Configuration
-----------------
key
value
---
-----
discovery enable
igmp-join enable
igmp-vlan 0
The output of this command includes the following parameters:
Parameter discovery
igmp-join igmp-vlan
Description
Alcatel-Lucent APs send out periodic multicast and broadcast queries to locate the master switch. If the APs are in the same broadcast domain as the master switch and ADP is enabled on the switch, the switch automatically responds to the APs' queries with its IP address. This command shows whether ADP is enabled or disabled on the switch.
Shows whether the switch has enabled or disabled the sending of Internet Group Management Protocol (IGMP) join requests.
ID of the VLAN to which IGMP reports are sent. If this value is set to 0, the switch will use the default route VLAN used.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show adp config | 661
show adp counters
show adp counters
Description
Show Alcatel Discovery Protocol (ADP) counters.
Syntax
No parameters.
Example
The following example shows the ADP counter table for the switch.
(host) #show adp counters
ADP Counters
------------
key
value
---
-----
IGMP Join Tx 1
IGMP Drop Tx 0
ADP Tx
0
ADP Rx
0
The output of this command includes the following parameters:
Parameter IGMP Join Tx
IGMP Drop Tx
ADP Tx ADP Rx
Description
Number of Internet Group Management Protocol (IGMP) join requests sent by the switch.
Number of Internet Group Management Protocol (IGMP) drop requests sent by the switch.
Number of ADP responses sent to APs.
Number of multicast and broadcast queries received from APs trying to locate the master switch.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
662 | show adp counters
AOS-W 6.2 | Reference Guide
show ap active
show ap active [ap-name <ap-name>|{arm-edge dot11a|dot11g|voip-only}|dot11a|dot11g|essid <essid>|ip-addr <ip-addr>|ip6-addr <ip6-addr>|{type access-point|air-monitor|(sensor dot11a|dot11g|voip-only)}|voip-only
Description
Show all active APs registered to a switch.
Syntax
Parameter ap-name <ap-name> arm-edge dot11a dot11g voip-only essid <essid>
ip-addr <ip-addr>
ip6-addr <ip6-addr> type
access-point air-monitor sensor voip-only
Description View data for an AP with a specified name.
Show the state of ARM edge APs.
Show 802.11a radio information.
Show 802.11g radio information.
Show AP information filtered by associated/active VoIP clients.
View data for a specific ESSID (Extended Service Set Identifier). An Extended Service Set Identifier (ESSID) is a alphanumeric name that uniquely identifies a wireless network. If the name includes spaces, you must enclose the ESSID in quotation marks.
View data for an AP with a specified IP address by entering an IP address in dotted-decimal format.
View data for an AP with a specified IPv6 address.
Show AP information filtered by type of AP.
Show information for Access Points only.
Show information for Air Monitors only.
Show only RFprotect Sensor information.
Show AP information filtered by associated/active VoIP clients.
Usage Guidelines
This command displays details for all active APs on the switch. If an AP on your network does not appear in this table, it may have been classified as an inactive AP for any of the following reasons:
l The AP is configured with a missing or incorrect VLAN. (For example, the AP is configured to use a tunneled SSID of VLAN 2 but the switch doesn't have a VLAN 2.)
l The AP has an unknown AP group. l The AP has a duplicate AP name. l An AP with an external antenna is not provisioned with external antenna gain settings. l Both radios on the AP are disabled. l No virtual APs are defined on the AP.
AOS-W 6.2 | Reference Guide
show ap active | 663
l The AP has profile errors. Issue the command "show profile errors" for details. l The GRE tunnel between the AP and the switch was blocked by a firewall after the AP became active. l The AP is temporarily down while it is upgrading its software. The AP will become active again after upgrading. l An AP has conflicting configuration settings. For example, if the AP system profile on a single radio dual-band AP
configures the radio uses 802.11g, but the virtual AP profile on the AP is set to use 802.11a, the AP might not appear to be active. l A remote AP model 5WN or 2WG attempted to connect to a switch without using IPsec.
Example
The output of the command in the example below shows that the switch sees an active AP.(
host)# show ap active
Active AP Table
---------------
Name
Group IP Address 11g Clients 11g Ch/EIRP/MaxEIRP
Ch/EIRP/MaxEIRP AP Type Flags Uptime Outer IP
----
----- ---------- ----------- -------------------
--- ------- ----- ------ --------
AP1X
default 10.3.15.107 0
AP:HT:1/15/21.5
125
1E2 5m:48s N/A
11a Clients -----------
0
11a ----------------
AP:HT:44/15/21
Flags: a = Reduce ARP packets in the air; A = Enet1 in active/standby mode; B = Battery Boost On; C = Cellular; D = Disconn. Extra Calls On; d = Drop Mcast/Bcast On; E = Wired AP enabled; K = 802.11K Enabled; L = Client Balancing Enabled; M = Mesh; N = 802.11b protection disabled; P = PPPOE; R = Remote AP; X = Maintenance Mode; 1 = 802.1x authenticated AP; 2 = Using IKE version 2;
The output of this command includes the following information:
Column
Description
Name
Name of an AP
Group
The AP is associated with this AP group.
IP address
IP address of the AP, in dotted decimal format.
11g Clients
Number of 802.11g clients using the AP.
11g Ch/EIRP/MaxEIRP 802.11g radio channel used by the AP/current effective Isotropic Radiated Power (EIRP) /maximum EIRP.
11a Clients
Number of 802.11a clients using the AP.
11a Ch/EIRP/MaxEIRP 802.11a radio channel used by the AP/current EIRP/maximum EIRP.
AP Type
AP model type.
Flags
This column displays any flags for this AP. The list of flag abbreviations is also included in the output of the show ap active command.
l a = Reduce ARP packets in the air l A = Enet1 in active/standby mode l B = Battery Boost On l d = Drop Mcast/Bcast On or Disconnected Sensor l D = Disconn. Extra Calls On
664 | show ap active
AOS-W 6.2 | Reference Guide
Column Uptime
Description
l E = Wired AP enabled l K = 802.11K Enabled l L = Client Balancing Enabled l M = Mesh l N = 802.11b protection disabled l P = PPPOE l R = Remote AP l R- = The remote AP requires captive portal authentication. Once this
authentication is successfully completed, the R- flag changes to R. l S = RFprotect Sensor l U = USB modem l X = Maintenance Mode
Number of hours, minutes and seconds since the last switch reboot or bootstrap, in the format hours:minutes:seconds.
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced The parameter ip6-addr was added to view data for an IPv6 AP.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap active | 665
show ap-group
show ap-group [<ap-group>]
Description
Show settings for an AP group.
Syntax
Parameter <ap-group>
Description The name of an AP group.
Usage Guidelines
Issue this command without the optional <ap-group> parameter to display the entire AP group list, including profile status for each profile. Include an AP group name to display detailed configuration information for that AP group profile.
Example
This first example shows that the switch has nine configured AP groups. The Name column lists the names of all configured AP groups. the Profile Status column indicates whether the AP group is predefined. (User-defined profiles will not have an entry in the Profile Status column.)
(host) #show ap-group
AP group List
-------------
Name
Profile Status
----
--------------
corp-office
branch-office-am
corp
corp1
Corp1-AM
Corp1-AM-Ch11
Corp1-AM-Ch6
corp1-AP85
corp1-lab
Total: 9
Include an AP group name to display a complete list of configuration settings for that profile. The example below shows settings for the AP group corp1.
(host) #show ap-group corp1 AP group "corp1" ------------------Parameter --------Virtual AP Virtual AP 802.11a radio profile 802.11g radio profile Wired AP profile Ethernet interface 0 link profile
Value ----corp1-guest corp1-wpa2 default profile1-g default default
666 | show ap-group
AOS-W 6.2 | Reference Guide
Ethernet interface 1 link profile AP system profile VoIP Call Admission Control profile 802.11a Traffic Management profile 802.11g Traffic Management profile Regulatory Domain profile SNMP profile RF Optimization profile RF Event Thresholds profile IDS profile Mesh Radio profile Mesh Cluster profile
default corp1344 default N/A N/A corp1344-channel-profile default handoff-aggressive default ids-low-setting default N/A
The output of this command includes the following parameters:
Parameter
Description
Virtual AP
Virtual AP profile that which configures a specified WLAN.
802.11a radio profile
Profile that defines 802.11a radio settings for the AP group.
802.11g radio profile
Profile that defines 802.11g radio settings for the AP group.
Wired AP profile
Profile that defines wired port settings for APs assigned to the AP group.
Ethernet interface 0 link Profile that defines the duplex and speed of the Ethernet 0 interface on the
profile
AP.
Ethernet interface 1 link Profile that defines the duplex and speed of the Ethernet 0 interface on the
profile
AP.
AP system profile
Name of the AP system profile for the AP group.
VoIP Call Admission Control profile
Name of the AP system profile for the AP group.
802.11a Traffic Management profile
Name of the 802.11a WLAN traffic management profile for the AP group.
802.11g Traffic Management profile
Name of the 802.11g WLAN traffic management profile for the AP group.
Regulatory Domain profile Name of the regulatory domain profile for the AP group.
SNMP profile
Name of the SNMP profile for the AP group.
RF Optimization profile
Name of the RF optimization profile for the AP group.
RF Event Thresholds profile
Name of the RF event thresholds profile for the AP group.
IDS profile
IDS profile for the AP group.
Mesh Radio profile
Mesh radio profile assigned to the AP group.
Mesh Cluster profile
Mesh cluster profile assigned to the AP group.
Related Commands
Configure AP group settings using the command ap-group.
AOS-W 6.2 | Reference Guide
show ap-group | 667
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
668 | show ap-group
AOS-W 6.2 | Reference Guide
show ap-name
show ap-name [<ap-name>]
Description
Show a list of AP names. Include the <ap-name> parameter to display detailed configuration information for that AP.
Syntax
Parameter <ap-name>
Description The name of an AP.
Example
This first example shows that the switch has eight registered APs. The Name column lists the names of each registered AP. Note that APs are all user-defined, so they will not have an entry in the Profile Status column.
(host) #show ap-name
AP name List
------------
Name
Profile Status
----
--------------
mp3
sw-ad-ap124-11
sw-ad-ap125-13sw-ad-ap125-15sw-ad-ap125-17sw-ad-ap125-18sw-ad-ap125-19sw-ad-ap125-3
Total: 8
Include an AP name to display a complete list of configuration settings for that AP. If the AP has default settings, the value may appear as N/A. The AP in the example below has all default profile settings.
(host) #show ap-group corp1 AP name "mp3" ------------Parameter --------Virtual AP Excluded Virtual AP 802.11a radio profile 802.11g radio profile Wired AP profile Ethernet interface 0 link profile Ethernet interface 1 link profile AP system profile VoIP Call Admission Control profile 802.11a Traffic Management profile 802.11g Traffic Management profile Regulatory Domain profile RF Optimization profile RF Event Thresholds profile IDS profile Mesh Radio profile Mesh Cluster profile Excluded Mesh Cluster profile
Value ----N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A N/A
The output of this command includes the following parameters:
AOS-W 6.2 | Reference Guide
show ap-name | 669
Parameter
Description
Virtual AP
Virtual AP profile that which configures a specified WLAN.
Excluded Virtual AP
Excludes the specified mesh cluster profile from this AP.
802.11a radio profile
Profile that defines 802.11a radio settings for the AP.
802.11g radio profile
Profile that defines 802.11g radio settings for the AP.
Wired AP profile
Profile that defines wired port settings for APs assigned to the AP.
Ethernet interface 0 link profile
Profile that defines the duplex and speed of the Ethernet 0 interface on the AP.
Ethernet interface 1 link profile
Profile that defines the duplex and speed of the Ethernet 0 interface on the AP.
AP system profile
Name of the AP system profile for the AP.
VoIP Call Admission Control profile
Name of the AP system profile for the AP.
802.11a Traffic Management profile
Name of the 802.11a WLAN traffic management profile for the AP group.
802.11g Traffic Management profile
Name of the 802.11g WLAN traffic management profile for the AP.
Regulatory Domain profile
Name of the regulatory domain profile for the AP.
RF Optimization profile Name of the RF optimization profile for the AP.
RF Event Thresholds profile
Name of the RF event thresholds profile for the AP.
IDS profile
IDS profile for the AP.
Mesh Radio profile
Mesh radio profile assigned to the AP.
Mesh Cluster profile
Mesh cluster profile assigned to the AP.
Excluded Mesh Cluster profile
Excludes the specified mesh cluster profile from this AP.
Related Commands
Configure AP settings using the command ap-name.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
670 | show ap-name
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
show ap-name | 671
show ap allowed-channels
show ap allowed-channels [<ap-name>|<country-code>|<ip-addr>]
Description
This command shows configuration information for Captive portal authentication profiles.
Syntax
Parameter <ap-name> <country-code> <ip-addr>
Description Name of an AP. Specify a country code to display allowed channels for that country. IP address of an AP, in dotted-decimal format.
Usage Guidelines
Specify the country code for your switch during initial setup. Changing the country code causes the valid channel lists to be reset to the defaults for that country.
Examples
The output of this example shows all allowed channels for the country code US
(host)# show ap allowed-channels US
Allowed Channels for Country Code "US"
--------------------------------------
PHY Type
Allowed Channels
--------
----------------
802.11g (indoor)
1 2 3 4 5 6 7 8 9 10 11
802.11a (indoor)
36 40 44 48 149 153 157 161 165
802.11g (outdoor)
1 2 3 4 5 6 7 8 9 10 11
802.11a (outdoor)
149 153 157 161 165
802.11g 40MHz (indoor) 1-5 2-6 3-7 4-8 5-9 6-10 7-11
802.11a 40MHz (indoor) 36-40 44-48 149-153 157-161
802.11g 40MHz (outdoor) 1-5 2-6 3-7 4-8 5-9 6-10 7-11
802.11a 40MHz (outdoor) 149-153 157-161
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
672 | show ap allowed-channels
AOS-W 6.2 | Reference Guide
show ap ap-group
show ap ap-group {ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>}
Description
Show the AP group settings for an individual AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show data for an AP with a specific name.
Show data for a specific Basic Service Set Identifier (BSSID). An AP's BSSID is usually the AP's MAC address.
Show data for an AP with a specific IP address. Enter the IP address in dotteddecimal format.
Usage Guidelines
Use this command to display the contents of an AP's group profile. If you know the name of the group whose profile settings you want to view, use the command show ap-group <profile-name>. To view a list of all configured AP groups on your switch, use the command show ap-group.
Examples
In the example below, the output of this command lists the profiles associated with the AP group Corp13.
(host) #show ap ap-group AP2 AP group "corp13" ------------------Parameter --------Virtual AP Virtual AP Virtual AP Virtual AP 802.11a radio profile 802.11g radio profile Wired AP profile Ethernet interface 0 link profile Ethernet interface 1 link profile AP system profile VoIP Call Admission Control profile 802.11a Traffic Management profile 802.11g Traffic Management profile Regulatory Domain profile SNMP profile RF Optimization profile RF Event Thresholds profile IDS profile Mesh Radio profile Mesh Cluster profile
Value ----corp13-guest corp13-ether-wpa2 corp13-ether-voip corp13-ether-comm default default default default default corp13 default N/A N/A corp13-channel-profile default handoff-aggressive default ids-low-setting default N/A
AOS-W 6.2 | Reference Guide
show ap ap-group | 673
Related Commands
Command ap-group
Description Configure your AP groups and AP group profiles.
Mode Config mode
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
674 | show ap ap-group
AOS-W 6.2 | Reference Guide
show ap arm history
show ap arm history {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>}
Description
For each interface on an AP, show the history of channel and power changes due to Adaptive Radio Management (ARM).
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show ARM history for an AP with a specific name.
Show ARM history for a specific Basic Service Set Identifier (BSSID) on an AP. An AP's BSSID is usually the AP's MAC address.
Show ARM history for an AP with a specific IP address. Enter the IP address in dotted-decimal format.
Examples
Adaptive Radio Management (ARM) can automatically change channel and power levels based on a number of factors such as noise levels and radio interference. The output of the show ap arm history command shows you an AP's channel and power changes over time, and the reason why those changes took place.
host)# #(ethersphere-lms3) #show ap arm history ap-name AP-16
Interface :wifi0
ARM History
-----------
Reason Old channel New channel Old Power New Power Last change
------ ----------- ----------- --------- --------- -----------
P-
153-
153-
12
9
3d:14h:56m:48s
P+
153-
153-
9
12
3d:13h:44m:7s
P+
153-
153-
12
15
3d:13h:23m:5s
P+
153-
153-
15
18
3d:13h:16m:32s
P+
153-
153-
18
21
3d:11h:42m:42s
P-
153-
153-
21
15
3d:8h:16m:12s
Interface :wifi1
ARM History
-----------
Reason Old channel New channel Old Power New Power Last change
------ ----------- ----------- --------- --------- -----------
P-
11
11
15
12
3d:18h:22m:28s
P+
11
11
12
15
3d:18h:17m:27s
P-
11
11
15
12
3d:18h:9m:9s
P+
11
11
12
15
3d:17h:48m:41s
P+
11
11
15
18
3d:17h:44m:34s
P-
11
11
18
15
3d:17h:39m:11s
P-
11
11
15
12
3d:17h:32m:39s
P+
11
11
12
15
3d:17h:26m:15s
I: Interference, R: Radar detection, N: Noise exceeded, E: Error threshold exceeded, INV:
Invalid Channel, G: Rogue AP Containment, M: Empty Channel, P+: Increase Power, P-: Decrease
Power, OFF: Turn off Radio, ON: Turn on Radio
The output of this command includes the following information:
AOS-W 6.2 | Reference Guide
show ap arm history | 675
Parameter Reason
Old Channel New Channel Old Power New Power Last Change
Description
This column displays one of the following code to indicate why the channel or power change was made. l I: Interference l R: Radar detected l N: Noise exceeded l E: Error threshold exceeded l INV: Invalid Channel l G: Rogue AP Containment l M: Empty Channel l P+: Increase Power l P-: Decrease Power l OFF: Turn off Radio l ON: Turn on Radio The Reason key appears at the bottom of the ARM History table.
Channel number used by the AP interface before the ARM change.
Channel number used by the AP interface after the ARM change.
Power level of the AP interface before the ARM change.
Power level of the AP interface after the ARM change.
Time elapsed since the change, in the format days:hours:minutes:seconds.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
676 | show ap arm history
AOS-W 6.2 | Reference Guide
show ap arm neighbors
show ap arm neighbors {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>}
Description
Show the ARM settings for an AP's neighbors.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show data for an AP with a specific name.
Show data for a specific Basic Service Set Identifier (BSSID). An AP's BSSID is usually the AP's MAC address.
Show data for an AP with a specific IP address. Enter the IP address in dotteddecimal format.
Examples
The output of this command shows ARM neighbor information for both the wifi1 and wifi0 interfaces on AP ap70_1. (host)# show ap arm neighbors ap70_1
Interface:wifi1 00:1b:2f:e6:1c:d0:known-interfering/SNR-1/CH-1 00:19:e3:31:55:f2:known-interfering/SNR-7/CH-1 00:1f:f3:01:4d:3f:known-interfering/SNR-1/CH-1 00:18:39:96:b4:16:known-interfering/SNR-0/CH-1 00:11:24:ec:49:05:known-interfering/SNR-0/CH-1
Interface:wifi0 00:19:7e:4d:8a:1d:known-interfering/SNR-0/CH-1 00:19:a9:ce:13:90:interfering/SNR-0/CH-4 00:19:7e:4d:80:df:known-interfering/SNR-0/CH-1 00:11:24:90:17:d4:known-interfering/SNR-0/CH-1 00:16:b6:f4:59:94:known-interfering/SNR-0/CH-1 00:14:51:6d:d1:d5:known-interfering/SNR-0/CH-1
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap arm neighbors | 677
show ap arm rf-summary
show ap arm rf-summary {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>}
Description
Show the state and statistics for all channels being monitored by an individual AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show channel data for an AP with a specific name.
Show channel data for a specific Basic Service Set Identifier (BSSID) on an AP. An AP's BSSID is usually the AP's MAC address.
Show channel data for an AP with a specific IP address. Enter the IP address in dotted-decimal format.
Examples
The output of this command shows detailed information for the individual channels being monitored and statistics for each AP interface. Use this command verify an AP's RF health, or to determine why multiple APs in the same area are on the same channel.
(host)# show ap arm rf-summary ap-name ap21
Channel Summary
---------------
channel retry phy-err mac-err noise cov-idx
------- ----- ------- ------- ----- -------
161
0
0
9
86
0/0
1
0
0
0
65
0/0
48
0
0
2
81
0/0
165
0
0
2
90
0/0
5
0
0
0
66
0/0
6
0
0
30
70
0/0
7
0
0
0
67
0/0
149
0
0
27
87
0/0
11
0
0
16
72
8/0
36
0
0
7
81
0/0
153
0
0
0
86
0/0
40
0
0
6
81
0/0
157
0
0
12
91
0/0
44
0
0
6
85
0/0
HT Channel Summary
------------------
channel_pair Pairwise_intf_index
------------ -------------------
1-5
1054
7-11
4221
149-153
791
36-40
44
157-161
40
44-48
7
intf_idx -------0/0//0/0 553/48//0/0 71/0//0/0 0/324//0/0 0/453//0/0 268/568//0/0 0/1552//0/0 67/265//0/0 2618/51//0/0 0/0//0/0 119/340//0/0 0/44//0/0 0/40//0/0 0/0//0/0
The output of this command includes the following information:
678 | show ap arm rf-summary
AOS-W 6.2 | Reference Guide
Parameter
Description
channel
Number of a radio channel used by the AP.
retry
Number of 802.11 retry frames sent because a client failed to send an ACK.
phy-err
Number of PHY errors on the AP's current channel seen during the last second.
mac-err
Number of MAC errors on the AP's current channel seen during the last second.
noise
Current noise level, in -dBm.
cov-idx
The AP uses this metric to measure RF coverage. The coverage index is calculated as x+y, where "x" is the AP's weighted calculation of the Signal-toNoise Ratio (SNR) on all valid APs on a specified 802.11 channel, and "y" is the weighted calculation of the Alcatel-Lucent APs SNR the neighboring APs see on that channel.
intf_idx
The AP uses this metric to measure co-channel and adjacent channel interference. The Interference Index is calculated as a/b//c/d, where: l Metric value "a" is the channel interference the AP sees on its selected
channel. l Metric value "b" is the interference the AP sees on the adjacent channel. l Metric value "c" is the channel interference the AP's neighbors see on the
selected channel. l Metric value "d" is the interference the AP's neighbors see on the adjacent
channel. l To calculate the total Interference Index for a channel add "a+b+c+d".
Interface Name
Name of the fastethernet or gigabit Ethernet interface
Current ARM Assignment Current channels assigned by the AP's ARM profile.
Target Coverage Index Ideal value of coverage index an AP tries to achieve on its channel.
Covered channels a/g
Number of channels that are currently being used by an AP's BSSIDs.
Free channels a/g
Number of channels that are available to an AP because that channel has a lower interference index.
ARM Edge State
If enabled, ARM-enabled APs on the network edge will not become Air Monitors.
Last check channel/pwr Time elapsed since the AP checked its channel and power settings, in hour:minute:second format.
Last change channel/pwr
Time elapsed since the AP changed its channel and power settings, in hour:minute:second format.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap arm rf-summary | 679
show ap arm scan-times
show ap arm scan-times {ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>}
Description
Show AM channel scan times for an individual AP.
Syntax
Parameter
Description
ap-name <ap-name> Show channel scan data for an AP with a specific name.
bssid <bssid>
Show channel scan data for a specific Basic Service Set Identifier (BSSID) on an AP. An AP's BSSID is usually the AP's MAC address.
ip-addr <ip-addr> Show channel scan data for an AP with a specific IP address. Enter the IP address in dotted-decimal format.
Examples
The output of this command shows scan times for every channel on an AP with the IP address 10.15.10.37.
(host)# show ap arm scan-times ip-addr 10.15.10.37
Channel Scan Time
-----------------
channel assign-time scans-attempted scans-rejected dos-scans flags timer-tick
------- ----------- --------------- -------------- --------- ----- ----------
36
8579
349
0
0
DVACT 50598
40
2365
349
0
0
DVACT 50610
44
2495
349
0
0
DVACT 50621
48
9714
349
0
0
DVACT 50656
52
0
349
0
0
DA
50643
56
0
349
0
0
DA
50655
60
0
348
0
0
DA
50519
64
0
348
0
0
DA
50530
149
5546
348
0
0
DVACT 50542
153
2310
348
0
0
DVACT 50553
157
6094
348
0
0
DVACT 50565
161
3014
348
0
0
DVACT 50576
165
10538
348
0
0
DVACT 50587
1
4194
97
0
0
DVACT 50594
2
0
97
0
0
DAC 50604
3
0
97
0
0
DAC 50615
4
0
97
0
0
DAC 50627
5
0
97
0
0
DC
50638
6
4076
97
0
0
DVACT 50656
7
0
96
0
0
DAC 50538
8
0
97
0
0
DC
50549
9
0
97
0
0
DC
50561
10
0
97
0
0
DAC 50572
11
3710
97
0
0
DVACT 50583
D: Default, V: Valid, A: AP Present, C: Reg Domain Channel, O: DOS Channel, T:20MHZ Channel,
F: 40MHz Channel, L: Reg Domain 40MHz Channel (lower), U:
Reg Domain 40MHz channel (U)
680 | show ap arm scan-times
AOS-W 6.2 | Reference Guide
WIF Scan Time
-------------
channel last-scan-channel
------- -----------------
48
56/50655
current-scan-channel -------------------56
last-dos-channel ---------------0
The output of this command includes the following parameters:
Parameter
Description
channel
A radio channel on the specified AP.
Assign-time
The amount of time that an AP has been on a channel.
scans-attempted
The number of times an AP has attempted to scan another channel
scans-rejected
The number of times an AP attempted to scan a channel, but was unable to scan because the scan was halted by the power save, VoIP aware or load aware ARM features.
dos-scans
The number of times an AP enabled with the rogue aware scanning feature had to contain a rogue device on a channel.
flags
The flags column displays additional relevant information about the channel. The flags key appears at the bottom of the Channel Scan Time table.
timer tick
Timer tick at which the last scan was attempted.
last-scan-channel
The last channel scanned by the AP
current-scan-channel The AP's current channel.
last-dos-channel
The last channel that had to be contained because a rogue device was detected on that channel.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap arm scan-times | 681
show ap arm state
show ap arm state [ap-name <ap-name>|dot11a|dot11g|ip-addr <ip-addr>]
Description
Display Adaptive Radio Management (ARM) information for an individual AP's neighbors, or show all available data for any neighboring AP using an 802.11a or 802.11g radio type.
Syntax
Parameter ap-name <ap-name> dot11a dot11g ip-addr <ip-addr>
Description Show aggregate ARM Neighbor Information for a specific AP. Show aggregate ARM Neighbor Information for all APs using an 802.11a radio. Show aggregate ARM Neighbor Information for all APs using an 802.11g radio. Show aggregate ARM Neighbor Information for a AP with a specific IP address by entering its IP address in dotted-decimal format.
Usage Guidelines
The output of the show ap arm state command shows 802.11a and 802.11g information for all APs. Include an AP name or IP address to show data for just a single AP, or use the dot11a or dot11g keywords to show data for all APs using that radio type.
Examples
The output of this command shows 802.11a information for all neighboring APs. (host)# show ap arm state
show ap arm state ap-name AP49
AP-1249:10.100.139.233:52:21:26-Edge:disable : Client Density:13
Neighbor Data
-------------
Name
IP Address SNR Assignment Neighbor Density
----
----------
--- ---------- ----------------
AP42
10.100.139.249 41 52/21
13/17/100/76
AP09
10.100.139.224 22 56/21
3/5/23/60
AP48
10.100.139.241 36 60/21
9/11/69/81
The output of this command includes the following information:
Column Name IP address SNR
Description Name of an AP.
IP address of an AP.
Signal-to-noise (SNR) ratio. SNR is the power ratio between an information signal and the level of background noise.
682 | show ap arm state
AOS-W 6.2 | Reference Guide
Column Assignment Neighbor Density
Description
The AP's current channel assignment.
The neighborhood density for the specified AP is listed with the values A/B/C/D, where: l A= Number of the AP's clients heard in the AP neighbor's client list l B= Number of clients in AP neighbor's client list l C= Density percentage, (AP clients heard in in the AP neighbor client list / AP
client density * 100). l D= Density Percentage (AP clients heard in the AP neighbor's client list /
neighbor client density * 100)
Command History
Version AOS-W 3.0 AOS-W 6.1
Description Command introduced The neighbor density parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap arm state | 683
show ap association
show ap association [ap-name <ap-name>|ap-group <ap-group>|bssid <bssid>|channel <channel>|client-mac <client-mac>|essid <essid>|ip-addr <ip-addr>|phy {a|b|g}|voip-only]
Description
Show the association table for an AP group or for an individual AP.
Syntax
Parameter
Description
ap-group <ap-group>
Show AP associations for a specific AP group. You can also include the channel, essid or voip-only keywords to further filter the output of this command.
ap-name <ap-name>
Show AP associations for a specific AP. You can also include the essid, phy or voip-only keywords to further filter the output of this command.
bssid <bssid>
Show the AP associations for an specific AP Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
channel <channel>
Show AP associations for an individual channel by specifying the channel for which you want to view information.
client-mac <client-mac>
Show the AP associations for a specific MAC address by entering the MAC address of a client for which you want to view association information.
essid <essid>
Show AP associations for an Extended Service Set Identifier (ESSID). An Extended Service Set Identifier (ESSID) is a alphanumeric name that uniquely identifies a wireless network. If the name includes spaces, you must enclose the ESSID in quotation marks.
ip-addr <ip-addr>
Show AP associations for a specific AP by entering an IP address in dotted-decimal format. You can also include the essid, phy or voip-only keywords to further filter the output of this command.
phy
Include the phy [a|b|g] keywords to show associations for a specific
802.11 radio type, either 802.11a, 802.11b or 802.11g.
voip-only
Show VoIP client information only.
Usage Guidelines
Use this command to check if user is connected to an AP. This command validates whether the client is associated and indicates the last AP to which it was connected. If the flags column shows an 'A', the client is currently associated with that AP. Alternately, if the client is not currently associated, the AP with the smallest value of association time is the last AP used by the client.
Example
Use the show ap association client-mac command to verify that a user has associated with an AP, or to determine last AP to which the client was connected. The output of this command in the example below shows the association table for the client with the MAC address 00:13:fd:5c:7c:59. If the flags column in the output of this command shows
684 | show ap association
AOS-W 6.2 | Reference Guide
an 'A', the client associated last to that AP. Alternately, the AP with the smallest value of association time is the last AP to which the client had associated.
In the example below, the output of this command has been broken into two separate tables to better fit this page. In the actual output of the command, this information is shown in a single, wide table. (host) #show ap association client-mac 00:13:fd:5c:7c:59
Flags: W: WMM client, A: Active, R: RRM client PHY Details: HT: High throughput; 20: 20MHz; 40: 40MHzss: spatial streams
Association Table
-----------------
Association Table
-----------------
-----------------
Name bssid
mac
---- -----
---
AL12 00:1a:1e:11:5f:11 00:21:5c:50:b1:ed
00:1a:1e:88:88:31 00:19:7d:d6:74:93 y
auth ---y y
assoc aid
----- ---
y
12
6 10
l-int essid
----- -----
10
ethersphere-wpa2AL5
ethersphere-wpa2
vlan-id tunnel-id phy
assoc. time num assoc Flags
------- --------- ---
----------- --------- -----
65
0x10c4
a-HT-40sgi-2ss 35m:41s
1
WA65
0x1072
a
24m:29s
1
WA
The output of this command includes the following information:
Column Name bssid mac auth
assoc
aid
1-int
essid vlan-id tunnel-id assoc. time
num assoc flags
Description
Name of an AP
The AP Basic Service Set Identifier (BSSID)
MAC address of the AP
This column displays a y if the AP has been configured for 802.11 authorization frame types. Otherwise, it displays an n.
This column displays a y if the AP has been configured for 802.11 association frame types. Otherwise, it displays an n.
802.11 association ID. A client receives a unique 802.11 association ID when it associates to an AP.
Number of beacons in the 802.11 listen interval. There are ten beacons sent per second, so a ten-beacon listen interval indicates a listen interval time of 1 second.
Name that uniquely identifies the AP's Extended Service Set Identifier (ESSID).
Identification number of the AP's VLAN.
Identification number of the AP's tunnel.
Amount of time the client has associated with the AP, in the format hours:minutes:seconds.
Number of clients associated with the AP.
This column displays any flags for this AP. The list of flag abbreviations is included in the output of the show ap association command.
AOS-W 6.2 | Reference Guide
show ap association | 685
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
686 | show ap association
AOS-W 6.2 | Reference Guide
show ap association remote
show ap association remote [ap-name <ap-name>|ap-group <ap-group>|bssid <bssid>|channel <channel>|essid <essid>
Description
Display the association table for an individual AP or group of APs in bridge mode.
Syntax
Parameter ap-name <ap-name> ap-group <ap-group> bssid <bssid>
channel <channel> essid <essid>
Description
Show AP associations for a specific remote AP.
Show AP associations for a specific group of remote APs.
Show the AP associations for an specific AP Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show remote AP associations for a specific channel.
Show remote AP associations for an Extended Service Set Identifier (ESSID). An Extended Service Set Identifier (ESSID) is a alphanumeric name that uniquely identifies a wireless network. If the name includes spaces, you must enclose the ESSID in quotation marks.
Examples
The output of the command below shows the association table for clients in the AP group group1.
show ap association remote ap-group group1
Flags: W: WMM client, A: Active, R: RRM client PHY Details: HT: High throughput; 20: 20MHz; 40: 40MHz ss: spatial streams
Association Table
-----------------
Name bssid
essid vlan-id tunnel-id phy assoc.time num assoc Flags
---- -----
- ------- --------- --- ---------- --------- -----
AP71 00:0b:23:c1:d6:11 00:12:6d:03:1c:f1
y
y
1
a
23s
Num Clients:1
The output of this command includes the following information:
Column Name bssid mac
Description Name of an AP The AP Basic Service Set Identifier (BSSID) MAC address of the AP
AOS-W 6.2 | Reference Guide
show ap association remote | 687
Column auth assoc aid 1-int essid vlan-id tunnel-id phy
assoc. time num assoc flags
Description
This column displays a y if the AP has been configured for 802.11 authorization frame types. Otherwise, it displays an n.
This column displays a y if the AP has been configured for 802.11 association frame types. Otherwise, it displays an n.
802.11 association ID. A client receives a unique 802.11 association ID when it associates to an AP.
Number of beacons in the 802.11 listen interval. There are ten beacons sent per second, so a ten-beacon listen interval indicates a listen interval time of 1 second.
Name that uniquely identifies the AP's Extended Service Set Identifier (ESSID).
Identification number of the AP's VLAN.
Identification number of the AP's tunnel.
The RF band in which the AP should operate: g = 2.4 GHz a = 5 GHz
Amount of time the client has associated with the AP, in the format hours:minutes:seconds.
Number of clients associated with the AP.
This column displays any flags for this AP. The list of flag abbreviations is included in the output of the show ap association remote command.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
688 | show ap association remote
AOS-W 6.2 | Reference Guide
show ap authorization-profile
show ap authorization-profile [<profile-name>]
Description
This command shows information for AP authorization profiles.
Syntax
Parameter <profile-name>
Description The name of an an existing AP authorization profile.
Usage Guidelines
The AP authorization profile specifies which configuration should be assigned to a remote AP that has been provisioned but not yet authenticated at the remote site. By default, these yet-unauthorized APs are put into the temporary AP group authorization-group and assigned the predefined profile NoAuthApGroup. This configuration allows the user to connect to an unauthorized remote AP via a wired port then enter a corporate username and password. Once a valid user has authorized the AP and the remote AP will be marked as authorized on the network. The remote AP will then download the configuration assigned to that AP by it's permanent AP group.
Issue this command without the <profile-name> option to display the entire AP authorization profile list, including profile status and the number of references to each profile. Include a profile name to display the authorization group defined for that profile.
Examples
The following example lists all AP authorization profiles. The References column lists the number of other profiles with references to that authorization profile, and the Profile Status column indicates whether the profile is predefined. User-defined AP authorization profiles will not have an entry in the Profile Status column.
(host) #show ap authorization-profile
AP Authorization profile List
-----------------------------
Name
References Profile Status
----
---------- --------------
Noauthprofile 1
default
2
Predefined (editable)
Total:2
To display the authentication group for an individual profile, include the <profile> parameter. The example below shows the profile details for the AP authorization profile Default.
(host) #show ap authorization-profile default
AP Authorization profile "default" (Predefined (editable))
----------------------------------------------------------
Parameter
Value
---------
-----
AP authorization group NoAuthApGroup
The output of the show ap authorization command includes the following parameters:
AOS-W 6.2 | Reference Guide
show ap authorization-profile | 689
Parameter AP authorization group
Value
Name of a configuration profile to be assigned to the group unauthorized remote APs.
Related Commands
Command ap authorizationprofile
Description
This command defines a temporary configuration profile for remote APs that are not yet authorized on the network.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
690 | show ap authorization-profile
AOS-W 6.2 | Reference Guide
show ap blacklist-clients
show ap blacklist-clients
Description
Show a list of clients that have been denied access.
Usage Guidelines
Use the stm CLI command to add or remove users from a blacklist. Additionally, the dot1x authentication, VPN authentication and MAC authentication profiles allow you to automatically blacklist a client if machine authentication fails.
Examples
The output of this command shows that the switch has a single user-defined blacklisted client. (host)# show ap blacklist-clients
Blacklisted Clients
-------------------
STA
reason
---
------
00:1E:37:CB:D4:52
block-time(sec) remaining time(sec) --------------- ------------------user-defined 2480
The output of this command includes the following information:
Column STA reason
Description
MAC address of the blacklisted client.
The reason that the user was blacklisted. l user-defined: User was blacklisted due to blacklist criteria were defined by the
network administrator l mitm-attack: Blacklisted for a man in the middle (MITM) attack; impersonating
a valid enterprise AP. l ping-flood: Blacklisted for a ping flood attack. l session-flood: Blacklisted for a session flood attack. l syn-flood: Blacklisted for a syn flood attack. l session-blacklist: User session was blacklisted l IP spoofing: Blacklisted for sending messages using the IP address of a
trusted client. l ESI-blacklist: An external virus detection or intrusion detection application or
appliance blacklisted the client. l CP-flood: Blacklisting for flooding with fake AP beacons. l UNKNOWN: Blacklist reason unknown.
block-time (sec) remaining time(sec)
Amount of time the client has been blocked, in seconds.
Amount of time remaining before the client will be allowed access to the network again.
AOS-W 6.2 | Reference Guide
show ap blacklist-clients | 691
Related Commands
Command
stm add-blacklist-client stm remove-blacklist-client <macaddr>
Description Manually add or remove clients from a blacklist.
Mode
Config mode
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
692 | show ap blacklist-clients
AOS-W 6.2 | Reference Guide
show ap bss-table
show ap bss-table [ap-name <ap-name>|bssid <bssid>|essid <essid>|ip-addr <ip-addr>|port <port>\<slot>]
Description
Show an AP's Basic Service Set (BSS).
Syntax
Parameter ap-name <ap-name> bssid <bssid> essid <essid>
ip-addr <ip-addr> port <port>/<slot>
Description
Show the BSS table for a specific AP.
Show the BSS table for an specific AP Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show the BSS table for an Extended Service Set Identifier (ESSID). An Extended Service Set Identifier (ESSID) is a alphanumeric name that uniquely identifies a wireless network. If the name includes spaces, you must enclose the ESSID in quotation marks.
Show the BSS table for a specific AP by entering an IP address in dotted-decimal format.
Show the BSS table for a specific port and slot on an AP. The slot and port numbers should be separated by a forward slash (/).
Usage Guidelines
The output of the show ap bss-table command shows the Alcatel-Lucent AP BSS table for all APs. To filter this information and view BSS table data for an individual AP or a specific port and slot number, include the ap-name, bssid, essid, ip-addr or port keywords.
Example
The output of this command shows the BSS table for the seven active APs using the switch.
show ap bss-table
Alcatel-Lucent AP BSS Table
------------------
bss
EIRP cur-cl ap name in-t(s) tot-t
mtu acl-state
---
---
----
---
------
------
--- --------
00:0b:86:cc:d8:40 corp-ap 1/3 192.0.2.0
g
ap
ess 11/16.5/33
00:0b:86:cc:d8:41 testbed1 1/3
192.0.2.10 g
ap
11/16.5/33
3.70.17 0
50s
1500 -
00:0b:86:9b:49:c8 corp-ap 1/0 192.0.2.11
a
ap
165/15.5/36
3.85.15 0
2m:0s
1578 -
00:1a:1e:81:aa:50 corp-ap 1/0 192.0.2.12
a-HT ap
44+/19/23
14m:0s
1578 -
00:1a:1e:81:aa:40 corp-ap 1/0 192.0.2.12
g-HT ap
6/17.5/33
0
3m:55s 1578 -
00:0b:86:cc:d8:50 corp-ap 1/3 192.0.2.14
a
ap
165/19/36
0
50s
1500 -
AOS-W 6.2 | Reference Guide
show ap bss-table | 693
00:0b:86:9b:49:c0 corp-ap 1/0 192.0.2.15
g
0
2m:0s
ap 1578 -
11/16.5/33
Channel followed by "*" indicates channel selected due to unsupported configured channel.Num APs:7 Num Associations:1
The output of this command includes the following information:
Column
Description
bss
The AP Basic Service Set Identifier (BSSID). This is usually the MAC address of the AP
ess
The AP Extended Service Set Identifier (ESSID).
s/p
The slot and port used by the switch, in the format <slot>/<port>.
<slot> is always 1, except when referring to interfaces on the OAW-6000 switch. For
the OAW-6000 switch, the four slots are allocated as follows:
l Slot 0: contains a OmniAccess Supervisor Card III.
l Slot 1: can contain an OmniAccess Supervisor Card III, or a line card.
l Slot 2: can contain an OmniAccess Supervisor Card III or a line card.
l Slot 3: can contain an OmniAccess Supervisor Card III or a line card.
<port> refers to the network interfaces that are embedded in the front panel of the
OAW-4x04 Series switch, OmniAccess Supervisor Card III, or a line card installed in
the OAW-6000 switch. Port numbers start at 0 from the left-most position.
ip
IP address of an AP.
phy
An AP radio type. Possible values are:
l a--802.11a
l a-HT--802.11a high throughput
l g-- 802.11g
l g-HT--802.11g high throughput
type
Shows whether the AP is working as an access point (AP) or air monitor (AM).
ch/EIRP/max-EIRP Radio channel used by the AP/current effective Isotropic Radiated Power (EIRP) /maximum EIRP.
cur-cl
Current number of clients on the AP.
ap name
Name of the AP.
in-t(s)
Number of seconds that an AP has been inactive.
tot-t
An AP's total active time, in seconds.
mtu
Maximum Transmission Unit (MTU) size, in bytes. This value describes the greatest
amount of data that can be transferred in one physical frame.
acl-state
An access control list (ACL) can enable or disable an AP during specific time ranges. l Disabled: An ACL with time restrictions is currently disabled (so the AP is enabled). l Enabled: An ACL with time restrictions is currently enabled (so the AP is disabled). l This data column will display a dash (-) if no ACLs are currently configured for the
AP.
Command History
Introduced in AOS-W 3.0.
694 | show ap bss-table
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap bss-table | 695
show ap bw-report
show ap bw-report {ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>}
Description
Show the bandwidth reporting table for a specific AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show bandwidth data for an AP with a specific name.
Show bandwidth data for a specific Basic Service Set Identifier (BSSID) on an AP. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show bandwidth data for an AP with a specific IP address by entering an IP address in dotted-decimal format.
Examples
The output of the following command shows the Alcatel-Lucent AP bandwidth table for an AP with the IP address 192.0.2.170. show ap bw-report ip-addr 192.0.2.170
Bandwidth report for AP "AL16" radio 0
--------------------------------------
Virtual AP
Allocated Share
----------
---------------
corp1344-guest
0%
corp1344-ethersphere-wpa2 0%
Average Throughput:0 kbps
Actual Share -----------0% 0%
Offered Load -----------0 kbps 0 kbps
Delivered Load -------------0 kbps 0 kbps
Bandwidth report for AP "AL16" radio 1
--------------------------------------
Virtual AP
Allocated Share
----------
---------------
corp1344-guest
0%
corp1344-ethersphere-voip 0%
corp1344-ethersphere-vocera 0%
Average Throughput:0 kbps
Actual Share -----------0% 0% 0%
Offered Load -----------0 kbps 0 kbps 0 kbps
Delivered Load -------------0 kbps 0 kbps 0 kbps
The output of this command includes the following information for all radios on the AP:
Column Virtual AP Allocated Share Actual Share
Description Name of a Virtual AP Maximum percentage of total bandwidth available to that Virtual AP. Actual percentage of total bandwidth used by a Virtual AP.
696 | show ap bw-report
AOS-W 6.2 | Reference Guide
Column Offered Load Delivered Load
Average Throughput
Description Attempted throughput for the Virtual AP, in kbps.
Actual throughput for the Virtual AP, in kbps. This value may be less than the offered load if the Virtual AP has used all its allocated bandwidth.
Average throughput for the virtual AP, in kbps.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap bw-report | 697
show ap client status
show ap client status <client-mac>
Description
Show the current status of a specific client.
Syntax
Parameter <client-mac>
Description MAC address of a client
Examples
The output of the command shows the status of an individual client in the STA (station) table. (host) #show ap client status 00:13:fd:42:32:38
STA Table --------bssid ----00:1a:1e:a3:02:c9 State Hash Table ---------------bssid ----00:1a:1e:a3:02:c9
auth assoc aid l-int
---- ----- --- -----
y
y
7 10
state
reason
-----
------
auth-assoc 0
essid ----corp-wpa2
vlan-id ------65
tunnel-id --------0x10c0
The output of this command includes the following information:
Column bssid auth
assoc
aid
l-int
essid vlan-id tunnel-id
Description
Basic Service Set ID (BSSID) of the client.
This column displays a y if the AP has been configured for 802.11 authorization frame types. Otherwise, it displays an n.
This column displays a y if the AP has been configured for 802.11 association frame types. Otherwise, it displays an n.
Number of beacons in the 802.11 listen interval. There are ten beacons sent per second, so a ten-beacon listen interval indicates a listen interval time of 1 second.
Number of beacons in the 802.11 listen interval. There are ten beacons sent per second, so a ten-beacon listen interval indicates a listen interval time of 1 second.
Extended Service Set ID (ESSID) of the client.
VLAN ID of the VLAN used by the client
Identification number for the tunnel
698 | show ap client status
AOS-W 6.2 | Reference Guide
Column state
Reason
Description
If the client has been both authorized and associated, this data column will display auth-assoc. If the client has only been authorized, this data column will display auth.
If the client failed to authenticate, this data column lists the reason code for 802.11 authentication failure
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap client status | 699
show ap config
show ap config {ap-group <ap-group>}|{ap-name <ap-name>}|{essid <essid>}
Description
Show a large list of configuration settings for an ap-group or an individual AP.
Syntax
Parameter
Description
ap-group <ap-group> Display configuration settings for an AP group.
ap-name <ap-name>
Display configuration settings for an AP with a specific name.
essid <essid>
Display configuration settings for an AP with a specific Extended Service Set Identifier (ESSID). An Extended Service Set Identifier (ESSID) is a alphanumeric name that uniquely identifies a wireless network. If the name includes spaces, you must enclose the ESSID in quotation marks.
Examples
The example output below shows just some of the configuration settings displayed in the output of this command.
show ap config ap-group apgroup14
---------------------------------------------------
Parameter
802.11g
802.11a
---------
-------
-------
LMS IP
N/A
N/A
"default"
Backup LMS IP
N/A
N/A
"default"
LMS Preemption
Disabled
Disabled
"default"
LMS Hold-down Period
600 sec
600 sec
"default"
Master switch IP address
N/A
N/A
"default"
RF Band
g
g
"default"
Double Encrypt
Disabled
Disabled
"default"
Native VLAN ID
1
1
"default"
SAP MTU
N/A
N/A
"default"
Bootstrap threshold
8
8
"default"
Request Retry Interval
10 sec
10 sec
"default"
Maximum Request Retries
10
10
"default"
Keepalive Interval
60 sec
60 sec
"default"
Dump Server
N/A
N/A
"default"
Telnet
Disabled
Disabled
"default"
Source -----ap system-profile ap system-profile ap system-profile ap system-profile ap system-profile ap system-profile ap system-profile ap system-profile ap system-profile ap system-profile ap system-profile ap system-profile ap system-profile ap system-profile ap system-profile
700 | show ap config
AOS-W 6.2 | Reference Guide
FIPS enable "default" SNMP sysContact "default" RFprotect Server IP "default" RFprotect Backup Server IP "default" AeroScout RTLS Server "default" RTLS Server configuration "default" Remote-AP DHCP Server VLAN "default" Remote-AP DHCP Server Id "default" Remote-AP DHCP Default Router "default" Remote-AP DHCP Pool Start "default" Remote-AP DHCP Pool End "default" Remote-AP DHCP Pool Netmask "default" Remote-AP DHCP Lease Time "default" Heartbeat DSCP "default" Session ACL "default" Image URL "default" Maintenance Mode "default" ...
Disabled
Disabled
ap system-profile
N/A
N/A
ap system-profile
N/A
N/A
ap system-profile
N/A
N/A
ap system-profile
N/A
N/A
ap system-profile
N/A
N/A
ap system-profile
N/A
N/A
ap system-profile
192.168.11.1 192.168.11.1 ap system-profile
192.168.11.1 192.168.11.1 ap system-profile
192.168.11.2 192.168.11.2 ap system-profile
192.168.11.254 192.168.11.254 ap system-profile
255.255.255.0 255.255.255.0 ap system-profile
0 days
0 days
ap system-profile
0
0
ap system-profile
N/A
N/A
ap system-profile
N/A
N/A
ap system-profile
Disabled
Disabled
ap system-profile
The output of this command includes the following parameters.
Parameter LMS IP
LMS IPv6
Backup LMS IP Backup LMS IP
Description
The IPv4 address of the local management switch (LMS)--the Alcatel-Lucent switch which is responsible for terminating user traffic from the APs, and processing and forwarding the traffic to the wired network.
The IPv6 address of the local management switch (LMS)--the Alcatel-Lucent switch which is responsible for terminating user traffic from the APs, and processing and forwarding the traffic to the wired network.
For multi-switch networks, this parameter displays the IPv4 address of a backup to the IP address specified with the lms-ip parameter.
For multi-switch networks, this parameter displays the IPv6 address of a backup to the IP address specified with the lms-ip parameter.
AOS-W 6.2 | Reference Guide
show ap config | 701
Parameter LMS Preemption LMS Hold-down Period Number of IPsec retries
LED operation mode Master switch IP address RF Band Double Encrypt
Native VLAN ID SAP MTU Bootstrap threshold
Request Retry Interval Maximum Request Retries
702 | show ap config
Description
When this parameter is enabled, the local management switch automatically reverts to the primary LMS IP address when it becomes available.
Time, in seconds, that the primary LMS must be available before an AP returns to that LMS after failover.
Shows the number of times the AP will attempt to recreate an IPsec tunnel with the master switch before the AP will reboot. The supported range is 0-1000 retries, and the default value is 360. A value of 0 disables the reboot.
The operating mode for the LEDs (11n APs only) l normal: Normal mode l off: All LEDs off
For multi-switch networks, this parameter displays the IP address of the master switch.
For dual-band radios, this parameter displays the RF band in which the AP should operate: l g = 2.4 GHz l a = 5 GHz
This parameter applies only to remote APs. Double encryption is used for traffic to and from a wireless client that is connected to a tunneled SSID. When enabled, all traffic is re-encrypted in the IPsec tunnel. When disabled, the wireless frame is only encapsulated inside the IPsec tunnel.
Native VLAN for bridge mode virtual APs (frames on the native VLAN are not tagged with 802.1q tags).
Maximum Transmission Unit (MTU) size, in bytes. This value describes the greatest amount of data that can be transferred in one physical frame.
Number of consecutive missed heartbeats on a GRE tunnel (heartbeats are sent once per second on each tunnel) before an AP rebootstraps. On the switch, the GRE tunnel timeout is 1.5 x bootstrap-threshold; the tunnel is torn down after this number of seconds of inactivity on the tunnel.
Interval, in seconds, between the first and second retries of AP-generated requests. If the configured interval is less than 30 seconds, the interval for subsequent retries is increased up to 30 seconds.
Maximum number of times to retry AP-generated requests, including keepalive messages. After the maximum number of retries, the AP either reboots or tries the IP address specified by the backup LMS IP address (if configured).
AOS-W 6.2 | Reference Guide
Parameter Keepalive Interval Dump Server
Telnet SNMP sysContact AeroScout RTLS Server
RTLS Server configuration Remote-AP DHCP Server VLAN Remote-AP DHCP Server Id Remote-AP DHCP Default Router Remote-AP DHCP Pool Start Remote-AP DHCP Pool End Remote-AP DHCP Pool Netmask Remote-AP DHCP Lease Time Remote-AP uplink total bandwidth Remote-AP bw reservation
Heartbeat DSCP Session ACL Maintenance Mode
Remote-AP Local Network Access
Description
Time, in seconds, between keepalive messages from the AP
(For debugging purposes.) Displays the server to receive the core dump generated if an AP process crashes.
Reports whether telnet access the AP is enabled or disabled.
SNMP system contact information.
Displays whether or not the AP will send RFID tag information to an AeroScout real-time asset location (RTLS) server.
Displays whether or not the AP will send RFID tag information to an RTLS server.
Shows the VLAN ID of the remote-AP DHCP server used when switch is unreachable.
Shows the IP Address of the DHCP DNS Server.
Shows the IP Address of the DHCP Default Router.
Shows the IP Address used as start of DHCP Pool.
Shows the IP Address used as end of DHCP Pool.
Shows the netmask of DHCP Pool.
Shows the length of leases, in days (0 means infinite).
This is the total reserved uplink bandwidth (in Kilobits per second)
Session ACLs with uplink bandwidth reservation in kilobits per second. You can specify up to three session ACLs to reserve uplink bandwidth.
DSCP value of AP heartbeats (0-63).
Shows the access control list (ACL) applied on the uplink of a remote AP.
Shows if Maintenance mode is enabled or disabled. If enabled, APs stop flooding unnecessary traps and syslog messages to network management systems or network operations centers when deploying, maintaining, or upgrading the network. The switch still generates debug syslog messages if debug logging is enabled.
Enable or disable local network access across VLANs in a Remote-AP.
AOS-W 6.2 | Reference Guide
show ap config | 703
Parameter Radio enable Mode
Description
Shows if the AP's radio is enabled or disabled.
Shows the operating modes for the AP. l ap-mode: Device provides transparent, secure,
high-speed data communications between wireless network devices and the wired LAN. l am-mode: Device behaves as an air monitor to collect statistics, monitor traffic, detect intrusions, enforce security policies, balance traffic load, selfheal coverage gaps, etc. l spectrum-mode: Device behaves as a spectrum monitor, sending spectrum analysis data to the switch. Spectrum monitors do not serve clients.
High throughput enable (radio)
Shows if high-throughput (802.11n) features on the 2.4 GHz frequency band are enabled or disabled.
Channel
Shows the channel number for the AP's 802.11a/802.11n physical layer.
Beacon Period
Shows the time, in milliseconds, between successive beacon transmissions. The beacon advertises the AP's presence, identity, and radio characteristics to wireless clients.
Beacon Regulate
Enabling this setting introduces randomness in the beacon generation so that multiple APs on the same channel do not send beacons at the same time, which causes collisions over the air.
Transmit EIRP
Shows the current transmission power level.
Advertise 802.11d and 802.11h Capabilities
This column reports whether or not the AP will advertise its 802.11d (Country Information) and 802.11h (TPC or Transmit Power Control) capabilities
TPC Power
The transmit power advertised in the TPC IE of beacons and probe responses. Range: 0-51 dBm
Spectrum Load Balancing
The Spectrum Load Balancing feature helps optimize network resources by balancing clients across channels, regardless of whether the AP or the switch is responding to the wireless clients' probe requests.
If enabled, the switch compares whether or not an AP has more clients than its neighboring APs on other channels. If an AP's client load is at or over a predetermined threshold as compared to its immediate neighbors, or if a neighboring AlcatelLucent AP on another channel does not have any clients, load balancing will be enabled on that AP. This feature is disabled by default.
Spectrum Load Balancing mode
Spectrum Load Balancing Mode allows control over how to balance clients. Select one of the following options l channel: Channel-based load-balancing
balances clients across channels. This is the default load-balancing mode l radio: Radio-based load-balancing balances
704 | show ap config
AOS-W 6.2 | Reference Guide
Parameter
Description clients across APs
Spectrum load balancing update interval Advertised regulatory max EIRP Spectrum load balancing domain
Rx sensitivity tuning based channel reuse
This value determines how often spectrum load balancing calculations are made (in seconds). The default value is 30 seconds.
A cap for an radio's maximum equivalent isotropic radiated power (EIRP). Even if the regulatory approved maximum for a given channel is higher than this EIRP cap, the AP radio using this profile will advertise only this capped maximum EIRP in its radio beacons.
Define a spectrum load balancing domain to manually create RF neighborhoods. This option creates RF neighborhood information for networks that have disabled Adaptive Radio Management (ARM) scanning and channel assignment. l If spectrum load balancing is enabled in a
802.11a radio profile but the spectrum load balancing domain is not defined, AOS-W uses the ARM feature to calculate RF neighborhoods. l If spectrum load balancing is enabled in a 802.11a radio profile and a spectrum load balancing domain isalso defined, AP radios belonging to the same spectrum load balancing domain will be considered part of the same RF neighborhood for load balancing, and will not recognize RF neighborhoods defined by the ARM feature.
The channel reuse feature can operate in either of the following three modes; static, dynamic or disable. (This feature is disabled by default.) l Static mode: This mode of operation is a
coverage-based adaptation of the Clear Channel Assessment (CCA) thresholds. In the static mode of operation, the CCA is adjusted according to the configured transmission power level on the AP, so as the AP transmit power decreases as the CCA threshold increases, and vice versa. l Dynamic mode: In this mode, the Clear Channel Assessment (CCA) thresholds are based on channel loads, and take into account the location of the associated clients. When you set the Channel Reuse This feature is automatically enabled when the wireless medium around the AP is busy greater than half the time. When this mode is enabled, the CCA threshold adjusts to accommodate transmissions between the AP its most distant associated client. l Disable mode: This mode does not support the tuning of the CCA Detect Threshold.
Rx sensitivity threshold
RX Sensitivity Tuning Based Channel Reuse Threshold, in -dBm.
AOS-W 6.2 | Reference Guide
show ap config | 705
Parameter
Non 802.11a interference Immunity
Enable CSA CSA Count Management Frame Throttle interval Management Frame Throttle Limit ARM/WIDS Override Protection for 802.11b Clients Maximum Distance
706 | show ap config
Description
If the Rx Sensitivity Tuning Based Channel reuse feature is set to static mode, this parameter manually sets the AP's Rx sensitivity threshold (in -dBm). The AP will filter out and ignore weak signals that are below the channel threshold signal strength. If the value is set to zero, the feature will automatically determine an appropriate threshold
The value for 802.11 Interference Immunity. This parameter sets the interference immunity on the 2.4 Ghz band. The default setting for this parameter is level 2. When performance drops due to interference from non802.11 interferers (such as DECT or Bluetooth devices), the level can be increased up to level 5 for improved performance. However, increasing the level makes the AP slightly "deaf" to its surroundings, causing the AP to lose a small amount of range. The levels for this parameter are: l Level-0: no ANI adaptation. l Level-1: noise immunity only. l Level-2: noise and spur immunity. This is the
default setting l Level-3: level 2 and weak OFDM immunity. l Level-4: level 3 and FIR immunity. l Level-5: disable PHY reporting.
Displays whether or not the AP has enabled channel switch announcements (CSAs) for 802.11h.
Number of channel switch announcements that must be sent before the AP will switch to a new channel.
Average interval that rate limiting management frames are sent from this radio, in seconds. If this column displays a zero (0) rate limiting is disabled for this AP.
Maximum number of management frames that can come from this radio in each throttle interval.
Shows if Adaptive Radio Management (ARM) and Wireless IDS functions are enabled or disabled. If a radio is configured to operate in Air Monitor mode, then these functions are always enabled, regardless of this option.
Displays whether or not protection for 802.11b clients is enabled or disabled.
Maximum distance between a client and an AP or between a mesh point and a mesh portal, in meters. This value is used to derive ACK and CTS timeout times. A value of 0 specifies default settings for this parameter, where timeouts are only modified for outdoor mesh radios which use a distance of 16km. The upper limit for this parameter varies, depending on the 20/40 MHz mode for a 2.4GHz frequency band radio: l 20MHz mode: 54km
AOS-W 6.2 | Reference Guide
Parameter
Spectrum Monitoring
Assignment Allowed bands for 40MHz channels Client Aware Max Tx Power Min Tx Power Multi Band Scan Rogue AP Aware Scan Interval Active Scan
Scanning
Description
l 40MHz mode: 24km Iff you configure a value above the supported maximum, the maximum supported value will be used instead. Values below 600m will use default settings.
When this parameter is enabled, it turns an AP in apmode into a hybrid AP. An AP in hybrid AP mode will continue to serve clients as an access point while it scans and analyzes spectrum analysis data for a single radio channel.
Displays whether or not ARM channel and power assignment has been enabled or disabled.
Forty MHz channels may be used on the specified radio bands (802.11a or 802.11g).
Shows if the client aware feature has been enabled or disabled for this AP. If enabled, AP will not change channels when there are active clients.
Maximum transmission power for this AP, in dBm.
Minimum transmission power for this AP, in dBm.
Shows if the multi-band scan feature has been enabled or disabled on this AP. If enabled, singleradio APs will try to scan across bands for Rogue AP detection
Shows if the rogue AP awareness feature has been enabled or disabled on this AP. If enabled, the AP will try to contain off-channel Rogue APs
This column indicates, in seconds, how often the AP will leave its current channel to scan other channels in the band if scanning is enabled
Displays whether or not the active scan feature is enabled. NOTE: This option elicits more information from nearby APs, but also creates additional management traffic on the network. Active Scan is disabled by default, and should not be enabled except under the direct supervision of Alcatel-Lucent Support.
Shows if scanning is enabled or disabled for this AP. If this option is disabled, the following other options will also be disabled: l Multi Band Scan l Rogue AP Aware l Voip Aware Scan l Power Save Scan
AOS-W 6.2 | Reference Guide
show ap config | 707
Parameter Scan Time VoIP Aware Scan Power Save Aware Scan Ideal Coverage Index
Acceptable Coverage Index Free Channel Index
Backoff Time Error Rate Threshold Error Rate Wait Time Noise Threshold 708 | show ap config
Description
The amount of time, in milliseconds, an AP will drift out of the current channel to scan another channel. The supported range for this setting is 0-2,147,483, 647 seconds. Best practices are to configure a scan time between 50-200 msec.
Shows if VoIP aware scanning is enabled or disabled. If you use voice handsets in the WLAN, VoIP Aware Scan should be enabled in the ARM profile so the AP will not attempt to scan a different channel if one of its clients has an active VoIP call. This option requires that Scanning is also enabled.
Shows if the power save aware scan is enabled or disabled. If enabled, the AP will not scan a different channel if it has one or more clients and is in power save mode. Default: enabled
The Alcatel-Lucent coverage index metric is a weighted calculation based on the RF coverage for all Alcatel-LucentAPs and neighboring APs on a specified channel. The Ideal Coverage Index specifies the ideal coverage that an AP should try to achieve on its channel. The denser the AP deployment, the lower this value should be.
For multi-band implementations, the Acceptable Coverage Index specifies the minimal coverage an AP it should achieve on its channel. The denser the AP deployment, the lower this value should be.
The current free channel index value. The AlcatelLucent Interference index metric measures interference for a specified channel and its surrounding channels. This value is calculated and weighted for all APs on those channels (including 3rd-party APs). An AP will only move to a new channel if the new channel has a lower interference index value than the current channel. Free Channel Index specifies the required difference between the two interference index values before the AP moves to the new channel. The lower this value, the more likely it is that the AP will move to the new channel.
After an AP changes channel or power settings, it waits for this backoff time interval before it asks for a new channel/power setting.
The minimum percentage of PHY errors and MAC errors in the channel that will trigger a channel change.
Minimum time in seconds the error rate on the AP has to exceed its defined error rate threshold before it triggers a channel change.
Maximum level of noise in a channel that triggers a channel change.
AOS-W 6.2 | Reference Guide
Parameter Noise Wait Time Minimum Scan Time Load aware Scan Threshold
Mode Aware Arm
Scan mode 40 MHz intolerance Honor 40 MHz intolerance Legacy station workaround SSID enable ESSID Encryption DTIM Interval
AOS-W 6.2 | Reference Guide
Description
Minimum time in seconds the noise level has to exceed the Noise Threshold before it triggers a channel change on the AP.
Minimum number of times a channel must be scanned before it is considered for assignment. Best practices are to configure a Minimum Scan Time between 1-20 scans.
The Load Aware Scan Threshold is the traffic throughput level an AP must reach before it stops scanning. Load aware ARM preserves network resources during periods of high traffic by temporarily halting ARM scanning if the load for the AP gets too high.
Shows if the mode-aware ARM feature has been enabled or disabled for this AP. If enabled, ARM will turn the AP into an Air Monitors (AMs) if it detects higher coverage levels than necessary. This helps avoid higher levels of interference on the WLAN. Although this setting is disabled by default, you may want to enable this feature if your APs are deployed in close proximity (e.g. less than 60 feet apart).
Identifies the scan mode for the AP. l all-reg-domain: The AP scans channels within all
regulatory domains. This is the default setting. l reg-domain:Limit the AP scans to just the
regulatory domain for that AP.
The specified setting allows ARM to determine if 40 MHz mode of operation is allowed on the 5 GHz or 2.4 GHz frequency band only, on both frequency bands, or on neither frequency band.
Shows if 40 MHz intolerance is enabled or disabled. If enabled, the radio will stop using the 40 MHz channels if the 40 MHz intolerance indication is received from another AP or station.
Shows if interoperability for misbehaving legacy stations is enabled or disabled.
Shows if the SSID is enabled or disabled
Name that uniquely identifies the Extended Service Set Identifier (SSID).
Encryption type used on this AP.
Shows the interval, in milliseconds, between the sending of Delivery Traffic Indication Messages (DTIMs) in the beacon. This is the maximum number of beacon cycles before unacknowledged network broadcasts are flushed.
show ap config | 709
Parameter Basic Rates Transmit Rates
Station Ageout Time Max Transmit Attempts RTS Threshold
Short Preamble
Max Associations Wireless Multimedia (WMM) Wireless Multimedia U-APSD (WMM-UAPSD) Powersave WMM TSPEC Min Inactivity Interval DSCP mapping for WMM voice AC DSCP mapping for WMM video AC DSCP mapping for WMM best-effort AC DSCP mapping for WMM background AC
Description
Lists supported 802.11a rates, in Mbps, that are advertised in beacon frames and probe responses from this AP.
Lists 802.11a rates at which the AP is allowed to send data. The actual transmit rate depends on what the client is able to handle, based on information sent at the time of association and on the current error/loss rate of the client.
Time, in seconds, that a client is allowed to remain idle before being aged out.
Maximum number of retries allowed for the AP to send a frame
Wireless clients transmitting frames larger than this threshold must issue Request to Send (RTS) and wait for the AP to respond with Clear to Send (CTS). This helps prevent mid-air collisions for wireless clients that are not within wireless peer range and cannot detect when other wireless clients are transmitting.
Shows if a short preamble for 802.11b/g radios is enabled or disabled for this AP. Network performance may be higher when short preamble is enabled. In mixed radio environments, some 802.11b wireless client stations may experience difficulty associating with the AP using short preamble. To use only long preamble, disable short preamble. Legacy client devices that use only long preamble generally can be updated to support short preamble.
Maximum number of wireless clients allowed to associate to the AP
Shows if Wireless Multimedia (WMM) is enabled or disabled for this AP. WMM provides prioritization of specific traffic relative to other traffic in the network
Shows if Wireless Multimedia (WMM) UAPSD powersave is enabled or disabled.
Displays the minimum inactivity time-out threshold of WMM traffic for this AP.
Displays the DSCP value used to map WMM voice traffic.
Displays the DSCP value used to map WMM video traffic.
Displays the DSCP value used to map WMM besteffort traffic
Displays the DSCP value used to map WMM background traffic.
710 | show ap config
AOS-W 6.2 | Reference Guide
Parameter 902il Compatibility Mode
Hide SSID Deny_Broadcast Probes
Local Probe Response
Disable Probe Retry Battery Boost
Drop Broadcast and Multicast WEP Key 1 WEP Key 2 WEP Key 3 WEP Key 4 WEP Transmit Key Index WPA Hexkey WPA Passphrase Maximum Transmit Failures
AOS-W 6.2 | Reference Guide
Description
Shows if 902 il compatibility mode is enabled or disabled. (This parameter only needs to be enabled for APs with associated clients using NTT DoCoMo 902iL phones.)
Shows if the feature to hide a SSID name in beacon frames is enabled or disabled.
When a client sends a broadcast probe request frame to search for all available SSIDs, this option controls whether or not the system responds for this SSID. When enabled, no response is sent and clients have to know the SSID in order to associate to the SSID. When disabled, a probe response frame is sent for this SSID.
Shows if local probe response is enabled or disabled on the AP. If this option is enabled, the AP is responsible for sending 802.11 probe responses to wireless clients' probe requests. If this option is disabled, then the switch sends the 802.11 probe responses
If disabled, the AP will not resend probes if it does not get a response.
Shows if the battery boost feature is enabled or disabled for the AP. If enabled, this feature converts multicast traffic to unicast before delivery to the client, thus allowing you to set a longer DTIM interval. The longer interval keeps associated wireless clients from activating their radios for multicast indication and delivery, leaving them in power-save mode longer and thus lengthening battery life
If this feature is enabled on an AP, it drops all downstream broadcast or multicast traffic to increase battery life.
Displays the static WEP key (1 of 4).
Displays the static WEP key (2 of 4).
Displays the static WEP key (3 of 4).
Displays the static WEP key (4 of 4).
Displays the key index that specifies which static WEP key is to be used.
Displays the WPA pre-shared key (PSK).
Displays the WPA passphrase with which the AP generates a pre-shared key (PSK).
Display the maximum number of transmission failures allowed before the client gives up.
show ap config | 711
Parameter BC/MC Rate Optimization
Rate Optimization for delivering EAPOL frames Strict Spectralink Voice Protocol (SVP) 802.11g Beacon Rate
802.11a Beacon Rate
Advertise QBSS Load IE High throughput enable (SSID) 40 MHz channel usage MPDU Aggregation Max transmitted A-MPDU size Max received A-MPDU size Min MPDU start spacing Supported MCS set Short guard interval in 20 MHz mode Short guard interval in 40 MHz mode
Description
Shows if the AP has enabled or disabled scanning of all active stations currently associated to that AP to select the lowest transmission rate for broadcast and multicast frames. This option only applies to broadcast and multicast data frames; 802.11 management frames are transmitted at the lowest configured rate.
Shows if the AP has enabled or disabled rate optimization for delivering EAPOL frames.
Shows if strict Spectralink Voice Protocol (SVP) is enabled or disabled.
Sets the beacon rate for 802.11g for APs use a Distributed Antenna System (DAS). Using this parameter in normal operation may cause connectivity problems.
Sets the beacon rate for 802.11a for APs use a Distributed Antenna System (DAS). Using this parameter in normal operation may cause connectivity problems.
Shows if the AP has enabled or disabled the advertising of QBSS in the load IE.
Shows if the AP has enabled or disabled the use of its high-throughput SSID in 40 MHz mode.
Determines if this high-throughput SSID allows highthroughput (802.11n) stations to associate.
Shows if the AP has enabled or disabled MAC protocol data unit (MDPU) aggregation.
Shows the maximum size, in bytes, of an A-MPDU that can be sent on the AP's high-throughput SSID.
Shows the maximum size, in bytes, of an AggregatedMAC Packet Data Unit (A-MPDU) that can be received on the AP's high-throughput SSID.
Displays the minimum time between the start of adjacent MDPUs within an aggregate MDPU, in microseconds.
Comma-separated list of Modulation Coding Scheme (MCS) values or ranges of values to be supported on this high-throughput SSID.
Shows if the AP has enabled or disabled use of short guard interval in 20 MHz mode of operation.
Shows if the AP has enabled or disabled use of short guard interval in 40 MHz mode of operation.
712 | show ap config
AOS-W 6.2 | Reference Guide
Parameter Maximum number of spatial streams usable for STBC transmission
Minimum number of spatial streams usable for STBC transmission
Legacy stations
Allow weak encryption
Virtual AP enable Allowed band
VLAN Forward mode
Description
Controls the maximum number of spatial streams usable for STBC transmission. 0 disables STBC transmission, 1 uses STBC for MCS 0-7. Higher MCS values are not supported. (Supported on the OAWAP90, OAW-AP130 Series, OAW-AP175, OAW-AP68 and OAW-AP105 only. The configured value will be adjusted based on AP capabilities.)
Controls the maximum number of spatial streams usable for STBC reception. 0 disables STBC reception, 1 uses STBC for MCS 0-7. Higher MCS values are not supported. (Supported on the OAWAP90, OAW-AP130 Series, OAW-AP175, OAW-AP68 and OAW-AP105 only. The configured value will be adjusted based on AP capabilities.)
Shows if the AP has enabled or disabled the legacy stations option, which controls whether or not legacy (non-HT) stations are allowed to associate with the AP's SSID. By default, legacy stations are allowed to associate. NOTE: This setting has no effect on a BSS in which HT support is not available.
Shows if the AP has enabled or disabled the weak encryption option. The use of TKIP or WEP for unicast traffic forces the use of legacy transmissions rates. Disabling this mode prevents the association of stations using TKIP or WEP for unicast traffic. This mode is disabled by default.
Wireless LAN profiles configure WLANs in the form of virtual AP profiles. This parameter shows if the AP has enabled or disabled virtual APs.
Shows the band(s) on which to use the virtual AP: l a--802.11a band only (5 GHz) l g--802.11b/g band only (2.4 GHz) l all--both 802.11a and 802.11b/g bands (5 GHz
and 2.4 GHz)
Shows the VLAN(s) into which users are placed in order to obtain an IP address.
Shows the current forward mode (tunnel, bridge, splittunnel, or decrypt-tunnel) for the virtual AP. This parameter controls whether 802.11 frames are tunneled to the switch using generic routing encapsulation (GRE), bridged into the local Ethernet LAN (for remote APs), or a combination thereof depending on the destination (corporate traffic goes to the switch, and Internet access remains local).
AOS-W 6.2 | Reference Guide
show ap config | 713
Parameter
Deny time range Mobile IP HA Discovery on-association
DoS Prevention Station Blacklisting Blacklist Time Authentication Failure Blacklist Time Fast Roaming
Description
When an AP is configured to use the decrypt-tunnel forwarding mode, that AP decrypts and decapsulates all 802.11 frames from a client and sends the 802.3 frames through the GRE tunnel to the switch, which then applies firewall policies to the user traffic. When the switch sends traffic to a client, the switch sends 802.3 traffic through the GRE tunnel to the AP, which then converts it to encrypted 802.11 and forwards to the client. Only 802.1X authentication is supported when configuring bridge or split tunnel mode.
Shows the time range for which the AP will deny access for a virtual AP.
Shows if IP mobility has been enabled or disabled for the virtual AP.
If enabled, home agent discovery is triggered on client association instead of home agent discovery based on traffic from client. Mobility on association can speed up roaming and improve connectivity for clients that do not send many uplink packets to trigger mobility (VoIP clients).Best practices is to keep this parameter disabled,r as it increases IP mobility control traffic between switches in the same mobility domain. Enable this parameter only when voice issues are observed in VoIP clients. NOTE: ha-disc-onassoc parameter works only when IP mobility is enabled and configured on the switch.
Shows the status of the Dos Prevention option. If enabled, virtual APs ignore deauthentication frames from clients. This prevents a successful deauth attack from being carried out against the AP. This does not affect third-party APs.
Shows if the virtual AP has enabled or disabled detection of denial of service (DoS) attacks, such as ping or SYN floods, that are not spoofed deauth attacks.
Shows the number of seconds that a client will be quarantined from the network after being blacklisted.
Shows the time, in seconds, a client is blocked if it fails repeated authentication. If the virtual AP shows a value of 0, a blacklisted client is blocked indefinitely.
Shows if the AP has enabled or disabled fast roaming.
714 | show ap config
AOS-W 6.2 | Reference Guide
Parameter Strict Compliance
VLAN Mobility Remote-AP Operation
Convert Broadcast ARP requests to unicast Band Steering
VoIP Call Admission Control VoIP Bandwidth based CAC VoIP Call Capacity VoIP Bandwidth Capacity (kbps)
Description
If enabled, the virtual AP denies client association requests if the AP and client station have no common rates defined. Some legacy client stations which are not fully 802.11-compliant may not include their configured rates in their association requests. Such non-compliant stations may have difficulty associating with APs unless strict compliance is disabled.
Shows if a virtual AP has enabled or disabled VLAN (Layer-2) mobility
Shows when the virtual AP operates on a remote AP: l always--Permanently enables the virtual AP. l backup--Enables the virtual AP if the remote AP
cannot connect to the switch. l persistent--Permanently enables the virtual AP
after the remote AP initially connects to the switch. l standard--Enables the virtual AP when the remote
AP connects to the switch. A remote AP should use always and backup for bridge SSIDs, and use persistent and standard for 802.1X, tunneled, and split-tunneled SSIDs.
If this option is enabled, all broadcast ARP requests are converted to unicast and sent directly to the client. You can check the status of this option using the show ap active and the show datapath tunnel command. If enabled, the output will display the letter a in the flags column.
Shows if band-steering has been enabled or disabled for a virtual AP. ARM's band steering feature encourages dual-band capable clients to stay on the 5GHz band on dualband APs. This frees up resources on the 2.4GHz band for single band clients like VoIP phones. Band steering reduces co-channel interference and increases available bandwidth for dual-band clients, because there are more channels on the 5GHz band than on the 2.4GHz band. Dual-band 802.11ncapable clients may see even greater bandwidth improvements, because the band steering feature will automatically select between 40MHz or 20MHz channels in 802.11n networks. This feature is disabled by default, and must be enabled in a Virtual AP profile.
Shows if WiFi VoIP Call Admission Control features are enabled or disabled.
Shows the maximum bandwidth that can be handled by one radio, in kbps.
Show the number of simultaneous calls that can be handled by one radio.
Shows the maximum bandwidth that can be handled by one radio, in kbps.
AOS-W 6.2 | Reference Guide
show ap config | 715
Parameter VoIP Call Handoff Reservation
Description
Shows the percentage of call capacity reserved for mobile VoIP clients on call.
VoIP Send SIP 100 Trying
VoIP Disconnect Extra Call VOIP TSPEC Enforcement VOIP TSPEC Enforcement Period VoIP Drop SIP Invite and send status code (client)
VoIP Drop SIP Invite and send status code (server)
If enabled, the AP sends SIP 100 - trying messages to a call originator to indicate that the call is proceeding. This is useful when the SIP invite may be redirected through a number of servers before reaching the switch.
If enabled, the AP disconnects calls that exceed the high capacity threshold by sending a deauthentication frame.
Shows if validation of TSPEC requests for call admission controls is enabled or disabled.
Displays the maximum time for the station to start a call after the TSPEC request.
Displays the status code sent to the client when a SIP Invite is dropped. l 480: Temporary Unavailable l 486: Busy Here l 503: Service Unavailable l none: Don't send SIP status code
Displays the status code sent to the server when a SIP Invite is dropped. l 480: Temporary Unavailable l 486: Busy Here l 503: Service Unavailable l none: Don't send SIP status code
Related Commands
Command
ap system-profile rf dot11g-radio-profile rf arm-profile rf ht-radio-profile wlan ht-ssid-profile wlan virtual-ap wlan voip-cac-profile
Description
The output of the show ap config command displays the content of the profile settings for an individual AP or AP group. Use the commands displayed in the column to the left to configure these parameters.
Mode
Enable and Config modes
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
716 | show ap config
Command Mode Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap coverage-holes (deprecated)
show ap coverage holes
Description
Show information for APs that have detected coverage holes in the wireless network.
Command History
Version AOS-W 2.0 AOS-W 6.1
Description Command introduced Command deprecated
AOS-W 6.2 | Reference Guide
show ap coverage-holes (deprecated) | 717
show ap database
show ap database {group <group>|inactive|indoor|local|long|outdoor|{page <page>}| sensors [disconnected]|sort-by [ap-group|ap-ip|ap-type|fqln|provisioned|status {up|down}|switch-ip] |sort-direction[ascending|descending]|start <start> |status {up|down]|switch <switch-ipaddr>|unprovisioned|usb}
Description
Show the list of access points in the switch's database.
Syntax
Parameter group <group> inactive
indoor local long
outdoor page <page>
sensors disconnected
sort-by ap-group ap-ip ap-type fqln provisioned status up|down
switch-ip
Description
Show data for a specified AP group.
Show only local APs with no active BSSIDs or wired AP interfaces.
Show only APs that have an installation mode set to "indoor."
Show only APs on this switch.
Display the following additional data columns: l Wired MAC Address, l Serial # l Slot/Port l FQLN
Show only APs that have an installation mode set to "outdoor."
Display a limited number of APs by entering the number of APs to be displayed in the output of this command.
Show only RFprotect sensors.
Show only disconnected RFprotect sensors.
Sort the output of this command by a specific data column.
Sort by AP group name.
Sort by AP group name.
Sort by AP model.
Sort by Fully Qualified Location Name (FQLN).
Sort by provisioning statistics.
If used with the sort-by keyword, status sorts the output of the command by status type (up or down.) Otherwise, use the status keyword to display APs with the specified status.
Sort by switch IP address.
718 | show ap database
AOS-W 6.2 | Reference Guide
Parameter sort-direction
ascending descending start <start> status down up switch <switch-ip-addr>
unprovisioned usb
Description Choose sort direction of AP list:. Sort AP list in ascending order by name. Sort AP list in descending order by name. Start showing the AP index at the specified index number. Show only APS with a given status as active or inactive. Show only APs that are inactive. Show only APs that are active. Show only APs registered with a specified switch by entering a switch IP address. Show only unprovisioned APs (using modifiers). Show USB related parameters.
Usage Guidelines
Many of the parameters in this command can be used together to filter a large database of information down to just the AP data you want to see. For example, you can issue the command show ap database group <group> local status up to view a list of local APs within a specific AP group that are reporting an up status. Include the sort-by and sort-direction keywords to specify how the data is sorted in the output of this command.
Example
The output of the command show ap database shows the switch's database of information for APs in the group default. The output also includes a description of the flag types that may appear in the Flags column.
show ap database group default
AP Database
-----------
Name
Group AP Type IP Address Status
Flags Switch IP
----
----- ------- ---------- ------
----- ---------
3.125.141112 default 125
192.0.2.12 Up 1h:48m:27s
10.4.97.4
3.125.142113 default 125
192.0.2.12 Up 1h:43m:6s
10.4.97.6
3.125.242115 default 125
192.0.2.13 Up 1h:41m:18s
10.4.97.10
3.60.161112 default 60
192.0.2.14 Up 1h:43m:20s
10.4.97.4
3.60.202108 default 60
192.0.2.15 Up 8h:7m:4s R
10.4.97.4
3.61.101100 default 61
192.0.2.16 Up 7h:32m:13s R
10.4.97.4
3.61.161113 default 61
192.0.2.17 Up 1h:43m:20s
10.4.97.4
3.65.101117 default 65
192.0.2.18 Up 8h:39m:7s R
10.4.97.4
3.65.121108 default 65
192.0.2.29 Up 1h:55m:14s
10.4.97.4
3.65.292112 default 65
192.0.2.32 Up 1h:43m:42s
10.4.97.10
3.70.102116 default 70
192.0.2.43 Up 8h:23m:17s R
10.4.97.4
3.70.131107 default 70
192.0.2.44 Up 1h:55m:10s
3.70.172103 default 70
192.0.2.56 Up 1h:42m:24s
10.4.97.6
3.85.152116 default 85
192.0.2.57 Up 1h:42m:56s
10.4.97.6
3.85.252117 default 85
192.0.2.58 Up 1h:43m:18s
10.4.97.10
AP-61-20
default 61
192.0.2.59 Up 21m:36s
o
10.3.47.189
Flags: U = Unprovisioned; N = Duplicate name; G = No such group; L = Unlicensed
R = Remote AP; I = Inactive; X = Maintenance Mode; P = PPPoE AP
S = RFprotect Sensor; d = Disconnected Sensor; H = Using 802.11n license
M = Mesh node; Y = Mesh Recovery i = Indoor; o = Outdoor
AOS-W 6.2 | Reference Guide
show ap database | 719
Total APs:15
Related Commands
Command show ap database-summary
Description
To display a more general summary overview of the AP registered to a switch, use the command show ap database-summary.
Mode
Enable and Config modes
Command History
Version AOS-W 3.0 AOS-W 6.2
Modification Command introduced The usb parameter was introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
720 | show ap database
AOS-W 6.2 | Reference Guide
show ap database-summary
show ap database-summary
Description
Show a general summary of access point information for this switch.
Usage Guidelines
Use this command to show the current number of active APs and Air Monitors. This command is also useful for determining how many unprovisioned APs or duplicate APs are on the network. For full details on each AP registered to a switch, use the command show ap database.
Examples
The output of this command shows that this switch can detect a total of five APs, four up, and one down.
AP Database Summary
-------------------
AP Mode
Total Up Total Down
Down RAP Upgrading* RAP Rebooting*
-------
-------- ----------
- -------------- --------------
Access Points
4
1
0
0
Air Monitors
0
0
0
0
Wired Access Points 0
0
0
0
Mesh Portals
0
0
0
0
Mesh Points
0
0
0
0
Spectrum Monitors 1
1
0
0
Total Upgrading* ---------------0 0 0 0 0 0
Total Rebooting* ---------------0 0 0 0 0 0
RAP Up -----0 0 0 0 0 0
RAP ------0 0 0 0 0 0
*Upgrading and Rebooting counts only reflect APs registered on this switch.
The output of this command includes the following information:
Column Total Up Total Down IPSEC Up IPSEC Down
Description Total number of APs with an up status. Total number of APs with a down status. Total number of APs with an active (up) IPsec tunnel. Total number of APs with an inactive (down) IPsec tunnel.
Command History
Introduced in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show ap database-summary | 721
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
722 | show ap database-summary
AOS-W 6.2 | Reference Guide
show ap debug association-failure (deprecated)
show ap debug association-failure [{ap-name <ap-name>}|{bssid <bssid>}|{client-mac <clientmac>}|{essid <essid>}|{ip-addr <ip-addr>}]
Description
Display association failure information that can be used to troubleshoot problems on an AP.
Command History
Platforms AOS-W 3.0 AOS-W 5.0
Licensing Command introduced Command deprecated
AOS-W 6.2 | Reference Guide
show ap debug association-failure (deprecated) | 723
show ap debug bss-config
show ap debug bss-config [ap-name <ap-name>|bssid <bssid>||essid <essid>|ip-addr <ipaddr>|port <port>/<slot>]
Description
Show the configuration for each BSSID of an AP. This information can be used to troubleshoot problems on an AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid> essid <essid>
ip-addr <ip-addr> port <port>/<slot>
Description
Filter the AP Config table by AP name.
Filter the AP Config table by BSSID. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Filter the AP Config table by ESSID. An Extended Service Set Identifier (ESSID) is a alphanumeric name that uniquely identifies a wireless network. If the name includes spaces, you must enclose the ESSID in quotation marks.
Filter the AP Config table by IP address by entering an IP address in dotteddecimal format.
Filter the AP Config table by port and slot numbers. The slot and port numbers should be separated by a forward slash (/).
Examples
The output of this command shows the AP configuration table for a specific BSSID.
(host) #show ap debug bss-config
Alcatel-Lucent AP Config Table
---------------------
bss
ess vlan ip
phy type fw-mode max-cl rates tx-rates preamble mtu
---
--- ---- --
--- ---- ------- ------ ----- -------- -------- ---
status wmm
------ ---
00:1a:1e:11:24:c2 cera2 66 10.6.1.203 g-HT ap tunnel 64
0x3 0xfff enable 0
enable enable
00:1a:1e:8d:5b:11 wpa2 65 10.6.1.198 a-HT ap tunnel 20
0x150 0xff0 -
0
enable enable
00:0b:86:9b:e5:60 guest 63 10.6.14.79 g ap tunnel 20
0x2 0x3fe enable 0
enable enable
00:1a:1e:97:e5:41 voip 66 10.6.1.199 g-HT ap tunnel 20
0xc 0x14c enable 0
enable enable
00:1a:1e:11:74:a1 voip 66 10.6.1.197 g-HT ap tunnel 20
0xc 0x14c enable 0
enable enable
00:1a:1e:11:5f:11 wpa2 65 10.6.1.200 a-HT ap tunnel 20
0x150 0xff0 -
0
enable enable
The output of this command includes the following information:
Column bss
Description Basic Service Set (BSS) identifier, which is usually the AP's MAC address.
724 | show ap debug bss-config
AOS-W 6.2 | Reference Guide
Column ess vlan IP phy
type fw-mode
max-cl preamble
MTU status wmm
Description
Extended Service Set (ESS) identifier; a user-defined name for a wireless network.
The BSSID's VLAN number.
The AP's IP address.
One of the following 802.11 types la l a-HT (high-throughput) lg l g-HT (high-throughput)
This column shows if the BSSID is for an access point (ap) or an air monitor (am).
The configured forward mode for the AP's virtual AP profile. l bridge: Bridge locally l split-tunnel: Tunnel to switch or NAT locally l tunnel: Tunnel to switch
The maximum number of clients allowed for this BSSID.
Shows if short preambles are enabled for 802.11b/g radios. Network performance may be higher when short preamble is enabled. In mixed radio environments, some 802.11b wireless client stations may experience difficulty associating with the AP using a short preamble.
Maximum Transmission Unit (MTU) size, in bytes. This value describes the greatest amount of data that can be transferred in one physical frame.
Shows if this BSSID is enabled or disabled.
Shows if the BSSID has enabled or disabled WMM, also known as IEEE 802.11e Enhanced Distribution Coordination Function (EDCF) WMM provides prioritization of specific traffic relative to other traffic in the network.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap debug bss-config | 725
show ap debug bss-stats
show ap debug bss-stats [bssid <bssid>]
Description
Show debug and troubleshooting statistics from a specific BSSID of an AP.
Syntax
Parameter bssid <bssid>
Description
Show data for a specific Basic Service Set Identifier (BSSID) on an AP. An AP's BSSID is usually the AP's MAC address.
Examples
The example below shows part of the output of the command show ap debug bss-stats bssid <bssid>.
(host) #show ap debug bss-stats bssid 00:1a:1e:11:5f:11
BSSID Stats
-----------
Parameter
Value
---------
-----
------------------- General Per-radio Statistics
------------------- Transmit specific Statistics
Frames Rcvd For TX 4263
Tx Frames Dropped 613
Frames Transmitted 3650
Success With Retry 0
Tx Mgmt Frames
451975
Beacons Transmitted 447712
Tx Probe Responses 4263
Tx Data Frames
0
Multicast Data
0
Tx CTS Frames
0
Dropped After Retry 613
Dropped No Buffer 0
Missed ACKs
613
Long Preamble
4263
Short Preamble
0
Tx EAPOL Frames
0
Tx 6 Mbps
3650
Tx WMM [VO]
4263
UAPSD OverflowDrop 0
------------------- Receive specific Statistics
Last SNR
0
Last ACK SNR
23
Last ACK SNR CTL0 15
Last ACK SNR CTL1 22
Last ACK SNR CTL2 15
The output of this command includes the following information:
726 | show ap debug bss-stats
AOS-W 6.2 | Reference Guide
Parameter Frames Rcvd For TX Tx Frames Dropped Frames Transmitted Success With Retry Tx Mgmt Frames Beacons Transmitted Tx Probe Responses Tx Data Frames Multicast Data Tx CTS Frames Dropped After Retry Dropped No Buffer Missed ACKs Long Preamble Short Preamble Tx EAPOL Frames
Tx 6 Mbps Tx 9 Mbps Tx 12 Mbps Tx 18 Mbps Tx 24 Mbps Tx 36 Mbps Tx 48 Mbps Tx 54 Mbps Tx HT 108 Mbps Tx HT 120 Mbps Tx HT 162 Mbps Tx HT 180 Mbps
Description Number of frames received for transmission. Number of transmission frames that were dropped. Number of frames successfully transmitted. Number of frames that were transmitted after being retried. Number of management frames transmitted. Number of beacons transmitted. Number of transmitted probe responses. Number of transmitted data frames. Number of multicast and broadcast frames transmitted. Number of clear-to-sent (CTS) frames transmitted. Number of frames dropped after an attempted retry. Number of frames dropped because the AP's buffer was full. Number of missed acknowledgements (ACKs). Number of frames sent with a long preamble. Number of frames sent with a short preamble. Number of Extensible Authentication Protocol over LAN (EAPOL) frames transmitted. Number of frames transmitted at 6 Mbps. Number of frames transmitted at 9 Mbps. Number of frames transmitted at 12 Mbps. Number of frames transmitted at 18 Mbps. Number of frames transmitted at 24 Mbps. Number of frames transmitted at 36 Mbps. Number of frames transmitted at 48 Mbps. Number of frames transmitted at 54 Mbps. Number of frames transmitted at 108 Mbps. Number of frames transmitted at 120 Mbps. Number of frames transmitted at 162 Mbps. Number of frames transmitted at 180 Mbps.
AOS-W 6.2 | Reference Guide
show ap debug bss-stats | 727
Parameter Tx HT 216 Mbps Tx HT 240 Mbps Tx HT 243 Mbps Tx HT 270 Mbps Tx HT 300 Mbps Tx WMM
UAPSD OverflowDrop Last SNR Last SNR CTL0 Last SNR CTL1
Last SNR CTL2
Last ACK SNR Last ACK SNR CTL0 Last ACK SNR CTL1 Last ACK SNR CTL2 Last ACK SNR EXT0
Last ACK SNR EXT1
Last ACK SNR EXT2
Description
Number of frames transmitted at 216 Mbps.
Number of frames transmitted at 240 Mbps.
Number of frames transmitted at 243 Mbps.
Number of frames transmitted at 270 Mbps.
Number of frames transmitted at 300 Mbps.
Number of Wifi Multimedia (WMM) packets transmitted for the following access categories. If the AP has not transmitted packets in a category type, this data row will not appear in the output of the command. Tx WMM [BE]: Best Effort Tx WMM [BK]: Background Tx WMM [VO]: VoIP Tx WMM [VI]: Video
Number of Wifi Multimedia (WMM) VoIP packets transmitted.
Number of packets dropped due to Unscheduled Automatic Power Save Delivery (U-APSD) overflow.
The last recorded signal-to-noise ratio.
The signal-to-noise ratio for the last received data packet on the primary (control) channel 0. This parameter is only displayed for APs operating in 40 Mhz mode.
The signal-to-noise ratio for the last received data packet on the secondary (control) channel 1. This parameter is only displayed for APs operating in 40 Mhz mode.
The signal-to-noise ratio for the last received data packet on the secondary (control) channel 2. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet.
Signal-to-noise ratio for the last received ACK packet on the primary (control) channel 0. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet on the primary (control) channel 1. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet on the primary (control) channel 2. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet on the secondary (extension) channel 0. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet on the secondary (extension) channel 1. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet on the secondary (extension) channel 2. This parameter is only displayed for APs operating in 40 Mhz mode.
728 | show ap debug bss-stats
AOS-W 6.2 | Reference Guide
Parameter Frames Received Rx Data Frames Null Data Frames Rx Mgmt Frames Control Frames Frames To Me Probe Requests PS Poll Frames Rx 6 Mbps Rx 9 Mbps Rx 12 Mbps Rx 18 Mbps Rx 24 Mbps Rx 36 Mbps Rx 48 Mbps Rx 54 Mbps
Description Number of frames received. Number of data frames received. Number of null data frames received. Number of management frames received. Number of control frames received. Number of wireless frames received that are addressed to the specified BSSID. Number of probe requests. Number of Power Save poll frames Number of frames received at 6 Mbps. Number of frames received at 9 Mbps. Number of frames received at 12 Mbps. Number of frames received at 18 Mbps. Number of frames received at 24 Mbps. Number of frames received at 36 Mbps. Number of frames received at 48 Mbps. Number of frames received at 54 Mbps.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap debug bss-stats | 729
show ap debug client-mgmt-counters
show ap debug client-mgmt-counters
Description
Show the numbers of each type of message from an AP's clients. This information can be used to troubleshoot problems on an AP.
Examples
The output of the command below shows client management counters.
(host)#show ap debug client-mgmt-counters
Counters
--------
Name
Value
----
-----
Validate Client
512
AP Stats Update Message
557750
3087
6
Tunnel VLAN Membership
4493
Update STA Tunnel Request
229
Update STA Tunnel Response 229
ARM Update
808921
ARM Propagate
590567
ARM Neighbor Assigned
55396
STM SAP Down
19
AP Message
192
STA On Call Message
12164
STA Message
19750
STA SIP authenticate Message 10919
STA Deauthenticate
707
Stat Update V3
441447
VoIP CAC State Announcement 37185
Remote AP State
371330
AP Message Response
164
assoc-req
4358
assoc-resp
4358
reassoc-req
950
reassoc-resp
950
disassoc
452
deauth
5117
sapcp
351131
The output of this command includes the following information:
Parameter
Description
Validate Client
Number of times a client was validated.
AP Stats Update Message
Number of times an AP updated its statistics with the switch.
3087
(For internal use only)
Tunnel VLAN Membership
(For internal use only)
Update STA Tunnel Request (For internal use only)
730 | show ap debug client-mgmt-counters
AOS-W 6.2 | Reference Guide
Parameter Update STA Tunnel Response ARM Update
ARM Propagate ARM Neighbor Assigned STM SAP Down AP Message STA On Call Message STA Message STA SIP authenticate Message STA Deauthenticate
Stat Update V3 VoIP CAC State Announcement
Remote AP State AP Message Response assoc-req assoc-resp reassoc-req reassoc-resp disassoc deauth sapcp
Description (For internal use only)
Number of times an AP has changed its adaptive radio management (ARM) settings. (For internal use only) (For internal use only) (For internal use only) (For internal use only) Number of counters indicating that a station has an active phone call (For internal use only) Number of messages indicating that a telephone has completed SIP registration and authentication. Number of times a station sent a message to an AP to deauthenticate a client. (For internal use only) Number of times a switch announces a call admission control (CAC) state change to the AP. Changes in CAC state could include the ability of call admission controls to accept more or fewer calls than previously configured. (For internal use only) (For internal use only) Number of 802.11 association request management frames from the switch. Number of 802.11 association responses to the switch. Number of 802.11 reassociation requests to the switch. Number of 802.11 reassociation responses from the switch. Number of 802.11 disassociation messages to the switch. Number of 802.11 deauthorization messages from the switch. (For internal use only)
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap debug client-mgmt-counters | 731
show ap debug client-stats
show ap debug client-stats <client-mac)
Description
Show detailed statistics about a client.
Example
The command below displays statistics for packets received from and transmitted to the specified client. (host) #show ap debug client-stats 00:19:7e:89:fa:e7
Station Stats ------------Parameter --------------------------------------Frames Rcvd For TX Tx Frames Dropped Frames Transmitted Success With Retry Tx Mgmt Frames Tx Probe Responses Tx Data Frames Tx CTS Frames Dropped After Retry Dropped No Buffer Missed ACKs Long Preamble Short Preamble Tx EAPOL Frames Tx 6 Mbps Tx 48 Mbps Tx 54 Mbps Tx WMM [VO] UAPSD OverflowDrop ---------------Last SNR Last SNR CTL0 Last SNR CTL1 Last SNR CTL2 Last ACK SNR Last ACK SNR CTL0 Last ACK SNR CTL1 Last ACK SNR CTL2 Last ACK SNR EXT0 Last ACK SNR EXT1 Frames Received Rx Data Frames Null Data Frames Rx Mgmt Frames PS Poll Frames Rx 6 Mbps Rx 12 Mbps Rx 18 Mbps Rx 24 Mbps Rx 36 Mbps Rx 48 Mbps
Value ----General Per-radio Statistics Transmit specific Statistics 22 0 22 1 2 0 20 0 0 0 1 22 0 13 15 5 2 15 0 Receive specific Statistics 31 28 25 22 32 30 28 21 5 4 2932 2930 2879 1 0 14 6 5 2 13 1162
732 | show ap debug client-stats
AOS-W 6.2 | Reference Guide
Rx 54 Mbps Rx WMM [BE]
1730 39
The output of this command includes the following information:
Parameter Frames Rcvd For TX Tx Frames Dropped Frames Transmitted Success With Retry Tx Mgmt Frames Tx Probe Responses Tx Data Frames Tx CTS Frames Dropped After Retry Dropped No Buffer Missed ACKs Long Preamble Short Preamble Tx EAPOL Frames
Tx <n> Mbps
Tx WMM
UAPSD OverflowDrop
Last SNR Last SNR CTL0
Last SNR CTL1
Description
Number of frames received for transmission.
Number of transmission frames that were dropped.
Number of frames successfully transmitted.
Number of frames that were transmitted after being retried.
Number of management frames transmitted.
Number of transmitted probe responses.
Number of transmitted data frames.
Number of clear-to-sent (CTS) frames transmitted.
Number of frames dropped after an attempted retry.
Number of frames dropped because the AP's buffer was full.
Number of missed acknowledgements (ACKs)
Number of frames sent with a long preamble.
Number of frames sent with a short preamble.
Number of Extensible Authentication Protocol over LAN (EAPOL) frames transmitted.
Number of frames transmitted at <n> Mbps, where <n> is a value between 6 and 300.
Number of Wifi Multimedia (WMM) packets transmitted for the following access categories. If the AP has not transmitted packets in a category type, this data row will not appear in the output of the command. Tx WMM [BE]: Best Effort Tx WMM [BK]: Background Tx WMM [VO]: VoIP Tx WMM [VI]: Video
Number of packets dropped due to Unscheduled Automatic Power Save Delivery (U-APSD) overflow.
The last recorded signal-to-noise ratio.
The signal-to-noise ratio for the last received data packet on the primary (control) channel 0. This parameter is only displayed for APs operating in 40 Mhz mode.
The signal-to-noise ratio for the last received data packet on the secondary (control) channel 1. This parameter is only displayed for APs operating in 40 Mhz mode.
AOS-W 6.2 | Reference Guide
show ap debug client-stats | 733
Parameter Last SNR CTL2
Last ACK SNR Last ACK SNR CTL0 Last ACK SNR CTL1 Last ACK SNR CTL2 Last ACK SNR EXT0
Last ACK SNR EXT1
Frames Received Rx Data Frames Null Data Frames Rx Mgmt Frames PS Poll Frames Rx <n> Mbps Tx WMM
Description
The signal-to-noise ratio for the last received data packet on the secondary (control) channel 2. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet.
Signal-to-noise ratio for the last received ACK packet on the primary (control) channel 0. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet on the primary (control) channel 1. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet on the primary (control) channel 2. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet on the secondary (extension) channel 0. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet on the secondary (extension) channel 1. This parameter is only displayed for APs operating in 40 Mhz mode.
Number of frames received.
Number of data frames received.
Number of null data frames received.
Number of management frames received.
Number of power save poll frames received.
Number of frames received at <n> Mbps, where <n> is a value between 6 and 300.
Number of Wifi Multimedia (WMM) packets transmitted for the following access categories. If the AP has not transmitted packets in a category type, this data row will not appear in the output of the command. Tx WMM [BE]: Best Effort Tx WMM [BK]: Background Tx WMM [VO]: VoIP Tx WMM [VI]: Video
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
734 | show ap debug client-stats
AOS-W 6.2 | Reference Guide
show ap debug client-table
show ap debug client-table [ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>]
Description
Show clients associated to an AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Filter the AP Config table by AP name.
Filter the AP Config table by BSSID. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Filter the AP Config table by IP address by entering an IP address in dotteddecimal format.
Usage Guidelines
The Tx_Rate, Rx_Rate, Last_ACK_SNR, and Last_Rx_SNR columns shown in the output of this command display valuable troubleshooting information for clients trying to connect to a specific AP. Use this command to verify that the transmit (Tx_Rate) and receive (Rx_Rate) rates are not too low, and that the signal-to-noise (SNR) ratio is acceptable.
Examples
The example below shows part of the AP configuration table for a specific BSSID. Additional parameters not displayed are described in the table below.
(host) #show ap debug client-table ap-name AP12
MAC
ESSID BSSID
Assoc_State HT_State AID
---
----- -----
----------- -------- ---
Pkts Rx_Pkts PS_Qlen Tx_Retr
------- ------- ------- -------
00:17:f2:4d:01:e2 wpa2 00:1a:1e:11:5f:11 Associated None
0x1
31463 22821 0
4289
00:14:a4:25:72:6d wpa2 00:1a:1e:11:5f:11 Associated None
0x2
24691 45215 0
944
00:19:7e:66:89:38 wpa2 00:1a:1e:11:5f:11 Associated None
0x4
7031
24739 0
671
00:16:cf:bc:0e:ce wpa2 00:1a:1e:11:5f:11 Associated None
0x5
3920
14797 0
286
00:19:7d:d6:74:93 wpa2 00:1a:1e:11:5f:11 Associated None
0x7
2530
8034 0
365
PS_State --------
Awake Awake Awake Awake Awake
UAPSD
-----
Tx_
(0,0,0,0,N/A,0) (0,0,0,0,N/A,0) (0,0,0,0,N/A,0) (0,0,0,0,N/A,0) (0,0,0,0,N/A,0)
UAPSD:(VO,VI,BK,BE,Max SP,Q Len) HT Flags: A - LDPC Coding; W - 40Mhz; S - Short GI; M - Max A-MSDU
D - Delayed BA; G - Greenfield; R - Dynamic SM PS Q - Static SM PS; N - A-MPDU disabled
The output of this command includes the following information:
AOS-W 6.2 | Reference Guide
show ap debug client-table | 735
Parameter MAC ESSID BSSID Assoc_State HT_State
AID UAPSD
Tx_Pkts Rx_Pkts PS-Qlen Tx_Retries
Description
MAC address of a client.
Extended Service Set identifier (ESSID) used by the client. An ESSID is a user-defined name for a wireless network.
Basic Service Set identifier for the client.
Shows whether or not the client is currently authorized and/or associated with the AP.
Shows the client's high-throughput (802.11n) transmission type: l none: AP is a legacy AP that does not support the 802.11n standard. l 20Mhz: A high-throughput APs using a single 20 Mhz channel. l 40Mhz: A high-throughput APs using two 20 Mhz channels.
802.11 association ID. A client receives a unique 802.11 association ID when it associates to an AP.
This parameter shows the following values for Unscheduled Automatic Power Save Delivery (UAPSD) in comma-separated format: VO, VI, BK, BE, Max SP, Q Len.
l VO: If 1, UAPSD is enabled for the VoIP access category. If UAPSD is disabled for this access category, this value is 0.
l VI: If 1, UAPSD is enabled for the Video access category. If UAPSD is disabled for this access category, this value is 0.
l BK: If 1, UAPSD is enabled for the Background access category. If UAPSD is disabled for this access category, this value is 0.
l BE: If 1, UAPSD is enabled for the Best Effort access category. If UAPSD is disabled for this access category, this value is 0.
l Max SP: The maximum service period is the number of frame sent per trigger packet. This value is value can be 0, 2, 4 or 8.
l Q Len: The number of frames currently queued for the client, from 0 to 16 frames.
Number of packets transmitted by the client.
Number of packets received by the client.
Power save queue length, in bytes.
Number of packets that the client had to resend due to an initial transmission failure.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
736 | show ap debug client-table
AOS-W 6.2 | Reference Guide
show ap debug counters
show ap debug counters {ap-name <ap-name>|bssid <bssid>|group <group>|ip-addr <ip-addr>}
Description
Show AP reboot/bootstrap counters, and crash information for an individual AP or AP group, or all APs referenced on the switch.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
group <group> ip-addr <ip-addr>
Description
Show debug counters for an AP with a specified name.
Show debug counters for a specific Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show debug counters for an AP group.
Show debug counters for an AP with a specified IP address by entering an IP address in dotted-decimal format.
Example
The output of this command shows how many times each AP has rebooted (a hard boot) or bootstrapped (a soft boot), the number of configuration changes sent and acknowledged by that AP, and whether or not the AP rebooted due to a kernel crash.
In this example, the output has been divided into multiple sections to better fit on the pages of this document. In the actual command-line interface, it will appear in a single, long table.
(host) #show ap debug counters group corp1
AP Counters
-----------
Name Group IP Address Configs Sent Configs Acked
---- ----- ---------- ------------ -------------
AL1 corp1 10.6.1.209 1597
1597
AL10 corp1 10.6.1.198 165
165
AL12 corp1 10.6.1.200 195
195
AL15 corp1 10.6.1.197 1580
1580
AL16 corp1 10.6.1.199 73
73
AL19 corp1 10.6.1.212 8
8
AP Boots Sent -------------
0 0 0 0 0 0
AP Boots Acked -------------0 0 0 0 0 0 Total APs :6
Bootstraps (Total)
------------------
1
(1)
2
(2)
1
(1)
1
(1)
1
(1)
1
(1)
Reboots -------
0 1 0 0 0 0
Crash -----
N Y N N N N
The output of this command includes the following information:
AOS-W 6.2 | Reference Guide
show ap debug counters | 737
Column Name Group IP Address Configs sent Configs Acked AP Boots Sent AP Boots Acked Bootstraps
Total Bootstraps Reboots
Crash
Description Name of the AP. Name of the AP's group. IP address of the AP. Number of times configuration changes have been sent to the AP. Number of times that the AP has acknowledged receiving a configuration change. Number of times reboot requests have been sent to the AP.
Number of times that the AP has acknowledged receiving a reboot request.
Number of times the AP bootstrapped since AP reboot. Bootstraps are also known as "soft" restarts. Total number of times the AP bootstrapped since AP image upgrade.
Number of times power to the AP cycled off and then on again since image upgrade. Reboots also known as "hard" restarts. Indicates whether or not the AP was rebooted due to a kernel crash. Use show ap debug crash-info to view the crash signature.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
738 | show ap debug counters
AOS-W 6.2 | Reference Guide
show ap debug crash-info
show ap debug crash-info {ap-name <ap-name>|ip-addr <ip-addr>}
Description
Show crash log information (if it exists) for an individual AP. The stored information is cleared from the flash after the AP reboots.
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr>
Description
Show crash information for an AP with a specified name.
Show crash information for an AP with a specified IP address by entering an IP address in dotted-decimal format.
Example
The output of this command shows a partial sample crash log information for an AP named MyAP
(host) #show ap debug crash-info ap-name MyAP
<4>AOS-W Version x.x.x.x (build xxxx / label #xxxx) <4>Built by p4build@cartman on 2012-07-29 at 14:44:06 PST (gcc version x.x.x Cavium Networks Version: 1.4.0, build 58) <4>CVMSEG size: 2 cache lines (256 bytes) <4>Setting flash physical map for 16MB flash at 0x1ec00000 <4>Determined physical RAM map: <7>On node 0 totalpages: 16384 <7> DMA zone: 16384 pages, LIFO batch:3 <7> DMA32 zone: 0 pages, LIFO batch:0 <7> Normal zone: 0 pages, LIFO batch:0 <7> HighMem zone: 0 pages, LIFO batch:0 <4>Primary instruction cache 32kB, virtually tagged, 4 way, 64 sets, linesize 128 bytes. <4>Primary data cache 16kB, 64-way, 2 sets, linesize 128 bytes. <4>Using 500.000 MHz high precision timer. cycles_per_jiffy=1000000 <6>Memory: 56636k/65536k available (1925k kernel code, 8840k reserved, 575k data, 2716k init, 0k highmem) <4>Calibrating delay using timer specific routine.. 1000.32 BogoMIPS (lpj=1000322) <4> available. <4>Checking for the multiply/shift bug... no. <4>Checking for the daddi bug... no. <4>Checking for the daddiu bug... no. <5>detected lzma initramfs <5>initramfs: LZMA lc=3,lp=0,pb=2,dictSize=8388608,origSize=15217664 <5>LZMA initramfs
Command History
Introduced in AOS-W 5.0.
AOS-W 6.2 | Reference Guide
show ap debug crash-info | 739
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
740 | show ap debug crash-info
AOS-W 6.2 | Reference Guide
show ap debug datapath
show ap debug datapath {ap-group <ap-group>|ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>}
Description
Show datapath tunnel parameters of an AP or AP group.
Syntax
Parameter ap-group <ap-group> ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show data path information for a specific AP group.
Show data path information for an AP with a specific name.
Show data path information for a specific Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show data path information for an AP with a specific IP address by entering an IP address in dotted-decimal format.
Example
The output of the following command shows datapath tunnel parameters for an AP with the IP address 192.0.2.32. (host) #show ap debug datapath 192.0.2.32
Datapath Parameters Table
-------------------------
essid encr-alg
client-vlan-id
----- --------
--------------
guest Open
63
voip WPA2 8021X AES 66
corp WPA2 PSK AES
66
guest Open
63
wpa2 WPA2 8021X AES 65
tunnel-id --------0x10f6 0x1103 0x10f1 0x10f7 0x10be
The output of this command includes the following information:
gre-type -------0x8300 0x8310 0x8320 0x8200 0x8210
deny-bcast ---------disable disable disable disable enable
num-clients ----------0 7 0 1 15
Column ESSID
encr-alg client-vlan-id tunnel-id gre-type deny-bcast
num-clients
Description The Extended Service Set Identifier is a unique name that identifies a wireless network Encryption algorithm used by the network ID of the network VLAN Identification number of the AP's tunnel. GRE tunnel type. If enabled, the AP will respond to broadcast probe requests. If disabled, the AP will not respond to these requests. Number of clients currently using the network.
AOS-W 6.2 | Reference Guide
show ap debug datapath | 741
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
742 | show ap debug datapath
AOS-W 6.2 | Reference Guide
show ap debug driver-log
show ap debug driver-log {ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>}
Description
Show an AP's driver logs.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show log information for an AP with a specific name.
Show log information for a specific Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show log information for an AP with a specific IP address by entering an IP address in dotted-decimal format.
Usage Guidelines
Use this command to review configuration changes made since the AP was last reset.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap debug driver-log | 743
show ap debug log
show ap debug log {ap-group <ap-group>|ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>}
Description
Show an AP's debug log.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show log information for an AP with a specific name.
Show log information for a specific Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show log information for an AP with a specific IP address by entering an IP address in dotted-decimal format.
Usage Guidelines
An AP's log files show configuration changes since the AP was last reset.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
744 | show ap debug log
AOS-W 6.2 | Reference Guide
show ap debug mgmt-frames (deprecated)
Description
Show traced 802.11 management frames.
Command History
Version AOS-W 3.0 AOS-W 5.0
Modification Command Introduced Command deprecated
AOS-W 6.2 | Reference Guide
show ap debug mgmt-frames (deprecated) | 745
show ap debug radio-stats
show ap debug radio-stats {ap-name <ap-name>|ip-addr <ip-addr>} radio {0|1} [advanced]
Description
Show aggregate radio debug statistics of an AP.
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr>
radio {0|1} advanced
Description Show log information for an AP with a specific name. Show log information for an AP with a specific IP address by entering its IP address in dotted-decimal format. Specify the ID number of the radio for which you want to view statistics. Include this parameter to display additional radio statistics.
Example
The output of this command displays general statistics for the radio, as well as statistics for transmitted and received frames.
(host) #show ap debug radio-stats ap-name AP12 radio 1
RADIO Stats
-----------
Parameter
Value
---------
-----
------------------- General Per-radio Statistics
Total Radio Resets 0
Resets Beacon Fail 0
TX Power Changes
5
Channel Changes
2
Radio Band Changes 0
Current Noise Floor 95
11g Protection
0
------------------- Transmit specific Statistics
Frames Rcvd For TX 2452151
Tx Frames Dropped 1736429
Frames Transmitted 4247212
...
If you include the advanced option at the end of the show ap debug radio-stats command, the output of this command will include all the following parameters. If you omit the advanced option, the output will include less information, and the data will be displayed in a different order.
Parameter Total Radio Resets Resets Beacon Fail
Description Total number of times the radio reset. Number of times the radio reset due to beacon failure.
746 | show ap debug radio-stats
AOS-W 6.2 | Reference Guide
Parameter Resets BeacQ Stuck
Resets Fatal Intr Resets RX Overrun Resets RF Gain Resets MTU Change Resets TX Timeouts POE-Related Resets
External Reset TX Power Changes Channel Changes Radio Band Changes Current Noise Floor
Avail TX Buffers
11g Protection Last TX Antenna
Last RX Antenna Scan Requests Scan Rejects
Description
An AP's radio typically sends a beacon every 100 milliseconds. If beacons are not sent at a regular interval or the radio experiences excessive noise, the beacon queue will reset. This parameter indicates the number of queue resets.
Number of time the radio was reset because the AP hardware was unresponsive.
The number of radio resets due to Receive FIFO overruns.
Number of radio resets due to gain changes.
Number of times the radio reset due to a change in the Maximum Transmission Unit (MTU) value.
Number of radio resets due to transmission timeouts (the radio doesn't transmit a signal within the required time frame.)
If the radio power profile drops, an OAW-AP125 may not be able to support three transmit chains, and may drop to two chains only. This parameter displays the number of resets due to this type of power change.
Number of times the AP has been reset because it was unplugged or its reset button was pressed.
Number of times the radio's transmission power changed.
Number of times the radio's channel changed.
Number of time the radio's band changed.
The residual background noise detected by an AP. NOTE: Noise seen by an AP is reported as -dBm. Therefore, a noise floor of 100 dBm is smaller (lower) than a noise floor of -50 dBm. For most environments, the noise floor should be no greater than -80 dBm. Anything larger may indicate an interference problem which is drowning out good signals (data) in background noise.
An AP has a set number of buffers which it can use to buffer frames for nonresponsive power save clients. The total number of buffer frames depends upon the AP model type.
This parameter shows whether 802.11g protection has been enabled or disabled.
This parameter indicates whether the last frame transmitted was sent on antenna 1 or antenna 0. This parameter can be useful for troubleshooting external antennas.
This parameter indicates whether the last frame received was via antenna 1 or antenna 0. This parameter can be useful for troubleshooting external antennas.
Total number of scan requests received by the AP.
Total number of scan rejected by the AP.
AOS-W 6.2 | Reference Guide
show ap debug radio-stats | 747
Parameter
Description
Load aware Scan Rejects
Load aware ARM preserves network resources during periods of high traffic by temporarily halting scanning if the load for the AP gets too high. The load aware Scan Rejects parameter shows the number of times the AP has rejected a scan because of the load aware scan feature.
PS aware Scan Rejects
If the ARM power-save aware scan feature is enabled, the AP will not scan a different channel if it has one or more clients and is in power save mode. The ps aware Scan Rejects parameter shows the number of times the AP has rejected a scan because of the power-save aware scan feature.
Voice aware Scan Rejects
If you enable the VoIP Aware Scan feature in the AP's ARM profile, the AP will not attempt to scan a different channel if one of its clients has an active VoIP call. This Voice aware scan Rejects parameter shows the number of times the AP has rejected a scan because of the Voip aware scan feature.
Scan Success
Number of successful scans. To view scan details, use the command show ap arm scan-times.
EIRP
The value of this parameter is the transmission power level (in dBm) + the antenna gain value.
MAX EIRP
The max EIRP depends on AP capability and the regulatory domain constraint for the channel of operation. For example, in the US, Channels 36-48 have max EIRP of 23dBm
UAPSD Flush STA Wake
Number of times a client wakes from power-save mode and flushes the UAPSD queue.
UAPSD SP Set
The number of unique UAPSD Scheduled Period is started in response to UAPSD trigger frames.
UASPD Dup Trig
The number of times duplicate UAPSD trigger frames are received (i.e., retried UAPSD triggers that were received by the AP more than once).
UAPSD Recv frame for TX The number of frames received for transmission over the air interface using UAPSD
UAPSD Ageout Drain
The number of time UAPSD queue is drained (i.e. frames are dropped) due to ageout.
UAPSD TX proc comp
The number of UAPSD frames that were successfully transmitted
UAPSD SP In prog
The number of times a trigger frame was received while a Scheduled Period (SP) was already in progress based on an earlier trigger frame.
UAPSD QOS NULL TX
The number of times the AP had to respond with a QoS Null Data frame in response to a UAPSD trigger because AP did not have Data frame queued for that client
UAPSD TX HW Queued
The number of frames (Data and Null Data) that were transferred to the radio HW for transmission, in response to UAPSD triggers.
UAPSD SP Reset
The number of times the UAPSD Scheduled Period (SP) in progress is reset or cancelled.
Frames Rcvd For TX
Number of frames received for transmission.
Tx Frames Dropped
Number of transmission frames that were dropped.
748 | show ap debug radio-stats
AOS-W 6.2 | Reference Guide
Parameter Frames Transmitted PS Unicast DTIM Broadcast Success With Retry Tx Mgmt Frames Beacons Transmitted Tx Probe Responses Tx Data Frames Multicast Data Tx CTS Frames DTIM Timeouts Dropped After Retry Dropped No Buffer Dropped UAPSD
Missed ACKs Failed Beacons
Multi-Beacon Fail Long Preamble Short Preamble Beacon Interrupts TX Interrupts FIFO Underrun Allocated Desc Freed Desc Tx EAPOL Frames
Tx AGGR Good Tx AGGR Unaggr
Description Number of frames successfully transmitted. Number of power save unicast frames Number of broadcast frames with DTIM values. Number of frames that were transmitted after being retried. Number of management frames transmitted. Number of beacons transmitted. Number of transmitted probe responses. Number of transmitted data frames. Number of multicast and broadcast frames transmitted. Number of clear-to-sent (CTS) frames transmitted. Number of broadcast frames with DTIM data that were not answered by a client. Number of frames dropped after an attempted retry. Number of frames dropped because the AP's buffer was full. Number of dropped Unscheduled Automatic Power Save Delivery (UAPSD) frames. Number of missed acknowledgement frames. Number of times a radio failed to transmit a beacon at the scheduled interval (100ms). Number of times multiple consecutive beacons failed to transmit. Number of frames sent with a long preamble. Number of frames sent with a short preamble. Number of broadcast beacons that were interrupted. Number of transmission interrupts. The number of Receive FIFO overruns. Number of allocated transmit descriptors. Number of freed transmit descriptors. Number of Extensible Authentication Protocol over LAN (EAPOL) frames transmitted Number of aggregated frames successfully transmitted. Number of non-aggregate frames transmitted due to unavailability of additional frames for aggregation at the time of transmission.
AOS-W 6.2 | Reference Guide
show ap debug radio-stats | 749
Parameter
Description
Tx <number> Mbps
Number of frames transmitted at the specified rate (in Mbps).
Tx <number> Mbps [Long] Number of frames with a long preamble transmitted at the specified rate.
Tx <number> Mbps [Short]
Number of frames with a short preamble transmitted at the specified rate.
Tx HT <number> Mbps
Number of high-throughput frames transmitted at the specified rate.
Tx WMM
Number of Wifi Multimedia (WMM) packets transmitted for the following access categories. If the AP has not transmitted packets in a category type, this data row will not appear in the output of the command. Tx WMM [BE]: Best Effort Tx WMM [BK]: Background Tx WMM [VO]: VoIP Tx WMM [VI]: Video
UAPSD OverflowDrop
Number of packets dropped due to Unscheduled Automatic Power Save Delivery (U-APSD) overflow.
TX Timeouts
Number of transmission timeouts
Lost Carrier Events
Number of carrier sense timeouts.
Last SNR
The last recorded signal-to-noise ratio.
Last SNR CTL0
The signal-to-noise ratio for the last received data packet on the primary (control) channel 0. This parameter is only displayed for APs operating in 40 Mhz mode.
Last SNR CTL1
The signal-to-noise ratio for the last received data packet on the secondary (control) channel 1. This parameter is only displayed for APs operating in 40 Mhz mode.
Last SNR CTL2
The signal-to-noise ratio for the last received data packet on the secondary (control) channel 2. This parameter is only displayed for APs operating in 40 Mhz mode.
Last SNR EXT0
Signal-to-noise ratio for the last received ACK packet on the secondary (extension) channel 0. This parameter is only displayed for APs operating in 40 Mhz mode.
Last SNR EXT1
Signal-to-noise ratio for the last received ACK packet on the secondary (extension) channel 1. This parameter is only displayed for APs operating in 40 Mhz mode.
Last SNR EXT2
Signal-to-noise ratio for the last received ACK packet on the secondary (extension) channel 2. This parameter is only displayed for APs operating in 40 Mhz mode.
Last ACK SNR
Signal-to-noise ratio for the last received ACK packet.
Last ACK SNR CTL0
Signal-to-noise ratio for the last received ACK packet on the primary (control) channel 0. This parameter is only displayed for APs operating in 40 Mhz mode.
Last ACK SNR CTL1
Signal-to-noise ratio for the last received ACK packet on the primary (control) channel 1. This parameter is only displayed for APs operating in 40 Mhz mode.
750 | show ap debug radio-stats
AOS-W 6.2 | Reference Guide
Parameter Last ACK SNR CTL2
Last ACK SNR EXT0
Last ACK SNR EXT1
Last ACK SNR EXT2
Frames Received Good Frames Bad Frames Rx Clear 1s Rx Clear 4s Rx Clear 64s Discarded Events
ARM Scan Frames Rx Data Frames Null Data Frames Rx Mgmt Frames Control Frames Frames To Me Broadcast Frames Beacons Received Probe Requests Rx Probe Responses Rx RTS Frames
Rx CTS Frames
ACK Frames
Description
Signal-to-noise ratio for the last received ACK packet on the primary (control) channel 2. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet on the secondary (extension) channel 0. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet on the secondary (extension) channel 1. This parameter is only displayed for APs operating in 40 Mhz mode.
Signal-to-noise ratio for the last received ACK packet on the secondary (extension) channel 2. This parameter is only displayed for APs operating in 40 Mhz mode.
Number of frames received.
Number of frames received with no errors.
Number of bad or error frames received.
The percentage of time no activity was seen on the air in the last 1 second.
The percentage of time no activity was seen on the air in the last 4 seconds.
The percentage of time no activity was seen on the air in the last 64 seconds.
Number of non-802.11 events that were detected and discarded during normal operation.
Number of scan frames sent for the adaptive radio management (ARM) feature.
Data frames received
Null data frames received
Management frames received
Control frames received.
Number of wireless frames received that are addressed to the specified BSSID.
Number of broadcast frames received.
Number of beacons received
Number of Probe requests received.
Number of Probe responses received.
Ready To Send (RTS) frames received. These frames are sent when a computer has data to transmit.
Clear To Send (CTS) frames received. This type of frame are used to verify that a client is ready to receive information.
Number of acknowledgement frames received.
AOS-W 6.2 | Reference Guide
show ap debug radio-stats | 751
Parameter
Description
PS Poll Frames
Power-Save Poll (PS-Poll) frames received. When a client exits a power-saving mode, it transmits a PS-Poll frame to the AP to retrieve any frames buffered while it was in power-saving mode.
CRC Errors
Cyclic Redundancy Check (CRC) is a data sequence that is sent with a frame to help verify if all the data received correctly. Possible CRC error causes include: l Hardware malfunction l Loose or unconnected cables l RF interference, such as overlapping access point coverage on a channel
or interfering 2.4-GHz signals from devices like microwave ovens l and wireless handset phones
PLCP Errors
Physical Layer Convergence Protocol (PLCP) errors.
Rx Frames Dropped
Number of received frames that were dropped.
PHY Events
The number of Physical Layer Events, that are not 802.11 packets, detected by radio as part of its normal receive operation.
RADAR Events
Number of times an AP detects a radar signature. Alcatel-Lucent APs are DFScompliant detects a radar signature, it will change its channel.
RX Interrupts
The number of receive interrupts received by the CPU from the radio.
RX Overrun
The number of Receive FIFO overruns.
Rx <number> Mbps
Packets received at the specified rate (in Mbps).
Rx <number> Mbps (Long) Packets with a long preamble received at the specified rate.
Rx <number> Mbps (Short)
Packets with a short preamble received at the specified rate.
Rx HT <number> Mbps
Number of high-throughput packets received at the specified rate.
Rx WMM [BE]
Number of Wifi Multimedia (WMM) packets received for the following access categories. If the AP has not transmitted packets in a category type, this data row will not appear in the output of the command. Rx WMM [BE]: Best Effort Rx WMM [BK]: Background Rx WMM [VO]: VoIP Rx WMM [VI]: Video
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
752 | show ap debug radio-stats
AOS-W 6.2 | Reference Guide
show ap debug received-config
show ap debug received-config {ap-group <ap-group>|ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>}
Description
Show the configuration the AP downloaded from the switch.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show log information for an AP with a specific name.
Show log information for a specific Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show log information for an AP with a specific IP address by entering an IP address in dotted-decimal format.
Example
The output of this command displays configuration information for each interface. The example below shows only part of the output for this command. Additional parameters not displayed are described in the table below. (host) #show ap debug received-config ap-name AP12
Downloaded Config for WIFI 0 ---------------------------Item ---BSSID LMS IP Master IP Mode QBSS Probe Response Native VLAN ID SAP MTU Heartbeat DSCP High throughput enable (radio) Channel Beacon Period Transmit Power Advertise TPC Capability Enable CSA CSA Count Management Frame Throttle interval Management Frame Throttle Limit Active Scan VoIP Aware Scan Power Save Aware Scan Load aware Scan Threshold 40 MHz intolerance Honor 40 MHz intolerance Legacy station workaround Country Code ESSID
Value -----
10.6.2.250 10.100.103.2 AP Mode Allow Access 1 1500 bytes 0 Enabled 40100 msec 15 dBm Disabled Disabled 4 1 sec 20 Disabled Enabled Enabled 1250000 Bps Disabled Enabled Disabled US guest
AOS-W 6.2 | Reference Guide
show ap debug received-config | 753
... The output of this command includes the following information:
Parameter BSSID LMS IP Master IP Mode
QBSS Probe Response Native VLAN ID SAP MTU Heartbeat DSCP High throughput enable (radio) Channel Beacon Period
Transmit Power Advertise TPC Capability Enable CSA CSA Count Management Frame Throttle interval Management Frame Throttle Limit Active Scan
Description
The BSSID of the AP.
The LMS IP is the IP address of the local switch used by the AP for client data processing.
For environments with multiple switches, the master switch is the central configuration and management point for all local switches.
Shows the operating modes for the AP. ap-mode: Device provides transparent, secure, high-speed data communications between wireless network devices and the wired LAN. am-mode: Device behaves as an air monitor to collect statistics, monitor traffic, detect intrusions, enforce security policies, balance traffic load, self-heal coverage gaps, etc.
Quality-of-service BSS (QBSS).
The ID number of the Native VLAN.
The Maximum Transmission Unit (MTU) for the GRE tunnel.
DSCP value for the heartbeat traffic between the AP and the switch.
Shows if high-throughput (802.11n) features on tare enabled or disabled on the radio.
Shows the channel number for the AP's 802.11a/802.11n physical layer.
Shows the time, in milliseconds, between successive beacon transmissions. The beacon advertises the AP's presence, identity, and radio characteristics to wireless clients.
Shows the current transmission power level.
If enabled, the AP will advertise its Transmit Power Control (TPC) capability.
Displays whether or not the AP has enabled channel switch announcements (CSAs) for 802.11h.
Number of channel switch announcements that must be sent before the AP will switch to a new channel.
Average interval that rate limiting management frames are sent from this radio, in seconds. If this column displays a zero (0), rate limiting is disabled for this AP.
Maximum number of management frames that can come from this radio in each throttle interval.
Displays whether or not the active scan feature is enabled.
754 | show ap debug received-config
AOS-W 6.2 | Reference Guide
Parameter
VoIP Aware Scan
Power Save Aware Scan Load aware Scan Threshold
40 MHz intolerance Honor 40 MHz intolerance Legacy station workaround Country Code ESSID Encryption WPA2 Pre-Auth DTIM Interval 802.11a Basic Rates 802.11a Transmit Rates Station Ageout Time Max Transmit Attempts RTS Threshold
Description
This option elicits more information from nearby APs, but also creates additional management traffic on the network. Active Scan is disabled by default, and should not be enabled except under the direct supervision of Alcatel-Lucent Support.
Shows if VoIP aware scanning is enabled or disabled. If you use voice handsets in the WLAN, VoIP Aware Scan should be enabled in the ARM profile so the AP will not attempt to scan a different channel if one of its clients has an active VoIP call. This option requires that Scanning is also enabled.
Shows if the power save aware scan is enabled or disabled. If enabled, the AP will not scan a different channel if it has one or more clients and is in power save mode.
The Load Aware Scan Threshold is the traffic throughput level an AP must reach before it stops scanning. Load aware ARM preserves network resources during periods of high traffic by temporarily halting ARM scanning if the load for the AP gets too high.
The specified setting allows ARM to determine if 40 MHz mode of operation is allowed on the 5 GHz or 2.4 GHz frequency band only, on both frequency bands, or on neither frequency band.
Shows if 40 MHz intolerance is enabled or disabled. If enabled, the radio will stop using the 40 MHz channels if the 40 MHz intolerance indication is received from another AP or station.
Shows if interoperability for misbehaving legacy stations is enabled or disabled.
Display the country code for the AP. The country code specifies allowed channels for that country.
An Extended Service Set Identifier (ESSID), for the AP.
Encryption type used on this AP.
802.11x settings are enabled or disabled.
Number of beacons that should elapse before an AP sends beacon broadcasts for power save clients.
Minimum data rate required for a client to associate with the AP. For an 802.11a radio, this value can be 6, 12 and 24 802.11 data rates. 802.11b/g radios will report a value of 1 and 2 802.11 data rates.
802.11 data rate at which the AP will transmit data to its clients. This value can be 6-54 for 802.11a radios, and 1-54 for 802.11b/g radios.
Number of seconds a station may be idle before it is deauthorized from an AP.
maximum number of times the AP will attempt to retransmit data.
The minimum packet size at which the AP will issue a request-to-send (RTS) before sending the packet.
AOS-W 6.2 | Reference Guide
show ap debug received-config | 755
Parameter
Description
Max Associations
The maximum number of clients allowed to associated with the AP
Wireless Multimedia (WMM)
Shows if Wireless Multimedia (WMM) is enabled or disabled for this AP. WMM provides prioritization of specific traffic relative to other traffic in the network.
WMM TSPEC Min Inactivity Interval
Displays the minimum inactivity time-out threshold of WMM traffic for this AP.
DSCP mapping for WMM voice AC Displays the DSCP value used to map WMM voice traffic.
DSCP mapping for WMM video AC Displays the DSCP value used to map WMM video traffic.
DSCP mapping for WMM besteffort AC
Displays the DSCP value used to map WMM best-effort traffic
DSCP mapping for WMM background AC
Displays the DSCP value used to map WMM background traffic.
Hide SSID
Shows if the feature to hide a SSID name in beacon frames is enabled or disabled.
Deny_Broadcast Probes
When a client sends a broadcast probe request frame to search for all available SSIDs, this option controls whether or not the system responds for this SSID. When enabled, no response is sent and clients have to know the SSID in order to associate to the SSID. When disabled, a probe response frame is sent for this SSID.
Local Probe Response
Shows if local probe response is enabled or disabled on the AP. If this option is enabled, the AP is responsible for sending 802.11 probe responses to wireless clients' probe requests. If this option is disabled, then the switch sends the 802.11 probe responses
Disable Probe Retry
Shows if the AP has enabled or disabled MAC-level retries for probe response frames. By default this parameter is enabled, which mean that MAC level retries for probe response frames is disabled.
Maximum Transmit Failures
Display the maximum number of transmission failures allowed before the client gives up.
BC/MC Rate Optimization
Shows if the AP has enabled or disabled scanning of all active stations currently associated to that AP to select the lowest transmission rate for broadcast and multicast frames. This option only applies to broadcast and multicast data frames; 802.11 management frames are transmitted at the lowest configured rate.
High throughput enable (SSID) Shows if the AP has enabled or disabled the use of its highthroughput SSID in 40 MHz mode.
40 MHz channel usage
Determines if this high-throughput SSID allows high-throughput (802.11n) stations to associate.
MPDU Aggregation
Shows if the AP has enabled or disabled MAC protocol data unit (MDPU) aggregation.
Max transmitted A-MPDU size
Shows the maximum size, in bytes, of an A-MPDU that can be sent on the AP's high-throughput SSID.
756 | show ap debug received-config
AOS-W 6.2 | Reference Guide
Parameter Max received A-MPDU size Min MPDU start spacing Supported MCS set Short guard interval in 40 MHz mode VLAN Forward mode
Band Steering
Description
Shows the maximum size, in bytes, of an Aggregated-MAC Packet Data Unit (A-MPDU) that can be received on the AP's high-throughput SSID.
Displays the minimum time between the start of adjacent MDPUs within an aggregate MDPU, in microseconds.
Comma-separated list of Modulation Coding Scheme (MCS) values or ranges of values to be supported on this high-throughput SSID.
Shows if the AP has enabled or disabled use of short guard interval in 40 MHz mode of operation.
VLAN ID used by the SSID.
Shows the current forward mode (bridge, split-tunnel, or tunnel) for the virtual AP. This parameter controls whether 802.11 frames are tunneled to the switch using generic routing encapsulation (GRE), bridged into the local Ethernet LAN (for remote APs), or a combination thereof depending on the destination (corporate traffic goes to the switch, and Internet access remains local). Only 802.1X authentication is supported when configuring bridge or split tunnel mode.
Shows if band-steering has been enabled or disabled for a virtual AP. ARM's band steering feature encourages dual-band capable clients to stay on the 5GHz band on dual-band APs. This frees up resources on the 2.4GHz band for single band clients like VoIP phones. Band steering reduces co-channel interference and increases available bandwidth for dual-band clients, because there are more channels on the 5GHz band than on the 2.4GHz band. Dual-band 802.11n-capable clients may see even greater bandwidth improvements, because the band steering feature will automatically select between 40MHz or 20MHz channels in 802.11n networks. This feature is disabled by default, and must be enabled in a Virtual AP profile.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap debug received-config | 757
show ap remote debug association-failure
show ap remote debug association-failure [{ap-name <ap-name>}|{bssid <bssid>}{essid <essid>}]
Description
Display association failure information that can be used to troubleshoot problems on an AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
essid <essid>
Description
Filter the Association Failure Table by AP name.
Filter the Association Failure Table by Basic Service Set Identifier (BSSID). The BSSID is usually the AP's MAC address.
Filter the Association Failure Table by Extended Service Set Identifier (ESSID) of an AP.
Usage Guidelines
Use this command to determine whether the client is associated, and identify the last AP to which it was connected.
Example
The output of the command show ap remote debug association-failure displays the Association Failure Table show below. If the Idle time column in the output of this command is a low value, reason column will describe why association failed.
(host)#show ap remote debug association-failure ap-name AP-65-port3
Association Failure Table
-------------------------
MAC Address
AP Name BSSID
ESSID State Radio
-----------
------- -----
----- ----- -----
00:16:6f:09:54:3e AL29
00:1a:1e:11:6f:00 guest
802.11g
Going Down
00:16:6f:09:54:3e AL33
00:1a:1e:11:6e:60 guest auth 802.11g
Unspecified Failure
00:16:6f:09:54:3e AL40
00:1a:1e:8d:5b:20 guest
802.11g
Ageout
Num Association Failures:3
Idle Time Reason --------- -----20h:39m:33s Denied; AP
20h:39m:33s
20h:39m:33s Denied;
The output of this command includes the following parameters:
Column MAC address AP Name BSSID ESSID
Description MAC address of the client that failed to associate with an AP. Name of an AP to which the client attempted to associate. Basic Service Set Identifier of an AP. Extended Service Set Identifier of an AP.
758 | show ap remote debug association-failure
AOS-W 6.2 | Reference Guide
Column State
Radio Idle Time Reason
Description This data column shows if the client is currently authorized or both authorized and associated with an AP. The AP radio type. Amount of time that the client has been idle, in the format hours:minutes:seconds. A brief description of the reason why the client failed to associate.
Command History
Introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap remote debug association-failure | 759
show ap debug shaping-table
show ap debug shaping-table {ap-name <ap-name>|ip-addr <ip-addr>}
Description
Show shaping information for clients associated to an AP.
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr>
Description
Show shaping table information for a specific AP.
Show shaping table information for a specific AP IP address by entering its IP address in dotted-decimal format.
Example
The following command shows the shaping table of an AP named ap22. (host) #show ap debug shaping-table ap-name ap22
VAP station000
pktin pktout pktdrop pktqd
0
0
0
0
cmn[C:O:H] 0-0-0 0-0
drop Numcl TotCl BWmgmt
0-0-0 0
0
d1
d2
d3
d4
d5
d6
d7
d8
d9
0
0
0
0
0
0
0
0
0
idx
tokens last-t in
out
drop q
tx-t rx-t al-t rate
idx
d1
d2
d3
d4
d5
d6
d7
d8
d9
0
0
0
0
0
0
0
0
0
0
VAP station001
pktin pktout pktdrop pktqd
0
8144 0
0
cmn[C:O:H] 0-0-0 0-0
drop Numcl TotCl BWmgmt
0-2-0 2
0
d1
d2
d3
d4
d5
d6
d7
d8
d9
0
0
0
0
0
0
0
0
0
idx
tokens last-t in
1
0
0
0
3
0
0
0
out
drop q
2966 0
0
31
0
0
tx-t 716 8
rx-t 0 0
al-t 0 0
rate 0 0
idx
d1
d2
d3
d4
d5
d6
d7
d8
d9
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
3
0
0
0
0
0
0
0
0
0
The output of this command includes the following information:
Column pktin
Description Number of packets received by the AP.
760 | show ap debug shaping-table
AOS-W 6.2 | Reference Guide
Column pktout pktdrop pktqd cmn [C:O:H] drop Numcl TotCl Bwmgmt
d<n> idx tokens last-t
in out drop q tx-t rx-t al-t rate
Description Number of packets sent by the AP. Number of packets dropped by the AP. Number of packets queued. (For internal use only.) Number of CCK (802.11b) and OFDM (802.11a/g) packets dropped. Number of CCK (802.11b) and OFDM (802.11a/g) packets dropped. Total number of clients associated with the AP This data column displays a 1 if the bandwidth management feature has been enabled. Otherwise, it displays a 0. (For internal use only.) Association ID. This value represents the credits the station has to transmit tokens. Number of tokens that were allocated to the station last time token allocation algorithm ran. Number of packets received. Number of packets sent. Number of dropped packets. Number of queued packets Total time spent transmitting data. Total time spent receiving data. Total time allocated for transmitting data to this station. (For internal use only.)
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap debug shaping-table | 761
show ap debug system-status
show ap debug system-status {ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>}
Description
Show detailed system status information for an AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show system status data for an AP with a specific name.
Show system status data for a specific Basic Service Set Identifier (BSSID) on an AP. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show system status data for an AP with a specific IP address by entering an IP address in dotted-decimal format.
Usage Guidelines
The output of this command displays the following types of information (if it exists) for the selected AP:
l Bootstrap information l Descriptor Usage l Interface counters l MTU discovery l ARP cache l Route table l Interface Information
l Per-radio statistics l Encryption statistics l AP uptime l memory usage l Kernel slab statistics l Interrupts l Crash Information
l Ethernet duplex/speed settings l Tunnel heartbeat stats l Boot version l LMS information l Power status l CPU type l CPU usage statistics
The following parameters are included in the output of this command, and can help troubleshoot problems on an AP or wireless network.
Parameter
Description
The Failed column in the Descriptor This parameter can tell you if the AP is dropping packets. Usage section
Interface Information table
This parameter can tell you if the Ethernet network is working properly. This table should not show an excessive number of errors.
AP Uptime table
Low values in this table can indicate problems with the wired network, or with the AP itself.
Tunnel Heartbeat table
This table can indicate the health of the underlying wired network.
Rebootstrap Information table /Reboot Information table
A large number of reboots can mean that the AP has hardware problems.
762 | show ap debug system-status
AOS-W 6.2 | Reference Guide
Command History
Release AOS-W 5.0 AOS-W 3.0
Modification Crash information parameter was introduced. Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap debug system-status | 763
show ap debug trace-addr
show ap debug trace-addr
Description
Show MAC addresses in the trace buffer.
Usage Guidelines
Use this command to troubleshoot wireless clients that are being traced for 802.11 communication
Examples
The output of the command shows the Trace List table. If no wireless clients are being traced, this table will be empty. (host) #show ap debug trace-addr
Trace List ---------MAC Address ----------00:1a:1e:c5:ca:b4 00:1a:1e:c5:d6:46 00:1a:1e:c5:d7:40 00:1a:1e:c5:d7:64 00:1a:1e:c5:d9:56 00:1a:1e:c5:d9:b0
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
764 | show ap debug trace-addr
AOS-W 6.2 | Reference Guide
show ap debug usb ap-name
show ap debug usb ap-name <ap-name>
Description
This command displays the USB information provisioned on the RAP.
Usage Guidelines
Use this command to view the USB information provisioned on the RAP.
Examples
The output of the command shows the USB information provisioned on the RAP.
(host) #show ap debug usb ap-name RAP-2
USB Information
---------------
Parameter
Value
---------
-----
Manufacturer
Pantech,
Product
PANTECH
Serial Number
Driver
ptuml_cdc_ether
Vendor ID
106c
Product ID
3718
USB Modem State
Active
USB Uplink RSSI(in dBm)
-73
Supported Network Services CDMA GSM LTE
Firmware Version
L0290VWB522F.242
ESN Number
990000472325325Current Network Service
Command History
Introduced in AOS-W 6.2.
Command Information
4G-LTE
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap debug usb ap-name | 765
show ap details
show ap details [advanced]{ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>|ip6-addr <ip6addr>}
Description
Show detailed provisioning parameters, hardware, and operating information for a specific AP.
Syntax
Parameter advanced
ap-name <ap-name> bssid <bssid> ip-addr <ip-addr> ip6-addr <ip6-addr>
Description
Include the following additional data in the output of this command: l switch message counts l AP group information l Virtual AP operating information
Show data for a specific AP by entering the name of the AP for which you want to display information.
Show data for an AP with the specified BSSID. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show data for an AP with the specified IP address.
Show data for an AP with the specified IPv6 address.
Examples
The example below shows part of the output for the command show ap details ap-name <ap-name>.
(host) # show ap details ap-name AP32
AP "AL39" Basic Information
---------------------------
Item
Value
----
-----
AP IP Address 10.6.1.206
LMS IP Address 10.6.2.253
Group
corp1344
Location Name N/A
Status
Up
Up time
4d:12h:47m:32s
AP "AL39" Hardware Information
------------------------------
Item
Value
----
-----
AP Type
125
Serial #
AD0054972
Wired MAC Address 00:1a:1e:c9:17:38
Radio 0 BSSID
00:1a:1e:11:73:90
Radio 1 BSSID
00:1a:1e:11:73:80
Enet 1 MAC Address 00:1a:1e:c9:17:39
AP "AL39" Operating Information
-------------------------------
Item
Value
----
-----
766 | show ap details
AOS-W 6.2 | Reference Guide
AP State Entry created Last activity Reboots Bootstraps Bootstrap Threshold
Running 2008-10-23 20:04:53 2008-10-28 08:07:48 0 1 7Slot/Port
2/24
The output of this command includes the following information:
Column AP IP Address LMS IP Address
Group Location Name Status Up time
Installation
AP Type Serial # Wired MAC address Radio 0 BSSID
Radio 1 BSSID
Enet 1 MAC address AP State Entry created Last activity
Reboots
Bootstraps
Description
IP address of the AP
The IP address of the local management switch (LMS)--the AlcatelLucent switch which is responsible for terminating user traffic from the APs, and processing and forwarding the traffic to the wired network.
Name of the AP's AP group.
Location of the AP.
Current status of the AP, either Up or Down.
Number of hours, minutes and seconds since the last switch reboot or bootstrap, in the format hours:minutes:seconds.
AP Installation mode. The AP can be default (the factory set AP installation type, indoor or outdoor.
AP model
Serial number for the AP
MAC address of the wired interface.
Basic Service Set Identifier (BSSID) of the AP's radio 0. This is usually the radio's MAC address.
Basic Service Set Identifier (BSSID) of the AP's radio 1. This is usually the radio's MAC address.
MAC address of the AP's Ethernet port.
Displays the AP's current operational state.
Timestamp showing the time the AP registered with the switch.
Timestamp showing the last time the AP communicated with the switch. An AP typically sends keepalive messages every minute.
Number of times power to the AP cycled off and then on again. Reboots also known as "hard" restarts.
Number of times the AP restarted. Bootstraps are also known as "soft" restarts.
AOS-W 6.2 | Reference Guide
show ap details | 767
Column Bootstrap threshold
Slot/Port
High throughput Mode
Band Channel Secondary Channel
EIRP AP Name AP Group Location name SNMP sysLocation Master
768 | show ap details
Description
Number of consecutive missed heartbeats on a GRE tunnel (heartbeats are sent once per second on each tunnel) before an AP rebootstraps. On the switch, the GRE tunnel timeout is 1.5 x bootstrap-threshold; the tunnel is torn down after this number of seconds of inactivity on the tunnel.
The switch port used by the AP, in the format <slot>/<port>. . <slot> is always 1, except when referring to interfaces on the OAW6000 switch. For the OAW-6000 switch, the four slots are allocated as follows: l Slot 0: contains a OmniAccess Supervisor Card III. l Slot 1: can contain an OmniAccess Supervisor Card III, or a line
card. l Slot 2: can contain an OmniAccess Supervisor Card III or a line
card. l Slot 3: can contain either an OmniAccess Supervisor Card III or a
line card. <port> refers to the network interfaces that are embedded in the front panel of the OAW-4x04 Series switch, OmniAccess Supervisor Card III, or a line card installed in the OAW-6000 switch. Port numbers start at 0 from the left-most position.
Shows if high-throughput (802.11n) features are enabled or disabled.
Shows the operating modes for the AP. l AP: Device provides transparent, secure, high-speed data
communications between wireless network devices and the wired LAN. l AM: Device behaves as an air monitor to collect statistics, monitor traffic, detect intrusions, enforce security policies, balance traffic load, self-heal coverage gaps, etc.
The RF band in which the AP should operate: l 802.11g = 2.4 GHz l 802.11a = 5 GHz
Channel number for the AP 802.11a/802.11n physical layer. The available channels depend on the regulatory domain (country).
The secondary channel number for the AP. The secondary channel is a 20 MHz channel used in conjunction with the primary channel to create a 40 MHz channel for high-throughput clients. High-throughput capable APs use only the primary channel to communicate with 20 MHz clients. The secondary channel is used for transmissions with 40 MHz capable high-throughput clients.
Current effective Isotropic Radiated Power (EIRP).
Name of the AP.
AP group to which the AP belongs.
Fully-qualified location name (FQLN) for the AP.
User-defined description of the location of the AP, as defined with the command provision-ap syslocation.
Name or IP address for the master switch.
AOS-W 6.2 | Reference Guide
Column Gateway Netmask IP Addr Dns IP Domain Name Server Name Server IP Antenna gain for 802.11a Antenna gain for 802.11g Antenna for 802.11a
Antenna for 802.11g
IKE PSK PPPOE User Name PPPOE Password PPPOE Service Name USB User Name USB Password USB Device Type USB Device Identifier USB Dial String USB Initialization String USB TTY device path Mesh Role
Installation
Description
IP address of the default gateway for the AP.
Netmask for the AP's IP address.
IP address for the AP.
IP address of the DNS server.
Domain name used by the AP.
DNS name of the switch from which the AP boots.
IP address of the switch from which the AP boots
Antenna gain for 802.11a (5GHz) antenna.
Antenna gain for 802.11g (2.4GHz) antenna.
Antenna use for 5 GHz (802.11a) frequency band. l 1: AP uses antenna 1 l 2: AP uses antenna 2 l both: AP uses both antennas
Antenna use for 2.4 GHz (802.11g) frequency band. l 1: AP uses antenna 1 l 2: AP uses antenna 2 l both: AP uses both antennas
The IKE pre-shared key.
Point-to-Point Protocol over Ethernet (PPPoE) user name for the AP.
PPPoE password for the AP.
PPPoE service name for the AP.
The PPP username provided by the cellular service provider.
A PPP password, if provided by the cellular service provider.
The USB driver type.
The USB device identifier.
The dial string for the USB modem.
The initialization string for the USB modem.
The TTY device path for the USB modem.
If the mesh role is "none," the AP is operating as a thin AP. An AP operating as a mesh node can have one of two roles: mesh portal or mesh point.
The type of installation (indoor or outdoor). The default parameter indicates that the AOS-W automatically selects an installation mode based upon the AP's model type.
AOS-W 6.2 | Reference Guide
show ap details | 769
Column Latitude Longitude Altitude
Antenna bearing for 802.11a
Antenna bearing for 802.11g
Antenna tilt angle for 802.11a Antenna tilt angle for 802.11g Mesh SAE
Description
Latitude coordinates of the AP, in the format Degrees Minutes Seconds (DMS).
Longitude coordinates of the AP, in the format Degrees Minutes Seconds (DMS).
Altitude, in meters, of the AP. This parameter is supported on outdoor APs only.
Horizontal coverage distance of the 802.11a (5GHz) antenna from true north, from 0-360 degrees. NOTE: This parameter is supported on outdoor APs only. The horizontal coverage pattern does not consider the elevation or vertical antenna pattern.
Horizontal coverage distance of the 802.11g (2.4GHz) antenna from true north, from 0-360 degrees. NOTE: This parameter is supported on outdoor APs only. The horizontal coverage pattern does not consider the elevation or vertical antenna pattern.
The angle of the 802.11a (5GHz) antenna. This parameter can range from between -90 degrees and 0 degrees for downtilt, and between +90 degrees and 0 degrees for uptilt.
The angle of the 802.11g (2.4GHz) antenna. This parameter can range from between -90 degrees and 0 degrees for downtilt, and between +90 degrees and 0 degrees for uptilt.
Shows if the AP has enabled or disabled Secure Attribute Exchange (SAE) on a mesh network. This setting is disabled by default.
Command History
Release AOS-W 3.0 AOS-W 3.2 AOS-W 3.4
AOS-W 5.0 AOS-W 6.1 770 | show ap details
Modification
Command introduced
Introduced support for mesh parameters, additional antenna parameters, and AP location parameters.
Introduced support for the following parameters: l installation l mesh-sae l set-ikepsk-by-addr l usb-dev l usb-dial l usb-init l usb-passwd l usb-tty l usb-type l usb-user
The mesh-sae parameter no longer displays the sae-default setting if the parameter is disabled. Only the sae-disable option indicates that this parameter is currently in its default disabled state.
The parameter ip6-addr was added to show data for an IPv6 AP.
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap details | 771
show ap enet-link-profile
show ap enet-link-profile [<profile>]
Description
Show a list of all Ethernet Link profiles.
Usage Guidelines
Include a profile name to display details for the specified Ethernet Link Profile, or omit the <profile> parameter to display a list of all Ethernet Link profiles.
Example
This command shows the speed of the Ethernet interface and the current duplex mode for the Ethernet Link profile "default": (host) #show ap enet-link-profile default
AP Ethernet Link profile "default"
----------------------------------
Parameter Value
--------- -----
Speed
auto
Duplex
auto
The output of this command includes the following parameters:
Parameter Speed
Duplex
Description
The speed of the Ethernet interface. This value can be either 10 Mbps, 100 Mbps, 1000Mbps (1 Gbps), or auto (auto-negotiated).
The duplex mode of the AP's Ethernet interface. This value can be either full, half, or auto (auto-negotiated).
Related Commands
Command ap enet-link-profile
Description
This command configures an AP Ethernet link profile.
Mode Config mode
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
772 | show ap enet-link-profile
AOS-W 6.2 | Reference Guide
show ap essid
show ap essid
Description
Show a Extended Service Set Identifier (ESSID) summary for the switch, including the numbers of APs and clients associated with each ESSID.
Examples
The output of the command in the example below shows statistics for four configured ESSIDs.
(host) #show ap essid
ESSID Summary
-------------
ESSID
APs Clients
-----
--- -------
vocera 21 0
66
voip 23 52
66,64
guest
49 6
wpa2 26 88
65,64
Num ESSID:4
VLAN(s) Encryption
------- ----------
WPA2 PSK AES
WPA2 8021X AES
63
Open
WPA2 8021X AES
The output of this command includes the following information:
Column ESSID
APs VLAN(s) Encryption
Description
An Extended Service Set Identifier (ESSID) is the identifying name of an 802.11 wireless network.
Number of APs associated with the ESSID.
VLAN IDs of the VLANs for the ESSID.
The layer-2 authentication and encryption used on this ESSID to protect access and ensure the privacy of the data transmitted to and from the network.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap essid | 773
show ap ht-rates
show ap ht-rates bssid <bssid>
Description
Show high-throughput rate information for a basic service set (BSS).
Syntax
Parameter bssid <bssid>
Description
Show data for a specific Basic Service Set Identifier (BSSID) on an AP. An AP's BSSID is usually the AP's MAC address.
Examples
The output of this command shows high-throughput rates for each supported MCS value. These values are applicable to high-throughput (802.11n-capable) APs only. (host) #show ap ht-rates bssid 00:1a:1e:1e:5a:10
AP "AL12" Radio 0 BSSID 00:1a:1e:1e:5a:10 High-throughput Rates (Mbps)
----------------------------------------------------------------------
MCS Streams 20 MHz 40 MHz 40 MHz SGI
--- ------- ------ ------ ----------
01
6.5 13.5 15.0
11
13.0 27.0 30.0
21
19.5 40.5 45.0
31
26.0 54.0 60.0
41
39.0 81.0 90.0
51
52.0 108.0 120.0
61
58.5 121.5 135.0
71
65.0 135.0 150.0
82
13.0 27.0 30.0
92
26.0 54.0 60.0
10 2
39.0 81.0 90.0
11 2
52.0 108.0 120.0
12 2
78.0 162.0 180.0
13 2
104.0 216.0 240.0
14 2
117.0 243.0 270.0
15 2
130.0 270.0 300.0
The output of this command includes the following information:
Column MCS Streams 20 MHz 40 MHz 40 MHz SGI
Description A Modulation Coding Scheme (MCS) values supported on this high-throughput SSID. Number of spatial streams used by the MCS index value. 802.11n data rates for the MCS for 20 Mhz transmissions. 802.11n data rates for the MCS for 40 Mhz transmissions. 802.11n data rates for the MCS for 40 Mhz transmissions using a short guard interval.
774 | show ap ht-rates
AOS-W 6.2 | Reference Guide
Command History
Introduced in AOS-W 3.3.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap ht-rates | 775
776 | show ap ht-rates
AOS-W 6.2 | Reference Guide
The example below shows the number of APs that have successfully preloaded their new software images, the number of preload attempts that failed, and the total number of preload attempts (both successful and unsuccessful).
AOS-W 6.2 | Reference Guide
show ap ht-rates | 777
show ap image version
show ap image version [ap-name <ap-name>|ip-addr <ip-addr>]
Description
Display an AP's image version information.
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr>
Description
View image version information for an AP with a specific name.
View image version information for an AP with a specific IP address. Enter the address of the AP in dotted-decimal format.
Usage Guidelines
By default, this command displays image version information for all APs associated with the switch. To view image version information for a single AP, specify an AP using the ap-name or ip-addr parameters
Example
The output in the example below shows the current running image version as well as the image version stored in the switch's flash memory.
(host) #show ap image version ip-addr 192.0.2.45
Access Points Image Version
---------------------------
AP
Running Image Version String
--
----------------------------
10.6.1.200
3.3.2.5 Wed Oct 22 10:46:42 PDT 2008
Flash Image Version String
Checksums Image Load Status
----------------------------
-------
----- ----------------
3.3.2.5 Wed Oct 22 10:46:42 PDT 2008 Yes
3
0
Done
The output of this command includes the following information:
Column AP
Running Image Version String
Flash Image Version String
Matches
Description
Name or IP address of an AP
String identifying the number of the image version currently running on the AP, as well as the date on which that version was created.
String identifying the number of the image version in the AP's flash memory, as well as the date on which that version was created.
If yes, the running image version matches the image version currently in the AP's flash memory. If no, the two image versions do not match.
778 | show ap image version
AOS-W 6.2 | Reference Guide
Column Num Matches Num Mismatches
Bad Checksums Image Load Status
Description
Number of times the running image version matched the flash image version after a reboot.
Number of times the running image version did not match the flash image version after a reboot. If the images do not match, the AP will upgrade to the flash image.
Number of bad checksum calculations due to an invalid or corrupted image file.
Current status of the AP following an upgrade. Done: This status indicates that the switch reset after the upgrade was performed, or the upgrade was performed after the AP first registered with the switch. Completed: The AP was updated after it was registered to the switch, and after the switch's last reset. If AP shows a status of completed, it will also display the time it took it update that AP. In progress: The AP is currently updating its image.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap image version | 779
show ap license-usage
show ap license-usage
Description
Show AP license usage information.
Examples
The output of the command below shows that switch has 13 associated campus APs using licenses, with 3 unused campus AP licenses remaining. (host) #show ap license-usage
AP Licenses ----------Type ---AP Licenses RF Protect Licenses PEF Licenses Overall AP License Limit
Number -----64 64 64 64
AP Usage -------Type ---CAPs RAPs Remote-node APs Tunneled nodes Total APs
Count ----13 2 0 0 0
Remaining AP Capacity --------------------Type Number ---- -----CAPs 3 RAPs 62
The output of this command includes the following information:
Parameter AP Licenses RF Protect Licenses PEF Licenses
Overall AP Licenses CAPs RAPs
Description Number of AP licenses currently available on the switch. Number of RF Protect licenses currently available on the switch. Number of Policy Enforcement Firewall (PEF) licenses currently available on the switch. Total number of APs supported by licenses on the switch. Number of campus APs currently using a license on the switch. Number of remote APs currently using a license on the switch.
780 | show ap license-usage
AOS-W 6.2 | Reference Guide
Parameter Remote-Node APs Tunneled Nodes CAPs RAPs
Description Number of remote node APs currently using a license on the switch. Number of tunneled nodes currently using a license on the switch. Number of unused campus APs licenses remaining on the switch. Number of unused remote APs licenses remaining on the switch.
Command History
Release AOS-W 3.0 AOS-W 3.3
Modification
Command Introduced.
The following parameters were introduced: l Total 802.11n-120abg Licenses l 802.11n-120abg Licenses Used l Total 802.11n-121abg Licenses l 802.11n-121abg Licenses Used l Total 802.11n-124abg Licenses l 802.11n-124abg Licenses Used l Total 802.11n-125abg Licenses l 802.11n-125abg Licenses Used
AOS-W 6.2
The output of this command was reorganized to reflect updated the newest license scheme.
Command Information
Platforms All platforms
Licensing
Base operating system. The output of this command varies, according to the licenses currently installed on the switch.
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap license-usage | 781
show ap lldp
show ap lldp [<profile>]
Description
Display a list of LLDP-MED Network Policy profiles, or display the current configuration settings of an individual profile.
Syntax
Parameter <profile>
Description Specify a LLDP profile name to view configuration settings for that profile.
Examples
The following example lists all LLDP profile profiles. The References column lists the number of other profiles with references to that LLDP-MED Network policy profile profile, and the ProfileStatus column indicates whether the profile is predefined.
The output of the command below shows that the switch has two LLDP profiles.
(host) #show ap lldp med-network-policy-profile
AP LLDP Profile List
---------------------------------------
Name
References Profile Status
----
---------- --------------
default 0
video 2
Total:2
The following command displays configuration details for the LLDP profile named default.
(host) #show ap lldp med-network-policy-profile video
AP LLDP Profile "new"
---------------------
Parameter
Value
---------
-----
PDU transmission
Enabled
Reception of LLDP PDUs
Enabled
Transmit interval (seconds)
30
Transmit hold multiplier
4
Optional TLVs
port-description system-description system-name capabilities
management-address
802.1 TLVs
port-vlan vlan-name
802.3 TLVs
mac link-aggregation mfs power
LLDP-MED TLVs
LLDP-MED network policy profile N/A
The output of this command includes the following information:
Parameter PDU transmission
Description Shows if LLDP PDU transmission is enabled on the AP.
782 | show ap lldp
AOS-W 6.2 | Reference Guide
Parameter Reception of LLDP PDUs Transmit interval (seconds) Transmit hold multiplier
Optional TLVs 802.1 TLVs 802.3 TLVs LLDP-MED TLVs LLDP-MED network policy profile
Description
Shows if LLDP PDU reception is enabled on the AP.
The interval between LLDP TLV transmission seconds. The supported range is 1-3600 seconds and the default value is 30 seconds.
This value is multiplied by the transmit interval to determine the number of seconds to cache learned LLDP information before that information is cleared. If the transmit-hold value is at the default value of 4, and the transmit interval is at its default value of 30 seconds, then learned LLDP information will be cached for 4 x 30 seconds, or 120 seconds.
The AP sends the listed optional TLVs in LLDP PDUs.
The AP sends the listed 802.1 TLVs in LLDP PDUs. By default, the AP will send all 802.1 TLVs.
The AP sends the listed 802.3 TLVs in LLDP PDUs. By default, the AP will send all 802.3 TLVs.
Lists the LLDP-MED TLVs the AP will send in LLDP PDUs. By default, the AP will not send any LLDP-MED TLVs
Specifies the LLDP MED Network Policy profile to be associated with this LLDP profile.
Command History
Command introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show ap lldp | 783
show ap lldp counters
show ap lldp counters ap-name <ap-name> ip-addr <ip-addr> ip6-addr (ipv6-addr>
Description
Show LLDP counters for a specific AP, or all APs sending or receiving LLDP Protocol Data Units (PDUs).
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr>
ip6-addr <ip-addr>
Description Show counter statistics for an AP with a specific name.
View counter statistics for an AP with a specific IP address. Enter the IP address of the AP in dotted-decimal format.
View counter statistics for an AP with a specific IPv6 address.
Examples
The output of the command below shows LLDP counter information for two interfaces.
(host) #show ap lldp counters
AP LLDP Counters (Updated every 60 seconds)
-------------------------------------------
AP
Interface Received Unknown TLVs
--
--------- -------- ------------
00:1a:1e:ce:fb:bf bond0
0
0
00:24:6c:c0:00:86 bond0
0
0
Malformed --------0 0
Overflow -------0 0
Transmitted ----------68159 68153
The output of this command includes the following information:
Parameter AP Interface Received Unknown TLVs
Number of Malformed packets Overflow
Description Name of the AP sending or receiving LLDP PDUs. Name of the AP interface sending or re ce vi ng LLDP PDUs. Number of packets received on the specified interface. Number of LLDP Protocol Data Units (PDUs) with an unknown type-length-value (TLV). Number of malformed packets received on that interface
Number of times that an LLDP neighbor could not be added to the neighbor table (there is a limit of 8 per port)
Transmitted
Number of packets transmitted from that interface
Command History
Command introduced in AOS-W 6.2.
784 | show ap lldp counters
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show ap lldp counters | 785
show ap lldp med-network-policy-profile
show ap lldp med-network-policy-profile [<profile>]
Description
Display a list of LLDP-MED Network Policy profiles, or display the current configuration settings of an individual profile.
Syntax
Parameter <profile>
Description
Specify a LLDP-MED Network Policy profile name to view configuration settings for that profile.
Usage Guidelines
The LLDP-MED Network policy profile allows you to configure an extension to LLDP that supports interoperability between VoIP devices and other networking clients. LLDP-MED network policy discovery lets end-points and network devices advertise their VLAN IDs (e.g. voice VLAN), priority levels, and DSCP values.allows you to define a set of provisioning parameters to an AP group.
Issue this command without the <profile-name> option to display the entire LLDP-MED Network policy profile list, including profile status and the number of references to each profile. Include a profile name to display the configuration settings for that profile.
Examples
The following example lists all LLDP-MED Network policy profile profiles. The References column lists the number of other profiles with references to that LLDP-MED Network policy profile, and the ProfileStatus column indicates whether the profile is predefined.
The output of the command below shows that the switch has three LLDP-MED network profiles.
(host) #show ap lldp med-network-policy-profile
AP LLDP-MED Network Policy Profile List
---------------------------------------
Name
References Profile Status
----
---------- --------------
default 0
video 2
voice 1
Total:2
The following command displays configuration details for the LLDP-MED Network Policy profile
named video.
(host) #show ap lldp med-network-policy-profile video
AP LLDP-MED Network Policy Profile "default" -------------------------------------------Parameter --------LLDP-MED application type LLDP-MED application VLAN LLDP-MED application VLAN tagging LLDP-MED application Layer-2 priority LLDP-MED application Differentiated Services Code Point
Value ----streaming-video 16 Tagged 0 0
The output of this command includes the following information:
786 | show ap lldp med-network-policy-profile
AOS-W 6.2 | Reference Guide
Parameter LLDP-MED application type
LLDP-MED application VLAN LLDP-MED application VLAN tagging LLDP-MED application Layer-2 priority LLDP-MED application Differentiated Services Code Point
Description
Type of application that this profile manages. This profile supports the following options: l guest-voice : The AP services a separate voice
network for guest users and visitors. l guest-voice-signaling : The AP is part of a network that
requires a different policy for guest voice signaling than for guest voice media. Do not use this application type if both the same network policies apply to both guest voice and guest voice signaling traffic. l softphone-voice : The AP supports voice services using softphone software applications on devices such as PCs or laptops. l streaming-video : T The AP supports broadcast or multicast video or other streaming video services that require specific network policy treatment. This application type is not recommended for video applications that rely on TCP with buffering. l video-conferencing : T The AP supports video conferencing equipment that provides real-time, interactive video/audio services. l video-signaling : T The AP is part of a network that requires a different policy for video signaling than for the video media. Do not use this application type if both the same network policies apply to both video and video signaling traffic. l voice : T he AP services IP telephones and other appliances that support interactive voice services. This is the default application type. l voice-signaling : T The AP is part of a network that requires a different policy for voice signaling than for the voice media. Do not use this application type if both the same network policies apply to both voice and voice signaling traffic.
Indicates the VLAN ID (0-4094) or VLAN name of the VLAN used by the application.
Indicates if the policy applies to a to a VLAN that is tagged with a VLAN ID or untagged. The default value is untagged. NOTE: When an LLDP-MED network policy is defined for use with an untagged VLAN, then the L2 priority field is ignored and only the DSCP value is used.
Displays a configured 802.1p priority level for the specified application type, where 0 is the lowest priority level and 7 is the highest priority.
Displays a configured Differentiated Services Code Point (DSCP) priority value for the specified application type, where 0 is the lowest priority level and 63 is the highest priority.
Command History
Command introduced in AOS-W 6.2.
AOS-W 6.2 | Reference Guide
show ap lldp med-network-policy-profile | 787
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Enable or Config mode on master or local switches
788 | show ap lldp med-network-policy-profile
AOS-W 6.2 | Reference Guide
show ap lldp neighbors
show ap lldp neighbors ap-name <ap-name> ip-addr <ip-addr> ip6-addr (ipv6-addr>
Description
Show LLDP neighbors for a specific AP, or all APs sending or receiving LLDP Protocol Data Units (PDUs).
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr>
ip6-addr <ip-addr>
Description Show LLDP neighbor statistics for an AP with a specific name.
View LLDP neighbor statistics for an AP with a specific IP address. Enter the IP address of the AP in dotted-decimal format.
View LLDP neighbor statistics for an AP with a specific IPv6 address.
Usage Guidelines
The LLDP protocol allows switches, routers, and wireless LAN access points to advertise information about themselves such as identity, capabilities, and neighbors to other nodes on the network. Use this command to display information about the AP's LLDP peers.
By default, this command displays LLDP neighbors for the entire list of LLDP interfaces. Include a the name of IP address of an AP to display neighbor information only for that one device.
Examples
The output of the command below shows the LLDP neighbor list for an AP named ap12.
(host) show ap lldp neighbors ap-name ap12
AP LLDP Neighbors (Updated every 60 seconds)
--------------------------------------------
AP Interface Neighbor Chassis Name/ID Port Name/ID Mgmt. Address Capabilities
-- --------- -------- --------------- ------------ ------------- ------------
uc bond0
0
d8:c7:c8:c4:4f:4e bond0
10.3.44.193
Capability codes: (R)Router, (B)Bridge, (A)Access Point, (P)Phone, (O)Other
The output of this command includes the following information:
Parameter AP Interface Neighbor Chassis Name/ID Port Name/ID
Description Name of the LLDP neighbor Interface on the AP sending or receiving LLDP PDUs. LLDP neighbor number The name of the LLDP neighbor AP Port name or ID if the interface sending LLDP PDUs.
AOS-W 6.2 | Reference Guide
show ap lldp neighbors | 789
Parameter Mgmt. Address Capabilities
Description
Management address of the LLDP neighbor
This data column can list any of the following data codes to indicate LLDP neighbor capabilities. l R: Router l B: Bridge l A: Access Point l P: Phone l O: Other
Command History
Command introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Enable or Config mode on master or local switches
790 | show ap lldp neighbors
AOS-W 6.2 | Reference Guide
show ap load-balancing
show ap load balancing
Description
Show the load-balancing information for each AP with load balancing enabled.
Examples
The output of the command in the example below shows details for a single AP enabled with the load-balancing feature.
(host) #show ap load-balancing
Load Balance Enabled Access Point Table
---------------------------------------
bss
cur-cl util(kbps)
---
------ ----------
00:0b:86:cc:8e:4e
Wireless_1
mp22 2/24 10.3.148.12 a-HT
413
The output of this command includes the following information:
Column BSS ESS s/p
ip phy
chan cur-cl util (kbps)
Description
The Basic Service Set (BSS) Identifier for the AP. This is usually the APs MAC address.
The Extended Service Set (ESS) Identifier is the user-defined name of an 802.11 wireless network.
The switch slot and port used by the AP, in the format <slot>/<port>. .<slot> is always 1, except when referring to interfaces on the OAW-6000 switch. For the OAW-6000 switch, the four slots are allocated as follows: l Slot 0: contains a OmniAccess Supervisor Card III. l Slot 1: can contain an OmniAccess Supervisor Card III, or a line card. l Slot 2: can contain an OmniAccess Supervisor Card III or a line card. l Slot 3: can contain either an OmniAccess Supervisor Card III or a line card. <port> refers to the network interfaces that are embedded in the front panel of the OAW-4x04 Series switch, OmniAccess Supervisor Card III, or a line card installed in the OAW-6000 switch. Port numbers start at 0 from the left-most position.
IP address of the AP
One of the following 802.11 types la l a-HT (high-throughput) lg l g-HT (high-throughput)
Channel number for the AP 802.11a/802.11n physical layer. The available channels depend on the AP's regulatory domain (country).
Current number of clients on the AP.
Current bandwidth utilization, in kbps.
AOS-W 6.2 | Reference Guide
show ap load-balancing | 791
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
792 | show ap load-balancing
AOS-W 6.2 | Reference Guide
show ap mesh active
show ap mesh active [<mesh-cluster>|{page <page>}|{start <start>}]
Description
Show active mesh cluster APs currently registered on this switch.
Syntax
Parameter <mesh-cluster> page <page>
start <start>
Description
Name of a mesh cluster profile.
Limit the output of this command to a specific number of entries by entering the number of entries you want to display.
Start displaying the index of mesh APs at a chosen index number by entering the index number of the AP at which command output should start.
Examples
The output of this command displays a list of all active mesh points and mesh portals.
(host) #show ap mesh active
Mesh Cluster Name: meshprofile1
------------------------------
Name Group IP Address BSSID
Mesh Role
---- ----- ---------- -----
--------
mp1 mp1
10.3.148.245 00:1a:1e:85:c0:30
Point
mp2 mp2
10.3.148.250 00:1a:1e:88:11:f0
mp3 mp3
10.3.148.253 00:1a:1e:88:01:f0
mpp mpp125 10.3.148.252 00:1a:1e:88:05:50
Portal
Band/Ch/EIRP/MaxEIRP MTU
-------------------- ---
802.11a/157/19/36
802.11a/157/19/36
Bridge/Bridge Point
802.11a/157/19/36
802.11a/157/19/36
1578
Enet 0/1 -------Off/Off
Bridge/Bridge Point -/Bridge
Parent #Children AP Type Uptime
------ --------- ------- ------
mp3
0
125
13d:2h:25m:19s
mpp
1
125
14d:21h:23m:49s
mp2
1
125
14d:21h:14m:55s
-
1
125
14d:19h:5m:3s
The output of this command includes the following information:
Column Name Group IP Address
Description Name of an AP. AP group which includes the specified AP. IP address of the AP.
AOS-W 6.2 | Reference Guide
show ap mesh active | 793
Column
Description
BSSID
Basic Service Set Identifier (BSSID) for the AP. This is usually the AP's MAC address.
Band/Ch/EIRP/MaxEIRP The RF band in which the AP should operate (a or g)/ Radio channel used by the AP/Current effective Isotropic Radiated Power (EIRP) /maximum EIRP
MTU
Maximum Transmission Unit (MTU) size, in bytes. This value describes the greatest
amount of data that can be transferred in one physical frame.
Enet 0/1
Shows the current mode of each wired interface. l Bridge: 802.11 frames are bridged into the local Ethernet LAN. l Tunnel: 802.11 frames are tunneled to the switch using generic routing
encapsulation (GRE). l Split-tunnel: 802.11 frames are either bridged into the local Ethernet LAN or
tunneled to the switch, depending upon their destination. l Off: Interface is not available for serving clients. If an AP has only one wired interface, the output of this command will display a dash (-) for the unavailable port.
Mesh Role
An AP operating as a mesh node can have one of two roles: mesh portal or mesh point.
Parent
If the AP is operating as a mesh point, this parameter displays the name of its parent mesh portal. Mesh portals will display a dash (-).
#Children
If the AP is operating as a mesh portal, this parameter shows the number of mesh point children associated with that mesh portal.
AP type
The AP model type.
Uptime
Number of hours, minutes and seconds since the last switch reboot or bootstrap, in the format hours:minutes:seconds.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing
Command Mode
This show command is available in the base operating system. Commands to configure the secure enterprise mesh solution for outdoor APs require the Outdoor Mesh license.
Enable or Config mode on master switches
794 | show ap mesh active
AOS-W 6.2 | Reference Guide
show ap mesh-cluster-profile
show ap mesh-cluster-profile [<profile>]
Description
Show configuration settings for a mesh cluster profile.
Syntax
Parameter <profile>
Description Name of a mesh cluster profile
Usage Guidelines
The command show ap mesh-cluster-profile displays a list of all mesh cluster profiles configured on the switch, including the number of references to each profile and each profile's status. Include the optional <profile> parameter to show detailed settings for an individual mesh cluster profile.
Examples
The example below shows the configuration settings for the mesh cluster profile "meshcluster2". (host) #show ap mesh-cluster-profile meshcluster2
Mesh Cluster profile "meshcluster2"
------------------------------
Parameter
Value
---------
-----
Cluster Name company-mesh
RF Band
a
Encryption
opensystem
WPA Hexkey
N/A
WPA Passphrase N/A
The output of this command includes the following information:
Parameter Cluster Name RF band
Encryption
WPA Hexkey WPA Passphrase
Description
Name of the mesh cluster using this profile
The RF band in which the AP should operate: l g = 2.4 GHz l a = 5 GHz
Data encryption setting for the mesh cluster profile. l opensystem--No authentication and encryption. l wpa2-psk-aes--WPA2 with AES encryption using a preshared key.
The WPA pre-shared key (only for mesh cluster profiles using WPA2 with AES encryption).
The WPA password that generates the preshared key (only for mesh cluster profiles using WPA2 with AES encryption).
AOS-W 6.2 | Reference Guide
show ap mesh-cluster-profile | 795
Command History
Introduced in AOS-W 3.2.
Command Information
Platforms All platforms
Licensing
Command Mode
This show command is available in the base operating system. Commands to configure the mesh feature require the Mesh license.
Enable or Config mode on master switches
796 | show ap mesh-cluster-profile
AOS-W 6.2 | Reference Guide
show ap mesh debug counters
show ap mesh debug counters {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>}
Description
Show counters statistics for a mesh node.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show counter statistics for an AP with a specific name.
Show counter statistics for a specific Basic Service Set Identifier (BSSID) on an AP. An AP's BSSID is usually the AP's MAC address.
View counter statistics for an AP with a specific IP address. Enter the IP address of the AP in dotted-decimal format.
Example
The example below shows the Mesh Packet Counters table for an AP named meshpoint1. The Probe Resp, Assoc Req, and Assoc Resp data columns show both the total number of counters and, in parenthesis, the number of requests or responses with high-throughput information elements (HE IEs).
(host) #show ap mesh debug counters ap-name meshpoint1
Mesh Packet Counters
--------------------
Interface Echo Sent Echo Recv Probe Req Probe Resp Assoc Req Assoc Resp Assoc Fail
--------- --------- --------- --------- ---------- --------- ---------- ----------
Link up/down Resel. Switch Other
------------ ------ ------ -----
Parent
68865
68755
24
8(8 HT)
3(1 HT) 3(1 HT)
1
1
-
-
0
Child
68913
67373
6
8
2
1
2
0
2618886
Received Packet Statistics: Total 2890717, Mgmt 2618946 (dropped non-mesh 0), Data 271771 (dropped unassociated 1)HT: pns=8 ans=1 pnr=0 ars=0 arr=1 anr=0
Recovery Profile Usage Counters
-------------------------------
Item
Value
----
-----
Enter recovery mode
0
Exit recovery mode
0
Total connections to switch 0
Mesh loop-prevention Sequence No.:1256947 Mesh timer ticks:68930
The output of this command includes the following information:
AOS-W 6.2 | Reference Guide
show ap mesh debug counters | 797
Column Interface
Echo Sent Echo Recv Probe Req
Probe Resp
Description
Indicates whether the mesh interface connects to a Parent AP or a Child AP. Each row of data in the Mesh Packet Counters table shows counter values for an individual interface.
Number of echo packets sent.
Number of echo packets received.
Number of probe request packets sent from the interface specified in the Mesh-IF parameter.
Number of probe response packets sent to the interface specified in the Interface parameter.
Assoc Req
Assoc Resp
Assoc Fail
Link up/down Resel. Switch Other Mgmt
Number of association request packets from the interface specified in the Interface parameter.
Number of association response packets from the interface specified in the Interface parameter. This number includes valid responses and fail responses.
Number of fail responses received from the interface specified in the Interface parameter.
Number of times the link up or link down state has changed.
Number of times a mesh point attempted to reselect a different mesh portal.
Number of times a mesh point successfully switched to a different mesh portal.
Management frames of any type other than association and probe frames, either received on child interface, or sent on parent interface.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing
Command Mode
This show command is available in the base operating system. Commands to configure the mesh feature require the Mesh license.
Enable or Config mode on master switches.
798 | show ap mesh debug counters
AOS-W 6.2 | Reference Guide
show ap mesh debug current-cluster
show ap mesh debug current-cluster {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>}
Description
Display information for the mesh cluster currently used by a mesh point or mesh portal.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show mesh cluster data for an AP with a specific name.
Show mesh cluster data for a specific Basic Service Set Identifier (BSSID) on an AP. An AP's BSSID is usually the AP's MAC address.
Show mesh cluster data for an AP with a specific IP address. Enter the IP address in dotted-decimal format.
Examples
The output of the command below shows mesh cluster profile configuration parameters for the mesh cluster currently used by an AP named "mp2." (host) #show ap mesh debug current-cluster ap-name mp2
AP "mp2" Current Cluster Profile: default
-----------------------------------------
Item
Value
----
-----
Cluster Name smettu-mesh
RF Band
a
Encryption
opensystem
WPA Hexkey
N/A
WPA Passphrase ********
The output of this command includes the following information:
Column Cluster Name RF band
Encryption
WPA Hexkey WPA Passphrase
Description
Name of the mesh cluster using this profile
The RF band in which the mesh point or mesh portal operates: l g = 2.4 GHz l a = 5 GHz
Data encryption setting for the mesh cluster profile. l opensystem--No authentication and encryption. l wpa2-psk-aes--WPA2 with AES encryption using a preshared key.
The WPA pre-shared key (only for mesh cluster profiles using WPA2 with AES encryption).
The WPA password that generates the preshared key (only for mesh cluster profiles using WPA2 with AES encryption).
AOS-W 6.2 | Reference Guide
show ap mesh debug current-cluster | 799
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing
Command Mode
This show command is available in the base operating system. Commands to configure the mesh feature require the Mesh license.
Enable or Config mode on master switches
800 | show ap mesh debug current-cluster
AOS-W 6.2 | Reference Guide
show ap mesh debug forwarding-table
show ap mesh forwarding-table {ap-name <ap-name>}|{ip-addr <ip-addr>}
Description
Show the forwarding table for a remote mesh point or remote mesh portal.
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr>
Description
Show data for a remote mesh node with a specific name.
Show data for a remote mesh node with a specific IP address by entering its IP address in dotted-decimal format.
Usage Guidelines
This is an internal technical support command. Alcatel-Lucent technical support may request that you issue this command to help analyze and troubleshoot problems with your mesh network.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing
Command Mode
This show command is available in the base operating system. Commands to configure the mesh feature require the Mesh license.
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap mesh debug forwarding-table | 801
show ap mesh debug hostapd-log
show ap mesh debug hostapd-log {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>}
Description
Show the debug log messages for the hostapd process.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show data for an AP with a specific name.
Show data for a specific Basic Service Set Identifier (BSSID) on an AP. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show data for an AP with a specific IP address by entering an IP address in dotted-decimal format.
Usage Guidelines
This is an internal technical support command. Alcatel-Lucent technical support may request that you issue this command to help analyze and troubleshoot problems with the hostapd process or your mesh network.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing
Command Mode
This show command is available in the base operating system. Commands to configure the mesh feature require the Mesh license.
Enable or Config mode on master switches
802 | show ap mesh debug hostapd-log
AOS-W 6.2 | Reference Guide
show ap mesh debug meshd-log
show ap mesh debug meshd-log {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>} [<page>]
Description
Show the debug log messages for the meshd process.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
<page>
Description
Show data for an AP with a specific name.
Show data for a specific Basic Service Set Identifier (BSSID) on an AP. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show data for an AP with a specific IP address by entering an IP address in dotted-decimal format.
Display page number 0, 1 or 2, where page 0 has the newest information and page 2 has the oldest. If this parameter is omitted, this command will display all meshd log information, oldest first.
Usage Guidelines
This is an internal technical support command. Alcatel-Lucent technical support may request that you issue this command to help analyze and troubleshoot problems with the meshd process or your mesh network.
Command History
Release AOS-W 3.0 AOS-W 3.4
Modification Command introduced. The page parameter was introduced.
Command Information
Platforms All platforms
Licensing
Command Mode
This show command is available in the base operating system. Commands to configure the mesh feature require the Mesh license.
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap mesh debug meshd-log | 803
show ap mesh debug provisioned-clusters
show ap mesh debug provisioned-clusters {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ipaddr>}
Description
Show cluster profiles provisioned on a mesh portal or mesh point.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show data for a mesh node with a specific name.
Show data for a mesh node with a specific Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show data for a mesh node with a specific IP address by entering an IP address in dotted-decimal format.
Example
The output of the command below shows statistics for the AP's mesh cluster profile and recovery cluster profile.
(host) #show ap mesh debug provisioned-clusters ap-name portal2
AP Portal Cluster Profile: mesh-cluster-profile
-------------------------------------------------
-------------------------
Parameter
Value
---------
-----
Cluster Name sw-ad-GB32
RF Band
a
Encryption
opensystem
WPA Hexkey
N/A
WPA Passphrase ********
AP "Portal" Cluster Profile: Recovery Cluster Profile
-----------------------------------------------------
Item
Value
----
-----
Cluster Name Recovery-ZF-xAPl5z-g15VN
RF Band
a
Encryption
pa2-psk-aes
WPA Hexkey
********
WPA Passphrase N/A
The output of this command displays the following information for the AP's mesh cluster profile and recovery cluster profiles:
Column Cluster Name RF band
Description
Name of the mesh cluster using this profile
The RF band in which the AP should operate: l g = 2.4 GHz l a = 5 GHz
804 | show ap mesh debug provisioned-clusters
AOS-W 6.2 | Reference Guide
Column Encryption
WPA Hexkey WPA Passphrase
Description
Data encryption setting for the mesh cluster profile. l opensystem--No authentication and encryption. l wpa2-psk-aes--WPA2 with AES encryption using a preshared key.
The WPA pre-shared key (only for mesh cluster profiles using WPA2 with AES encryption).
The WPA password that generates the preshared key (only for mesh cluster profiles using WPA2 with AES encryption).
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing
Command Mode
This show command is available in the base operating system. Commands to configure the mesh feature require the Mesh license.
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap mesh debug provisioned-clusters | 805
show ap mesh-ht-ssid-profile
show ap mesh-ht-ssid-profile [<profile>]
Description
Show configuration settings for a mesh high-throughput Service Set Identifier (SSID) profile.
Syntax
Parameter <profile>
Description Name of a mesh high-throughput SSID profile.
Usage Guidelines
High-throughput APs support additional settings not available in legacy APs. A mesh high-throughput SSID profile can enable or disable high-throughput (802.11n) features and 40 Mhz channel usage, and define values for aggregated MAC protocol data units (MDPUs) and Modulation and Coding Scheme (MCS) ranges.
The command show ap mesh-ht-ssid-profile displays a list of all mesh high-throughput SSID profiles configured on the switch, including the number of references to each profile and each profile's status. Include the optional <profile> parameter to show detailed settings for an individual mesh high-throughput SSID profile.
Examples
The example below shows the configuration settings for the mesh high-throughput radio profile "default". (host) #show ap mesh-ht-ssid-profile default
Mesh High-throughput SSID profile "default" ------------------------------------------Parameter --------40 MHz channel usage BA AMSDU Enable High throughput enable (SSID) Legacy stations Low-density Parity Check Maximum number of spatial streams usable for STBC reception Maximum number of spatial streams usable for STBC transmission MPDU Aggregation Max received A-MPDU size Max transmitted A-MPDU size Min MPDU start spacing Short guard interval in 20 MHz mode Short guard interval in 40 MHz mode Supported MCS set
Value ----Enabled Enabled Enabled Allowed Enabled 1 1 Enabled 65535 bytes 65535 bytes 8 usec Enabled Enabled 0-23
The output of this command includes the following information:
Column 40 MHz channel usage
Description
This parameter shows if the profile enables or disables the use of 40 MHz channels.
806 | show ap mesh-ht-ssid-profile
AOS-W 6.2 | Reference Guide
Column BA AMSDU Enable High throughput enable (SSID)
Legacy stations Low-density Parity Check
Maximum number of spatial streams usable for STBC reception
Maximum number of spatial streams usable for STBC transmission
MPDU Aggregation Max received A-MPDU size Max transmitted A-MPDU size
Description
Shows of the AP has enabled or disabled the ability to receive AMSDU in BA negotiation.
Shows if 802.11n high-throughput features are enabled or disabled for this profile. By default, highthroughput features are enabled.
Allow or disallow associations from legacy (non-HT) stations. By default, this parameter is enabled (legacy stations are allowed).
If enabled, the AP will advertise Low-density Parity Check (LDPC) support. LDPC improves data transmission over radio channels with high levels of background noise.
Shows the maximum number of spatial streams usable for STBC reception. 0 disables STBC reception, 1 uses STBC for MCS 0-7. Higher MCS values are not supported. (Supported on the OAWAP90 series, OAW-AP130 Series, OAW-AP68, OAW-AP175 and OAW-AP105 only. The configured value will be adjusted based on AP capabilities.)
Shows the maximum number of spatial streams usable for STBC transmission. 0 disables STBC transmission, 1 uses STBC for MCS 0-7. Higher MCS values are not supported. (Supported on OAWAP90 series, OAW-AP175, OAW-AP130 Series and OAW-AP105 only. The configured value will be adjusted based on AP capabilities.)
Shows if the profile enables or disables MAC protocol data unit (MPDU) aggregation.
Configured maximum size of a received aggregate MPDU, in bytes.
Configured maximum size of a transmitted aggregate MPDU, in bytes.
Min MPDU start spacing Supported MCS set
Short guard interval in 20 MHz mode Short guard interval in 20 MHz mode
Configured minimum time between the start of adjacent MPDUs within an aggregate MPDU, in microseconds.
Displays a list of Modulation Coding Scheme (MCS) values or ranges of values to be supported on this SSID. The MCS you choose determines the channel width (20MHz vs. 40MHz) and the number of spatial streams used by the mesh node.
Shows if the profile enables or disables use of short (400ns) guard interval in 20 MHz mode.
Shows if the profile enables or disables use of short (400ns) guard interval in 40 MHz mode.
AOS-W 6.2 | Reference Guide
show ap mesh-ht-ssid-profile | 807
Command History
Version AOS-W 3.4 AOS-W 6.1
Description
Command introduced
The allow weak encryption parameter was deprecated. The following parameters were introduced: l Short guard interval in 20 MHz mode l Low-density Parity Check l Maximum number of spatial streams usable for STBC reception l Maximum number of spatial streams usable for STBC transmission
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
808 | show ap mesh-ht-ssid-profile
AOS-W 6.2 | Reference Guide
show ap mesh neighbors
show ap mesh neighbors {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>} [names]
Description
Show all mesh neighbors for an AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
names
Description
Show mesh neighbors for an AP with a specific name.
Show mesh neighbors for a specific Basic Service Set Identifier (BSSID) on an AP. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show mesh neighbors for an AP with a specific IP address by entering its IP address in dotted-decimal format.
If you include this optional parameter, the Portal column in the output of this command will translate the BSSIDs of mesh parent and child APs to AP names (where available).
Example
In the example below, the output has been split into two tables to better fit on the page. In the actual command-line interface, the output appears in a single, wide table. The Flags column the output of this command indicates the high-throughput (HT) properties of the mesh node. In the example below, the string "HT-40MHzsgi-2ss" indicates that the node uses a 40MHz channel with a short guard interval (sgi) and sends 2 spatial streams (ss).
(host) #show ap mesh neighbors ap-name portal
Neighbor list
-------------
MAC
Portal
Channel Age Hops Cost Relation
Flags RSSI
Rate Tx/Rx
---
------
------- --- ---- ---- --------
----- ---- --
--------
00:0b:86:e8:09:d1 00:1a:1e:88:01:f0 157
01
11.00 C 3h:15m:42s -
65
54/54
00:1a:1e:88:02:91 00:1a:1e:88:01:f0 157
01
4.00 C 3h:35m:30s HL
59
300/300
00:0b:86:9b:27:78 Yes
157
00
12.00 N 3h:22m:46s -
26 -
00:0b:86:e8:09:d0 00:1a:1e:88:01:f0 157
01
11.00 N 3h:15m:36s -
65 -
00:1a:1e:88:02:90 00:1a:1e:88:01:f0 157+
01
2.00 N 3h:35m:6s HL
59 -
A-Req ----1 1 0 0 0
A-Resp -----1 1 0 0 0
A-Fail -----0 0 0 0 0
HT-Details ---------Unsupported HT-40MHzsgi-2ss Unsupported Unsupported HT-40MHzsgi-2ss
Cluster ID ---------sw-ad-GB32 sw-ad-GB322 mc1 sw-ad-GB32 sw-ad-GB32
Total count: 5, Children: 2
AOS-W 6.2 | Reference Guide
show ap mesh neighbors | 809
Relation: P = Parent; C = Child; N = Neighbor; B = Blacklisted-neighbor Flags: R = Recovery-mode; S = Sub-threshold link; D = Reselection backoff; F = Auth-failure; H = High Throughput; L = Legacy allowed
The output of this command includes the following information:
Column MAC Portal
Channel Age Hops
Cost
Relation
Flags RSSI
Rate Tx/Rx A-Req A-Resp A-Fail Cluster
Description
MAC address of the mesh node.
By default, this column displays the BSSID of the mesh point. If you include the optional names parameter, this column will display AP names, if available. The AP names will include [p] (parent), or [c] (child) suffixes to indicate the role of the mesh BSSID.
Number of a radio channel used by the AP.
Number of seconds elapsed since the AP heard from the neighbor.
Indicates the number of hops it takes traffic from the mesh node to get to the mesh portal. The mesh portal advertises a hop count of 0, while all other mesh nodes advertise a cumulative count based on the parent mesh node
A relative measure of the quality of the path from the AP to the switch. A lower number indicates a better quality path, where a higher number indicates a less favorable path (e.g, a path which may be longer or more congested than a path with a lower value.) For a mesh point, the path cost is the sum of the (parent path cost) + (the parent node cost) + (the link cost).
Shows the relationship between the specified AP and the AP on the neighbor list and the amount of time that relationship has existed. l P = Parent l C = Child l N = Neighbor l B = Blacklisted-neighbor
This parameter shows additional information about the mesh neighbor. The key describing each flag appears at the bottom of the neighbor list.
The Receive Signal Strength Indicator (RSSI) value displayed in the output of this command represents signal strength as a signal to noise ratio. For example, a value of 30 would indicate that the power of the received signal is 30 dBm above the signal noise threshold.
The rate, in Mbps, that a neighbor transmits data to or receives data from the mesh-node specified by the command.
Number of association requests from clients
Number of association responses from the mesh node
Number of association failures
Name of the Mesh cluster that includes the specified AP or BSSID.
810 | show ap mesh neighbors
AOS-W 6.2 | Reference Guide
Command History
Version AOS-W 3.0 AOS-W 3.4.1
Modification
Command introduced
The names parameter was introduced. The output of this command was also modified to include the Rate Tx/Rx column.
Command Information
Platforms All platforms
Licensing
Command Mode
This show command is available in the base operating system. Commands to configure the mesh feature require the Mesh license.
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap mesh neighbors | 811
show ap mesh-radio-profile
show ap mesh-radio-profile [<profile>]
Description
Show configuration settings for a mesh radio profile.
Syntax
Parameter <profile>
Description Name of a mesh radio profile.
Usage Guidelines
The radio profile determines the radio frequency/channel used only by mesh nodes to establish mesh links. Mesh nodes operating in different cluster profiles can share the same radio profile. Conversely, mesh portals using the same cluster profile can be assigned different mesh radio profiles to achieve frequency separation.
The command show ap mesh-radio-profile displays a list of all mesh radio profiles configured on the switch, including the number of references to each profile and each profile's status. Include the optional <profile> parameter to show detailed settings for an individual mesh radio profile.
Example
The example below shows the configuration settings for the mesh cluster profile "default".
(host) #show ap mesh-radio-profile default Mesh Radio profile "default" ---------------------------Parameter --------802.11a Transmit Rates 802.11g Transmit Rates Allowed VLANs on mesh link BC/MC Rate Optimization Heartbeat threshold Link Threshold Maximum Children Maximum Hop Count Mesh Private Vlan Mesh High-throughput SSID Profile Mesh Survivability Metric algorithm Rate Optimization for delivering EAPOL frames and mesh echoes Reselection mode Retry Limit RTS Threshold
Value ----6 9 12 18 24 36 48 54 1 2 5 6 9 11 12 18 24 36 48 54 1-4094 Enabled 10 12 64 8 0 default Disabled distributed-tree-rssi Disabled startup-subthreshold 8 2333 bytes
The output of this command includes the following information:
812 | show ap mesh-radio-profile
AOS-W 6.2 | Reference Guide
Parameter 802.11a Transmit Rates
802.11g Transmit Rates
Allowed VLANs on mesh link BC/MC Rate Optimization Heartbeat Threshold
Link Threshold
Maximum Children Maximum Hop Count Mesh Private Vlan Mesh High-throughput SSID Profile Mesh Survivability
Metric algorithm Rate Optimization for delivering EAPOL frames and mesh echoes Reselection Mode
Description
Indicates the transmit rates for the 802.11a radio. The AP attempts to use the highest transmission rate to establish a mesh link. If a rate is unavailable, the AP goes through the list and uses the next highest rate.
Indicates the transmit rates for the 802.11g radio. The AP attempts to use the highest transmission rate to establish a mesh link. If a rate is unavailable, the AP goes through the list and uses the next highest rate.
Specify a list of VLAN IDs that can be used by a mesh link on APs associated with this mesh radio profile
If enabled, the mesh node will use the slowest associated mesh-point rate for broadcast/multicast data (rather than minimum).
Indicates the maximum number of heartbeat messages that can be lost between neighboring mesh nodes before the mesh node is considered inactive and is dropped as a mesh neighbor.
Indicates the threshold for the lowest acceptable Receive Signal Strength Indicator (RSSI) value. Links that drop below this threshold will have an increased link cost. Default: 12.
The maximum number of children a mesh portal can accept.
The maximum number of hops allowed between a mesh point and a mesh portal.
This parameter is experimental and reserved for future use.
The High-throughput SSID Profile associated with this mesh radio profile.
This parameter shows if mesh points and portals can become active even if the switch cannot be reached by bridging LAN traffic. This is a beta feature that is disabled by default; it should not be enabled unless you are instructed to do so by Alcatel-Lucent technical support.
Algorithm used by a mesh node to select its parent.
If this option is enabled, mesh APs will to choose a more conservative rate for EAPOL frames and mesh echoes.
Specifies the one of the following methods used to find a better mesh link. l startup-sub-threshold: When bringing up the mesh
network, mesh nodes have 3 minutes to find a better uplink. After that time, each mesh node evaluates alternative links only if the existing uplink falls below the configured threshold level (the link becomes a sub-threshold link). The reselection process is
AOS-W 6.2 | Reference Guide
show ap mesh-radio-profile | 813
Parameter
Retry Limit RTS Threshold
Description
canceled if the average RSSI rises on the existing uplink rises above the configured link threshold. l reselect-any-time: Connected mesh nodes evaluate alternative mesh links every 30 seconds. If a mesh node finds a better uplink, the mesh node connects to the new parent to create an improved path to the mesh portal. l reselect-never: Connected mesh nodes do not evaluate other mesh links to create an improved path to the mesh portal. l subthreshold-only: Connected mesh nodes evaluate alternative links only if the existing uplink becomes a sub-threshold link.
Maximum number of times a mesh node can re-send a packet.
The packet size sent by mesh nodes. Mesh nodes transmitting frames larger than this threshold must issue request to send (RTS) and wait for other mesh nodes to respond with clear to send (CTS) to begin transmission. This helps prevent mid-air collisions.
Command History
Release AOS-W 3.2 AOS-W 3.4
AOS-W 6.2
Modification
Command Introduced.
The 802.11g Portal channel and 802.11a Portal channel parameters were deprecated, and the Mesh High-throughput SSID Profile parameter was introduced.
The Rate Optimization for delivering EAPOL frames and mesh echoes parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
814 | show ap mesh-radio-profile
AOS-W 6.2 | Reference Guide
show ap mesh tech-support
show ap mesh tech-support ap-name <ap-name> <filename>
Description
Display all information for an AP, and save that information in a file on the switch
Syntax
Parameter <ap-name> <filename>
Description
Name of an AP for which you want to create a report
Filename for the report created by this command. The file can only be saved in the flash directory. If desired, you can use FTP or TFTP to copy the file to another destination.
Usage Guidelines
This command displays the output of the multiple mesh and debug CLI commands, then saves that data into a report file on the switch's flash drive, where it can be analyzed for debugging purposes. The information in this report includes the output of the following commands: l show ap mesh neighbors l show ap mesh debug current-cluster l show ap mesh debug provisioned-clusters l show ap mesh debug counters l show ap mesh debug forwarding-table l show ap mesh debug meshd-log l show ap mesh debug hostapd-log
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing
Command Mode
This show command is available in the base operating system. Commands to configure the mesh feature require the Mesh license.
Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap mesh tech-support | 815
show ap mesh topology
show ap mesh topology [long] [page <page>] [start <start>]
Description
Show the mesh topology tree.
Syntax
Parameter long page <page>
start <start>
Description
Include the names of a mesh portal's children in the output of this command
Limit the output of this command to a specific number of entries by entering the number of entries you want to display.
Start displaying the mesh topology tree at a chosen index number by entering the index number of the AP at which command output should start.
Example
An (N) in the Mesh Role column indicates the node is 11N capable. An (N) beside the parent name in the Parent column indicates that the mesh node's the parent is also 11N capable. (host) #show ap mesh topology
Mesh Cluster Name: sw-ad-GB32 ----------------------------Name Mesh Role Parent Path Cost Node Cost Link Cost Hop Count RSSI Rate Tx/Rx
---- --------- ------ --------- --------- --------- --------- ---- ----------
Last Update Uplink Age #Children
----------- ---------- ---------
ad-ap Point (N) mp3
2
0
0
1
61 300/270
6m:12s
3h:8m:7s 0
msc-1 Point
mp3
2
0
0
1
64 54/54
6m:36s
2h:48m:12s 0
Total APs :2 (R): Recovery AP. (N): 11N Enabled. For Portals 'Uplink Age' equals uptime.
The output of this command includes the following information:
Column Name Mesh Role
Description
Name of the mesh node.
An AP operating as a mesh node can have one of two roles: mesh portal or mesh point.
816 | show ap mesh topology
AOS-W 6.2 | Reference Guide
Column Parent Path Cost
Node Cost
Link Cost Hop Count RSSI
Rate Tx/Rx Last Update Uplink Age #Children
Description
If the AP is operating as a mesh point, this parameter displays the name of its parent mesh portal.
A relative measure of the quality of the path from the AP to the switch. A lower number indicates a better quality path, where a higher number indicates a less favorable path (e.g, a path which may be longer or more congested than a path with a lower value.) For a mesh point, the path cost is the sum of the (parent path cost) + (the parent node cost) + (the link cost).
A relative measure of the quality of the node, where a lower number of is more favorable than a higher number. This cost is related to the number of children on the specified node.
A relative measure of the quality of the link. For example, a more congested link will have a higher link cost than a similar, less-congested link.
Number of hops to the mesh portal.
The Receive Signal Strength Indicator (RSSI) value displayed in the output of this command represents signal strength as a signal to noise ratio. For example, a value of 30 would indicate that the power of the received signal is 30 dBm above the signal noise threshold.
The rate, in Mbps, that a mesh point transmits and receives at on its uplink. Note that the rate information is only as current as indicated in the Last Update column.
Time elapsed since the mesh node last updated its statistics.
Time elapsed since the mesh node became active in the mesh topology.
Number of children associated with a parent mesh point.
Command History
Version AOS-W 3.0 AOS-W 3.4.1
Modification Command introduced The output of this command was also modified to include the Rate Tx/Rx column.
Command Information
Platforms All platforms
Licensing
Command Mode
This show command is available in the base operating system. Commands to configure the mesh feature require the Mesh license.
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap mesh topology | 817
show ap monitor
show ap monitor active-laser-beams|ap-list|channel|client-list|containment-info|idsstate|mesh-list|pot-ap-list|pot-client-list|routers|wired-mac {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>} {ap-bssid <ap-bssid>}|{enet-mac <enet-mac>}
Description
Show information for Alcatel-Lucent Air Monitors.
Syntax
Parameter active-laser-beams
ap-list arp-cache channel client-list containment-info
Description
Show active laser beam generators. The output of this command shows a list of all APs that are actively performing policy enforcement containment such as rogue containment. This command can tell us which AP is sending out deauthorization frames, although it does not specify which AP is being contained.
Show list of APs being monitored.
Show ARP Cache of learned IP to MAC binding
Show state and stats of a specific channel.
Show list of client being monitored.
Show containment events and counters triggered by the wired containment and wireless containment features configured in the ids general-profile. The output of this command shows device and target data for wired containment activity, a well as data for the following counters. Wireless Containment Counters: l Last Deauth Timer Tick l Deauth frames to AP l Deauth frames to Client l Last Tarpit Timer Tick l Tarpit Frames: Probe Response l Tarpit Frames: Association Response l Tarpit Frames: Authentication l Tarpit Frames: Data from AP l Tarpit Frames: Data from Client l Last Enhanced Adhoc Containment Timer Tick l Enhanced Adhoc Containment: Frames To Data Sender l Enhanced Adhoc Containment: Frames To Data Receiver l Enhanced Adhoc Containment: Response to Request l Enhanced Adhoc Containment: Replay Response Wired Containment Counters: l Last Wired Containment Timer Tick l Last Tagged Wired Containment Timer Tick l Spoof frames sent l Spoof frames sent on tagged VLAN
ids-state ap-name
Show IDS State. Name of Access Point
818 | show ap monitor
AOS-W 6.2 | Reference Guide
Parameter bssid ip-addr
mesh-list pot-ap-list
pot-client-list
routers wired-mac ap-name <ap-name> bssid <bssid> ip-addr <ip-addr>
ap-bssid <apbssid> enet-mac <enetmac>
Description
BSSID of Access Point
IP Address of Access Point
Show list of Mesh APs being monitored.
Display the Potential AP table. The Potential AP table shows the following data: l bssid: the AP's Basic Service Set Identifier. l channel: The AP's current radio channel l phy type: The radio's PHY type. Possible values are 802.11a, 802.11a-HT-40,
802.11b/g, 802.11b/g-HT-20. l num-beacons: Number of beacons seen during a 10-second scan l tot-beacons: Total number of beacons seen since the last reset. l num-frames: Total number of frames seen since the last rest. l mt: Monitor time; the number of timer ticks elapsed since the switch first
recognized the AP. l at: Active time, in timer ticks. l ibss: Shows if ad-hoc BSS is enabled or disabled. It will be enabled if the
bssid has detected an ad-hoc BSS (an ibss bit in an 802.11 frame). l rssi: The Receive Signal Strength Indicator (RSSI) value displayed in the
output of this command represents signal strength as a signal to noise ratio. For example, a value of 30 would indicate that the power of the received signal is 30 dBm above the signal noise threshold.
Display the Potential client table. The Potential Client table shows the following values: l last-bssid: the Last BSSID to which the client associated. l from-bssid, l to-bssid l mt:Monitor time; the number of timer ticks elapsed since the switch first
recognized the client. l it: Client Idle time, expressed as a number of timer ticks.
Show Router MAC Addresses learned. The output of this command includes the router's MAC address, IP address and uptime.
Show Wired MAC Addresses learned.
Show data for an AP with a specific name.
Show data for a specific Basic Service Set Identifier (BSSID) on an AP. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show data for an AP with a specific IP address by entering its IP address in dotted-decimal format.
Include the optional ap-bssid <ap-bssid> parameters to show how the AP is monitoring information for another AP with a specific BSSID.
Include the optional enet-mac <enet-mac> parameters to show how the AP is monitoring information for an interface with a specific Ethernet MAC address.
Examples
The output of the command displays the Monitored AP table, which lists all the APs monitored by a specified AP or BSSID. (host) #show ap monitor ap-list ap-name al12
Monitored AP Table
AOS-W 6.2 | Reference Guide
show ap monitor | 819
------------------
bssid
essid
chan ap-type phy-type
dos
mt
it
load-balance
-----
-----
---- ------- --------
---
--
-- ---
---------
00:1a:1e:11:5f:02 ethersphere-vocera 6
valid 80211b/g-HT-20 disable 787272 0
disable
00:1a:1e:11:5f:00 guest
6
valid 80211b/g-HT-20 disable 787272 0
disable
00:1a:1e:11:5f:11 ethersphere-wpa2 48 valid 80211a-HT-40 disable 786835 0
disable
00:1a:1e:11:5f:10 guest
48 valid 80211a-HT-40 disable 786835 0
disable
00:1a:1e:11:5f:01 ethersphere-voip 6
valid 80211b/g-HT-20 disable 787272 0
disable
00:1a:1e:11:6e:70 guest
48 valid 80211a-HT-40 disable 18543 0
disable
00:1a:1e:11:6e:71 ethersphere-wpa2 48 valid 80211a-HT-40 disable 18543 0
disable
00:1a:1e:88:90:42 employee4a
6
unknown 80211b/g
disable 3160 0
disable
00:1a:1e:88:90:41 guest4
6
unknown 80211b/g-HT-20 disable 3160 0
disable
00:1a:1e:88:90:40 employee4
6
unknown 80211b/g-HT-20 disable 3159 0
disable
00:1a:1e:8e:73:e1 guest10
6
unknown 80211b/g-HT-20 disable 941
0
disable
00:1a:1e:8e:73:e0 emplyee10
6
unknown 80211b/g-HT-20 disable 910
0
disable
00:1a:1e:8e:73:f0 emplyee10
48 unknown 80211a-HT-40 disable 252
0
disable
00:1a:1e:8e:73:f1 guest10
48 unknown 80211a-HT-40 disable 252
0
disable
00:1a:1e:8d:5b:30 guest
48 valid 80211a-HT-40 disable 189
0
disable
00:1a:1e:8d:5b:31 ethersphere-wpa2 48 valid 80211a-HT-40 disable 189
0
disable
00:1a:1e:85:89:20 employee8
11 unknown 80211b/g-HT-20 disable 9
9
disable
The output of this command includes the following information:
Column bssid essid chan phy-type
dos mt
Description
Basic Service Set Identifier for an AP. This is usually the AP's MAC address.
Extended service set identifier that names a wireless network.
Radio channel used by the BSSID
Radio phy type. Possible types include: l 802.11a l 802.11a-HT-40 l 802.11b/g l 802.11b/g-HT-20
Shows if the feature to contain DoS attacks has been enabled or disabled.
Monitor time; the number of elapsed timer ticks since the AP first recognized the monitored AP.
820 | show ap monitor
AOS-W 6.2 | Reference Guide
Column it load-balance
Command History
Description
AP idle time, the number of timer-ticks since the AP last saw any frames from the monitored AP.
Shows if the load-balancing feature has been enabled on the AP.
Version AOS-W 3.0. AOS-W 3.4.
AOS-W 6.1
Modification
Command introduced
The ap-bssid and enet-mac parameters were added to the show ap monitor wired-mac command.
Added the following parameter to ids-state: ap-name bssid ip-addr
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap monitor | 821
show ap monitor association
show ap monitor association {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>} <ap-bssid>
Description
Show the association table for an Air Monitor (AM).
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
<ap-bssid>
Description
Show data for an AM with a specific name.
Show data for an AM with a specific Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AM's MAC address.
Show data for an AM with a specific IP address by entering its IP address in dotted-decimal format.
BSSID of an AP.
Examples
The output of the command lists the MAC addresses associated with the Air Monitor BSSID.
(host) #show ap monitor association ap-name ap9 00:1a:1e:11:74:a1
Association Table
-----------------
mac
rsta-type auth phy-type
---
--------- ---- --------
00:1d:d9:01:c4:50 valid
yes 80211a
00:17:f2:4d:01:e2 valid
yes 80211a
00:1f:3b:8c:28:89 valid
yes 80211a
00:1d:d9:05:05:d0 valid
yes 80211a
00:14:a4:25:72:6d valid
yes 80211a
00:19:7d:d6:74:8d valid
yes 80211a
The output of this command includes the following information:
Column mac rsta-type
auth phy-type
Description
MAC address associated with the Air Monitor BSSID
Rogue station type: l interfering: Interfering station. l valid: Station is not a rogue station. l DoS: Station may have attempted a DoS attack.
Displays a yes if the client has been authenticated.
The RF band in which the AP should operate: 802.11g = 2.4 GHz 802.11a = 5 GHz
822 | show ap monitor association
AOS-W 6.2 | Reference Guide
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap monitor association | 823
show ap monitor debug
show ap monitor debug counters|status {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>} show ap monitor debug profile-config {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>} ap-radio|ap-system|arm|event-thresholds|ids-dos|ids-general|ids-impersonation|ids-signaturematching|ids-unauthorized-device|interference|regulatory-domain|rf-behavior
Description
Show information for an Air Monitor's current status, message counters, or profile settings.
Syntax
Parameter counters status ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr> profile-config
ap-radio ap-system arm event-thresholds ids-dos ids-general ids-impersonation ids-signature-matching ids-unauthorized-device
Description
Show Air Monitor (AM) message counters.
Show the status of an Air Monitor.
Show data for an AM with a specific name.
Show data for an AM with a specific Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show data for an AM with a specific IP address by entering its IP address in dotted-decimal format.
Show an Air Monitor profile configuration.
Show the Air Monitor radio configuration parameters, as defined in the AM's 802.11a, 802.11b, or high-throughput radio profiles.
Show an Air Monitor's system configuration settings, as defined in it's AP System profile.
Show an Air Monitor's Adaptive Radio Management (ARM) settings, as defined in its current ARM profile
Show an Air Monitor Event Thresholds settings, as defined in its current RF Event Thresholds profile
Show an Air Monitor IDS DoS settings, as defined in its current IDS DoS profile.
Show an Air Monitor IDS General Configuration settings, as defined in its IDS General profile.
Show an Air Monitor IDS Impersonation Configuration settings, as defined in its IDS Impersonation profile.
Show an Air Monitor IDS Signature Matching configuration settings, as defined in its IDS Signature Matching profile
Show an Air Monitor IDS Unauthorized Device configuration settings, as defined in its IDS Unauthorized Device profile.
824 | show ap monitor debug
AOS-W 6.2 | Reference Guide
Parameter interference regulatory-domain rf-behavior
Description
Show an Air Monitor's interference configuration settings, as defined in its current RF Optimization profile.
Show an Air Monitor's Regulatory Domain configuration settings, as defined in its Regulatory Domain profile.
Show an Air Monitor RF Behavior Configuration
Examples
The output of the following command includes the WLAN Interface, Data Structures, WLAN InterfaceSwitch Status and RTLS Configuration tables for the specified AP.
(host) #show ap monitor debug status ap-name ap12
WLAN Interface
--------------
bssid
scan monitor probe-type phy-type
-----
---- ------- ---------- --------
00:1a:1e:11:5f:10 enable enable sap
80211a-HT-40
00:1a:1e:11:5f:00 enable enable sap
80211b/g-HT-20
task ---tuned tuned
channel ------153 6
pkts ---496970814 391278179
Wired Interface
---------------
mac
ip
---
--
macs gw-macs tagged-pkts vlan
---- ------- ----------- ----
00:1a:1e:c9:15:f0 192.0.2.32.200
2
3
1
03
Global Counters
---------------
key
value
---
-----
Packets Read
888248993
Bytes Read
2819670134
Num Interrupts
681037971
Num Buffer Overflows 591393
Max PPS
16239
Cur PPS
1130
Max PPI
20
Cur PPI
2
Uptime
3323085
AP Name
AL12
LMS IP
Master IP
AP Type
125
Country Code
2
gw-ip -----
gw-mac ------
status pkts ------ ----
192.0.2.32.254 00:0b:86:08:e1:00 enable 101960
Data Structures
----------------
ap sta pap psta ch msg-hash ap-l
-- --- --- ---- -- -------- ----
20 40 17 55 24 21
20
Other Parameters ----------------key --WMS on Master
value ----disabled
AOS-W 6.2 | Reference Guide
show ap monitor debug | 825
Stats Update Interval Poll Interval Num Switches Collect Stats
60 174000 1 enabled
WLAN Interface Switch Status
-----------------------------
Bssid
Type Status
ack
-----
---- ------
--
00:1a:1e:11:5f:10 local up
3322965
00:1a:1e:11:5f:00 local up
3322965
Last-reg -------3321891 3321891
N-reg ----3821 3821
Last-update ----------3322965 3322917
Next-update ----------197 187
N-updates --------10368 10378
Last------
RTLS configuration
-------------------
Type
Server IP
----
---------
MMS
102.0.2.19
Aeroscout 192.0.2.199
RTLS
192.0.2.19
Port Frequency Active
---- --------- ------
8000 N/A
1144 N/A
5050 30
*
The output of this command includes the following information:
Column bssid scan monitor probe-type
task
channel pkts mac ip gw-ip gw-mac
Description
The Basic Service Set Identifier (BSSID) for the AP. This is usually the AP's MAC address.
Indicates whether or not if active scanning is enabled on this AP.
Indicates whether the AP radio is currently enabled or disabled.
This parameter displays one of the following options to show the AP is configured. l sap: Default AP setting. l am: AP is configured as an Air Monitor. l m-portal: AP is configured as a Mesh portal. l m-point: AP is configured as a Mesh point.
This parameter displays one of the following options to show the radio's current task: l scan: AP is scanning other channels. l tuned: AP is tuned on one channel. l locate: AP has been asked to locate a specific AP or client. l pcap: The AP is enabled with the Packet Capture feature.
The radio channel currently used by an AP's WLAN interface.
Number of packets seen on the interface.
MAC address for the AP's wired interface.
The AP's IP address.
IP address for the AP's gateway.
MAC address for the AP's gateway.
826 | show ap monitor debug
AOS-W 6.2 | Reference Guide
Column status pkts macs gw-macs tagged-pkts vlan Packets read Bytes read Num Intercepts Num Buffer Overflows Max PPS Cur PPS Max PPI Cur PPI Uptime LMS IP Master IP AP type Country Code
ap sta pap
psta
ch msg-hash ap-l WMS on Master
Description Shows if the interface is currently enabled or disabled. Number of packets seen on the AP's wired interface. Number of MAC addresses in the Wired MAC table for that interface. Number of MAC addresses in the Wired MAC table for that interface. Number VLAN-tagged packets sent to that interface. The VLAN ID for the packets sent to that interface. Number of packets read by the AP since it was last reset. Number of bytes read by the AP since it was last reset. Number of interrupts from the AP's driver. Number of times excessive traffic has filled the AP's buffers. Maximum throughput rate seen on the interface, in packets per second. Current throughput rate seen on the interface, in packets per second. Maximum interrupt rate seen on the interface, in interrupts per second. Current interrupt rate seen on the interface, in interrupts per second. Number of seconds since the AP was last reset. IP address of the AP's local switch. IP address of the AP's master switch. AP model type. The AP's country code. Valid radio channels for your wireless network are based on your country code. If you change the AP's country code, the valid channels will be reset to the defaults for the new country. Number of other APs monitored by this AP. Number of clients and APs seen by this AP. Number of potential APs; APs which have transmitted a beacon, but have not yet been registered. Number of potential stations; AP has seen a MAC address from the station but hasn't yet received traffic from it. Number of channel entries in the channel table. Number of different message types seen on the interface. (For internal use only) Indicates if the AP communicates to the wms process on a master or local switch. enabled: Communicates with a master switch.
AOS-W 6.2 | Reference Guide
show ap monitor debug | 827
Column
Stats Update Interval
Poll Interval
Num Switches
Collect Stats Bssid Type Status Last-reg N-reg Last-update Next-update N-updates Last-ack
Type Server IP Port Frequency Active
Command History
Version AOS-W 3.0. AOS-W 3.4.
Description disabled: Communicates with a local switch only. If the AP is collecting statistics, this value is the interval in seconds in which the AP sends statistics to the WMS process on a switch. Interval, in milliseconds, that the AP sends RSSI updates to the WMS process on a switch. Number of switches to which this AP has access. If the value is 1, the AP has access to a master or a local switch. If the value is 2, the AP has access to a master and a local switch. If enabled, the AP will collect statistics to send the WMS process on its switch. BSSID of the radio. Indicates whether the switch type is master or local. If up, the AP can reach the switch. If down, the AP cannot reach the switch. The time the AP last registered with the WMS process. Number of times the AP has registered with the WMS process. The last timer tick time the AP updated the WMS process. Interval between the last update and the next scheduled update. Number of updates sent to the WMS process. Number of timer ticks since the AP received an acknowledgement from the WMS process. Type of RTLS server used by the AP, such as MMS or Aeroscout. IP address of the RTLS server. Port used by the RTLS server. Rate, in seconds, at which RTLS messages are sent to the server. Indicates if the server is active on the AP.
Modification Command introduced The tagged-pkts and vlan parameters were added to the Wired Interface table in the output of the show ap monitor debug status command.
828 | show ap monitor debug
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap monitor debug | 829
show ap monitor stats
show ap monitor stats advanced {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>} clientmac <client-mac>
show ap monitor stats {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>} mac <mac>
Description
Show packet, signal and channel statistics for an AP or a client.
Syntax
Parameter
Description
advanced
Show advanced statistics for an AP or client.
ap-name <ap-name>
Show statistics for an AP with a specific name.
bssid <bssid>
Show data for a specific Basic Service Set Identifier (BSSID) on an AP. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
ip-addr <ip-addr>
Show data for an AP with a specific IP address by entering its IP address in dotted-decimal format.
mac <mac>
Show data for a specific MAC address by entering the MAC address of a client or AP.
client-mac <client-mac> Show data for a specific client MAC address by entering the MAC address of a client.
Example
The output of the following command shows monitoring statistics for the AP al12, and a client with the MAC address 00:03:2a:02:6a:d7. (host) #show ap monitor stats ap-name al12 mac 00:03:2a:02:6a:d7
Aggregate Stats
---------------
retry low-speed non-unicast recv-error frag bwidth
----- --------- ----------- ---------- ---- ------
0
0
0
0
0
0
RSSI
----
avg-signal low-signal high-signal count duration (sec)
---------- ---------- ----------- ----- --------------
51
51
51
4
50
Monitored Time:6626
Last Packet Time:585500
Uptime:585502
DoS Frames
----------
tx old-tx rx old-rx
-- ------ -- ------
00
00
Interference Baseline
---------------------
830 | show ap monitor stats
AOS-W 6.2 | Reference Guide
FRR FRER
--- ----
17 4
Handoff Assist
--------------
rssi-index cur-signal old-cur-signal
---------- ---------- --------------
0
51
0
High Throughput Parameters
--------------------------
ht-type primary-channel sec-channel gf-supported
------- --------------- ----------- ------------
none
0
0
0
40mhz-intolerance ----------------0
The output of this command includes the following information:
Column retry Low-speed non-unicast recev-error frag bwth avg-signal Low-signal high-signal count Duration tx
old-tx
rx
old-rx
FRR FRER rssi-index
Description Percent of 802.11 retry frames sent because a client failed to send an ACK.
Percent of frames sent at a data rate of 18 Mbps or slower.
Percent of non-unicast frames
Percent of error frames of all frames seen in the last second.
Rate of fragmented packets, in frames per second
Current bandwidth, in bps.
Average signal-to-noise ratio over the interval since the AP's last reset.
Lowest signal-to-noise ratio over the interval since the AP's last reset.
Highest signal-to-noise ratio over the interval since the AP's last reset.
Number of packets seen on the AP over the interval since the AP's last reset.
Time over which the AP has measured RSSI values.
The total number of deauthorization frames sent to this MAC address for containment in the interval from the AP's last reset until the current timer tick.
The total number of deauthorization frames sent to this MAC address for containment until the previous timer tick.
The total number of deauthorization frames spoofing the MAC address in the interval from the AP's last reset until the current timer tick.
The total number of deauthorization frames sent to this MAC address for containment until the previous timer tick.
Frame retry rate, in frames per second.
Frame error retry rate, in frames per second.
This value indicates the number of consecutive timer ticks over which the value of the Receive Signal Strength Indicator (RSSI) of the client has reduced by more than 3 units.
AOS-W 6.2 | Reference Guide
show ap monitor stats | 831
Column
cur-signal old-cur-signal
ht-type
primary-channel sec-channel gf-supported 40mhz-intolerance
Description
NOTE: This value is updated only if 'handoff-assist' is enabled in the AP's RF Optimization profile.
The Receive Signal Strength Indicator (RSSI) of the most recent frame received from the specified MAC address.
The most recent Receive Signal Strength Indicator (RSSI) of the MAC which is 3 lower or 5 higher than the current RSSI. NOTE: This value is updated only if 'handoff-assist' is enabled in the AP's RF Optimization profile
This parameter indicates support for the following HT types: no: No support for high-throughput. HT-20: Support for 20 Mhz high-throughput only. HT-40: Support for 40 Mhz high-throughput.
Primary radio channel.
Secondary radio channel
If 1, this AP supports greenfield mode. If 0, greenfield is not supported.
Indicates whether the specified MAC address is 40 Mhz intolerant.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
832 | show ap monitor stats
AOS-W 6.2 | Reference Guide
show ap packet-capture status
show ap packet-capture status <ap-name|ip-addr|ip6-addr>
Description
This command shows detailed packet capture (PCAP) session information for Alcatel-Lucent APs.
Syntax
Parameter ap-name ip-addr
ip6-addr
Description
AP name for which you are requesting packet capture status information.
IP address of the AP for which you are requesting packet capture status information.
IP6 address of the AP for which you are requesting packet capture status information.
Usage Guidelines
This is the show version for the ap packet-capture commands, used to direct an Alcatel-Lucent AP to send packet captures to a client packet capture utility such as Airmagnet, Wireshark and so on, on a remote client.
Example
#show ap packet-capture status ap-name ap1
Packet Capture Sessions at ap1, IP 10.3.44.167
----------------------------------------------
pcap-id filter
type
intf
channel max-pkts
------- ------
----
----
------- --------
1
type eq all interactive 6c:f3:7f:ba:65:70 153
0
max-pkt-size num-pkts status
url target
Radio ID
------------ -------- ------
------
------
65536
3759
in-progress 192.168.0.3/5555 0
Related Commands
For a complete list of packet capture (pcap) commands and usage guidelines, see ap packet-capture .
Command History
Version AOS-W6.2
Change Name changed from pcap to ap packet capture.
AOS-W 6.2 | Reference Guide
show ap packet-capture status | 833
show ap profile-usage
show ap profile-usage {ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>}
Description
Show a complete list of all profiles referenced by an individual AP or an AP BSSID.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show data for an AP with a specific name.
Show data for a specific Basic Service Set Identifier (BSSID) on an AP. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show data for an AP with a specific IP address by entering its IP address in dotted-decimal format.
Usage Guidelines
Use this command to monitor the configuration profiles in use by an AP or a specific BSSID. The output of this command shows the name of each profile type that is associated with the AP or BSSID, as well as the source that associates the profile with the AP.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
834 | show ap profile-usage
AOS-W 6.2 | Reference Guide
show ap provisioning
show ap provisioning {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>}
Description
Show provisioning parameters currently used by an AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description Show data for an AP with a specific name.
Show data for a specific Basic Service Set Identifier (BSSID) on an AP. An AP's BSSID is usually the AP's MAC address.
Show data for an AP with a specific IP address.
Example
The output of this command shows that the AP named AP8 has mostly default parameters. These
appear with the value N/A.
(host) #show ap provisioning ap-name AP8
AP "mp2" Provisioning Parameters
--------------------------------
Item
Value
----
-----
(host) (config) #show ap provisioning ap-name 00:24:6c:c7:d5:c8
AP "00:24:6c:c7:d5:c8" Provisioning Parameters ---------------------------------------------Item ---AP Name AP Group Location name SNMP sysLocation Master Gateway IPv6 Gateway Netmask IP Addr IPv6 Addr IPv6 Prefix DNS IP DNS IPv6 Domain Name Server Name Server IP Antenna gain for 802.11a Antenna gain for 802.11g Antenna for 802.11a Antenna for 802.11g Single chain mode for Radio 0 Single chain mode for Radio 1 IKE PSK PAP User Name
Value ----00:24:6c:c7:d5:c8 default N/A N/A 10.4.62.9 N/A N/A N/A N/A N/A 64 N/A N/A N/A aruba-master 10.4.62.9 N/A N/A both both 0 0 N/A N/A
AOS-W 6.2 | Reference Guide
show ap provisioning | 835
PAP Password
N/A
PPPOE User Name
N/A
PPPOE Password
N/A
PPPOE Service Name
N/A
PPPOE CHAP Secret
N/A
USB User Name
N/A
USB Password
N/A
USB Device Type
any
The output of this command includes the following information:
Column AP Name AP Group Location name SNMP sysLocation
Master Gateway Netmask IP Addr IPv6 IPv6 Prefix Dns IP DNS IPv6 Domain Name Server Name Server IP Antenna gain for 802.11a Antenna gain for 802.11g Antenna for 802.11a
Antenna for 802.11g
Description Name of the AP.
AP group to which the AP belongs.
Fully-qualified location name (FQLN) for the AP.
User-defined description of the location of the AP, as defined with the command provision-ap syslocation.
Name or IP address for the master switch.
IP address of the default gateway for the AP.
Netmask for the AP's IP address.
IP address for the AP.
The static IP6 address of the AP.6
The prefix of static IPv6 address of the AP.
IP address of the DNS server.
The prefix of static IPv6 address of the AP.
Domain name used by the AP.
DNS name of the switch from which the AP boots.
IP address of the switch from which the AP boots
Antenna gain for 802.11a (5GHz) antenna.
Antenna gain for 802.11g (2.4GHz) antenna.
Antenna use for 5 GHz (802.11a) frequency band. l 1: AP uses antenna 1 l 2: AP uses antenna 2 l both: AP uses both antennas
Antenna use for 2.4 GHz (802.11g) frequency band. l 1: AP uses antenna 1 l 2: AP uses antenna 2 l both: AP uses both antennas
836 | show ap provisioning
AOS-W 6.2 | Reference Guide
Column
Description
Single chain mode for Radio 0
If this parameter is set to 1 for an 802.11n-capable radio, the radio will operate in single-chain mode, and will transmit and receive data using only legacy rates and single-stream HT rates up to MCS 7. This parameter is set to 0 (disabled) by default.
Single chain mode for Radio 1
If this parameter is set to 1 for an 802.11n-capable radio, the radio will operate in single-chain mode, and will transmit and receive data using only legacy rates and single-stream HT rates up to MCS 7. This parameter is set to 0 (disabled) by default.
IKE PSK
IKE PSK The IKE pre-shared key.
PAP password
Password Authentication Protocol (PAP) password for the AP.
PAP User Name
PAP username for the AP.
PPPOE User Name
Point-to-Point Protocol over Ethernet (PPPoE) user name for the AP.
PPPOE Password
PPPoE password for the AP.
PPPOE Service Name
PPPoE service name for the AP.
PPPOE CHAP secret
PPPoE CHAP secret key for the AP.
USB User Name
The PPP username provided by the cellular service provider
USB Password
A PPP password, if provided by the cellular service provider
USB Type
The USB driver type.
USB Device Identifier
The USB device identifier.
USB Dial String
The dial string for the USB modem. This parameter only needs to be specified if the default string is not correct.
USB Initialization String
The initialization string for the USB modem. This parameter only needs to be specified if the default string is not correct.
USB TTY device data path
The TTY device path for the USB modem. This parameter only needs to be specified if the default path is not correct.
USB TTY device control path The TTY device control path for the USB modem. This parameter only needs to be specified if the default path is not correct.
Uplink VLAN
If you configured an uplink VLAN on an AP connected to a port in trunk mode, the AP sends and receives frames tagged with this VLAN on its Ethernet uplink. By default, an AP has an uplink vlan of 0, which disables this feature.
Link Priority Ethernet
Set the priority of the wired uplink, from 0-255. Each uplink type has an associated priority; wired ports having the highest priority by default.
Link Priority Cellular
The priority of the cellular uplink, from 0-255. By default, the cellular uplink is a lower priority than the wired uplink; making the wired link the primary link and the cellular link the secondary or backup link.
AOS-W 6.2 | Reference Guide
show ap provisioning | 837
Column
Description
Mesh Role
If the mesh role is "none," the AP is operating as a thin AP. An AP operating as a mesh node can have one of two roles: mesh portal or mesh point.
Installation
Indicates the type of installation (indoor or outdoor). The default parameter indicates that the installation mode is determined by the AP model type.
Latitude
Latitude coordinates of the AP, in the format Degrees Minutes Seconds (DMS).
Longitude
Longitude coordinates of the AP, in the format Degrees Minutes Seconds (DMS).
Altitude
Altitude, in meters, of the AP. This parameter is supported on outdoor APs only.
Antenna bearing for 802.11a
Horizontal coverage distance of the 802.11a (5GHz) antenna from true north, from 0-360 degrees. NOTE: This parameter is supported on outdoor APs only. The horizontal coverage pattern does not consider the elevation or vertical antenna pattern.
Antenna bearing for 802.11g
Horizontal coverage distance of the 802.11g (2.4GHz) antenna from true north, from 0-360 degrees. NOTE: This parameter is supported on outdoor APs only. The horizontal coverage pattern does not consider the elevation or vertical antenna pattern.
Antenna tilt angle for 802.11a
The angle of the 802.11a (5GHz) antenna. This parameter can range from between -90 degrees and 0 degrees for downtilt, and between +90 degrees and 0 degrees for uptilt.
Antenna tilt angle for 802.11g
The angle of the 802.11g (2.4GHz) antenna. This parameter can range from between -90 degrees and 0 degrees for downtilt, and between +90 degrees and 0 degrees for uptilt.
Mesh SAE
Shows if the AP has enabled or disabled Secure Attribute Exchange (SAE) on a mesh network.
Related Commands
Command
Description
provision-ap
Change provisioning parameters for an individual AP. This command does not save the provisioning parameters settings in a reusable profile.
ap provisioning-profile This command defines a provisioning profile for an AP or group of APs.
Command History
Release AOS-W 3.0
Modification Command introduced
838 | show ap provisioning
AOS-W 6.2 | Reference Guide
Release AOS-W 3.2 AOS-W 3.4
AOS-W 5.0
Modification
Introduced support for mesh parameters, additional antenna parameters, and AP location parameters.
Introduced support for the following parameters: l Installation l Mesh SAE l USB User Name l USB Password l USB Device Type l USB Device Identifier l USB Dial String l USB Initialization String l USB TTY device path
The mesh-sae parameter no longer displays the sae-default setting if the parameter is disabled. Only the sae-disable option indicates that this parameter is currently in its default disabled state.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap provisioning | 839
show ap provisioning-profile
ap provisioning-profile [<profile-name>]
Description
This command shows information for AP provisioning profiles.
Syntax
Parameter <profile-name>
Description The name of an an existing AP provisioning profile.
Usage Guidelines
The AP provisioning profile allows you to define a set of provisioning parameters to an AP group. These settings can be saved or assigned to an AP group via the command ap-group <group> provisioning-profile <profile>.
Issue this command without the <profile-name> option to display the entire AP provisioning profile list, including profile status and the number of references to each profile. Include a profile name to display the authorization group defined for that profile.
Examples
The following example lists all AP provisioning profiles. The References column lists the number of other profiles with references to that provisioning profile, and the Profile Status column indicates whether the profile is predefined. User-defined AP provisioning profiles will not have an entry in the Profile Status column.
(host) #show ap provisioning-profile
Provisioning profile List
-------------------------
Name
References Profile Status
----
---------- --------------
default 12
outdoor 3
To display the configuration settings for an individual profile, include the <profile> parameter. The example below shows the profile details for the AP provisioning profile Default.
(host) #show ap provisioning-profile default Provisioning profile "default" -----------------------------Parameter --------Remote-AP Master IP/FQDN PPPOE User Name PPPOE Password PPPOE Service Name USB User Name USB Password USB Device Type USB Device Identifier USB Dial String USB Initialization String USB TTY device data path USB TTY device control path
Value ----No N/A N/A N/A N/A N/A N/A any N/A N/A N/A N/A N/A
840 | show ap provisioning-profile
AOS-W 6.2 | Reference Guide
Link Priority Ethernet
0
Link Priority Cellular
0
Username of AP so that AP can authenticate to 802.1x using PEAP N/A
Description
This command defines a provisioning profile for an AP or group of APs.
Syntax
Parameter Remote-AP Master IP/FQDN PPPOE User Name PPPOE Password PPPOE Service Name USB User Name USB Password USB Type USB Device Identifier USB Dial String USB Initialization String
USB TTY device data path
USB TTY device control path
Link Priority Ethernet
Link Priority Cellular
Description
Indicates that the profile is associated with a remote AP using certificates.
The FQDN or IP address for the master switch.
PPPoE username for the AP.
Point-to-Point Protocol over Ethernet (PPPoE) password for the AP.
PPPoE service name for the AP.
The PPP username provided by the cellular service provider
A PPP password, if provided by the cellular service provider
The USB driver type.
The USB device identifier.
The dial string for the USB modem. This parameter only needs to be specified if the default string is not correct.
The initialization string for the USB modem. This parameter only needs to be specified if the default string is not correct.
The TTY device path for the USB modem. This parameter only needs to be specified if the default path is not correct.
The TTY device control path for the USB modem. This parameter only needs to be specified if the default path is not correct.
Set the priority of the wired uplink, from 0-255. Each uplink type has an associated priority; wired ports having the highest priority by default.
The priority of the cellular uplink, from 0-255. By default, the cellular uplink is a lower priority than the wired uplink; making the wired link the primary link and the cellular link the secondary or backup link.
AOS-W 6.2 | Reference Guide
show ap provisioning-profile | 841
Parameter
Description
Username of AP so that AP can authenticate to If your AP uses PEAP authentication, this field displays
802.1x using PEAP
the AP username.
Password of AP so that AP can authenticate to If your AP uses PEAP authentication, this field displays
802.1x using PEAP
the AP password.
Uplink VLAN
If you configured an uplink VLAN on an AP connected to a port in trunk mode, the AP sends and receives frames tagged with this VLAN on its Ethernet uplink. By default, an AP has an uplink vlan of 0, which disables this feature.
Usage Guidelines
The AP provisioning profile allows you to define a set of provisioning parameters to an AP group. These settings can be saved or assigned to an AP group via the command ap-group <group> provisioning-profile <profile>.
Related Commands
Command provision-ap
Description
Change provisioning parameters for an individual AP. This command does not save the provisioning parameters settings in a reusable profile.
Command History
Release AOS-W 3.0 AOS-W 6.0
Modification Command introduced The uplink-vlan parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
842 | show ap provisioning-profile
AOS-W 6.2 | Reference Guide
show ap radio-database
show ap radio-database [band a|g] [group <group>] [mode access-point|airmonitor|disabled|ht|ht-40mhz|legacy|sap-monitor] [sort-by ap-group|ap-ip|ap-name|aptype|switch-ip] [sort-direction ascending|descending] [start <start>] [switch <switch-ipaddr>]
Description
Show radio information for Access Points visible to this switch.
Syntax
Parameter band
a g group <group> mode access-point air-monitor disabled ht ht-40mhz legacy sap-monitor sort-by ap-group ap-ip ap-name ap-type switch-ip sort-direction ascending descending
Description Show only APs with a radio operating in the specified band. Show only APs with a radio operating in the 802.11a band (5 GHz). Show only APs with a radio operating in the 802.11g band (2.4 GHz). Show only APs associated with the specified AP group Show only APs with a radio operating in the specified mode. Show only APs operating as access points Show only APs operating as air monitors. Show only disabled APs. Show only high-throughput APs. Show only 40 Mhz high-throughput APs Show only legacy (not high-throughput) APs. Show only APs operating as SAP monitors Sort the output of this command by a specific data column Sort the output of this command by AP group name Sort the output of this command by AP IP address Sort the output of this command by AP name Sort the output of this command by AP model type. Sort the output of this command by switch ip address Select a sort direction for the output of this command Sort the output in ascending order. Sort the output in descending order.
AOS-W 6.2 | Reference Guide
show ap radio-database | 843
Parameter start
switch <switch-ipaddr>
Description
Start displaying the output of this command at a chosen index number by entering the index number of the AP at which command output should start.
Display information for APs associated with a specific switch by entering the IP address of that switch.
Example
The output of the command shows that the AP is aware of five other access points, three of which are active.
(host) #show ap radio-database
AP Radio Database
-----------------
Name
Group AP Type IP Address
Mode/Chan/EIRP/Cli 11a Mode/Chan/EIRP/Cli
----
----- ------- ----------
------------ ----------------------
mp3
default 125
10.3.129.96
/10/0/0
AP(HT)/100/4/0
sw-ad-ap124-11 default 124
10.3.129.99
/10/0/0
AP(HT)/100+/2/0
sw-ad-ap125-13 default 125
10.3.129.98
/10/2.5/0
AP(HT)/100/4/0
sw-ad-ap65-19 default 65
10.3.129.95
Status -----Up 14h:45m:0s Up 14h:43m:18s Up 14h:49m:36s Down
Flags ----M M M
Switch IP --------10.3.129.232 10.3.129.232 10.3.129.232 10.3.129.232
11g ---------AP(HT) AP(HT) AP(HT)
Flags: U = Unprovisioned; N = Duplicate name; G = No such group; L = Unlicensed R = Remote AP; I = Inactive; X = Maintenance Mode; P = PPPoE AP; B = Built-in AP S = RFprotect Sensor; d = Disconnected Sensor; H = Using 802.11n license
M = Mesh node; Y = Mesh Recovery
The output of this command includes the following information:
Column Name Group AP Type IP address Status Flags
Switch IP 11g Mode/Chan/EIRP/Cli
11a Mode/Chan/EIRP/Cli
844 | show ap radio-database
Description
Name of the AP.
AP group to which the AP is associated.
AP model type.
IP address of the AP.
Current AP status. If the AP is currently up, this data column also shows the amount of time for which the AP has been active.
This column displays a letter that corresponds to some type of additional information for the AP. The key to the list of possible flags appears at the bottom of the output of this command.
IP address of the AP's switch.
802.1g radio type and mode/802.11g radio channel used by the AP/current Effective Isotropic Radiated Power (EIRP)/Number of Clients associated with the radio
802.1a radio type and mode/802.11a radio channel used by the AP/current Effective Isotropic Radiated Power (EIRP)/Number of Clients associated with the radio.
AOS-W 6.2 | Reference Guide
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap radio-database | 845
show ap radio-summary
show ap radio-summary {ap-name <ap-name>|dot11a|dot11g||ip-addr <ip-addr>|ip6-addr <ip6-addr>}
Description
Show AP radios registered to this switch.
Syntax
Parameter ap-name <ap-name> dot11a dot11g ip-addr <ip-addr> ip6-addr <ip-addr>
Description Allows you to filter radio information by AP name. Allows you to filter 802.11a radio information. Allows you to filter 802.11g radio information. Allows you to filter radio information by IP address. Allows you to filter radio information by IPv6 address.
Example
The output of the command in the example below displays statistics for the AP's radio, as well as statistics for transmitted and received frames.
In the actual command-line interface, it will appear in a single, long table.
(host) #show ap radio-summary
APs Radios information
----------------------
Name
Group
----
-----
172.17.153-7
172.17.153
172.17.150-5
172.17.150
172.17.153-13 172.17.153
172.17.151-42 172.17.151
172.17.151-34 172.17.151
172.17.155-26 172.17.155
AP Type ------104 104 104 104 104 104
IP Address ---------55.55.57.44 55.55.57.42 55.55.57.35 55.55.57.34 55.55.57.33 55.55.57.22
Band ---2.4 2.4 2.4 2.4 2.4 2.4
Mode ---AP:1 AP:6 AP:6 AP:11 AP:11 AP:1
EIRP/MaxEIRP NF/U/I
TD
------------ ------
--
28/29.5
-96/ 67/ 5 0/0/0/0/0/0
29.5/29.5
-96/ 27/ 3 0/0/0/0/0/0
29.5/29.5
-96/ 31/ 3 0/0/0/0/0/0
25/29.5
-96/ 28/ 6 0/0/0/0/0/0
25/29.5
-96/ 32/ 7 0/0/0/0/0/0
28/29.5
-96/ 70/ 4 0/0/0/0/0/0
TM -33/33/33/32/32/32 12/11/12/12/12/11 13/13/14/14/12/14 10/10/10/9/11/10 10/11/11/10/11/11 27
TC -0/0/0/0/0/0 0/0/0/0/0/0 0/0/0/0/0/0 0/0/0/0/0/0 0/0/0/0/0/0
NF: Noise Floor(dBm); U: Utilization(%); I: Interference(%) TD: Time used by data frames (%); TM: time used by mgnt frames(%); time used by ctrl frames (%) Total Radios:6
The output of this command includes the following information:
846 | show ap radio-summary
AOS-W 6.2 | Reference Guide
Parameter Name Group AP Type IP Address Band Mode
EIRP/Max EIRP NF/U/I TD TM TC
Description Name of the AP. Group to which AP radio is assigned. AP model. Radio IP address. Band on which radio is operating on (2.4 or 5 GHz). Mode on which radio is operating; AP: AP Mode; AM: Air Monitor Mode, Spectrum: Spectrum Monitor Mode. Optionally, you can also specify the channel number. Current EIRP output and maximum EIRP allowed for this radio (dBm). Noise Floor (dBm)/Utilization (%)/Interference (%). Time used by data frames (%). Time used by mgmt frames(%). Time used by ctrl frames (%).
Command History
Introduced in AOS-W6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap radio-summary | 847
show ap regulatory-domain-profile
show ap regulatory-domain-profile [<profile-name>]
Description
Show the list of regulatory domain profiles, or the settings in an individual regulatory domain profile
Syntax
Parameter <profile-name>
Description Show data for a specific regulatory domain profile
Usage Guidelines
Issue this command without the <profile>parameter to display the entire regulatory domain profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has three regulatory domain profiles. The References column lists the number of other profiles with references to the regulatory domain profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column
(host) # show ap regulatory-domain-profile
Regulatory Domain profile List
------------------------------
Name
References
----
----------
corp-channel-profile
8
default
10
channel-test
1.
Profile Status --------------
This example displays the configuration settings for the profile corp-channel-profile. The output of this command shows the profile's country code and the valid channel and channel pairs for that profile.
host) #show ap regulatory-domain-profile corp-channel-profile
Regulatory Domain profile "corp-channel-profile"
------------------------------------------------
Parameter
Value
---------
-----
Country Code
US
Valid 802.11g channel
1
Valid 802.11g channel
6
Valid 802.11a channel
36
Valid 802.11a channel
40
Valid 802.11a channel
44
Valid 802.11a channel
48
Valid 802.11a channel
149
Valid 802.11a channel
153
Valid 802.11g 40MHz channel pair N/A
Valid 802.11a 40MHz channel pair 36-40
Valid 802.11a 40MHz channel pair 44-48
Valid 802.11a 40MHz channel pair 149-153
The output of this command includes the following information:
848 | show ap regulatory-domain-profile
AOS-W 6.2 | Reference Guide
Column Country Code
Valid 802.11g channel
Valid 802.11a channel
Valid 802.11g 40MHz channel pair
Valid 802.11a 40MHz channel pair
Description
Code that represents the country in which the APs will operate. The country code determines the 802.11 wireless transmission spectrum.
Selected 802.11b/g channel available for use by an AP using the specified regulatory domain profile. These channels are limited to those valid for the profile's country code.
Selected 802.11a channel available for use by an AP using the specified regulatory domain profile. These channels are limited to those valid for the country code.
Selected 802.11b/g 40 MHz channel pair available for use by an AP using the specified domain profile. These channels are limited to those valid for the profile's country code.
Selected 802.11a 40 MHz channel pair available for use by an AP using the specified domain profile. These channels are limited to those valid for the profile's country code.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap regulatory-domain-profile | 849
show ap remote counters
show ap remote counters {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>}
Description
Show the numbers of message counters for Remote APs
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description Show data for an AP with a specific name.
Show data for a specific Basic Service Set Identifier (BSSID) on an AP. You must specify an AP's BSSID, which is usually the AP's MAC address
Show data for an AP with a specific IP address.
Examples
Use this command to determine the number of message counters recorded for each counter type seen by the remote AP. The output of the command in the example below shows counters for Remote AP State and VoIP CAC State Announcements.
(host) #show ap remote counters ap-name al22
Counters -------Name ---Remote AP State VoIP CAC State Announcement
Value ----62851 13605
The output of this command includes the following information:
Column Name Value
Description Name of the counter type. Number of counters recorded since the AP was last reset.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
850 | show ap remote counters
AOS-W 6.2 | Reference Guide
show ap remote debug association
show ap remote debug association [ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>]
Description
Show the association table of the AP to identify the clients associated to each AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show client associations for a specific AP name.
Show client associations for an specific AP Basic Service Set Identifier (BSSID). The BSSID is usually the AP's MAC address.
Show client associations for an AP with a specific IP address. Enter the IP address in dotted-decimal format.
Usage Guidelines
Use this command to verify if a remote user is connected to an AP, and to validate the AP to which is connected.
Example
The output of this command displays information about the remote clients associated with an AP with the IP address 192.0.2.32. (host) #show ap remote debug association ip-addr 192.0.2.32
Flags: W: WMM client, A: Active, R: RRM client
PHY Details: HT: High throughput; 20: 20MHz; 40: 40MHz <n>ss: <n> spatial streams
Association Table
-----------------
Name bssid
mac
auth assoc aid l-int essid
---- -----
---
---- ----- --- ----- -----
AP71 00:0a:23:c1:d4:11 00:16:6d:08:1s:f1 y
y
1 10
t-lab
vlan-id tunnel-id phy assoc. time num assoc Flags
------- --------- --- ----------- --------- -----
111
0x108e
a 23s
1
A
Num Clients:1
The output of this command includes the following information:
Column Name bssid mac
Description Name of an AP. The AP Basic Service Set Identifier (BSSID). MAC address of the client.
AOS-W 6.2 | Reference Guide
show ap remote debug association | 851
Column auth assoc aid 1-int essid vlan-id tunnel-id phy
assoc. time num assoc flags
Description
This column displays a y if the AP has been configured for 802.11 authorization frame types. Otherwise, it displays an n.
This column displays a y if the AP has been configured for 802.11 association frame types. Otherwise, it displays an n.
802.11 association ID. A client receives a unique 802.11 association ID when it associates to an AP.
Number of beacons in the 802.11 listen interval. There are ten beacons sent per second, so a ten-beacon listen interval indicates a listen interval time of 1 second.
Name that uniquely identifies the AP's Extended Service Set Identifier (ESSID).
Identification number of the AP's VLAN.
Identification number of the AP's tunnel.
The RF band in which the AP operates: a = 5 GHz b, g = 2.4 GHz
Amount of time the client has associated with the AP, in the format hours:minutes:seconds.
Number of clients associated with the AP.
This column displays any flags for this AP. The list of flag abbreviations is included in the output of the show ap association command.
Command History
Introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
852 | show ap remote debug association
AOS-W 6.2 | Reference Guide
show ap remote debug association
show ap remote debug association [ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>
Description
Show the association table for an AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show AP associations for a specific AP. You can also include the essid, phy or voip-only keywords to further filter the output of this command.
Show the AP associations for an specific AP Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show AP associations for a specific AP by entering an IP address in dotted-decimal format. You can also include the essid, phy or voip-only keywords to further filter the output of this command.
Usage Guidelines
Use this command to check if user is connected to an AP. This command validates whether the client is associated and indicates the last AP to which it was connected. If the flags column shows an 'A', the client is currently associated with that AP. Alternately, if the client is not currently associated, the AP with the smallest value of association time is the last AP used by the client.
Example
Use the show ap association bssid command to verify that a user has associated with an AP, or to determine last AP to which the client was connected. The output of this command in the example below shows the association table for the client with the MAC address 00:13:fd:5c:7c:59. If the flags column in the output of this command shows an 'A', the client associated last to that AP. Alternately, the AP with the smallest value of association time is the last AP to which the client had associated.
In the example below, the output of this command has been broken into two separate tables to better fit this page. In the actual output of the command, this information is shown in a single, wide table.
host) #show ap association bssid 00:13:fd:5c:7c:59
Flags: W: WMM client, A: Active, R: RRM client PHY Details: HT: High throughput; 20: 20MHz; 40: 40MHz
ss: spatial streams
Association Table -----------------
Association Table
-----------------
-----------------
Name bssid
mac
auth assoc aid l-int essid
---- -----
---
---- ----- --- ----- -----
AL12 00:1a:1e:11:5f:11 00:21:5c:50:b1:ed y
y
12 10
ethersphere-wpa2
AL5 00:1a:1e:88:88:31 00:19:7d:d6:74:93 y
y
6 10
ethersphere-wpa2
AOS-W 6.2 | Reference Guide
show ap remote debug association | 853
vlan-id ------65 65
tunnel-id --------0x10c4 0x1072
phy --a-HT-40sgi-2ss a
assoc. time ----------35m:41s 24m:29s
num assoc --------1 1
Flags ----WA WA
The output of this command includes the following information:
Column Name bssid mac auth
assoc
aid
1-int
essid vlan-id tunnel-id assoc. time
num assoc flags
Description
Name of an AP
The AP Basic Service Set Identifier (BSSID)
MAC address of the AP
This column displays a y if the AP has been configured for 802.11 authorization frame types. Otherwise, it displays an n.
This column displays a y if the AP has been configured for 802.11 association frame types. Otherwise, it displays an n.
802.11 association ID. A client receives a unique 802.11 association ID when it associates to an AP.
Number of beacons in the 802.11 listen interval. There are ten beacons sent per second, so a ten-beacon listen interval indicates a listen interval time of 1 second.
Name that uniquely identifies the AP's Extended Service Set Identifier (ESSID).
Identification number of the AP's VLAN.
Identification number of the AP's tunnel.
Amount of time the client has associated with the AP, in the format hours:minutes:seconds.
Number of clients associated with the AP.
This column displays any flags for this AP. The list of flag abbreviations is included in the output of the show ap association command.
Command History
Introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
854 | show ap remote debug association
AOS-W 6.2 | Reference Guide
show ap remote debug bss-config
show ap remote debug bss-config [ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>Description Show the configuration for each BSSID of an AP. This information can be used to troubleshoot problems on an AP.
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr>
Description
Filter the AP Config Table by AP name.
Filter the AP Config Table by IP address by entering an IP address in dotteddecimal format.
Examples
The output of this command shows the AP configuration table for a specific BSSID.
host) #show ap remote debug bss-config ap-name ap93-3
Alcatel-Lucent AP Config Table
---------------------
bss
ess
vlan ip
phy type
status wmm
---
---
---- --
--- ----
---- ---
00:1a:1e:11:24:c2
cera2
enable enable
00:1a:1e:8d:5b:11 wpa2
65 10.6.1.198 a-HT ap
enable enable
00:0b:86:9b:e5:60 guest
63 10.6.14.79 g
ap tunnel
enable enable
00:1a:1e:97:e5:41
voip 66 10.6.1.199 g-HT ap tunnel
enable enable
00:1a:1e:11:74:a1
voip 66 10.6.1.197 g-HT ap tunnel
enable enable
00:1a:1e:11:5f:11
wpa2 65 10.6.1.200 a-HT ap tunnel
enable enable
fw-mode max-cl rates tx-rates preamble mtu
------- ------ ----- -------- -------- ---
66 10.6.1.203 g-HT ap tunnel 64
tunnel 20
0x150 0xff0
-
0
20
0x2 0x3fe
enable 0
20
0xc 0x14c
enable 0
20
0xc 0x14c
enable 0
20
0x150 0xff0
-
0
The output of this command includes the following information:
Column bss ess vlan IP phy
type fw-mode
Description
Basic Service Set (BSS) identifier, which is usually the AP's MAC address.
Extended Service Set (ESS) identifier; a user-defined name for a wireless network.
The BSSID's VLAN number.
The AP's IP address.
One of the following 802.11 types la l a-HT (high-throughput) lg l g-HT (high-throughput)
This column shows if the BSSID is for an access point (ap) or an air monitor (am).
The configured forward mode for the AP's virtual AP profile. l bridge: Bridge locally l split-tunnel: Tunnel to switch or NAT locally
AOS-W 6.2 | Reference Guide
show ap remote debug bss-config | 855
Column
max-cl preamble
MTU status wmm
Description
l tunnel: Tunnel to switch
The maximum number of clients allowed for this BSSID.
Shows if short preambles are enabled for 802.11b/g radios. Network performance may be higher when short preamble is enabled. In mixed radio environments, some 802.11b wireless client stations may experience difficulty associating with the AP using a short preamble.
Maximum Transmission Unit (MTU) size, in bytes. This value describes the greatest amount of data that can be transferred in one physical frame.
Shows if this BSSID is enabled or disabled.
Shows if the BSSID has enabled or disabled WMM, also known as IEEE 802.11e Enhanced Distribution Coordination Function (EDCF) WMM provides prioritization of specific traffic relative to other traffic in the network.
Command History
Introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
856 | show ap remote debug bss-config
AOS-W 6.2 | Reference Guide
show ap remote debug client-mgmt-counters
show ap remote debug client-mgmt-counters
Description
Show the numbers of each type of message from an AP's clients. This information can be used to troubleshoot problems on an AP.
Examples
The output of this command shows client management counters for the specified AP
host)#show ap remote debug client-mgmt-counters ap-name ap120-3
Counters
--------
Name
Value
----
-----
Validate Client
512
AP Stats Update Message
557750
3087
6
Tunnel VLAN Membership
4493
Update STA Tunnel Request
229
Update STA Tunnel Response 229
ARM Update
808921
ARM Propagate
590567
ARM Neighbor Assigned
55396
STM SAP Down
19
AP Message
192
STA On Call Message
12164
STA Message
19750
STA SIP authenticate Message 10919
STA Deauthenticate
707
Stat Update V3
441447
VoIP CAC State Announcement 37185
Remote AP State
371330
AP Message Response
164
assoc-req
4358
assoc-resp
4358
reassoc-req
950
reassoc-resp
950
disassoc
452
deauth
5117
sapcp
351131
The output of this command includes the following information:
Parameter Validate Client AP Stats Update Message 3087 Tunnel VLAN Membership
Description Number of times a client was validated. Number of times an AP updated its statistics with the switch. (For internal use only) (For internal use only)
AOS-W 6.2 | Reference Guide
show ap remote debug client-mgmt-counters | 857
Parameter
Description
Update STA Tunnel Request (For internal use only)
Update STA Tunnel Response
(For internal use only)
ARM Update
Number of times an AP has changed its adaptive radio management (ARM) settings.
ARM Propagate
(For internal use only)
ARM Neighbor Assigned
(For internal use only)
STM SAP Down
(For internal use only)
AP Message
(For internal use only)
STA On Call Message
Number of counters indicating that a station has an active phone call
STA Message
(For internal use only)
STA SIP authenticate Message
Number of messages indicating that a telephone has completed SIP registration and authentication.
STA Deauthenticate
Number of times a station sent a message to an AP to deauthenticate a client.
Stat Update V3
(For internal use only)
VoIP CAC State Announcement
Number of times a switch announces a call admission control (CAC) state change to the AP. Changes in CAC state could include the ability of call admission controls to accept more or fewer calls than previously configured.
Remote AP State
(For internal use only)
AP Message Response
(For internal use only)
assoc-req
Number of 802.11 association request management frames from the switch.
assoc-resp
Number of 802.11 association responses to the switch.
reassoc-req
Number of 802.11 reassociation requests to the switch.
reassoc-resp
Number of 802.11 reassociation responses from the switch.
disassoc
Number of 802.11 disassociation messages to the switch.
deauth
Number of 802.11 deauthorization messages from the switch.
sapcp
(For internal use only)
Command History
Introduced in AOS-W 5.0.
858 | show ap remote debug client-mgmtcounters
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap remote debug client-mgmt-counters | 859
show ap remote debug flash-config
show ap remote debug flash-config {ap-name <ap-name>|bssid <bssid>|ip-addr <ip-addr>} acls| {vap <vap>|vaps
Description
Show the remote AP configuration stored in flash memory.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
acls vap <vap>
vaps
Description
Show debugging data for an AP with a specific name.
Show data for a specific Basic Service Set Identifier (BSSID) on an AP. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show data for an AP with a specific IP address by entering its IP address in dotted-decimal format.
Display ACLs of offline Virtual APs (VAPs).
Display the configuration of a specific offline VAP by entering the name of an VAP.
Display the current number of offline VAPs.
Example
The output of this command can be used to debug problems with a remote AP. The command below shows statistics for an AP with the IP address 192.0.2.64.
(host) #show ap remote debug flash-config ip-addr 192.0.2.64 acls
Offline ACLs
------------
Item
Value
----
-----
Native VLAN
1
DHCP VLAN
N/A
DHCP ADDR
DHCP POOL NETMASK
DHCP POOL START
192.168.11.2
DHCP POOL END
192.168.11.254
DHCP DNS SERVER 0.0.0.0
DHCP ROUTER
192.168.11.1
DHCP DNS DOMAIN mycompany
DHCP LEASE
0
Session ACL
N/A
Session ACL Name N/A
Session ACL Count N/A
Session Aces
N/A
ACL 1
1
ACL 1 Name
logon
ACL 1 Count
21
Aces 1
16 1 4294
...
192.168.11.1
The output of this command includes the following information:
860 | show ap remote debug flash-config
AOS-W 6.2 | Reference Guide
Column Native VLAN DHCP VLAN
DHCP ADDR DHCP POOL NETMASK
Description VLAN ID of the native VLAN. VLAN ID of Remote AP DHCP server used when the switch is unreachable. IP Address used as DHCP Server Identifier. Netmask of the DHCP server pool.
DHCP POOL START
DHCP POOL END
DHCP DNS SERVER DHCP ROUTER DHCP DNS DOMAIN DHCP LEASE
Session ACL Session ACL name Session ACL count Session Aces ACL 1 ACL1 Name ACL1 Count ACL1 Aces
IP Address used as the start of a range of addresses for a DHCP pool. IP Address used as the end of a range of addresses for a DHCP pool. IP Address for the DHCP DNS server. IP Address for the DHCP default router. Domain name for the DHCP DNS server. Length of DHCP DNS leases in days. If this parameter displays a zero (0) the DHCP lease is has no defined end. Name of the ACL applied to the user session. Name of the ACL applied to the user session. Number of rules in the applied to the user session. A list of the individual rules in the session ACL. This parameter shows the position of an individual ACL. Name of the ACL in the first position. Number of rules in the specified ACL. A list of the individual rules in the specified ACL.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap remote debug flash-config | 861
show ap remote debug mgmt-frames
show ap remote debug mgmt-frames {ap-name <ap-name>}|{bssid <bssid>|{ip-addr <ip-addr>} [client-mac <client-mac>] [count <count>]
Description
Show traced 802.11 management frames for a remote AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid> ip-addr client-mac count <count>
Description
Show debugging information for a specific AP.
Show debugging information for a specific Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address
Show debugging information for an AP with a specific IP address by entering its IP address in dotted-decimal format.
Show the AP associations for a specific MAC address by entering the MAC address of the client.
Limit the amount of information displayed by specifying number of frames to appear in the output of this command.
Examples
Use this command to debug 802,1 authentication on a remote AP. The example below shows that a client successfully associated with the remote AP, then was later deauthenticated. (host) #show ap remote debug mgmt-frames ap-name AP32
Traced 802.11 Management Frames
-------------------------------
Timestamp
stype
SA
DA
BSS
signal Misc
---------
-----
--
--
---
------ ----
Oct 30 11:20:19 deauth
00:23:6c:2f:9a:85 00:1a:1e:11:56:40
STA has left and is deauthenticated
Oct 30 11:04:39 assoc-resp
00:1a:1e:11:56:40
00:23:6c:2f:9a:85 00:1a:1e:11:56:40 15
Success
Oct 30 11:04:39 assoc-req 00:23:6c:2f:9a:85 00:1a:1e:11:56:40 00:1a:1e:11:56:40 0
-
The output of this command includes the following information:
Column Timestamp stype
Description
The time the management frame was sent
One of the following 802.11 frame types: auth: Authorization frame deauth: Deauthorization frame assoc-resp: Association response
862 | show ap remote debug mgmt-frames
AOS-W 6.2 | Reference Guide
Column
SA DA BSS signal
Misc
Description
assoc-req: Association request
Source MAC address.
Destination MAC address.
Basic Service Set Identifier (BSSID) of the AP
Signal strength as a signal to noise ratio. For example, a value of 30 would indicate that the power of the received signal is 30 dBm above the signal noise threshold.
Additional information describing the client's action. In the case of deauthentication, a reason associated with the event will be displayed in this column.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap remote debug mgmt-frames | 863
show ap remote debug r1_key
show ap remote debug r1_key [ap-name <ap-name> | bssid <bssid> | ip-addr <ip-addr>]
Description
This command displays all the r1 keys that are stored in an AP.
Syntax
Parameter ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description
Show debugging information for a specific AP.
Show debugging information for a specific Basic Service Set Identifier (BSSID). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address
Show debugging information for an AP with a specific IP address by entering its IP address in dotted-decimal format.
Examples
Use this command to view all the r1 keys that are stored in an AP. You can filter the output based on the AP name, BSSID, or IP address. (host) #show ap remote debug r1_key ap-name MAcage-105-GL
Stored R1 Keys
--------------
Station MAC
Mobility Domain ID Validity Duration R1 Key
-----------
------------------ ----------------- ------
00:50:43:21:01:b8 1
3568
(32): 94 ff 18 0a 5f 47 8b 3e 95 2b
93 31 bd 44 58 fe fe 6a ad aa 1d d7 29 94 fb 5b 7c 15 76 66 d2 1f
Command History
Introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
864 | show ap remote debug r1_key
AOS-W 6.2 | Reference Guide
show ap spectrum ap-list
show ap spectrum ap-list {ap-name <ap-name>}|{ip-addr <ip-addr>} ap-bssid <bssid> channel <channel> essid <essid> limit <number> or page <number> freq-band 2.4ghz|5ghz sort <sort> start <index>
Description
This command shows spectrum data seen by an access point that has been converted to a spectrum monitor.
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr>
channel <channel> essid <essid> limit <number> or
page <number>
freq-band 2.4ghz|5ghz sort <sort> start <index>
Description
Name of the spectrum monitor for which you want to view spectrum information.
IP address of the spectrum monitor for which you want to view spectrum information.
View spectrum information for a specific radio channel.
View spectrum information for a specific ESSID.
Limit the displayed output to the specified number of entries
Use this parameter to display information that meets either of two criteria, such as a specified ESSID or channel.
Enter a number from 10-100 (inclusive) to specify the number of entries that should appear in each page of the output for this command. For example, if the output of this command has 100 entries and you select a page value of 20, the output will appear in 5 pages each with 20 entries. If you selected a page value of 10, the output would appear in 10 pages with 10 entries.
View information for a specific radio type, either 2.4 GHz or 5 Ghz.
Sort the output by the specified data column
Start displaying the output at specific spectrum index value.
Usage Guidelines
The Spectrum Analysis feature provides visibility into RF coverage, allowing you to troubleshoot RF interference and identify 802.11 devices on the network. Issue this command to display and sort APs seen by a specific spectrum monitor.
AOS-W 6.2 | Reference Guide
show ap spectrum ap-list | 865
Examples
The output of this example shows spectrum data seen by spectrum monitor ap123. The output in the example below has been divided into two tables to better fit this document. In the AOS-W CLI, the output appears as a single, long table.
(host)# show ap spectrum ap-list ap-name ap123
Spectrum AP Table ----------------bssid ----00:0b:86:cd:22:d0 00:0b:86:cb:cf:30 00:0b:86:f6:f6:a0 00:0b:86:f6:f6:a1 00:0b:86:f6:f6:a2
essid ----ECSD Wireless ECSD Wireless osuwireless osuvoice osuguest
spectrum-id ----------2 3 3 4 5
chan ---161 157 1 1 1
phy-type -------80211a 80211a 80211b/g 80211b/g 80211b/g
signal(dBm) --------------62 68 48 47 45
avg-rssi(dB) curr-rssi(dB) ibss
--------
---------
----
29
31
no
24
25
no
37
38
no
38
38
no
37
40
no
add-time -------2010-05-16 17:41:36 2010-05-16 17:41:36 2010-05-16 17:41:36 2010-05-16 17:41:36 2010-05-16 17:41:36
last-seen ----------2010-05-18 13:39:38 2010-05-18 14:19:03 2010-05-18 15:06:02 2010-05-18 15:04:23 2010-05-18 15:07:32
The output of this command includes the following information:
Column bssid essid spectrum-id chan freq-band
signal (dBm) avg-rssi curr-rssi ibss
add-time last-seen
Description Basic Service Set Identifier for an AP. This is usually the AP's MAC address. Extended service set identifier that names a wireless network. Identifier assigned to the device by the spectrum monitor Radio channel used by the BSSID Radio phy type. Possible types include: l 2.4 GHz l 5 GHz Strength of the signal received by the device, in dBm. The average signal-to-noise ratio seen by the AP. Most recent signal-to-noise ratio seen by the AP. Shows if ad-hoc BSS is enabled or disabled. It will be enabled if the bssid has detected an ad-hoc BSS (an ibss bit in an 802.11 frame). Time when the AP was first detected by the spectrum monitor. Time when the AP was last seen by the spectrum monitor.
866 | show ap spectrum ap-list
AOS-W 6.2 | Reference Guide
Related Commands
Command ap spectrum local-override
rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show ap spectrum ap-list | 867
show ap spectrum channel-metrics
show ap spectrum channel-metrics {ap-name <ap-name>}|{ip-addr <ip-addr>} freq-band 2.4ghz|5ghz
Description
This command shows channel quality, availability and utilization metrics as seen by a spectrum monitor.
Syntax
Parameter ap-name <ap-name>
ip-addr <ip-addr>
freq-band 2.4ghz|5ghz
Description Name of the spectrum monitor for which you want to view spectrum information. IP address of the spectrum monitor. View information for a specific radio type, either 2.4 GHz or 5 GHz.
Usage Guideline
This chart displays channel utilization data, showing the percentage of each channel that is currently being used by Wi-Fi devices, and the percentage of each channel being used by non-Wi-Fi devices and 802.11 adjacent channel interference (ACI).
ACI refers to the interference on a channel created by a transmitter operating in an adjacent channel. A transmitter on a nonadjacent or partially overlapping channel may also cause interference, depending on the transmit power of the interfering transmitter and/or the distance between the devices. In general, ACI may be caused by a Wi-Fi transmitter or a non-Wi-Fi interferer. However, whenever the term ACI appears in Spectrum Analysis graphs, it refers to the ACI caused by Wi-Fi transmitters. The channel utilization option in the Channel Metrics Chart shows the percentage of the channel utilization due to both ACI and non-Wi-Fi interfering devices. Unlike the ACI shown in the show ap spectrum interference-power output, the ACI shown in this graph indicates the percentage of channel time that is occupied by ACI or unavailable for Wi-Fi communication due to ACI.
The Channel Metrics table can also show channel availability, the percentage of each channel that is available for use, or display the current relative quality of selected channels in the 2.4 GHz or 5 GHz radio bands. In the spectrum analysis feature, channel quality is a relative measure that indicates the ability of the channel to support reliable WiFi communication. Channel quality, which is represented as a percentage in this chart, is a weighted metric derived from key parameters that can affect the communication quality of a wireless channel, including noise, non-Wi-Fi (interferer) utilization and duty-cycles, and certain types of retries. Note that channel quality is not directly related to Wi-Fi channel utilization, as a higher quality channel may or may not be highly utilized.
A hybrid AP on a 20 MHz channel will see 40 MHz Wi-Fi data as non-Wi-Fi data.
Examples
The output of this example shows part of the channel metrics table for channels seen by the spectrum monitor ap123. (host)# show ap spectrum channel-metrics ap-name ap123 freq-band 2.4GHz
Channel Metrics Table
868 | show ap spectrum channel-metrics
AOS-W 6.2 | Reference Guide
---------------------
Channel Quality(%) Availability(%)
------- ---------- ---------------
1
97
57
2
80
58
3
63
58
4
71
57
5
88
54
6
98
51
7
88
54
8
69
56
9
60
57
10
30
29
11
0
0
12
25
50
13
50
99
14
99
99
1+/5- 63
54
2+/6- 63
51
3+/7- 63
51
4+/8- 69
51
5+/9- 60
51
6+/10- 30
29
7+/11- 0
0
Utilization(%) -------------43 42 42 43 46 49 46 44 43 71 100 50 1 1 46 49 49 49 49 71 100
WiFi Util(%) -----------40 22 5 16 36 47 35 14 3 1 0 0 0 0 36 47 47 47 47 1 0
Interference Util(%) -------------------3 20 37 27 10 2 11 30 40 70 100 50 1 1 10 2 2 2 2 70 100
The output of this command includes the following information:
Column
Description
channel
An 802.11a or 82.11g radio channel.
Quality(%)
Current relative quality of selected channels in the 802.11a or 802.11g radio bands, as determined by the percentage of packet retries, the current noise floor, and the duty cycle for non-Wi-Fi devices on that channel.
Availability(%) The percentage of the channel currently available for use.
Utilization(%) The percentage of the channel being used.
WiFi Util(%)
The percentage of the channel currently being used by wifi devices.
Interference Util(%)
The percentage of the channel currently being used by non-Wi-Fi interference + wifi ACI (Adjacent Channel Interference)
Related Commands
Command
Description
Mode
ap spectrum local-override
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Config mode on master or local switches
rf dot11a-radio-profilemodespectrummode
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show ap spectrum channel-metrics | 869
Command
Description
rf dot11g-radio-profilemodespectrummode
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
rf dot11a-radio-profilemodespectrummode
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
rf dot11g-radio-profilemodespectrummode
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
870 | show ap spectrum channel-metrics
AOS-W 6.2 | Reference Guide
show ap spectrum channel-summary
show ap spectrum channel-summary {ap-name <ap-name>}|{ip-addr <ip-addr>} freq-band 2.4ghz|5ghz
Description
This command displays a summary of the 802.11a or 802.11g channels seen by a spectrum monitor.
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr>
freq-band 2.4ghz|5ghz
Description Name of the spectrum monitor for which you want to view spectrum information.
IP address of the spectrum monitor for which you want to view spectrum information.
View information for a specific radio type, either 2.4 GHz or 5 GHz.
Usage Guidelines
This table can display data aggregate data for each channel seen by the spectrum monitor radio, including the maximum AP power, interference and the signal-to-noise-and-interference Ratio (SNIR). SNIR is the ratio of signal strength to the combined levels of interference and noise on that channel. This value is calculated by determining the maximum noise-floor and interference-signal levels, and then calculating how strong the desired signal is above this maximum.
A hybrid AP on a 20 MHz channel will see 40 MHz Wi-Fi data as non-Wi-Fi data.
Examples
The output of the example below shows information for 802.11a radio channels seen by the spectrum monitor ap999. (host)# show ap spectrum channel-summary ap-name ap999 freq-band 5ghz
Channel Summary Table
---------------------
Channel KnownAPs UnknownAPs
------- -------- ----------
149
69
0
153
20
0
157
56
0
161
54
0
165
32
0
149+
69
0
157+
20
0
Util(%) ------5 100 6 4 3 100 6
MaxAPSignal(dBm) ----------------39 -42 -53 -43 -27 -39 -43
MaxInterference(dBm) --------------------69 -60 -59 -71 -70 -60 -59
SNIR(dB) ------30 18 6 28 43 21 16
The output of this command includes the following information:
AOS-W 6.2 | Reference Guide
show ap spectrum channel-summary | 871
Column Channel Known APs UnKnown APs Channel Util (%) Max AP Signal (dBm) Max Interference (dBm) SNIR (db)
Description An 802.11a or 802.11g radio channel. Number of valid APs identified on the radio channel. Number of invalid or rogue APs identified on the radio channel. Percentage of the channel currently in use. Signal strength of the AP that has the maximum signal strength on a channel.
Signal strength of the non-Wi-Fi device that has the highest signal strength.
The ratio of signal strength to the combined levels of interference and noise on that channel. This value is calculated by determining the maximum noise-floor and interference-signal levels, and then calculating how strong the desired signal is above this maximum.
Related Commands
Command ap spectrum local-override
rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
872 | show ap spectrum channel-summary
AOS-W 6.2 | Reference Guide
show ap spectrum client-list
show ap spectrum client-list {ap-name <ap-name>}|{ip-addr <ip-addr>} ap-bssid <bssid> channel <channel> essid <essid> limit <limit> mac <mac-addr> or page <page> freq-band 2.4ghz|5ghz start <start>
Description
This command shows details for clients seen by a specified spectrum monitor.
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr>
ap-bssid <bssid> channel <channel> essid <essid> limit <limit> mac <mac-addr> start <start>
limit <number> or
page <number>
freq-band 2.4ghz|5ghz
Description
Name of the spectrum monitor for which you want to view spectrum information.
IP address of the spectrum monitor for which you want to view spectrum information.
View information for a client with a specific BSSID.
view information for clients on a specific radio channel.
View information for clients using a specific ESSID.
Limit the output of this command to the specified number of clients.
View information for a client with a specific MAC address.
Limit the output of this command to clients that with the specified index number or lower.
Limit the displayed output to the specified number of entries
Use this parameter to display information that meets either or two criteria, such as a specified ESSID or channel.
Enter a number from 10-100 (inclusive) to specify the number of entries that should appear in each page of the output for this command. For example, if the output of this command has 100 entries and you select a page value of 20, the output will appear in 5 pages each with 20 entries. If you selected a page value of 10, the output would appear in 10 pages with 10 entries.
View information for a specific radio type, either 2.4 GHz or 5 GHz.
Usage Guidelines
Use this command to view channel and signal information for wireless clients seen by the spectrum monitor.
AOS-W 6.2 | Reference Guide
show ap spectrum client-list | 873
Examples
The example shows that the spectrum monitor ap999 sees eight different clients on channel 149. The output in the example below has been divided into two tables to better fit this document. In the AOS-W CLI, the output appears as a single, long table.
(host)# show ap spectrum client-list ap-name ap999 channel 149
Spectrum Client Table
---------------------
mac
bssid
---
-----
00:14:a4:d1:34:63 00:24:6c:80:48:79
00:19:7d:3a:96:d9 00:24:6c:80:7b:c9
00:16:cf:af:3e:e1 00:24:6c:80:48:79
00:1c:26:5b:a7:ac 00:24:6c:81:8b:19
00:21:6b:c6:b2:12 00:24:6c:80:48:79
00:21:6a:9c:0e:36 00:24:6c:81:8b:19
00:21:6a:51:e4:30 00:1a:1e:87:c1:91
00:24:d6:65:a9:e6 00:24:6c:80:48:7a
essid ----ethersphere-wpa2 ethersphere-wpa2 ethersphere-wpa2 ethersphere-wpa2 ethersphere-wpa2 ethersphere-wpa2 ethersphere-wpa2 ethersphere-voip
spectrum-id ----------14 198 80 125 118 121 164 222
channel ------149 149 149 149 149 149 149 149
phy-type -------80211a 80211a 80211a 80211a 80211a-HT-40 80211a 80211a-HT-40 80211a-HT-40
signal(dBm) ---------------71 -66 -74 -79 -66 -72 -63 -69
add-time
last-seen
--------
-----------
2010-05-17 09:53:47 2010-05-17 12:36:54
2010-05-17 12:01:01 2010-05-17 12:36:42
2010-05-17 09:54:59 2010-05-17 12:35:55
2010-05-17 10:23:29 2010-05-17 12:37:28
2010-05-17 10:17:05 2010-05-17 12:31:58
2010-05-17 10:20:05 2010-05-17 12:37:30
2010-05-17 11:07:21 2010-05-17 12:29:01
2010-05-17 12:37:25 2010-05-17 12:37:25
start:0 Length:8 Total:8
The output of this command includes the following information:
Column mac bssid
essid spectrum-id chan phy-type
Description
MAC address of the client.
Basic Service Set Identifier for a client. This is usually the device's MAC address.
Extended service set identifier that names a wireless network.
Identifier assigned to the client by the spectrum monitor.
Radio channel used by the BSSID
Radio phy type. Possible types include: l 802.11a l 802.11a-HT-40 l 802.11b/g l 802.11b/g-HT-20
874 | show ap spectrum client-list
AOS-W 6.2 | Reference Guide
Column signal(dBm) add-time last-seen
Description Client signal strength, in dBm. Time when the client was first detected by the spectrum monitor. Time when the spectrum monitor last detected that the client was active.
Related Commands
Command ap spectrum local-override
rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show ap spectrum client-list | 875
show ap spectrum debug
show ap spectrum debug {channel-info|channel-quality|classify|classify-fft|devicedetails|device-info|devices-seen} {ap-name <ap-name>}|{ip-addr <ip-addr>} freq-band {2.4ghz|5ghz}
Description
This command saves spectrum analysis channel information to a file on the spectrum monitor.
Syntax
Parameter channel-info channel-quality classify classify-fft device-details device-info devices-seen ap-name <ap-name>
ip-addr <ip-addr>
freq-band 2.4ghz|5ghz
Description Save channel information for later analysis. Save channel quality information for later analysis Save information on classification for later analysis. Save information on classification and FFT data for later analysis. Save device details for later analysis. Save device information for later analysis. Save information on devices seen by the spectrum monitor. Name of the spectrum monitor for which you want to view spectrum information. IP address of the spectrum monitor for which you want to view spectrum information. Save information for a specific radio type, either 2.4 GHz or 5 GHz.
Usage Guidelines
Use this command under the supervision of your Alcatel-Lucent technical support representative to troubleshoot spectrum analysis issues or errors.
Related Commands
Command ap spectrum local-override
rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
876 | show ap spectrum debug
AOS-W 6.2 | Reference Guide
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show ap spectrum debug | 877
show ap spectrum debug fft
show ap spectrum debug fft {ap-name <ap-name>}|{ip-addr <ip-addr>} freq-band {2.4ghz|5ghz} avg duty-cycle fft-to-controller max normalized raw raw-normalized
Description
Save FFT (Fast Fourier Transform) power data to a file on the spectrum monitor.
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr> freq-band 2.4ghz|5ghz avg duty-cycle fft-to-controller max
normalized raw raw-normalized
Description Name of the spectrum monitor for which you want to view spectrum information. IP address of the spectrum monitor. Save information for a specific radio type, either 2.4 GHz or 5 GHz.
Save FFT average information. Save FFT duty-cycle data Save the FFT max, average and duty-cycle data Save the maximum FFT power measured for all samples taken over the last second. Save normalized FFT information Save the raw FFT information received from driver Save FFT information received from driver and its normalized FFT
Usage Guidelines
Use this command under the guidance of an Alcatel-Lucent technical support representative to troubleshoot FFT power issues seen on AP models AP-104, AP-92, AP-93, AP-93H, AP-175 and the AP-130 Series.
Related Commands
Command ap spectrum local-override
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Mode
Config mode on master or local switches
878 | show ap spectrum debug fft
AOS-W 6.2 | Reference Guide
Command rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing
Command Mode
Base operating system Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show ap spectrum debug fft | 879
show ap spectrum debug monitors
show ap spectrum debug monitors
Description
Show a detailed description of all spectrum monitors on the switch.
Syntax
No parameters
Examples
The output of this command shows a list of available spectrum monitor or hybrid AP devices, a list of spectrum devices currently subscribed to a spectrum client, message counters for subscribed spectrum devices and the subscription history.
(host)# show ap spectrum debug monitors
List of Available Sensors
-----------------------------------
AP name Phy Band
------- --- ----
ap999 G 2GHz
ap999 A 5GHz
Total: 2
List of Subscriptions
---------------------
AP name Band
Client IP
Subscribe Time
HTTPD pid Last Data Sent Send
Failed
------- ----
---------
--------------
--------- -------------- -------
----
ap123 2GHz
10.100.100.67 2010-05-18 03:49:44 PM 1711
1s
0
ap123 5GHz
10.100.100.67 2010-05-18 03:49:51 PM 1711
1s
0
Num Subscriptions: 2
Current Time: 2010-05-18 03:49:54 PM
Message Counters
----------------
AP name Band
FFT Data FFT Duty Cycle Device Info Device Details Devices Seen
Channel Info
------- ----
-------- -------------- ----------- -------------- ------------ ----
--------
ap123 2GHz
4
4
1
194
1
1
ap123 5GHz
0
0
0
0
0
0
Subscription History
--------------------
Message
AP/Radio/Band
Client IP
HTTPD Timestamp
Result
pid
-------
-------------
---------
------ ---------
------
Subscribe
"ap123"/1/2GHz
10.240.16.165 1701 2010-05-17 01:29:16 PM Success
Re-subscribe
"ap123"/0/5GHz
10.240.16.165 1700 2010-05-17 01:29:16 PM Success
Unsubscribe-All "ap123"/-/-
10.240.16.165 1701 2010-05-17 02:44:18 PM Client
Not found
Subscribe
"ap123"/1/2GHz
10.100.100.67 1716 2010-05-18 03:44:28 PM Success
880 | show ap spectrum debug monitors
AOS-W 6.2 | Reference Guide
Usage Guidelines
Use this command under the guidance of an Alcatel-Lucent technical support representative to troubleshoot spectrum analysis errors.
Related Commands
Command ap spectrum local-override
rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show ap spectrum debug monitors | 881
show ap spectrum debug status
show ap spectrum debug status {ap-name <ap-name>}|{ip-addr <ip-addr>} freq-band 2.4ghz|5ghz
Description
This command shows detailed status and statistics for a spectrum monitor or hybrid AP.
Syntax
Parameter ap-name <ap-name>
ip-addr <ip-addr>
freq-band 2.4ghz|5ghz
Description Name of the spectrum device for which you want to view status information. IP address of the spectrum device for which you want to view status information. View information for a specific radio type, either 2.4 GHz or 5 GHz.
Usage Guidelines
Use this command under the guidance of an Alcatel-Lucent technical support representative to troubleshoot spectrum analysis errors.
Related Commands
Command ap spectrum local-override
rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
882 | show ap spectrum debug status
AOS-W 6.2 | Reference Guide
show ap spectrum device-duty-cycle
show ap spectrum device-duty-cycle {ap-name <ap-name>}|{ip-addr <ip-addr>} freq-band 2.4ghz|5ghz
Description
Shows the current duty cycle for devices on all channels being monitored by the spectrum monitor or hybrid AP radio.
Syntax
Parameter
Description
ap-name <ap-name>
Name of the spectrum device for which you want to view spectrum information.
ip-addr <ip-addr>
IP address of the spectrum device for which you want to view spectrum information.
freq-band 2.4ghz|5ghz View information for a specific radio type, either 2.4 GHz or 5 GHz.
Usage Guidelines
The FFT Duty Cycle table in the output of this command shows the duty cycle for each radio channel. The duty cycle is the percentage of time each device type operates or transmits on that channel. For additional details about non-WiFi device types shown in this table, see Non-Wi-Fi Interferers on page 886.
This chart is not available for OAW-AP120 Series or OAW-AP68 or OAW-RAP5 access points. A hybrid AP on a 20 MHz channel will see 40 MHz Wi-Fi data as non-Wi-Fi data.
Examples
The output of this command shows that video devices sent a signal on channels 153 and 157 during 99% of the last sample interval.
Device Duty Cycle Table (in %)
------------------------------
Device Type
149 153 157 161 165 149+ 157+
-----------
--- --- --- --- --- ---- ----
Generic Interferer 0 0 0 0 0 0
0
WIFI
5 0 5 12 8 0
12
Microwave
000000
0
Bluetooth
000000
0
Generic Fixed Freq 0 0 0 0 0 0
0
Cordless Phone FF 0 0 0 0 0 0
0
Video
0 99 99 0 0 0
0
Audio
000000
0
Generic Freq Hopper 0 0 0 0 0 0
0
Cordless Network FH 0 0 0 0 0 0
0
Xbox
000000
0
Microwave Inverter 0 0 0 0 0 0
0
Cordless Base FH
555550
0
Total:7
AOS-W 6.2 | Reference Guide
show ap spectrum device-duty-cycle | 883
Related Commands
Command ap spectrum local-override
rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
884 | show ap spectrum device-duty-cycle
AOS-W 6.2 | Reference Guide
show ap spectrum device-history
show ap spectrum device-history {ap-name <ap-name>}|{ip-addr <ip-addr>} freq-band 2.4ghz|5ghz [type audio-ff|bluetooth|cordless-base-fh|cordless-network-fh|cordless-phone-ff|genericff|generic-fh|generic-interferer|microwave|microwave-inverter|video|xbox]
Description
This command shows the history of the last 256 non-Wi-Fi devices.
Syntax
Parameter
Description
ap-name <ap-name>
Name of the spectrum monitor or hybrid AP for which you want to view spectrum information.
ip-addr <ip-addr>
IP address of the spectrum monitor or hybrid AP for which you want to view spectrum information.
freq-band 2.4ghz|5ghz View information for a specific radio type, either 2.4 GHz or 5 GHz.
type
Show information for one type of device only by specifying a non-Wi-Fi device.
audio-ff
View information for audio devices seen by the spectrum device.
bluetooth
View information for bluetooth devices seen by the spectrum device. NOTE: This option is available only for 2.4 GHz spectrum devices.
cordless-base-fh
View information for frequency-hopping cordless phone bases seen by the spectrum device.
cordless-phone-ff
View information for frequency-hopping cordless phones seen by the spectrum device.
cordless-networkfh
View information for frequency-hopping cordless network devices seen by the spectrum device.
generic-ff
View information for generic fixed-frequency devices seen by the spectrum device.
generic-fh
View information for generic frequency-hopping devices seen by the spectrum device.
generic-interferer Show only generic interfering devices.
microwave
View information for microwave-emitting devices seen by the spectrum device. NOTE: This option is available only for 2.4 GHz spectrum devices.
microwave-inverter View information for inverter microwave devices seen by the spectrum device. NOTE: This option is available only for 2.4 GHz spectrum devices.
video
View information for video devices seen by the spectrum device.
xbox
View information for Xbox devices seen by the spectrum device. NOTE: This option is available only for 2.4 GHz spectrum devices.
AOS-W 6.2 | Reference Guide
show ap spectrum device-history | 885
Usage Guidelines
Use this command to view channel, signal and duty-cycle information and add/delete times for the last 256 devices seen by a spectrum monitor or hybrid AP.
Non-Wi-Fi Interferers
The following table describes each type of of non-Wi-Fi interferer detected by a spectrum monitor or hybrid AP. Note also that a hybrid AP on a 20 MHz channel will see 40 MHz Wi-Fi data as non-Wi-Fi data.
Non-Wi-Fi Interferer Type
Description
Bluetooth
Any device that uses the Bluetooth protocol to communicate in the 2.4 GHz band is classified as a Bluetooth device. Bluetooth uses a frequency hopping protocol.
Fixed Frequency (Audio)
Some audio devices such as wireless speakers and microphones also use fixed frequency to continuously transmit audio. These devices are classified as Fixed Frequency (Audio).
Fixed Frequency (Cordless Phones)
Some cordless phones use a fixed frequency to transmit data (much like the fixed frequency video devices). These devices are classified as Fixed Frequency (Cordless Phones).
Fixed Frequency (Video)
Video transmitters that continuously transmit video on a single frequency are classified as Fixed Frequency (Video). These devices typically have close to a 100% duty cycle. These types of devices may be used for video surveillance, TV or other video distribution, and similar applications.
Fixed Frequency (Other)
All other fixed frequency devices that do not fall into one of the above categories are classified as Fixed Frequency (Other). Note that the RF signatures of the fixed frequency audio, video and cordless phone devices are very similar and that some of these devices may be occasionally classified as Fixed Frequency (Other).
Frequency
Frequency hopping cordless phone base units transmit periodic beacon-like frames at all
Hopper
times. When the handsets are not transmitting (i.e., no active phone calls), the cordless base
(Cordless Base) is classified as Frequency Hopper (Cordless Base).
Frequency Hopper (Cordless Network)
When there is an active phone call and one or more handsets are part of the phone conversation, the device is classified as Frequency Hopper (Cordless Network). Cordless phones may operate in 2.4 GHz or 5 GHz bands. Some phones use both 2.4 GHz and 5 GHz bands (for example, 5 GHz for Base-to-handset and 2.4 GHz for Handset-to-base). These phones may be classified as unique Frequency Hopper devices on both bands.
Frequency Hopper (Xbox)
The Microsoft Xbox device uses a frequency hopping protocol in the 2.4 GHz band. These devices are classified as Frequency Hopper (Xbox).
Frequency Hopper (Other)
When the classifier detects a frequency hopper that does not fall into one of the above categories, it is classified as Frequency Hopper (Other). Some examples include IEEE 802.11 FHSS devices, game consoles and cordless/hands-free devices that do not use one of the known cordless phone protocols.
Microwave
Common residential microwave ovens with a single magnetron are classified as a Microwave. These types of microwave ovens may be used in cafeterias, break rooms, dormitories and similar environments. Some industrial, healthcare or manufacturing environments may also have other equipment that behave like a microwave and may also be classified as a Microwave device.
886 | show ap spectrum device-history
AOS-W 6.2 | Reference Guide
Non-Wi-Fi Interferer Type Microwave (Inverter)
Generic Interferer
Description
Some newer-model microwave ovens have the inverter technology to control the power output and these microwave ovens may have a duty cycle close to 100%. These microwave ovens are classified as Microwave (Inverter). Dual-magnetron industrial microwave ovens with higher duty cycle may also be classified as Microwave (Inverter). As in the Microwave category described above, there may be other equipment that behave like inverter microwaves in some industrial, healthcare or manufacturing environments. Those devices may also be classified as Microwave (Inverter).
Any non-frequency hopping device that does not fall into one of the other categories described in this table is classified as a Generic Interferer. For example a Microwave-like device that does not operate in the known operating frequencies used by the Microwave ovens may be classified as a Generic Interferer. Similarly wide-band interfering devices may be classified as Generic Interferers.
Example
The output of this example shows details for fixed-frequency video devices seen by a spectrum monitor or hybrid AP radio. host)# show ap spectrum device-history ap-name ap123 freq-band 5ghz type video
Non-Wifi Device History Table
-----------------------------
Type ID Cfreq(Khz) Bandwidth(KHz) Channels-affected
---- -- -----
---------
-----------------
Add-time
Delete-time
--------
-----------
Video 1 5745312 6000
149
2010-05-16 20:07:08 -
Video 2 5745312 6000
149
2010-05-16 20:07:39 2010-05-17 16:50:24
Video 3 5745312 6000
149
2010-05-16 20:20:25 2010-05-16 20:20:36
Video 4 5745312 6000
149
2010-05-16 20:32:44 2010-05-16 20:33:07
Video 5 5742031 6000
149
2010-05-16 20:33:43 2010-05-16 20:33:53
Video 6 5745312 6000
149
2010-05-16 20:34:08 2010-05-16 20:34:20
Signal-strength ---------------
76 75 74 76 79 75
Duty-cycle ----------
99 99 99 99 99 99
The output of this command includes the following information:
Column Type
Description
Device type. This parameter can be any of the following: l audio FF (fixed frequency) l bluetooth l cordless base FH (frequency hopper) l cordless phone FF (fixed frequency l cordless network FH (frequency hopper) l generic FF (fixed frequency l generic FH (frequency hopper) l generic interferer
AOS-W 6.2 | Reference Guide
show ap spectrum device-history | 887
Column
ID Cfreq Bandwidth Channelsaffected Signal-strength Duty-cycle Add-time Delete-time
Description
l microwave l microwave inverter l video l xbox NOTE: For additional details about non-Wi-Fi device types shown in this table, see Non-Wi-Fi Interferers on page 886
ID number assigned to the device by the spectrum monitor or hybrid AP radio. Spectrum monitors and hybrid APs assign a unique spectrum ID per device type.
Center frequency of the signal sent from the device.
Channel bandwidth used by the device, in Kilohertz.
Radio channels affected by the wireless device, in Kilohertz.
Strength of the signal sent from the device, in dBm.
Device duty cycle. This value represents the percent of time the device broadcasts on the specified channel or frequency.
Time at which the device was first detected.
Time at which the device was aged out.
Related Commands
Command ap spectrum local-override
rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or Config mode on master or local switches
888 | show ap spectrum device-history
AOS-W 6.2 | Reference Guide
show ap spectrum device-list
show ap spectrum device-list {ap-name <ap-name>}|{ip-addr <ip-addr>} freq-band 2.4ghz|5ghz [type audio-ff|bluetooth|cordless-base-fh|cordless-network-fh|cordless-phone-ff|genericff|generic-fh|generic-interferer|microwave|microwave-inverter|video|xbox]
Description
Show a device summary table and channel information for non-Wi-Fi devices currently seen by a spectrum monitor or hybrid AP radio.
Syntax
Parameter
Description
ap-name <ap-name>
Name of the spectrum monitor or hybrid AP for which you want to view spectrum information.
ip-addr <ip-addr>
IP address of the spectrum monitor or hybrid AP for which you want to view spectrum information.
freq-band 2.4ghz|5ghz View information for a specific radio type, either 2.4 GHz or 5 GHz.
type
Show data for a specific device type only.
audio-ff
Show only audio fixed frequency devices.
bluetooth
Show only bluetooth devices. NOTE: This option is available only for 2.4 GHz spectrum devices.
cordless-base-fh
View information for frequency-hopping cordless phone bases seen by the spectrum device.
cordless-phone-ff
View information for frequency-hopping cordless phones seen by the spectrum device.
cordless-networkfh
View information for frequency-hopping cordless network devices seen by the spectrum device.
generic-ff
View information for generic fixed-frequency devices seen by the spectrum device.
generic-fh
View information for generic frequency-hopping devices seen by the spectrum device.
generic-interferer Show only generic interfering devices.
microwave
Show only microwave devices. NOTE: This option is available only for 2.4 GHz spectrum devices.
microwave-inverter Show only microwave inverter devices. NOTE: This option is available only for 2.4 GHz spectrum devices.
video
Show only video fixed frequency devices.
xbox
Show only xbox frequency hopper devices. NOTE: This option is available only for 2.4 GHz spectrum devices.
AOS-W 6.2 | Reference Guide
show ap spectrum device-list | 889
Usage Guidelines
Issue this command to view detailed information about currently active non-Wi-Fi devices on the network. Use the optional type parameter to display data for one specific device type only. For additional details about non-Wi-Fi device types shown in this table, see Non-Wi-Fi Interferers on page 886.
A hybrid AP on a 20 MHz channel will see 40 MHz Wi-Fi data as non-Wi-Fi data.
Examples
The output of this example shows that the spectrum monitor ap123 is able to see data for a single non-Wi-Fi device on its 802.11a radio. Note that the output below is divided into two sections to better fit on the page of this document. In the AOS-W CLI, this information is displayed in a single long table.
(host) #show ap spectrum device-list ap-name ap123 freq-band 5ghz
Non-Wifi Device List Table
--------------------------
Type
ID Cfreq Bandwidth Channels-affected Signal-strength
----
-- ----- --------- ----------------- ---------------
Cordless Phone FH 3 5826093 80000
149 157 161 165 49
Duty-cycle Add-time
Update-time
---------- --------
-----------
5
2010-05-17 10:04:53 2010-05-17 10:04:55
Total:1
Current Time:2010-05-17 10:04:56
The output of this command includes the following information:
Column Type
ID Cfreq Bandwidth Channels-affected
Description
Device type. This parameter can be any of the following: l audio FF (fixed frequency) l bluetooth l cordless base FH (frequency hopper) l cordless phone FF (fixed frequency l cordless network FH (frequency hopper) l generic FF (fixed frequency l generic FH (frequency hopper) l generic interferer l microwave l microwave inverter l video l xbox NOTE: For additional details about non-Wi-Fi device types shown in this table, see Non-Wi-Fi Interferers on page 886
ID number assigned to the device by the spectrum monitor or hybrid AP radio. Spectrum monitors and hybrid APs assign a unique spectrum ID per device type.
Center frequency of the signal sent from the device.
Channel bandwidth used by the device.
Radio channels affected by the wireless device.
890 | show ap spectrum device-list
AOS-W 6.2 | Reference Guide
Column Signal-strength Duty-cycle
Add-time Update-time
Description Strength of the signal sent from the device, in dBm. Device duty cycle. This value represents the percent of time the device broadcasts a signal. Time at which the device was first detected. Time at which the device's status was updated.
Related Commands
Command ap spectrum local-override
rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show ap spectrum device-list | 891
show ap spectrum device-log
show ap spectrum device-log {ap-name <ap-name>}|{ip-addr <ip-addr>} freq-band 2.4ghz|5ghz [type audio-ff|bluetooth|cordless-phone-ff|cordless-phone-fh| generic-ff|generic-fh|generic-interferer|microwave|microwave-inverter|video|xbox]
Description
This command shows a time log of add and delete events for non-Wi-Fi devices.
Syntax
Parameter
Description
ap-name <ap-name>
Name of the spectrum monitor for hybrid AP or which you want to view spectrum information.
ip-addr <ip-addr>
IP address of the spectrum monitor or hybrid AP for which you want to view spectrum information.
freq-band 2.4ghz|5ghz View information for a specific radio type, either 2.4 GHz or 5 GHz.
type
Show data for a specific device type only.
audio-ff
Show only audio fixed frequency devices.
bluetooth
Show only bluetooth devices. NOTE: This option is available only for 2.4 GHz spectrum device radios.
cordless-base-fh
View information for frequency-hopping cordless phone bases seen by the spectrum device.
cordless-phone-ff
View information for frequency-hopping cordless phones seen by the spectrum device.
cordless-networkfh
View information for frequency-hopping cordless network devices seen by the spectrum device.
generic-ff
View information for generic fixed-frequency devices seen by the spectrum device.
generic-fh
View information for generic frequency-hopping devices seen by the spectrum device.
generic-interferer Show only generic interfering devices.
microwave
Show only microwave devices. NOTE: This option is available only for 2.4 GHz spectrum device radios.
microwave-inverter Show only microwave inverter devices. NOTE: This option is available only for 2.4 GHz spectrum device radios.
video
Show only video fixed frequency devices.
xbox
Show only xbox frequency hopper devices. NOTE: This option is available only for 2.4 GHz spectrum device radios.
892 | show ap spectrum device-log
AOS-W 6.2 | Reference Guide
Usage Guidelines
Use this table to show a time log of when non-Wi-Fi devices were added to and deleted from the Wi-fi Device log table. For additional details about non-Wi-Fi device types shown in this table, see Non-Wi-Fi Interferers on page 886.
A hybrid AP on a 20 MHz channel will see 40 MHz Wi-Fi data as non-Wi-Fi data.
Examples
The output of this example shows that the spectrum monitor ap123 logged data for four frequency-hopping cordless base devices seen by its 802.11g radio. Note that the output below is divided into two sections to better fit on the page of this document. In the AOS-W CLI, this information is displayed in a single long table.
(host) #show ap spectrum device-log ap-name ap123 freq-band 5ghz cordless-base-fh
Non-Wifi Device Log Table
-------------------------
Device Type
ID Added/Deleted
-----------
-- -------------
Cordless Base FH 1 Added
Cordless Base FH 1 Deleted
Cordless Base FH 2 Added
Cordless Base FH 2 Deleted
Cordless Base FH 3 Added
Cordless Base FH 3 Deleted
Cordless Base FH 4 Added
Signal Strength --------------78 78 78 78 80 80 80
Duty Cycle ---------5 5 5 5 5 5 5
Center Freq ----------5773281 5747343 5757656 5760469 5802813 5802813 5770781
Start Freq ---------5733281 5707343 5717656 5720469 5762813 5762813 5730781
End Freq -------5813281 5787343 5797656 5800469 5842813 5842813 5810781
Channels Affected ----------------153 149 153 157 161 165 153 153 157 161 165 161 161 153
Bandwidth --------80000 80000 80000 80000 80000 80000 80000
Total:7 Current Time:2012-09-25 12:04:54
The output of this command includes the following information:
Column Device Type ID
Added/Deleted
Signal Strength Duty Cycle
Description
Type of non-Wi-Fi device detected by the spectrum monitor or hybrid AP
The spectrum ID number assigned to that device. Spectrum monitors and hybrid APs assign a unique spectrum ID per device type.
The non-Wi-Fi Device Log table can show signal data for a device when that device was added or removed from the log table.
Strength of the signal sent by the device.
Device duty cycle. This value represents the percent of time a signal is broadcast on a specific channel or frequency.
AOS-W 6.2 | Reference Guide
show ap spectrum device-log | 893
Column Center Freq Start Freq End Freq Channels affected Bandwidth
Description Center frequency of the signal sent by the device. Lowest signal frequency sent by the device. Highest signal frequency sent by the device. Radio channels affected by the device signal. Amount of signal bandwidth used by the device, in kilohertz.
Related Commands
Command ap spectrum local-override
rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
894 | show ap spectrum device-log
AOS-W 6.2 | Reference Guide
show ap spectrum device-summary
show ap spectrum device-summary {ap-name <ap-name>}|{ip-addr <ip-addr>} freq-band 2.4ghz|5ghz
Description
This command shows the numbers of wi-fi and non-Wi-Fi device types on each channel monitored by a spectrum monitor or hybrid AP
Syntax
Parameter ap-name <ap-name>
ip-addr <ip-addr>
freq-band 2.4ghz|5ghz
Description
Name of the spectrum monitor or hybrid AP for which you want to view spectrum information.
IP address of the spectrum monitor or hybrid APfor which you want to view spectrum information.
View information for a specific radio type, either 2.4 GHz or 5 GHz.
Usage Guidelines
Use this command to show the types of devices that the spectrum device can detect on each channel it monitors. For additional details about non-Wi-Fi device types shown in this table, see Non-Wi-Fi Interferers on page 886.
Examples
The output of this example shows that the spectrum monitor ap123 is able to detect 61wi-fi devices on channel 149g. (host) #show ap spectrum device-summary ap-name ap123 freq-band 5ghz
Device Summary Table
--------------------
Device
149 153 157 161 165
-------
--- --- --- --- ---
Unknown
00000
WIFI
61 6 14 29 9
Microwave
00000
Bluetooth
00000
Generic Fixed Freq 0 0 0 0 0
Cordless Phone FF 0 0 0 0 0
Video
00000
Audio
00000
Generic Freq Hopper 0 0 0 0 0
Cordless Phone FH 0 0 0 0 0
Xbox
00000
Microwave Inverter 0 0 0 0 0
Total:12
AOS-W 6.2 | Reference Guide
show ap spectrum device-summary | 895
Related Commands
Command ap spectrum local-override
rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
896 | show ap spectrum device-summary
AOS-W 6.2 | Reference Guide
show ap spectrum interference-power
show ap spectrum interference-power {ap-name <ap-name>}|{ip-addr <ip-addr>} freq-band 2.4ghz|5ghz [<chan-width>]
Description
This command shows the interference power detected by a 802.11a or 80211g radio on a spectrum monitor or hybrid AP.
Syntax
Parameter ap-name <ap-name>
ip-addr <ip-addr>
freq-band 2.4ghz|5ghz <chan-width>
Description
Name of the spectrum monitor or hybrid AP for which you want to view spectrum information.
IP address of the spectrum monitor or hybrid AP for which you want to view spectrum information.
View information for a specific radio type, either 2.4 GHz or 5 GHz.
Specify 20MHz or 40MHz to select the channel width for which you want to view information. If you do not specify a channel width, the output of this command will display the default 20MHz setting.
Usage Guidelines
This table displays information about AP power levels, channel noise and adjacent channel interference seen on each channel by a spectrum monitor or hybrid AP radio.
The output of this command displays the noise floor of each selected channel in dBm. The noise floor of a channel depends on the noise figure of the RF components used in the radio, temperature, presence of certain types of interferers or noise, and the width of the channel. For example, in a clean environment, the noise floor of a 20 MHz channel will be around -95 dBm and that of a 40 MHz channel will be around -92 dBm. Certain types of fixed frequency continuous transmitters such as video bridges, fixed frequency phones, and wireless cameras typically elevate the noise floor as seen by the Wi-Fi radio. Other interferers such as the frequency hopping phones, Bluetooth and Xbox devices may not affect the noise floor of the radio. A Wi-Fi radio can only reliably decode Wi-Fi signals that are a certain dB above the noise floor and therefore estimating and understanding the actual noise floor of the radio is critical to understanding the reliability of the RF environment.
The ACI column displayed in the Interference Power Chart displays adjacent-channel interference (ACI) power levels based on the signal strength(s) of the Wi-Fi APs on adjacent channels. A higher ACI value in Interference Power Chart does not necessarily mean higher interference since the AP that is contributing to the maximum ACI may or may not be very actively transmitting data to other clients at all times. The ACI power levels are derived from the signal strength of the beacons.
Examples
The output of this example shows interference power levels for each channel seen by the spectrum monitor ap123. (host)# show ap spectrum interference-power ap-name ap123 freq-band 5ghz
Interference Power Table -----------------------Channel Noise Floor(dBm) Max Interference(dBm)
Max AP Signal(dBm)
Max AP SSID
Max AP BSSID
ACI(dBm)
AOS-W 6.2 | Reference Guide
show ap spectrum interference-power | 897
------- ----------------
---------------------
149
-91
-71
153
-63
-58
157
-92
-60
161
-94
-70
165
-93
-69
149+
-60
-58
157+
-89
-60
------------------40 -42 -48 -39 -26 -40 -39
----------ethersphere-wpa2 guest alpha 00:24:6C:C0:15:EB sw-jfb-attack ethersphere-wpa2 00:24:6C:C0:15:EB
-----------00:24:6c:80:7b:c9 00:1a:1e:87:c1:90 00:1a:1e:50:01:30 00:24:6c:81:57:c8 00:1a:1e:9b:1d:c8 00:24:6c:80:7b:c9 00:24:6c:81:57:c8
--------77 -63 -74 -61 -74 -0 -0
The output of this command includes the following information:
Column Channel Noise Floor (dBm) Max AP Signal (dBm) Max AP SSID Max AP BSSID ACI (dBm) Max Interference Power (dBm)
Description An 802.11a or 802.11g radio channel. Current noise floor recorded on the channel. Power level of the AP on the channel with the highest signal power. SSID of the AP on the channel with the highest signal power. BSSID of the AP on the channel with the highest signal power. Adjacent channel interference level detected by the spectrum device. Signal strength of the non-Wi-Fi device that has the highest signal strength.
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
898 | show ap spectrum interference-power
AOS-W 6.2 | Reference Guide
show ap spectrum-load-balancing
show ap spectrum-load-balancing [group <group>]
Description
Show spectrum load balancing information for an AP with this feature enabled.
Syntax
Parameter group <group>
Description
Filter this information to show only data for the specified spectrum load balancing domain.
Examples
The output of the command below shows the APs currently using the spectrum load-balancing domain default-1. (host) #show ap spectrum-load-balancing group default-1
Spectrum Load Balancing Group
-----------------------------
Name
IP Address
Domain
----
----------
------
ap121-1 192.168.151.253 default-1
ap124-1 192.168.151.254 default-1
ap125-1 192.168.151.251 default-1
Assignment ---------149/21 48/15 44/15
Clients ------3 3 2
The output of this command includes the following information:
Column Name IP address Domain Assignment Clients
Description Name of an AP AP IP address Name of the spectrum load balancing domain assigned to the AP Current channel and power assignment for the AP. Number of clients currently using the AP.
Command History
Introduced in AOS-W 3.3.2.14.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap spectrum-load-balancing | 899
show ap spectrum local-override
show ap spectrum local-override
Description
This command shows a list of AP radios currently converted to spectrum monitors via the spectrum local-override list
Syntax
No parameters
Examples
The output of this example shows that three APs each have two radios defined as spectrum monitors.
(host) #show ap spectrum local-override
Spectrum Local Override Profile
-------------------------------
Parameter
Value
---------
-----
Override Entry AP ap125 band 2ghz
Override Entry AP ap125 band 5ghz
Override Entry AP ap105 band 2ghz
Override Entry AP ap105 band 5ghz
Override Entry AP apcorp1 band 2ghz
Override Entry AP APcorp1 band 5ghz
The Value column in the output of this command includes the following information:
Parameter Override Entry Value
Description Indicates that an AP radio has been added to the local override list Radio that has been added to the override list, and the band used by that radio.
Related Commands
Command ap spectrum local-override
rf dot11a-radioprofilemodespectrum-mode
rf dot11g-radioprofilemodespectrum-mode
Description
Convert an AP or AM into a spectrum monitor by adding it to the spectrum local-override list.
Set a 802.11a radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Set a 802.11g radio so the device operates as an spectrum monitor, and can send spectrum analysis data to a desktop or laptop client.
Mode Config mode on master or local switches
Config mode on master or local switches
Config mode on master or local switches
Command History
Introduced in AOS-W 6.0.
900 | show ap spectrum local-override
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show ap spectrum local-override | 901
show ap spectrum monitors
show ap spectrum monitors
Description
This command shows a list of APs terminating on the switch that are currently configured as spectrum monitors or hybrid APs
Syntax
No parameters
Examples
The output of this example shows that the 802.11a radio on a spectrum monitor named ap123 is sending spectrum analysis data to a client with the IP address 10.240.16.177. (host)#show ap spectrum monitors
List of Sensors
---------------
AP name
Group AP Type Phy Band
Subscribe Time
-------
----- ------- --- ----
--------------
00:24:6c:c0:0c:89 default 105
G 2GHz
10.240.16.177 2011-01-21 07:09:32 AM
00:24:6c:c0:0c:89 default 105
A 5GHz
2011-01-21 07:17:57 AM
00:24:6c:c7:d6:1c default 93
A 5GHz
2011-01-21
07:18:22 AM
The output of this command includes the following information:
Channel Mode
------- ----
-----
1
Access Point
44+
Access Point
10.240.16.177
-
Spectrum Monitor 10.240.16.177
Column AP name Group Ap Type Phy Band
Mode
Client IP
Subscribe time
Description
Name of an AP configured as a spectrum monitor or hybrid AP
Name of the spectrum device's AP group
the AP model number
The radio's PHY type. Possible values are A for 802.11a and G for 802.11b/g,
Spectrum band that the spectrum monitor or hybrid AP radio s currently monitoring.
This column shows whether the device is an access point configured as a hybrid AP, or a spectrum monitor.
IP address of the client to which the spectrum monitor or hybrid AP is sending data.
Time at which the spectrum monitor or hybrid AP was connected to the client.
Command History
Introduced in AOS-W 6.0.
902 | show ap spectrum monitors
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show ap spectrum monitors | 903
show ap spectrum technical-support
show ap spectrum technical-support ap-name <ap-name> <filename>
Description
Save spectrum data for later analysis by technical support.
Syntax
Parameter <ap-name> <filename>
Description
Save technical support information for a specific spectrum monitor.
Name of the file to which this data should be saved. This file does not have to already exist on the switch, the show ap spectrum technical-support command will create this file.
Usage Guidelines
Use this command under the supervision of your Alcatel-Lucent technical support representative to troubleshoot spectrum analysis issues or errors.
Command History
Introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
904 | show ap spectrum technical-support
AOS-W 6.2 | Reference Guide
show ap system-profile
show ap system-profile <profile>
Description
Show an AP's system profile settings.
Syntax
Parameter <profile>
Description Name of a system profile.
Examples
The output of the command below shows the current configuration settings for the default system profile. (host) #show ap system-profile default
AP system profile "default"
---------------------------
Parameter
Value
---------
-----
RF Band
g
RF Band for AM mode scanning
all
Native VLAN ID
1
Corporate DNS Domain
N/A
SNMP sysContact
N/A
LED operating mode (11n APs only) normal
SAP MTU
N/A
LMS IP
N/A
Backup LMS IP
N/A
LMS IPv6
N/A
Backup LMS IPv6
N/A
LMS Preemption
Disabled
LMS Hold-down Period
600 sec
Remote-AP DHCP Server VLAN
N/A
Remote-AP DHCP Server Id
192.168.11.1
Remote-AP DHCP Default Router
192.168.11.1
Remote-AP DHCP DNS Server
N/A
Remote-AP DHCP Pool Start
192.168.11.2
Remote-AP DHCP Pool End
192.168.11.254
Remote-AP DHCP Pool Netmask
255.255.255.0
Remote-AP DHCP Lease Time
0 days
Remote-AP uplink total bandwidth 0 kbps
Remote-AP bw reservation 1
N/A
Remote-AP bw reservation 2
N/A
Remote-AP bw reservation 3
N/A
Remote-AP Local Network Access
Disabled
Bootstrap threshold
8
Double Encrypt
Disabled
Dump Server
N/A
Heartbeat DSCP
0
Maintenance Mode
Disabled
Maximum Request Retries
10
Request Retry Interval
10 secNumber of IPSEC retries
85
Root AP
Disabled
AeroScout RTLS Server
N/A
AOS-W 6.2 | Reference Guide
show ap system-profile | 905
RTLS Server configuration Telnet
N/A Disabled
The output of this command includes the following information:
Column RF Band RF Band for AM mode scanning
Native VLAN ID Session ACL Corporate DNS Domain SNMP sysContact LED operating mode SAP MTU LMS IP
Backup LMS IP
Description
For dual-band radios, this parameter displays the RF band in which the AP should operate: l g = 2.4 GHz l a = 5 GHz
Scanning band for multiple RF radios. l g = 2.4 GHz l a = 5 GHz l all = Radio scans both bands. This is the
default setting.
Native VLAN for bridge mode virtual APs (frames on the native VLAN are not tagged with 802.1q tags).
Shows the access control list (ACL) applied on the uplink of a remote AP.
DNS name used by the corporate network.
SNMP system contact information.
Displays the LED operating mode for indoor 802.11n APs. LEDs display as usual in the default normal operating mode, but are all turned off in off mode.
Maximum Transmission Unit (MTU) size, in bytes. This value describes the greatest amount of data that can be transferred in one physical frame.
The IP address of the local management switch (LMS)--the Alcatel-Lucent switch which is responsible for terminating user traffic from the APs, and processing and forwarding the traffic to the wired network. NOTE: If the LMS-IP is blank, the access point will remain on the switch that it finds using methods like DNS or DHCP. If an IP address is configured for the LMS IP parameter, the AP will be immediately redirected to the switch at that address.
For multi-switch networks, this parameter displays the IP address of a backup to the IP address specified with the lms-ip parameter.
906 | show ap system-profile
AOS-W 6.2 | Reference Guide
Column LMS IPv6
Backup LMS IPv6
LMS Preemption
LMS Hold-down Period
Remote-AP DHCP Server VLAN
Remote-AP DHCP Server ID Remote-AP DNS Server Remote-AP DHCP Default Router Remote-AP DHCP Pool Start Remote-AP DHCP PoolEn d Remote-AP DHCP PoolNe tmask Remote-AP uplink total bandwidth Remote-AP bw reservation 1Remote-AP bw reservation 2Remote-AP bw reservation 3
Description
In multi-switch ipv6 networks, this parameter specifies the IPv6 address of the local management switch (LMS)--the Alcatel-Lucent switch--which is responsible for terminating user traffic from the APs, and processing and forwarding the traffic to the wired network. This can be the IP address of the local or master switch.
In multi-switch ipv6 networks, this parameter specifies the IPv6 address of a backup to the IPv6 address specified with the LMS IPv6 setting.
When this parameter is enabled, the local management switch automatically reverts to the primary LMS IP address when it becomes available.
Time, in seconds, that the primary LMS must be available before an AP returns to that LMS after failover.rap-dhcp-server-vlan VLAN ID of the remote AP DHCP server used if the switch is unavailable. This VLAN enables the DHCP server on the AP (also known as the remote AP DHCP server VLAN). If you enter the native VLAN ID, the DHCP server is unavailable.
VLAN ID of the remote AP DHCP server used if the switch is unavailable. This VLAN enables the DHCP server on the AP (also known as the remote AP DHCP server VLAN).
IP address used as the DHCP server identifier.
IP address of the DNS server.
IP address for the default DHCP router.
This parameter defines the starting IP address in the DHCP pool for remote APs.
This parameter defines the last IP address in the DHCP pool for remote APs.
Configures a DHCP pool for remote APs. This is the netmask used for the DHCP pool.
This is the total reserved uplink bandwidth (in Kilobits per second).
Session ACLs with uplink bandwidth reservation in kilobits per second. You can specify up to three session ACLs to reserve uplink bandwidth. The sum of the three uplink bandwidths should not exceed the rap-bwtotal value.
AOS-W 6.2 | Reference Guide
show ap system-profile | 907
Column Remote-AP Local Network Access
Bootstrap threshold
Double Encrypt
Dump Server Heartbeat DSCP Maintenance Mode
Maximum Request Retries Request Retry Interval Number of IPSEC retries Root AP 908 | show ap system-profile
Description
Shows if Remote-AP Local Network Access is enabled or disabled. By enabling this option, the clients that are connected to a RAP can communicate.
Note: By default, the Remote-AP Local Network Access will be disabled.
Number of consecutive missed heartbeats on a GRE tunnel (heartbeats are sent once per second on each tunnel) before an AP rebootstraps. On the switch, the GRE tunnel timeout is 1.5 x bootstrap-threshold; the tunnel is torn down after this number of seconds of inactivity on the tunnel.
This parameter applies only to remote APs. Double encryption is used for traffic to and from a wireless client that is connected to a tunneled SSID. When enabled, all traffic is reencrypted in the IPsec tunnel. When disabled, the wireless frame is only encapsulated inside the IPsec tunnel.
(For debugging purposes.) Displays the server to receive the core dump generated if an AP process crashes.
DSCP value of AP heartbeats (0-63).
Shows if Maintenance mode is enabled or disabled. If enabled, APs stop flooding unnecessary traps and syslog messages to network management systems or network operations centers when deploying, maintaining, or upgrading the network. The switch still generates debug syslog messages if debug logging is enabled.
Maximum number of times to retry APgenerated requests, including keepalive messages. After the maximum number of retries, the AP either tries the IP address specified by the bkup-lms-ip (if configured) or reboots.
Interval, in seconds, between the first and second retries of AP-generated requests. If the configured interval is less than 30 seconds, the interval for subsequent retries is increased up to 30 seconds.
The number of times the AP will attempt to recreate an IPsec tunnel with the master switch before the AP will reboot. A value of 0 disables the reboot.
This parameter identifies the root AP in a hierarchy of Remote APs.
AOS-W 6.2 | Reference Guide
Column AeroScout RTLS Server RTLS Server configuration
Telnet
Description
IP address of an AeroScout real-time asset location (RTLS) server.
This parameter contains the following information, separated by colons. l The IP address of the RTLS server to which
the AP sends RFID tag information. l Number of the RTLS server port to which
the AP sends RFID tag information l Shared secret key for the server l Frequency at which packets are sent to the
server, in seconds
Reports whether telnet access the AP is enabled or disabled.
Command History
Release AOS-W 3.0 AOS-W 3.2 AOS-W 3.3.2
AOS-W 5.0 AOS-W 6.0
Modification
Command introduced
Support for additional RTLS servers and remote AP enhancements was introduced.
l Maintenance-mode parameter was introduced. l Multiple remote AP DHCP server enhancements were introduced. l Support for RFprotect server and backup server configuration was introduced. l The mms-rtls-server parameter was deprecated in AOS-W 3.3.2.
The master-ip, rfprotect-server-ip and rfprotect-bkup-server parameters were deprecated.
Added support for the option to set the RF scanning band (am-scan-rf-band). The keepalive-interval parameter was deprecated.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap system-profile | 909
show ap tech-support
show ap tech-support ap-name <name> [<filename>]
Description
Display all information for an AP, or save that information to a file on the switch. This information can be used by Alcatel-Lucent technical support to diagnose a problem with an AP.
Syntax
Parameter <name> <filename>
Description
Name of the AP for which you want to view tech support data.
Save the output of this command into a file on the switch with the specified filename.
Usage Guidelines
This is an internal technical support command. Alcatel-Lucent technical support may request that you issue this command to help analyze and troubleshoot problems with an AP or your wireless network.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
910 | show ap tech-support
AOS-W 6.2 | Reference Guide
show ap vlan-usage
show ap vlan-usage [{ap-name <ap-name>}|{bssid <bssid>|{essid <essid>|{ip-addr <ip-addr>}]
Description
Show the numbers of clients on each VLAN.
Syntax
Parameter ap-name <ap-name> bssid <bssid> essid <essid>
ip-addr <ip-addr>
Description
Show VLAN data for an AP with a specific name.
Show VLAN data for a specific Basic Service Set Identifier (BSSID) on an AP. The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
Show VLAN data for a specific Extended Service Set Identifier (ESSID). An Extended Service Set Identifier (ESSID) is a alphanumeric name that uniquely identifies a wireless network. If the name includes spaces, you must enclose the ESSID in quotation marks.
Show VLAN data for an AP with a specific IP address by entering an IP address in dotted-decimal format.
Examples
The output of this command displays the VLAN Usage table.
(host) #show ap vlan-usage
VLAN Usage Table
----------------
VLAN ID Clients
------- -------
64
1
65
32
66
44
The output of this command includes the following information:
Column VLAN ID Clients
Description ID number of the wireless VLAN. Number of clients currently using the specified VLAN.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap vlan-usage | 911
show ap wired-ap-profile
show ap wired-ap-profile [<profile>]
Description
Show a list of all wired AP profiles, or display the configuration parameters in a specific wired AP profile.
Syntax
Parameter <profile>
Description Name of a wired AP profile.
Usage Guidelines
The command show ap wired-ap-profile displays a list of all wired AP profiles, including the number of references to each profile and the profile status. If you include the optional <profile> parameter, the command will display detailed information for that one profile.
Example
The output of this command shows the configuration parameters for the wired AP profile "default". (host) #show ap wired-ap-profile default
Wired AP profile "default"
--------------------------
Parameter
Value
---------
-----
Wired AP enable
Disabled
Forward mode
tunnel
Switchport mode
access
Access mode VLAN
1
Trunk mode native VLAN 1
Trunk mode allowed VLANs 1-4094
Trusted
Not Trusted
Broadcast
Broadcast
The output of this command includes the following information:
Column Wired AP enable Forward mode
Switchport mode
Access mode VLAN
Description
Indicates whether the wired AP profile is enabled or disabled.
The configured forward mode for the profile. l bridge: Bridge locally l split-tunnel: Tunnel to switch or NAT locally l tunnel: Tunnel to switch
The profile's switching mode. l access: Set access mode characteristics of the interface. l mode: Set trunking mode of the interface. l trunk: Set trunk mode characteristics of the interface.
VLAN ID of the access mode VLAN.
912 | show ap wired-ap-profile
AOS-W 6.2 | Reference Guide
Column Trunk mode native VLAN Trunk mode allowed VLANs Trusted
Broadcast
Description
VLAN ID of the native VLAN.
Range of allowed VLAN IDs for the native VLAN.
Shows if the wired port on an AP using this profile is a trusted port. Possible values are Trusted or Not Trusted.
If set to broadcast, the wired AP port will forward broadcast traffic. If the parameter displays Do Not Broadcast, broadcast traffic will not be forwarded.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap wired-ap-profile | 913
show ap wired-port-profile
show ap wired-port-profile
Description
Shows all AP wired port profiles and their status.
Syntax
No parameters.
Example
The example below shows that the switch has three wired port profiles. The References column lists the number of other profiles with references to the wired port profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
(host) (config) #show ap wired-port-profile
AP wired port profile List
--------------------------
Name
References
----
----------
default
3
NoAuthWiredPort 4
shutdown
3
Total:3
Profile Status --------------
Predefined (editable) Predefined
The following command displays information for an individual wired port profile:
(host)#show ap wired-port-profile default
AP wired port profile "default" ------------------------------Parameter --------Wired AP profile Ethernet interface link profile AP LLDP profile Shut down? Remote-AP Backup AAA Profile Time to wait for authentication to succeed
Value ----default default default No Enabled N/A 20 sec
The output of this command includes the following information:
Parameter Wired AP profile
Ethernet interface link profile
Description
Name of a wired AP profile to be used by devices connecting the AP's wired port. The wired AP profile defines the forwarding mode and switchport values used by the port.
An Ethernet Link profile to be used by devices connecting to the AP's wired port profile. This profile defines the duplex value and speed to be used by the port.
914 | show ap wired-port-profile
AOS-W 6.2 | Reference Guide
Parameter AP LLDP Profile Shut Down? Remote AP Backup
AAA Profile Time to wait for authentication to succeed
Description
Name of an LLDP Profile associated with this wired port.
Shows if the the wired AP port is enabled (no) or disabled (yes).
Use the rap-backup parameter to use the wired port on a Remote AP for local connectivity and troubleshooting when the AP cannot reach the switch. If the AP is not connected to the switch, no firewall policies will be applied when this option is enabled. (The AAA profile will be applied when the AP is connected to switch).
Name of a AAA profile to be used by devices connecting to the AP's wired port.
Authentication timeout value, in seconds, for devices connecting the AP's wired port. The supported range is 1-65535 seconds, and the default value is 20 seconds.
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap wired-port-profile | 915
show ap wired stats
show ap wired stats {ap-name <ap-name>} | {ip-addr <ip-addr>}|{client-ip <client-ip>} | {client-mac <client-mac>}
Description
Shows statistics for RAP wired clients.
Syntax
Parameter ap-name <ap-name> ip-addr <ip-addr>
client-ip <client-ip> client-mac <clientmac>
Description Show wired RAP statistics for a specified AP name. Show wired RAP statistics for a specified AP by entering an IP address in dotted-decimal format. Show wired RAP statistics for a specified client IP address. Show wired RAP statistics for a specified client MAC address
Example
(host) #show ap wired stats ap-name rap5wn client-mac 00:14:d1:19:3c:0b
RAP Wired User Statistics
-------------------------
Counter
Value
-------
-----
Slot
0
Port
1
VLAN
1
TX Packets
78
TX Bytes
7894
RX Packets
37
RX Bytes
5352
TX Broadcast Packets 36
TX Broadcast Bytes 4410
TX Multicast Packets 22
TX Multicast Bytes 1990
The output of this command includes the following information:
Column Slot Port VLAN TX Packets TX Bytes
Description Slot number Port number Associated VLAN number Number of packets sent Number of bytes sent
916 | show ap wired stats
AOS-W 6.2 | Reference Guide
Column
Description
RX Packets
Number of packets received
RX Bytes
Number of bytes received
TX Broadcast Packets Number of broadcast packets sent
TX Broadcast Bytes
Number of broadcast bytes sent
TX Multicast Packets Number of multicast packets sent
TX Multicast Bytes
Number of multicast bytes sent
Command History
Introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap wired stats | 917
show ap wmm-flow
show ap wmm-flow [{ap-name <ap-name>}|{bssid <bssid>}|{essid <essid>}|{ip-addr <ip-addr>}] dotlla|dotllg
Description
Show the Wireless Multimedia (WMM) flow table.
Syntax
Parameter ap-name <ap-name> bssid <bssid> essid <essid>
ip-addr <ip-addr> dot11a dot11g
Description
View an AP with a specified name.
View data for an AP with a specific BSSID (Basic Service Set Identifier). The Basic Service Set Identifier (BSSID) is usually the AP's MAC address.
View data for a specific ESSID (Extended Service Set Identifier). An Extended Service Set Identifier (ESSID) is a alphanumeric name that uniquely identifies a wireless network. If the name includes spaces, you must enclose the ESSID in quotation marks.
View an AP with a specified IP address by entering an IP address in dotteddecimal format.
Show the WMM flow table for a 802.11a radio.
Show the WMM flow table for a 802.11g radio.
Usage Guidelines
WMM, or Wireless Multimedia Extensions, are a subset of the 802.11e standard. WMM provides for four different types of traffic classification: voice, video, best effort, and background, with voice having the highest priority and background the lowest. Issue the show ap wmm-flow command to view WMM flow data for all APs. Include any of the optional parameters described in the table above to filter the table by a specific AP, radio channel (a or g), or both an ap and radio type.
Example
The example below shows WMM flow data for all APs. (host) #show ap wmm-flow
WMM Flow Table
--------------
AP Name ESSID Client
Description
------- ----- ------
-----------
AP125-srk NOE 00:90:7a:06:1f:5b tsid 6:prio 6:inactivity 2157352960
us:bidir:apsd:normalack:tclas prio 6 ip DIP-192.168.101.194 DP-32514 DSCP-48:one-match
AP125-srk NOE 00:90:7a:06:1f:5b tsid 0:prio 0:inactivity 100000000
us:bidir:apsd:normalack:no-match
Num Flows:0
The output of this command includes the following parameters:
918 | show ap wmm-flow
AOS-W 6.2 | Reference Guide
Column AP name ESSID Client Description
Description
Name of an AP with recorded WMM flows
Extended Service Set Identifier (ESSID) of a wireless network.
MAC address of the client.
The description is a long string that includes the following information. TSID: Traffic Stream Identifier. The TSID should match the priority level for each flow. Priority: One of the following IEEE 802.1p priority values: l 0,3 = Best Effort l 1,2 = Background l 4-5 = Video l 6-7 = Voice Inactivity: Tspec inactivity threshold, in microseconds. <country code>: AP country code, e.g. US. bdir: flow is bidirectional. apsd: flow has enabled auto power save delivery. <ack>: Displays the ack policy negotiated for the flow. Possible values are: l normalack l noack l blockack l resack (reserved ack) Tclas: traffic classification element. Tclas information includes one of the following classification types, the 802.1p priority and IP version (ver-4 or ver-6) l type0 - Classification based on Ethernet parameters l type1 - Classification based on TCP/UDP or IP parameters (IPv4 or IPv6) l type2 - Classification based on based on IEEE802.1Q DIP: Destination IP address for the flow. DP: Destination IP Port specified in the TCLAS for flow negotiation. DCSP: The Differentiated Services Code Point (DSCP) priority value that matches the flows 802.1p priority.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show ap wmm-flow | 919
show arp
show arp
Description
Show Address Resolution Protocol (ARP) entries for the switch.
Syntax
No parameters
Example
This example shows configured static ARP entries for the switch.
(host) #show arp
Protocol
Address
Internet
10.3.129.98
Internet
10.3.129.253
Internet
10.3.129.250
Internet
10.3.129.99
Internet
10.3.129.96
Internet
10.3.129.254
Hardware Address 00:1A:1E:C0:80:28 00:0B:86:42:35:80 00:1A:92:45:DB:00 00:1A:1E:C0:1C:60 00:1A:1E:C0:80:1E 00:0B:86:02:EE:00
Interface vlan1 vlan1 vlan1 vlan65 vlan65 vlan1
The output of this command includes the following parameters:
Parameter Protocol
Address Hardware Address Interface
Description
Protocol using ARP. Although the switch will most often use ARP to translate IP addresses to Ethernet MAC addresses, ARP may also be used for other protocols, such as Token Ring, FDDI, or IEEE 802.11, and for IP over ATM.
IP address of the device.
MAC address of the device.
Interface used to send ARP requests and replies.
Related Commands
Add a static Address Resolution Protocol (ARP) entry using the command show arp.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master and local switches
920 | show arp
AOS-W 6.2 | Reference Guide
show audit-trail
show audit-trail {<number>]
Description
Show the switch's audit trail log.
Syntax
Parameter <number>
Description
Start displaying the log output from the specified number of lines from the end of the log.
Example
By default, the audit trail feature is enabled for all commands in configuration mode. The example below shows the most recent ten audit log entries for the switch.
(host) # show audit-trail 10 Feb 5 06:13:17 cli[1239]: USER: admin has logged in from 10.240.16.118. Feb 5 06:20:13 cli[1239]: USER: admin connected from 10.240.16.118 has logged out. Feb 5 06:24:37 cli[1239]: USER: admin has logged in from 10.240.16.118. Feb 5 06:37:01 cli[1239]: USER:admin@10.3.129.250 COMMAND:<wlan virtual-ap "mp-only" no vapenable > -- command executed successfully Feb 5 06:37:14 cli[1239]: USER:admin@10.3.129.250 COMMAND:<wlan virtual-ap "mp-a-only" no vap-enable > -- command executed successfully Feb 5 06:37:20 cli[1239]: USER:admin@10.3.129.250 COMMAND:<wlan virtual-ap "default" no vapenable > -- command executed successfully Feb 5 06:37:29 cli[1239]: USER:admin@10.3.129.250 COMMAND:<wlan virtual-ap "mpp-a-only" no vap-enable > -- command executed successfully Feb 5 06:46:10 cli[1239]: USER:admin@10.3.129.250 COMMAND:<interface gigabitethernet "1/2" port monitor igigabitethernet "1/1" > -- command executed successfully Feb 5 06:57:44 cli[1239]: USER:admin@10.3.129.250 COMMAND:<ap system-profile "default" heartbeat-dscp 12 > -- command executed successfully Feb 5 07:05:48 cli[1239]: USER:admin@10.3.129.250 COMMAND:<wlan virtual-ap "mp-a-only" vapenable > -- command executed successfully
Related Commands
Enable or disable the audit trail feature using the command audit-trail.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Enable and Config modes. Audit trails can only be enabled on master switches
AOS-W 6.2 | Reference Guide
show audit-trail | 921
show auth-tracebuf
show auth-tracebuf [count <1-250] [failures] [mac <address>]
Description
Show the trace buffer for authentication events.
Syntax
Parameter count <1-250> failures mac <address>
Description limit the output of the command to the specified number of packets.
Filter the output of this command to display only authentication failures
Filter the output of this command to display only information for a specified MAC address.
Usage Guidelines
Use the output of this command to troubleshoot 802.1X authentication errors. Include the <address> parameter to filter data by the MAC address of the client which is experiencing errors. This command can tell you, for example, when 802.1X authentication completed and when keys were plumbed correctly.
Example
The example below shows the most recent ten trace buffer entries for the switch. Each row includes the following information:
(host) # show auth-tracebuf count 10 Auth Trace Buffer ----------------Feb 5 08:08:29 wpa2-key2 failure Feb 5 08:08:30 wpa2-key1 Feb 5 08:08:30 wpa2-key2 failure Feb 5 08:08:31 wpa2-key1 Feb 5 08:08:31 station-down Feb 5 08:08:31 station-up psk aes Feb 5 08:08:31 station-data-ready Feb 5 08:08:31 wpa2-key1 Feb 5 08:08:31 wpa2-key2 failure Feb 5 08:08:32 wpa2-key1 Feb 5 08:08:32 wpa2-key2 failure Feb 5 08:08:33 wpa2-key1 Feb 5 08:08:33 wpa2-key2 failure Feb 5 08:08:34 wpa2-key1 Feb 5 08:08:34 wpa2-key2 failure Feb 5 08:08:35 wpa2-key1 Feb 5 08:08:35 station-down
-> 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - 119 mic
<- 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - 117 -> 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - 119 mic
<- 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 * 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 * 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 -
117 - wpa2
* 00:09:ef:05:1e:b2 00:00:00:00:00:00 66 <- 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - 117 -> 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - 119 mic
<- 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - 117 -> 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - 119 mic
<- 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - 117 -> 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - 119 mic
<- 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - 117 -> 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - 119 mic
<- 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - 117 * 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - -
922 | show auth-tracebuf
AOS-W 6.2 | Reference Guide
Feb 5 08:08:35 station-up psk aes Feb 5 08:08:35 station-data-ready
* 00:09:ef:05:1e:b2 00:1a:1e:97:e5:42 - * 00:09:ef:05:1e:b2 00:00:00:00:00:00 66 -
wpa2
Each row in the output of this table may include some or all of the following information: l A timestamp that indicates when the entry was created. l The type of exchange that was made. l The direction the packet was sent. l The source MAC address. l The destination MAC address. l BSSID/Server Name. l The packet number. l The packet length. l Additional information (if available), e.g.username, encryption and WPA type, or reason for failure.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Enable or Config modes on master or local switches
AOS-W 6.2 | Reference Guide
show auth-tracebuf | 923
show banner
show banner
Description
Show the current login banner
Syntax
No parameters
Usage Guidelines
Issue this command to review the banner message that appears when you first log in to the switch's command-line or browser interfaces.
Example
(host) # show banner This testlab switch is scheduled for maintenance starting Saturday night at 11 p.m.
Related Commands
Configure a banner message using the command banner motd.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
924 | show banner
AOS-W 6.2 | Reference Guide
show boot
show boot
Description
Display boot parameters, including the boot partition and the configuration file to use when booting the switch.
Syntax
No parameters.
Example
(host) # show bootConfig File: default.cfg Boot Partition: PARTITION 1
Related Commands
Configure boot parameters using the command boot.
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show boot | 925
show cellular profile
show cellular profile [<name>] | [factory]
Description
Display the cellular profiles and profile settings.
Syntax
Parameter <name> factory
Description Enter the name of an existing cellular profile Display a list of factory supported cellular profiles.
Usage Guidelines
Issue this command without the <name> parameter to display configuration parameters for the entire list of available cellular profiles. Include a profile name to display configuration information for that one profile.
Example
The output of this command displays the Cellular Profile table. The example below shows eight preconfigured cellular profiles.
(host) #show cellular profile
Cellular Profile Table
----------------------
Name
Vend
Modeswitch
----
----
--
Novatel_U720
1410
Novatel_U727
1410
Kyocera_KPC680
0c88
Sierra_Compass_597 1199
Pantech_UM175
106c
Sierra_USBConn_881 1199
USBConn_Mercury_C885 1199
Globetrotter_Icon322 0af0
Default cellular priority:
Prod
----
2110 4100 180a 0023 3714 6856 6880 d033 100
Serial Dialer Tty
Driver Priority
------ ------ ---
------ -------- --------
evdo_us evdo_us evdo_us evdo_us evdo_us gsm_us gsm_us gsm_us
ttyUSB0 ttyUSB0 ttyUSB0 ttyUSB0 ttyUSB1 ttyUSB0 ttyUSB3 ttyHS3
option option option sierra option option option hso
default default default default default default default default
The output of this command includes the following parameters:
Parameters Name Vend Prod
Description Name of a cellular profile. Vendor ID in hexadecimal USB product ID in hexadecimal
926 | show cellular profile
AOS-W 6.2 | Reference Guide
Parameters Serial Dialer TTY Driver
Priority
Modeswitch
Description
USB device serial number.
Name of a dialer group profile.
Modem TTY port.
One of the following cellular modem drivers: l acm: Linux ACM driver. l hso: Option High Speed driver. l option: Option USB data card driver (default). l sierra: Sierra Wireless driver.
Displays the cellular profile priority; profiles with the default priority of 100 will display the word default in the Priority column Range: 1 to 255. Default: 100
One of two USB device modeswitch settings: l eject: Eject the CDROM device. l rezero: Send SCSI CDROM rezero command.
Command History
Introduced in AOS-W 3.4.
Command Information
Platforms 600 Series
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show cellular profile | 927
show clock
show clock [summer-time|timezone|append]
Description
Display the system clock.
Syntax
Parameter summer-time timezone append
Description Show summer (daylight savings) time settings.
Show the configured timezone for the switch.
If the timestamp feature is enabled, including a timestamp in show command output.
Usage Guidelines
Include the optional summer-time parameter to display configured daylight savings time settings. The timezone parameter shows the current timezone, with its time offset from Greenwich Mean Time.
Example
The output below shows the current time on the switch clock.
(host) # show clock Thu Feb 5 16:52:28 PST 2009
Related Commands
Configure clock settings using the commands clock append, clock summer-time recurring, and clock timezone.
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
928 | show clock
AOS-W 6.2 | Reference Guide
show cluster-config
show cluster-config
Description
Show the multi-master cluster configuration for the control plane security feature.
Usage Guidelines
When you issue this command from the cluster root, the output of this command shows the cluster role of the switch, and the IP address of each member switch in the cluster. When you issue this command from a cluster member, the output of this command shows the cluster role of the switch, and the IP address of the cluster root.
Example
In the example below, the Cluster Role section in the output of this command shows that the switch on which the command was issued is the cluster root. The Cluster IPSEC Switches section of the output shows the IP address of each cluster member. (host) (config) #show cluster-config
Cluster Role -----------Root ----
Cluster IPSEC Switches -------------------------Switch IP address of Cluster-Members Key ------------------------------------ --172.21.18.18 ******** 172.21.18.19 ********
Related Commands
Command
Description
Mode
control-plane-security Configure the control plane security profile.
Config mode
cluster-member-ip
This command sets the switch as a control plane security
Config mode on
cluster root, and specifies the IPsec key for a cluster member. cluster root switches
cluster-root-ip
This command sets the switch as a control plane security cluster member, and defines the IPsec key for communication between the cluster member and the switch's cluster root.
Config mode on cluster member switches
Command History
This command was introduced in AOS-W 5.0.
AOS-W 6.2 | Reference Guide
show cluster-config | 929
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable mode on cluster member or cluster root switches
930 | show cluster-config
AOS-W 6.2 | Reference Guide
show cluster-switches
show cluster-switches
Description
Issue this command on a master switch using control plane security in a multi-master environment to show other the other switches to which it is connected.
Usage Guidelines
When you issue this command from the cluster root, the output of this command displays the IP address of the VLAN used by the cluster member to connect to the cluster root.
If you issue this command from a cluster member ,the output of this command displays the IP address of the VLAN used by the cluster root to connect to the cluster member.
Example
In the example below, the show cluster-switches command was issued on a cluster member. The Switch-IP section of the output shows the IP address of a VLAN on cluster root, indicating that the cluster member can currently communicate with the cluster root. If the member switch cannot communicate with the cluster root, this table will be blank.
(host) (config) #show cluster-switches
SWITCH-IP
CLUSTER-ROLE
-----------------------------
172.21.18.18
ROOT
In this example, the show cluster-switches command was issued on a cluster root. The Switch-IP section of the output shows the IP address of a VLAN on each cluster member that can currently communicate with the cluster root.
(host) (config) #show cluster-switches
SWITCH-IP
CLUSTER-ROLE
-----------------------------
172.21.18.18 MEMBER
172.21.18.19 MEMBER
Related Commands
Parameter
Description
Mode
control-plane-security Configure the control plane security profile.
Config mode
cluster-member-ip
This command sets the switch as a control plane security
Config mode on
cluster root, and specifies the IPsec key for a cluster member. cluster root switches
cluster-root-ip
This command sets the switch as a control plane security cluster member, and defines the IPsec key for communication between the cluster member and the switch's cluster root.
Config mode on cluster member switches
Command History
This command was introduced in AOS-W 5.0.
AOS-W 6.2 | Reference Guide
show cluster-switches | 931
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable mode on cluster member or cluster root switches
932 | show cluster-switches
AOS-W 6.2 | Reference Guide
show command-mapping
show command-mapping [reverse]
Description
Show the mapping new commands to deprecated commands.
Syntax
Parameter reverse
Description
Sort the command map by deprecated command syntax. This command is useful to find the current command syntax for a deprecated command.
Usage Guidelines
The syntax of many commands changed after the release of AOS-W 3.0. Use this command to display a list of current commands and their deprecated command equivalents. Include the reverse parameter sort the output of this table by the deprecated command syntax.
Example
The example below shows part of the output for this command. Note that a single new command may have replaced several older commands.
(host) # show command-mappingCommand Map
-----------
New Command
Old Command
-----------
-----------
show ap active
show wlan ap
show ap arm neighbors
show ap arm-neighbors
show ap arm rf-summary
show am rf-summary
show ap arm scan-times
show am scan-times
show ap arm state
show wlan arm
show ap association
show stm association
show wlan client
show wlan remote-client
show ap blacklist-clients
show stm dos-sta
show ap bss-table
show stm connectivity
show ap client status
show stm state
show ap coverage-holes
show rfsm coverage-holes
show ap database
show ap global-list
show sapm ap search
show ap registered
show ap debug association-failure show wlan association-failure
....
Command History
This command was available in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show command-mapping | 933
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
934 | show command-mapping
AOS-W 6.2 | Reference Guide
show configuration
show configuration
Description
Show the saved configuration on the switch.
Syntax
No parameters.
Usage Guidelines
Issue this command to view the entire configuration saved on the switch, including all profiles, ACLs, and interface settings.
Example
The example below shows part of the output for this command. (host) # show configuration version 6.2 enable secret "01270adf012bf3faf1a26a5987a53d78041a4287c0b62cb36a" telnet cli telnet soe hostname "TechPubs650" clock timezone PST -8 location "Building1.floor1" controller config 7
ip NAT pool dynamic-srcnat 0.0.0.0 0.0.0.0 ip access-list eth validuserethacl
permit any ! netservice svc-netbios-dgm udp 138 netservice svc-snmp-trap udp 162
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show configuration | 935
show controller-ip
show controller-ip
Description
Show switch's country and domain upgrade trail.
Syntax
No parameters.
Example
The output of this command shows the switch's IP address and VLAN interface ID.
(host) # show controller-ip Switch IP Address: 10.168.254.221 Switch IP is configured to be Vlan Interface: 1
Command History
This command was available in AOS-W 3.4
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
936 | show controller-ip
AOS-W 6.2 | Reference Guide
show controller-ipv6
show controller-ipv6
Description
Show switch's IPv6 address and VLAN interface ID.
Syntax
No parameters.
Example
(host) # show controller-ipv6
Switch IPv6 Address: 2005:d81f:f9f0:1001::14 Switch IPv6 address is from Vlan Interface: 1 The output of this command shows the switch's IPv6 address and VLAN interface ID.
Command History
This command is introduced in AOS-W 6.1
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show controller-ipv6 | 937
show control-plane-security
show control-plane-security
Description
Show the current configuration of the control plane security profile.
Syntax
No parameters.
Usage Guidelines
The control plane security profile enables and disables the control plane security feature and identifies campus APs to receive security certificates. Issue this command to view current control plane security settings.
Example
The following command shows the control plane security and auto certificate provisioning features are enabled in the control plane security profile, and that the switch will send certificates to a range of IP addresses:
(host)(config) #show control-plane-security
Control Plane Security Profile
------------------------------
Parameter
Value
---------
-----
Control Plane Security
Enabled
Auto Cert Provisioning
Enabled
Auto Cert Allow All
Disabled
Auto Cert Allowed Addresses 10.1.1.16 - 10.1.42.55
Related Commands
Command control-plane-security
Description
Configure the control plane security profile by identifying APs to receive security certificates.
Mode Config mode
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Enable mode on master or local switches
938 | show control-plane-security
AOS-W 6.2 | Reference Guide
show country
show country [trail]
Description
Show switch's country and domain upgrade trail.
Syntax
Parameter trail
Description
Display the record showing how the switch was reconfigured for it's current country domain when the switch hardware was upgraded.
Usage Guidelines
A switch's country code sets the regulatory domain for the radio frequencies that the APs use. This value is typically set during the switch's initial setup procedure. Use this command to determine the country code specified during setup.
Example
The output of this command shows the switch's country, model and hardware types.
(host) # show country
Country:US Model:Alcatel-LucentOAW-4306G-US Hardware:Restricted US
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show country | 939
show cp-bwcontracts
show cp-bwcontract
Description
Display a list of Control Processor (CP) bandwidth contracts for whitelist ACLs.
Syntax
No parameters.
Example
The CP bw contracts table lists the contract names, the ID number assigned to each contract, and its defined traffic rate in bits per second.
(host) #show cp-bwcontracts
CP bw contracts
---------------
Contract
Id
--------
--
limit
4098
newcontract 4097
Rate (bits/second) -----------------2000000000 1000000000
Related Commands
Command cp-bandwidth-contract
firewall cp
Description
This command configures a bandwidth contract traffic rate which can then be associated with a whitelist session ACL.
This command creates a new whitelist ACL and can associate a bandwidth contract with that ACL.
Mode Enable or Config modes
Enable or Config modes
Command History
This command was introduced in AOS-W 3.4
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license.
Command Mode Config mode on master switches
940 | show cp-bwcontracts
AOS-W 6.2 | Reference Guide
show cpuload
show cpuload [current]
Description
Display the switch CPU load for application and system processes.
Syntax
Parameter current
Description
Include this optional parameter at the request of Alcatel-Lucent technical support to display additional CPU troubleshooting statistics.
Example
This example shows that the majority of the switch's CPU resources are not being used by either application (user) or system processes. (host) #show cpuload user 6.9%, system 7.7%, idle 85.4%
The output of this command includes the following parameters:
Parameter user system idle
Description Percentage of switch CPU resources used by application processes. Percentage of switch CPU resources used by system processes. Percentage of unused switch CPU resources.
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show cpuload | 941
show crypto-local ipsec-map
show crypto-local ipsec [tag <ipsec-map-name>]
Description
Displays the current IPsec map configuration on the switch.
Syntax
Parameter tag <ipsec-map-name>
Description Display a specific IPsec map.
Usage Guidelines
The command show crypto-local ipsec displays the current IPsec configuration on the switch.
Examples
The command show crypto-local ipsec-map shows the default map configuration along with any specific IPsec map configurations.
(host) #show crypto-local ipsec-map
Crypto Map Template"default-local-master-ipsecmap" 9999 IKE Version: 1 lifetime: [300 - 86400] seconds, no volume limit PFS (Y/N): N Transform sets={ default-ml-transform } Peer gateway: 0.0.0.0 Interface: VLAN 0 Source network: 0.0.0.0/0.0.0.0 Destination network: 0.0.0.0/0.0.0.0 Pre-Connect (Y/N): N Tunnel Trusted (Y/N): Y Forced NAT-T (Y/N): N
Crypto Map Template"testmap" 3 IKE Version: 1
lifetime: [300 - 86400] seconds, no volume limit PFS (Y/N): N Transform sets={ default-transform } Peer gateway: 0.0.0.0 Interface: VLAN 0 Source network: 0.0.0.0/0.0.0.0 Destination network: 0.0.0.0/0.0.0.0 Pre-Connect (Y/N): N Tunnel Trusted (Y/N): N Forced NAT-T (Y/N): N
Related Commands
Command crypto-local ipsec-map
Description
Mode
Use this command to configure IPsec mapping for Config mode site-to-site VPN.
942 | show crypto-local ipsec-map
AOS-W 6.2 | Reference Guide
Command History
Version AOS-W 3.4 AOS-W 6.1
Modification Command introduced. The output of this command displays the configured IKE version.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show crypto-local ipsec-map | 943
show crypto dp
show
show crypto dp [peer <source-ip>]
Descriptions
Displays crypto data packets.
Syntax
Parameter dp
peer <source-ip>
Description Shows crypto latest datapath packets. The output is sent to crypto logs. Clears crypto ISAKMP state for this IP.
Usage Guidelines
Use this command to send crypto data packet information to the switch log files, or to clear a crypto ISAKMP state associated with a specific IP address.
Examples
The command show crypto dp sends debug information to CRYTPO logs.
(host) # show crypto Datapath debug output sent to CRYPTO logs.
Related Commands
Command crypto isakmp
Description
Use this command to configure Internet Key Exchange (IKE) parameters for the Internet Security Association and Key Management Protocol (ISAKMP)
Mode Enable and Config modes
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
944 | show crypto dp
AOS-W 6.2 | Reference Guide
show crypto dynamic-map
show crypto dynamic-map [tag <dynamic-map-name>]
Descriptions
Displays IPsec dynamic map configurations.
Syntax
Parameter
dynamic-map
tag <dynamic-mapname>
Description IPsec dynamic maps configuration. A specific dynamic map.
Usage Guidelines
Dynamic maps enable IPsec SA negotiations from dynamically addressed IPsec peers. Once you have defined a dynamic map, you can associate that map with the default global map using the command crypto map global-map.
Examples
The command show crypto dynamic-map shows IPsec dynamic map configuration.
(host) #show crypto dynamic-map
Crypto Map Template"default-dynamicmap" 10000 IKE Version: 1
lifetime: [300 - 86400] seconds, no volume limit PFS (Y/N): N Transform sets={ default-transform }
Related Commands
Command crypto dynamic-map
Description Use this command to configure a dynamic map.
Mode Config mode
Command History
Version AOS-W 3.0 AOS-W 6.1
Modification Command introduced. The output of this command displays the configured IKE version.
AOS-W 6.2 | Reference Guide
show crypto dynamic-map | 945
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
946 | show crypto dynamic-map
AOS-W 6.2 | Reference Guide
show crypto ipsec
show crypto ipsec {mtu|sa[peer <peer-ip>]|transform-set [tag <transform-set-name>]}
Descriptions
Displays the current IPsec configuration on the switch.
Syntax
Parameter mtu sa
peer <peer-ip> transform-set
tag <transform-setname>
Description IPsec maximum mtu. Security associations.
IPsec security associations for a peer. IPsec transform sets. A specific transform set.
Usage Guidelines
The command show crypto ipsec displays the Maximum Transmission Unit (MTU) size allowed for network transmissions using IPsec security. It also displays the transform sets that define a specific encryption and authentication type.
Examples
The command show crypto transform-set shows the settings for both preconfigured and manually configured transform sets.
(host) #show crypto ipsec transform-set
Transform set default-transform: { esp-3des esp-sha-hmac } will negotiate = { Transport, Tunnel }
Transform set default-ml-transform: { esp-3des esp-sha-hmac } will negotiate = { Transport, Tunnel }
Transform set default-boc-bm-transform: { esp-3des esp-sha-hmac } will negotiate = { Transport, Tunnel }
Transform set default-cluster-transform: { esp-aes256 esp-sha-hmac } will negotiate = { Transport, Tunnel }
Transform set default-1st-ikev2-transform: { esp-aes256 esp-sha-hmac } will negotiate = { Transport, Tunnel }
Transform set default-3rd-ikev2-transform: { esp-aes128 esp-sha-hmac } will negotiate = { Transport, Tunnel }
Transform set default-gcm256: { esp-aes256-gcm esp-null-hmac } will negotiate = { Transport, Tunnel }
Transform set default-gcm128: { esp-aes128-gcm esp-null-hmac } will negotiate = { Transport, Tunnel }
Transform set default-rap-transform: { esp-aes256 esp-sha-hmac } will negotiate = { Transport, Tunnel }
Transform set default-remote-node-bm-transform: { esp-3des esp-sha-hmac } will negotiate = { Transport, Tunnel }
Transform set default-aes: { esp-aes256 esp-sha-hmac }
AOS-W 6.2 | Reference Guide
show crypto ipsec | 947
will negotiate = { Transport, Tunnel } Transform set newset: { esp-3des esp-sha-hmac }
will negotiate = { Transport, Tunnel } Transform set name: { esp-aes256-gcm esp-sha-hmac }
will negotiate = { Transport, Tunnel }
Related Commands
Command crypto ipsec
Description
Mode
Use this command to configure IPsec parameters. Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
948 | show crypto ipsec
AOS-W 6.2 | Reference Guide
show crypto isakmp
show crypto isakmp eap-passthrough groupname key policy sa stats transports udpencap-behind-natdevice
Descriptions
This command displays Internet Key Exchange (IKE) parameters for the Internet Security Association and Key Management Protocol (ISAKMP).
Syntax
Parameter eap-passthrough groupname key policy
sa peer <peer-ip>
stats
Description
Display configured IKEv2 EAP Methods.
Show the IKE Aggressive group name.
Show the IKE pre-shared keys.
Show the following information for predefined and manually configured IKE policies: l IKE version l encryption and hash algorithms l authentication method l PRF methods, l DH group l lifetime settings
Show the security associations
Shows crypto isakmp security associations for this IP.
Show detailed IKE statistics. This information can be very useful for troubleshooting problems with ISAKMP.
Usage Guidelines
Use the show crypto isakmp command to ver ISAKMP settings, statistics and policies.
Examples
The command show crypto isakmp stats shows the IKE statistics.
(host) #show crypto isakmp stats
Default protection suite 10001 Version 1 encryption algorithm: 3DES - Triple Data Encryption Standard (168 bit keys) hash algorithm: Secure Hash Algorithm 160
AOS-W 6.2 | Reference Guide
show crypto isakmp | 949
authentication method: Pre-Shared Key Diffie-Hellman Group: #2 (1024 bit) lifetime: [300 - 86400] seconds, no volume limit Default RAP Certificate protection suite 10002 Version 1 encryption algorithm: AES - Advanced Encryption Standard (256 bit keys) hash algorithm: Secure Hash Algorithm 160 authentication method: Rivest-Shamir-Adelman Signature Diffie-Hellman Group: #2 (1024 bit) lifetime: [300 - 86400] seconds, no volume limit Default RAP PSK protection suite 10003 Version 1 encryption algorithm: AES - Advanced Encryption Standard (256 bit keys) hash algorithm: Secure Hash Algorithm 160 authentication method: Pre-Shared Key Diffie-Hellman Group: #2 (1024 bit) lifetime: [300 - 86400] seconds, no volume limit
Related Commands
Command crypto isakmp
Description
Use this command to configure Internet Key Exchange (IKE) parameters for the Internet Security Association and Key Management Protocol (ISAKMP).
Mode Config mode
Command History
Version AOS-W 3.0 AOS-W 6.1
Modification
Command introduced.
The eap-passthrough parameter was introduced. The output of the show crypto isakmp policy command displays the configured IKE version.
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
950 | show crypto isakmp
AOS-W 6.2 | Reference Guide
show crypto-local isakmp
show crypto isakmp {ca-certificates}|{dpd}|{key}|{server-certificate}|{xauth}
Descriptions
This command displays Internet Key Exchange (IKE) parameters for the Internet Security Association and Key Management Protocol (ISAKMP).
Syntax
Parameter ca-certificate certificate-group dpd key
server-certificate xauth
Description
Shows all the Certificate Authority (CA) certificate associated with VPN clients.
Shows the existing certificate groups by server certificate name and CA certificate.
Shows the IKE Dead Peer Detection (DPD) configuration on the local switch.
Shows the IKE preshared key on the local switch for site-to-site VPN. This is includes keys configured by Fully Qualified Domain Name (FQDN) and local and global keys configured by address.
Shows all the IKE server certificates used to authenticate the switch for VPN clients.
Shows the IKE XAuth configuration for VPN clients.
Usage Guidelines
Use the show crypto-local isakmp command to view IKE parameters.
Examples
This example shows sample output for the show crypto-local ca-certificate, show crypto-local dpd, show crypto-local key, show crypto-local server-certificate and show crypto-local xauth commands:
(host) #show crypto-local isakmp ca-certificate
ISAKMP CA Certificates
-----------------------
CA certificate name Client-VPN # of Site-Site-Maps
------------------- ---------- -------------------
Alcatel-Lucent-Factory-CA
Y
0
(host) #show crypto-local isakmp certificate-group
ISAKMP Certificate Groups -------------------------Server certificate name CA certificate name ----------------------- -------------------
(host) #show crypto-local isakmp dpd DPD is Enabled: Idle-timeout = 22 seconds, Retry-timeout = 2 seconds, Retry-attempts = 3
AOS-W 6.2 | Reference Guide
show crypto-local isakmp | 951
(host) #show crypto-local isakmp key ISAKMP Local Pre-Shared keys configured for ANY FQDN ----------------------------------------------------Key --ISAKMP Local Pre-Shared keys configured by FQDN -----------------------------------------------FQDN of the host Key ---------------- --servers.mycorp.com ********
ISAKMP Local Pre-Shared keys configured by Address
---------------------------------------------------
IP address of the host Subnet Mask Length Key
---------------------- ------------------ ---
10.4.62.10
32
********
ISAKMP Global Pre-Shared keys configured by Address
----------------------------------------------------
IP address of the host Subnet Mask Length Key
---------------------- ------------------ ---
0.0.0.0
0
********
(host) (config) #show crypto-local isakmp server-certificate
ISAKMP Server Certificates
---------------------------
Server certificate name
Client-VPN # of Site-Site-Maps
-----------------------
---------- -------------------
Alcatel-Lucent-Factory-Server-Cert-Chain RAP-only 0
(host) #show crypto-local isakmp xauth IKE XAuth Enabled.
Related Commands
Command
Description
Mode
crypto-local isakmp ca-certificate
Use this command to assign the Certificate Authority (CA) certificate used to authenticate VPN clients.
Config mode
crypto-local isakmp ca-certificate
Use this command to assign a certificate group so you can access multiple types of certificates on the same switch.
Config mode
crypto-local isakmp dpd
Use this command to configure IKE Dead Peer Detection (DPD) on the local switch.
Config mode
crypto-local isakmp key
Use this command to configure the IKE preshared key on the local switch for site-tosite VPN.
Config mode
crypto-local isakmp servercertificate
Use this command to assign the server certificate used to authenticate the switch for VPN clients.
Config mode
crypto-local isakmp xauth
Use this command to enable the IKE XAuth for VPN clients.
Config mode
952 | show crypto-local isakmp
AOS-W 6.2 | Reference Guide
Command History
Release AOS-W 3.4 AOS-W 6.1
Modification Command introduced. The show crypto-local isakmp certificate-group command was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show crypto-local isakmp | 953
show crypto-local pki
show crypto-local pki CRL [<name> ALL|crlnumber|fingerprint|hash|issuer|lastupdate|nextupdate] IntermediateCA [<name>ALL|alias|dates|fingerprint|hash|issuer|modulus|purpose|serial|subject]
OCSPResponderCert [<name>ALL|alias|dates|fingerprint|hash|issuer|modulus|purpose|serial|subject]
OCSPSignerCert [<name>ALL|alias|dates|fingerprint|hash|issuer|modulus|purpose|serial|subject]
PublicCert [<name>ALL|alias|dates|fingerprint|hash|issuer|modulus|purpose|serial|subject]
ServerCert [<name>ALL|alias|dates|fingerprint|hash|issuer|modulus|purpose|serial|subject]
TrustedCA [<name>ALL|alias|dates|fingerprint|hash|issuer|modulus|purpose|serial|subject]
crl-stats ocsp-client-stats rcp service-ocsp-responder [stats]
Descriptions
Issue this command to show local certificate, OCSP signer or responder certificate and CRL data and statistics.
Syntax
Parameter CRL
<CRL name> ALL <CRL name> crlnumber <CRL name> fingerprint <CRL name> hash <CRL name> issuer <CRL name> lastupdate <CRL name> nextupdate
IntermediateCA
Description
Shows the name, original filename, reference count and expiration status of all CRLs on this switch.
Shows the version, signature algorithm, issuer, last update, next update, and CRL extensions and all other attributes of this CRL.
Shows the number of this CRL.
Shows the fingerprint of this CRL.
Shows the hash number of this CRL.
Shows the issuer of this CRL.
Shows the last update (date and time) at which the returned status is known to be correct.
Shows the next date and time (date and time) where the responder retrieves updated status information for this certificate. If this information is not present, then the responder always holds up to date status information.
Shows the name, original filename, reference count and expiration status of this certificate.
954 | show crypto-local pki
AOS-W 6.2 | Reference Guide
Parameter
OSCPResponderCert
OCSPSignerCert
PublicCert
ServerCert
TrustedCA
<name> ALL <name> alias <name> dates <name> fingerprint <name> hash <name> issuer <name> modulus <name> purpose <name> serial <name> subject crl-stats ocsp-client-stats rcp service-ocsp-responder [stats]
Description
NOTE: IntermediateCA has the identical sub-parameters as those listed under the TrustedCA parameter in this table.
Shows the name, original filename, reference count and expiration status of all ocsprespondercert certificates on this switch. NOTE: OCSPResponderCert has the identical sub-parameters as those listed under the TrustedCA parameter in this table.
Shows the OCSP Signer certificate. NOTE: OCSPSignerCert has the identical sub-parameters as those listed under the TrustedCA parameter in this table.
Shows Public key information of a certificate. This certificate allows an application to identify an exact certificate. NOTE: PublicCert has the identical sub-parameters as those listed under the TrustedCA parameter in this table.
Shows Server certificate information. This certificate must contain both a public and a private key (the public and private keys must match). You can import a server certificate in either PKCS12 or x509 PEM format; the certificate is stored in x509 PEM DES encrypted format on the switch. NOTE: ServerCert has the identical sub-parameters as those listed under the TrustedCA parameter in this table.
Shows trusted CA certificate information. This certificate can be either a root CA or intermediate CA. Alcatel-Lucent encourages (but does not require) an intermediate CA's signing CA to be the switch itself.
Shows the version, signature algorithm, issuer, last update, next update, and CRL extensions and all other attributes of this certificate.
Shows this certificate's alias, if it exists.
Shows the dates for which this certificate is valid.
Shows the certificate's fingerprint.
Shows the hash number of this certificate.
Shows the certificate issuer.
Shows the modulus which is part of the public key of the certificate.
Shows the certificate's purposes such as if this is an SSL server, SSL server CA and so on.
Shows the certificate's serial number.
Shows the certificate's subject identification number.
Shows the CRL request statistics.
Shows the OCSP client statistics.
Shows the revocation check point.
Shows if OCSP responder service is enabled and shows statistics.
AOS-W 6.2 | Reference Guide
show crypto-local pki | 955
Usage Guidelines
Use the show crypto-local pki command to view all CRL and certificate status, OCSP client and OCSP responder status and statistics.
Example
This example displays a list of all OCSP responder certificates on this switch.
(host) (config) #show crypto-local pki OCSPResponderCert
Certificates -----------Name -------------ocspJan28 ocspresp-standalone-feb21 ocsprespFeb02 OCSPresponder1 ocspresponder2 OCSPresponderlatest
Original Filename ----------------ocspresp-jan28.cer ocspresp-feb21.cer ocspresp-feb2.cer ocspresponder-new1.cer subsubCA-ocsp-res-2.cer ocspresponder-latest.cer
The output of this command includes the following parameters:
Reference Count --------------0 0 1 0 0 0
Expired ------No No No No No No
Parameter Name Original Filename Reference Count
Expired
Description
Name of the OCSP responder certificate.
Name of the original certificate when it was added to the switch.
Number of RCPs that reference this OCSP responder certificate, signer certificate or CRL.
Shows whether the switch has enabled or disabled client remediation with Sygate-on-demand-agent.
This example shows the dates for which this OCSP responder certificate is valid.
(host) (config) #show crypto-local pki OCSPResponderCert ocspJan28 dates notBefore=Jan 21 02:37:47 2011 GMT notAfter=Jan 20 02:37:47 2013 GMT
This example displays the certificate's hash number. (host) (config) #show crypto-local pki OCSPResponderCert ocspJan28 hash 91dcb1b3
This example shows the purpose and information about this certificate. (host) (config) #show crypto-local pki OCSPResponderCert ocspJan28 purpose Certificate purposes:For validation SSL client : No SSL client CA : No SSL server : No SSL server CA : No Netscape SSL server : No Netscape SSL server CA : No S/MIME signing : No S/MIME signing CA : No S/MIME encryption : No S/MIME encryption CA : No
956 | show crypto-local pki
AOS-W 6.2 | Reference Guide
CRL signing : No CRL signing CA : No Any Purpose : Yes Any Purpose CA : Yes OCSP helper : Yes OCSP helper CA : No
This example displays the certificate's subject.
(host) (config) #show crypto-local pki OCSPResponderCert ocspJan28 subject subject= /CN=WIN-T1BQQFMVDED.security1.qa.mycorp.com
Related Commands
Command crypto-local pki
crypto-local pkircp <name>
Description
Mode
This command is saved in the configuration file and verifies the presence of the certificate in the switch's internal directory structure.
Config mode
Specifies the certificates that are used to sign OCSP responses for this revocation check point
Config mode
Command History
Version AOS-W 3.2 AOS-W 6.1
Modification
Command introduced.
The following parameters were introduced: l CRL l Intermediate CA l OCSPResponderCert l OCSPSignerCert l global-ocsp-signer-cert l rcp l service-ocsp-responder
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode
AOS-W 6.2 | Reference Guide
show crypto-local pki | 957
show crypto map
show crypto ipsec map
Descriptions
This command displays the IPsec map configurations.
Syntax
Parameter map
Description
Usage Guidelines
Use the show crypto map command to view configuration for global, dynamic and default map configurations.
Examples
The command show crypto map shows statistics for the global, dynamic and default maps.
(host) #show crypto map
Crypto Map "GLOBAL-MAP" 10000 ipsec-isakmp Crypto Map Template"default-dynamicmap" 10000
IKE Version: 1 lifetime: [300 - 86400] seconds, no volume limit PFS (Y/N): N Transform sets={ default-transform, default-aes } Crypto Map "GLOBAL-IKEV2-MAP" 10000 ipsec-isakmp Crypto Map "default-local-master-ipsecmap" 9999 ipsec-isakmp Crypto Map Template"default-local-master-ipsecmap" 9999 IKE Version: 1 lifetime: [300 - 86400] seconds, no volume limit PFS (Y/N): N Transform sets={ default-ml-transform } Peer gateway: 10.4.62.9 Interface: VLAN 0 Source network: 172.16.0.254/255.255.255.255 Destination network: 10.4.62.9/255.255.255.255 Pre-Connect (Y/N): Y Tunnel Trusted (Y/N): Y Forced NAT-T (Y/N): N
Related Commands
Command
crypto map globalmap
Description
Use this command to configure the default global map.
Mode Config mode
958 | show crypto map
AOS-W 6.2 | Reference Guide
Command History
Version AOS-W 3.0 AOS-W 6.1
Modification Command introduced. The output of this command displays the configured IKE version for the map.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show crypto map | 959
show crypto pki
show crypto pki csr
Descriptions
This command displays the certificate signing request (CSR) for the captive portal feature.
Syntax
Parameter csr
Description
Usage Guidelines
Use the show crypto pki command to view the CSR output.
Examples
The command show crypto pki shows output from the crypto pki csr command.
(host) #show crypto pki csr
Certificate Request: Data: Version: 0 (0x0) Subject: C=US, ST=CA, L=Sunnyvale, O=sales, OU=EMEA,
CN=www.mycompany.com/emailAddress=myname@mycompany.com Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (1024 bit) Modulus (1024 bit): 00:e6:b0:f2:95:37:d0:18:c4:ee:f7:bd:5d:96:85: 49:a3:56:63:76:ee:99:82:fe:4b:31:6c:80:25:c4: ed:c7:9e:8e:5e:3e:a2:1f:90:62:b7:91:69:75:27: e8:29:ba:d1:76:3c:0b:14:dd:83:3a:0c:62:f2:2f: 49:90:47:f5:2f:e6:4e:dc:c3:06:7e:d2:51:29:ec: 52:8c:40:26:de:ae:c6:a0:21:1b:ee:46:b1:7a:9b: dd:0b:67:44:48:66:19:ec:c7:f4:24:bd:28:98:a2: c7:6b:fb:b6:8e:43:aa:c7:22:3a:b8:ec:9a:0a:50: c0:29:b7:84:46:70:a5:3f:09 Exponent: 65537 (0x10001) Attributes: a0:00
Signature Algorithm: sha1WithRSAEncryption 25:ce:0f:29:91:73:e9:cd:28:85:ea:74:7c:44:ba:b7:d0:5d: 2d:53:64:dc:ad:07:fd:ed:09:af:b7:4a:7f:14:9a:5f:c3:0a: 8a:f8:ff:40:25:9c:f4:97:73:5b:53:cd:0e:9c:d2:63:b8:55: a5:bd:20:74:58:f8:70:be:b9:82:4a:d0:1e:fc:8d:71:a0:33: bb:9b:f9:a1:ee:d9:e8:62:e4:34:e4:f7:8b:7f:6d:3c:70:4c: 4c:18:e0:7f:fe:8b:f2:01:a2:0f:00:49:81:f7:de:42:b9:05: 59:7c:e4:89:ed:8f:e1:3b:50:5a:7e:91:3b:9c:09:8f:b7:6b: 98:80
-----BEGIN CERTIFICATE REQUEST----MIIB1DCCAT0CAQAwgZMxCzAJBgNVBAYTAlVTMQswCQYDVQQIEwJDQTESMBAGA1UE BxMJU3Vubnl2YWxlMQ4wDAYDVQQKEwVzYWxlczENMAsGA1UECxMERU1FQTEaMBgG A1UEAxMRd3d3Lm15Y29tcGFueS5jb20xKDAmBgkqhkiG9w0BCQEWGXB3cmVkZHlA
960 | show crypto pki
AOS-W 6.2 | Reference Guide
YXJ1YmFuZXR3b3Jrcy5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAOaw 8pU30BjE7ve9XZaFSaNWY3bumYL+SzFsgCXE7ceejl4+oh+QYreRaXUn6Cm60XY8 CxTdgzoMYvIvSZBH9S/mTtzDBn7SUSnsUoxAJt6uxqAhG+5GsXqb3QtnREhmGezH 9CS9KJiix2v7to5DqsciOrjsmgpQwCm3hEZwpT8JAgMBAAGgADANBgkqhkiG9w0B AQUFAAOBgQAlzg8pkXPpzSiF6nR8RLq30F0tU2TcrQf97Qmvt0p/FJpfwwqK+P9A JZz0l3NbU80OnNJjuFWlvSB0WPhwvrmCStAe/I1xoDO7m/mh7tnoYuQ05PeLf208 cExMGOB//ovyAaIPAEmB995CuQVZfOSJ7Y/hO1BafpE7nAmPt2uYgA==
-----END CERTIFICATE REQUEST-----
Related Commands
Command crypto pki
crypto pki-import
Description
Use this command to generate a certificate signing request (CSR) for the captive portal feature.
Use this command to import certificates for the captive portal feature.
Mode Enable mode
Enable mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show crypto pki | 961
show database
show database synchronization
Description
Shows database synchronization status.
Syntax
No parameters.
Usage Guidelines
Issue this command to show the status database synchronization status.
Example
This example shows a database synchronization status. (host) #show database synchronize Last synchronization time: Not synchronized since last reboot Periodic synchronization is enabled and runs every 25 minutes Synchronization includes RF plan data
Related Commands
Command
Description
database synchronize Show the output of the database synchronize command.
Mode Enable and Config modes
Command History
Release AOS-W 3.0
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master and local switches
962 | show database
AOS-W 6.2 | Reference Guide
show datapath
show
acl id <id-name> {ap-name <ap-name>}|{ip-addr <ip-address>} application {ap-name <ap-name>|counters|ip-addr <ip-address>} bridge {ap-name <ap-name>|counters|ip-addr <ip-address>|table} bwm table cp-bwm crypto debug {dma counters|epa|opcode|performance|pkttrace-buffer| trace-buffer|trace-route} dhcp {vm-mac} error [counters] esi table exthdr firewall-agg-sess [counters] fqdn frame {ap-name <ap-name>|counters|ip-addr <ip-address>} hardware {counters|statistics} internal dir <dir>|file <file> ip-fragment-table {ipv4|ipv6} ip-mcast ip-reassembly {ap-name <ap-name>|counters|ip-addr <ip-address>|ipv4|ipv6} ipv6-mcast lag table maintenance counters message-queue counters nat {ap-name <ap-name>|counters|ip-addr <ip-address>} network ingress papi port rap-bw-resv rap-css rap-pkt-trace rap-stats route {ap-name <ap-name>|counters|ip-addr <ip-address>]|ipv4|ipv6|table|verbose} route-cache {ap-name <ap-name>|counters|ip-addr <ip-address>|ipv4|ipv6|table|verbose} services session {ap-name <ap-name>|counters}|{ip-addr <ip-address>|ipv6|table} station [counters|mac <macaddr>|table] tcp {app <app>|counters|tunnel} tunnel [counters|ipv4|ipv6|station-list|table] user {ap-name <ap-name>|counters|ip-addr <ip-address>|ipv4|ipv6|table} utilization vlan {ap-name <ap-name>}|{ip-addr <ip-address>|table} vlan-mcast wifi-reassembly counters wmm counters
Descriptions
Displays system statistics for your switch.
AOS-W 6.2 | Reference Guide
show datapath | 963
Syntax
Parameter acl id <id-name>
ap-name <ap-name> ip-addr <ip-address> application counters
ap-name <ap-name> ip-addr <ip-address> bridge ap-name <ap-name> counters
ip-addr <ip-address> table <macaddr> bwm table cp-bwm crypto counters
debug dma counters eap opcode performance pkttrace-buffer
Description
Displays datapath statistics associated with a specified ACL. The ACL index is found in the show rights command.
Name of the AP.
IP address of the AP
Shows application counters and errors generated by applications running on a particular AP. These include stateful firewall application layer statistics.
Name of the AP.
IP address of the AP.
Shows bridge table entry statistics including MAC address, VLAN, assigned VLAN, Destination and flag information for an AP.
Name of the AP. Shows MAC address, VLAN, assigned VLANs, destination and flags information.
Shows datapath bridge table statistics such as current entries, high water mark, maximum entries, total entries, allocation failures and max link length.
IP address of the AP. Shows MAC address, VLAN, assigned VLANs, destination and flags information.
Displays the current high, maximum, and total number of bridge table entries for the Alcatel-Lucent switch.
Shows bandwidth management table entry statistics such as CPU, contract, Bits/sec, policed, available bytes, queued bytes and packets.
Displays the data path CP bandwidth management table information.
Displays crypto parameter statistics including crypto, IPsec, PPTP, WEP, TKIP, AESCCM encryption and decryptions, WEP CRC, crypto hardware, XSEC, DOT1X and L2TP information.
Displays datapath debug details. These are low-level datapath details.
DMA counters are displayed.
EAP termination statistics displayed.
Displays datapath debugging information. Use this command only under the supervision of Alcatel-Lucent technical support.
Datapath performance counters. By default, combined statistics of all CPUs are shown.
Packet trace buffer statistics.
964 | show datapath
AOS-W 6.2 | Reference Guide
Parameter trace-buffer trace-route
dhcp vm-mac
error counters
esi table exthdr
firewall-agg-sess counters
fqdn frame counters
ap-name <ap-name> ip-addr <ip-address> hardware internal dir <dir> file <file> ip-fragment-table ipv4 ipv6
Description
Debug trace-buffer tables are displayed.
Route cache tracing statistics are displayed.
Datapath DHCP -related information.
Datapath of the VM to host client mac
Datapath error statistic errors.
Show datapath errors including SUM, CPU, Addr and description information.
Displays the contents of the datapath ESI server table entries including server, IP, MAC, destination, VLAN, type, session and flag information.
Displays the datapath default IPv6 Extended Header Map.
Displays the datapath firewall aggregated sessions table.
Displays the datapath aggregate session statistics.
Displays datapath FQDN entries.
Displays frame statistics that are received and transmitted from the data path of the switch. Several output fields include the following descriptions: l Descr failures-This is the number of times a packet descriptor was not
available and the packet dropped. l Dot1QDiscards-The number of packets received on a trunk port where
the VLAN presented did not match any configured on the switch and the packet dropped. l Dot1d Discards-Spanning tree is disabled and each BPDU frame is counted and dropped. l Denied Frames-Frames that are denied by the ACL's data path of the switch.
Name of the AP.
IP address of the AP.
Displays datapath hardware counters and hardware packet statistics information.
Internal details are displayed.
Hardware directory
File in the directory.
Displays ip-fragment statistics including CPU, current entries, high water mark, max , total, and aged entries.
Displays IPv4 fragment statistics.
Displays IPv6 fragment statistics.
AOS-W 6.2 | Reference Guide
show datapath | 965
Parameter counters statistics
ip-mcast destination group
ip-reassembly ap-name <ap-name> counters ip-addr <ip-address> ipv4 ipv6
ipv6-mcast destination group
lag table
message-queue counters
maintenance counters nat
network ingress ap-name <ap-name> counters ip-addr <ip-address>
port
link-event
Description
Hardware counters.
Hardware packet statistics.
Displays the data path IP multicast table statistics. These include source, group. VLAN and destination.
Displays the contents of the IP Reassembly statistics tables.
Name of the AP.
IP reassembly counters.
IP address of the AP
Displays the IPv4 contents of the IP Reassembly statistics table.
Displays the IPv6 contents of the IP Reassembly statistics table.
Displays the data path IP multicast table statistics. These include source, group. VLAN and destination.
Displays contents of the datapath link aggregation group (LAG) or port channel table.
Displays statistics of messages received by a CPU from other datapath CPUs (only CPUs that receive messages and non-zero statistics are shown).
Displays datapath maintenance statistics.
Displays the contents of the datapath NAT entries table. It displays NAT pools as configured in the datapath. Statistics include pool, SITP start, SIP end and DIP.
Displays ingress queue counters.
Name of AP.
Nat counters.
IP address of the AP.
Displays the datapath port table information. This includes the port number, PVID, Ingress ACL, Egress ACL, Session ACL, and the following flags: l Q: trunk l T: trusted l B: blocked by the Spanning Tree protocol l L: LSG l M: tunneled node l X: xSec l Z: QinQ
Displays port link up and link down event counters.
966 | show datapath
AOS-W 6.2 | Reference Guide
Parameter monitor stats <slot/port> status <slot/port> trusted tunneled-node untrusted-vlan <slot/port> xsec
rap-bw-resv ap-name ip-addr
rap-pkt-trace ap-name ip-addr
rap-stats ap-name ip-addr
route ap-name <ap-name> counters
ip-addr <ip-address> ipv4 ipv6 table
verbose
route-cache ap-name <ap-name> counters
ip-addr <ip-address> ipv4
Description Displays the monitor port configuration. Displays the physical port statistics. Displays the physical port status. Displays the the trusted ports. Displays the the tunneled node ports. Show if there are untrusted vlan entries for the indicated slot and port.
Displays the xsec ports. Displays the remote AP uplink BW reservation statistics of the RAP only.
Displays the remote AP packet-trace statistics of the RAP only.
Displays the remote AP statistics of the RAP only.
Displays datapath route table statistics. Name of the AP. Displays route table statistics such as current entries, high water mark, maximum entries, total entries, allocation failures and max link length. IP address of the AP. Displays datapath IPv4 routing table. Displays datapath IPv6 routing table. Displays route table entries such as IP, mask, gateway, cost, VLAN and flags. Displays all detailed route table entries including IP, mask, gateway, cost, VLAN, flags, Internal VerNum Index. Displays datapath route cache table statistics. Name of the AP. Displays route cache table statistics such as current entries, high water mark, maximum entries, total entries, allocation failures and max link length. Address of IP. Displays datapath IPv4 route cache.
AOS-W 6.2 | Reference Guide
show datapath | 967
Parameter ipv6 table verbose
services session
ap-name <ap-name> counters
ip-addr <ip-address> ipv6
table
station counters
mac <macaddr> tcp
app <app> counters tunnel table
Description
Displays datapath IPv6 route cache.
Displays route cache table entries such as IP, mask, gateway, cost, VLAN and flags.
Displays all detailed route cache table entries including IP, mask, gateway, cost, VLAN, flags, Internal VerNum Index.
Displays the datapath services table statistics including protocol, port and service.
Displays datapath session statistics
Name of AP
Displays counters statistics including current entries, high water mark, maximum entries, total entries, allocation failures, duplicate entries, cross linked entries, number of reverse entries and maximum link length.
IP address of the AP.
Displays datapath IPv6 session entries and statistics including current entries, high water mark, maximum entries, total entries, allocation failures, duplicate entries, cross linked entries, number of reverse entries and maximum link length.
Displays all the IP flows of a wireless device or Alcatel-Lucent AP. Statistics include table entries including source IP, destination IP, protocol, SPort, DPort, Cntr, priority, ToS, age, destination, TAge and flags.
Displays datapath station association table statistics.
Display the current and high water mark amount of 802.11 associated wireless devices on an Alcatel-Lucentswitch. Values output from this command represent the water-marks since the last boot of the switch. This is the same value obtainable from the Num Associations output from the show stm connectivity command.
Hardware address, in hexadecimal format.
Displays contents of the tcp tunnel table. This command displays all tcp tunnels that are terminated by the switch,
Name of the application.
Displays the tcp tunnel statistics.
Displays the tcp tunnel table.
This command displays the Datapath Station Table Statistics detail. Display all associated wireless devices on the Alcatel-Lucentswitch with their corresponding AP BSSID and VLAN ID. Displays the wireless device is associated with the correct encryption type (if the device is associated to an AP BSSID that has encryption enabled and verifies whether the Alcatel-Lucentswitch is having a problem in decrypting the wireless device's frames.
968 | show datapath
AOS-W 6.2 | Reference Guide
Parameter tunnel
counters ipv4 ipv6 station-list table user
ap-name <ap-name> counters ip-addr <ip-address> ipv4
ipv6
table utilization vlan
ap-name <ap-name> ip-addr <ip-address> table vlan-mcast ap-name <ap-name> ip-addr <ip-address> table wifi-reassembly counters
wmm counters
Description
Displays contents of the datapath tunnel table. This command displays all the tunnels that are terminated by the switch, including Alcatel-Lucent APs' GRE tunnels. For example, a GRE tunnel is created and terminated on the Alcatel-Lucentswitch for every SSID/BSSID configured on the Alcatel-Lucent AP.
Tunnel counters.
Displays the tcp tunnel table filtered on IPv4 entries.
Displays the tcp tunnel table filtered on IPv6 entries.
Displays the list of stations on the tunnel.
Tunnel table statistics.
Displays datapath user statistics such as current entries, pending deletes, high water mark, maximum entries, total entries, allocation failures, invalid users and maximum link length.
Name of AP.
User counters.
IP address of the AP.
Displays datapath IPv4 user entries and statistics such as current entries, pending deletes, high water mark, maximum entries, total entries, allocation failures, invalid users, and maximum link length.
Displays datapath IPv6 user entries and statistics such as current entries, pending deletes, high water mark, maximum entries, total entries, allocation failures, invalid users, and maximum link length.
User table statistics.
Displays the current CPU utilization of all datapath CPUs.
Displays VLAN table information such as VLAN memberships inside the datapath including L@ tunnels which tunnel L2 traffic.
Name of the AP.
IP address of AP.
Displays VLAN number, flag, port and datapath VLAN multicast entries.
Displays the datapath VLAN multicast table.
Name of the AP.
IP address of AP.
Displays datapath VLAN Multicast table entries.
Displays wifi reassembly counters including CPU, current entries, high water-mark, maximum entries, total entries and allocation failures.
Displays VOIP statistics including the number of uplink and downlink resets.
AOS-W 6.2 | Reference Guide
show datapath | 969
Usage Guidelines
Use the show datapath command to display various datapath statistics for debugging purposes.
Example
The following example displays a partial list of cyrpto parameter statistics. .(host) (config) #show datapath crypto counters
Datapath Crypto Statistics
--------------------------
Crypto Accelerator
Present
Crypto Cores In Use
1
Crypto Cores Total
4
Crypto Requests Total
16
Crypto Requests Queued
0
Crypto Requests Failed
0
Crypto Timeouts
0
Crypto NoCoreFree
0
Crypto BadNPlus
0
Crypto SendNPlusFailed
0
IPSec Encryption Failures 0
IPSec Decryption Failures 0
IPSec Decryption Loops
0
IPSec Decryption BufFail 0
IPSec Decr SPI(client) ERR 0
IPSec Decrypt SA Not Ready 0
IPSec Frag Failures
0
IPSec Bad Pad Length
0
IPSec Invalid TCP Index 0
IPSec Invalid Length
0
IPSec Invalid Head-Room 0
IPSec Invalid Protocol
0
PPTP Encryption Failures 0
PPTP Decryption Failures 0
WEP Encryption Failures 0
WEP Decryption Failures 0
WEP No Key (not serious) 0
TKIP Encryptions
0
TKIP Encryption Failures 0
TKIP Decryptions
0
TKIP Decryption Failures 0
TKIP MIC Failures 0
TKIP Decrypt Bad Counter 0
TKIP P1Key Not Ready
0
...
Command History
Version AOS-W 3.0 AOS-W 5.0
Description Command introduced. The tcp parameter was introduced.
970 | show datapath
AOS-W 6.2 | Reference Guide
Version AOS-W 6.1
AOS-W 6.1.3.2 AOS-W 6.2
Description
The crypto counters parameter now displays a number of TKIP/AESCCM/AESGCM decriptions per priority level along with any counter errors per priority. The ipv6 filter option is added to the following parameters in the command: l session l tunnel l user l route-cache l route l ip-reassembly
The debug opcode parameter was introduced. Issue this command only under the supervision of Alcatel-Lucent technical support.
The firewall-agg-sess parameter is introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show datapath | 971
show destination
show destination <string>
Description
Display the aliases for default and user-defined network destinations.
Syntax
Parameter string
Description Optional parameter to view details of a specific destination alias.
Example
This example displays the network destinations configured in the switch.
(host) #show destination
switch
----------
Position Type IP addr
-------- ---- -------
1
host 10.16.15.1
Mask/Range ----------
user ---Position -------1
Type ---network
IP addr ------255.255.255.255
Mask/Range ---------0.0.0.0
mswitch ------Position -------1
Type ---host
IP addr ------10.16.15.1
Mask/Range ----------
any --Position -------1
Type ---network
IP addr ------0.0.0.0
Mask/Range ---------0.0.0.0
The output of this command includes the following parameters:
Parameter Position Type IP addr
Mask/Range
Description Displays the priority position of the alias. The rule type of the destination alias. The IP address configured in the alias. This can be a network address, host address or a range. Network mark or the IP address range.
972 | show destination
AOS-W 6.2 | Reference Guide
Command History
This command was available in AOS-W 1.0. Replaced with netdestination in 3.0.
Command Information
Platforms All platforms
Licensing
Command Mode
You must have a PEFNG license to configure or view a destination.
Enable or Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show destination | 973
show dialer group
crypto-local show dialer group
Description
Display dialer group information.
Syntax
No parameters.
Usage Guidelines
Displays the Dialer Group Table with the current dialing parameters.
Example
(host) #show dialer group
Dialer Group Table
------------------
Name
Init String
----
-----------
evdo_us ATQ0V1E0
gsm_us AT+CGDCONT=1,"IP","ISP.CINGULAR"
Dial String ----------ATDT#777 ATD*99#
Command History
Introduced in AOS-W 3.4.
Command Information
Platforms OAW-4306 Series switches
Licensing Base operating system
Command Mode Config mode on master and local switches
974 | show dialer group
AOS-W 6.2 | Reference Guide
show dir
crypto-local show dir usb: disk <disk-name><filesystem-path>
Description
Display the list of directories in the specified disk and the filesystem path.
Syntax
Parameter <disk-name>
<filesystem-path>
Description
Name of the USB device. If you do not know the name of the USB disk, issue the command show usb-storage to view a list of device names.
The USB file system path.
Example
The command below displays the USB directory list for a device named SEGATE-HJ1235_p1.
(host) #(show dir usb: SEGATE-HJ1235_p1/docs
USB directory list
------------------
Permission
Size
----------
----
drwxr-xr-x
0
Time Stamp Directory Name -------------- --------------
May 13 09:39 samba
The output of this command includes the following parameters:
Parameter Permission Size Time Stamp Directory Name
Description Read, write and execute permissions for the directory. Size of the directory. Date and time that the directory was last modified. Name of the directory on the USB device.
Command History
This command was introduced in AOS-W 3.4.
Command Information
Platforms OAW-4306 Series switches
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show dir | 975
show dot1x ap-table
show dot1x ap-table
Description
Shows the 802.1X AP table.
Syntax
No parameters.
Example
Issue this command to display details from the AP table.
AP Table
--------
MAC
IP
Essid
Type AP name
Vlan Enc
Stations
Forwarding-Mode
Profile
Acl
---
--
-----
---- -------
---- ---
-------- ---
------------
-------
---
00:1a:1e:87:ff:c0 10.3.9.242
AP 00:1a:1e:c0:7f:fc 0 -
0
FORWARD_TUNNEL_80211 default/
1
00:1a:1e:87:ff:d0 10.3.9.242 sw-pn-nokia AP 00:1a:1e:c0:7f:fc 0 WPA2-AES
0
FORWARD_TUNNEL_80211 default/default 1
00:1a:1e:82:ab:a0 10.3.9.220
AP monitor-124
0-
0
FORWARD_TUNNEL_80211 default/
1
00:1a:1e:82:ab:b0 10.3.9.220
AP monitor-124
0-
0
FORWARD_TUNNEL_80211 default/
1
00:1a:1e:87:ff:d1 10.3.9.242 sw-pn-t2 AP 00:1a:1e:c0:7f:fc 0 WPA2-PSK-AES 0
FORWARD_TUNNEL_80211 default/default 1
Num APs: 5
The output of this command includes the following parameters:
Parameter MAC IP Essid Type AP name Vlan Enc Stations Forwarding Mode Profile Acl
Description The MAC address of the AP The IP address of the AP The AP's ESSID Device type Name of the AP Number of VLANs associated with the specified AP AP's encryption method Number of stations associated with the specified AP Forwarding mode used by the specified AP AP profile Number of ACLs this AP belongs to
976 | show dot1x ap-table
AOS-W 6.2 | Reference Guide
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
AOS-W 6.2 | Reference Guide
show dot1x ap-table | 977
show dot1x ap-table aes
show dot1x ap-table aes
Description
Shows the AES keys of all APs.
Syntax
No parameters.
Example
Issue this command to display AES keys of all APs.
AP Table Showing AES Keys
-------------------------
AP-MAC
GTK/Size/Slot
------
-------------
00:1a:1e:87:ff:d0 * * * * * * * */128-Bit/1
00:1a:1e:87:ff:d1 * * * * * * * */128-Bit/1
The output of this command includes the following parameters:
Parameter AP-MAC GTK/Size/Slot
Description
AP MAC address
GTK: The group temporal key Size: Size of the AES key Slot: Slot number
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
978 | show dot1x ap-table aes
AOS-W 6.2 | Reference Guide
show dot1x ap-table dynamic-wep
show dot1x ap-table dynamic-wep
Description
Shows the dynamic WEP keys of all APs.
Syntax
No parameters.
Example
Issue this command to display dynamic keys of all APs. Dynamic-WEP Key Information --------------------------AP-MAC Key1/Size/Slot Key2/Size/Slot ------ -------------- -------------Num APs: 0
The output of this command includes the following parameters:
Parameter AP-MAC Key1/Size/Slot
Key12/Size/Slot
Description
AP MAC address
Key1: The WEP key Size: Size of the WEP key Slot: Slot number
Key2: The WEP key Size: Size of the WEP key Slot: Slot number
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
AOS-W 6.2 | Reference Guide
show dot1x ap-table dynamic-wep | 979
show dot1x ap-table static-wep
show dot1x ap-table static-wep
Description
Shows the static WEP keys of all APs.
Syntax
No parameters.
Example
Issue this command to display the static WEP keys of all APs.
Static-WEP Key Information -------------------------AP-MAC Key1/Size Key2/Size ------ --------- --------Num APs: 0
Key3/Size ---------
Key3/Size ---------
The output of this command includes the following parameters:
Parameter AP-MAC Key1/Size Key2/Size Key3/Size Key3/Size
Description AP's MAC address WEP key 1 and its size WEP key 2 and its size WEP key 3 and its size WEP key 3 and its size
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
980 | show dot1x ap-table static-wep
AOS-W 6.2 | Reference Guide
show dot1x ap-table tkip
show dot1x ap-table tkip
Description
Displays a table of TKIP keys on the switch.
Syntax
No parameters.
Example
Issue this command to display all TKIP keys.
AP Table Showing TKIP Keys
--------------------------
AP-MAC
GTK/Size/Slot
------
-------------
00:1a:1e:6f:e5:10 * * * * * * * */256-Bit/1
Num APs: 1
The output of this command includes the following parameters:
Parameter AP-MAC GTK/Size/Slot
Description
AP MAC Address
GTK: The group temporal key Size: Size of the AES key Slot: Slot number
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
AOS-W 6.2 | Reference Guide
show dot1x ap-table tkip | 981
show dot1x counters
show dot1x counters
Description
Displays a table of dot1x counters.
Example
Issue this command to display all 802.1X counter information. 802.1x Counters
AP Sync Request...................4 Sync Response..................3 Up.............................4 Down...........................1 Resps..........................4 Acl............................53
Station Sync Request...................9 Sync Response..................9 Up.............................2321 Down...........................2272 Unknown........................72
EAP RX Pkts........................4811 Dropped Pkts...................4497 TX Pkts........................5253
WPA Message-1......................2484 Message-2......................63 Message-3......................63 Message-4......................63 Group Message-1................63 Group Message-2................63 Rx Failed......................2418 IE Mismatches..................4836 Key Exchange Failures..........602
WPA2 Message-1......................2630 Message-2......................13 Message-3......................13 Message-4......................13 Rx Failed......................2079 IE Mismatches..................4158 Key Exchange Failures..........549
Radius Accept.........................1217
Station Deauths.................1151
The output of this command includes the following parameters:
982 | show dot1x counters
AOS-W 6.2 | Reference Guide
Parameter
AP l Sync Request l Sync Response l Up l Down l Resps l Acl
Station l Sync Request l Sync Response l Up l Down l Unknown
EAP l RX Pkts l Dropped Pkts l TX Pkts
WPA l Message-1 l Message-2 l Message-3 l Message-4 l Group Message-1 l Group Message-2 l Rx Failed l IE Mismatches l Key Exchange
Failures
WPA2 l Message-1 l Message-2 l Message-3 l Message-4 l Rx Failed l IE Mismatches l Key Exchange
Failures
Radius Accept
Station Deauths
Description
l Number of sync requests sent l Number of sync responses sent l Number of times an AP has come up l Number of times an has gone down l Number of response messages sent to the AP due to an AP up message l Number of access control lists
l Number of sync requests sent to find all APs and stations that are connected l Number of sync responses received l Number of times a station (any station) connected to the AP l Number of times a station (any station) disconnected from the AP l Number of times a station attempted to start an EAP exchange before
associating to an AP. In other words, the number of times the auth module saw the start of an EAP exchange before auth was notified that a station has associated an AP
l Number of EAP packets received l Number of EAP packets dropped (ignored) for any reason, such as bad packet,
length, EAP ID mismatch, etc. l Number of EAP packets sent
l Number of WPA message-1s sent l Number of WPA message-2s sent l Number of WPA message-3s sent l Number of WPA message-4s sent l Number of WPA group message-1s sent l Number of WPA group message-2s sent l Number of WPA related EAP packets dropped for any reason l Number of WPA related EAP packets dropped because the station and switch
have a different perception of what the connection details are l Number of key exchange failures
l Number of WPA2 message-1s sent l Number of WPA2 message-2s sent l Number of WPA2 message-3s sent l Number of WPA2 message-4s sent l Number of WPA2 related EAP packets dropped for any reason l Number of WPA2 related EAP packets dropped because the station and switch
have a different perception of what the connection details are l Number of key exchange failures
Number of RADIUS accepts
Number of stations deaths
Command History
This command was introduced in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show dot1x counters | 983
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
984 | show dot1x counters
AOS-W 6.2 | Reference Guide
show dot1x supplicant-info
show dot1x supplicant-info <supplicant-mac> <ap-mac>
Description
Shows the details about a specific supplicant.
Example
Issue this command to display the details about a supplicant.
Name MAC Address AP MAC Address Status Unicast Cipher Multicast Cipher EAP-Type Packet Statistics: EAPOL Starts EAP ID Requests EAP ID Responses EAPOL Logoffs from station EAP pkts to the station EAP pkts from station Unknown EAP pkts from station EAP Successes sent EAP Failures sent Station failed to respond Station NAKs Radius pkts to the server Radius pkts from the server Server failed to respond Server rejects WPA/WPA2-Key Message1 WPA/WPA2-Key Message2 WPA/WPA2-Key Message3 WPA/WPA2-Key Message4 WPA-GKey Message1 WPA-GKey Message2 ID of the last EAP request Length of the last EAP request ID of the last EAP response Length of the last EAP response ID of the last radius request Length of the last radius request ID of the last radius response
MYCORPNETWORKS\ccutler 00:19:7e:a9:8e:b0 00:1a:1e:11:5f:11 Authentication Success WPA2-AES WPA2-AES EAP-PEAP
0 0 0 0 2 2 0 0 0 0 0 0 0 0 0 1 1 1 1 0 0 0 151 0 0 0 0 0
The output of this command includes the following parameters:
Parameter Name MAC Address
Description Supplicant name. Supplicant MAC address.
AOS-W 6.2 | Reference Guide
show dot1x supplicant-info | 985
Parameter
Description
AP MAC Address
AP MAC address.
Status
Supplicant's status.
Unicast Cipher
Supplicant's unicast cipher.
Multicast Cipher
Supplicant's multicast cipher.
EAP-Type
Supplicant's EAP-Type.
EAPOL Starts
Number of EAPOL starts.
EAP ID Requests
Number of EAP ID requests.
EAP ID Responses
Number of EAP ID responses.
EAPOL Logoffs from station
Number of EAPOL logoffs from the station.
EAP pkts to the station
Number of EAP packets sent to the station.
EAP pkts from station
Number of EAP packets sent from the station.
Unknown EAP pkts from station Number of unknown EAP packets sent from the station.
EAP Successes sent
Number of EAP successes sent.
EAP Failures sent
Number of EAP failures sent.
Station failed to respond
Number of times the station failed to respond.
Station NAKs
Number of station negative-acknowledgement characters.
Radius pkts to the server
Number of radius packets set to the server.
Radius pkts from the server
Number of radius packets sent from the server.
Server failed to respond
Number of times the server failed to respond.
Server rejects
Number of times ac connection was rejected by the server.
WPA/WPA2-Key Message1
Number of WPA message-1s sent.
WPA/WPA2-Key Message2
Number of WPA message-2s sent.
WPA/WPA2-Key Message3
Number of WPA message-3s sent.
WPA/WPA2-Key Message4
Number of WPA message-4s sent.
WPA-GKey Message1
Number of WPA group message-1s sent.
WPA-GKey Message2
Number of WPA group message-2s sent.
ID of the last EAP request
The ID of the last EAP request.
Length of the last EAP request The length of the last EAP request.
ID of the last EAP response
The ID of the last EAP response.
986 | show dot1x supplicant-info
AOS-W 6.2 | Reference Guide
Parameter
Length of the last EAP response
ID of the last radius request
Length of the last radius request
ID of the last radius response
Length of the last radius response
Description The length of the last EAP response.
The ID of the last radius request. The length of the last radius request.
The ID of the last radius response. The length of the last radius response.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
AOS-W 6.2 | Reference Guide
show dot1x supplicant-info | 987
show dot1x supplicant-info list-all
show dot1x supplicant-info list all
Description
Shows all 802.1X supplicants.
Syntax
No parameters.
Example
Issue this command to display all 802.1X supplicants as well as additional relevant information.
802.1x User Information
-----------------------
MAC
Name
EAP-Type Remote
------------
--------
--------- ------
00:15:00:26:f8:f5 user1
EAP-PEAP No
Auth ---Yes
AP-MAC -----00:0b:86:8b:68:68
Enc-Key/Type ------------------* * * * * * * */WPA2-AES
Auth-Mode -----------Explicit Mode
Station Entries: 1
The output of this command includes the following parameters:
Parameter MAC Name Auth AP-MAC Enc-Key/Type
Auth-Mode EAP-Type Remote
Description Supplicant MAC address Supplicant name Shows if the supplicant authenticated successfully AP MAC address Enc-Key: Supplicant's encryption key Type: Encryption type used by the supplicant Authentication mode EAP type Is the supplicant remote
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
988 | show dot1x supplicant-info list-all
AOS-W 6.2 | Reference Guide
show dot1x supplicant-info pmkid
show dot1x supplicant-info pmkid <supplicant-mac>
Description
Shows the PMKIDs of the various stations on the switch.
Syntax
No parameters.
Example
Issue this command to display the PMKIDs of the various stations on the switch.
PMKID Table
-----------
Mac
Name
AP
---
----
--
00:03:7f:bf:12:ac zoobar22 00:0b:86:a0:57:60
c2:7d:12:1a:1c:5b:40:f8:89:46:22:a5:ec:9b:fb:a6
00:03:7f:bf:12:ac zoobar22 00:0b:86:c0:04:88
bb:2d:e1:57:e1:b8:9b:a2:71:f5:98:ad:61:db:47:e7
PMKID -----
The output of this command includes the following parameters:
Parameter MAC Name AP PMKID
Description Supplicant MAC address Supplicant name AP MAC address Station PMKID
Command History
This command was introduces in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
AOS-W 6.2 | Reference Guide
show dot1x supplicant-info pmkid | 989
show dot1x supplicant-info statistics
show dot1x supplicant-info statistics
Description
Shows the 802.1X statistics of the users.
Syntax
No parameters.
Example
Issue this command to display the 802.1X statistics of the users.
802.1x Statistics
-----------------
Mac
Name AP
Auth-Succs Auth-Fails Auth-Tmout Re-Auths
Supp-Naks UKeyRotations MKeyRotations
---
---- --
---------- ---------- ---------- -------- ---
------ ------------- -------------
00:15:00:26:f8:f5 user1 00:0b:86:8b:68:68 1
0
0
0
0
0
0
Total:
2
0
0
0
0
0
0
Station Entries: 1 The output of this command includes the following parameters:
Parameter MAC Name AP Auth-Succs Auth-Fails Auth-Tmout Re-Auths Supp-Naks UKeyRotations MKeyRotations
Description Supplicant MAC address. Supplicant name. AP MAC address. Number of successful authentications. Number of authentication failures. Number of authentication timeouts. Number of reauthentications. Number of negative-acknowledgement characters sent by the supplicant. Number of unicast key rotations. Number of multicast key rotations.
Command History
This command was introduced in AOS-W 3.0.
990 | show dot1x supplicant-info statistics
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
AOS-W 6.2 | Reference Guide
show dot1x supplicant-info statistics | 991
show esi groups
show esi groups [{group-name <groupname>|{ping-name <ping-name>}]
Description
Show ESI group information.
Syntax
Parameter
Description
group-name <groupname> View the facility used when logging messages into the remote syslog server.
ping-name <ping-name>
Enter the name of a set of ping values to how the names of ESI groups using that set of ping attributes. Define a set of ESI ping values using the command esi ping.
server
Show the IP address of a remote logging server.
Usage Guidelines
The ESI parser is a mechanism for interpreting syslog messages from third party appliances such as anti-virus gateways. Use this command to view configured ESI server groups.
Example
This example below displays the name of each configured ESI group, including its ping definitions and ESI server.
(host) #show esi groups
ESI Group Table
---------------
Name
Tunnel ID Ping
Flags
----
--------- ----
-----
anything 0x1042
pingset_1 C
cupertino 0x1043
-
C
Flags:
C:Datapath Download complete
Servers ------0 0
Related Commands
Platforms Licensing
Command Mode
esi parser This command configures an ESI syslog parser
domain
domain.
Config mode on master or local switches.
esi parser This command creates or changes an ESI syslog
rule
parser rule.
Config mode on master or local switches.
esi parser This command allows you to test all of the enabled Config mode on master or local switches. rule-test parser rules.
Command History
This command was introduced in AOS-W 2.5.
992 | show esi groups
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches.
AOS-W 6.2 | Reference Guide
show esi groups | 993
show esi parser
show esi parser domains|rules|stats
Description
Show ESI parser information.
Syntax
Parameter domains rules stats
Description Show ESI parser domain information. Show ESI parser rule information. Show ESI parser rule stats.
Usage Guidelines
The ESI parser is a generic syslog parser on the switch that accepts syslog messages from external third-party appliances such as anti-virus gateways, content filters, and intrusion detection systems. It processes syslog messages according to user-defined rules and takes configurable actions on the corresponding system users.
ESI servers are configured into domains to which ESI syslog parser rules are applied.
Use the show esi parser domains command to show ESI parser domain information.
Example
The ESI Parser Domain table in the example below shows that the switch has two ESI domains and two ESI servers. (host) #show esi parser domains
ESI Parser Domain Table
-----------------------
Domain
ESI Servers
------
-----------
corp_domain 172.21.5.50
remote_domain 192.84.66.30
Peer Switches ---------------10.3.132.14
Total number of servers configured: 2
Related Commands
Platforms esi parser domain esi parser rule esi parser rule-test
Licensing
Command Mode
This command configures an ESI syslog parser domain.
Config mode on master or local switches.
This command creates or changes an ESI syslog parser rule.
Config mode on master or local switches.
This command allows you to test all Config mode on master or local switches. of the enabled parser rules.
994 | show esi parser
AOS-W 6.2 | Reference Guide
Command History
This command was introduced in AOS-W 3.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches.
AOS-W 6.2 | Reference Guide
show esi parser | 995
show esi ping
show esi ping [ping-name <ping-name>]
Description
Show settings for ESI ping health check attributes.
Syntax
Parameter
Description
ping-name <ping-name> Include the optional ping-name <ping-name> parameters to display settings for one specified set of ping settings.
Example
This example below shows that the switch has three defined sets of ping attributes. (host) #show esi groups
ESI Ping Table
--------------
Name
Frequency (sec) Timeout (sec) Retry Count ID Num Groups
----
--------------- ------------- ----------- -- ----------
ping_att1
5
2
2
ESIping
5
2
2
ESIping2
50000
2
2
01 10 22
The output of this command includes the following information:
Column Name frequency timeout retry-count ID Num Groups
Description Name of a group of ping settings. Specifies the ping frequency in seconds. Specifies the ping timeout in seconds. Specifies the ping retry count ID number assigned to the ping attributes when that set of attributes was defined. Number of ESI groups to which this set of ping attributes is assigned.
Related Commands
Platforms esi ping
Licensing
This command specifies the ESI ping health check configuration.
Command Mode Config mode on master or local switches.
Command History
This command was introduced in AOS-W 2.5.
996 | show esi ping
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches.
AOS-W 6.2 | Reference Guide
show esi ping | 997
show esi servers
show esi servers [{group-name <groupname>|{server-name <server-name>}]
Description
Show configuration information for ESI servers.
Syntax
Parameter
group-name <groupname>
server-name <server-name>
Description
Include this optional parameter to display information for all ESI servers assigned to a specific ESI group.
Specify an ESI server name to view configuration information for just that server.
Usage Guidelines
By default, this command displays configuration settings for all ESI servers. You can include the name of an ESI group to view servers assigned to just that group, or specify a server name to view information for that server only.
Example
This example below displays configuration details for the ESI server name forti_1.
(host) #show esi servers server-name forti_1
ESI Server Table
----------------
Name
Trusted IP Untrusted IP Trusted s/p Untrusted s/p Group Mode NAT Port ID
----
---------- ------------ ----------- ------------- ----- ---- -------- --
forti_1 10.168.173.2 10.168.171.3 -/-
-/-
default route 0
4
Flags ----U
Flags: C :Datapath Download complete U :Server Up D :Server Down PT:Trusted Ping response outstanding PU:Untrusted Ping response outstanding HT:Health Check Trusted IP HU:Health Check Untrusted IP FT:Trusted Ping failed FU:Untrusted Ping failed
The output of this command includes the following information:
Column Name
Description Name of the ESI server.
998 | show esi servers
AOS-W 6.2 | Reference Guide
Column Trusted IP
Untrusted IP
Trusted s/p
Untrusted s/p Group
Mode Nat Port ID Flags
Description
Displays the server IP address on the trusted network. As an option, you can also enable a health check on the specified address
Displays the server IP address on the untrusted network. As an option, you can also enable a health check on the specified address
Shows the slot and port connected to the trusted side of the ESI server; slot/port format.
Shows the slot and port connected to the untrusted side of the ESI server.
Name of the ESI group to which this server is assigned. If the server has not yet been assigned to a group, this column will be blank.
Specifies the ESI server mode of operation: bridge, nat, or route
Displays the NAT destination TCP/UDP port.
ID number assigned to the server when it was first defined.
This data column displays any flags associated with this server. The flag key appears below the ESI Server Table.
Related Commands
Platforms Licensing esi server This command configures an ESI server.
Command Mode Config mode on master or local switches.
Command History
This command was introduced in AOS-W 2.5.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches.
AOS-W 6.2 | Reference Guide
show esi servers | 999
show fast-roaming-r1-efficiency
show fast-roaming-r1-efficiency <client-mac>
Description
This command displays the hit/miss rate of r1 keys cached on an AP before a Fast BSS Transition roaming.
Syntax
Parameter <client-mac>
Description MAC address of the client.
Usage Guidelines
Use this command to view the hit/miss rate of r1 keys cached on an AP before a Fast BSS Transition roaming. This counter helps to verify if enough r1 keys are pushed to the neighboring APs.
Example
(host) #show fast-roaming-r1-efficiency
Fast Roaming R1 Key Efficiency
------------------------------
Client MAC
Hit (%) Miss (%)
----------
------- --------
00:50:43:21:01:b8 0 (0%) 0 (0%)
Command History
This command was introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1000 | show fast-roaming-r1-efficiency
AOS-W 6.2 | Reference Guide
show faults
show fault [history]
Description
Display a list of faults, which are any problematic conditions of the AOS-W software or hardware.
Syntax
Parameter history
Description Include this parameter to display a history of faults cleared by the switch or the operator.
Usage Guidelines
A switch can maintain a list of up to 100 faults. Once 100 faults have been logged, any faults arising after that are dropped. The switch maintains a history of the last 100 faults that have cleared. Every time a new fault clears clear, the oldest fault in the fault history is purged from the list.
Example
This example below shows all active faults the switch, including the time the fault occurred, the fault ID number, and a description of the problem.
(host) #show faults
Active Faults ------------Time ---2009-03-02 18:13:08 2009-03-02 18:13:08 2009-03-02 18:13:08 2009-03-02 18:13:08 2009-03-02 18:13:08 2009-03-02 18:13:08 back in service. 2009-03-02 18:13:08 2009-03-02 18:13:08 back in service. 2009-03-02 18:13:08 2009-03-02 18:13:08 back in service. 2009-03-02 18:13:08 2009-03-02 18:13:08 back in service. 2009-03-02 18:13:08 2009-03-02 18:13:08 back in service. 2009-03-02 18:13:09 2009-03-02 18:13:09 back in service. 2009-03-02 18:13:09 2009-03-02 18:13:09 back in service. 2009-03-02 18:13:09
Number -----93 94 95 96 97 98
99 100
101 102
103 104
105 106
107 108
109 110
111
Description ----------Authentication Server vortex is down. Authentication Server vortex is down. Authentication Server vortex is down. Authentication Server vortex is down. Authentication Server corp1-supersvr is down. All authentication servers in server group sg-auth2 are brought
Authentication Server corp1-supersvr is down. All authentication servers in server group sg-auth2 are brought
Authentication Server corp1-supersvr is down. All authentication servers in server group sg-auth2 are brought
Authentication Server corp1-supersvr is down. All authentication servers in server group sg-auth2 are brought
Authentication Server corp1-supersvr is down. All authentication servers in server group sg-auth2 are brought
Authentication Server corp1-supersvr is down. All authentication servers in server group sg-auth2 are brought
Authentication Server corp1-supersvr is down. All authentication servers in server group sg-auth2 are brought
Authentication Server corp1-supersvr is down.
AOS-W 6.2 | Reference Guide
show faults | 1001
2009-03-02 18:13:09 112
All authentication servers in server group sg-auth2 are brought
back in service.
2009-03-02 18:13:09 113
Authentication Server corp1-supersvr is down.
2009-03-02 18:13:09 114
All authentication servers in server group sg-auth2 are brought
back in service.
2009-03-02 18:13:09 115
Authentication Server corp1-supersvr is down.
Total number of entries in the queue :23
Related Commands
Command clear fault <id>|all
Description
Manually clear a single fault by specifying the fault ID number, or clear all faults by including the all parameter.
Mode Config mode
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches.
1002 | show faults
AOS-W 6.2 | Reference Guide
show firewall
show firewall
Description
Display a list of global firewall policies.
Syntax
No parameters
Example
This example below shows all firewall policies currently configured on the switch. (host) (config) #show firewall
Global firewall policies -----------------------Policy -----Enforce TCP handshake before allowing data Prohibit RST replay attack Deny all IP fragments Prohibit IP Spoofing Monitor ping attack Monitor TCP SYN attack Monitor IP sessions attack Deny inter user bridging Log all received ICMP errors Per-packet logging Session mirror destination Stateful SIP Processing Allow tri-session with DNAT Disable FTP server GRE call id processing Session Idle Timeout Broadcast-filter ARP WMM content enforcement Session VOIP Timeout Stateful H.323 Processing Stateful SCCP Processing Only allow local subnets in user table Monitor/police CP attacks Rate limit CP untrusted ucast traffic Rate limit CP untrusted mcast traffic Rate limit CP trusted ucast traffic Rate limit CP trusted mcast traffic Rate limit CP route traffic Rate limit CP session mirror traffic Rate limit CP auth process traffic Deny inter user traffic Prohibit ARP Spoofing Stateful VOCERA Processing Stateful UA Processing Enforce bw contracts for broadcast traffic Multicast automatic shaping Enforce TCP Sequence numbers AMSDU Session-tunnel FIB
Action -----Disabled Disabled Disabled Enabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Enabled Disabled No Disabled Disabled Disabled Disabled Disabled Enabled Enabled Disabled Disabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Disabled Disabled Enabled Enabled Disabled Disabled Disabled Enabled Enabled
Rate ----
20 Mbps 4 Mbps 160 Mbps 4 Mbps 2 Mbps 2 Mbps 2 Mbps
Slot/Port ---------
AOS-W 6.2 | Reference Guide
show firewall | 1003
Prevent DHCP exhaustion Session mirror IPSEC
Disabled Disabled
The output of this command includes the following information:
Parameter Enforce TCP handshake before allowing data
Prohibit RST replay attack Deny all IP Fragments Prohibit IP Spoofing Monitor ping attack Monitor TCP SYN attack
Monitor IP sessions attack
Deny inter user bridging
Log all received ICMP errors
Description
If enabled, this feature prevents data from passing between two clients until the three-way TCP handshake has been performed. This option should be disabled when you have mobile clients on the network as enabling this option will cause mobility to fail. You can enable this option if there are no mobile clients on the network.
If enabled, this setting closes a TCP connection in both directions if a TCP RST is received from either direction.
If enabled, all IP fragments are dropped.
When this option is enabled, source and destination IP and MAC addresses are checked; possible IP spoofing attacks are logged and an SNMP trap is sent.
If enabled, the switch monitors the number of ICMP pings per second. If this value exceeds the maximum configured rate, the switch will register a denial of service attack.
If enabled, the switch monitors the number of TCP SYN messages per second. If this value exceeds the maximum configured rate, the switch will register a denial of service attack.
If enabled, the switch monitors the number of TCP sessions requests per second. If this value exceeds the maximum configured rate, the switch will register a denial of service attack sessions.
If enabled this setting prevents the forwarding of Layer-2 traffic between wired or wireless users. You can configure user role policies that prevent Layer-3 traffic between users or networks but this does not block Layer-2 traffic.
Shows if the switch will log received ICMP errors.
Per-packet logging Session mirror destination
If active, and logging is enabled for the corresponding session rule, this feature logs every packet.
Destination to which mirrored packets are sent.
Stateful SIP Processing
Allow tri-session with DNAT Disable FTP server
Shows if the switch has enabled or disabled monitoring of exchanges between a voice over IP or voice over WLAN device and a SIP server. This option should be enabled only when thee is no VoIP or VoWLAN traffic on the network
Shows if the switch allows three-way session when performing destination NAT.
If active, this feature disables the FTP server on the switch.
1004 | show firewall
AOS-W 6.2 | Reference Guide
Parameter GRE call id processing
Description If active the switch creates a unique state for each PPTP tunnel.
Session Idle Timeout
Shows if a session idle timeout interval has been defined.
Broadcast-filter ARP
If enabled, this feature reduces the number of broadcast packets sent to VoIP clients, thereby improving the battery life of voice handsets.
WMM content enforcement
If traffic to or from the user is inconsistent with the associated QoS policy for voice, this feature reclassifies traffic to best effort and data path counters are incremented.
Session VOIP Timeout
If enabled, a idle session timeout is defined for sessions that are marked as voice sessions.
Stateful H.323 Processing
Shows if the switch has enabled or disabled stateful H.323 processing.
Stateful SCCP Processing
Shows if the switch has enabled or disabled stateful SCCP processing.
Only allow local subnets in user table
If enabled, the switch only adds IP addresses which belong to a local subnet to the user table.
Monitor/police CP attacks
If enabled, the switch monitors a misbehaving user's inbound traffic rate. If this rate is exceeded, the switch can register a denial of service attack.
Rate limit CP untrusted ucast traffic
Shows the inbound traffic rate
Rate limit CP untrusted mcast traffic
Displays the untrusted multicast traffic rate limit.
Rate limit CP trusted ucast traffic Displays the trusted unicast traffic rate limit.
Rate limit CP trusted mcast traffic Displays the trusted multicast traffic rate limit.
Rate limit CP route traffic Rate limit CP session mirror traffic Rate limit CP auth process traffic Deny inter user traffic
Prohibit ARP Spoofing
Displays the traffic rate limit for traffic that needs generated ARP requests.
Displays the traffic rate limit for session mirrored traffic forwarded to the switch.
Displays the traffic rate limit for traffic forwarded to the authentication process.
If enabled, this setting disables traffic between all untrused users. You can configure user role policies that prevent Layer-3 traffic between users or networks but this does not block Layer2 traffic.
When this option is enabled, possible arp spoofing attacks are logged and an SNMP trap is sent.
AOS-W 6.2 | Reference Guide
show firewall | 1005
Parameter
Description
Stateful VOCERA Processing
VOCERA processing is disabled by default.
Stateful UA Processing
UA processing is disabled by default.
Enforce bw contracts for broadcast If enabled, bw contracts are applied ot local subnet broadcast
traffic
traffic.
Multicast automatic shaping
If enabled, enables multicast optimization and provides excellent streaming quality regardless of the amount of VLANs or IP IGMP groups that are used.
Clear Sessions on Role Update
If enabled, this setting clears all existing user role sessions after a user or client roles is modified.
Enforce TCP Sequence numbers
If enabled, prevents data from passing between two clients until the three-way TCP handshake has been performed.
AMSDU
Aggregated Medium Access Control Service Data Units (AMSDU) packets are dropped if this option is enabled.
Session-tunnelFIB
Enables session tunnel based forwarding.
Prevent DHCP Exhaustion
If enabled, this option checks for DHCP client hardware address against the packet source MAC address. This command checks the frame's source-MAC against the DHCPv4 client hardware address and drops the packet if it does not match. This feature prevents a client from submitting multiple DHCP requests with different hardware addresses, thereby preventing DHCP pool depletion.
Session mirror IPsec
If enabled, frames are sent to IP address specified by the session-mirror-destination option.
Related Commands
Command firewall
firewall cp
firewall cp-bandwidthcontract
Description
Mode
This command configures firewall options on the switch.
Config mode
This command creates whitelist session ACLs
Config mode
This command configures bandwidth contract traffic rate limits to prevent denial of service attacks.
Config mode
Command History
This command was introduced in AOS-W 3.4.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches
1006 | show firewall
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
show firewall | 1007
show firewall-cp
show firewall-cp [internal]
Description
Displays the captive-portal (CP) firewall policies on the switch.
Syntax
No Parameters
Example
The output of this command shows the CP firewall policies.
(host) #show firewall-cp
CP firewall policies
--------------------
IP Version Source IP
contract
---------- ---------
---
ipv4
any
ipv4
10.10.10.10
ipv4
2:2:2:2::2
Source Mask -----------
2.2.2.2
Protocol
--------
6 6 1
Start Port
----------
21 8 1
End Port
--------
21 9 2
Permit/Deny
-----------
Permit Permit Permit
hits
----
0 0 0
----test
Command History
Release AOS-W 3.4 AOS-W6.2
Modification Command introduced. The IP Version parameter was added.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1008 | show firewall-cp
AOS-W 6.2 | Reference Guide
show firewall-visibility
show firewall-visibility {debug|status}
Description
Displays the policy enforcement firewall visibility process state and status information.
Syntax
Parameter debug status
Description Displays process state information for debugging firewall visibility. Displays the status of firewall visibility as enabled or disabled.
Example
The output of this command shows the status of firewall visibility. (host) #show firewall-visibility status enabled
Command History
This command is introduced in AOS-W 6.2.
Command Information
Platforms
OAW-4504XM, OAW-4604, OAW-4704, OAW-6000, and OAW-4x50 switches
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switch
AOS-W 6.2 | Reference Guide
show firewall-visibility | 1009
show gap-debug
show gap-debug
Description
Displays the troubleshooting information for the global AP database.
Usage Guidelines
Use this command to identify any issues with the global AP database. This command displays the troubleshooting information for the global AP database.
Example
The following is a sample output of this command:
(host)# show gap-debug
GAP Master LMS Table
--------------------
IP
Master Cookie
Master Seq LMS Cookie
LMS Seq Activity
Status Msg In Prog Msg Len Attempts
--
-------------
---------- ----------
------- -------- -
----- ----------- ------- --------
172.20.1.109 0.0.0.0,50b790c0
0
172.20.1.109,50b79139 1640
46
up
no
-
-
172.20.1.202 0.0.0.0,50b79102
26
172.20.1.202,50b79188 1804
57
up
no
-
-
172.20.1.203 172.20.1.212,50b7ed3e 0
172.20.1.203,50b7ed42 1244
40
up
no
-
-
172.20.1.205 0.0.0.0,50b80053
31
172.20.1.205,50b800d2 1252
20
up
no
-
-
172.20.1.206 0.0.0.0,50b80054
31
172.20.1.206,50b800d4 1359
10
up
no
-
-
172.20.1.210 0.0.0.0,50b79631
0
172.20.1.210,50b796a9 1617
41
up
no
-
-
172.20.1.216 0.0.0.0,50b80055
0
0.0.0.0,00000000
0
--
up
no
-
-
192.169.1.207 0.0.0.0,50b791ef
0
192.169.1.207,50b7920c 1633
20
up
no
-
-
192.169.1.208 0.0.0.0,50b791e7
0
192.169.1.208,50b7920e 1632
46
up
no
-
-
The output of this command includes the following information:
Column IP Master Cookie
Master Seq
Description
The IP address of the local management switch (LMS).
The cookie information on the master switch that is used to communicate with the LMS.
The sequence number used by the master switch to sync up with the LMS. This tracks the number of times the master switch has communicated with the LMS.
1010 | show gap-debug
AOS-W 6.2 | Reference Guide
Column LMS Cookies
LMS Seq
Activity Status Msg in Prog
Msg Len Attempts
Description
The cookie information on the LMS that is used to communicate with the master switch.
The sequence number used by the LMS to sync up with the master switch.This tracks the number of times the LMS has communicated with the master switch.
The time at which the last activity happened on the LMS.
Indicates if the status of the LMS is up or down.
Indicates if an active communication is happening between the LMS and the master switch. It can be Yes or No. If it is yes, then the Msg Len and Attempt fields are set.
The length of the message that the master switch is syncing with the LMS.
Number of times the master switch has attempted to sync with the LMS.
Command History
This command is introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or Config mode on master switches.
AOS-W 6.2 | Reference Guide
show gap-debug | 1011
show gateway health-check
show gateway health-check
Description
Display the current status of the gateway health-check feature.
Syntax
No parameters.
Usage Guidelines
The gateway health check feature can only be enabled by Alcatel-Lucent Technical Support.
Example
This example below shows that the gateway health-check feature has not been enabled on the switch. (host) #show gateway health-check Gateway health check not enabled
Related Commands
Command gateway health-check disable
Description Disable the gateway health check
Mode Config mode
Command History
This command was introduced in AOS-W 3.4.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches
1012 | show gateway health-check
AOS-W 6.2 | Reference Guide
show global-user-table count
show global-user-table
show global-user-table count [current-switch] <IP address> [authentication-method] {dot1x | mac | stateful-dot1x | vpn | web} [role] <role name> [bssid] <bssid MAC> [essid] <essid> [ap-name] <AP name> [phy-type] {a | b | g} [age] <starting time dd:hh:mm> <ending time dd:hh:mm>
Description
This command displays a count of global user based on the specified criteria.
Syntax
Parameter current-switch authenticationmethod role bssid essid
ap-name phy-type age
Description Match IP address of the switch where the user is currently associated Count users matching the specified authentication method
Count users matching the specified role Count users matching the specified BSSID Count users matching the specified ESSID. If the ESSID includes spaces, you must enclose it in quotation marks. Count users matching the specified AP name Count users matching the specified Phy type Count users matching the specified age
Example
Issue this command to display a global user count. The output shown below is a result of the command show global-user-table count current-switch <ip-address>. Complete results. The number of global users : 2
The output includes the following parameters:
Parameter
The number of global users:
Description Total number of global users meeting the specified criteria.
Command History
This command was introduced in AOS-W 3.4.
AOS-W 6.2 | Reference Guide
show global-user-table count | 1013
Command Information
Platforms
All platforms Master switch only
Licensing Base operating system
Command Mode Enable or config mode on master switches
1014 | show global-user-table count
AOS-W 6.2 | Reference Guide
show-global-user-table list
show global-user-table list current-switch] <IP address> authentication-method] {dot1x | mac | stateful-dot1x | vpn | web} role <role name> bssid <bssid MAC> devtype <device> essid <essid> ap-name <AP name> phy-type a|b|g age <starting time dd:hh:mm> <ending time dd:hh:mm> not or rows sort {sort_by_ap-name | sort_by_authtype | sort_by_bssid | sort_by_current-switch | sort_ by_essid | sort_by_ip | sort_by_mac | sort_by_name | sort_by_phy-type | sort_by_role}{asc | desc} start
Description
This command displays a list of current users on a specified switch.
Syntax
Parameter current-switch authenticationmethod role bssid essid
ap-name phy-type age current-switch authenticationmethod role not or rows
Description Match IP address of the switch where the user is currently associated Count users matching the specified authentication method
Count users matching the specified role Count users matching the specified BSSID Count users matching the specified ESSID. If the ESSID includes spaces, you must enclose it in quotation marks. Count users matching the specified AP name Count users matching the specified Phy type Count users matching the specified age Match IP address of the switch where the user is currently associated Count users matching the specified authentication method
Count users matching the specified role Show users that do not satisfy the given criteria Show users that satisfy any of the given criteria Number of rows to show
AOS-W 6.2 | Reference Guide
show-global-user-table list | 1015
Parameter sort start
Description Sort the list based on a specified criteria, in ascending or descending order Show user table starting from a specific row
Example
Issue this command to display a global user count. The output of this command is split into two tables in this document, however it appears in one table in the CLI.
(host) (config) show user role employee
Global Users
-----
IP
MAC
Name
name
----------
------------
------
---
192.168.160.1 00:23:6c:80:3d:bc madisonQ
10.100.105.100 00:05:4e:45:5e:c8 CorpNetwork2
wlanAP
10.100.105.102 00:14:a5:30:c2:7f fdedhia
10.100.105.97 00:1b:77:c4:a2:fa CorpNetwork2
10.100.105.109 00:21:5c:02:16:bb melindayao
Role
Age(d:h:m) Auth VPN link AP
----
---------- ---- -------- ----
employee 01:05:50 employee 00:02:22
802.1x 802.1x
AP63
employee 01:20:09 employee 00:02:18 employee 00:05:40
802.1x 802.1x 802.1x
AP98 AP98 AP09
users ----Roaming
------Associated Associated Associated Associated Associated
Essid
Bssid
Phy
---------------- -------
wirelessint-wpa2 00:1a:1e:85:d3:b1 a-HT
wirelessint-wpa2 00:1a:1e:6f:e5:51 a
wirelessint-wpa2 00:1a:1e:87:ef:f1 a
wirelessint-wpa2 00:1a:1e:87:ef:f1 a
wirelessint-wpa2 00:1a:1e:85:c2:11 a-HT
Profile
default default default default default
The output of this command includes the following parameters:
---------- --- -----
Parameter IP MAC Name Current Switch Role Age Auth VPN Link AP name Roaming
Description IP address of user. MAC address of user. User name. IP address of the switch where the user is currently associated. User role. User age, displayed as days:hours:minutes. Authentication method used by user. IP address of the client VPN gateway. AP name. Roaming status.
1016 | show-global-user-table list
AOS-W 6.2 | Reference Guide
Parameter Essid Bssid Phy Profile Forward mode
Type
Description User's extended service set identifier (ESSID). User's basic service set identifier (BSSID). User Phy type (a, b or g). Profile name Forwarding mode assigned to the user (tunnel, split-tunnel, decrypt-tunnel or bridge). Type of client device, if identified.
Command History
Release AOS-W 3.4 AOS-W 6.1
Modification
Command introduced
The devtype parameter was introduced, and the output of this command expanded to include the Type column.
Command Information
Platforms
All platforms Master switch only
Licensing Base operating system
Command Mode Enable or config mode on master switches
AOS-W 6.2 | Reference Guide
show-global-user-table list | 1017
show guest-access-email
show guest-access-email
Description
This command shows a guest access email profile configuration. The guest access email process sends email to either the guest or the sponsor whenever a guest user account is created or when the Guest Provisioning user manually sends email from the Guest Provisioning page.
Syntax
No parameters.
Usage Guidelines
Issue this command to show the current guest access email profile parameters. The Parameter and Value columns show the configured SMTP server and SMTP ports. that process guest email. (host) #show guest-access-email
Guest-access Email Profile -------------------------Parameter Value --------- ----SMTP Server 10.1.1.4 SMTP Port 25
Related Commands
Command guest-access-email
local-userdb-guest add
Description
This command shows a guest access email profile configuration.
This command creates a guest user in a local user database.
Mode Enable or Config modes
Enable or Config modes
Command History
This command was introduced in AOS-W 3.4.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
1018 | show guest-access-email
AOS-W 6.2 | Reference Guide
show hostname
show hostname
Description
Show the hostname of the switch.
Syntax
No parameters.
Example
The output of this command shows the hostname configured for the switch. A hostname can contain alphanumeric characters, spaces, punctuation, and symbol characters.
(host) # show hostname hostname is SampleHost
Related Commands
Configure the switch's hostname using the command hostname.
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available on master or local switches
AOS-W 6.2 | Reference Guide
show hostname | 1019
show iap table
show iap table [branch-key <brkey>]
Description
Shows the details of the branches connected to the switch.
Syntax
Parameter branch-key <brkey>
Description Key for the branch, which is unique to each branch.
Example
This example shows the details of the branches connected to the switch: (host) (config) #show iap table
Branch Key
Index Status Inner IP
MAC Address
----------
----- ------ --------
-----------
d8f6095a01f89b7aea4340c080c3e3c8bd062758461c32c92d 8 DOWN 0.0.0.0
d8:c7:c8:c0:01:6c
4619fa8b014ff058d99e9fe63286c19851e61466627d054968 16 DOWN 0.0.0.0
00:1a:1e:08:21:e1
0e26e65a01732247f98b5d463f1fb56c0200d0944fab521e57 3 DOWN 0.0.0.0
d8:c7:c8:c0:01:6c
cc0b838d014df7db3eb453ef4f513204df4d74bb4063e46587 7 DOWN 0.0.0.0
d8:c7:c8:c0:b8:d0
6bccde5901997e534d14b10580371792ef4c13ca868c929150 15 DOWN 0.0.0.0
d8:c7:c8:c0:01:6c
764f6038018f2c2765292911e55fedc0c98f86cf79331d8905 6 UP 10.15.207.206 00:24:6c:c9:27:cf
c2b46b530119844dcbdb55ddb94ff308d1f08ec7cb4eda113c 0 DOWN 0.0.0.0
d8:c7:c8:c0:b8:d6
9deb828c0106f4562b50c8141cfa28ad5c1a3f89b3e171efcc 14 DOWN 0.0.0.0
00:1a:1e:08:23:f4
be5ffcf801eedd92a76b978ceee53f4e2284c8e8f3dbd84457 5 DOWN 0.0.0.0
00:24:6c:c9:27:cf
b5d279460166c39a5fb9462a65559eb91266b9ac9f8e2356a0 13 DOWN 0.0.0.0
d8:c7:c8:c0:01:6c
0f7057990174cde7901a0c8779baeb7393b26d974a45eb8602 10 DOWN 0.0.0.0
00:24:6c:c0:41:f2
a1e23c1201cfb76a50fb3328e58c9825e716a259dd71874c67 4 UP 10.15.207.207 00:24:6c:c9:18:64
47f930fc019317069d04fd1c2ffdf6a49a6e51c148c2164ed0 9 DOWN 0.0.0.0
d8:c7:c8:c0:01:6c
0c478ce101df81e3c0a46fe4f3ab6eca9bb012151dea99a82f 1 DOWN 0.0.0.0
d8:c7:c8:c0:01:6c
747c20ac0155736c3b11bd972c967ebdf7c9883e69ec2a01fb 2 DOWN 0.0.0.0
d8:c7:c8:c0:b8:d0
0e40138601b34eb33fb57d94208848b0f8e37bba0a6a0d43ca 12 DOWN 0.0.0.0
00:24:6c:c9:18:64
de293919019196d7c8ac8f04a50fbd5b96c2af3d3576aa1dc2 11 DOWN 0.0.0.0
d8:c7:c8:c0:b8:d8
208c416e01e1cfaf0fdc11190349ad43334879f39ba9e19188 17 DOWN 0.0.0.0
d8:c7:c8:c0:01:6c
The output of this command includes the following parameters:
Parameter Branch Key Index Status Inner IP MAC Address
Description Key for the branch, which is unique to each branch. Index assigned to the branch. Current status of the branch (UP/DOWN). Internal VPN IP of the branch. MAC address of the Virtual Switch of the branch.
1020 | show iap table
AOS-W 6.2 | Reference Guide
Command History
Introduced in AOS-W 6.2
AOS-W 6.2 | Reference Guide
show iap table | 1021
show ids ap-classification-rule
id-classification-rule <rule-name>
Description
Display the IDS AP classification rule profile.
Syntax
Parameter <rule-name>
Description Enter the AP classification rule profile name.
Usage Guidelines
Issue this command without the <rule-name>option to view the AP Classification Rule Profile list. Add the rule name option to display values for the rule.
Example
Below is the show command without the rule name option:
(host) (config) #show ids ap-classification-rule
IDS AP Classification Rule Profile List
---------------------------------------
Name
References Profile Status
----
---------- --------------
exclude-ssid-rule 1
rule1
1
rule2
1
Total:3
In the example above, the Reference column indicates the number of references to the rule named in the Name column. The Profile Status column is blank unless the rule is predefined. Optionally, you can enter a rule name to view the parameters for that rule. For example:
(host) (config) # show ids ap-classification-rule rule1
IDS AP Classification Rule Profile "rule1"
------------------------------------------
Parameter
Value
---------
-----
SSID
Alcatel-Lucent-ap
Match SSIDs
true
Min SNR value
0
Max SNR value
255
Discovered APs count
2
Check for Min Discovered APs true
Classify To AP Type
suspected-rogue
Confidence level increase
5
Command History
Release AOS-W 6.0
Modification Command introduced
1022 | show ids ap-classification-rule
AOS-W 6.2 | Reference Guide
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
show ids ap-classification-rule | 1023
show ids ap-rule-matching
Description
Display the IDS active AP rules profile.
Example
(host) (config) #show ids ap-rule-matching
IDS Active AP Rules Profile
---------------------------
Parameter
Value
---------
-----
AP Rule name snr0
AP Rule name rule1
AP Rule name rule2
AP Rule name exclude-ssid-rule
In the above example, the rule names in the Value column have been activated by the ids ap-rule-matching command.
Command History
Release AOS-W 6.0
Modification Command introduced
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
1024 | show ids ap-rule-matching
AOS-W 6.2 | Reference Guide
show ids dos-profile
show ids dos-profile <profile-name>
Description
Show an IDS Denial Of Service (DoS) Profile
Syntax
Parameter <profile-name>
Description Name of an IDS DoS profile.
Usage Guidelines
Issue this command without the <profile-name>parameter to display an IDS DoS profile.
Examples
The example below shows that the switch has four configured DoS profiles. ((host) (config) #show ids dos-profile
IDS Denial Of Service Profile List
----------------------------------
Name
References Profile Status
----
---------- --------------
default
4
test
0
test1
1
Wizard-test 1
Wizard-test2 1
Total:5
In the example above, the Reference column indicates the number of references to the profile named in the Name column. The Profile Status column is blank unless the rule is predefined. The example below displays a partial output for the profile "test1".
(host) (config) #show ids dos-profile test1 Parameter --------Detect Disconnect Station Attack Disconnect STA Assoc Response Theshold Disconnect STA Deauth and Disassoc Theshold Disconnect STA Detection Quiet Time Spoofed Deauth Blacklist Detect AP Flood Attack AP Flood Threshold AP Flood Increase Time AP Flood Detection Quiet Time Detect Client Flood Attack Client Flood Threshold Client Flood Increase Time Client Flood Detection Quiet Time Detect EAP Rate Anomaly EAP Rate Threshold
Value ----true 5 8 900 sec Disabled false 50 3 sec 900 sec false 150 3 sec 900 sec false 60
AOS-W 6.2 | Reference Guide
show ids dos-profile | 1025
EAP Rate Time Interval EAP Rate Quiet Time Detect CTS Rate Anomaly CTS Rate Threshold CTS Rate Time Interval CTS Rate Quiet Time Detect RTS Rate Anomaly RTS Rate Threshold RTS Rate Time Interval RTS Rate Quiet Time Detect Rate Anomalies Rate Thresholds for Assoc Frames Rate Thresholds for Disassoc Frames Rate Thresholds for Deauth Frames ...
3 sec 900 sec false 5000 5 sec 900 sec false 5000 5 sec 900 sec false default default default
For a detailed explanation of the output shown above, see the ids dos-profile command.
Related Commands
Configure IDS DoS profiles using the command ids dos-profile.
Command History
Release AOS-W 6.0
Modification Command introduced
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
1026 | show ids dos-profile
AOS-W 6.2 | Reference Guide
show ids general-profile
show ids general-profile <profile-name>
Description
Display an IDS General profile.
Syntax
Parameter <profile-name>
Description Name of an IDS General profile.
Usage Guidelines
Issue this command without the <profile-name>parameter to display the IDS General profile list. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has four configured General profiles.
(host) (config) # show ids general-profile
IDS General Profile List
------------------------
Name
References Profile Status
----
---------- --------------
default
2
helen
0
wired-lb
1
Wizard-test2 1
Total:4
In the example above, the Reference column indicates the number of references to the profile named in the Name column. The Profile Status column is blank unless the rule is predefined.
The example below displays the settings for the profile Michael.
(host) (config) #show ids general-profile Michael
IDS General Profile "Michael" --------------------------Parameter --------Stats Update Interval Monitored Device Stats Update Interval AP Inactivity Timeout Adhoc (IBSS) AP Inactivity Timeout AP Max Unseen Timeout Adhoc AP Max Unseen Timeout STA Inactivity Timeout STA Max Unseen Timeout Min Potential AP Beacon Rate Min Potential AP Monitor Time Signature Quiet Time Wireless Containment Debug Wireless Containment Wired Containment
Value ----60 sec 0 sec 20 sec 5 sec 600 sec 180 sec 60 sec 600 sec 25 % 2 sec 900 sec deauth-only false false
AOS-W 6.2 | Reference Guide
show ids general-profile | 1027
Wired Containment of AP's Adj MACs Mobility Manager RTLS IDS Event Generation on AP Send Adhoc Info to Controller
false false none true
The output of this command includes the following parameters:
Parameter Stats Update Interval
Monitored Device Stats Update Interval AP Inactivity Timeout Adhoc (IBSS) AP Inactivity Timeout AP Max Unseen Timeout STA Inactivity Timeout STA Max Unseen Timeout Min Potential AP Beacon Rate
Min Potential AP Monitor Time
Signature Quiet Time
Wireless Containment
Debug Wireless Containment
Wired Containment
Wired Containment of AP's Adj MACs Mobility Manager RTLS
IDS Event Generation on AP
Send Adhoc Info to Controller
Description
Interval, in seconds, for the AP to update the switch with statistics. This setting takes effect only if the Alcatel-Lucent Mobility Manager is configured. Otherwise, statistics update to the switch is disabled.
Time interval, in seconds, for AP to update the switch with stats for monitored devices. Minimum is 60.
Time, in seconds, after which an AP is aged out.
Ad hoc (IBSS) AP inactivity timeout in number of scans.
Ageout time, in seconds, since AP was last seen.
Time, in seconds, after which a station is aged out.
Time, in seconds, after which an AP is aged out.
Minimum beacon rate acceptable from a potential AP, in percentage of the advertised beacon interval.
Minimum time, in seconds, a potential AP has to be up before it is classified as a real AP.
After a signature match is detected, the time to wait, in seconds, to resume checking.
Shows if the profile has enabled or disabled containment from the wireless side.
Shows if the profile has enabled or disable debugging of containment from the wireless side.
Shows if the profile has enabled or disable containment from the wired side.
Enable/disable wired containment of MACs offset by one from APs BSSID.
Shows if RTLS communication with the configured mobilitymanager is enabled or disabled.
Enable or disable IDS event generation from the AP. Event generation from the AP can be enabled for syslogs, traps, or both. This does not affect generation of IDS correlated events on the switch.
Enable or disable sending Adhoc information to the switch from the AP.
Related Commands
Configure IDS General profiles using the command ids general-profile.
1028 | show ids general-profile
AOS-W 6.2 | Reference Guide
Command History
Version AOS-W 3.0 AOS-W 5.0 AOS-W 6.0
Description Command Introduced Mobility Manager RTLS parameter introduced Refreshed show output
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
show ids general-profile | 1029
show ids impersonation-profile
show ids impersonation-profile <profile-name>
Description
Display an IDS Impersonation Profile.
Syntax
Parameter <profile-name>
Description Name of an IDS Impersonation profile.
Usage Guidelines
Issue this command without the <profile-name>parameter to display the IDS Impersonation profile list. Include a profile name to display detailed configuration information for that profile.
Examples
The example below displays that the switch has five configured Impersonation profiles. (host) (config) #show ids impersonation-profile
IDS Impersonation Profile List
------------------------------
Name
References Profile Status
----
---------- --------------
default
4
test
0
test1
1
Wizard-test 1
Wizard-test2 1
Total:5
In the example above, the Reference column indicates the number of references to the profile named in the Name column. The Profile Status column is blank unless the rule is predefined.
The example below displays the configuration settings for the profile test1. (host) (config) #show ids impersonation-profile test1
IDS Impersonation Profile "test1" --------------------------------Parameter --------Detect AP Impersonation Protect from AP Impersonation Beacon Diff Threshold Beacon Increase Wait Time Detect AP Spoofing Detect Beacon Wrong Channel Beacon Wrong Channel Detection Quiet Time Detect Hotspotter Attack Hotspotter Quiet Time
Value ----false false 50 % 3 sec true false 900 sec true 900 sec
The output of this command includes the following parameters:
1030 | show ids impersonation-profile
AOS-W 6.2 | Reference Guide
Parameter Detect AP Impersonation
Protect from AP Impersonation
Beacon Diff Threshold
Beacon Increase Wait Time
Detect AP Spoofing Detect Beacon Wrong Channel Beacon Wrong Channel Detection Quiet Time Detect Hotspotter Attack
Hotspotter Quiet Time
Description
Shows of the profile has enabled or disabled detection of AP impersonation.
Shows if AP impersonation is enabled or disabled for the profile. When AP impersonation is detected, both the legitimate and impersonating AP are disabled using a denial of service attack.
Percentage increase in beacon rates that triggers an AP impersonation event.
Time, in seconds, after the beacon difference threshold is crossed before an AP impersonation event is generated.
AP Spoofing detection is enabled
Disable detection of beacons advertising the incorrect channel
Wait 90 seconds after detecting a beacon with the wrong channel after which the check can be resumed.
Enable detection of the Hotspotter attack to lure away valid clients.
Wait 90 seconds after detecting an attempt to Use the Hotspotter tool against clients.
Related Commands
Configure IDS impersonation profiles using the command ids impersonation-profile.
Command History
Version AOS-W 3.0 AOS-W 6.0
Description Command Introduced Refreshed show output
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
show ids impersonation-profile | 1031
show ids management-profile
Description
Displays the management event correlation for IDS event traps and sylogs (logs).
Example
The following example displays the current management status. (host) (config) #show ids management-profile
IDS Management Profile ---------------------Parameter --------IDS Event Correlation Event Correlation Quiet Time
Value ----logs-and-traps 900 sec
The display output of the above command includes:
Parameter
IDS Event Correlation
Event Correlation Quiet Time
Description Management profile is set for logs-and-traps. The time to wait, 900 seconds, before the event can be raised again.
Command History
Version AOS-W 6.0
Description Command Introduced
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
1032 | show ids management-profile
AOS-W 6.2 | Reference Guide
show ids profile
show ids profile <profile-name>
Description
Display all ids profiles or display a specific profile name.
Syntax
Parameter <profile-name>
Description Name of an IDS profile.
Usage Guidelines
Issue this command without the <profile-name>parameter to display the list of IDS profiles. Include a profile name to display detailed information for that profile.
Examples
The example below shows that the switch has seven configured IDS Profiles. (host) (config) #show ids profile
IDS Profile List
----------------
Name
References
----
----------
default
5
test
0
test-tarpit 1
test-wired-lb 0
test1
0
Wizard-test 0
Wizard-test2 0
Profile Status --------------
Total:7 In the example above, the Reference column indicates the number of references to the profile named in the Name column. The Profile Status column is blank unless the rule is predefined. This example displays the configuration settings for the profile test1. (host) (config) #show ids profile test1
IDS Profile "test1" ------------------Parameter --------IDS General profile IDS Signature Matching profile IDS DOS profile IDS Impersonation profile IDS Unauthorized Device profile
Value ----test1 test1 test1 test1 test1
The output of this command includes the following parameters:
AOS-W 6.2 | Reference Guide
show ids profile | 1033
Parameter IDS General profile IDS Signature Matching profile IDS DOS profile
IDS Impersonation profile
IDS Unauthorized Device profile
Description
Name of a IDS General profile to be applied to an AP or AP group.
Name of a IDS Signature Matching profile to be applied to an AP or AP group.
Name of a IDS Denial of Service profile to be applied to an AP or AP group.
Name of a IDS Impersonation profile to be applied to an AP or AP group.
Name of a IDS Unauthorized Device profile to be applied to an AP or AP group.
Related Commands
Configure the IDS profile using the command ids profile.
Command History
Version AOS-W 3.0 AOS-W 6.0
Description Command Introduced Refreshed show output
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
1034 | show ids profile
AOS-W 6.2 | Reference Guide
show ids rate-thresholds-profile
show ids rate-thresholds-profile <profile-name>
Description
Show an IDS Rate Thresholds profile.
Syntax
Parameter <profile-name>
Description Name of an IDS Rate Threshold profile.
Usage Guidelines
Issue this command without the <profile-name>parameter to display the IDS Rate Threshold profile list. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has three configured IDS Rate Threshold profiles. (host) (config) #show ids rate-thresholds-profile
IDS Rate Thresholds Profile List -------------------------------Name ---default probe-request-response-thresholds test
References ---------20 10 0
Profile Status --------------
Predefined
Total:3
In the example above, the Reference column indicates the number of references to the profile named in the Name column. The Profile Status column is blank unless the rule is predefined.
This example displays the configuration settings for the profile test.\ (host) (config) #show ids rate-thresholds-profile test
IDS Rate Thresholds Profile "test"
----------------------------------
Parameter
Value
---------
-----
Channel Increase Time 15 sec
Channel Quiet Time
900 sec
Channel Threshold
300
Node Time Interval
15 sec
Node Quiet Time
900 sec
Node Threshold
200
The output of this command includes the following parameters:.
Parameter Channel Increase Time
Description Time, in seconds, in which the threshold must be
AOS-W 6.2 | Reference Guide
show ids rate-thresholds-profile | 1035
Parameter Channel Quiet Time Channel Threshold Node Time Interval Node Quiet Time Node Threshold
Description
exceeded in order to trigger an alarm.
The time that must elapse after a channel rate alarm before another identical alarm may be triggered. This option prevents excessive messages in the log file.
Number of a specific type of frame that must be exceeded within a specific interval in an entire channel to trigger an alarm.
Time, in seconds, in which the threshold must be exceeded in order to trigger an alarm.
The time that must elapse after a node rate alarm before another identical alarm may be triggered. This option prevents excessive messages in the log file.
Number of a specific type of frame that must be exceeded within a specific interval for a particular client MAC address to trigger an alarm.
Related Commands
Configure the IDS Rate Threshold profile using the command ids rate-thresholds-profile.
Command History
Version AOS-W 3.0 AOS-W 6.0
Description Command Introduced Refreshed show output
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
1036 | show ids rate-thresholds-profile
AOS-W 6.2 | Reference Guide
show ids signature-matching-profile
show ids signature-matching-profile <profile-name>
Description
Show an IDS Signature Matching profile.
Syntax
Parameter <profile-name>
Description Name of an IDS Signature Matching profile.
Usage Guidelines
Issue this command without the <profile-name>parameter to display the entire IDS Signature Matching profile list. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has four configured Signature Matching profiles. (host) (config) #show ids signature-matching-profile
IDS Signature Matching Profile List
-----------------------------------
Name
References Profile Status
----
---------- --------------
default
4
test1
1
Wizard-test 1
Wizard-test2 1
Total:4 In the example above, the Reference column indicates the number of references to the profile named in the Name column. The Profile Status column is blank unless the rule is predefined. This example displays the configuration settings for the profile test1. (host) (config) #show ids signature-matching-profile test1
IDS Signature Matching Profile "test1"
--------------------------------------
Parameter
Value
---------
-----
IDS Signature Deauth-Broadcast
IDS Signature Disassoc-Broadcast
The output of this command includes the following parameters:
Parameter IDS Signature IDS Signature
Value Broadcast is not authorized Disassociate broadcast
AOS-W 6.2 | Reference Guide
show ids signature-matching-profile | 1037
Related Commands
Configure the Signature Matching profile using the command ids signature-matching-profile.
Command History
Version AOS-W 3.0 AOS-W 6.0
Description Command Introduced Refreshed show output
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
1038 | show ids signature-matching-profile
AOS-W 6.2 | Reference Guide
show ids signature-profile
show ids signature-profile <profile-name>
Description
Show an IDS signature profile.
Syntax
Parameter <profile-name>
Description Name of an IDS Signature profile.
Usage Guidelines
Issue this command without the <profile>parameter to display the entire IDS Signature profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has eight configured Signature profiles.
(host) # show ids signature-profile
IDS Signature Profile List -------------------------Name ---AirJack ASLEAP Deauth-Broadcast default Netstumbler Generic Netstumbler Version 3.3.0x Null-Probe-Response sample
References ---------1 1 1 1 1 1 1 0
Profile Status -------------Predefined Predefined Predefined
Predefined Predefined Predefined
Total:8 This example displays the configuration settings for the profile AirJack.
(host) # show ids signature-profile IDS Signature Profile "AirJack" (predefined) --------------------------------------------Parameter Value --------- ----Frame Type beacon SSID = AirJack
The output of this command includes the following parameters:
AOS-W 6.2 | Reference Guide
show ids signature-profile | 1039
Parameter Frame Type
Description
Type of 802.11 frame. For each type of frame, further parameters may be included to filter and detect only the required frames. l assoc: Association frame type. l auth: Authentication frame type. l beacon: Beacon frame type. l control: All control frames. l data: All data frames. l deauth: Deauthentication frame type. l disassoc: Disassociation frame type. l mgmt: Management frame type. l probe-request: Probe request frame type. l probe-response: Probe response frame type. l ssid: For beacon, probe-request, and probe-response frame types, the
SSID as either a string or hex pattern. l ssid-length: For beacon, probe-request, and probe-response frame types,
the length, in bytes, of the SSID.
payload sequence number src- mac dst- mac bssid
Pattern at a fixed offset in the payload of an 802.11 frame. Sequence number of the frame. Source MAC address in the 802.11 frame header. Source MAC address in the 802.11 frame header. BSSID field in the 802.11 frame header.
Related Commands
Configure the Signature profile using the command ids signature-profile.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Enable and Config mode on master or local switches
1040 | show ids signature-profile
AOS-W 6.2 | Reference Guide
show ids unauthorized-device-profile
show ids unauthorized-device-profile <profile-name>
Description
Show an IDS Unauthorized Device Profile.
Syntax
Parameter <profile-name>
Description Name of an IDS Unauthorized Device profile
Usage Guidelines
Issue this command without the <profile-name>parameter to display the IDS Unauthorized Device profile list. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has five configured Unauthorized Device profiles. (host) (config) #show ids unauthorized-device-profile
IDS Unauthorized Device Profile List
------------------------------------
Name
References Profile Status
----
---------- --------------
default
4
test
0
test1
1
Wizard-test 1
Wizard-test2 1
Total:5
In the example above, the Reference column indicates the number of references to the profile named in the Name column. The Profile Status column is blank unless the rule is predefined. This example displays the configuration settings for the profile test1.
(host) (config) #show ids unauthorized-device-profile test1
IDS Unauthorized Device Profile "test1" --------------------------------------Parameter --------Detect Adhoc Networks Protect from Adhoc Networks Detect Windows Bridge Protect Windows Bridge Detect Wireless Bridge Detect Devices with an Invalid MAC OUI MAC OUI detection Quiet Time Wireless Bridge detection Quiet Time Rogue AP Classification Overlay Rogue AP Classification OUI-based Rogue AP Classification
Value ----false false true false false false 900 sec 900 sec true true true
AOS-W 6.2 | Reference Guide
show ids unauthorized-device-profile | 1041
Propagated Wired MAC based Rogue AP Classification Valid Wired MACs Allow Well Known MAC Rogue Containment Suspected Rogue Containment Suspected Rogue Containment Confidence Level Protect Valid Stations Detect Station Association To Rogue AP Detect Bad WEP Detect Misconfigured AP Protect Misconfigured AP Detect Valid SSID Misuse Protect SSID Privacy Require WPA Detect Unencrypted Valid Clients Unencrypted Valid Client Detection Quiet Time Valid 802.11g channel for policy enforcement Valid 802.11a channel for policy enforcement Valid MAC OUIs Valid and Protected SSIDs Protect 802.11n High Throughput Devices Protect 40MHz 802.11n High Throughput Devices Detect Active 802.11n Greenfield Mode Detect Adhoc Network Using Valid SSID Adhoc Network Using Valid SSID Quiet Time Detect Valid Client Misassociation
true N/A N/A false false 60 false true false true false false false false false true 900 sec N/A N/A N/A N/A false false false true 900 sec true
The output of this command includes the following parameters:
Parameter Detect AdHoc Networks Protect from Adhoc Networks Detect Windows Bridge Protect Windows Bridge Detect Wireless Bridge Detect Devices with an Invalid MAC OUI
MAC OUI detection Quiet Time
Wireless Bridge detection Quiet Time
Description
Shows if the profile has enabled or disabled detection of adhoc networks.
Shows if the profile has enabled or disabled protection from adhoc networks.
Shows if the profile has enabled or disabled detection of Windows station bridging.
Shows if the profile has enabled or disabled protection of Windows station bridging.
Shows if the profile has enabled or disabled detection of wireless bridging.
Shows if the profile has enabled or disabled checking of the first three bytes of a MAC address, known as the organizationally unique identifier (OUI), assigned by the IEEE to known manufacturers.
Time, in seconds, that must elapse after an invalid MAC OUI alarm has been triggered before another identical alarm may be triggered.
Time, in seconds, that must elapse after a wireless bridge alarm has been triggered before another identical alarm may be triggered.
1042 | show ids unauthorized-device-profile
AOS-W 6.2 | Reference Guide
Parameter Rogue AP Classification
Overlay Rogue AP Classification
Valid Wired MACs Allow Well Known MAC
Rogue Containment Suspected Rogue Containment
Suspected Rogue Containment Confidence Level Protect Valid Stations
Detect Bad WEP
Detect Misconfigured AP
Protect Misconfigured AP
Detect Valid SSID Misuse
Protect SSID
Privacy
Require WPA
Valid 802.11g channel for policy enforcement Valid 802.11a channel for policy enforcement Valid MAC OUIs Valid and Protected SSIDs Protect 802.11n High Throughput Devices
Description
Shows if the profile has enabled or disabled rogue AP classification.
Shows if the switch allows APs that are plugged into the wired side of the network to be classified as "suspected rogue" instead of "rogue".
List of valid and protected SSIDs.
Shows if the profile allows devices with known MAC addresses to classify rogue APs.
Shows if the switch will automatically shut down rogue APs.
Shows if the switch will automatically treat suspected rogue APs as interfering APs.
Confidence level of suspected Rogue AP to trigger containment, expressed as a percentage.
Shows if the switch will allow valid stations to connect to a non-valid AP.
Shows if the profile has enabled or disabled detection of WEP initialization vectors that are known to be weak and/or repeating.
Shows if the profile has enabled or disabled detection of misconfigured APs.
Shows if the profile has enabled or disabled protection of misconfigured APs.
Shows if the detect valid SSID minuse is enabled (true) or disabled (false).
Shows if the profile has enabled or disabled use of SSID by valid APs only.
Shows if the profile has enabled or disabled encryption as a valid AP configuration.
Shows if the switch will flag any valid AP not using WPA as a misconfigured AP.
A list of valid 802.1b/g channels that third-party APs are allowed to use.
A list of valid 802.11a channels that third-party APs are allowed to use.
A list of valid MAC Organizationally Unique Identifiers (OUIs).
A list of valid and protected SSIDs.
Shows if the profile enables or disables protection of highthroughput (802.11n) devices.
AOS-W 6.2 | Reference Guide
show ids unauthorized-device-profile | 1043
Parameter
Protect 40MHz 802.11n High Throughput Devices
Detect Active 802.11n Greenfield Mode
Description
Shows if the profile enables or disables protection of highthroughput (802.11n) devices operating in 40 MHz mode.
Shows if the profile enables or disables detection of highthroughput devices advertising greenfield preamble capability.
Related Commands
Configure the Unauthorized Device profile using the command ids unauthorized-device-profile.
Command History
Version AOS-W 3.0 AOS-W 6.0
Description Command Introduced Refreshed show output
Command Information
Platforms Available on all platforms
Licensing Requires the RFprotect license
Command Mode Config mode on master switches
1044 | show ids unauthorized-device-profile
AOS-W 6.2 | Reference Guide
show ids wms-general-profile
show ids wms-general-profile
Description
Display general statistics for the wms configuration.
Syntax
No parameters.
Example
This example shows per-channel statistics for all monitored APs.
(host) #show ids wms-general-profile
IDS WMS General Profile ----------------------Parameter --------AP poll interval AP poll retries AP ageout interval Adhoc AP ageout interval Station ageout interval Statistics update Persistent Neighbor APs Persistent Valid STAs AP learning Propagate Wired Macs Collect Stats for Monitored APs and Clients Learn System Wired Macs
Value ----60000 msec 3 0 minutes 31 minutes 100 minutes true true false false true false false
Column
Description
AP poll interval
Interval, in milliseconds, for communication between the switch and AMs. The switch contacts the AM at this interval to download AP to station associations, update policy configuration changes, and download AP and station statistics.
AP poll retries
Maximum number of failed polling attempts before the polled AM is considered to be down.
AP ageout interval
Time, in minutes, that an AP must remain unseen by any probes before it is deleted from the database.
Adhoc AP ageout interval
Time, in minutes, that an adhoc (IBSS) AP remains unseen before it is deleted (ageout) from the database.
Station ageout interval Time, in minutes, that an client must unseen by any probes before it is deleted from the database.
Statistics update
Shows the status of the statistics updates in the database.
Persistent Neighbor APs Shows the status of known AP neighbors.
AOS-W 6.2 | Reference Guide
show ids wms-general-profile | 1045
Column
Description
Persistent Valid STAs Shows the status of known AP neighbors.
AP learning
Shows the status of "learning" of non-Alcatel-Lucent APs.
Propagate Wired Macs
Shows if the switch has enabled or disabled the propagation of the gateway wired MACs.
Collect Stats for Mon- Shows if the master switch will collect up to 25,000 statistic entries for monitored itored APs and Clients APs and clients.
Learn System Wired Macs Shows the status of "learning" of wired MACs at the switch.
The output of this command includes the following information:
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced
Added the following parameters adhoc-ap-ageout-interval debug persistent-neighbor event-correlation event-correlation-quiet-time Minutes Tick
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
1046 | show ids wms-general-profile
AOS-W 6.2 | Reference Guide
show image version
Description
Display the current system image version on both partition 0 and 1.
Syntax
No parameters.
Example
The following example shows that the switch is running AOS-W 3.4 and booting off partition 0:0.
(host) #show image version
----------------------------------
Partition
: 0:0 (/dev/hda1) **Default boot**
Software Version
: AOS-W 3.3.2.0
Build number
: 18661
Label
: 18661
Built on
: 2008-06-12 04:24:34 PDT
----------------------------------
Partition
: 0:0 (/dev/hda1)
Software Version
: AOS-W 3.3.2.0
Build number
: 18661
Label
: 18661
Built on
: 2008-06-12 04:24:34 PDT
The output of this command includes the following parameters:
Parameter Partition
Software Version Build number Label
Built on
Description
Partition number and name. The default boot partition will display a **Default boot** notice by the partition name.
Version of AOS-W software running on the partition.
Build number for the software version.
The label parameter can display additional information for the build. By default, this value is the software build number.
Date the software build was created.
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show image version | 1047
show interface cellular access-group
show interface cellular access-group
Description
List the Access groups configured on the cellular interface.
Example
(host) (config-cell)#show interface cellular access-group
Cell Interface: session access list 3 is configured
Command History
Release
AOS-W 5.0
Modification
Command introduced
Command Information
Platforms
OAW-4306 Series
Licensing
Base operating system
Command Mode
Configuration Mode (config-cell)
1048 | show interface cellular access-group
AOS-W 6.2 | Reference Guide
show interface counters
show interface counters
Description
Displays a table of L2 interfaces counters.
Syntax
No parameters
Example
The example below shows the output of show interface counters on an OAW-4306Gswitch.
Port GE1/0 GE1/1 GE1/2 GE1/3 GE1/4 GE1/6 GE1/7
InOctets 250559459 1615683022
204909 2964355 1612815178 23571170611 23562566444
InUcastPkts 1664878 1230973 1511 22155
12509415 15545404 15530432
InMcastPkts 0 0 0 0 0 0
8236
InBcastPkts 16 16 16 17
228 4
146
Port GE1/0 GE1/1 GE1/2 GE1/3 GE1/4 GE1/6 GE1/7
OutOctets 2504472376
169128719 1881584 5247669
26893373267 539935348
23563612641
OutUcastPkts 2645877 820198 25785 47718
20838930 8160008
15531317
OutMcastPkts 8243 8243 8243 8245 8243 8139 7
The output of this command includes the following parameters:
OutBcastPkts 16770 17083 16771 16813 16561 461 336
Parameter Port InOctets InUcastPkts InMcastPkts InBcastPkts OutOctets OutUcastPkts OutMcastPkts OutBcastPkts
Description Port number. Number of octets received through the port. Number of unicast packets received through the port. Number of multicast packets received through the port. Number of broadcast packets received through the port. Number of octets sent through the port. Number of unicast packets sent through the port. Number of multicast packets sent through the port. Number of broadcast packets sent through the port.
Command History
This command was introduced in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show interface counters | 1049
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master switches
1050 | show interface counters
AOS-W 6.2 | Reference Guide
show interface fastethernet
show interface fastethernet <slot/port>
Description
Displays information about a specified fast Ethernet port.
Syntax
Parameter access-group counters switchport untrusted-vlan xsec
Description Displays access groups configured on this interface. Displays L2 interface counters for the specified interface. Displays L2 interface information. Displays port member vlan untrusted status. Displays xsec configuration.
Examples
The example below shows the output of show interface fastethernet 1/0.
FE 1/0 is up, line protocol is up Hardware is FastEthernet, address is 00:0B:86:51:14:D1 (bia 00:0B:86:51:14:D1) Description: fe1/0 Encapsulation ARPA, loopback not set Configured: Duplex ( AUTO ), speed ( AUTO ) Negotiated: Duplex (Full), speed (100 Mbps) MTU 1500 bytes, BW is 100 Mbit Last clearing of "show interface" counters 15 day 21 hr 34 min 53 sec link status last changed 15 day 21 hr 32 min 16 sec
1122463 packets input, 196293018 bytes Received 661896 broadcasts, 0 runts, 0 giants, 0 throttles 0 input error bytes, 0 CRC, 0 frame 661881 multicast, 460567 unicast 191428 packets output, 97063150 bytes 0 output errors bytes, 0 deferred 0 collisions, 0 late collisions, 0 throttles This port is TRUSTED POE Status of the port is OFF
The output of this command includes the following parameters:
Parameter FE 1/0 is... line protocol is... Hardware is.... address is... Description Encapsulation
Description Displays the status of the specified port. Displays the status of the line protocol on the specified port. Describes the hardware interface type. Displays the MAC address of the hardware interface. The port type, name, and connector type. Encapsulation method assigned to this port.
AOS-W 6.2 | Reference Guide
show interface fastethernet | 1051
Parameter loopback... Configured Negotiated MTU bytes BW is... Last clearing of "show interface counters"
This port is... POE status of the port is...
Description Displays whether or not loopback is set. Configured transfer operation and speed. Negotiated transfer operation and speed. MTU size of the specified port in bytes. Bandwidth of the link. Time since "show interface counters" was cleared. Below the time, all current counters related to the specified port are listed. Whether or not this port is trusted. The POE status of the specified port.
#show interface fastethernet 1/0 access-group
FE 1/0:
Port-Vlan Session ACL
---------------------
SessionACL
Vlan
----------
----
Status ------
The output of this command includes the following parameters:
Parameter SessionACL Vlan Status
Description Session ACL name. VLAN number. ACL status.
#show interface fastethernet 1/0 counters
Port FE1/0
InOctets 196310364
InUcastPkts 460655
InMcastPkts 661932
InBcastPkts 15
Port FE1/0
OutOctets 97074242
OutUcastPkts 191401
OutMcastPkts 3
OutBcastPkts 72
The output of this command includes the following parameters:
Parameter Port InOctets InUcastPkts
Description Port number. Number of octets received through the port. Number of unicast packets received through the port.
1052 | show interface fastethernet
AOS-W 6.2 | Reference Guide
Parameter InMcastPkts InBcastPkts OutOctets OutUcastPkts OutMcastPkts OutBcastPkts
Description Number of multicast packets received through the port. Number of broadcast packets received through the port. Number of octets sent through the port. Number of unicast packets sent through the port. Number of multicast packets sent through the port. Number of broadcast packets sent through the port.
#show interface fastethernet 1/0 switchport Name: FE1/0 Switchport: Enabled Administrative mode: trunk Operational mode: trunk Administrative Trunking Encapsulation: dot1q Operational Trunking Encapsulation: dot1q Access Mode VLAN: 0 ((Inactive)) Trunking Native Mode VLAN: 1 (Default) Trunking Vlans Enabled: ALL Trunking Vlans Active: 1-3
The output of this command includes the following parameters:
Parameter Name Switchport Administrative mode Operational mode Administrative Trunking Encapsulation Operational Trunking Encapsulation Access Mode VLAN Trunking Native Mode VLAN Trunking Vlans Enabled Trunking Vlans Active
Description Port name. Whether or not switchport is enabled. Administrative mode. Operational mode. Encapsulation method used for administrative trunking.
Encapsulation method used for operational trunking.
The access mode VLAN for the specified port. The trunking native mode VLAN for the specified port. Number of trunking VLANs currently enabled. Number of trunking VLANs currently active.
#show interface fastethernet 1/0 untrusted-vlan
Name: FE1/0 Untrusted Vlan(s)
The output of this command includes the following parameters:
Parameter Name Untrusted Vlan(s)
Description Name of the specified port. List of untrusted VLANs.
AOS-W 6.2 | Reference Guide
show interface fastethernet | 1053
#show interface fastethernet 1/1 xsec xsec vlan 7 is ACTIVE
The output of this command includes the following parameters:
Parameter
xsec vlan 7 is ACTIVE
Description
This states that xsec is active on the specified port as well as the associated VLAN.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
1054 | show interface fastethernet
AOS-W 6.2 | Reference Guide
show interface gigabitethernet
show interface gigabitethernet <slot/port>
Description
Displays information about a specified Gigabit Ethernet port.
Syntax
Parameter counters switchport untrusted-vlan xsec
Description Displays L2 interface counters for the specified interface. Displays L2 interface information. Displays port member vlan untrusted status. Displays xsec configuration.
Examples
The example below shows the output of show interface gigabitethernet 1/0.
(host)# show interface gigabitethernet 1/0
GE 1/0 is up, line protocol is up Hardware is Gigabit Ethernet, address is 00:0B:86:F0:33:E1 (bia 00:0B:86:F0:33:E1) Description: GE1/0 (RJ45 Connector) Encapsulation ARPA, loopback not set Configured: Duplex ( AUTO ), speed ( AUTO ) Jumbo Support is enabled on this interface MTU 9216 Negotiated: Duplex (Full), speed (100 Mbps) MTU 1500 bytes, BW is 100 Mbit Last clearing of "show interface" counters 23 day 4 hr 27 min 54 sec link status last changed 15 day 3 hr 15 min 21 sec
2049219 packets input, 112651020 bytes Received 911909 broadcasts, 0 runts, 0 giants, 0 throttles 26 input error bytes, 0 CRC, 0 frame 906926 multicast, 1137310 unicast 185897 packets output, 58327172 bytes 0 output errors bytes, 0 deferred 0 collisions, 0 late collisions, 0 throttles This port is TRUSTED POE Status of the port is ON Jumbo frame support is enabled
The output of this command includes the following parameters:
Parameter GE 1/0 is... line protocol is... Hardware is.... address is... Description Encapsulation
Description Displays the status of the specified port. Displays the status of the line protocol on the specified port. Describes the hardware interface type. Displays the MAC address of the hardware interface. The port type, name, and connector type. Encapsulation method assigned to this port.
AOS-W 6.2 | Reference Guide
show interface gigabitethernet | 1055
Parameter loopback... Configured Jumpo support... Negotiated MTU bytes BW is... Last clearing of "show interface counters" link status last changed...
This port is... POE status of the port is...
Description Displays whether or not loopback is set. Configured transfer operation and speed. Jumbo frame support is enabled. Negotiated transfer operation and speed. MTU size of the specified port in bytes. Bandwidth of the link. Time since "show interface counters" was cleared.
Time since "show interface counters" was cleared. Below the time, all current counters related to the specified port are listed. Whether or not this port is trusted. The POE status of the specified port.
(host)#show interface gigabitethernet 1/0
Port GE1/0
InOctets 112670646
InUcastPkts 1137507
InMcastPkts 907019
Port GE1/0
OutOctets 58342401
OutUcastPkts 170490
OutMcastPkts 104
InBcastPkts 4983
OutBcastPkts 15373
The output of this command includes the following parameters:
Parameter Port InOctets InUcastPkts InMcastPkts InBcastPkts OutOctets OutUcastPkts OutMcastPkts OutBcastPkts
Description Port number. Number of octets received through the port. Number of unicast packets received through the port. Number of multicast packets received through the port. Number of broadcast packets received through the port. Number of octets sent through the port. Number of unicast packets sent through the port. Number of multicast packets sent through the port. Number of broadcast packets sent through the port.
#show interface gigabitethernet 1/0 switchport
Name: GE1/0 Switchport: Enabled Administrative mode: static access Operational mode: static access Administrative Trunking Encapsulation:
dot1q
1056 | show interface gigabitethernet
AOS-W 6.2 | Reference Guide
Operational Trunking Encapsulation: dot1q Access Mode VLAN: 62 (VLAN0062) Trunking Native Mode VLAN: 1 (Default) Trunking Vlans Enabled: NONE Trunking Vlans Active: NONE
The output of this command includes the following parameters:
Parameter Name Switchport Administrative mode Operational mode Administrative Trunking Encapsulation Operational Trunking Encapsulation Access Mode VLAN Trunking Native Mode VLAN Trunking Vlans Enabled Trunking Vlans Active
Description Port name. Whether or not switchport is enabled. Administrative mode . Operational mode. Encapsulation method used for administrative trunking.
Encapsulation method used for operational trunking.
The access mode VLAN for the specified port. The trunking native mode VLAN for the specified port. Number of trunking VLANs currently enabled. Number of trunking VLANs currently active.
(host) #show interface gigabitethernet 1/0 untrusted-vlan
Name: GE1/0 Untrusted Vlan(s)
The output of this command includes the following parameters:
Parameter Name Untrusted Vlan(s)
Description Name of the specified port. List of untrusted VLANs.
(host)# show interface gigabitethernet 1/1 xsec xsec vlan 7 is ACTIVE
The output of this command includes the following parameters:
Parameter
xsec vlan 7 is ACTIVE
Description
This states that xsec is active on the specified port as well as the associated VLAN.
Command History
This command was introduced in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show interface gigabitethernet | 1057
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
1058 | show interface gigabitethernet
AOS-W 6.2 | Reference Guide
show interface loopback
show interface loopback
Description
Displays information about the loopback IP interface.
Syntax
No parameters
Example
The example below shows the output of show interface loopback on a OAW-4306Gswitch. #show interface loopback loopback interface is up line protocol is up Hardware is Ethernet, address is 00:0B:86:51:14:D0 Internet address is 10.3.49.100 255.255.255.255 The output of this command includes the following parameters:
Parameter
Description
loopback interface is...
Status of the loopback interface.
line protocol is...
Status of the line protocol on the specified port.
Hardware is...
Hardware interface type.
address is...
MAC address of the loopback interface.
Internet address is... IP address and subnet mask of the loopback interface.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
AOS-W 6.2 | Reference Guide
show interface loopback | 1059
show interface mgmt
show interface mgmt
Description
Displays information about mgmt interfaces.
Syntax
No parameters
Example
The example below shows the output of show interface mgmt on a switch. # show interface mgmt mgmt is up line protocol is up Hardware is Ethernet, address is 00:0B:86:61:00:5D Internet address is 10.4.71.10 255.255.255.0
he output of this command includes the following parameters:
Parameter mgmt is... line protocol is... Hardware is... address is... Internet address is...
Description Status of the mgmt interface. Status of the line protocol on the specified port. Describes the hardware interface type. Interface's MAC address. Interface's IP address and subnet mask.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms
Licensing
Only available on an M3 with Base operating system a management port
Command Mode Enable or config mode on master switches
1060 | show interface mgmt
AOS-W 6.2 | Reference Guide
show interface port-channel
show interface port-channel
Description
Displays information about a specified port-channel interface.
Syntax
Parameter access-group counters untrusted-vlan xsec
Description Displays access groups configured on this interface. Displays L2 interface counters for the specified interface. Displays port member vlan untrusted status. Displays xsec configuration.
Example
The example below shows the output of show interface port-channel 0 on a switch.
Port-Channel 0 is administratively up
Hardware is Port-Channel, address is 00:00:00:00:00:00 (bia 00:0B:86:F0:36:B1)
Description: Link Aggregate (LACP)
Spanning Tree is disabled
VLAN membership:
1
Switchport priority: 0
Member port:
Last clearing of "show interface" counters 3 day 21 hr 23 min 6 sec
link status last changed 3 day 21 hr 23 min 6 sec
0 packets input, 0 bytes
Received 0 broadcasts, 0 runts, 0 giants, 0 throttles
0 input error bytes, 0 CRC, 0 frame
0 multicast, 0 unicast
0 packets output, 0 bytes
0 output errors bytes, 0 deferred
0 collisions, 0 late collisions, 0 throttles
Port-Channel 0 is NOT TRUSTED
The output of this command includes the following parameters:
Parameter Port-Channel 0 is... line protocol is... Hardware is.... address is...
Description Status of the specified port. Status of the line protocol on the specified port. Hardware interface type. MAC address of the hardware interface.
AOS-W 6.2 | Reference Guide
show interface port-channel | 1061
Parameter Description
Spanning Tree is... VLAN membership Switchport priority Last clearing of "show interface counters"
Port-channel 0 is...
Description
The port type, name, and connector type. If the LAG is created by LACP, it is indicated as shown in the display output above. If the LAG is created by LACP, you can not statically add or delete any ports under that port channel. All other commands are allowed. If LACP is not shown, then the LAG is created by static configuration.
Spanning tree status on the specified port-channel.
Number of VLANs the specified port-channel is associated with.
Switchport priority of the specified port-channel.
Time since "show interface counters" was cleared.
Below the time, all current counters related to the specified port are listed.
Whether or not this port-channel is trusted.
#show interface port-channel 0 access-group
Port-Channel 0:
Port-Vlan Session ACL
---------------------
SessionACL
Vlan
Status
----------
----
------
The output of this command includes the following parameters:
Parameter SessionACL Vlan Status
Description Session ACL name. VLAN number. ACL status.
#show interface port-channel 0 counters
Port
InOctets
InUcastPkts
PC 0:
0
0
Port
OutOctets OutUcastPkts
PC 0:
0
0
InMcastPkts 0
OutMcastPkts 0
InBcastPkts 0
OutBcastPkts 0
The output of this command includes the following parameters:
Parameter PC InOctets InUcastPkts
Description Port number. Number of octets received through the port. Number of unicast packets received through the port.
1062 | show interface port-channel
AOS-W 6.2 | Reference Guide
Parameter InMcastPkts InBcastPkts OutOctets OutUcastPkts OutMcastPkts OutBcastPkts
Description Number of multicast packets received through the port. Number of broadcast packets received through the port. Number of octets sent through the port. Number of unicast packets sent through the port. Number of multicast packets sent through the port. Number of broadcast packets sent through the port.
#show interface port-channel 0 untrusted-vlan
Name: FE1/0 Untrusted Vlan(s)
The output of this command includes the following parameters:
Parameter Name Untrusted Vlan(s)
Description Name of the specified port. List of untrusted VLANs.
#show interface port-channel 0 xsec
xsec vlan 7 is ACTIVE
The output of this command includes the following parameters:
Parameter
xsec vlan 7 is ACTIVE
Description This states that xsec is active on the specified port as well as the associated VLAN.
Command History
Release AOS-W 3.4.1 AOS-W 3.0.
Modification Modified to display LACP when applicable. Command introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
AOS-W 6.2 | Reference Guide
show interface port-channel | 1063
show interface-profile voip-profile
show interface-profile voip-profile <profile-name>
Description
This command displays the specified VoIP profile configuration information.
Syntax
Parameter <profile-name>
Description Name of the VoIP profile.
Examples
The following example shows configuration details for the VoIP profile:
(host) #show interface-profile voip-profile profile1
VOIP profile "profile1"
-----------------------
Parameter Value
--------- -----
VOIP VLAN 1
DSCP
0
802.1 UP 0
VOIP Mode auto-discover
The output of this command includes the following information:
Parameter VOIP VLAN DSCP 802.1 UP VOIP Mode
Description The Voice VLAN ID. The DSCP value for the voice VLAN. The 802.11p priority level. The mode of VoIP operation. It can be auto-discover or static.
Command History
Command introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Enable or Config mode on master or local switches
1064 | show interface-profile voip-profile
AOS-W 6.2 | Reference Guide
show interface tunnel
show interface tunnel
Description
Displays information about tunnel interfaces.
Syntax
No parameters
Example
The example below shows the output of show interface tunnel. #show interface tunnel 2000
Tunnel 2000 is up line protocol is up Description: Tunnel Interface Internet address is 3.3.3.1 255.255.255.0 Source 192.168.203.1 Destination 192.168.202.1 Tunnel mtu is set to 1100 Tunnel is an IP GRE TUNNEL Tunnel is Trusted Inter Tunnel Flooding is enabled Tunnel keepalive is disabled he output of this command includes the following parameters:
Parameter Tunnel 2000 is... line protocol is... Description Internet address is... Source Destination Tunnel mtu is set to... Tunnel is an... Tunnel is... Inter tunnel flooding is... Tunnel keepalive is...
Description Status of the specified tunnel. Displays the status of the line protocol on the specified tunnel. Description of the specified interface. IP address and subnet mask of the specified interface. IP address of the tunnel's source. IP address of the tunnel's source. Size of the specified tunnel's MTU. Description of the specified tunnel. Whether or not the specified tunnel is trusted. Status of inter tunnel flooding on the specified tunnel.
Status of tunnel keepalive on the specified tunnel.
Command History
This command was introduced in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show interface tunnel | 1065
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
1066 | show interface tunnel
AOS-W 6.2 | Reference Guide
show interface vlan
show interface vlan
Description
Displays information about a specified VLAN interface.
Syntax
No parameters
Example
The example below shows the output of show interface vlan 1 on a OAW-4306G switch. #show interface vlan 1
VLAN1 is up line protocol is down Hardware is CPU Interface, Interface address is 00:0B:86:61:82:40 (bia 00:0B:86:61:82:40) Description: 802.1Q VLAN Internet address is 10.3.49.50 255.255.255.0 Routing interface is enable, Forwarding mode is enable Directed broadcast is disabled, BCMC Optimization disabled ProxyARP disabled Suppress ARP disabled Encapsulation 802, loopback not set MTU 1500 bytes Last clearing of "show interface" counters 4 day 0 hr 28 min 58 sec link status last changed 4 day 0 hr 28 min 58 sec Proxy Arp is disabled for the Interface DHCP Option-82 mac and essid are configured on this Interface
The output of this command includes the following parameters:
Parameter VLAN1 is... line protocol is... Hardware is... Interface address is... Description Internet address is... Routing interface is... Forwarding mode is... Directed broadcast is... Encapsulation loopback...
Description Status of the specified VLAN Displays the status of the line protocol on the specified port Describes the hardware interface type Displays the MAC address of the hardware interface Description of the specified VLAN IP address and subnet mask of the specified VLAN Status of the routing interface Status of the forwarding mode Displays whether or not directed broadcast is enabled Encapsulation type Loopback status
AOS-W 6.2 | Reference Guide
show interface vlan | 1067
Parameter MTU Last clearing of "show interface counters" link status last changed Proxy ARP is... DHCP Option-82 is...
Description MTU size of the specified port in bytes Time since "show interface counters" was cleared
Time since link status last changed Status of proxy ARP on the specified interface Status of DHCP Option 82. If the MAC address and ESSID are configured on this interface
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
1068 | show interface vlan
AOS-W 6.2 | Reference Guide
show inventory
show inventory
Description
Displays hardware inventory of the switch.
Syntax
No parameters.
Example
Issue this command to display the hardware component inventory of the switch. The output of this command will vary, depending upon switch type.
Supervisor Card slot
Mobility Processor
Mobility Processor Assembly#
Mobility Processor Serial#
SC
Assembly#
SC
Serial#
SC
Model#
Mgmt Port HW MAC Addr
HW MAC Addr
FXPLD Version
PEER Supervisor Card
Line Card 0
Line Card 1
Line Card 2
Line Card 2 FPGA
Line Card 2 Switch Chip
Line Card 2 Mez Card
Line Card 2 SPOE
Line Card 2 Sup Card 0
Line Card 2 Sup Card 1
Line Card 2 Assembly#
Line Card 2 Serial#
Line Card 2 SPOE Assembly#
Line Card 2 SPOE Serial#
Line Card 2 MEZZ Assembly#
Line Card 2 MEZZ Serial#
Line Card 3
Line Card 3 FPGA
Line Card 3 Switch Chip
Line Card 3 Mez Card
Line Card 3 SPOE
Line Card 3 Sup Card 0
Line Card 3 Sup Card 1
Line Card 3 Assembly#
Line Card 3 Serial#
Line Card 3 SPOE Assembly#
Line Card 3 SPOE Serial#
Line Card 3 MEZZ Assembly#
Line Card 3 MEZZ Serial#
FAN 0
FAN 1
FAN 2
Fan Tray Assembly#
:1 : FPGA Rev 0x30030920 : 2010027B : F00488202 : 2010032B (Rev:02.00) : FP0001470 (Date:07/01/24) : M3mk1 : 00:0B:86:F0:23:02 : 00:0B:86:01:C5:00 to 00:0B:86:01:C5:7 : (Rev: 20) : Absent : Absent : Not accessible from this SC : Present : LCCI Rev 0x6 : Broadcom 56308 Rev 0x3 : Present : Present : Absent : Present ( Active ) : 2000001C (Rev:03.00) (24FE+2GE) : C00000277 (Date:02/22/05) : 2000020B (Rev:01.00) (SPOE-2) : FP0000100 : 2000002A (Rev:01.00) : S00000540 : Present : LCCI Rev 0x6 : Broadcom 56308 Rev 0x3 : Present : Present : Absent : Present ( Active ) : 2000001C (Rev:03.00) (24FE+2GE) : C00007293 (Date:09/27/05) : 2000003B (Rev:02.00) (SPOE-1) : S00001750 : 2000002A (Rev:01.00) : C00007172 : OK, Speed High : OK, Speed High : OK, Speed High : 2000007C (Rev:01.00)
AOS-W 6.2 | Reference Guide
show inventory | 1069
Fan Tray Serial# Back Plane Assembly# Back Plane Serial# Power Supply type Power Supply 0 Power Supply 1 Power Supply 2 M3mk1 Card Temperatures
AMP Card Temperatures
M3mk1 Card Voltages
: C00013879 (Date:12/18/04)
: 2000006B (Rev:01.00)
: A00000250 (Date:12/18/04)
: Power One (400W)
: OK (400W)
: FAILED
: Absent
: M3mk1 card
47 C
: CPU
47 C
: Processor Card
41 C
: Mobility Processor
56 C
: M3mk1 5000mV
5010 mV
: M3mk1 3300mV
3340 mV
: M3mk1 2500mV
2432 mV
: M3mk1 1800mV
1790 mV
: M3mk1 1500mV
1490 mV
: M3mk1 1250mV
1260 mV
: M3mk1 1200mV
1200 mV
: M3mk1 IBC 12000mV
11815 mV
: M3mk1 CPU Fan Speed
6887 RPMs
: M3mk1 CPU CORE 1200mV 1080 mV
: M3mk1 XGMII VTT 750mV
750 mV
: M3mk1 VTT0(a&b) 900mV
900 mV
: M3mk1 VTT1(c&d) 900mV
900 mV
: AMP 3300mV
3320 mV
: AMP 2500mV
2480 mV
: AMP 1800mV
1800 mV
: AMP 1500mV
1500 mV
: AMP BCM 1200mV
1200 mV
: AMP FPGA 1200mV(1)
1200 mV
: AMP FPGA 1200mV(2)
1200 mV
The output includes the following parameters:
Parameter Supervisor Card Slot Mobility Processor
Mobility Processor Assembly#
Mobility Processor Serial#
SC Assembly# SC Serial# SC Model# Mgmt Port HW MAC Address HW MAC Address FXPLD Version PEER Supervisor Card
Description Supervisor card slot number Revision of the image downloaded to the FPGA. This can change if a newer image is included in a newer release. Assembly number of the mobility processor. This only applies to OAW-S3 cards. Serial number of the mobility processor. This only applies to OAWS3 cards. Assembly number of the supervisor card. Serial number of the supervisor card. Model number of the supervisor card. MAC address of the mgmt port MAC address Revision of programmable logic device on supervisor card. States whether or not a PEER supervisor card is present.
1070 | show inventory
AOS-W 6.2 | Reference Guide
Parameter
Description
Line Card <slot number>
States whether or not a line card is present in the specified slot
Line Card <slot number> FPGA
Name/type of FPGA associated with the specified line card slot
Line Card <slot number> Switch Chip
Name/type of switch card associated with the specified line card slot
Line Card <slot number> Mez Card
States whether or not a mezzanine card is present in the specified slot
Line Card <slot number> SPOE
States whether or not a SPOE card is present in the specified slot
Line Card <slot number> Sup Card 0
States whether or not a supervisor card 0 is present in the specified slot
Line Card <slot number> Sup Card 1
States whether or not a supervisor card 1 is present in the specified slot
Line Card <slot number> Assembly#
Assembly number of the line card in the specified slot
Line Card <slot number> Serial# Serial number of the line card in the specified slot
Line Card <slot number> SPOE Assembly#
Assembly number of SPOE line card in the specified slot
Line Card <slot number> SPOE Serial#
Serial number of SPOE line card in the specified slot
Line Card <slot number> MEZZ Assembly#
Assembly number of the mezzanine card in the specified slot
Line Card <slot number> MEZZ Serial#
Serial number of the mezzanine card in the specified slot
FAN <Fan number>
Status of the specified fan
Fan Tray Assembly#
Assembly number of the fan tray
Fan Tray Serial#
Serial number of fan tray
Back Plane Assembly#
Assembly number of the back plane
Back Plane Serial#
Serial number of the back plane
Power Supply Type
Power supply type
Power Supply <power supply number>
Power supply status
M3mk1 Card Temperatures l M3mk1 card l CPU
l The temperature from the sensor on the supervisor card l The temperature from the CPU die
AMP Card Temperatures l Processor Card l Mobility Processor
l The temperature from the sensor on the Mobility Processor card l The temperature from the FPGA die
AOS-W 6.2 | Reference Guide
show inventory | 1071
Parameter M3mk1 Card Voltages
Description
This parameter displays to columns of voltages for many components displayed previously by this command. The voltage displayed in the right column should match the corresponding value in the left column, generally with +/- 5%.
Command History
This command was introduced in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
1072 | show inventory
AOS-W 6.2 | Reference Guide
show iostat
show iostat
Description
Displays IO statistics information. This command reports Central Processing Unit (CPU) statistics and input/output statistics for devices and partitions.
Syntax
No parameters.
Example
Issue this command to display the IO statistics of the switch. cpu 290556 0 4305598 107533173 cpu0 290556 0 4305598 107533173 page 46291 249539 swap 0 0 intr 17959116 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 17950877 0 8148 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000 0 0 0 0 0 0 0 0 30 61 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00000000000000000000000000000000000000000000000 00000000000000000000
0000000000000 disk_io: (3,0):(679,460,7196,219,950) ctxt 135640513 btime 1241728432 processes 357519
The output includes the following parameters:
Parameter cpu
page
swap intr disk_io
ctxt btime processes
Description
The number of jiffies (1/100th of a second) that the system spent in user mode, user mode with low priority, system mode, and the idle task, respectively.
The number of pages the system paged in and the number that were paged out (from disk).
The number of swap pages that have been brought in an out.
The number of interrupts received from the system boot.
(x,y) is (major, minor):(xx, xx, xxxx, x, x) is (noinfo, read_io_ops, blks_read, write_ io_ops, blks_written)
The number of context switches that the system underwent.
The boot time, in seconds.
The number of forks since boot.
Command History
This command was introduced in AOS-W 1.0.
AOS-W 6.2 | Reference Guide
show iostat | 1073
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master switches
1074 | show iostat
AOS-W 6.2 | Reference Guide
show ip access-group
show ip access-group
Description
Display access control lists (ACLs) configured for each port on the switch.
Syntax
No parameters.
Examples
The example below shows part of the output of this command. If a port does not have a defined session ACL, the Port-Vlan Session ACL table will be blank.
(host) # show ip access-group FE 1/0: Rx access list 200 is applied session access list User14 is applied
Port-Vlan Session ACL
---------------------
SessionACL
Vlan
----------
----
coltrane
22
Status -----configured
The output of this command includes the following parameters:
Parameter Description
Session ACL Name of the ACL applied to the interface.
VLAN
If the ACL was applied to a VLAN associated with this port, this column will show the VLAN ID.
Status
Shows whether or not the session ACL is configured.
Related Commands
Command interface fastethernet | gigabitethernetip accessgroup
Description
Configure an access group for an interface.
Command History
Release AOS-W 3.0 AOS-W 3.4
Modification Command introduced The VLAN output parameters was introduced.
AOS-W 6.2 | Reference Guide
show ip access-group | 1075
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master or local switches
1076 | show ip access-group
AOS-W 6.2 | Reference Guide
show ip access-list
show ip access-list {brief|<string>}
Description
Display a table of all configured access control lists (ACLs), or show details for a specific ACL.
Syntax
Parameter Description
brief
Display a table of information for all ACLs.
<string>
Specify the name of a single ACL to display detailed information on that ACL.
Examples
The example below shows general information for all ACLs in the Access List table. (Host) #show ip access-list brief
Access list table ----------------Name ---200 33 allowall ap-acl captiveportal captiveportal6 control test-logon logon cplogout default guest log-https srcnat stateful-dot1x stateful-kerberos validuser
Type ---eth standard session session session
session session
session session session session session session session session
Use Count ---------
2 2 4
2 7 1
2 1
Roles -----
trusted-ap default-vpn-role rap_role ap-role coltrane-logon wizardtest-logon test-logon logon
guest-logon logon ap-role coltrane-logon wizardtest-logon guest stateful guest
stateful-dot1x logon test-24325
The output of this command includes the following parameters:
Parameter Description
Name
Name of an access-control list (ACL).
Type
Shows that the ACL is one of the following ACL policy types: l Ethertype l Standard l Session l MAC l Extended
AOS-W 6.2 | Reference Guide
show ip access-list | 1077
Parameter Description
Use Count Number of rules defined in the ACL.
Roles
Names of user roles associated with the ACL.
Include the name of a specific ACL to show detailed configuration information for that ACL. The output in the example below has been divided into two sections to better fit int this document. The output in the command-line interface will appear in a single, long table.
(host)# show ip access-list captiveportal6
ip access-list session captiveportal6
captiveportal6
--------------
Priority Source Destination Service
Action TimeRange Log Expired Queue
-------- ------ ----------- -------
------ --------- --- ------- -----
1
user controller6 svc-https
captive
Low
2
user any
svc-http
captive
Low
3
user any
svc-https
captive
Low
4
user any
svc-http-proxy1 captive
Low
5
user any
svc-http-proxy2 captive
Low
6
user any
svc-http-proxy3 captive
Low
6
TOS 8021P Blacklist Mirror DisScan ClassifyMedia IPv4/6 --- ----- --------- ------ ------- ------------- ------
6 6 6 6 6 6
The output of this command may include some or all of the following parameters:
Parameter Priority Source
Destination
Description
Name of an access-control list (ACL).
The traffic source, which can be one of the following: l alias: The network resource (use the netdestination command to configure aliases; use the
show netdestination command to see configured aliases) l any: Matches any traffic. l host: A single host IP address. l network: The IP address and netmask. l user: The IP address of the user.
l localip: The set of all local IP addresses on the system, on which the ACL is applied.
The traffic destination, which can be one of the following: l alias: The network resource (use the netdestination command to configure aliases; use the
show netdestination command to see configured aliases) l any: Matches any traffic. l host: A single host IP address. l network: An IP address and netmask. l user: The IP address of the user.
l localip: The set of all local IP addresses on the system, on which the ACL is applied.
1078 | show ip access-list
AOS-W 6.2 | Reference Guide
Parameter Service
Action
Timerange Log Expired Queue Tos 8021.p Blacklist Mirror DisScan IPv4/6
Description
Network service, which can be one of the following: l An IP protocol number (0-255). l The name of a network service (use the show netservice command to see configured
services). l any: Matches any traffic. l tcp: A TCP port number (0-65535). l udp: A UDP port number (0-65535).
Action if rule is applied, which can be one of the following: deny: Reject packets. dst-nat: Perform destination NAT on packets. dual-nat: Perform both source and destination NAT on packets. permit: Forward packets. redirect: Specify the location to which packets are redirected, which can be one of the following: l Datapath destination ID (0-65535). l esi-group: Specify the ESI server group configured with the esi group command l opcode: Specify the datapath destination ID (0x33, 0x34, or 0x82). Do not use this
parameter without proper guidance from Alcatel-Lucent. tunnel: Specify the ID of the tunnel configured with the interface tunnel command. src-nat: Perform source NAT on packets.
Any defined time range for this rule.
Shows if the rule was configured to generate a log message when the rule is applied.
Shows if the rule has expired.
Shows if the rule assigns a matching flow to a priority queue (high/low).
802.11p priority level applied by the rule (0-7).
Shows if the rule should blacklist any matching user.
Shows if the rule was configured to mirror all session packets to datapath or remote destination.
Shows if the rule was configured to pause ARM scanning while traffic is present.
Shows the IP version.
Related Commands
Command ip access-list session
Description Configure an access list for an interface.
Command History
Introduced in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show ip access-list | 1079
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master or local switches
1080 | show ip access-list
AOS-W 6.2 | Reference Guide
show ip cp-redirect-address
show ip cp-redirect-address
Description
Show the captive portal automatic redirect IP address.
Syntax
No parameters.
Examples
The example below shows the IP address to which captive portal users are automatically directed. (host) # show ip cp-redirect-address Captive Portal redirect Address... 10.3.63.11
Related Commands
Command ip cp-redirect-address
Description This command configures a redirect address for captive portal.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show ip cp-redirect-address | 1081
show ip dhcp
show ip dhcp {binding|database|statistics}
Description
Show DHCP Server Settings.
Syntax
Parameter binding database statistics
Description Show DHCP server bindings. Show DHCP server settings. Show DHCP pool statistics.
Examples
The example below shows DHCP statistics for two configured networks. (host) # show ip dhcp statistics
Network Name Free leases Active leases Expired leases Abandoned leases
172.19.42.0/24 137 115 0 0
Network Name Free leases Active leases Expired leases Abandoned leases
10.14.86.0/24 126 126 0 0
The output of this command includes the following parameters:
Parameter Network Name Free leases Expired leases
Abandoned leases
Description
Range of addresses that the DHCP server may assign to clients.
Number of available DHCP leases.
Number of leases that have expired because they have extended past their valid lease period.
Number of abandoned leases. Abandoned leases will not be reassigned unless there are no free leases available.
Related Commands
Command ip dhcp pool
Description This command configures a DHCP pool on the switch.
1082 | show ip dhcp
AOS-W 6.2 | Reference Guide
Command History
Introduced in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show ip dhcp | 1083
show ip domain-name
show ip domain-name
Description
Show the full domain name and server.
Syntax
No parameters.
Examples
The example below shows that the IP domain lookup feature is enabled, but that no DNS server has been configured on the switch. (host) #show ip domain-name
IP domain lookup: IP Host.Domain name:
Enabled MyCompany2400.
No DNS server configured
Related Commands
Command
Description
ip domain lookup This command enables Domain Name System (DNS) hostname to address translation.
ip domain-name
This command configures the default domain name.
ip dhcp pool
This command configures a DHCP pool on the switch.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master or local switches
1084 | show ip domain-name
AOS-W 6.2 | Reference Guide
show ip igmp
show ip igmp config|counters|{group maddr <maddr>}|{interface [vlan <vlan>]}|{proxy-group vlan <vlan>}|{proxy-mobility-group maddr <maddr>}|proxy-mobiity-stats|proxy-stats
Description
Display Internet Group Management Protocol (IGMP) timers and counters.
Syntax
Parameter config counters
group maddr <maddr> interface vlan <vlan> proxy-group vlan <vlan> proxy-mobility-group maddr <maddr> proxy-mobiity-stats proxy-stats
Description
Show the current IGMP configuration
Display a list counters for the following IGMP queries: l received-total l received-queries l received-v1-reports l received-v2-reports l received-leaves l received-unknown-types l len-errors l checksum-errors l not-vlan-dr l transmitted-queries l forwarded
Show IGMP group information
Show IGMP interface information
Show IGMP proxy group information for a specific interface.
Display the IGMP proxy group information stored for mobile clients which are away from the switch.
Display the most important messages exchanged between the mobility process and the IGMP proxy.
Display the number of messages transmitted and received by the IGMP proxy on the upstream interface
Examples
The example below displays the IGMP interface table for all VLANs on the switch.
(host) # show ip igmp interface vlan 2
IGMP Interface Table
--------------------
VLAN Addr
Netmask
MAC Address
Destination IGMP Proxy
---- ----
-------
-----------
- -----------
64 10.6.4.252 255.255.255.0 00:0b:86:01:99:00
65 10.6.5.252 255.255.255.0 00:0b:86:01:99:00
IGMP ---disabled disabled
Snooping Querier
-------- -------
disabled 10.6.4.252 disabled
disabled 10.6.5.252 disabled
---------CP
CP
AOS-W 6.2 | Reference Guide
show ip igmp | 1085
1
10.6.2.252 255.255.255.0 00:0b:86:01:99:00 disabled disabled 10.6.2.252
CP
disabled
66 10.6.6.252 255.255.255.0 00:0b:86:01:99:00 disabled disabled 10.6.6.252
CP
disabled
63 10.6.3.252 255.255.255.0 00:0b:86:01:99:00 disabled disabled 10.6.3.252
CP
disabled
The output of this command includes the following parameters:
Parameter Description
VLAN
A VLAN ID number.
Addr
IP address of a VLAN router.
Netmask
Subnet mask for the IP address.
MAC Address MAC destination address.
IGMP
Indicates if IGMP is enabled (or disabled) on the interface.
Snooping
Indicates if IGMP snooping is enabled (or disabled).
Querier
IP address of an IGMP querier.
Destination Traffic destination.
IGMP Proxy Indicates if IGMP proxy is enabled (or disabled).
The following example displays the current IGMP configuration settings for the switch. (host) #show ip igmp config
IGMP Config ----------Name ---robustness-variable query-interval query-response-interval startup-query-interval startup-query-count last-member-query-interval last-member-query-count version-1-router-present-timeout
Value ----2 125 100 31 2 10 2 400
The output of this command includes the following parameters:
Parameter robustness-variable
query-interval
Description
This variable is increased from its default level of 2 to allow for expected packet loss on a subnetwork.
Interval, in seconds, at which the switch sends host-query messages to the multicast group address 224.0.0.1 to solicit group membership information.
1086 | show ip igmp
AOS-W 6.2 | Reference Guide
Parameter
Description
query-response-interval
Maximum time, in .1 second intervals, that can elapse between when the switch sends a host-query message and when it receives a response. This must be less than the query-interval.
startup-query-count
Number of queries that the switch sends out on startup, separated by startup-query-interval. The default setting is the value of the robustness-variable parameter.
startup-query-interval
Interval, in seconds, at which the switch sends general queries on startup. The default value of this parameter is 1/4 of the queryinterval.
last-member-query-count
Number of group-specific queries that the switch sends before assuming that there are no local group members.
last-member-query-interval
Maximum time, in seconds, that can elapse between groupspecific query messages.
version-1-router-present-timeout Timeout, in seconds, if the switch detects a version 1 IGM router.
Related Commands
Command ip igmp
Description
This command configures Internet Group Management Protocol (IGMP) timers and counters.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing
Command Mode
Base operating system Available in Config or Enable mode on master switches.
AOS-W 6.2 | Reference Guide
show ip igmp | 1087
show ip mobile
show ip mobile active-domains binding [<host-ip>|<host-macaddr>|brief] domain [<name>] global hat host [<host-ip>|<host-macaddr>|brief] packet-trace [<count>] remote <host-ip>|<host-macaddr> trace <ip-addr>|<mac-addr>|{force <ip-addr>|<mac-addr>} traffic dropped|foreign-agent|home-agent|proxy|proxy-dhcp trail <host-ip>|<host-macaddr> tunnel visitor [<host-ip>|<host-macaddr>|brief]
Description
Display statistics and configuration information for the mobile protocol.
Syntax
Parameter active domains binding
[<host-ip>]
[<host-macaddr>]
[brief] domain [<name>]
global hat host
[<host-ip>] [<host-macaddr>]
[brief] packet-trace [<count>]
Description
IP mobility domains active on this switch
Display a list of Home Agent Bindings
Filter the Home Agent Bindings list to display data for a specific host IP address.
Filter the Home Agent Bindings list to display data for a specific host MAC address.
Limit the output of this command to show just two lines of data.
Display subnet, VLAN and home agent information for all mobility domains, or specify a mobility domain name to view data for that domain only.
View the current Mobility Agents global configuration
Display the Active Home Agent Table
Display a list of Mobile IP hosts.
Filter the Mobile Host List to display data for a specific host IP address.
Filter the Mobile Host List to display data for a specific host MAC address.
Limit the output of this command to show just two lines of data.
The output of this command shows when packets of different types were sent between a source IPor MAC address and a destination IP or MAC
1088 | show ip mobile
AOS-W 6.2 | Reference Guide
Parameter
remote <host-ip>|<hostmacaddr>
trace <ip-addr> <mac-addr> force <ip-addr>|<macaddr>
traffic
dropped foreign-agent
home-agent
proxy proxy-dhcp trail <host-ip>|<hostmacaddr> tunnel visitor [<host-ip>] [<host-macaddr>] [brief]
Description
address.
This is a debug command which can be used to identify the switch associated with the specified client IP address or MAC address. The output of this command shows the home agent (HA) and foreign agent (FA) for a mobile client, as well as the client's roaming status.
Show if the Mobile IP feature will poll remote switches for mobility status of station
Host IP address
Host MAC address
Show if the Mobile IP feature will poll remote switches for mobility status of station.
Display mobile IP protocol statistics for: l Proxy DHCP l Proxy Mobile IP l Home Agent Registrations l Foreign Agent Registrations l Registration Revocations
Show only counters for dropped mobility traffic.
Show only mobile IP foreign agent statistics. A foreign agent is the switch which handles all mobile IP communication with a home agent on behalf of a roaming client.
Show only mobile IP home agent statistics. A home agent for a mobile client is the switch where the client first appears when it joins the mobility domain.
Show only counters for mobile IP proxy traffic.
Show only counters for mobile IP proxy DHCP traffic.
Show the mobile IP roaming trail by entering a host's IP or MAC address.
Show the Mobile Tunnel Table for IPIP Tunnels.
Display a list of mobile nodes visiting a foreign agent.
Filter the Foreign Agent Visitor list to display data for a specific host IP adddress.
Filter the Foreign Agent Visitor list to display data for a specific host MAC adddress.
Limit the output of this command to show just two lines of data.
Examples
The example below lists mobility domains configured on the switch, and shows information for any subnets defined on these domains.
(host) #show ip mobile domain Mobility Domains:, 2 domain(s)
AOS-W 6.2 | Reference Guide
show ip mobile | 1089
------------------------------
Domain name default Home Agent Table, 0 subnet(s)
Domain name newdomain
Home Agent Table, 2 subnet(s)
subnet
mask
VlanId Home Agent
--------------- --------------- ------ ---------------
10.2.124.76
255.255.255.255 1
10.4.62.2
172.21.5.50
255.255.255.255 1
10.4.62.2
The output of this command includes the following parameters:
Description ----------------------Corporate mobility entry Reserved entries
Parameter Description
subnet
Subnet configured for the IP mobility service.
mask
Subnet mask
VLAN ID
VLAN ID of the VLAN used by the subnet.
Home Agent IP address of the home agent or mobility agent.
Description Description of the HAT entry.
Use the show ip mobile host command to track mobile users. (host) #show ip mobile host
Mobile Host List, 1 host(s) --------------------------9c:b7:0d:3f:a4:8a 10.15.26.162 test
Roaming Status: Home Switch/Home VLAN, Service time 0 days 00:09:05 Home VLAN 3 on network 10.15.26.0/24 DHCP lease for Harsha-PC at Fri Apr 27 02:15:49 2012 for 240 secs from 10.15.24.11
The output of this command includes the following parameters:
Parameter <mac-addr> <ip-addr> Roaming Status Home VLAN DHCP lease
Description MAC and IP addresses of the host Displays how long the host has used its current switch and VLAN. VLAN ID, IP address and subnet of the home VLAN. Displays the amount of time the station has had its current DHCP lease.
Related Commands
Command ip mobile active-domain ip mobile domain
Description This command configures the mobility domain that is active on the switch. This command configures the mobility domain on the switch.
1090 | show ip mobile
AOS-W 6.2 | Reference Guide
Command ip mobile foreign-agent ip mobile home-agent ip mobile proxy
ip mobile revocation
ip mobile trail (deprecated)
Description
This command configures the foreign agent for IP mobility.
This command configures the home agent for IP mobility.
This command configures the proxy mobile IP module in a mobilityenabled switch.
This command configures the frequency at which registration revocation messages are sent.
This command configures the capture of association trail for all devices.
Command History
Command introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show ip mobile | 1091
show ip nat pool
show ip nat pool
Description
Display pools of IP addresses for network address translation (NAT.
Syntax
No parameters
Examples
The example below shows the current NAT pool configuration on the switch.
(host) # show ip nat pools
NAT Pools
---------
Name Start IP End IP
---- -------- ---------
2net
2.1.1.1
DNAT IP ------2.1.1.125
The output of this command includes the following parameters:
Parameter Name Start IP End IP DNAT IP
Description Name of the NAT pool. IP address that defines the beginning of the range of source NAT addresses in the pool. IP address that defines the end of the range of source NAT addresses in the pool. Destination NAT IP address, if defined.
Related Commands
Command ip nat
Description This command configures a pool of IP addresses for network address translation (NAT).
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing
Though this command is available in the operating system, you must have a PEFNG license to configure a NAT pool.
Command Mode
Available in Config or Enable mode on master or local switches
1092 | show ip nat pool
AOS-W 6.2 | Reference Guide
show ip ospf
show ip ospf [database]|[debug route]|[interface tunnel|vlan <id>]|[neighbor]| [redistribute]| [subnet]
Description
Display statistics and configuration information for the Open Shortest Path First (OSPF) routing protocol.
Syntax
Parameter
Description
database
Show database information for the OSPF protocol.
debug route
Show debugging information for OSPF routes.
interface tunnel|vlan <id> Display the status of OSPF on an individual interface by specifying a tunnel or VLAN ID number.
neighbor
Display data for OSPF neighboring routers.
redistribute
Display OSPF route distribution information.
subnet
Display the subnets manually added to the Subnet Exclude List via the router ospf subnet exclude <addr> <mask> command.
Example
If you issue this command without any of the optional parameters described in the table above, the show ip ospf command will display general router and area settings for the OSPF.
(host) (config-subif)# show ip ospf OSPF is currently running with Router ID 123.45.110.200 Number of areas in this router is 1 Area 10.1.1.0
Number of interfaces in this area is 2 Area is totally stub area
SPF algorithm executed 0 times
The output of this command includes the following parameters.
Parameter OSPF Router ID Number of areas Area
Description
Verifies that OSPF is running and the router ID that OSPF is running on.
List the number of areas configured in the router.
Displays the Area ID followed by: l number of interfaces in the area l indicates if the area is a totally stub area l number of times the SPF algorithm has been executed
To display OSPF settings for an individual interface, you must specify a VLAN or tunnel ID number. The example below displays part of the output of the show ip ospf interface vlan command.
(host) # show ip ospf interface vlan 10 Vlan 3 is up, line protocol is up
AOS-W 6.2 | Reference Guide
show ip ospf | 1093
Internet Address 3.3.3.1, Mask 255.255.255.0, Area 10.1.1.1 Router ID 10.4.131.227, Network Type BROADCAST, Cost: 1 Transmit Delay is 1 sec, State WAIT, Priority 1 Designated Router id 0.0.0.0, Interface Address 3.3.3.1 Backup designated Router id 0.0.0.0, Interface Address 3.3.3.1 Timer intervals configured, Hello 10, Dead 40, Retransmit 5 Neighbor Count is 0 Tx Stat: Hellos 1 DbDescr 0 LsReq 0 LsUpdate 0 LsAck 0 Pkts 1 Rx Stat: Hellos 0 DbDescr 0 LsReq 0 LsUpdate 0 LsAck 0 Pkts 0
DisCd 0 BadVer 0 BadNet 0 BadArea 0 BadDstAdr 0 BadAuType 0 BadAuth 0 BadNeigh 0 BadPckType 0 BadVirtLink 0
...
The output may include some or all of the following parameters.
Parameter Vlan <number> Internet Address Router ID Transmit Delay Designated Router Backup Designated Router ID Timer intervals configured Neighbor Count Tx Stat
Rx Stat
DisCd BadVer BadNet
Description
Identifies that the interface type and ID are up and functional.
Internet address, network mask, and area assigned to the interface.
Displays the router ID, that the network type is Broadcast, and the cost value.
Details of the transmit delay, state, and priority.
Details of the designated router ID and interface address.
Details of the backup router ID and interface address.
Details of elapse time intervals for Hello, Dead, Transmit (wait), and retransmit.
Details the number of neighbors and adjacent neighbors.
Counters and statistics for transmitted data. l Hellos: Number of transmitted hello packets. These packets are sent
every hello interval. l DbDescr: Number of transmitted database description packets. l LsReq: Number of transmitted link state request packets. l LsUpdate: Number of transmitted link state update packets. l LsAck: Number of transmitted link state acknowledgment packets l Pkts: Total number of transmitted packets.
Counters and statistics for received data. l Hellos: Number of received hello packets. These packets are sent every
hello interval. l DbDescr: Number of received database description packets. l LsReq: Number of received link state request packets. l LsUpdate: Number of received link state update packets. l LsAck: Number of received link state acknowledgment packets l Pkts: Total number of received packets.
Number of received packets that are discarded.
Number of received packets that have bad OSPF version number.
Number of received packets that belong to different network than the local interface.
1094 | show ip ospf
AOS-W 6.2 | Reference Guide
Parameter BadArea
BadDstAdr BadAuType
BadAuth BadNeigh BadPckType BadVirtLink
Description Number of received packets that belong to different area than the local interface. Number of received packets that have wrong destination address. Number of received packets that have different authentication type than the local interface. Number of received packets where authentication failed. Number of received packets which didn't have a valid neighbor. Number of received packets that have wrong OSPF packet type. Number of received packets that didn't match have a valid virtual link.
Related Commands
Command ip ospf router ospf
Description Configure OSPF on the interface Configure OSPF on the router
Command History
Introduced in AOS-W 3.4.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show ip ospf | 1095
show ip pppoe-info
show ip pppoe-info
Description
Display configuration settings for Point-to-Point Protocol over Ethernet (PPPoE).
Syntax
No parameters.
Examples
The example below shows the current PPPoE configuration. (host) #show ip pppoe-info
PPPoE username: rudolph123 PPPoE password: <HIDDEN> PPPoE service name: ppp2056 PPPoE VLAN: 22
The output of this command includes the following parameters:
Parameter PPPoE username PPPoE password
PPPoE service name PPPoE VLAN
Description
PAP username configured on the PPPoE access concentrator.
If this parameter displays the word <HIDDEN>, a PAP password is configured on the PPPoE access concentrator. If this parameter is <NONE>, there is no PPOE password configured.
PPPoE service name.
VLAN configured to use PPPoE to obtain an IP address via the command interface vlan <id> ip address pppoe.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master or local switches
1096 | show ip pppoe-info
AOS-W 6.2 | Reference Guide
show ip radius
show ip radius nas-ip|source-interface
Description
Display global parameters for configured RADIUS servers.
Syntax
Command nas-ip
source-interface
Description
Show the Network Access Server (NAS) IP address attribute sent in outgoing RADIUS requests
Show the source address of outgoing RADIUS requests
Examples
The example below shows the RADIUS client NAS IP address. (host) #show ip radius nas-ip
RADIUS client NAS IP address = 10.168.254.221
Related Commands
Command ip radius
Description
This command configures global parameters for configured RADIUS servers.
Command History
Introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show ip radius | 1097
show ip route
show ip route [static]
Description
View the Alcatel-Lucentswitch routing table.
Syntax
Command static
Description Include this optional parameter to display only static routes.
Usage Guidelines
This command displays static routes configured on the switch via the ip route command. Use the ip default-gateway command to set the default gateway to the IP address of the interface on the upstream router or switch to which you connect the switch.
Examples
The example below shows the ip address of routers and the VLANs to which they are connected.
(host) #show ip route
Codes: C - connected, O - OSPF, R - RIP, S - static M - mgmt, U - route usable, * - candidate default
Gateway of last resort is 10.6.2.254 to network 0.0.0.0
S* 0.0.0.0/0 [1/0] via 10.6.2.254* C 10.9.2.0 is directly connected, VLAN1 C 10.9.3.0 is directly connected, VLAN63 C 10.9.4.0 is directly connected, VLAN64 C 10.9.5.0 is directly connected, VLAN65 C 10.9.6.0 is directly connected, VLAN66 C 0.0.0.0 is directly connected, Tunnel 1 C 10.100.103.253 is an ipsec map default-local-master-ipsecmap
Related Commands
Command ip radius
Description This command configures global parameters for configured RADIUS servers.
Command History
Introduced in AOS-W 3.0.
1098 | show ip route
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show ip route | 1099
show ipc statistics app-ap
show ipc statistics app-ap {am|sapd|sta} {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ipaddr>}
Description
Display Inter Process Communication (IPC) statistics for a specific AP or BSSID.
Syntax
Parameter am sapd stm ap-name <ap-name> bssid <bssid>
ip-addr <ip-addr>
Description Show IPC statistics for an air monitor.
Show IPC statistics for the SAPD process.
Show IPC statistics for station management communications.
Show IPC statistics for an AP with a specific name.
Show IPC statistics for a specific Basic Service Set Identifier (BSSID). An AP's BSSID is usually the AP's MAC address.
Show IPC statistics for an AP with a specific IP address. Enter the IP address in dotted-decimal format.
Usage Guidelines
Issue this command at the request of Alcatel-Lucent support to troubleshoot application errors.
Example
The following example shows IPC statistics for the SAPD process on an AP named mpp125.
(host) #show ipc statistics app-ap sapd ap-name mpp125
Local Statistics
To application
Tx Msg Tx Blk Tx Ret Tx Fail Rx Ack Rx Msg Rx Drop Rx Err Tx
Ack
MESH
3
0
1
0
3
1
1
0
1
RF Client
1
0
0
0
1
1
0
0
1
STM
1
0
0
0
1
0
0
0
0
Nanny
1
0
0
0
1
0
0
0
0
Remote Statistics
To application
Tx Msg Tx Blk Tx Ret Tx Fail Rx Ack Rx Msg Rx Drop Rx Err Tx
Ack
AMAPI CLI Client
0
0
0
0
0
1
0
0
1
STM
248
0
0
0
0
248
0
0
0
Allocated Buffers 0
Static Buffers
1
Static Buffer Size 1444
1100 | show ipc statistics app-ap
AOS-W 6.2 | Reference Guide
The output of this command includes the following data columns:
Parameter Tx Msg Tx Blk Tx Ret Tx Fail Rx Ack Rx Msg Rx Drop Rx Err Tx Ack Allocated Buffers Static Buffers Static Buffer Size
Description Number of transmitted messages. Number of blocking messages transmitted. Number of transmitted messages that were returned. Number of failure messages that were transmitted. Number of received acknowledgements. Number of received messages. Number of received messages that were dropped. Number of received messages with errors. Number of transmitted acknowledgements. Number of allocated buffers for IPC messages. Number of static buffers for IPC messages. Size of the static buffer.
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show ipc statistics app-ap | 1101
show ipc statistics app-id
show ipc statistics app-id <app-id>
Description
Display Inter Process Communication (IPC) statistics for a specific AP or BSSID.
Syntax
Parameter <app-id>
Description
Application ID number. This number must be obtained from Alcatel-Lucent support.
Usage Guidelines
Issue this command at the request of Alcatel-Lucent support to troubleshoot application errors.
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
1102 | show ipc statistics app-id
AOS-W 6.2 | Reference Guide
show ipc statistics app-name
show ipc statistics app-name <name>
Description
Display Inter Process Communication (IPC) statistics for a specific application.
Syntax
Parameter
Description
<name>
One of the following application names: l aaa: Administrator Authentication l ads: Anomaly Detection l authmgr: User Authentication l certmgr: Certificate Manager l cfgm: Config Manager l cpsec: Control-Plane Security
Manager l cts: Transport Service l dbsync: Database Synchronization l dhcp: DHCP Server l esi: Server Load Balancing l fpapps: Layer 2,3 control l httpd: HTTPD l ike: IKE Daemon
l l2tp: L2TP l licensemgr: License Manager l mobileip: Mobile IP l ntp: NTP Daemon l ospf: OSPF l pim: Protocol Independent Multicast l pktfilter: Packet Filter l pptp: PPTP l profmgr: Profile Manager l publisher: Publish subscribe service l resolver: Resolver l sapm: SAPM l snmp: SNMP agent l stm: Station Management l stm-lopri: Station Management Low
Priority l stm: Station Management l syslogd: Syslog Manager l userdb: User Database Server l wms: Wireless Management
Example
The following example shows IPC statistics for the STM process. (host) #show ipc statistics app-name stm
Local Statistics
To application
Tx Msg Tx Blk Tx Ret Tx Fail Rx Ack Rx Msg Rx Drop Rx Err Tx
Ack
AMAPI Web Client
0
0
0
0
0 34405
0
0
34405
Layer2/3
233098
1
0
0 233095
12
0
0
12
Authentication Se 1076236
0
0
0 1076236
0
0
0
0
Authentication
54494
7448
54
1 54050 468811
0
0
0
Publisher
4
0
0
0
4
2
52
0
2
AMAPI CLI Client
1
0
0
0
1
702
0
0
702
Profile Manager
1
1
0
0
1
0
0
0
0
AOS-W 6.2 | Reference Guide
show ipc statistics app-name | 1103
Mobile IP
1120303
0
0
0 1076236
1
0
0
0
Syslog Manager
2
2
0
0
2
0
0
0
0
WMS
0
0
0
0
0
19
0
0
19
PIM
2
1
0
0
2
1
1
0
1
Configuration Man
2
1
0
0
2
13
0
0
12
License Manager
1
1
0
0
1
0
0
0
0
Datapath
3281237 66425
1
0 1907552 1382289
104
6
0
Nanny
1
0
0
0
0
0
0
0
0
Remote Statistics
To application
Tx Msg Tx Blk Tx Ret Tx Fail Rx Ack Rx Msg Rx Drop Rx Err Tx
Ack
WMS
59
0
0
0
59
0
0
0
0
STM
54983
0
0
0
0 1527435
0
0
0
Allocated Buffers 0
Static Buffers
4
Static Buffer Size 1400
The output of this command includes the following data columns:
Parameter Tx Msg Tx Blk Tx Ret Tx Fail Rx Ack Rx Msg Rx Drop Rx Err Tx Ack Allocated Buffers Static Buffers Static Buffer Size
Description Number of transmitted messages. Number of blocking messages transmitted. Number of transmitted messages that were returned. Number of failure messages that were transmitted. Number of received acknowledgements. Number of received messages. Number of received messages that were dropped. Number of received messages with errors. Number of transmitted acknowledgements. Number of allocated buffers for IPC messages. Number of static buffers for IPC messages. Size of the static buffer.
Command History
This command was available in AOS-W 3.0.
1104 | show ipc statistics app-name
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show ipc statistics app-name | 1105
show ipv6 access-list (deprecated)
show ipv6 access-list [<string> | brief]
Description
Displays IPv6 access list configured in the switch.
Syntax
Parameter string brief
Description To view details of a specific ACL. To view a summary of all IPv6 ACLs.
Command History
Version AOS-W 3.3 AOS-W 6.1
Modification
Command introduced
Command deprecated. This command has been replaced by the show ip access-list command.
1106 | show ipv6 access-list (deprecated)
AOS-W 6.2 | Reference Guide
show ipv6 datapath session counters (deprecated)
show ipv6 datapath session counters
Description
Displays datapath session table statistics.
Command History
Version AOS-W 1.0 AOS-W 6.1
Modification
Command introduced
Command deprecated. This command has been replaced by the show datapath session ipv6 counters command.
AOS-W 6.2 | Reference Guide
show ipv6 datapath session counters (deprecated) | 1107
show ipv6 datapath session table (deprecated)
show ipv6 datapath session table <IPv6 Address>
Description
Displays current IPv6 session on the switch.
Syntax
Parameter <IPv6 IP Address>
Description
Optional parameter. If specified, displays IPv6 datapath session table for that IP address. By default, displays session table for all IPv6 addresses.
Command History
Version AOS-W 3.0 AOS-W 6.1
Modification
Command introduced
Command deprecated. This command has been replaced by the show datapath session ipv6 table command.
1108 | show ipv6 datapath session table (deprecated)
AOS-W 6.2 | Reference Guide
show ipv6 datapath user counters (deprecated)
show ipv6 datapath user counters
Description
Displays datapath user table statistics.
Command History
Version AOS-W 3.0 AOS-W 6.1
Modification
Command introduced
Command deprecated. This command has been replaced by the show datapath user ipv6 command.
AOS-W 6.2 | Reference Guide
show ipv6 datapath user counters (deprecated) | 1109
show ipv6 datapath user table (deprecated)
show ipv6 datapath user table
Description
Displays ipv6 datapath user table entries.
Command History
Version AOS-W 3.0 AOS-W 6.1
Modification
Command introduced
Command deprecated. This command has been replaced by the show datapath user ipv6 command.
1110 | show ipv6 datapath user table (deprecated)
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
show ipv6 datapath user table (deprecated) | 1111
show ipv6 firewall
show ipv6 firewall
Example
This example displays the status of all firewall configurations.
(host) #show ipv6 firewall
Global IPv6 firewall policies ----------------------------Policy -----Monitor ping attack Monitor TCP SYN attack Monitor IPv6 sessions attack Deny inter user bridging Deny all IPv6 fragments Per-packet logging Enforce TCP handshake before allowing data Prohibit RST replay attack Session Idle Timeout Session mirror destination Prohibit IPv6 Spoofing Enable IPv6 Stateful Firewall
Action -----Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled
Rate ----
Slot/Port ---------
The output of this command includes the following parameters:
Parameter Monitor ping attack
Monitor TCP SYN attack
Monitor IPv6 sessions attack
Deny inter user bridging
Deny all IPv6 fragments Per-packet logging Enforce TCP handshake before allowing data
Description
If enabled, the switch monitors the number of ICMP pings per second. If this value exceeds the maximum configured rate, the switch will register a denial of service attack.
If enabled, the switch monitors the number of TCP SYN messages per second. If this value exceeds the maximum configured rate, the switch will register a denial of service attack.
If enabled, the switch monitors the number of TCP session requests per second. If this value exceeds the maximum configured rate, the switch will register a denial of service attack sessions.
If enabled this setting prevents the forwarding of Layer-2 traffic between wired or wireless users. You can configure user role policies that prevent Layer-3 traffic between users or networks but this does not block Layer-2 traffic.
If enabled, all IPv6 fragments are dropped.
If active, and logging is enabled for the corresponding session rule, this feature logs every packet.
If enabled, this feature prevents data from passing between two clients until the three-way TCP handshake has been performed. Enabling this option causes mobility to fail. So, disable this option if you have mobile clients on the network as.
1112 | show ipv6 firewall
AOS-W 6.2 | Reference Guide
Parameter Prohibit RST replay attack Session Idle Timeout Session mirror destination Prohibit IPv6 Spoofing
Enable IPv6 Stateful Firewall
Description
If enabled, this setting closes a TCP connection in both directions if a TCP RST is received from either direction.
Shows if a session idle timeout interval has been defined.
Destination to which mirrored packets are sent.
Status on IPv6 spoofing. When this option is enabled, IP and MAC addresses are checked; possible IP spoofing attacks are logged and an SNMP trap is sent.
Shows if IPv6 stateful firewall is enabled.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show ipv6 firewall | 1113
show ipv6 interface
show ipv6 interface [brief]
Description
View IPv6-related information on all interfaces.
Syntax
Parameter brief
Description
Optional parameter. If specified, displays the IPv6-related information on all the interfaces in a summary format.
Example
host) #show ipv6 interface brief
Interface
[Status/Protocol]
vlan 1
[ up/up ]
fe80::b:8600:161:1328/64
loopback
[ up/up ]
fe80::b:860f:ff61:1328/64
mgmt
[down/down]
unassigned
IPv6 is disabled
The following table details the columns and content in the show command.
Column Interface
Status/Protocol
Description
List the interface and interface identification with the IPv6 address and netmask for the interface, if configured.
States the administrative status and the IPv6 status on the interface. Enabled--up Disabled--down
Command History
Release AOS-W 6.1
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master switches.
1114 | show ipv6 interface
AOS-W 6.2 | Reference Guide
show ipv6 mld config
show ipv6 mld config
Description
Displays Multicast Listener Discover (MLD) configuration details.
Example
This example displays the current MLD configuration values.
(host) #show ipv6 mld config
MLD Config ---------Name ---robustness-variable query-interval query-response-interval
Value ----2 125 100
The output of this command includes the following parameters:
Parameter robustness-variable
query-interval query-response-interval
Description
Denotes the value that is used to calculate the timeout value of an MLD client.
Denotes the time interval at which the MLD query is sent.
Denotes the time interval at which the MLD query response should be received.
Command History
This command was available in AOS-W 3.3.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show ipv6 mld config | 1115
show ipv6 mld counters
show ipv6 mld counters
Description
Displays the statistics of MLD.
Example
This example displays the MLD statistics for the following values.
(host) #show ipv6 mld counters
MLD Statistics -------------Name ---received-total received-queries received-v1-reports received-leaves received-unknown-types len-errors checksum-errors not-vlan-dr transmitted-queries forwarded
Value ----0 0 0 0 0 0 0 0 0 0
The output of this command includes the following parameters:
Parameter received-total received-queries received-v1-reports received-leaves received-unknown-types len-errors checksum-errors not-vlan-dr
transmitted-queries forwarded
Description The total number of MLD messages. The total number of MLD queries. The total number of MLD v1 reports received. The total number of MLD v1 leave messages received. The total number of unrecognized messages received. The total number of error message where the length check has failed. The total number of error message where the checksum has failed. The number of messages received for which the current switch is not the designated router. The total number of transmitted MLD queries. The total number of MLD messages forwarded.
Command History
This command was available in AOS-W 3.3.
1116 | show ipv6 mld counters
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show ipv6 mld counters | 1117
show ipv6 mld group
show ipv6 mld group
Example
This example displays MLD group details.
(host) #show ipv6 mld group
MLD Group Table --------------Group Members ----- -------
The output of this command includes the following parameters:
Parameter Group Members
Description Name of MLD groups. Number of members in an MLD group.
Command History
This command was available in AOS-W 3.3.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
1118 | show ipv6 mld group
AOS-W 6.2 | Reference Guide
show ipv6 mld interface
show ipv6 mld interface
Example
This example displays MLD status on VLANs. To view details for a specific VLAN, you can specify the VLAN ID.
(host) #show ipv6 mld interface
MLD Interface Table
-------------------
VLAN Addr
Netmask
---- ----
-------
224 10.224.224.1 255.255.255.0
1
10.15.44.10 255.255.255.0
50 156.1.50.1 255.255.255.0
211 211.1.1.1
255.255.255.0
51 156.1.51.1 255.255.255.0
999 99.1.1.2
255.255.255.0
7
7.7.7.1
255.255.255.0
170 192.170.1.1 255.255.255.0
MAC Address ----------00:0b:86:f0:20:20 00:0b:86:f0:20:20 00:0b:86:f0:20:20 00:0b:86:f0:20:20 00:0b:86:f0:20:20 00:0b:86:f0:20:20 00:0b:86:f0:20:20 00:0b:86:f0:20:20
MLD --disabled disabled disabled disabled disabled disabled disabled disabled
Snooping -------disabled disabled disabled disabled disabled disabled disabled disabled
Querier ------:: :: :: :: :: :: :: ::
Destination ----------CP CP CP CP CP CP CP CP
The output of this command includes the following parameters:
Parameter VLAN Addr Netmask MAC Address MLD Snooping Querier Destination
Description Denotes the VLAN ID. IP address of the VLAN interface. Network mask of the VLAN interface IP address. MAC address of VLAN interface. Status of MLD. Status of MLD snooping. IPv6 address of the MLD querier for the VLAN. Denotes the destination of the MLD messages.
Command History
This command was available in AOS-W 3.3.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show ipv6 mld interface | 1119
show ipv6 neighbors
show ipv6 neighbors
Description
Displays the IPv6 neighbors configured on a VLAN interface.
Usage Guidelines
This command displays the IPv6 neighbors configured on a VLAN interface via the ipv6 neighbor command.
Examples
The example below shows the ipv6 neighbors configured on VLAN 1 .
(host) #show ipv6 neighbors vlan 1
IPv6 Neighbors
--------------
IPv6 Address
Age Link-layer Addr State
Interface
------------
--- --------------- -----
---------
2cce:205:160:100::fe - 00:0b:86:61:13:28 PERMANENT vlan 1
Command History
Introduced in AOS-W 6.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master or local switches
1120 | show ipv6 neighbors
AOS-W 6.2 | Reference Guide
show ipv6 ra status
show ipv6 ra status
Description
Displays the IPv6 RA status on the VLAN interfaces.
Usage Guidelines
This command displays the IPv6 RA status on the VLAN interfaces.
Examples
The example below shows the IPv6 RA status on the VLAN interfaces .
(host) #show ipv6 ra status
IPv6 RA Status
--------------
VlanId State
------ -----
1
enabled
220
enabled
230
enabled
7
enabled
Prefix(es) ---------2001:abcd:1234:dead::/64 2200:eab:feed:12::/64 2300:eab:feed::/64 2001:470:faca:2::/64 2001:470:faca:3::/64 2001:470:faca:4::/64
Command History
Introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show ipv6 ra status | 1121
show ipv6 route
show ipv6 route [static]
Description
Displays the Alcatel-Lucent switch IPv6 routing table.
Syntax
Command static
Description Include this optional parameter to display only static IPv6 routes.
Usage Guidelines
This command displays static IPv6 routes configured on the switch via the ipv6 route command. Use the ipv6 default-gateway command to set the default gateway to the IPv6 address of the interface on the upstream router or switch to which you connect the switch.
Examples
The examples below show the ipv6 address of routers and the VLANs to which they are connected.
(host) #show ipv6 route
Codes: C - connected, O - OSPF, R - RIP, S - static M - mgmt, U - route usable, * - candidate default
Gateway of last resort is 2001::3 to network ::/128 at cost 1 S* ::/0 [1/0] via 2001::3* C 2001::/64 is directly connected, VLAN1 C 2010:abcd:1234:dead::/64 is directly connected, VLAN10
(host) #show ipv6 route static
Gateway of last resort is 2001::3 to network ::/128 at cost 1 S* ::/0 [1/0] via 2001::3*
Command History
Introduced in AOS-W 6.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master or local switches
1122 | show ipv6 route
AOS-W 6.2 | Reference Guide
show ipv6 user-table
show ipv6 user-table [authentication-method {dot1x | mac | stateful-dot1x | vpn | web} | bssid <bssid> | debug {rows | unique} | essid <essid-name> | internal {rows} | ip <IPv6-address> | location <ap-group-name> | mac <mac-address> | mobile {bindings | rows | unique | visitors} | name <user-name> | phy-type {a | b} | role <role-name> | rows | station | verbose ]
Description
Displays IPv6 user table entries. You can filter the output based on various parameters are described in table.
Syntax
Parameter
Description
authentication-method
Displays entries in the IPv6 user-table that matches the following authentication methods: l dot1x l mac l stateful-mac l vpn l web
bssid
Displays entries in the IPv6 user-table that are associated to the specified BSSID.
debug
Displays entries in the IPv6 user-table that are in debug mode.
essid
Displays entries in the IPv6 user-table that are associated to the specified ESSID. If the ESSID includes spaces, you must enclose it in quotation marks.
internal
Displays internal IPv6 users.
ip
Displays IPv6 users that match the specified IPv6 IP address.
location
This value refers to the AP-group of the IPv6 client. Use the show aaa state ap-group to get the AP group and the location ID mapping.
mac
Displays users with the specified MAC address.
mobile
Displays list of mobile users in the IPv6 user table. The following filters are available for this parameter: l bindings--list of users that have moved away from the current switch. l rows--displays entries that match the specified row number. l unique--displays unique entries in the IPv6 user-table. l visitors--displays users that have associated with the current switch.
AOS-W 6.2 | Reference Guide
show ipv6 user-table | 1123
Parameter name phy-type role rows
station verbose
Description Displays IPv6 user table entries that match the specified name. Displays IPv6 user table entries that match a or b phy-type. Displays IPv6 user table entries that match the specified role. Displays specific rows in the IPv6 user table. Enter the starting row number and the number of rows to be displayed. Displays the station table information for the IPv6 user table entries. Displays the complete IPv6 user table with all details.
Example
This example displays dot1x authenticate users in IPv6 user table.
(host) show ipv6 user-table authentication-method dot1x
Users
-----
IP
MAC
Name
Role
Age(d:h:m)
Auth VPN link AP name
Roaming Essid/Bssid/Phy
Profile
----------
------------
------ ----
---------- --
-- -------- -------
------- ---------------
-------
fe80::216:ceff:fe2c:b485
00:16:ce:2c:b4:85 Wing-A logon
00:00:06
802.1x
00:0b:86:c1:0e:8c Wireless Wing-A/00:0b:86:90:e8:c0/g default-dot1x
2003:d81f:f9f0:1001:617c:9151:6d25:f754 00:16:ce:2c:b4:85 Wing-A logon
00:00:06
802.1x
00:0b:86:c1:0e:8c Wireless Wing-A/00:0b:86:90:e8:c0/g default-dot1x
The output of this command includes the following parameters:
Parameter IP MAC Name Role Age (d:h:m) Auth AP name Roaming Essid/Bssid/Phy Profile
Description IP address of the client in that row that authenticating using dot1x MAC address of the client. Name of the client. The role assigned to the client. Total time that client is connected to switch. Authentication type. Name of the AP associated with the client. Current roaming status of the client. ESSID/BSSID/Phy to which the client is associated. Displays the AAA profile.
Command History
This command was available in AOS-W 3.3.
1124 | show ipv6 user-table
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show ipv6 user-table | 1125
show keys
show keys [all]
Description
Show whether optional keys and features are enabled or disabled on the switch.
Syntax
Parameter
all
Description
Include this optional parameter to display the status of all optional keys and features. If this parameter is omitted, the output displays the status of the most commonly used features and keys.
Example
The following example displays the status of the most commonly used keys and features on the switch.
(host) #show keys Licensed Features ----------------Feature ------Access Points Remote Access Points Outdoor Mesh Access Points RF Protect Voice Service Module VPN Server Module xSec Module Next Generation Policy Enforcement Firewall Module Advanced Cryptography Service provider AP RF Protect Policy Enforcement Firewall Remote APs External Services Interface Client Integrity Module VPN Server Wired 802.1X xSec Module MMC AP Netgear AP Voice Services Module Mesh Point APs AP Developers Module Power Over Ethernet Internal Test Functions Public Access Policy Enforcement Firewall for VPN users Advanced Cryptography Service Provider Access Point L2/L3 Switching Maritime Regulatory Domain
Status -----64 64 64 64 Unlimited 512 96 64 2024 0 ENABLED ENABLED ENABLED ENABLED ENABLED ENABLED ENABLED ENABLED DISABLED DISABLED ENABLED ENABLED DISABLED ENABLED DISABLED ENABLED ENABLED ENABLED DISABLED DISABLED ENABLED
1126 | show keys
AOS-W 6.2 | Reference Guide
Related Commands
To view the license usage database (including the license key strings) use the command show license on page 1132.
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show keys | 1127
show lacp
show lacp <group_number> {counters | internal | neighbor}
Description
View the LACP configuration status.
Syntax
Parameter <group_number>
counters internal neighbor
Description Enter the Link aggregation group number. Range: 0-7 Enter the keyword counters to view the LACP traffic. Enter the keyword internal to view the LACP internal information. Enter the keyword neighbor to view the LACP neighbor information.
Example
The port uses the group number +1 as its "actor admin key". By default, all the ports use the long timeout value (90 seconds).
(Host)#show lacp 0 neighbor
Flags: S - Device is requesting Slow LACPDUs
F - Device is requesting fast LACPDUs
A - Device is in active mode P - Device is in passive mode
Partner's information
---------------------
Port Flags Pri OperKey State Num Dev Id
---- ----- ---- ------- ----- ---- ----------------
FE 1/1 SA
1 0x10
0x45 0x5 00:0b:86:51:1e:70
FE 1/2 SA
1 0x10
0x45 0x6 00:0b:86:51:1e:70
When a port, in a LAG, is misconnected (that is, the partner device is different than the other ports or the neighborship times out or can not exchange LACPDUs with the partner), the port status is displayed as "DOWN" (see the following example).
(Host)#show lacp 0 internal Flags: S - Device is requesting Slow LACPDUs
F - Device is requesting fast LACPDUs A - Device is in active mode P - Device is in passive mode
Port ---FE 1/1 FE 1/2
Flags ----SA SA
Pri AdminKey ---- -------1 0x1 1 0x1
OperKey State Num Status
-------- ----- ---- -------
0x1
0x45 0x2 DOWN
0x1
0x45 0x3 UP
The "counters" option allows you to view LACP received (Rx) traffic, transmitting (Tx) traffic, data units (DU) received and transmitted by port.
(Host)#show lacp 0 counters Port LACPDUTx LACPDURx MarkrTx MarkrRx MrkrRspTx MrkrRspRx
1128 | show lacp
AOS-W 6.2 | Reference Guide
---- -------- -------- ------- -------- --------- ---------
FE 1/1 10
10
0
0
0
0
FE 1/2 12
12
0
0
0
0
Related Command
Command lacp group show interface port-channel show lacp sys-id
Description Enable LACP and configure on the interface View information on a specified port-channel interface View the LACP system ID information
Command History
Release AOS-W 3.4.1
Modification Command introduced
Command Information
Platform All Platforms
Licensing Base operating system
Command Mode
Enable and Configuration modes for Master and Local switches
AOS-W 6.2 | Reference Guide
show lacp | 1129
show lacp sys-id
show lacp sys-id
Description
View the LACP system MAC address and port priority.
Example
This command returns the port priority and the MAC address (comma separated). In the example below, the port priority is the default value 32768 followed by the MAC address 00:0B:86:40:37:C0.
(Host)#show lacp sys-id 32768,00:0B:86:40:37:C0
Related Commands
Command lacp group lacp port-priority show lacp show interface port-channel
Description Enable LACP and configure on the interface Configure the LACP port priority View the LACP configuration status View information on a specified port channel interface
Command History
Release AOS-W 3.4.1
Modification Command introduced
Command Information
Platform All Platforms
Licensing Base operating system
Command Mode
Enable and Configuration modes (config) for Master and Local switch
1130 | show lacp sys-id
AOS-W 6.2 | Reference Guide
show lcd-menu
show lcd-menu
Description
Displays the current LCD Menu configuration.
Syntax
None.
Example
An example output of the show lcd-menu command.
lcd-menu
--------
Parameter
Value
---------
-----
menu maintenance upgrade-image partition0 enabled
menu maintenance upgrade-image partition1 enabled
menu maintenance upgrade-image
enabled
menu maintenance upload-config
enabled
menu maintenance factory-default
enabled
menu maintenance media-eject
enabled
menu maintenance reload-system
enabled
menu maintenance halt-system
enabled
menu maintenance
enabled
menu
enabled
Related Commands
Command History
Release AOS-W 6.2
Modification Command introduced.
Command Information
Platforms OAW-4x50
Licensing Base operating system
Command Mode
Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show lcd-menu | 1131
show license
show license [limits]
Description
Displays the license table.
Syntax
Parameter Description
limits
Enter the keyword limit to display the current license limits.
Example
An example output of the show license command.
(host) # show license
License Table ------------Key --x7kbiBm5-3jI5MiBY-HVTAH/ci-llxPiKBV-dY8QGBMg-240 1024
itY24Hca-HSQlvJhi-yZtW6RB7-HGuBXzIq-N6hd6TNV-nZk 128
oqdLOxZ6-+FS5DT2P-iNmtvc3o-NFyasYrO-ixGUrszE-4uo 128
GIleLrCX-d8lxt3z5-vQC50n60-f31amOxu-Rf0uEoTn-qXQ 128
ldsXG7ik-pj/HVm4t-Qt3541UC-3wzC+Efj-yn08g/HF-/Dg 128
sJvaPL88-gWDdlMpj-LZMZ2YKK-2fU8NV6l-XIH4wRk8-44I
QtemJpLj-Qm5D9WvK-8c9lbaL6-t2nU6/Pj-LSNd00FZ-tJo
WNx6RasB-Qn9YVZ+5-giraq0Uy-aoIqS3as-FXmFh5dY-cSs 1024
u/GdQHWa-m4bzUCMC-ydMsWTif-hDMDajyB-qAlIMwnN-pGM Enforcement Firewall for VPN users
F9dGNdjV-EmwLhqlI-oKMQQepZ-b9Jl3OB2-HQjwmc+r-vhI Policy Enforcement Firewall Module: 128
License Entries: 11
Installed --------2010-01-21
21:00:22 2010-01-21
21:01:03 2010-01-21
21:01:13 2010-01-21
21:01:22 2010-01-21
21:01:3 2010-05-05 08:51:57 2010-05-05 08:52:07 21:18:55 2010-01-21
21:20:56 2010-01-25
18:44:19 2010-01-25
18:44:19
Expires ------Never Never Never Never Never Never Never
Never Never Never
Flags -----
E E E E E E E E E
Service Type ------- ----Access Points: 120abg Upgrade: 121abg Upgrade: 124abg Upgrade: 125abg Upgrade: RF Protect: 512 RF Protect: 1024
xSec Module: Policy Next Generation
Flags: A - auto-generated; E - enabled; R - reboot required to activate
The output of this command includes the following data columns:
1132 | show license
AOS-W 6.2 | Reference Guide
Parameter Key Installed Expires
Flags
Service Type
Description
The license key.
The license installation date and time.
The date that your evaluation license expires is listed in this column. Permanent license will always have a "Never" in this column. Expired evaluation licenses will also be indicated in this column.
This column displays some status about your license. The legend for this column appears at the bottom of the display output. They are: A: The license is auto-generated. E: The license if fully enabled. R: You must reboot your switch to fully enable this license.
The license name (feature).
Related Commands
To view additional statistics for license key usage, use the command show keys.
Command History
Release AOS-W1.0 AOS-W 3.4
Modification
Command introduced.
Verbose parameter was deprecated. This command now displays the entire license key by default.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show license | 1133
show license-usage
show license-usage acr | ap | user | xsec
Description
Display license usage information.
Syntax
Parameter acr ap user xsec
Description Show ACR license usage Show AP license usage information. Show Policy Enforcement Firewall (PEF) user license usage. Show Extreme Security (xSec) user and tunnel license usage.
Examples
The following example displays the user license usage. (host) #show license-usage user
User License Usage -----------------Name ---License Limit License Usage License Available License Exceeded
Value ----2048 12 2036 0
The AP license usage is displayed below: (host) #show license-usage acr
AP Licenses ----------Type ---AP Licenses RF Protect Licenses PEF Licenses Overall AP License Limit
Number -----128 128 128 128
AP Usage -------Type ---CAPs RAPs Remote-node APs Tunneled nodes Total APs
Count ----0 0 0 0 0
1134 | show license-usage
AOS-W 6.2 | Reference Guide
Remaining AP Capacity --------------------Type Number ---- -----CAPs 32 RAPs 128
Command History
Release AOS-W 3.0 AOS-W 3.3
AOS-W 5.0 AOS-W 6.1 AOS-W 6.2
Modification
Command Introduced.
The following parameters were introduced in the output of show license-usage ap. l Total 802.11n-120abg Licenses l 802.11n-120abg Licenses Used l Total 802.11n-121abg Licenses l 802.11n-121abg Licenses Used l Total 802.11n-124abg Licenses l 802.11n-124abg Licenses Used l Total 802.11n-125abg Licenses l 802.11n-125abg Licenses Used
Deprecated the option "vpn"
Added option for ACR license
The output of the show license-usage ap and show license-usage user commands was reorganized to reflect the newest license scheme.
Command Information
Platforms All platforms
Licensing
Base operating system. The output of this command varies, according to the licenses currently installed on the switch.
Command Mode
Enable or Config mode on master switches
AOS-W 6.2 | Reference Guide
show license-usage | 1135
show local-userdb-ap
local-userdb-ap mac-address <macaddr> start
Description
View detailed information for the obsolete RAP whitelist database used in AOS-W 6.1 and earlier.
Syntax
Parameter
mac-address <macaddr>
start <offset>
Description MAC address of the remote AP to be removed from the Remote AP Whitelist table.
Start displaying the table at the specified record in the database
Usage Guidlines
When you upgrade from AOS-W 5.0-6.1 to AOS-W 6.2 or later, the remote AP whitelist table will automatically move from the legacy Remote AP whitelist to the newer Remote AP whitelist. Issue the show local-userdb-ap command to view and troubleshoot any AP entries that did not properly move to the new table during the upgrade procedure. In the example below, the command output has been divided into two tables to fit on a single page of this document. In the command-line interface, this output would appear in a single, wide table.
(host) #show local-userdb-ap
AP-entry Details ----------------
Name ---00:0b:86:c3:58:38 00:0b:86:66:01:aa anymore 00:1a:1e:c0:1b:e0 00:0b:86:66:03:3f 00:0b:86:66:02:09
AP-Group -------local default
default default default
AP-Name ------chuck rap2
00:1a:1e:c0:1b:e0 rap 00:0b:86:66:02:09
Full-Name --------chuck moscato
moscato-rap
Authen-Username --------------naveen
naveen INDIAQA\naveen
Revoke-Text -----------
AP is not valid
AP_Authenticated ---------------Authenticated Provisioned Authenticated Authenticated Provisioned
Description -----------
Date-Added ---------Thu Mar 5 21:25:36 2009 Thu Mar 5 21:25:49 2009 Wed Mar 4 20:16:16 2009 Tue May 19 07:53:29 2009 Fri May 8 10:37:40 2009
Enabled ------Yes No Yes Yes Yes
AP Entries: 5
The output of this command includes the following information:
1136 | show local-userdb-ap
AOS-W 6.2 | Reference Guide
Parameter Name AP-Group AP-name Full-name Authen-Username
Revoke-Text
AP_Authenticated
Description Date-Added Enabled
Description
MAC address of the AP.
Name of the AP group to which the AP has been assigned.
Name of the AP. If no name has been specified, this column will display the AP's MAC address
Text string used to identify the AP. This field often describes the AP's user, and corresponds to the User Name field in the RAP whitelist in the WebUI.
User name of the user who authenticated the remote AP. This parameter holds the user name of the user who authenticated the remote AP. This is related to the zero touch authentication feature, as a user needs authenticate an AP before it gets its complete configuration. Before the AP is authenticated, it is given a restricted configuration to allow users to perform captive portal authorization via the remote AP's ENET ports to authenticate the remote AP. The username used during captive portal authentication will be stored in this field. This cannot be added manually when creating a local-userdb-ap entry.
The command local-userdb-aprevoke includes an optional revoke-comment parameter that allows network administrators to explain why the AP was revoked. If an AP is revoked, and a revoke comment entered, this text appears in the revoke-text column in the show local-userdb-ap command. When a local DB entry is reenabled via the command local-userdb-ap modify mac-addr mode enable, this field is cleared.
This column indicates the authorization status of the AP. An AP can either be Authenticated or Provisioned. Remote APs that do not support certificated-based provisioning will always display a Provisioned status. Remote APs that support certificated-based provisioning can display either a Authenticated or Provisioned status, depending on their configuration and authentication status. l If the remote AP has a defined AP authorization profile, the remote AP will
be in a "Provisioned" state with a limited configuration until it is authenticated. After it the remote AP has been authenticated, it will be in an "Authenticated" state. l If the remote AP does not have a defined AP authorization profile, the remote AP will be in a"Provisioned" state, but will still receive the full configuration assigned to that AP and its AP group.
A text string used to further identify the remote AP.
Date and time that the AP was added to the local user database
This column shows if the entry in the database is enabled or disabled. Database entries can be enabled or disabled using the CLI commands:
local-userdb-ap {add|modify} mac-address <mac-addr> mode {enable|disable}
and
local-userdb-ap revoke mac-address <mac-addr>
Related Commands
Command local-userdb-ap del
Description
Delete Remote AP entries from the obsolete remote AP whitelist table.
Add, delete, modify or revoke remote AP entries in the current emote AP whitelist table.
AOS-W 6.2 | Reference Guide
show local-userdb-ap | 1137
Command History
AOS-W 5.0 AOS-W 6.2
Modification Command introduced. Command replaced by show whitelist-db rap.
1138 | show local-userdb-ap
AOS-W 6.2 | Reference Guide
show local-userdb-guest
show local-userdb-guest
Description
Shows information about guest accounts in the local user database.
Syntax
Parameter maximum-expiration
<offset> <page_size>
Description How long the account is valid, in minutes, in the internal database. The user account record's location (by number) as it is listed in the database. The number of user account records that display on one page.
Usage Guidelines
Issue this command without any parameters to display a general overview of guest accounts in the database. Use the maximum-expiration parameter to show how long the account is valid for in minutes. Use the start <offset> page <page_size> parameters to control which guest account records in the database display initially and the number of account records displayed on a page.
Example
This example shows the basic summary of a user accounts in the database.
(host) #show local-userdb-guest maximum-expiration start 5 page 4
local-userdb-guest maximum-expiration 90
Guest UserSummary
-----------------
Name
Password
----
--------
guest-0657984 ********
guest-8330301 ********
guest-5433352 ********
guest-3469360 ********
Role ---guest guest guest guest
E-Mail ------
Enabled ------Yes Yes Yes Yes
Expiry ------
Status -----Active Active Active Active
Sponsor-Name ------------
Grantor-Name -----------admin admin admin admin
User Entries: 11
The output of this command includes the following parameters:
Parameter Name Password
Description Name of the user. The user's password.
AOS-W 6.2 | Reference Guide
show local-userdb-guest | 1139
Parameter Role
E-mail Enabled Expiry Status Sponsor-Name Grantor-Name User Entries
Description
Role for the user. This role takes effect when the internal database is specified in a server group profile with a server derivation rule. If there is no server derivation rule configured, then the user is assigned the default role for the authentication method.
Shows the email address of the user account.
Shows whether the account is enabled or disabled.
Shows the expiration date for the user account. If this is not set, the account does not expire.
Shows whether the profile has enabled or disabled the ability to use the HTTP protocol to redirect users to the captive portal page.
Shows the sponsor's name.
Shows the grantor's name.
Shows the number of user accounts in the database.
Related Commands
Command
Description
local-userdb add
Use this command to configure the parameters displayed in the output of this show command.
local-userdb-guest add Use this command to configure parameters for a guest user account.
Mode Enable and Config modes
Enable and Config modes
Command History
Release AOS-W 3.0 AOS-W 3.4
Modification Command introduced The Expiry, Status, Sponsor-name and Grantor-name were introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master and local switches
1140 | show local-userdb-guest
AOS-W 6.2 | Reference Guide
show local-userdb-remote-node
show local-userdb-remote-node mac-address <mac-addr> start <offset>
Description
The output of this command lists the MAC address and assigned Remote Node profile for of each Remote Node Controller associated with that Remote Node Controller master.
Syntax
Parameter mac-address <macaddr>
start
<page_size>
Description How long the account is valid, in minutes, in the internal database.
The user account record's location (by number) as it is listed in the database. The number of user account records that display on one page.
Usage Guidelines
If your network incudes multiple Remote Node Controller-masters under a single master switch the output of this command shows all Remote Node Controllers and Remote Node Controller-masters on the network.By default, this command displays all entries in the whitelist. To display only part of the Remote Node Controller whitelist, include the start <offset> parameters to start displaying the Remote Node Controller whitelist at the specified entry value. You can also include the optional mac-address <mac-addr> parameters to display values for a single Remote Node Controller entry.
Example
This example shows the basic summary of a user accounts in the database.
(host) #show local-userdb-remote-node mac-address 00:16:CF:AF:3E:E1
Remote-Node-entry Details
-----------------
Name
Remote-Node-Profile
----
-----------
00:16:cf:af:3e:e1 Myremotenode
Remote-Node Entries: 1
The output of this command includes the following parameters:
Parameter Name
remote-node profile
Remote Node Controller Entries
Description Mac address of the Remote Node Controller. Name of the Remote Node Controller profile Number of Remote Node Controller entries on this switch.
AOS-W 6.2 | Reference Guide
show local-userdb-remote-node | 1141
Related Commands
Command remote-node-profile
Description
The remote-node-profile command lets you create a Remote Node Controller profile.
Mode Config mode
Command History
Release AOS-W 6.0
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable mode on master and local switches
1142 | show local-userdb-remote-node
AOS-W 6.2 | Reference Guide
show local-userdb
show local-userdb {[maximum-expiration][start <offset> page <page_size]}
Description
Shows information about user's accounts in the local user database.
Syntax
Parameter maximum-expiration
<offset> <page_size>
Description How long the account is valid, in minutes, in the internal database. The user account record's location (by number) as it is listed in the database. The number of user account records that display on one page.
Usage Guidelines
Issue this command without any parameters to display a general overview of user's accounts in the database. Use the maximum-expiration parameter to show how long the account is valid for in minutes. Use the start <offset> page <page_size> parameters to control which user account records in the database display initially and the number of account records displayed on a page.
Example
This example shows the basic summary of a user accounts in the database.
(host) #show local-userdb maximum-expiration start 5 page 4
local-userdb maximum-expiration 90
User Summary -----------Name ---guest-0657984 guest-8330301 guest-5433352 guest-3469360
Password -------******** ******** ******** ********
Role ---guest guest guest guest
E-Mail ------
Enabled ------Yes Yes Yes Yes
Expiry ------
Status -----Active Active Active Active
Sponsor-Name ------------
Grantor-Name -----------admin admin admin admin
User Entries: 11
The output of this command includes the following parameters:
Parameter Name Password
Description Name of the user. The user's password.
AOS-W 6.2 | Reference Guide
show local-userdb | 1143
Parameter Role
E-mail Enabled Expiry Status Sponsor-Name Grantor-Name User Entries
Description
Role for the user. This role takes effect when the internal database is specified in a server group profile with a server derivation rule. If there is no server derivation rule configured, then the user is assigned the default role for the authentication method.
Shows the email address of the user account.
Shows whether the account is enabled or disabled.
Shows the expiration date for the user account. If this is not set, the account does not expire.
Shows whether the profile has enabled or disabled the ability to use the HTTP protocol to redirect users to the captive portal page.
Shows the sponsor's name.
Shows the grantor's name.
Shows the number of user accounts in the database.
Related Commands
Command local-userdb add
local-userdb-guest add
Description
Use this command to configure the parameters displayed in the output of this show command.
Use this command to configure parameters for a guest user account.
Mode Enable and Config modes
Enable and Config modes
Command History
Release AOS-W 3.0 AOS-W 3.4
Modification Command introduced The Expiry, Status, Sponsor-name and Grantor-name were introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master and local switches
1144 | show local-userdb
AOS-W 6.2 | Reference Guide
show local-userdb username
show local-userdb username <name>
Description
Shows information about specific user account in the internal switch database.
Usage Guidelines
Issue this command to display an overview of a particular user account in the database.
Example
This example shows the basic summary of a user account Paula in the database.
(host) #show local-userdb username Paula
User Summary -----------Name Password ---- -------paula ********
Role ---guest
E-Mail ------
Enabled ------Yes
Expiry ------
Status -----Inactive
Sponsor-Name ------------
Grantor-Name -----------admin
User Entries: 1
Command History
Release AOS-W 3.0
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master and local switches
AOS-W 6.2 | Reference Guide
show local-userdb username | 1145
show local-userdb username
show local-userdb username <name>
Description
Shows information about specific user account in the internal switch database.
Usage Guidelines
Issue this command to display an overview of a particular user account in the database.
Example
This example shows the basic summary of a user account Paula in the database.
(host) #show local-userdb username Paula
User Summary -----------Name Password ---- -------paula ********
Role ---guest
E-Mail ------
Enabled ------Yes
Expiry ------
Status -----Inactive
Sponsor-Name ------------
Grantor-Name -----------admin
User Entries: 1
Command History
Release AOS-W 3.0
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master and local switches
1146 | show local-userdb username
AOS-W 6.2 | Reference Guide
show localip
show localip
Description
Displays the IP address and VPN shared key between master and local.
Syntax
No parameters.
Example
The output of this command shows the switch's IP address and shared key between master and local switches. (host) # show localip
Local Switches configured by Local Switch IP
---------------------------------------------
Switch IP address of the Local Key
------------------------------ ---
0.0.0.0
********
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show localip | 1147
show log all
show log all [<number>]
Description
Show the switch's full log.
Syntax
Parameter <number>
Description
Start displaying the log output from the specified number of lines from the end of the log.
Example
This example shows the most ten recent log entries for the switch.
(host) #show log all 10
Mar 3 13:26:20 Mar 3 13:26:20 Mar 3 13:26:20 database Mar 3 13:26:20 database Mar 3 13:46:54 Mar 3 13:57:53 Mar 3 13:57:53 Mar 3 13:57:53 Mar 3 13:57:53 database Mar 3 13:57:53 database
localdb[567]: <133006> <ERRS> |localdb| User admin Failed Authentication localdb[567]: <133006> <ERRS> |localdb| User admin Failed Authentication localdb[567]: <133019> <ERRS> |localdb| User admin was not found in the
localdb[567]: <133019> <ERRS> |localdb| User admin was not found in the
fpcli: USER: admin connected from 10.100.100.66 has logged out. fpcli: USER: admin has logged in from 10.100.100.66. localdb[567]: <133006> <ERRS> |localdb| User admin Failed Authentication localdb[567]: <133006> <ERRS> |localdb| User admin Failed Authentication localdb[567]: <133019> <ERRS> |localdb| User admin was not found in the
localdb[567]: <133019> <ERRS> |localdb| User admin was not found in the
Command History
This command was introduced in AOS-W 3.4.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available in Enable and Config modes.
1148 | show log all
AOS-W 6.2 | Reference Guide
show log ap-debug
show log ap-debug{[<number>][all]}
Description
Show the switch's AP debug logs.
Syntax
Parameter <number>
all
Description
Start displaying the log output from the specified number of lines from the end of the log.
Shows all the AP debug logs for the switch.
Example
This example shows the ten most recent AP debug logs for the switch.
(host) #show log ap-debug 10
Nov 24 20:54:24 KERNEL(AP39@10.6.1.21): Copyright (c) 2005-2006 Atheros Communications, Inc. All Rights Reserved Nov 24 20:54:24 KERNEL(AP39@10.6.1.21): wifi0: Base BSSID 00:1a:1e:25:97:d0, 16 available BSSID(s) Nov 24 20:54:24 KERNEL(AP39@10.6.1.21): edev->dev_addr=00:1a:1e:ca:59:7c Nov 24 20:54:24 KERNEL(AP39@10.6.1.21): wifi1: Base BSSID 00:1a:1e:25:97:c0, 16 available BSSID(s) Nov 24 20:54:24 KERNEL(AP39@10.6.1.21): edev->dev_addr=00:1a:1e:ca:59:7c Nov 24 20:54:24 KERNEL(AP39@10.6.1.21): ^H<6>Ethernet Channel Bonding Driver: v3.0.1 (January 9, 2006) Nov 24 20:54:24 KERNEL(AP39@10.6.1.21): secure_jack_link_state_change: Error finding device eth0 Nov 24 20:54:25 KERNEL(AP39@10.6.1.21): Kernel watchdog refresh ended.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available in Enable and Config modes.
AOS-W 6.2 | Reference Guide
show log ap-debug | 1149
show log bssid-debug
show log bssid-debug{[<number>][all]}
Description
A Basic Service Set Identifier (BSSID) uniquely defines each wireless client and Wireless Broadband Router. This command shows the switch's BSSID debug logs.
Syntax
Parameter <number>
all
Description
Start displaying the log output from the specified number of lines from the end of the log.
Shows all the BSSID debug logs for the switch.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available in Enable and Config modes
1150 | show log bssid-debug
AOS-W 6.2 | Reference Guide
show log errorlog
show log errorlog{[<number>][all]}
Description
Show the switch's system errors and other critical information.
Syntax
Parameter <number>
all
Description
Start displaying the log output from the specified number of lines from the end of the log.
Shows all the error logs for the switch.
Example
This example shows the ten most recent system log errors.
(host) #show log errorlog 10
Mar 5 10:30:34 <sapd 106007> <ERRS> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Rogue AP detected with SSID cto-dnh-blah, BSSID 00:0b:86:b5:86:c0, Wired MAC 00:0b:86:02:ee:00, and IP 10.3.49.254 Mar 5 10:31:39 <sapd 404080> <ERRS> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: ADHOC network detected with Src 00:13:ce:45:91:a0, BSSID 02:13:ce:2d:37:50, ESSID adhoc_ap70 Channel 11 and RSSI 22 Mar 5 10:32:12 <sapd 106007> <ERRS> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Rogue AP detected with SSID cto-dnh-blah, BSSID 00:0b:86:b5:86:c0, Wired MAC 00:0b:86:02:ee:00, and IP 10.3.49.254 Mar 5 10:32:46 <sapd 106007> <ERRS> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Rogue AP detected with SSID cto-dnh-blah, BSSID 00:0b:86:b5:86:c0, Wired MAC 00:0b:86:02:ee:00, and IP 10.3.49.254 Mar 5 10:40:32 <localdb 133019> <ERRS> |localdb| User admin was not found in the database Mar 5 10:40:32 <localdb 133006> <ERRS> |localdb| User admin Failed Authentication Mar 5 10:41:10 <sapd 106007> <ERRS> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Rogue AP detected with SSID sw-rlo-open, BSSID 00:0b:86:c9:9e:20, Wired MAC 00:00:00:00:00:00, and IP 0.0.0.0 Mar 5 10:41:31 <sapd 106007> <ERRS> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Rogue AP detected with SSID QA_MARORA_VOCERA, BSSID 00:0b:86:c9:9e:21, Wired MAC 00:0b:86:02:ee:00, and IP 10.3.49.254 Mar 5 10:48:01 <sapd 404080> <ERRS> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: ADHOC network detected with Src 00:13:ce:45:d9:4d, BSSID 02:13:ce:28:40:48, ESSID adhoc_ap70 Channel 11 and RSSI 8 Mar 5 11:04:21 <sapd 404080> <ERRS> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: ADHOC network detected with Src 00:13:ce:45:d9:4d, BSSID 02:13:ce:2d:37:50, ESSID adhoc_ap70 Channel 11 and RSSI 9
Command History
This command was available in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show log errorlog | 1151
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available in Enable and Config modes.
1152 | show log errorlog
AOS-W 6.2 | Reference Guide
show log essid-debug
show log essid-debug{[<number>][all]}
Description
Show the switch's ESSID debug logs. An Extended Service Set Identifier (ESSID) is used to identify the wireless clients and Wireless Broadband Routers in a WLAN. All wireless clients and Wireless Broadband Routers in the WLAN must use the same ESSID.
Syntax
Parameter <number>
all
Description
Start displaying the log output from the specified number of lines from the end of the log.
Shows all the ESSID debug logs for the switch.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available in Enable and Config modes.
AOS-W 6.2 | Reference Guide
show log essid-debug | 1153
show log network
show log network{[<number>][all]}
Description
Show the switch's system network errors.
Syntax
Parameter <number>
all
Description
Start displaying the log output from the specified number of lines from the end of the log.
Shows all the network logs for the switch.
Example
This example shows the switch's recent network log errors (host) #show log network all
Feb 17 14:47:14 :209801: <WARN> |fpapps| Physical link down: port 1/1 Feb 17 14:48:04 :209801: <WARN> |fpapps| Physical link down: port 1/1
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available in Enable and Config modes.
1154 | show log network
AOS-W 6.2 | Reference Guide
show log security
show log security{[<number>][all]}
Description
Show the switch's security logs.
Syntax
Parameter <number>
all
Description
Start displaying the log output from the specified number of lines from the end of the log.
Shows all the security logs for the switch.
Example
This example shows the switch's last seven security logs.
(host) #show log security 7
Mar 5 11:53:43 :124004: <DBUG> |authmgr| Local DB auth failed for user admin, error (User not found in UserDB) Mar 5 11:53:43 :124003: <INFO> |authmgr| Authentication result=Authentication failed(1), method=Management, server=Internal, user=10.100.100.66 Mar 5 11:53:43 :124004: <DBUG> |authmgr| Auth server 'Internal' response=1 Mar 5 11:53:43 :125027: <DBUG> |aaa| mgmt-auth: admin, failure, , 0 Mar 5 11:53:43 :125024: <NOTI> |aaa| Authentication Succeeded for User admin, Logged in from 10.100.100.66 port 1778, Connecting to 10.3.49.100 port 22 connection type SSH Mar 5 11:53:58 :103060: <DBUG> |ike| ipc.c:ipc_get_cfgm_role:2826 Sending REQUEST for CFGM Role Mar 5 11:53:58 :103060: <DBUG> |ike| ipc.c:get_local_cfg_trigger_ike:2653 IKE got trigger from CFGM : state :3
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available in Enable and Config modes.
AOS-W 6.2 | Reference Guide
show log security | 1155
show log system
show log system{[<number>][all]}
Description
Show the switch's system logs.
Syntax
Parameter <number>
all
Description
Start displaying the log output from the specified number of lines from the end of the log.
Shows all the system logs for the switch.
Example
This example shows the switch's last ten system logs.
(host) #show log system 10
Mar 5 11:55:59 :316073: <DBUG> |wms| Received New AP Message: AP 00:0b:86:b5:87:c2 Status 1 Num-WM 0 Mar 5 11:55:59 :316083: <DBUG> |wms| mysql: UPDATE ap_table SET ssid='qa-abu-customerissue', current_channel='11', type='generic-ap', ibss='no', phy_type='80211g', rap_type='interfering', match_mac='00:00:00:00:00:00', power_level='255', status='up' WHERE id='71575' ; Mar 5 11:55:59 :316029: <DBUG> |wms| Sending message to Probe: IP:10.3.49.253 MsgType:PROBE_RAP_TYPE AP 00:0b:86:b5:87:c2 Type:1 Mar 5 11:55:59 :316036: <DBUG> |wms| Received New STA Message: MAC 00:0b:86:b5:87:c2 Status 0 Mar 5 11:55:59 :316032: <DBUG> |wms| STA Probe: ADD Probe 00:0b:86:a2:e7:40 for STA 00:0b:86:b5:87:c2 Mar 5 11:56:00 :399814: <DBUG> |fpapps| PoE: RAN THRU ITERATION 2 Mar 5 11:56:00 :326001: <DBUG> |AP 1.1.1@10.3.49.253 sapd| AM: am_read_bss_data_stats: radio 0: pktsIn 0 pktsOut 0 bytesIn 0 bytesOut 0 Mar 5 11:56:00 :326001: <DBUG> |AP 1.1.1@10.3.49.253 sapd| AM: am_read_bss_data_stats: radio 0: pktsIn 0 pktsOut 52107 bytesIn 0 bytesOut 18143486 Mar 5 11:56:01 :326001: <DBUG> |AP 1.1.1@10.3.49.253 sapd| AM: MPPS 2722 CPPS 338 PKTS 452036609 BYTES 2062458092 INTR 334327351 Mar 5 11:56:02 :399814: <DBUG> |fpapps| PoE: Evaluating port 1/5 rv is 0 and crv is 1 state :3
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available in Enable and Config modes.
1156 | show log system
AOS-W 6.2 | Reference Guide
show log user
show log user{[<number>][all]}
Description
Show the switch's user logs.
Syntax
Parameter <number>
all
Description
Start displaying the log output from the specified number of lines from the end of the log.
Shows all the user logs for the switch.
Example
This example shows the switch's last ten user logs.
(host) #show log user 10
Mar 5 13:29:57 :501083: <WARN> |stm| Probe request: 00:0b:86:cd:1a:00: Invalid Station MAC address from AP 10.3.49.253-00:0b:86:a2:e7:40-1.1.1 Mar 5 13:32:08 :501083: <WARN> |stm| Probe request: 00:0b:86:cd:1a:00: Invalid Station MAC address from AP 10.3.49.253-00:0b:86:a2:e7:40-1.1.1 Mar 5 13:36:41 :501083: <WARN> |stm| Probe request: 00:0b:86:cd:1a:00: Invalid Station MAC address from AP 10.3.49.253-00:0b:86:a2:e7:40-1.1.1 Mar 5 13:38:42 :501083: <WARN> |stm| Probe request: 00:0b:86:cd:1a:00: Invalid Station MAC address from AP 10.3.49.253-00:0b:86:a2:e7:40-1.1.1 Mar 5 13:40:41 :501083: <WARN> |stm| Probe request: 00:0b:86:cd:1a:00: Invalid Station MAC address from AP 10.3.49.253-00:0b:86:a2:e7:40-1.1.1 Mar 5 13:42:51 :501083: <WARN> |stm| Probe request: 00:0b:86:cd:1a:00: Invalid Station MAC address from AP 10.3.49.253-00:0b:86:a2:e7:40-1.1.1 Mar 5 13:47:03 :501083: <WARN> |stm| Probe request: 00:0b:86:cd:1a:00: Invalid Station MAC address from AP 10.3.49.253-00:0b:86:a2:e7:40-1.1.1 Mar 5 13:49:07 :501083: <WARN> |stm| Probe request: 00:0b:86:cd:1a:00: Invalid Station MAC address from AP 10.3.49.253-00:0b:86:a2:e7:40-1.1.1 Mar 5 13:53:08 :501083: <WARN> |stm| Probe request: 00:0b:86:cd:1a:00: Invalid Station MAC address from AP 10.3.49.253-00:0b:86:a2:e7:40-1.1.1 Mar 5 13:55:14 :501083: <WARN> |stm| Probe request: 00:0b:86:cd:1a:00: Invalid Station MAC address from AP 10.3.49.253-00:0b:86:a2:e7:40-1.1.1
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available in Enable and Config modes.
AOS-W 6.2 | Reference Guide
show log user | 1157
show log user-debug
show log user-debug{[<number>][all]}
Description
Show the switch's user debug logs.
Syntax
Parameter <number>
all
Description
Start displaying the log output from the specified number of lines from the end of the log.
Shows all the user debug logs for the switch.
Example
This example shows the switch's last ten user debug logs.
(host) #show log user-debug 10
Mar 5 13:57:24 :501090: <DBUG> |stm| 00:0b:86:a2:e7:40-1.1.1 SSID Mar 5 13:57:24 :501090: <DBUG> |stm| 00:0b:86:a2:e7:41-1.1.1 SSID Mar 5 13:58:26 :501082: <DBUG> |stm| 00:0b:86:a2:e7:40-1.1.1 Mar 5 13:58:26 :501085: <DBUG> |stm| 00:0b:86:a2:e7:40-1.1.1 SSID Mar 5 13:58:26 :501090: <DBUG> |stm| 00:0b:86:a2:e7:40-1.1.1 SSID Mar 5 13:58:26 :501090: <DBUG> |stm| 00:0b:86:a2:e7:41-1.1.1 SSID Mar 5 13:58:27 :501082: <DBUG> |stm| 00:0b:86:a2:e7:40-1.1.1 Mar 5 13:58:27 :501085: <DBUG> |stm| 00:0b:86:a2:e7:40-1.1.1 SSID Mar 5 13:58:27 :501090: <DBUG> |stm| 00:0b:86:a2:e7:40-1.1.1 SSID Mar 5 13:58:27 :501090: <DBUG> |stm| 00:0b:86:a2:e7:41-1.1.1 SSID
Probe response: 00:18:f8:ab:77:a4: AP 10.3.49.253Probe response: 00:18:f8:ab:77:a4: AP 10.3.49.253Probe request: 00:18:f8:ab:77:a4: AP 10.3.49.253Probe request: 00:18:f8:ab:77:a4: AP 10.3.49.253Probe response: 00:18:f8:ab:77:a4: AP 10.3.49.253Probe response: 00:18:f8:ab:77:a4: AP 10.3.49.253Probe request: 00:18:f8:ab:77:a4: AP 10.3.49.253Probe request: 00:18:f8:ab:77:a4: AP 10.3.49.253Probe response: 00:18:f8:ab:77:a4: AP 10.3.49.253Probe response: 00:18:f8:ab:77:a4: AP 10.3.49.253-
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available in Enable and Config modes.
1158 | show log user-debug
AOS-W 6.2 | Reference Guide
show log wireless
show log wireless{[<number>][all]}
Description
Show the switch's wireless logs.
Syntax
Parameter <number>
all
Description
Start displaying the log output from the specified number of lines from the end of the log.
Shows all the wireless logs for the switch.
Example
This example shows the switch's last ten wireless logs.
(host) #show log wireless 10
Mar 5 13:59:31 :404003: <WARN> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Interfering AP detected with SSID mak-cp-psk and BSSID 00:0b:86:8b:70:20 Mar 5 13:59:35 :404003: <WARN> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Interfering AP detected with SSID and BSSID 00:0b:86:c0:06:83 Mar 5 13:59:38 :404003: <WARN> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Interfering AP detected with SSID and BSSID 00:0b:86:c0:06:85 Mar 5 13:59:41 :404003: <WARN> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Interfering AP detected with SSID and BSSID 00:0b:86:89:f9:42 Mar 5 13:59:41 :404003: <WARN> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Interfering AP detected with SSID QA-SANJAY-OSUWIRELESS and BSSID 00:0b:86:89:f9:40 Mar 5 13:59:44 :404003: <WARN> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Interfering AP detected with SSID QA-SANJAY-OSUVOICE and BSSID 00:0b:86:8c:fb:c0 Mar 5 13:59:44 :404003: <WARN> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Interfering AP detected with SSID Google and BSSID 00:0b:86:4f:82:c0 Mar 5 13:59:47 :404003: <WARN> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Interfering AP detected with SSID QA-SANJAY-OSUVOICE and BSSID 00:0b:86:89:f9:41 Mar 5 13:59:50 :404003: <WARN> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Interfering AP detected with SSID and BSSID 00:0b:86:c0:06:86 Mar 5 13:59:50 :404003: <WARN> |AP 1.1.1@10.3.49.253 sapd| AM 00:0b:86:a2:e7:40: Interfering AP detected with SSID cto-dnh-blah and BSSID 00:0b:86:60:b8:80
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available in Enable and Config modes.
AOS-W 6.2 | Reference Guide
show log wireless | 1159
show logging
show logging facility|server|{level [verbose]}
Description
the IP address of the remote logging server, as well as facility log types and their associated facility levels.
Syntax
Parameter facility server level [verbose]
Description View the facility used when logging messages into the remote syslog server.
Show the IP address of a remote logging server.
Show logging levels at which the messages are logged. Include the optional verbose parameter to display additional data for logging subcategories and processes.
Usage Guidelines
The AOS-W logging levels follow syslog convention: l level 7: Emergency l level 6: Alert l level 5: Critical l level 4: Errors. l level 3: Warning l level 2:Notices l level 1:Informational l level 0: Debug The default logging level is leve1 1. You can change this setting via the logging command.
Example
This example below displays defined logging levels for each logging facility.
(host) #show logging level
LOGGING LEVELS
--------------
Facility Level
-------- -----
network warnings
security warnings
system warnings
user
warnings
wireless warnings
This example below displays the IP address of a remote log server. If a remote log server has not yet been defined, this command will not display any output.
(host) #show logging server
1160 | show logging
AOS-W 6.2 | Reference Guide
Remote Server: 1.1.1.1
FACILITY MAPPING TABLE
----------------------
local-facility severity
-------------- --------
user
debugging
remote-facility --------------local1
Related Commands
Command Description
logging
Use this command to specify the IP address of the remote logging server, as well as facility log types and their associated facility levels.
Mode
Config mode on master and local switches
Command History
This command was introduced in AOS-W 2.5.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches
AOS-W 6.2 | Reference Guide
show logging | 1161
show loginsessions
show loginsessions
Description
Displays the current administrator login sessions statistics.
Syntax
No parameters.
Example
Issue this command to display the admin login session statistics.
Session Table ------------ID User Name -- --------1 admin
User Role --------root
Connection From --------------10.100.102.43
Idle Time --------00:00:00
Session Time -----------00:27:59
The output includes the following parameters:
Parameter ID User Name User Role Connection From Idle Time Session Time
Description Sessions identification number Administrator's user name Administrator's role The IP address from which the administrator is connecting Amount of time the user has been idle Total time the session has been open
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
1162 | show loginsessions
AOS-W 6.2 | Reference Guide
show mac-address-table
show mac-address-table
Description
Displays a MAC forwarding table.
Syntax
No parameters.
Example
Issue this command to display the MAC forwarding table.
Dynamic Address Count:
0
Static Address (User-defined) Count:
System Self Address Count:
Total MAC Addresses :
6
Maximum MAC addresses :
MAC Address Table
------------------
Destination Address Address Type VLAN
------------------- ------------ ----
00:0b:86:00:00:00 Mgmt
1
00:0b:86:f0:05:60 Mgmt
1
00:0b:86:00:00:00 Mgmt
62
00:0b:86:f0:05:60 Mgmt
62
00:0b:86:00:00:00 Mgmt
4095
00:0b:86:f0:05:60 Mgmt
4095
0 0
6
Destination Port ---------------vlan 1 vlan 1 vlan 62 vlan 62 vlan 4095 vlan 4095
The output includes the following parameters:
Parameter Dynamic Address Count Static Address (User-defined) Count System Self Address Count Total MAC Addresses Maximum MAC Addresses Destination Address Address Type VLAN Destination Port
Description Count of dynamic addresses currently associated with the switch Count of static, user-defined addresses associated with the switch
Number of self system addresses Total number of MAC addresses associated with the switch Maximum number of MAC addresses Destination MAC address Destination address type Associated VLAN Destination port
Command History
This command was introduced in AOS-W 1.0.
AOS-W 6.2 | Reference Guide
show mac-address-table | 1163
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
1164 | show mac-address-table
AOS-W 6.2 | Reference Guide
show master-configpending
show master-configpending
Description
Displays the list of global commands which are not saved and are not sent to the local switch.
Syntax
No parameters.
Example
This example below displays the commands which are not saved and are not sent to the local switch. (host) #show master-configpending
aaa profile "default-xml-api" aaa xml-api server "10.17.93.2" aaa xml-api server "10.17.93.2" aaa xml-api server "10.17.93.2" key "12345678" aaa profile "default-xml-api" aaa profile "default-xml-api" xml-api-server "10.17.93.2" user-role "logon" user-role "logon" captive-portal "default" user-role "logon" user-role "logon" no captive-portal "default" user-role "logon" user-role "logon" captive-portal "default" voice rtp-analysis-config voice rtp-analysis-config rtp-analysis voice rtp-analysis-config rtp-analysis voice rtp-analysis-config no rtp-analysis voice rtp-analysis-config rtp-analysis
Related Commands
Command master-redundancy master-local
switches
Description
This command associates a VRRP instance with master switch redundancy.
This command displays the statistics between the local and the master switches.
This command provides the details on the switches connected to the master switch, including the master switch itself.
Command History
This command was introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master switches.
AOS-W 6.2 | Reference Guide
show master-configpending | 1165
show master-local stats
show master-local stats [<ip-addr>] [<page>]
Description
Display statistics for communication between master and local switches.
Syntax
Parameter <ip-addr> <page>
Description Include the IP address of a switch to display statistics that switch only. Start displaying the output of this command at the specified page number.
Usage Guidelines
By default, master and Local switchs exchange heartbeat messages every 10 seconds. These "Heartbeats" a include configuration timestamp. If a master switch has later timestamp than the local switch, the state of the local switch changes from `Update Successful' to `Update Required'.
Example
This example below shows statistics for all communications between the master and local switch. (host) #show master-local stats
Missed -> HB Resp from Master
-----------------------------
IP Address HB Req
HB Resp
Last Synced
---------- ------
-------
-----------
10.6.2.252 194721
194208
Thu Feb 26 21:12:04 2009
Total Missed Last Sent Missed Peer Reset Cfg Terminate
------------ ---------------- ---------- -------------
926
0
105
1
The output of this command includes the following data columns:
Parameter IP Address HB Req HB Resp Total Missed Last Sent Missed
Description
IP address of the local switch.
Heartbeat requests sent from the local switch.
Heartbeat responses sent from the master switch.
Total number of heartbeats that were not received by the local switch.
This counter will increment if switch misses the last heartbeat from the peer switch. This counter will keep on incrementing until the heartbeat message is received from peer.
1166 | show master-local stats
AOS-W 6.2 | Reference Guide
Parameter Peer Reset
Cfg Terminate Last Synced
Description
The number of times the connection to peer is been reset. The connection could reset due to network connectivity problems or when the peer switch reboots.
Number of times the switch has failed to upgrade to a new configuration
Timestamp showing the last time the local switch synched its configuration from the master switch.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches.
AOS-W 6.2 | Reference Guide
show master-local stats | 1167
show master-redundancy
show master-redundancy
Description
Display the master switch redundancy configuration.
Syntax
No parameters.
Example
This example below shows the current master redundancy configuration, including the ID number of the master VRRP virtual router and the IP address of the peer switch for master redundancy. (host) #show master-redundancy Master redundancy configuration:
VRRP Id 2 current state is MASTER Peer's IP Address is 2.1.1.4
Related Commands
Command
master-redundancy master-vrrp
vrrp
Description This command associates a VRRP instance with master switch redundancy.
This command configures the Virtual Router Redundancy Protocol (VRRP).
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master switches.
1168 | show master-redundancy
AOS-W 6.2 | Reference Guide
show memory
show memory [ap {meshd|rfd|sapd} {ap-name <ap-name>}|{bssid <bssid>}|{ip-addr <ip-addr>}]| [auth | cfgm |debug [[verbose]]|dbsync |fpapps | fpcli| isakmpd | l2tpd | mobileip | ospf | pim | pptpd | profmgr | slb| snmpd | stm | udbserver |wms]
Description
Show the amounts of free and available memory on the switch, or include a process name to show memory information for a process on the AP or switch.
Syntax
Parameter
Description
ap
Show memory information for a process running on a specific AP.
meshd
Display memory information for the meshd process on the specified AP.
rfd
Display memory information for the rfd process on the specified AP.
sapd
Display memory information for the rfd process on the specified AP.
ap-name <ap-name> Display memory information for an AP with the specified AP name.
bssid <bssid>
Display memory information for an AP with the specified BSSID.
ip-addr <ip-addr> Display memory information for an AP with the specified IP address.
auth
Display memory information for the auth process on the switch.
cfgm
Display memory information for the cfgm process on the switch.
debug [verbose]
Display detailed memory information to debug memory errors the switch. This command should only be used under the supervision of Alcatel-Lucent Technical Support.
dbsync
Display memory information for the dbsync process on the switch.
fpapps
Display memory information for the fpapps process on the switch.
fpcli
Display memory information for the fpcli process on the switch.
isakmpd
Display memory information for the isakmpd process on the switch.
l2tpd
Display memory information for the l2tpd process on the switch.
mobileip
Display memory information for the mobileip process on the switch.
ospf
Display memory information for the ospf process on the switch.
pim
Display memory information for the pim process on the switch.
pptpd
Display memory information for the pptpd process on the switch.
profmgr
Display memory information for the profmgr process on the switch.
AOS-W 6.2 | Reference Guide
show memory | 1169
Parameter slb apsnmpd stm udbserver wms
Description Display memory information for the slb process on the switch. Display memory information for the apsnmpd process on the switch. Display memory information for the auth process on the switch. Display memory information for the udbserver process on the switch. Display memory information for the wms process on the switch.
Usage Guidelines
Include the name of a process to show memory information for that process. Use this command under the supervision of Alcatel-Lucent technical support to help debug process errors.
Example
The command show memory displays, in Kilobytes, the total memory on the switch, the amount of memory currently being used, and the amount of free memory. (host) # show memory Memory (Kb): total: 256128, used: 162757, free: 93371
Include the name of a process to show memory statistics for that process. The example below shows memory statistics for mobileip.
(host) # show memory mobileip
Type
Num Allocs
default
92
Size Allocs
Total Allocs 145622
0x1000be14 0x10016cb0 0x10021604 0x10032e34 0x30019a24 0x30019bd8 0x30019bf0 0x30019c28 0x3001b134 0x300326b8 0x30032738 0x3019dfdc 0x3019ee60 0x3019ef18 0x301b63bc 0x301b6470 0x301b648c 0x301b7614 0x301b7770 0x301bd460
PC
1
64
1
41000
1
80
1
24
1
2200
1
41000
1
41000
1
11263
2
1967
9
72
4
64
1
44
3
48
1
784
13
312
10
200
10
920
3
36
8
128
3
60
Total Size
The output of this command includes the following columns:
1170 | show memory
AOS-W 6.2 | Reference Guide
Column Type
Num Alloc Size Allocs Total Allocs Total Size PC Allocs Size
Description The show memory command currently shows information for predefined processes only, so this column always displays the parameter default. Current number of memory allocations. Total size of all memory allocations, in bytes. Maximum number of allocations used throughout in the life of the process. Maximum size of allocations used throughout in the life of the process, in bytes. Program counter: the address of a memory allocation. (For internal use only.) Number of memory allocations at that program counter. (For internal use only.) Size of all memory allocations at that program counter. (For internal use only.)
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show memory | 1171
show mgmt-role
show mgmt-role
Description
This command allows the user to view a list of management role configurations.
Syntax
No parameters.
Example
Issue this command to display a list of management user roles.
Management User Roles
---------------------
ROLE
DESCRIPTION
----
-----------
root
Super user role
read-only
Read only commands
network-operations network-operations
guest-provisioning guest-provisioning
location-api-mgmt location-api-mgmt
no-access
Default role, no commands are accessible for this role
location-api-mgmt location-api-mgmt
The output includes the following parameters:
Parameter ROLE DESCRIPTION
Description Name of the management user role Description of the management user role
Command History
This command was introduced in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable or config mode on master switches
1172 | show mgmt-role
AOS-W 6.2 | Reference Guide
show mgmt-users
show mgmt-users [ <username> | local-authentication-mode <username> | ssh-pubkey <username> | webui-cacert <username> ]
Description
Displays list of management users on the switch and also details of each management users.
Syntax
Parameter username local-authentication-mode ssh-pubkey webui-cacert
Description To view details of a specific management user. Status of local-authentication mode. Number of management users using the ssh-pubkey. Number of management users using web CA certificates.
Example
The output of this command shows the client certificate name, username, user role, and revocation checkpoint for management users using the ssh-pubkey in the switch. (host) #show mgmt-user ssh-pubkey
SSH Public Key Management User Table -----------------------------------CLIENT-CERT USER ROLE STATUS ----------- ---- ---- ------ --------------------client1-rg test1 root ACTIVE client2-rg test2 root ACTIVE client3-rg test3 root ACTIVE client1-rg test4 root ACTIVE
Command History
Release AOS-W 3.3.2
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show mgmt-users | 1173
show tunneled-node config
show tunneled-node config
Description
Displays wired tunneled node configuration details.
Syntax
No parameters.
Example
The output of this command shows the tunneled node configuration details. (host) # show tunneled-node config
Tunneled Node:Enabled Tunneled Node Server:4.4.4.1 Tunnel Loop Prevention:Disabled Tunnel Node MTU:5000
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced The command name was changed to show tunneled-node config.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1174 | show tunneled-node config
AOS-W 6.2 | Reference Guide
show netdestination
show netdestination <netdestination name>
Description
Displays IPv4 and IPv6 network destination information.
Syntax
No parameters.
Example
Issue this command to display all netdestination configured on this switch. The output below displays information for all configured IPv4 and IPv6 netdestinations. To display additional detailed information for an individual netdestinations, include the name of the netdestination at the end of the command.
(host) >enable
Password:******
(host) #show netdestination
Name: white-list
Position Type IP addr Mask-Len/Range
-------- ---- ------- --------------
Name: localnetwork
Position Type
IP addr Mask-Len/Range
-------- ----
------- --------------
1
network 0.0.0.2 0.0.0.0
The output includes the following parameters:
Parameter Name Position Type IP addr Mask/Range
Description Network destination name Network destination position Network destination type IP address of the network destination Network destination subnet mask and range
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing
Command Mode
You must have a PEFNG license to configure or view a netdestination.
Enable or config mode on master switches
AOS-W 6.2 | Reference Guide
show netdestination | 1175
show netexthdr
show netexthdr <alias-name>
Description
This command displays the IPv6 extension header (EH) types that are denied.
Syntax
Parameter
<aliasname>
Description Specify the EH alias name.
Default
default
Usage Guidelines
Example
The following command displays the denied extended header types in the default EH: (host) #show netexthdr default
Extended Header type(s) Denied -----------------------------51,
Command History
Release AOS-W 6.1
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on the master switches
1176 | show netexthdr
AOS-W 6.2 | Reference Guide
show netservice
show netservice [<string>]
Description
Show network services
Syntax
Parameter <string>
Description Name of a network service.
Usage guidelines
Issue this command without the optional <string> parameter to view a complete table of network services on the switch. Include the <string> parameter to display settings for a single network service only.
Example
The following example shows the protocol type, ports and application-level gateway (ALG) for the DHCP service.
(host) #show netservice svc-dhcp
Services
--------
Name
Protocol Ports ALG
----
-------- ----- ---
svc-dhcp udp
67
68
Related Commands
To configure an alias for network protocols, use the command netservice.
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show netservice | 1177
show netstat
show netstat [stats]
Description
Show current active network connections.
Syntax
Parameter <string>
Description Show network statistics, filtered by protocol type.
Usage guidelines
Issue this command without the optional stats parameter to view a complete table of active network connections. Include the stats parameter to display aggregate statistics for IP, ICMP, TCP and UDP protocols.
Example
The following example shows incoming and outgoing packet statistics for the switch.
(host) #show netstat stats Ip:
1084012095 total packets received 2 with invalid headers 3 forwarded 426940 incoming packets discarded 932097114 incoming packets delivered 1004595164 requests sent out 52847 fragments dropped after timeout 201323411 reassemblies required 50179757 packets reassembled ok 53204 packet reassembles failed 136827034 fragments created Icmp: 1969625 ICMP messages received 5 input ICMP message failed. ICMP input histogram:
destination unreachable: 1752058 timeout in transit: 1684 redirects: 70805 echo requests: 145073 echo replies: 5 249806 ICMP messages sent 0 ICMP messages failed ICMP output histogram: destination unreachable: 51944 time exceeded: 52796 redirect: 2 echo replies: 145064 Tcp: 3 active connections openings 0 passive connection openings 0 failed connection attempts 0 connection resets received 2 connections established 1006383 segments received
1178 | show netstat
AOS-W 6.2 | Reference Guide
1147229 segments send out 9603 segments retransmitted 0 bad segments received. 2568 resets sent Udp: 928478757 packets received 40767 packets to unknown port received. 426937 packet receive errors 910267627 packets sent
Related Commands
To configure an alias for network protocols, use the command netservice.
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show netstat | 1179
show network-printer
show network-printer [config | job <printer-name> | status]
Description
Displays configuration, job status details, and printer status of USB printers connected to a OAW-4306 Seriesswitch.
Syntax
Parameter config job status
Description Displays the configuration details of the printer service on the switch. Displays the list of job in queue in all printers connected to the switch. Displays the status of all printers connected to the switch.
Example
The output of this command shows the status of all printers connected to the switch. (host) #show network-printer status
Networked Printer Status -----------------------Printer Name -----------usblp_Hewlett-Packard_HP_Color_LaserJet_CP3505_CNBJ8B1003 usblp_HP_Officejet_Pro_L7500_MY872231FX
Printer Alias ------------HPLJ_P3005 HPOJ_L7500
Status -----idle idle
Comment ------enabled enabled
Command History
This command was available in AOS-W 3.4
Command Information
Platforms OAW-4306 Series switch
Licensing Base operating system
Command Mode Enable mode
1180 | show network-printer
AOS-W 6.2 | Reference Guide
show network-storage
show network-storage [ files opened | shares {<file-system-path> | disk | status | users {disk <disk-name>} ]
Description
Displays details about the USB storage device connect to a OAW-4306 Seriesswitch.
Syntax
Parameter files opened shares
status users
Description
Displays the list of opened files in the USB storage device connected to the switch.
Displays the list of shares that are created in the USB storage device. This option provides the following details: l name of the share l name of the disk by alias. l the folder associated with the share, l the access mode
Displays the status of the storage service on the switch.
Displays the list of users by IP address, connected share name and connection time.
Example
The output of this command shows the status of all printers connected to the switch. (host) #show network-storage users
NAS Users --------Share Name ---------Documents Documents
Machine -------
Connected at -----------192.168.1.4 Fri Apr 21 14:28:59 2009 192.168.1.5 Fri Apr 21 14:17:09 2009
Command History
This command was available in AOS-W 3.4
Command Information
Platforms OAW-4306 Series switch
Licensing Base operating system
Command Mode Enable mode
AOS-W 6.2 | Reference Guide
show network-storage | 1181
show ntp peer
show ntp peer <a.b.c.d>
Description
Show NTP peer information.
Syntax
Parameter <a.b.c.d>
Description IP address of an NTP peer
Usage guidelines
The show ntp peer command is used for NTP server troubleshooting, and should only be used under the supervision of Alcatel-Lucent technical support. Issue the show ntp servers command to view basic settings for currently configured NTP servers.
Related Commands
To configure an NTP server, use the command ntp server.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
1182 | show ntp peer
AOS-W 6.2 | Reference Guide
show ntp servers
show rft servers [brief]
Description
Show information for Network Time Protocol (NTP) servers.
Syntax
Parameter brief
Description Display the IP address of the defined NTP servers, iburst and key settings.
Examples
The following example shows values for the primary and backup NTP servers. The primary server is marked with an asterisk (*) and the backup server is marked with an equals sign (=). Note that a backup server will not display delay, offset or dispersion data, as it is not currently in use.
(host) #show ntp servers
remote
local
st poll reach delay offset disp
=======================================================================
=10.4.0.21
10.6.2.253
16 1024 0 0.00000 0.000000 0.00000
*10.1.1.250
10.6.2.253
2 1024 377 0.00081 -0.010376 0.03040
The output of this command includes the following parameters:
Parameter Description
remote
IP address of the remote NTP server defined using the cli command ntp server.
local
IP address of the local clock.
st
NTP uses hierarchical levels of clock sources, or strata, and assigns each layer a number
starting with zero at the root. The st column in the output of this command represents the
number of servers between the configured NTP server and the root reference clock.
poll
Interval, in seconds, between the local NTP server's attempt to poll the remote NTP server.
reach
An index that measures whether or not the remote NTP server could be reached at eight most recent polling intervals. If the NTP server has just been configured and hasn't yet been polled successfully, the value will be zero (0). A value of 377 indicates that the last eight poll queries were successful.
delay
Delay, in seconds, between the time that the local clock polls the NTP server and the NTP server returns a reply.
offset
The difference in time, in seconds, between the local clock and the NTP server.
disp
Dispersion represents the maximum error of the local clock relative to the reference clock, and is a measurement of the time server and network quality. Lower dispersion values are preferred over higher dispersion values.
AOS-W 6.2 | Reference Guide
show ntp servers | 1183
The following example shows the ntp servers configuration. The NTP server IP address, key ID and iburst status are shown when the ntp servers brief command is used. (host) (config) #show ntp servers brief server 1.1.1.1 key 1234 server 10.1.1.245 iburst key 12345
Related Commands
To configure an NTP server, use the command ntp server.
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced
The key-id parameter output displays when the ntp servers brief command is used.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
1184 | show ntp servers
AOS-W 6.2 | Reference Guide
show ntp status
show ntp status
Description
Show information for a NTP server.
Syntax
No parameters.
Example
The following example shows values for the primary NTP server. (host) #show ntp status
system uptime:
7594
time since reset:
7594
bad stratum in packet: 0
old version packets: 113
new version packets: 0
unknown version number: 0
bad packet format:
0
packets processed:
110
bad authentication:
0
packets rejected:
0
system peer:
10.1.1.250
system peer mode:
client
leap indicator:
00
stratum:
3
precision:
-18
root distance:
0.03236 s
root dispersion:
0.06728 s
reference ID:
[10.1.1.250]
reference time:
cd45b701.bcbc05d5 Tue, Feb 17 2009 14:21:53.737
system flags:
auth monitor ntp kernel stats
jitter:
0.005020 s
stability:
0.866 ppm
broadcastdelay:
0.003998 s
authdelay:
0.000000 s
The output of this command includes the following parameters:
Parameter system uptime
time since reset bad stratum in packet old version packets
new version packets
Description
The number of seconds the local NTP server has been associated with the switch.
The number of seconds since the last time the local NTP server was restarted.
The number of NTP packets with a corrupted stratum bit.
Number of packets that match the previous NTP version. A version number is in every NTP packet.
Number of packets that match the current NTP version.
AOS-W 6.2 | Reference Guide
show ntp status | 1185
Parameter unknown version number bad packet format packets processed bad authentication packets rejected system peer system peer mode
leap indicator
stratum precision root distance root dispersion
reference ID reference time system flags jitter stability broadcastdelay authdelay
Description
Number of packets with an unknown NTP version.
Number of NTP packets dropped due to an invalid packet format.
Number of NTP packets received and processed by the switch.
Number of NTP packets that failed to be authenticated.
Number of NTP packets rejected because they had an invalid format.
The IP address of the peer NTP server.
The peer mode of this remote association: l Symmetric Active l Symmetric Passive l Client l Server l Broadcast
This parameter indicates whether or not a leap-second should be inserted or removed at the end of the last day of the current month. l 00 no warning l 01 +1 second (following minute has 61 seconds) l 10 -1 second (following minute has 59 seconds)
The stratum level of the peer
The advertised precision of the switch. This value can range from -4 and -20, inclusive.
Total round trip delay to the stratum 1 reference clock.
Total dispersion to the stratum 1 reference clock. This value is a cumulative measure of all errors associated with the network hops and servers between the NTP server and its stratum 1 server.
IP address of the remote NTP server
Time when the local system clock was last set or corrected, in NTP timestamp format.
This parameter displays any flags configured for this NTP entity.
The average magnitude of jitter between several time queries.
The average magnitude of offset between several time queries
The broadcast delay of this NTP server association, in seconds.
The authentication delay of this NTP server association, in seconds.
Related Commands
To configure an NTP server, use the command ntp server.
Command History
This command was available in AOS-W 3.0.
1186 | show ntp status
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show ntp status | 1187
show packet-capture
show packet-capture
Description
Displays packet capture status on the switch.
Syntax
No parameters.
Example
The output of this command shows the packet capture configuration details. (host) # show packet-capture
Current Active Packet Capture Actions(current switch) ===================================================== Packet filtering TCP with 1 port(s) enabled:
2 Packet filtering UDP with 1 port(s) enabled:
5 Packet filtering for internal messaging opcodes disabled. Packet filtering for all other packets enabled.
Packet Capture Defaults(across switches and reboots if saved) ============================================================ Packet filtering TCP with 1 port(s) enabled:
2 Packet filtering UDP with 1 port(s) enabled:
5 Packet filtering for internal messaging opcodes disabled. Packet filtering for all other packets enabled.
Command History
This command was available in AOS-W 3.3.2
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1188 | show packet-capture
AOS-W 6.2 | Reference Guide
show packet-capture-defaults
show packet-capture-defaults
Description
Displays the status of default packet capture options.
Syntax
No parameters.
Example
The output of this command shows packet capture status. (host) # show packet-capture-defaults
Current Active Packet Capture Actions(current switch) ===================================================== Packet filtering for TCP ports disabled. Packet filtering for UDP ports disabled. Packet filtering for internal messaging opcodes disabled. Packet filtering for all other packets disabled.
Packet Capture Defaults(across switches and reboots if saved) ============================================================ Packet filtering for TCP ports disabled. Packet filtering for UDP ports disabled. Packet filtering for internal messaging opcodes disabled. Packet filtering for all other packets disabled.
Command History
This command was available in AOS-W 3.3.2
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show packet-capture-defaults | 1189
show papi-security (deprecated)
show papi-security
Description
This command shows a configured papi-security profile.
Syntax
Parameter PAPI Key
Enhanced security mode
Description
The key string. The key authenticates the messages between systems.
Indicates if the enhanced security mode is enabled or disabled. This mode causes the system to reject messages when an incorrect key is used.
Range
Default
Range: 1064 -- characters
--
disabled
Usage Guidelines
Issue this command to show the selected papi-security profile configuration. The papi-security command is used to enforce advanced security options and provides an enhanced level of security.
The Parameter column displays the PAPI Key and Enhanced security mode parameters. The Value column displays a Papi key value (encrypted) and indicates whether the Enhanced security mode is enabled or disabled. If an AP cannot be authenticated because it has the wrong key, the show ap database command displays a "Bad key" status.
(host) #show papi-security
PAPI Security Profile --------------------Parameter --------PAPI Key Enhanced security mode
Value ----******** Enabled
Related Commands
Use the command papi-security (deprecated) to configure a papi-security profile.
Command History
AOS-W 3.4 AOS-W 6.2
Modification Command introduced. Command deprecated
1190 | show papi-security (deprecated)
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master or local switches
AOS-W 6.2 | Reference Guide
show papi-security (deprecated) | 1191
show phonehome
show phonehome global history report-status stats
Description
Use this command to view current configuration settings and debugging statistics for the phonehome automatic reporting feature.
Syntax
Parameter global history report-status status
Description
Show whether the phonehome service and auto-reporting is enabled or disabled, and display current SMTP settings for this feature.
Issue this command under the guidance of Alcatel-Lucent support troubleshoot phonehome automatic reporting.
Issue this command under the guidance of Alcatel-Lucent support troubleshoot phonehome automatic reporting.
Include this parameter to show the number of reports successfully sent to the SMTP server, the number of times the switch attempted to retry sending a report to the SMTP server and the number of reports that failed to reach the SMTP server after one or more retry attempts, and
Usage Guidelines
The automatic reporting feature, also known as PhoneHome, allows a switch to securely contact Alcatel-Lucent support servers over the Internet to report events such as hardware failures, software malfunctions, and other critical events. When the PhoneHome automatic reporting feature is enabled, the switch sends Alcatel-Lucent support weekly reports about the switch's configuration, licenses, software and hardware versions, and any software malfunctions via a secure email.
This feature requires that your network has a local SMTP server capable of relaying email. When the switch generates the report email with the phonehome data file attachment, it forwards the email to the SMTP server configured on your local network, which then delivers the message to Alcatel-Lucent. If your email server requires the sender to be authenticated before message delivery, the switch can connect to the SMTP by supplying the sender's user name and password.
Each PhoneHome report attachment is encrypted before it is transmitted to the SMTP server, and is decrypted by Alcatel-Lucent support when it is received. If the PhoneHome status report email is larger than the maximum email size supported by your SMTP server, the switch will divide the PhoneHome attachment into multiple smaller attachments and send the report to Alcatel-Lucent in multiple emails.
In the event that you need to contact Alcatel-Lucent support with a question about your switch, you can use the phonehome now command in enable mode to generate and immediately send a status report, so that AlcatelLucent support can diagnose the issue with the most current switch data.
1192 | show phonehome
AOS-W 6.2 | Reference Guide
Example
The following command turns on the PhoneHome feature, enables weekly auto-reports, and identifies the SMTP server to be used by this feature:
(host) #show phonehome global
PhoneHome information:
PhoneHome Service:
Disabled
PhoneHome Auto-Report: Disabled
Local SMTP server:
172.21.18.170:25
SMTP From Email:
admin@mycorp.com
Max Attachment Size: 10 MB
Command History
This command was introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches.
AOS-W 6.2 | Reference Guide
show phonehome | 1193
show poe
show poe [slot/port]
Description
Displays the PoE status of all or a specific port on the switch.
Syntax
No parameters.
Example
The output of this command shows the PoE status of port 10 in slot 1. (host) # show poe 1/10
PoE Status
----------
Port
Status
----
------
FE 1/10 Off
Voltage(mV) ----------N/A
Current(mA) ----------N/A
Power (mW) ---------N/A
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1194 | show poe
AOS-W 6.2 | Reference Guide
show policer-profile (deprecated)
show policer-profile <profile-name>
Description
Displays the policer profile configuration.
Command History
This command was deprecated in AOS-W 6.2.
AOS-W 6.2 | Reference Guide
show policer-profile (deprecated) | 1195
show port link-event
show port link-event
Description
Displays the link status on each of the port on the switch.
Syntax
No parameters.
Example
The output of this command shows the link status on all ports in the switch. (host) # show port link-event
Slot/Port ---------
2/ 0 2/ 2 2/ 4 2/ 6 2/ 8 2 / 10 2 / 12 2 / 14 2 / 16 2 / 18 2 / 20 2 / 22 2 / 24 3/ 0 3/ 2 3/ 4 3/ 6 3/ 8 3 / 10 3 / 12 3 / 14 3 / 16 3 / 18 3 / 20 3 / 22 3 / 24
UP -0 0 0 0 0 10 1 1 5 1 0 2 0 24 0 1 0 94 0 49751 2589 2 8245 74 1 0
DOWN ---0 0 0 0 0 9 0 0 4 0 0 2 0 23 0 0 0 94 0
49750 2588 1 8244 73 0 0
Slot/Port ---------
2/ 1 2/ 3 2/ 5 2/ 7 2/ 9 2 / 11 2 / 13 2 / 15 2 / 17 2 / 19 2 / 21 2 / 23 2 / 25 3/ 1 3/ 3 3/ 5 3/ 7 3/ 9 3 / 11 3 / 13 3 / 15 3 / 17 3 / 19 3 / 21 3 / 23 3 / 25
UP -0 1 0 1 0 2 0 6 9 5 4 9 0 0 0 1 0 0 5886 50 228 2423 5098 2 0 0
DOWN ---0 1 0 1 0 1 0 5 8 4 4 9 0 0 0 0 0 0 5886 49 227 2423 5098 2 0 0
Command History
This command was available in AOS-W 3.3.2
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1196 | show port link-event
AOS-W 6.2 | Reference Guide
show port monitor
show port monitor
Description
Displays the list of ports that are configured to be monitored.
Syntax
No parameters.
Example
The output of this command shows the link status on all ports in the switch. (host) # show port monitor
Monitor Port Port being Monitored
------------ --------------------
FE 1/10
FE 1/20
Command History
This command was available in AOS-W 3.3.2
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show port monitor | 1197
1198 | show port monitor
AOS-W 6.2 | Reference Guide
show port stats
show port status
Description
Displays the activity statistics on each of the port on the switch.
Syntax
No parameters.
Example
The output of this command shows the link status on all ports in the switch. (host) # show port stats
Port Statistics
---------------
Port
PacketsIn
CRCErrors
----
---------
----
FE1/4 0
FE1/5 0
FE1/6 0
FE1/7 0
FE1/8 0
FE1/9 0
FE1/10 0
FE1/11 0
FE1/12 0
FE1/13 0
FE1/14 0
FE1/15 0
FE1/16 2937495
FE1/17 0
FE1/18 591066
FE1/19 0
FE1/20 1205264
FE1/21 0
FE1/22 0
...
PacketsOut
----------
0 0 0 0 0 0 2041530 0 0 0 3 0 1861880 0 1220117 0 836266 0 0
BytesIn
-------
0 0 0 0 0 0 0 0 0 0 0 0 582814945 0 67049881 0 211330696 0 0
BytesOut
--------
0 0 0 0 0 0 296644355 0 0 0 138 0 244607030 0 143261677 0 85313659 0 0
InputErrorBytes
---------------
0 0 0 0 0 0 0 0 0 0 0 0 32 0 0 0 80 0 0
OutputErrorBytes
----------------
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
-----
0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 5 0 0
Command History
This command was available in AOS-W 3.3.2
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show port stats | 1199
show port status
show port status
Description
Displays the status of all ports on the switch.
Syntax
No parameters.
Example
The output of this command shows the status of all ports in the switch. (host) # show port status
Port Status
-----------
Slot-Port PortType
--------- --------
1/0
FE
1/1
FE
1/2
FE
1/3
FE
1/4
FE
1/5
FE
1/6
FE
1/7
FE
1/8
FE
1/9
FE
1/10
FE
1/11
FE
1/12
FE
1/13
FE
1/14
FE
1/15
FE
1/16
FE
...
adminstate ---------Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled
operstate --------Up Down Down Down Down Down Down Down Down Down Down Down Down Down Down Down Up
poe --Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled
Trusted ------Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
SpanningTree -----------Forwarding Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Forwarding
PortMode -------Access Access Access Access Access Access Access Access Access Access Access Access Access Access Access Access Access
Command History
This command was available in AOS-W 3.3.2
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1200 | show port status
AOS-W 6.2 | Reference Guide
show port trusted
show port trusted
Description
Displays the list of ports configured with trusted profiles.
Syntax
No parameters.
Example
The output of this command shows the list of ports with trusted profile. (host) # show port trusted
FE 1/0 FE 1/1 FE 1/2 FE 1/3 FE 1/4 FE 1/5 FE 1/6 FE 1/7 FE 1/8 FE 1/9 FE 1/10 FE 1/11 FE 1/12 FE 1/13 FE 1/14 FE 1/15 FE 1/16 FE 1/17 FE 1/18 FE 1/19 FE 1/20 FE 1/21 FE 1/22 FE 1/23 GE 1/24 GE 1/25
Command History
This command was available in AOS-W 3.3.2
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show port trusted | 1201
show port xsec
show port xsec
Description
Displays the list of xSec enabled ports.
Syntax
No parameters.
Example
The output of this command shows the list of xSec enabled ports. (host) #show port xsec
Xsec Ports ---------Interface xsec vlan state --------- --------- -----
Command History
This command was available in AOS-W 3.3.2
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1202 | show port xsec
AOS-W 6.2 | Reference Guide
show priority-map
show priority-map
Description
Displays the list of priority maps on a interface.
Syntax
No parameters.
Example
The output of this command shows the priority maps configured on all interfaces. (host) # show priority-map
Priority Map ------------ID Name DSCP-TOS -- ---- -------1 my-map 4-20,60
DOT1P-COS ---------
4-7
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show priority-map | 1203
show processes
show processes [sort-by {cpu | memory}]
Description
Displays the list of all process running on the switch. You can sort the list either by CPU intensive or memory intensive processes.
Syntax
Parameter sort-by
cpu memory
Description Add a sort filter to the output This will sort output based on CPU usage. This will sort output based on memory usage.
Example
The output of this command shows list of processes sorted by CPU usage. (host) # show priority-map
%CPU S PID PPID VSZ RSS F NI START
TIME
EIP CMD
3.7 S 595 517 20908 12184 040 0 Apr24 03:39:04 303a4fa8 /mswitch/bin/fpapps
0.2 S 12354 410 1028 296 000 0 02:13 00:00:00 30087fa8 sleep 10
0.1 S 536 441 12012 7264 040 0 Apr24 00:09:08 100e4a74 /mswitch/mysql/libexec/mysqld --
basedir=/mswitch/mysql --datadir=/var/
0.0 S
2
1
0 0 040 0 Apr24 00:00:00 00000000 [keventd]
0.0 S
4
0
0 0 040 0 Apr24 00:00:00 00000000 [kswapd]
0.0 S
6
0
0 0 040 0 Apr24 00:00:00 00000000 [kupdated]
0.0 S 57
1
0 0 040 0 Apr24 00:00:00 00000000 [kjournald]
0.0 S 67
1 1036 424 000 0 Apr24 00:00:00 30087fa8 /bin/sh /mswitch/bin/syslogd_
start
0.0 S
1
0 1028 384 100 0 Apr24 00:00:12 30087fa8 init
0.0 S 397
1 1732 804 100 0 Apr24 00:00:00 30152fa8 /mswitch/bin/nanny
/mswitch/bin/nanny_list 0
0.0 S 399 397 14140 10172 100 0 Apr24 00:00:16 303c8fa8 /mswitch/bin/arci-cli-helper
0.0 S 402
1 768 268 040 0 Apr24 00:00:00 30060fa8 /sbin/tftpd -s -l -u nobody
/mswitch/sap
0.0 S 69 67 1404 752 100 0 Apr24 00:01:27 300d3fa8 /mswitch/bin/syslogd -x -r -n -m
0 -f /mswitch/conf/syslog.conf
0.0 S 407 397 3100 1028 100 0 Apr24 00:00:00 302a0fa8 /mswitch/bin/packet_filter
0.0 S 408 397 4296 1340 100 0 Apr24 00:00:00 30339fa8 /mswitch/bin/certmgr
0.0 R
3
0
0 0 040 19 Apr24 00:00:01 00000000 [ksoftirqd_CPU0]
0.0 S 453 397 700 284 000 0 Apr24 00:01:20 30087fa8 /mswitch/bin/msgHandler -g
0.0 S 468 397 1236 492 100 0 Apr24 00:00:00 300f8fa8 /mswitch/bin/pubsub
0.0 S 484 397 18456 14064 100 0 Apr24 00:00:19 303c8fa8 /mswitch/bin/cfgm
Command History
This command was available in AOS-W 3.0
1204 | show processes
AOS-W 6.2 | Reference Guide
Command Information
Platformss All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show processes | 1205
show profile-errors
show profile-errors
Description
Displays the list of invalid user-created profiles.
Syntax
No parameters.
Example
The output of this command shows list of profiles that are invalid and also displays the error in those profiles. In this
example, the VLAN 1000 that is mapped to a virtual-ap that does not exist. (host) #show profile-errors
Invalid Profiles ---------------Profile -------
Error -----
wlan virtual-ap "test-vap" VLAN 1000 does not exist
The following are the list of some profile errors:
Error Named VLAN [named_VLAN] is removed
Named VLAN [named_VLAN] is not mapped
Description
These errors are displayed if a virtual AP profile is configure with a VLAN that does not exist.
Named VLAN [named_VLAN] is invalid
VLAN [x] does not exist
Server group is invalid
User derivation rule is invalid User role is invalid
This error is displayed if an AAA profile is configured an invalid server group.
This error is displayed if a user role in an AAA profile is invalid.
Switch country code is undefined
Country [country_name] does not match switch country [country_name]
These errors are displayed, if your switch is not set to the correct country code or if the country code specified in a WLAN profile does not match the switch's country code.
Opmode requires WPA key
This message is displayed if a SSID profile is configured without a WPA key.
WARNING: if weptxkey = [x], wepkey[x] must be set in order to use static WEP
This message is displayed if a SSID profile is configured to use a static WEP and the WEP is not configured.
Command History
This command was available in AOS-W 3.0
1206 | show profile-errors
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show profile-errors | 1207
show profile-hierarchy
show profile-hierarchy
Description
Displays the profile hierarchy template.
Syntax
No parameters.
Usage Guidelines
The output of this command shows how profiles relate to each other, and how some higher-level profiles reference other lower-level profiles. The output of this command will vary, depending upon switch configuration and licenses.
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1208 | show profile-hierarchy
AOS-W 6.2 | Reference Guide
show profile-list aaa
show profile-list aaa [{authentication [captive-portal | dot1x | mac | stateful-ntlm | wispr]} |{authentication-server [ldap | radius | tacacs | windows]} | {profile} | {rfc-3576-server} | {server-group} | {xml-api}]
Description
Displays the list of AAA profiles.
Syntax
Parameter authentication
captive-portal dot1x mac stateful-ntlm wispr authentication-server ldap radius tacacs windows profile rfc-3576-server
server-group xml-api
Description List of aaa authentication profiles. Captive portal authentication profiles. 802.1X authentication profiles. MAC authentication profiles. Stateful-NTLM authentication profiles. WISPr authentication profiles. List of aaa authentication servers List of servers using LDAP for AAA authentication. List of servers using RADIUS for AAA authentication. List of servers using TACACS+ for AAA authentication. List of Windows servers used for AAA authentication. Displays the AAA profile details. Displays IP address of RADIUS servers that use RFC 3576 specification to exchange authorization messages. List of server group used for RADIUS accounting. List of servers configured in an external XML API server.
Example
The output of this command shows list of AAA profiles that use captive-portal authentication. (host) # show profile-list aaa authentication captive-portal
Captive Portal Authentication Profile List
------------------------------------------
Name
References Profile Status
----
---------- --------------
default 1
AOS-W 6.2 | Reference Guide
show profile-list aaa | 1209
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1210 | show profile-list aaa
AOS-W 6.2 | Reference Guide
show profile-list ap
show profile-list ap [ enet-link-profile | mesh-cluster-profile | mesh-ht-ssid-profile | mesh-radio-profile | regulatory-domain-profile | snmp-profile | snmp-user-profile | system-profile | wired-ap-profile ]
Description
Displays the list of AP profiles.
Syntax
Parameter enet-link-profile mesh-cluster-profile mesh-ht-ssid-profile
mesh-radio-profile regulatory-domain-profile snmp-profile snmp-user-profile system-profile wired-ap-profile
Description Display a list of AP Ethernet link profiles. Display a list of mesh cluster profiles used by mesh nodes. Display a list of mesh high-throughput SSID profiles used by mesh nodes. Display a list of mesh radio profiles used by mesh nodes. Display a list of AP regulatory profiles. Display a list of SNMP profiles. Display a list of SNMPv3 user profiles. Display a list of AP system profiles. Display a list of wired AP profiles.
Example
The output of this command shows list of profiles that are invalid and also displays the error in those profiles. (host) # show profile-list aaa authentication captive-portal
Captive Portal Authentication Profile List
------------------------------------------
Name
References Profile Status
----
---------- --------------
default 1
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show profile-list ap | 1211
show profile-list ap-group
show profile-list ap-group
Description
Displays the status of AP groups profiles in the switch.
Syntax
No parameters.
Example
The output of this command shows the status of AP group profiles in the switch. (host) # show profile-list ap-group
AP group List
-------------
Name
Profile Status
----
--------------
default
Total:1
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1212 | show profile-list ap-group
AOS-W 6.2 | Reference Guide
show profile-list ap-name
show profile-list ap-name
Description
Displays the status of AP profiles in the switch.
Syntax
No parameters.
Example
The output of this command shows status of AP profiles in the switch. (host) # show profile-list ap-name
AP name List -----------Name Profile Status ---- --------------
Total:0
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show profile-list ap-name | 1213
show profile-list ids
show profile-list ids [dos-profile | general-profile | impersonation-profile | profile | rate-thresholds-profile | signature-matching-profile | signature-profile | unauthorized-device-profile ]
Description
Displays the status of all IDS profiles in the switch.
Syntax
Parameter dos-profile general-profile impersonation-profile profile rate-thresholds-profile signature-matching-profile signature-profile unauthorized-device-profile
Description Display a list of IDS DoS profiles. Display a list of IDS generate profiles. Display a list IDS impersonation profile. Display a list of IDS profiles. Display a list of IDS rate threshold profiles. Display a list of IDS signature-matching profiles. Display a list of IDS signature profiles. Display a list of IDS unauthorized device profiles.
Example
The output of this command shows a list of all IDS DoS profiles. (host) # show profile-list ids dos-profile
IDS Denial Of Service Profile List
----------------------------------
Name
References
----
----------
default
1
ids-dos-disabled
1
ids-dos-high-setting 1
ids-dos-low-setting
1
ids-dos-medium-setting 1
Profile Status --------------
Predefined Predefined Predefined Predefined
Total:5
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1214 | show profile-list ids
AOS-W 6.2 | Reference Guide
show profile-list rf
show profile-list rf [ arm-profile | dot11a-radio-profile | dot11g-radio-profile | event-thresholds-profile | ht-radio-profile | optimization-profile ]
Description
Displays the status of all radio profiles.
Syntax
Parameter arm-profile dot11a-radio-profile
dot11g-radio-profile
event-thresholds-profile ht-radio-profile optimization-profile
Description Details of Adaptive Radio Management (ARM) Profile.
Details of AP radio settings for the 5GHz frequency band, including the ARM profile and the high-throughput (802.11n) radio profile.
Details of AP radio settings for the 2.4 GHz frequency band, including the ARM profile and the high-throughput (802.11n) radio profile.
Details of events thresholds profile.
Details of high-throughput AP radio settings
Details of the RF optimization profile
Example
The output of this command shows status of ARM profile. (host) # show profile-list rf arm-profile
Adaptive Radio Management (ARM) profile List
--------------------------------------------
Name
References Profile Status
----
---------- --------------
default 2
Total:1
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show profile-list rf | 1215
show profile-list wlan
show profile-list wlan [ dotllk-profile | edca-parameters-profile | ht-ssid-profile | ssid-profile | traffic-management-profile | virtual-ap | voip-cac-profile | wmm-trafficmanagement-profile]
Description
Displays the status of WLAN profiles on the switch.
Syntax
Parameter dot11k-profile edca-parameters-profile
ht-ssid-profile traffic-management-profile virtual-ap voip-cac-profile
wmm-traffic-managementprofile
Description Show a list of all 802.11K Profiles Show a list of all enhanced distributed channel access (EDCA) profile for APs or for clients (stations) Show a list of all high-throughput SSID profile.s Show a list of all traffic management profiles. Show a list of all the virtual AP profiles. Show a list of all voice over IP (VoIP) call admission control (CAC) profiles Show a list of all WMM traffic management profiles.
Example
The output of this command shows that the switch has a single ARM profile, "default". (host) # show profile-list rf arm-profile
Adaptive Radio Management (ARM) profile List
--------------------------------------------
Name
References Profile Status
----
---------- --------------
default 2
Total:1
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1216 | show profile-list wlan
AOS-W 6.2 | Reference Guide
show provisioning-ap-list
show provisioning-ap-list
Description
Displays the list of all APs that are in queue to be provisioned by the admin.
Syntax
No parameters.
Command History
This command was available in AOS-W 3.4
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show provisioning-ap-list | 1217
show provisioning-params
show provisioning-params
Description
Displays the list of parameters and the values used to provision the APs.
Syntax
No parameters.
Example
The output of this command shows list of all provisioning parameters and their values.
(host) # show provisioning-params
AP provisioning
---------------
Parameter
Value
---------
-----
AP Name
N/A
AP Group
default
Location name
N/A
SNMP sysLocation
N/A
Master
N/A
Gateway
N/A
Netmask
N/A
IP Addr
N/A
DNS IP
N/A
Domain Name
N/A
Server Name
N/A
Server IP
N/A
Antenna gain for 802.11a
N/A
Antenna gain for 802.11g
N/A
Use external antenna
No
Antenna for 802.11a
both
Antenna for 802.11g
both
IKE PSK
N/A
PAP User Name
N/A
PAP Password
N/A
PPPOE User Name
N/A
PPPOE Password
N/A
PPPOE Service Name
N/A
PPPOE CHAP Secret
N/A
USB User Name
N/A
USB Password
N/A
USB Device Type
any
USB Device Identifier
N/A
USB Dial String
N/A
USB Initialization String
N/A
USB TTY device path
N/A
Mesh Role
none
Installation
default
Latitude
N/A
Longitude
N/A
Altitude
N/A
Antenna bearing for 802.11a
N/A
Antenna bearing for 802.11g
N/A
Antenna tilt angle for 802.11a N/A
Antenna tilt angle for 802.11g N/A
1218 | show provisioning-params
AOS-W 6.2 | Reference Guide
Mesh SAE
sae-default
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show provisioning-params | 1219
show qos-profile (deprecated)
show qos-profile <profile-name>
Description
Displays the QoS profile configuration.
Command History
This command was deprecated in AOS-W 6.2.
1220 | show qos-profile (deprecated)
AOS-W 6.2 | Reference Guide
show rap-wml
show rap-wml [cache <server-name> | server | wired-mac <bssid-of-AP>]
Description
Displays the name and attributes of a MySQL database or a MySQL server.
Syntax
Parameter cache servers wired-mac
Description Displays the cache of all lookups for a database server. Displays the database server state. Displays the wired MAC discovered on traffic through the AP.
Example
The output of this command shows status of all database servers. (host) # #show rap-wml servers
WML DB Servers
--------------
name ip type user password db-name cache ageout(sec) in-service
---- -- ---- ---- -------- ------- ----- ----------- ----------
WML DB Tables
-------------
server db table column timestamp-column lookup-time(sec) delimiter
------ -- ----- ------ ---------------- ---------------- ---------
Mesh SAE
sae-default
query-count -----------
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show rap-wml | 1221
show references aaa authentication
crypto-local show references aaa authentication {captive-portal <profile-name>}|{dot1x <profile-name>}|{mac <profile-name>}|mgmt|stateful-dot1x|{stateful-ntlm <profile-name>}|vpn|wired|{wispr {profilename>} [page <number>] [start <number>]
Description
Show AAA profile references.
Syntax
Parameter captive-portal <profile-name> dot1x <profile-name> mac <profile-name> mgmt <profile-name>
stateful-dot1x
stateful-ntlm <profile-name>
vpn wired wired wispr <profile-name>
page <number>
start <number>
Description
Show the number of references to a captive-portal profile.
Show the number of references to a 802.1X authentication profile.
Show the number of references to a MAC authentication profile.
Show the number of references to a management authentication profile.
Show the number of references to the stateful 802.1X authentication profile.
Show the number of references to the specified stateful NTLM authentication profile.
Show the number of references to VPN authentication.
Show the number of references to wired authentication.
Show the number of references to a wispr authentication.
Show the number of references to the specified WISPr authentication profile.
Include this optional parameter to limit output of this command to the specified number of items.
Include this optional parameter to start displaying the output of this command at the specified index number.
Example
Use this command to show where a specified AAA profile has been applied. The output of the example shown below indicates that the aaa profile default-dot1x contains a single reference to the 802.1X authentication profile default. (host) #show references aaa authentication dot1x default
References to 802.1X Authentication Profile "default"
-----------------------------------------------------
Referrer
Count
--------
-----
aaa profile "default-dot1x" authentication-dot1x 1
Total References:1
1222 | show references aaa authentication
AOS-W 6.2 | Reference Guide
Command History
Version AOS-W 3.0 AOS-W 3.4.1
Modification Command introduced The stateful-ntlm and wispr parameters were introduced.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show references aaa authentication | 1223
show references aaa authentication-server
crypto-local show references aaa authentication-server {ldap <ldap-server-name>}|{radius <radius-servername>}|{tacacs <tacacs-server-name>} [page <number>] [start <number>]
Description
Display information about AAA authentication servers.
Syntax
Parameter ldap <ldap-server-name> radius <radius-server-name> tacacs <radius-server-name> page <number> start <number>
Description
Show the number of server groups that include references to the specified LDAP server.
Show the number of server groups that include references to the specified RADIUS server.
Show the number of server groups that include references to the specified TACACS server.
Include this optional parameter to limit output of this command to the specified number of items.
Include this optional parameter to start displaying the output of this command at the specified index number.
Example
Issue this command to show the AAA server groups that include references to the specified server. The example below shows that two server groups, default and rad, each include a single reference to the radius server rad01.
(host) #show references aaa authentication-server radius rad01
References to RADIUS Server "rad01" ----------------------------------Referrer -------aaa server-group "default" server_group aaa server-group "rad" server_group Total References:2
Count ----1 1
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
1224 | show references aaa authentication-server
AOS-W 6.2 | Reference Guide
show references aaa profile
crypto-local show references aaa profile <profile-name>
Description
Show references to an AAA Profile.
Syntax
Parameter profile <profile-name>
Description Name of an AAA profile for which you want to view references.
Example
Issue this command to show the wlan virtual AP profiles that include references to the specified AAA profile. The example below shows that seven different virtual AP profiles include a single reference to the AAA profile default.
(host) #References to AAA Profile "default"
-----------------------------------
Referrer
Count
--------
-----
wlan virtual-ap "1.0.0_corporateHQ-wpa2" aaa-profile 1
wlan virtual-ap "110.0.corporateHQ-wpa2" aaa-profile
1
wlan virtual-ap "default" aaa-profile
1
wlan virtual-ap "corporateHQ-vocera" aaa-profile
1
wlan virtual-ap "corporateHQ-voip-wpa2" aaa-profile 1
wlan virtual-ap "Test123" aaa-profile
1
wlan virtual-ap "branch12" aaa-profile
1
Total References:7
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show references aaa profile | 1225
show references aaa server-group
crypto-local show references aaa server-group <sg-name> [page] [start]}
Description
Show references to a server group.
Syntax
Parameter server-group <sg-name> page <number> start <number>
Description
Name of the server group for which you want to show references
Include this optional parameter to limit output of this command to the specified number of items.
Include this optional parameter to start displaying the output of this command at the specified index number.
Example
Issue this command to display a list of AAA profiles that include references to the specified server group. (host) #show references aaa server-group default
References to Server Group "default" -----------------------------------Referrer -------aaa profile "aircorp-office-ssid" mac-server-group aaa profile "amigopod-guest" mac-server-group aaa profile "default" mac-server-group aaa profile "default-airwave-office" mac-server-group aaa profile "defaultcorporate" mac-server-group aaa profile "defaultcorporate-no-okc" mac-server-group aaa profile "defaultcorporate-okc" mac-server-group aaa profile "default-dot1x" mac-server-group aaa profile "default-India" mac-server-group aaa profile "default-india-hotel" mac-server-group aaa profile "default-India-split" mac-server-group aaa profile "voip-psk" mac-server-group aaa profile "default-dot1x-psk" mac-server-group aaa profile "default-mac-auth" mac-server-group aaa profile "default-open" mac-server-group aaa profile "default-xml-api" mac-server-group Total References:16
Count ----1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1
Command History
This command was introduced in AOS-W 3.0.
1226 | show references aaa server-group
AOS-W 6.2 | Reference Guide
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show references aaa server-group | 1227
show references ap
crypto-local show references ap
enet-link-profile <profile-name> mesh-cluster-profile <profile-name> mesh-ht-ssid-profile <profile-name> mesh-radio-profile <profile-name> regulatory-domain-profile <profile-name> system-profile <profile-name> wired-ap-profile <profile-name> page <number> start <number>
Description
Show the number of references to a specific AP profile.
Syntax
Parameter enet-link-profile <profile-name>
mesh-cluster-profile <profilename> mesh-ht-ssid-profile <profilename> mesh-radio-profile <profile-name>
regulatory-domain-profile <profile-name> system-profile <profile-name> wired-ap-profile <profile-name>
page <number>
start <number>
Description
Show AP groups that include a references to this Ethernet link profile.
Show AP groups that include a references to this mesh cluster profile.
Show AP groups that include a references to this mesh highthroughput SSID profile.
Show AP groups that include a references to this mesh radio profile.
Show AP groups that include a references to this regulatory domain profile.
Show AP groups that include a references to this system profile.
Show AP groups that include a references to this wired AP profile.
Include this optional parameter to limit output of this command to the specified number of items.
Include this optional parameter to start displaying the output of this command at the specified index number.
Example
The example below shows that 10 different AP groups include links to the AP Ethernet link profile Default. These 10 AP groups reference the Default Ethernet link profile for both their Ethernet 0 and Ethernet 1 interfaces, for a total of 20 references altogether.
(host)#show references ap enet-link-profile default References to AP Ethernet Link profile "default"
1228 | show references ap
AOS-W 6.2 | Reference Guide
------------------------------------------------
Referrer
Count
--------
-----
ap-group "10.0.0" enet0-profile
1
ap-group "10.0.0" enet1-profile
1
ap-group "corp" enet0-profile
1
ap-group "corp" enet1-profile
1
ap-group "Corp_AM_Ch1" enet0-profile
1
ap-group "Corp_AM_Ch1" enet1-profile
1
ap-group "Corp_AM_Ch6" enet0-profile
1
ap-group "Corp_AM_Ch6" enet1-profile
1
ap-group "corpTest" enet0-profile
1
ap-group "corpTest" enet1-profile
1
ap-group "default" enet0-profile
1
ap-group "default" enet1-profile
1
ap-group "India_Local" enet0-profile
1
ap-group "India_Local" enet1-profile
1
ap-group "ops" enet0-profile
1
ap-group "ops" enet1-profile
1
ap-group "voip-test" enet0-profile
1
ap-group "voip-test" enet1-profile
1
ap-group "voip-test-nokia" enet0-profile 1
ap-group "voip-test-nokia" enet1-profile 1
Total References:20
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show references ap | 1229
show references guest-access-email
crypto-local show references guest-access-email [page <number>] [start <number>]
Description
Show references to the global guest access email profile.
Syntax
Parameter page <number>
start <number>
Description
Include this optional parameter to limit output of this command to the specified number of items.
Include this optional parameter to start displaying the output of this command at the specified index number.
Example
(host) #show references guest-access-email
References to Guest-access Email Profile ---------------------------------------Referrer Count -------- ----Total References:0
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
1230 | show references guest-access-email
AOS-W 6.2 | Reference Guide
show references ids
crypto-local show references ids
dos-profilegeneral-profile general-profile impersonation-profile profile rate-thresholds-profile signature-matching-profile signature-profile unauthorized-device-profile
Description
Displays IDS profile references.
Syntax
Parameter
Description
dos-profilegeneral-profile Show references to an IDS Denial Of Service Profile
general-profile
Show references to an IDS General Profile
impersonation-profile
profile
rate-thresholds-profile
Show references to an IDS Rate Thresholds Profile
signature-matching-profile Show references to an IDS Signature Matching Profile
signature-profile
Show references to an IDS Signature Profile
unauthorized-deviceprofile
Show references to an IDS Signature Profile
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show references ids | 1231
show references papi-security
crypto-local show references papi-security [page <number>] [start <number>]
Description
Show references to a PAPI security profile.
Syntax
Parameter page <number>
start <number>
Description
Include this optional parameter to limit output of this command to the specified number of items.
Include this optional parameter to start displaying the output of this command at the specified index number.
Example
(host) #show references papi-security
References to PAPI Security Profile ----------------------------------Referrer Count -------- ----Total References:0
Command History
This command was introduced in AOS-W 3.4.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
1232 | show references papi-security
AOS-W 6.2 | Reference Guide
show references rf
crypto-local show references rf
dot11a-radio-profile <profile-name> dot11g-radio-profile <profile-name> event-thresholds-prof <profile-name> ht-radio-profile <profile-name> optimization-profile <profile-name>
Description
Show RF profile references.
Syntax
Parameter dot11a-radio-profile dot11g-radio-profile event-thresholds-prof ht-radio-profile optimization-profile
Description Show references to a 802.11a radio profile Show references to a 802.11g radio profile Show references to an RF Event Thresholds Profile Show references to a High-throughput radio profile Show references to an RF Optimization Profile
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show references rf | 1233
show references user-role
crypto-local show references user-role <role_name>
Description
Show access rights for user role.
Syntax
Parameter <role_name>
Description The role name assigned to a user.
Example
(host) #show references user-role guest
References to User Role "guest" ------------------------------aaa profile "airwave-office-ssid" mac-default-role aaa profile "amigopod-guest" mac-default-role aaa profile "corp1344-voip" mac-default-role aaa profile "default" mac-default-role aaa profile "default-airwave-office" mac-default-role aaa profile "default-corp1344" mac-default-role aaa profile "default-corp1344-no-okc" mac-default-role aaa profile "default-corp1344-okc" mac-default-role aaa profile "default-dot1x" mac-default-role aaa profile "default-dot1x-psk" mac-default-role aaa profile "default-dot1x-psk" dot1x-default-role aaa profile "default-India" mac-default-role aaa profile "default-india-hotel" mac-default-role
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
1234 | show references user-role
AOS-W 6.2 | Reference Guide
show references web-server
crypto-local show references web-server [page <number>] [start <number>]
Description
Show the Web server configuration references.
Syntax
Parameter page <number>
start <number>
Description
Include this optional parameter to limit output of this command to the specified number of items.
Include this optional parameter to start displaying the output of this command at the specified index number.
Example
(host) #show references web-server
References to Web Server Configuration -------------------------------------Referrer Count -------- ----Total References:0
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show references web-server | 1235
show references wlan
crypto-local show references wlan
dot11k-profile <profile-name> edca-parameters-profile <profile-name> ht-ssid-profile <profile-name> ssid-profile <profile-name> traffic-management-pr <profile-name> virtual-ap <profile-name> voip-cac-profile <profile-name>
Description
Shows WLAN profile references.
Syntax
Parameter
Description
dot11k-profile <profile-name>
Shows references to a 802.11K profile.
edca-parameters-profile <profilename>
Shows references to an EDCA parameters profile.
ht-ssid-profile <profile-name>
Shows references to a high-throughput SSID profile.
ssid-profile <profile-name>
Shows references to an SSID management profile.
traffic-management-pr <profile-name> Shows references to a traffic management profile.
virtual-ap <profile-name>
Shows references to a virtual AP profile.
voip-cac-profile <profile-name>
Shows references to a VOIP Call Admission Control profile.
Example
(host) #show references web-server
References to Web Server Configuration -------------------------------------Referrer Count -------- ----Total References:0
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master and local switches
1236 | show references wlan
AOS-W 6.2 | Reference Guide
show rf am-scan-profile
show rf am-scan-profile [<profile-name>]
Description
Display the Air Monitor (AM) scanning profile list. Optionally display parameter and values of a specified Air Monitor profile.
Syntax
Parameter <profile-name>
Description Name of this instance of the profile.
Usage Guidelines
Enter the basic show command to view a list of profiles, the number of profiles and the profile status. For example: (host) #show rf am-scan-profile
AM Scanning profile List
------------------------
Name
References Profile Status
----
---------- --------------
default 9
north 0
Total:2
Example
In the example above, their are two profile names; default and north. The Reference column indicates the number of references to this profile name. The Profile Status column is blank unless the profile is predefined. Optionally, you can enter a profile name to view the parameters for that profile. For example: (host) #show rf am-scan-profile default
AM Scanning profile "default" ----------------------------Parameter --------Scan Mode Dwell time: Active channels Dwell time: Regulatory Domain channels Dwell time: non-Regulatory Domain channels Dwell time: Rare channels
Value ----all-reg-domain 500 250 200 100
The explanation of the display output is described in the table below.
Parameter Scan-mode
Description The scanning mode for the radio
AOS-W 6.2 | Reference Guide
show rf am-scan-profile | 1237
Parameter all-reg-domain rare reg-domain Dwell time: Active channels Dwell time: Regulatory Domain channels Dwell time: non-Regulatory Domain channels Dwell time: Rare channels
Description Scan channels in all regulatory domain Scan all channels (all regulatory domains and rare channels) Scan channels in the APs regulatory domain Dwell time (in ms) for channels where there is wireless activity Dwell time (in ms) for AP's Regulatory domain channels
Dwell time (in ms) for channels not in the APs regulatory domain
Dwell time (in ms) for rare channels
Command History
Release AOS-W 6.0
Modification Command introduced
Command Information
Platforms All Platforms
Licensing RFProtect
Command Mode Configuration Mode (config)
1238 | show rf am-scan-profile
AOS-W 6.2 | Reference Guide
show rf arm-profile
show rf arm-profile [<profile>]
Description
Show an Adaptive Radio Management (ARM) profile.
Syntax
Parameter <profile>
Description Name of an ARM profile.
Usage Guidelines
Issue this command without the <profile> parameter to display the entire ARM profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has five configured ARM profiles. The References column lists the number of other profiles with references to the ARM profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
(host) # show rf arm-profile
Adaptive Radio Management (ARM) profile List
--------------------------------------------
Name
References Profile Status
----
---------- --------------
airwave
2
default
4
default-AP85
2
no-scanning
1
Wireless-rf-profile
1
Total:5.
This example displays the configuration settings for the profile Wireless_rf_profile.
(host) #show rf arm-profile default Adaptive Radio Management (ARM) profile "Wireless_rf_profile"
-------------------------------------------------
Parameter
Value
---------
-----
Assignment
single-band
Allowed bands for 40MHz channels a-only
Client Aware
Enabled
Max Tx EIRP
127 dBm
Min Tx EIRP
9 dBm
Multi Band Scan
Enabled
Rogue AP Aware
Disabled
Scan Interval
10 sec
Active Scan
Disabled
Scanning
Enabled
AOS-W 6.2 | Reference Guide
show rf arm-profile | 1239
Scan Time VoIP Aware Scan Power Save Aware Scan Video Aware Scan Ideal Coverage Index Acceptable Coverage Index Free Channel Index Backoff Time Error Rate Threshold Error Rate Wait Time Noise Threshold Noise Wait Time Minimum Scan Time Load aware Scan Threshold Mode Aware Arm Scan Mode
110 msec Disabled Disabled Enabled 10 4 25 240 sec 50 % 30 sec 75 -dBm 120 sec 8 1250000 Bps Disabled all-reg-domain
The output of this command includes the following parameters:
Parameter
Description
Assignment
Displays the current ARM channel/power assignment mode.
Allowed bands for 40MHz channels
Shows if 40 MHz mode of operation is allowed on the 5 GHz (802.11a) or 2.4 GHz (802.11b/g) frequency band only, on all frequency bands, or on neither frequency band.
Client Aware
Shows if the client aware feature is enabled or disabled. When enabled, the AP does not change channels when there are active clients.
Max Tx Power
The highest transmit power levels for the AP, from 0-30 dBm in 3 dBm increments. Higher power level settings may be constrained by local regulatory requirements and AP capabilities. In the event that an AP is configured for a Max Tx Power setting it cannot support, this value will be reduced to the highest supported power setting.
Min Tx Power
The lowest transmit power levels for the AP, from 0-30 dBm, in 3 dBm increments. Note that power settings will not change if the Assignment option is set to disabled or maintain.
Multi Band Scan
If enabled, single-radio APs will try to scan across bands for rogue AP detection.
Rogue AP Aware
If enabled, Alcatel-Lucent APs may change channels to contain off-channel rogue APs with active clients. This security features allows APs to change channels even if the Client Aware setting is disabled.
This setting is disabled by default, and should only be enabled in high-security environments where security requirements are allowed to consume higher levels of network resources. You may prefer to receive Rogue AP alerts via SNMP traps or syslog events.
Scan Interval
If Scanning is enabled, the Scan Interval defines how often the AP will leave its current channel to scan other channels in the band.
Off-channel scanning can impact client performance. Typically, the shorter the scan interval, the higher the impact on performance. If you are deploying a large number of new APs on the network, you may want to lower the Scan Interval to help those APs find their optimal settings more quickly. Raise the Scan Interval back to its default setting after the APs are functioning as desired.
1240 | show rf arm-profile
AOS-W 6.2 | Reference Guide
Parameter Active Scan
Scanning Scan Time VoIP Aware Scan
Power Save Aware Scan Video Aware Scan Ideal Coverage Index Acceptable Coverage Index Free Channel Index
Backoff Time Error Rate Threshold Error Rate Wait Time Noise Threshold Noise Wait Time Minimum Scan Time Load aware Scan Threshold Mode Aware Arm
Scan Mode
Description
If enabled, the AP initiates active scanning via probe request. This option elicits more information from nearby APs, but also creates additional management traffic on the network. Active Scan is disabled by default, and should not be enabled except under the direct supervision of Alcatel-Lucent Support.
Shows if the AP has enabled or disabled AP scanning of other channels.
The amount of time, in milliseconds, an AP will drift out of the current channel to scan another channel.
Shows if Alcatel-Lucent's VoIP Call Admission Control (CAC) prevents any single AP from becoming congested with voice calls. If CAC is enabled, you should also enable VoIP Aware Scan in the ARM profile, so the AP will not attempt to scan a different channel if one of its clients has an active VoIP call.
When enabled, the AP will not scan if Power Save is active.
If Video Aware Scan is enabled in the ARM profile, the AP will not attempt to scan a different channel if one of its clients has an active video session.
The coverage that the AP should try to achieve on its channel. The denser the AP deployment, the lower this value should be.
The minimal coverage that the AP should try to achieve on its channel. The denser the AP deployment, the lower this value should be.
The difference in the interference index between the new channel and current channel must exceed this value for the AP to move to a new channel. The higher this value, the lower the chance an AP will move to the new channel.
Time, in seconds, an AP backs off after requesting a new channel or power level.
The percentage of errors in the channel that triggers a channel change.
Time, in seconds, that the error rate has to maintain or surpass the error rate threshold before it triggers a channel change.
Maximum level of noise (in -dBm) in a channel that triggers a channel change.
Time, in seconds, the noise has to be high to trigger a channel change.
Time, in seconds, that a channel must be scanned before it is considered for assignment.
The traffic throughput level an AP must reach before it stops scanning, in bytes/second. A value of 0 to disables this feature.
If enabled, ARM will turn APs into Air Monitors (AMs) if it detects higher coverage levels than necessary. This helps avoid higher levels of interference on the WLAN. Although this setting is disabled by default, you may want to enable this feature if your APs are deployed in close proximity (e.g. less than 60 feet apart).
This parameter defines the scan mode for the AP. l all-reg-domain: The AP scans channels within all regulatory domains. This
is the default setting. l reg-domain:Limit the AP scans to just the regulatory domain for that AP.
AOS-W 6.2 | Reference Guide
show rf arm-profile | 1241
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
1242 | show rf arm-profile
AOS-W 6.2 | Reference Guide
show rf dot11a-radio-profile
show rf dot11a-radio-profile [<profile>]
Description
Show an 802.11a Radio profile.
Syntax
Parameter <profile>
Description Name of an 802.11a profile.
Usage Guidelines
Issue this command without the> <profileparameter to display the entire 802.11a Radio profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has three configured 802.11a Radio profiles. The References column lists the number of other profiles with references to the 802.11a Radio profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
(host) # show rf dot11a-radio-profile
802.11a radio profile List
--------------------------
Name
References Profile Status
----
---------- --------------
default
18
default-AP85 1
test
1
Total:3.
This example displays the configuration settings for the profile default.
(host) # show rf dot11a-radio-profile default
802.11a radio profile "default"
-------------------------------
Parameter
Value
---------
-----
Radio enable
Enabled
Mode
ap-mode
High throughput enable (radio)
Enabled
Channel
149+
Beacon Period
100 msec
Beacon Regulate
Disabled
Transmit EIRP
15 dBm
Advertise 802.11d and 802.11h Capabilities
Disabled
TPC Power
15 dBm
Spectrum load balancing
Disabled
Spectrum Load balancing mode
channel
Spectrum load balancing update interval (sec) 30 seconds
Spectrum load balancing threshold (%)
20 percent
Advertised regulatory max EIRP
0
Spectrum Load Balancing domain
N/A
RX Sensitivity Tuning Based Channel Reuse
disable
AOS-W 6.2 | Reference Guide
show rf dot11a-radio-profile | 1243
RX Sensitivity Threshold Non 802.11 Interference Immunity Enable CSA CSA Count Management Frame Throttle interval Management Frame Throttle Limit ARM/WIDS Override Reduce Cell Size (Rx Sensitivity) Adaptive Radio Management (ARM) Profile High-throughput Radio Profile Maximum Distance Spectrum Monitoring Spectrum Monitoring Profile AM Scanning Profile
0 -dBm Level-2 Disabled 4 1 sec 20 Disabled 0 dB default default-a 0 meters Disabled default-a default
The output of this command includes the following parameters:
Parameter
Description
Radio enable
Shows if the AP has enabled or disabled transmissions on this radio band.
Mode
Access Point operating mode. Available options are: l am-mode: Air Monitor mode l ap-mode: Access Point mode l apm-mode: Access Point Monitor mode l sensor-mode: RFprotect sensor mode
High throughput enable (radio)
Name of a high-throughput profile referenced by this 802.11a radio profile. A high-throughput profile manages 40 Mhz tolerance settings, and controls whether or not APs using this profile will advertise intolerance of 40 MHz operation. (This option is disabled by default, allowing 40 MHz operation.) A high-throughput profile also determines whether an AP radio using the profile will stop using the 40 MHz channels surrounding APs or stations advertise 40 Mhz intolerance. This option is enabled by default.
Channel
Channel number for the AP 802.11a/802.11n physical layer.
Beacon Period
Time, in milliseconds, between successive beacon transmissions. The beacon advertises the AP's presence, identity, and radio characteristics to wireless clients.
Beacon Regulate
If enabled, this option introduces randomness in the beacon generation so that multiple APs on the same channel do not send beacons at the same time, which causes collisions over the air. This option is disabled by default.
Transmit EIRP
Maximum transmit power (EIRP) in dBm from 0 to 51 in .5 dBm increments. Further limited by regulatory domain constraints and AP capabilities.
Advertise 802.11d and 802.11h Capabilities
If enabled, the radio advertises its 802.11d (Country Information) and 802.11h (Transmit Power Control) capabilities.
TPC Power
The transmit power advertised in the TPC IE of beacons and probe responses
Spectrum load balancing
The Spectrum load balancing feature helps optimize network resources by balancing clients across channels, regardless of whether the AP or the switch is responding to the wireless clients' probe requests.
If enabled, the switch compares whether or not an AP has more clients than its neighboring APs on other channels. If an AP's client load is at or over a predetermined threshold as compared to its immediate neighbors, or if a neighboring Alcatel-Lucent AP on another channel does not have any clients, load balancing will be enabled on that AP. This feature is disabled by default.
1244 | show rf dot11a-radio-profile
AOS-W 6.2 | Reference Guide
Parameter
Description
Spectrum load balancing mode
SLB Mode allows control over how to balance clients. Channel-based loadbalancing balances clients across channels. Radio-based load-balancing distributes clients across radios on the same band, independent of channels.
Spectrum load balancing This parameter specifies how often spectrum load balancing calculations are
mode update interval
made (in seconds). The default value is 30 seconds.
Spectrum load balancing threshold
If the spectrum load balancing feature is enabled, this parameter controls the percentage difference between number of clients on a channel channel that triggers load balancing. The default value is 20%, meaning that spectrum load balancing is activated when there are 20% more clients on one channel than on another channel used by the AP radio.
Advertised Regulatory Max EIRP
Shows if the radio is configured to work around a known issue on Cisco 7921G telephones by capping for a radio's maximum equivalent isotropic radiated power (EIRP). When you enable this parameter, even if the regulatory approved maximum for a given channel is higher than this EIRP cap, the AP radio using this profile will advertise only this capped maximum EIRP in its radio beacons.
The supported value is131 dBm.
Spectrum load balancing domain
Define a spectrum load balancing domain to manually create RF neighborhoods.
Use this option to create RF neighborhood information for networks that have disabled Adaptive Radio Management (ARM) scanning and channel assignment.
l If spectrum load balancing is enabled in a 802.11a radio profile but the spectrum load balancing domain is not defined, AOS-W uses the ARM feature to calculate RF neighborhoods.
l If spectrum load balancing is enabled in a 802.11a radio profile and a spectrum load balancing domain isalso defined, AP radios belonging to the same spectrum load balancing domain will be considered part of the same RF neighborhood for load balancing, and will not recognize RF neighborhoods defined by the ARM feature.
RX Sensitivity Tuning Based Channel Reuse
Shows if the channel reuse feature's current operating mode, static, dynamic or disable.
l Static: This mode of operation is a coverage-based adaptation of the Clear Channel Assessment (CCA) thresholds. In the static mode of operation, the CCA is adjusted according to the configured transmission power level on the AP, so as the AP transmit power decreases as the CCA threshold increases, and vice versa.
l Dynamic: In this mode, the Clear Channel Assessment (CCA) thresholds are based on channel loads, and take into account the location of the associated clients. When you set the Channel Reuse This feature is automatically enabled when the wireless medium around the AP is busy greater than half the time. When this mode is enabled, the CCA threshold adjusts to accommodate transmissions between the AP its most distant associated client.
l Disable: This mode does not support the tuning of the CCA Detect Threshold.
RX Sensitivity Threshold
If the Rx Sensitivity Tuning Based Channel reuse feature is set to static mode, this parameter manually sets the AP's Rx sensitivity threshold (-dBm). The AP will filter out and ignore weak signals that are below the channel threshold signal strength. For example, if the RX sensitivity threshold was set to -65 dBm, the AP would ignore signals with a strength from -1 dBM to -64 dBm. If the value is set to zero, the feature will automatically determine an appropriate threshold.
AOS-W 6.2 | Reference Guide
show rf dot11a-radio-profile | 1245
Parameter Enable CSA
CSA Count
Management Frame Throttle Interval Management Frame Throttle Limit ARM/WIDS Override
Reduce Cell Size (Rx Sensitivity)
Adaptive Radio Management (ARM) Profile High-throughput Radio Profile Maximum Distance
Spectrum Monitoring
Spectrum Monitoring Profile AM Scanning Profile
Description
Shows if Channel Switch Announcements (CSAs) are enabled or disabled. CSAs, as defined by IEEE 802.11h, enable an AP to announce that it is switching to a new channel before it begins transmitting on that channel. This allows clients that support CSA to transition to the new channel with minimal downtime.
Number of channel switch announcements that must be sent prior to switching to a new channel. The default CSA count is 4 announcements.
Averaging interval for rate limiting mgmt frames from this radio, in seconds. A management frame throttle interval of 0 seconds disables rate limiting.
Maximum number of management frames that can come in from this radio in each throttle interval.
If enabled, this option disables Adaptive Radio Management (ARM) and Wireless IDS functions and slightly increases packet processing performance. If a radio is configured to operate in Air Monitor mode, then the ARM/WIDS override functions are always enabled, regardless of whether or not this check box is selected.
The cell size reduction feature allows you manage dense deployments and to increase overall system performance and capacity by shrinking an AP's receive coverage area, thereby minimizing co-channel interference and optimizing channel reuse. The possible range of values for this feature is 0-55 dB. The default 0 dB reduction allows the radio to retain its current default Rx sensitivity value.
Name of an Adaptive Radio Management profile associated with this 802.11a profile.
Name of a High Throughput Radio profile associated with this 802.11a profile.
Maximum distance between a client and an AP or between a mesh point and a mesh portal, in meters. This value is used to derive ACK and CTS timeout times. A value of 0 specifies default settings for this parameter, where timeouts are only modified for outdoor mesh radios which use a distance of 16km..
If enabled, the AP operates as a hybrid AP that can simultaneously serve clients and monitor a single channel for spectrum analysis data.
The spectrum monitoring profile referenced by APs using this 802.11a radio profile. For details, see rf spectrum-profile on page 549
The AM scanning profile referenced by APs using this 802.11a radio profile. For details, seerf am-scan-profile on page 516
Command History
Release AOS-W 3.0 AOS-W 3.3.2
Modification Command introduced. Introduced support for the high-throughput IEEE 802.11n standard.
1246 | show rf dot11a-radio-profile
AOS-W 6.2 | Reference Guide
Release AOS-W 3.4.0
AOS-W 3.4.2 AOS-W 6.0
AOS-W 6.1 AOS-W 6.2.1.0
Modification
Support for the following parameters: l Spectrum load balancing l RX Sensitivity Tuning Based Channel Reuse l RX Sensitivity Threshold l ARM/WIDS Override
Support for the Beacon Regulate parameter
Support for the following parameters: l AM Scanning Profile l Advertised regulatory max EIRP l Spectrum Load balancing mode l Spectrum load balancing update interval (sec)
Support for the following parameters: l Spectrum Monitoring l Spectrum load balancing threshold (%)
The Reduce Cell Size (Rx Sensitivity) parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show rf dot11a-radio-profile | 1247
show rf dot11g-radio-profile
show rf dot11g-radio-profile [<profile>]
Description
Show an 802.11g Radio profile.
Syntax
Parameter <profile>
Description Name of a 802.11g profile.
Usage Guidelines
Issue this command without the <profile>parameter to display the entire 802.11g profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has four configured 802.11g profiles. The References column lists the number of other profiles with references to the 802.11g profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column
(host) # show rf arm-profile
Adaptive Radio Management (ARM) profile List
--------------------------------------------
Name
References Profile Status
----
---------- --------------
airwave
4
default
4
no-scanning
1
nokia-rf-profile
1
Total:4. This example displays the configuration settings for the profile airwave.
(host) # show rf dot11g-radio-profile default Parameter --------Radio enable Mode High throughput enable (radio) Channel Beacon Period Beacon Regulate Transmit EIRP Advertise 802.11d and 802.11h Capabilities TPC Power Spectrum load balancing Spectrum Load balancing mode Spectrum load balancing update interval (sec) Advertised regulatory max EIRP Spectrum Load Balancing domain RX Sensitivity Tuning Based Channel Reuse RX Sensitivity Threshold
Value ----Enabled ap-mode Enabled N/A 100 msec Disabled 15 dBm Disabled 15 dBm Disabled channel 30 seconds 0 N/A disable 0 -dBm
1248 | show rf dot11g-radio-profile
AOS-W 6.2 | Reference Guide
Non 802.11 Interference Immunity Enable CSA CSA Count Management Frame Throttle interval Management Frame Throttle Limit ARM/WIDS Override Reduce Cell Size (Rx Sensitivity) Protection for 802.11b Clients Adaptive Radio Management (ARM) Profile High-throughput Radio Profile Maximum Distance Spectrum Monitoring Spectrum Monitoring Profile AM Scanning Profile
Level-2 Disabled 4 1 sec 20 Disabled 0 dB Enabled default default-g 0 meters Disabled default-a default
The output of this command includes the following parameters:
Parameter
Description
Radio enable
Shows if the AP has enabled or disabled transmissions on this radio band.
Mode
Access Point operating mode. Available options are: l am-mode: Air Monitor mode l ap-mode: Access Point mode l apm-mode: Access Point Monitor mode l sensor-mode: RFprotect sensor mode
High throughput enable (radio)
Name of a high-throughput profile referenced by this 802.11a radio profile. A high-throughput profile manages 40 Mhz tolerance settings, and controls whether or not APs using this profile will advertise intolerance of 40 MHz operation. (This option is disabled by default, allowing 40 MHz operation.) A high-throughput profile also determines whether an AP radio using the profile will stop using the 40 MHz channels surrounding APs or stations advertise 40 Mhz intolerance. This option is enabled by default.
Channel
Channel number for the AP 802.11a/802.11n physical layer.
Beacon Period
Time, in milliseconds, between successive beacon transmissions. The beacon advertises the AP's presence, identity, and radio characteristics to wireless clients.
Beacon Regulate
If enabled, this option introduces randomness in the beacon generation so that multiple APs on the same channel do not send beacons at the same time, which causes collisions over the air. This option is disabled by default.
Transmit EIRP
Maximum transmit power (EIRP) in dBm from 0 to 51 in .5 dBm increments. Further limited by regulatory domain constraints and AP capabilities.
Advertise 802.11d and 802.11h Capabilities
If enabled, the radio advertises its 802.11d (Country Information) and 802.11h (Transmit Power Control) capabilities.
TPC Power
The transmit power advertised in the TPC IE of beacons and probe responses
Spectrum load balancing
The Spectrum load balancing feature helps optimize network resources by balancing clients across channels, regardless of whether the AP or the switch is responding to the wireless clients' probe requests.
If enabled, the switch compares whether or not an AP has more clients than its neighboring APs on other channels. If an AP's client load is at or over a predetermined threshold as compared to its immediate neighbors, or if a neighboring Alcatel-Lucent AP on another channel does not have any clients, load balancing will be enabled on that AP. This feature is disabled by default.
AOS-W 6.2 | Reference Guide
show rf dot11g-radio-profile | 1249
Parameter
Description
Spectrum load balancing mode
SLB Mode allows control over how to balance clients. Channel-based loadbalancing balances clients across channels. Radio-based load-balancing distributes clients across radios on the same band, independent of channels.
Spectrum load balancing This parameter specifies how often spectrum load balancing calculations are
mode update interval
made (in seconds). The default value is 30 seconds.
Spectrum load balancing threshold
If the spectrum load balancing feature is enabled, this parameter controls the percentage difference between number of clients on a channel channel that triggers load balancing. The default value is 20%, meaning that spectrum load balancing is activated when there are 20% more clients on one channel than on another channel used by the AP radio.
Advertised Regulatory Max EIRP
Shows if the radio is configured to work around a known issue on Cisco 7921G telephones by capping for a radio's maximum equivalent isotropic radiated power (EIRP). When you enable this parameter, even if the regulatory approved maximum for a given channel is higher than this EIRP cap, the AP radio using this profile will advertise only this capped maximum EIRP in its radio beacons.
The supported value is131 dBm.
Spectrum load balancing domain
Define a spectrum load balancing domain to manually create RF neighborhoods.
Use this option to create RF neighborhood information for networks that have disabled Adaptive Radio Management (ARM) scanning and channel assignment.
l If spectrum load balancing is enabled in a 802.11g radio profile but the spectrum load balancing domain is not defined, AOS-W uses the ARM feature to calculate RF neighborhoods.
l If spectrum load balancing is enabled in a 802.11g radio profile and a spectrum load balancing domain isalso defined, AP radios belonging to the same spectrum load balancing domain will be considered part of the same RF neighborhood for load balancing, and will not recognize RF neighborhoods defined by the ARM feature.
RX Sensitivity Tuning Based Channel Reuse
Shows if the channel reuse feature's current operating mode, static, dynamic or disable.
l Static: This mode of operation is a coverage-based adaptation of the Clear Channel Assessment (CCA) thresholds. In the static mode of operation, the CCA is adjusted according to the configured transmission power level on the AP, so as the AP transmit power decreases as the CCA threshold increases, and vice versa.
l Dynamic: In this mode, the Clear Channel Assessment (CCA) thresholds are based on channel loads, and take into account the location of the associated clients. When you set the Channel Reuse This feature is automatically enabled when the wireless medium around the AP is busy greater than half the time. When this mode is enabled, the CCA threshold adjusts to accommodate transmissions between the AP its most distant associated client.
l Disable: This mode does not support the tuning of the CCA Detect Threshold.
RX Sensitivity Threshold
If the Rx Sensitivity Tuning Based Channel reuse feature is set to static mode, this parameter manually sets the AP's Rx sensitivity threshold (-dBm). The AP will filter out and ignore weak signals that are below the channel threshold signal strength. For example, if the RX sensitivity threshold was set to -65 dBm, the AP would ignore signals with a strength from -1 dBM to -64 dBm. If the value is set to zero, the feature will automatically determine an appropriate threshold.
1250 | show rf dot11g-radio-profile
AOS-W 6.2 | Reference Guide
Parameter
Description
Non 802.11 Interference Immunity
Show the current value for 802.11 Interference Immunity on the 2.4 Ghz band. The default setting for this parameter is level 2. When performance drops due to interference from non-802.11 interferers (such as DECT or Bluetooth devices), the level can be increased up to level 5 for improved performance. However, increasing the level makes the AP slightly "deaf" to its surroundings, causing the AP to lose a small amount of range. The levels for this parameter are: l Level-0: no ANI adaptation. l Level-1: noise immunity only. l Level-2: noise and spur immunity. l Level-3: level 2 and weak OFDM immunity. l Level-4: level 3 and FIR immunity. l Level-5: disable PHY reporting.
Enable CSA
Shows if Channel Switch Announcements (CSAs) are enabled or disabled. CSAs, as defined by IEEE 802.11h, enable an AP to announce that it is switching to a new channel before it begins transmitting on that channel. This allows clients that support CSA to transition to the new channel with minimal downtime.
CSA Count
Number of channel switch announcements that must be sent prior to switching to a new channel. The default CSA count is 4 announcements.
Management Frame Throttle Interval
Averaging interval for rate limiting mgmt frames from this radio, in seconds. A management frame throttle interval of 0 seconds disables rate limiting.
Management Frame Throttle Limit
Maximum number of management frames that can come in from this radio in each throttle interval.
ARM/WIDS Override
If enabled, this option disables Adaptive Radio Management (ARM) and Wireless IDS functions and slightly increases packet processing performance. If a radio is configured to operate in Air Monitor mode, then the ARM/WIDS override functions are always enabled, regardless of whether or not this check box is selected.
Reduce Cell Size (Rx Sensitivity)
The cell size reduction feature allows you manage dense deployments and to increase overall system performance and capacity by shrinking an AP's receive coverage area, thereby minimizing co-channel interference and optimizing channel reuse. The possible range of values for this feature is 0-55 dB. The default 0 dB reduction allows the radio to retain its current default Rx sensitivity value.
Protection for 802.11b Clients
Shows if the profile has enabled or disabled protection for 802.11b clients.
Adaptive Radio Management (ARM) Profile
Name of an Adaptive Radio Management profile associated with this 802.11a profile.
High-throughput Radio Profile
Name of a High Throughput Radio profile associated with this 802.11a profile.
Maximum Distance
Maximum distance between a client and an AP or between a mesh point and a mesh portal, in meters. This value is used to derive ACK and CTS timeout times. A value of 0 specifies default settings for this parameter, where timeouts are only modified for outdoor mesh radios which use a distance of 16km.
AOS-W 6.2 | Reference Guide
show rf dot11g-radio-profile | 1251
Parameter Spectrum Monitoring
Spectrum Monitoring Profile AM Scanning Profile
Description
If enabled, the AP operates as a hybrid AP that can simultaneously serve clients and monitor a single channel for spectrum analysis data.
The spectrum monitoring profile referenced by APs using this 802.11g radio profile. For details, see rf spectrum-profile on page 549
The AM scanning profile referenced by APs using this 802.11g radio profile. For details, seerf am-scan-profile on page 516
Command History
Release AOS-W 3.0 AOS-W 3.3.2 AOS-W 3.4
AOS-W 3.4.2 AOS-W 6.0
AOS-W 6.1 AOS-W 6.2.1.0
Modification
Command introduced
Introduced protection for 802.11b clients and support for the high-throughput IEEE 802.11n standard
Support for the following parameters: l Spectrum load balancing l RX Sensitivity Tuning Based Channel Reuse l RX Sensitivity Threshold l ARM/WIDS Override
Support for the Beacon Regulate parameter
Support for the following parameters: l AM Scanning Profile l Advertised regulatory max EIRP l Spectrum Load balancing mode l Spectrum load balancing update interval (sec)
Support for the following parameters: l Spectrum Monitoring l Spectrum load balancing threshold (%)
The Reduce Cell Size (Rx Sensitivity) parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
1252 | show rf dot11g-radio-profile
AOS-W 6.2 | Reference Guide
show rf event-thresholds-profile
show rf event-thresholds-profile [<profile>]
Description
Show an Event Thresholds profile.
Syntax
Parameter <profile>
Description name of an Event Thresholds profile
Usage Guidelines
Issue this command without the <profile>parameter to display the entire Event Thresholds profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has two configured Event Thresholds profiles. The References column lists the number of other profiles with references to the Event Thresholds profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column
(host) # show rf event-thresholds-profile
RF Event Thresholds Profile List
--------------------------------
Name
References Profile Status
----
---------- --------------
default 6
event1
2
Total: 2.
This example displays the configuration settings for the profile default.
(host) # show rf event-thresholds-profile default
RF Event Thresholds Profile "default"
-------------------------------------
Parameter
Value
---------
-----
Detect Frame Rate Anomalies
Disabled
Bandwidth Rate High Watermark
0%
Bandwidth Rate Low Watermark
0%
Frame Error Rate High Watermark
0%
Frame Error Rate Low Watermark
0%
Frame Fragmentation Rate High Watermark 16 %
Frame Fragmentation Rate Low Watermark 8 %
Frame Low Speed Rate High Watermark
16 %
Frame Low Speed Rate Low Watermark
8%
Frame Non Unicast Rate High Watermark 0 %
Frame Non Unicast Rate Low Watermark
0%
Frame Receive Error Rate High Watermark 16 %
Frame Receive Error Rate Low Watermark 8 %
Frame Retry Rate High Watermark
16 %
Frame Retry Rate Low Watermark
8%
AOS-W 6.2 | Reference Guide
show rf event-thresholds-profile | 1253
The output of this command includes the following parameters:
Parameter
Detect Frame Rate Anomalies
Bandwidth Rate High Watermark
Bandwidth Rate Low Watermark
Frame Error Rate High Watermark
Frame Error Rate Low Watermark
Frame Fragmentation Rate High Watermark
Frame Fragmentation Rate Low Watermark
Frame Low Speed Rate High Watermark
Frame Low Speed Rate Low Watermark
Frame Non Unicast Rate High Watermark
Frame Non Unicast Rate Low Watermark
Frame Receive Error Rate High Watermark
Frame Receive Error Rate Low Watermark
Frame Retry Rate High Watermark
Frame Retry Rate Low Watermark
Description
Shows of the profile enables or disables detection of frame rate anomalies.
If bandwidth in an AP exceeds this value, it triggers a bandwidth exceeded condition. The value represents the percentage of maximum for a given radio. (For 802.11b, the maximum bandwidth is 7 Mbps. For 802.11 a and g, the maximum is 30 Mbps.) The recommended value is 85%.
If an AP triggers a bandwidth exceeded condition, the condition persists until bandwidth drops below this value.
If the frame error rate (as a percentage of total frames in an AP) exceeds this value, it triggers a frame error rate exceeded condition.
If an AP triggers a frame error rate exceeded condition, the condition persists until the frame error rate drops below this value.
If the frame fragmentation rate (as a percentage of total frames in an AP) exceeds this value, it triggers a frame fragmentation rate exceeded condition.
If an AP triggers a frame fragmentation rate exceeded condition, the condition persists until the frame fragmentation rate drops below this value.
If the rate of low-speed frames (as a percentage of total frames in an AP) exceeds this value, it triggers a low-speed rate exceeded condition.
After a low-speed rate exceeded condition exists, the condition persists until the percentage of low-speed frames drops below this value.
If the non-unicast rate (as a percentage of total frames in an AP) exceeds this value, it triggers a non-unicast rate exceeded condition. This value depends upon the applications used on the network.
If an AP triggers a non-unicast rate exceeded condition, the condition persists until the non-unicast rate drops below this value.
If the frame receive error rate (as a percentage of total frames in an AP) exceeds this value, it triggers a frame receive error rate exceeded condition.
If an AP triggers a frame receive error rate exceeded condition, the condition persists until the frame receive error rate drops below this value.
If the frame retry rate (as a percentage of total frames in an AP) exceeds this value, it triggers a frame retry rate exceeded condition.
If an AP triggers a frame retry rate exceeded condition exists, the condition persists until the frame retry rate drops below this value.
Command History
This command was available in AOS-W 3.0.
1254 | show rf event-thresholds-profile
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show rf event-thresholds-profile | 1255
show rf ht-radio-profile
show rf ht-radio-profile [<profile>]
Description
Show a High-throughput Radio profile.
Syntax
Parameter <profile>
Description Name of a High-throughput Radio profile.
Usage Guidelines
Issue this command without the <profile>parameter to display the entire High-throughput Radio profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has five configured High-throughput Radio profiles. The References column lists the number of other profiles with references to the High-throughput Radio profile, and the Profile Status column indicates whether the profile is predefined and editable, and if that predefined profile has been changed from its default settings. User-defined profiles will not have an entry in the Profile Status column.
(host) # show rf ht-radio-profile
High-throughput radio profile List
----------------------------------
Name
References Profile Status
----
---------- --------------
default
0
default-a
8
Predefined (editable)
default-g
3
Predefined (changed)
legacystation 1
test
1
Total:5
This example displays the configuration settings for the predefined profile default-a.
(host) #show rf ht-radio-profile default-a
High-throughput radio profile "default-a" (Predefined (editable))
-----------------------------------------------------------------
Parameter
Value
---------
-----
40 MHz intolerance
Disabled
Honor 40 MHz intolerance
Enabled
Diversity spreading workaround Disabled
CSD Override
Disabled
The output of this command includes the following parameters:
1256 | show rf ht-radio-profile
AOS-W 6.2 | Reference Guide
Parameter 40 MHz intolerance
Honor 40 MHz intolerance
CSD Override Diversity Spreading Workaround
Description
Shows whether or not APs using this radio profile will advertise intolerance of 40 MHz operation. By default, 40 MHz operation is allowed.
If this parameter is enabled, the radio will stop using the 40 MHz channels if the 40 MHz intolerance indication is received from another AP or station.
When this feature is enabled, all legacy transmissions will be sent using a single antenna. This enables interoperability for legacy or high-throughput stations that cannot decode 802.11n cyclic shift diversity (CSD) data. This feature is disabled by default and should be kept disabled unless necessary.
Command History
Release AOS-W 3.0 AOS-W 3.3.2 AOS-W 3.4 AOS-W 6.2
Modification Command introduced Support for the dsss-cck-40mhz parameter was removed Introduced the single-chain-legacy parameter. The CSD Override parameter was renamed to diversity spreading workaround.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show rf ht-radio-profile | 1257
show rf optimization-profile
show rf optimization-profile [<profile>]
Description
Show an Optimization profile.
Syntax
Parameter <profile>
Description name of an ARM profile
Usage Guidelines
Issue this command without the <profile>parameter to display the entire Optimization profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has two configured Optimization profiles. The References column lists the number of other profiles with references to the Optimization profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
(host) # show rf optimization-profile
RF Optimization Profile List
----------------------------
Name
References Profile Status
----
---------- --------------
default 6
profile2 1
Total:2
This example displays the configuration settings for the profile profile2.
(host) #show rf optimization-profile profile2
RF Optimization Profile "profile2"
---------------------------------
Parameter
Value
---------
-----
Station Handoff Assist
Disabled
Detect Association Failure
Disabled
Coverage Hole Detection
Disabled
Hole Good RSSI Threshold
20
Hole Good Station Ageout
30 sec
Hole Detection Interval
180 sec
Hole Idle Station Ageout
90 sec
Hole Poor RSSI Threshold
10
Detect interference
Disabled
Interference Threshold
90 %
Interference Threshold Exceed Time
25 sec
Interference Baseline Time
25 sec
RSSI Falloff Wait Time
0 sec
Low RSSI Threshold
0
RSSI Check Frequency
0 sec
The output of this command includes the following parameters:
1258 | show rf optimization-profile
AOS-W 6.2 | Reference Guide
Parameter
Description
Station Handoff Assist
If enabled, this parameter allows the switch to force a client off an AP when the RSSI drops below a defined minimum threshold.
Detect Association Failure
Shows if the profile enables or disables STA association failure detection.
Coverage Hole Detection
Shows if the profile enables or disables coverage hole detection.
Hole Good RSSI Threshold
Time, in seconds, after a coverage hole is detected until a coverage hole event notification is generated. This parameter requires the RF Protect license.
Hole Good Station Ageout
Stations with signal strength above this value are considered to have good coverage. This parameter requires the RF Protect license.
Hole Detection Interval
Time, in seconds, after which a station with good coverage is aged out. This parameter requires the RF Protect license.
Hole Idle Station Ageout
Time, in seconds, after which a station in a poor coverage area is aged out. This parameter requires the RF Protect license.
Hole Poor RSSI Threshold
Stations with signal strength below this value will trigger detection of a coverage hole. This parameter requires the RF Protect license.
Detect interference Enables or disables interference detection.
Interference Threshold
Percentage increase in the frame retry rate (FRR) or frame receive error rate (FRER) before interference monitoring begins on a given channel.
Interference Threshold Exceed Time
Time, in seconds, the FRR or FRER exceeds the threshold before interference is reported.
Interference Baseline Time
Time, in seconds, the air monitor should learn the state of the link between the AP and client to create frame retry rate (FRR) and frame receive error rate (FRER) baselines.
RSSI Falloff Wait Time
Time, in seconds, to wait with decreasing RSSI before a deauthorization message is sent to the client. The maximum value is 8 seconds.
Low RSSI Threshold Minimum RSSI above which deauthorization messages should never be sent.
RSSI Check Frequency
Interval, in seconds, to sample RSSI.
Command History
Version AOS-W 3.0 AOS-W 3.4
Modification
Base operating system
Output parameters displaying load balancing status were removed. You can now view the status of the load balancing feature via the commands show rf dot11a-radio-profile and show rf dot11g-radio-profile.
AOS-W 6.2 | Reference Guide
show rf optimization-profile | 1259
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
1260 | show rf optimization-profile
AOS-W 6.2 | Reference Guide
show rf spectrum-profile
rf spectrum-profile <profile-name>
Description
Show a spectrum profile used by the spectrum analysis feature.
Syntax
Parameter <profile>
Description Name of a spectrum profile.
Usage Guidelines
Issue this command without the <profile>parameter to display the entire spectrum profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has three configured spectrum profiles. The References column lists the number of other profiles with references to the spectrum profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
(host) #show rf spectrum-profile
Spectrum profile List
---------------------
Name
References
----
----------
spectrum1 1
default-a 2
default-g 2
Profile Status --------------
Predefined (editable) Predefined (editable)
This example displays the configuration settings for the profile spectrum1.
(host) #show rf spectrum-profile default
Spectrum profile "default" -------------------------Parameter --------Age Out: WIFI Age Out: Generic Interferer Age Out: Microwave Age Out: Microwave (Inverter type) Age Out: Video Device Age Out: Audio Device Age Out: Cordless Phone Fixed Frequency Age Out: Generic Fixed Frequency Age Out: Bluetooth Age Out: Xbox Age Out: Cordless Network Frequency Hopper Age Out: Cordless Base Frequency Hopper Age Out: Generic Frequency Hopper
Value ----600 sec 30 sec 15 sec 15 sec 60 sec 10 sec 10 sec 10 sec 25 sec 25 sec 60 sec 240 sec 25 sec
The output of this command includes the following information:
AOS-W 6.2 | Reference Guide
show rf spectrum-profile | 1261
Parameter Age Out: WIFI Age Out: Generic Interferer Age Out: Microwave
Age Out: Microwave (inverter type)
Age Out: Video Device Age Out: Audio Device Age Out: Cordless Phone Fixed Frequency Age Out: Generic Fixed Frequency Age Out: Xbox
Age Out: Bluetooth
Description
The number of seconds for which a wifi device must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 600 seconds.
The number of seconds for which an unknown device must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 30 seconds.
The number of seconds for which a microwave device must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 15 seconds. Note that this parameter is applicable to 2.4GHz spectrum monitor radios only.
The number of seconds for which an inverter microwave must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 15 seconds. Note that this parameter is applicable to 2.4GHz spectrum monitor radios only.
The number of seconds for which a video device must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 60 seconds.
The number of seconds for which an audio device must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 10 seconds.
The number of seconds for which a fixed frequency cordless phone must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 10 seconds.
The number of seconds for which a generic fixed frequency device must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 10 seconds.
The number of seconds for which an Xbox device must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 25 seconds. Note that this parameter is applicable to 2.4GHz spectrum monitor radios only.
The number of seconds for which a bluetooth device must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 25 seconds. Note that this parameter is applicable to 2.4GHz spectrum monitor radios only.
1262 | show rf spectrum-profile
AOS-W 6.2 | Reference Guide
Parameter
Description
Age Out: Cordless Network Frequency Hopper
The number of seconds for which a frequency-hopping cordless network device must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 60 seconds.
Age Out: Cordless Base Frequency Hopper
The number of seconds for which a frequency-hopping cordless phone base must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 240 seconds.
Age Out: Generic Frequency Hopper
The number of seconds for which a generic frequency-hopping device must stop sending a signal before the spectrum monitor considers that device no longer active on the network. The default value is 25 seconds.
Related Commands
rf spectrum-profile
Command History
Release AOS-W 6.0 AOS-W 6.2
Modification
Command introduced
The spectrum-band parameter was deprecated. The following default ageout times were changed: l cordless-fh-base default timeout is 240 seconds (was 25 seconds in previous releases). l cordless-fh-network default timeout is 60 seconds (was 10 seconds in previous releases). l generic-interferer default timeout is 30 seconds (was 25 seconds in previous releases). l video default timeout is 60 seconds (was 10 seconds in previous releases).
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode
Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show rf spectrum-profile | 1263
show rft profile
show rft profile {all|antenna-connectivity|link-quality|raw}
Description
Show parameters for the predefined RF test profiles.
Syntax
Parameter
Description
all
Show all predefined profiles.
antenna-connectivity Show configured parameters for the predefined Antenna Connectivity test profile.
link-quality
Show configured parameters for the predefined Link Quality test profile.
raw
Show configured parameters for the predefined RAW test profile.
Usage guidelines
The rft command is used for RF troubleshooting, and should only be used under the supervision of Alcatel-Lucent technical support. Issue the show rft profile command to view the profiles used for these RF tests.
Example
The following example shows the testing parameters for the predefined link-quality RF test profile.
(host) #show rft profile link-quality
Profile LinkQuality: Built-in profile
--------------------------------------
Parameter Value
--------- -----
Antenna
1 and/or 2
Frame Type Null Data
Num Packets 100 for each data-rate
Packet Size 1500
Num Retries 0
Data Rate All rates are tried
Related Commands
To view the results of an RF test, use the command show rft result.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
1264 | show rft profile
AOS-W 6.2 | Reference Guide
show rft result
show rft result all|{trans-id <trans-id>}
Description
Show the results of an RF test.
Syntax
Parameter all
trans-id <trans-id>
Description
Show the most recent test result for each test type (antenna-connectivity, linkquality or raw).
Each RF test is assigned a transaction ID. Include the trans-id <trans-id> parameters to show the test result for a specific transaction ID.
Usage guidelines
The rft command is used for RF troubleshooting, and should only be used under the supervision of Alcatel-Lucent technical support.
Related Commands
To view a list of the most recent transaction IDs for each test type, use the command show rft transactions.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
AOS-W 6.2 | Reference Guide
show rft result | 1265
show rft transactions
show rft transactions
Description
Show transaction IDs of RF tests.
Syntax
No parameters.
Usage guidelines
The rft command is used for RF troubleshooting, and should only be used under the supervision of Alcatel-Lucent technical support. Issue the show rft transaction command to view the transaction IDs for the most recent test of each test type.
Example
The following example shows the transaction IDs for the latest RAW, link-quality and antenna-connectivity tests. (host) #show rft transactions
RF troubleshooting transactions
-------------------------------
Profile
Transaction ID
-------
--------------
RAW
2001
LinkQuality
2101
AntennaConnectivity 1801
Related Commands
Use transaction IDs with the command show rft result to view results for individual RF tests.
Command History
This command was available in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
1266 | show rft transactions
AOS-W 6.2 | Reference Guide
show rights
show rights [<name-of-a-role>]
Description
Displays the list of user roles in the roles table with high level details of role policies. To view role policies of a specific role specify the role name.
Syntax
Parameter name-of-a-role
Description Enter the role name to view its policy details.
Example
The output of this command shows the list of roles in the role table. (host) # show rights
RoleTable
---------
Name
ACL Bandwidth
ACL List
Type
----
--- ---------
--------
----
ap-role
4 Up: No Limit,Dn: No Limit control/,ap-acl/
System
authenticated
39 Up: No Limit,Dn: No Limit allowall/,v6-allowall/
User
default-vpn-role 37 Up: No Limit,Dn: No Limit allowall/,v6-allowall/
User
guest
3 Up: No Limit,Dn: No Limit http-acl/,https-acl/,dhcp-acl/
guest-logon
6 Up: No Limit,Dn: No Limit logon-control/,captiveportal/
User
logon
1 Up: No Limit,Dn: No Limit logon-control/,captiveportal/
User
stateful-dot1x 5 Up: No Limit,Dn: No Limit
System
voice
38 Up: No Limit,Dn: No Limit sip-acl/,noe-acl/,svp-acl/,vocera-acl/
User
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
User
AOS-W 6.2 | Reference Guide
show rights | 1267
show roleinfo
show roleinfo
Description
Displays the role of the switch.
Syntax
No parameters.
Example
The output of this command shows the role of the switch. (host) # show roleinfo switchrole:master
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1268 | show roleinfo
AOS-W 6.2 | Reference Guide
show rrm dot11k admission-capacity
show rrm dot11k admission-capacity
Description
Displays the available admission capacity for voice traffic on an AP.
Syntax
No parameters.
Example
The output of this command shows the available admission capacity for voice traffic on all APs. (host) # show rrm dot11k admission-capacity
802.11K Available Admission Capacity for Voice ----------------------------------------------
Flags: B: Bandwidth based CAC, C: Call-count based CAC
D: CAC Disabled,
E: CAC Enabled
AP Name ------r-wing-94 r-wing-94
IP Address ---------10.16.12.247 10.16.12.247
Freq Band --------5 GHz 2.4 GHz
Chan ---40 11
Total ----31250 31250
Available --------0 0
Flags ----EC EC
Num APs:2
Command History
This command was available in AOS-W 3.4
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show rrm dot11k admission-capacity | 1269
show rrm dot11k ap-channel-report
show rrm dot11k ap-channel-report [ap-name <name-of-an-ap> | bssid <bssid-of-an-ap> | ip-addr <ip-address-of-an-ap>]
Description
Displays the channel information gathered by the AP. You can either specify an ap-name, bssid or ip-address of an AP to see more details.
Syntax
Parameter ap-name bssid ip-addr
Description Enter the name of the AP. Enter the BSSID address of the AP. Enter the IP address of the AP.
Example
The output of this command shows the channel information for r-wing-94:94. (host) # show rrm dot11k ap-channel-report ap-name r-wing-94
802.11K AP Channel Report Details
----------------------------------
Freq Band Channel List
--------- ------------
2.4 GHz 11,
5 GHz
36, 40, 157, 161, 165,
Num Entries:2
Command History
This command was available in AOS-W 3.4
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1270 | show rrm dot11k ap-channel-report
AOS-W 6.2 | Reference Guide
show rrm dot11k beacon-report
show rrm dot11k beacon-report
Description
Displays the beacon report information sent by a client to its AP.
Syntax
No parameters.
Example
The output of this command shows the beacon report for the client 00:1f:6c:7a:d4:fd. (host) # show rrm dot11k beacon-report station-mac 00:1f:6c:7a:d4:fd
802.11K Beacon Report Details
--------------------------------------------------
Channel
BSSID
---------- -------
1
00:0b:86:6d:3e:40
Reg Class
Antenna ID
------------ -------------
0
1
Meas. Mode ---------------Bcn Table
Num Elements:1
Command History
This command was available in AOS-W 3.4
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show rrm dot11k beacon-report | 1271
show rrm dot11k neighbor-report
show rrm dot11k neighbor-report [ap-name | bssid <bssid-of-an-ap> | ip-addr <ip-address-of-an-ap>]
Description
Displays the neighbor information for a particular AP. If the AP name or the AP's IP address is specified, the user should specify the ESSID to get the neighbor information. If the ESSID is not specified, the command will display the neighbor information for all the Virtual AP's configured on the AP.
Syntax
Parameter ap-name
<name-of-an-ap> <essid>
bssid ip-addr
Description Identify the AP for which you want to view information. Name of an AP. ESSID of the AP. If the ESSID includes spaces, you must enclose it in quotation marks. Enter the BSSID address of the AP. Enter the IP address of the AP.
Example
The output of this command shows the neighbor information for r-wing-94.
(host) # show rrm dot11k neighbor-report ap-name r-wing-94
802.11K Neighbor Report Details -------------------------------
Flags: S: Spectrum Management, Q: QoS, A: APSD, R: Radio Measurement
ESSID
BSSID
Channel Reachability Security Authenticator Preference
Flags
-----
-----
------- ------------ -------- ------------- ---------- -
----
r-wing-voice 00:0b:86:6d:3e:30 165
Reachable
Same
Same
1
SR
r-wing-voice 00:0b:86:6d:3e:20 1
Reachable
Same
Same
1
SR
r-wing-data 00:0b:86:6d:3e:40 6
Reachable
Same
Same
1
SR
r-wing-data 00:0b:86:6d:4e:41 153
Reachable
Same
Same
1
SR
Num Entries:4
Command History
This command was available in AOS-W 3.4
1272 | show rrm dot11k neighbor-report
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show rrm dot11k neighbor-report | 1273
show rrm dot11k transmit-stream-report station-mac
show rrm dot11k transmit-stream-report station-mac <mac-addr>
Description
This is a diagnostic option for quick verification of received transmit stream measurement reports. Displays the contents of the transmit stream measurement reports received from a client.
Syntax
Parameter mac-addr
Description MAC address of the client.
Command History
This command is introduced in AOS-W 5.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1274 | show rrm dot11k transmit-stream-report station-mac
AOS-W 6.2 | Reference Guide
show running-config
show running-config
Description
Displays the current switch configuration, including all pending changes which are yet to be saved.
Syntax
No parameters.
Example
The output of this command shows the running configuration on the switch. (host) # show running-config
version 5.0 enable secret "******" telnet soe loginsession timeout 0 hostname "vjoshi-2400" clock timezone PST -8 location "Building1.floor1" mms config 0 switch config 986 ip access-list eth validuserethacl
permit any ! netservice svc-netbios-dgm udp 138 netservice svc-snmp-trap udp 162 netservice svc-https tcp 443 netservice svc-dhcp udp 67 68 alg dhcp netservice svc-smb-tcp tcp 445 netservice svc-ike udp 500 netservice svc-l2tp udp 1701 ... ... ... netservice svc-bootp udp 67 69 netservice svc-snmp udp 161 netservice svc-v6-dhcp udp 546 547 netservice svc-icmp 1 --More-- (q) quit (u) pageup (/) search (n) repeat
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show running-config | 1275
show session-acl-list
show session-acl-list
Description
Displays the list of configured session ACLs in the switch.
Syntax
No parameters.
Example
The output of this command shows the session ACLs in the switch. (host) # show session-access-list v6-icmp-acl allow-diskservices control validuser v6-https-acl vocera-acl icmp-acl v6-dhcp-acl captiveportal v6-dns-acl allowall test sip-acl https-acl ... ... ... v6-http-acl dhcp-acl http-acl stateful-dot1x ap-acl svp-acl noe-acl stateful-kerberos v6-logon-control h323-acl
Command History
This command was available in AOS-W 3.4
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1276 | show session-acl-list
AOS-W 6.2 | Reference Guide
show slots
show slots
Description
Displays the list of slots in the switch, including the status and card type.
Syntax
No parameters.
Example
The output of this command shows slot details on the switch. (host) # show slots
Slots
------
Slot Status
---- ------
1
Present
Card Type --------A2400
Command History
This command was available in AOS-W 3.4
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show slots | 1277
show snmp community
show snmp community
Description
Displays the SNMP community string details.
Syntax
No parameters.
Example
The output of this command shows slot details on the switch.
(host) # show snmp community
SNMP COMMUNITIES ---------------COMMUNITY ACCESS --------- ------
public READ_ONLY
VERSION ------V1, V2c
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1278 | show snmp community
AOS-W 6.2 | Reference Guide
show snmp inform
show snmp inform
Description
Displays the length of SNMP inform queue.
Syntax
No parameters.
Example
The output of this command shows slot details on the switch. (host) # show snmp inform stats
Inform queue size is 100
SNMP INFORM STATS ----------------HOST PORT INFORMS-INQUEUE ---- ---- ---------------
OVERFLOW --------
TOTAL INFORMS -------------
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show snmp inform | 1279
show snmp trap-host
show snmp trap-host
Description
Displays the configured SNMP trap hosts.
Syntax
No parameters.
Example
The output of this command shows details of a SNMP trap host. (host) # show snmp trap-hosts
SNMP TRAP HOSTS
---------------
HOST
VERSION
----
-------
10.16.14.1 SNMPv2c
SECURITY NAME PORT
------------- ----
public
162
TYPE TIMEOUT RETRY
---- ------- -----
Trap N/A
N/A
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1280 | show snmp trap-host
AOS-W 6.2 | Reference Guide
show snmp trap-list
show snmp trap-list
Description
Displays the list of SNMP traps.
Syntax
No parameters.
Example
The output of this command shows the list of SNMP traps and the status. (host) # show snmp trap-list
SNMP TRAP LIST
--------------
TRAP-NAME
CONFIGURABLE
---------
------------
authenticationFailure
Yes
coldStart
Yes
linkDown
Yes
linkUp
Yes
warmStart
Yes
wlsxAPBssidEntryChanged
Yes
wlsxAPEntryChanged
Yes
wlsxAPImpersonation
Yes
wlsxAPInterferenceCleared
Yes
wlsxAPInterferenceDetected
Yes
wlsxAPRadioAttributesChanged
Yes
wlsxAPRadioEntryChanged
Yes
wlsxAccessPointIsDown
Yes
wlsxAccessPointIsUp
Yes
wlsxAdhocNetwork
Yes
wlsxAdhocNetworkBridgeDetected
Yes
wlsxAdhocNetworkBridgeDetectedAP
Yes
...
...
...
...
wlsxFanOK
Yes
wlsxFanTrayInserted
Yes
--More-- (q) quit (u) pageup (/) search (n) repeat
ENABLE-STATE -----------Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled
Enabled Enabled
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show snmp trap-list | 1281
show snmp trap-queue
show snmp trap-queue
Description
Displays the list of SNMP traps in queue.
Syntax
No parameters.
Example
The output of this command shows the list of SNMP traps sent to host. (host) # show snmp trap-queue
2009-04-29 00:47:40 An AP/AM 00:0b:86:cd:cc:14, radio 2 at Location 00:0b:86:cd:cc:14 and channel 1, detected an interfering access point (BSSID 00:e0:fc:18:b5:35, SSID WA1003A). More information can be obtained from http://10.16.15.1/screens/wmsi/reports.html?mode=ap&bssid=00:e0:fc:18:b5:35.
2009-04-29 00:49:01 An AP/AM 00:0b:86:cd:cc:14, radio 2 at Location 00:0b:86:cd:cc:14 and channel 10, detected an interfering access point (BSSID 00:1a:1e:a8:2d:a0, SSID l-wing-94). More information can be obtained from http://10.16.15.1/screens/wmsi/reports.html?mode=ap&bssid=00:1a:1e:a8:2d:a0.
2009-04-29 00:49:19 An AP/AM 00:0b:86:cd:cc:14, radio 2 at Location 00:0b:86:cd:cc:14 and channel 1, detected an interfering access point (BSSID 00:e0:fc:18:b5:35, SSID WA1003A). More information can be obtained from http://10.16.15.1/screens/wmsi/reports.html?mode=ap&bssid=00:e0:fc:18:b5:35.
2009-04-29 00:49:20 An AP/AM 00:0b:86:cd:cc:14, radio 2 at Location 00:0b:86:cd:cc:14 and channel 1, detected an interfering access point (BSSID 00:0b:86:5c:d8:e0, SSID r-wing-94). More information can be obtained from http://10.16.15.1/screens/wmsi/reports.html?mode=ap&bssid=00:0b:86:5c:d8:e0.
2009-04-29 00:49:31 An AP/AM 00:0b:86:cd:cc:14, radio 1 at Location 00:0b:86:cd:cc:14 and channel 36, detected an interfering access point (BSSID 00:1a:1e:8d:dc:20, SSID ). More information can be obtained from http://10.16.15.1/screens/wmsi/reports.html?mode=ap&bssid=00:1a:1e:8d:dc:20.
2009-04-29 00:50:15 An AP/AM 00:0b:86:cd:cc:14, radio 2 at Location 00:0b:86:cd:cc:14 and channel 1, detected an interfering access point (BSSID 00:e0:fc:18:b5:35, SSID WA1003A). More information can be obtained from http://10.16.15.1/screens/wmsi/reports.html?mode=ap&bssid=00:e0:fc:18:b5:35.
--More-- (q) quit (u) pageup (/) search (n) repeat
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1282 | show snmp trap-queue
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
show snmp trap-queue | 1283
show snmp user-table
show snmp user-table [user <username> auth-prot [sha | md5] <value> priv-prot [aes | des] <value>]
Description
Displays the list of SNMP user profile for a specified username.
Syntax
Parameter auth-prot
priv-prot
Description
Authentication protocol for the user, either HMAC-MD5-98 Digest Authentication Protocol (MD5) or HMAC-SHA-98 Digest Authentication Protocol (SHA), and the password for use with the designated protocol.
Privacy protocol for the user, either Advanced Encryption Standard (AES) or CBC-DES Symmetric Encryption Protocol (DES), and the password for use with the designated protocol.
Example
The output of this command shows the list of SNMP traps sent to host. (host) # show snmp user-table
SNMP USER TABLE --------------USER AUTHPROTOCOL ---- ------------
Sam SHA fire SHA
PRIVACYPROTOCOL --------------AES AES
FLAGS -----
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1284 | show snmp user-table
AOS-W 6.2 | Reference Guide
show spanning-tree
show spanning-tree <interface [fastethernet slot/port | gigabitethernet slot/port | port-channel id] <vlan vlan-id>
Description
View the RSTP and PVST+ configuration.
Syntax
Parameter interface
vlan
Description
Enter the keyword interface followed by the interface and slot/port or portchannel id: l for Fast Ethernet enter the keyword fastethernet followed by the slot/port l For Gigabit Ethernet enter the keyword gigabitethernet followed by the
slot/port l For Port Channel enter the keyword port-channel followed by an id number
Range: 0 to 7
Enter the keyword vlan follow by the VLAN ID. Range: 1 to 4094 Default: 1
Example--show spanning-tree
(host) # show spanning-tree
Spanning tree instance for vlan 10 Spanning Tree is executing the IEEE compatible Rapid Spanning Tree protocol Bridge Identifier has priority 32768, address 00:0b:86:f0:20:00 Configured hello time 2, max age 20, forward delay 15 We are the root of the spanning tree Topology change flag is not set, detected flag not set, changes 1 Times: hold 1, topology change 35 hello 2, max age 20, forward delay 15 Timers: hello 0, notification 0 Last topology change: 2 days, 0 hours, 31 mins, 21 secs
Spanning tree instance for vlan 20 Spanning Tree is executing the IEEE compatible Rapid Spanning Tree protocol Bridge Identifier has priority 32768, address 00:0b:86:f0:20:00 Configured hello time 2, max age 20, forward delay 15 We are the root of the spanning tree Topology change flag is not set, detected flag not set, changes 1 Times: hold 1, topology change 3 hello 2, max age 20, forward delay 15 Timers: hello 0, notification 0 Last topology change: 1 days, 0 hours, 3 mins, 2 secs
Example--show spanning-tree vlan
(host) # show spanning-tree vlan 2 Spanning Tree is executing the IEEE compatible Rapid Spanning Tree protocol Bridge Identifier has priority 32768, address 00:0b:86:f0:20:00 Configured hello time 2, max age 20, forward delay 15 We are the root of the spanning tree Topology change flag is not set, detected flag not set, changes 1 Times: hold 1, topology change 35 hello 2, max age 20, forward delay 15
AOS-W 6.2 | Reference Guide
show spanning-tree | 1285
Timers: hello 0, notification 0 Last topology change: 2 days, 0 hours, 31 mins, 21 secs
Command History
Release AOS-W 6.0 AOS-W 3.4
Modification PVST+ added Upgraded STP to RSTP with full backward compatibility.
Command Information
Platform All platforms
Licensing Base operating system
Command Mode
Enable mode and Configuration mode (config) on master switches
1286 | show spanning-tree
AOS-W 6.2 | Reference Guide
show spantree
show spantree <blocking> | <enable> | <forwarding> | <off> | <vlan>
Description
View the global RSTP and PVST+ topology.
Syntax
Parameter blocking enable forwarding off vlan
Description View the spanning tree ports in the Blocking state. View the spanning tree ports in the Enable state. View the spanning tree ports in the Forwarding state. View the ports with spanning tree disabled View the spanning tree instance for the VLAN.
Example
(host) # show spantree
Spanning tree instance vlan 10
Designated Root MAC
00:0b:86:f0:20:00
Designated Root Priority 32768
This bridge is the root
Root Max Age 20 sec Hello Time 2 sec Forward Delay 15 sec
Bridge MAC
00:0b:86:f0:20:00
Bridge Priority
32768
Configured Max Age 20 sec Hello Time 2 sec Forward Delay 15
Interface
Role
State
Cost
Prio.Nbr Type
---------------- ---- --- --------- -------- --------------------------------
eth1/3
Root
Forwarding 2
128.131 P2p Peer
eth1/1
Designated Forwarding 2
128.129 Edge P2p
Rapid Spanning Tree port configuration
--------------------------------------
Port State
Cost Prio PortFast
---- -----
---- ---- --------
FE 1/3 Discarding 0
128 Disable
FE 1/1 Forwarding 4
128 Disable
P-to-P -----Enable Enable
Role ---Disabled Designated
Spanning tree instance vlan 20
Designated Root MAC
00:0b:86:f0:20:20
Designated Root Priority 32768
Root Cost
11
Root Max Age 20 sec Hello Time 2 sec Forward Delay 15 sec
Bridge MAC
00:0b:86:f0:20:30
Bridge Priority
32768
Configured Max Age 20 sec Hello Time 2 sec
Forward Delay 15
Rapid Spanning Tree port configuration
--------------------------------------
Port State
Cost Prio PortFast P-to-P Role
AOS-W 6.2 | Reference Guide
show spantree | 1287
---- -----
---- ---- -------- ------ ----
FE 1/3 Discarding 0
128 Disable Enable Disabled
FE 1/1 Forwarding 4
128 Disable Enable Designated
Command History
Release AOS-W 6.0 AOS-W 3.4
Modification PVST+ added Upgraded STP to RSTP with full backward compatibility.
Command Information
Platform All platforms
Licensing Base operating system
Command Mode
Enable mode and Configuration mode (config) on master switches
1288 | show spantree
AOS-W 6.2 | Reference Guide
show ssh
show ssh
Description
Displays the SSH configuration details.
Syntax
No parameters.
Example
The output of this command shows SSH configuration details. (host) # show ssh
SSH Settings: ------------DSA Mgmt User Authentication Method
Enabled username/password
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show ssh | 1289
show startup-config
show startup-config
Description
Displays the configuration which will be used the next time the switch is rebooted. It contains all the options last saved using the write memory command. Any unsaved changes are not included.
Syntax
No parameters.
Example
The output of this command shows slot details on the switch.
(host) # show startup-config
version 3.4 enable secret "608265290155fb924578f15b12670a75a37045cbdf62fb0d3a" telnet cli telnet soe loginsession timeout 30 hostname "FirstFloor2400" clock timezone PST -8 location "Building1.floor1" mms config 0 switch config 22
ip access-list eth validuserethacl permit any
! netservice svc-snmp-trap udp 162 netservice svc-dhcp udp 67 68 netservice svc-smb-tcp tcp 445 netservice svc-https tcp 443 netservice svc-ike udp 500 netservice svc-l2tp udp 1701 netservice svc-syslog udp 514 ... ... ... netservice svc-msrpc-udp udp 135 139 netservice svc-ssh tcp 22 netservice svc-http-proxy1 tcp 3128 --More-- (q) quit (u) pageup (/) search (n) repeat
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1290 | show startup-config
AOS-W 6.2 | Reference Guide
show station-table
show station-table [mac <mac_address>]
Description
Displays the internal station table entries and also details of a station table entry.
Syntax
No parameters.
Example
The output of this command shows details of an entry in the station table. (host) # show station-table mac 00:1f:6c:7a:d4:fd
Association Table
-----------------
BSSID
IP
Essid AP name Phy Age
--------------- ----------- ------- ------- --- ---
00:0b:86:6d:3e:30 10.15.20.252 sam
-
a 01:03:41
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show station-table | 1291
show storage
show storage
Description
Displays the storage information on the switch.
Syntax
No parameters.
Example
The output of this command shows the storage details on the switch.
(host) # show storage Filesystem /dev/root none /dev/hda3 /dev/usb/flash3 /dev/usbdisk/2 /dev/usbdisk/1
Size 57.0M 70.0M 149.7M
1.5G 3.5G 3.9G
Used Available Use% Mounted on
54.6M
2.3M 96% /
2.0M
68.0M 3% /tmp
9.3M 132.6M 7% /flash
168.6M
1.3G 12% /flash
71.4M
3.2G 2% /mnt/usbdisk/2
131.0M
3.8G 3% /mnt/usbdisk/1
The number at the end of the USB device's name is the partition. Unlike the switch's flash, the USB device has more than two partitions; not just 0 and 1. When copying a file from a USB device, you must know which partition the target file is on.
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1292 | show storage
AOS-W 6.2 | Reference Guide
show switch ip
show switch ip
Description
Displays the IP address of the switch and VLAN ID.
Syntax
No parameters.
Example
The output of this command shows the IP address and VLAN ID of the switch.
(host) # show switch ip Switch IP Address: 10.16.15.1 Switch IP is from Vlan Interface: 1
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show switch ip | 1293
show switch software
show switch software
Description
Displays the details of the software running in the switch.
Syntax
No parameters.
Example
The output of this command shows the details of software running in the switch.
(host) # show switch software
Alcatel-Lucent Operating System-Wireless. AOS-W (MODEL: OAW-650-US), Version 3.4.0.0 Website: http://www.alcatel.com/enterprise All Rights Reserved (c) 2005-2009, Alcatel-Lucent. Compiled on 2009-05-31 at 21:59:21 PDT (build 21443) by p4build ROM: System Bootstrap, Version CPBoot 1.0.0.0 (build 21083) Built: 2009-04-06 20:51:16 Built by: p4build@re_client_21083 Switch uptime is 23 hours 15 minutes 4 seconds Reboot Cause: User reboot. Supervisor Card Processor XLS 408 (revision A1) with 907M bytes of memory. 32K bytes of non-volatile configuration memory. 256M bytes of Supervisor Card System flash (model=NAND 256MB).
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1294 | show switch software
AOS-W 6.2 | Reference Guide
show switches
show switches [all | state {complete | incomplete | inprogress | required} | summary ]
Description
Displays the details of switches connected to the master switch, including the master switch itself.
Syntax
Parameter all state summary
Description List of all switches. Configuration status of all switches. Status of all switches connected to the master.
Example
The output of this command shows that there is a single local switch connected to the master switch. (host) # show switches all
All Switches -----------IP Address Name Config Sync Time (sec) ---------- ------------------------10.16.12.1 r-wing-94 0192.0.2.12 CorpA2400
0
Location
Type Version
Status Configuration State
--------
---- -------
------ -------------------
Building1.floor1 master 6.0.0.0_13782 up Building1.floor1 master 6.0.0.0_13782 up
UPDATE SUCCESSFUL UPDATE SUCCESSFUL
Command History
Version AOS-W 3.0 AOS-W 6.0
Description
Command introduced.
The version column in the output of this command was expanded to include both the version and the build number for switches running AOS-W 6.0 and later releases.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show switches | 1295
show switchinfo
show switchinfo
Description
Displays the latest and complete summary of switch details including role, last configuration change, hostname, reason for last reboot.
Syntax
No parameters.
Example
The output of this command lists all switches connected to the master switch including the master switch. (host) # show switchinfo Hostname is Techpubs Console Baudrate: 115200 Location not configured System Time:Tue Nov 27 16:22:14 PST 2012
Alcatel-Lucent Operating System-Wireless.
AOS-W (MODEL: OAW-7220), Version 6.2.0.0 Website: http://www.alcatel.com/enterprise
All Rights Reserved (c) 2005-2012, Alcatel-Lucent.
Compiled on 2012-11-26 at 17:06:31 PST (build 36290) by p4build ROM: System Bootstrap, Version CPBoot 1.2.0.9 (build 35873) Built: 2012-10-24 13:51:09 Built by: p4build@re_client_35873 Switch uptime is 9 hours 34 minutes 3 seconds Reboot Cause: User reboot. Built: 2012-10-24 13:51:0 Built by: p4build@re_client_35873
Internet address is 172.16.0.254 255.255.255.0 Routing interface is enable, Forwarding mode is enable Directed broadcast is disabled Encapsulation 802, loopback not set MTU 1500 bytes Last clearing of "show interface" counters 0 day 9 hr 34 min 3 sec link status last changed 0 day 9 hr 34 min 3 sec Proxy Arp is disabled for the Interface switchrole:master Configuration unchanged since last save Crash information available.
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1296 | show switchinfo
AOS-W 6.2 | Reference Guide
show syscontact
show syscontact
Description
Displays the contact information for support.
Syntax
No parameters.
Example
The output of this command shows the contact information for technical support. (host) # show syscontact admin@mycompany.com
Command History
This command was available in AOS-W 3.1
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show syscontact | 1297
show syslocation
show syslocation
Description
Displays the location details of the switch.
Syntax
No parameters.
Example
The output of this command location of the switch. (host) # show syslocation Building 1, Floor 1
Command History
This command was available in AOS-W 3.1
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1298 | show syslocation
AOS-W 6.2 | Reference Guide
show tech-support
show tech-support
Description
Displays all information about the switch required for technical support purposes.
Syntax
No parameters.
Command History
This command was available in AOS-W 3.1
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show tech-support | 1299
show telnet
show telnet
Description
Displays the status of telnet access using the command line interface (CLI) or Serial over Ethernet (SOE) to the switch.
Syntax
No parameters.
Example
The output of this command shows the status of CLI and SOE access to the switch. (host) # show telnet
telnet cli is enabled telnet soe is enabled
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1300 | show telnet
AOS-W 6.2 | Reference Guide
show threshold
show threshold all|controlpath-cpu|controlpath-memory|datapath-cpu| no-of-aps|no-of-locals|total-tunnel-capacity|user-capacity|
Description
This command shows switch capacity thresholds which, when exceeded, will trigger alerts.
Syntax
Parameter all controlpath-cpu controlpath-memory datapath-cpu no-of-APs
no-of-locals
total-tunnel-capacity user-capacity
Description
Display all alert thresholds.
Display the alert threshold for controlpath CPU capacity. The output of this command shows the percentage of the total controlpath CPU capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%.
Display the alert threshold for controlpath memory consumption. The output of this command shows the percentage of the total memory capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 85%.
Display the alert threshold for datapath CPU capacity. The output of this command shows the percentage of the total datapath CPU capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 30%.
The maximum number of APs that can be connected to a switch is determined by that switch's model type and installed licenses. This threshold triggers an alert when the number of APs currently connected to the switch exceeds a specific percentage of its total AP capacity. The default threshold for this parameter is 80%.
Display the alert threshold for the master switch's capacity to support remote nodes and local switches. A master switch can support a combined total of 256 remote nodes and local switches. The output of this command shows the percentage of the total master switch capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%.
Display the alert threshold for the switch's tunnel capacity. The output of this command shows the percentage of the switch's total tunnel capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%
Display the alert threshold for the switch's user capacity. The output of this command shows the percentage of the total resource capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%.
Usage Guidelines
The switch will send a wlsxThresholdAbove SNMP trap and a syslog error message when the switch has exceeded a set percentage of the total capacity for that resource. A wlsxThresholdBelow SNMP trap and error message will be
AOS-W 6.2 | Reference Guide
show threshold | 1301
triggered if the resource usage drops below the threshold once again.
Example
The following command shows the current alert thresholds for controlpath memory resources: (host) (config) #show threshold-limits controlpath-memory
Threshold Values For Controlpath Memory
----------------------------------------
Default(%) Current(%) Total Memory (MB) Available Memory (MB)
---------- ---------- ----------------- ---------------------
85
77
679
225
Command History
The command was introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master and local switches
1302 | show threshold
AOS-W 6.2 | Reference Guide
show threshold-limits
show threshold-limits controlpath-memory|fan-speed|no-of-aps|no-of-locals|total-tunnel-capacity|user-capacity
Description
This command shows current values of the different resources monitored by the switch.
Syntax
Parameter
Description
controlpath-memory
The output of this command displays the default memory threshold which, when exceeded, will trigger an alert, the current configured threshold, the total memory (in MB) and the currently available memory (in MB).
fan-speed
The output of this command displays the fan alert threshold. This parameter is only available for switches with fans, such as the OAW-6000 and 7200 series.
no-of-aps
The output of this command displays the following values: l The default threshold for the number of APs, which, when exceeded, will
trigger an alert l The current configured threshold. l The maximum number of APs supported by the switch, l The number of available licenses for campus and remote APs, l The total number of APs, and the current number of campus, remote and virtual
APs.
no-of-locals
The output of this command displays the default threshold for the number of local switches which, when exceeded, will trigger an alert, and the current configured threshold. The output also displays the maximum number of local switches that can be connected to this master switch, and the number of local switches currently connected.
total-tunnel-capacity
The output of this command displays the default tunnel capacity threshold which, when exceeded, will trigger an alert, as well as the current configured tunnel threshold. The output also includes the maximum number of tunnels supported by the switch, as well as the number of tunnels currently used by the switch.
user-capacity
The output of this command displays the default user capacity threshold which, when exceeded, will trigger an alert, as well as the current configured user threshold. The output also includes the maximum number of users supported by the switch, as well as the number of users currently associated with the switch.
Usage Guidelines
The switch will send a wlsxThresholdAbove SNMP trap and a syslog error message when the switch has exceeded a set percentage of the total capacity for that resource. A wlsxThresholdBelow SNMP trap and error message will be triggered if the resource usage drops below the threshold once again.
Example
The following command shows the current alert thresholds for all monitored switch resources:
(host) (config) #show threshold all Controller Capacity Threshold Values
AOS-W 6.2 | Reference Guide
show threshold-limits | 1303
------------------------------------
RESOURCE
THRESHOLD(%)
--------
------------
Datapath-Cpu
30 %
Controlpath-Cpu
80 %
Controlpath-Memory
85 %
Total-Tunnel-Capacity 80 %
Ap-Tunnel-Capacity
80 %
User-Capacity
80 %
No-of-APs
80 %
No-of-locals
80 %
Command History
The command was introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on master and local switches
1304 | show threshold-limits
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
show threshold-limits | 1305
show tpm cert-info
show tpm cert-info
Description
Displays the TPM and Factory Certificate information on MIPS switches (OAW-S3, , OAW-4x04 Series, OAW-4306 Series, OAW-4x50).
Syntax
No parameters.
Usage Guidelines
Use this command to verify that TPM and factory certificates are installed as expected. This command should be executed before enabling CPSec on MIPS switches (OAW-S3, , OAW-4x04 Series, OAW-4306 Series, OAW4x50).
Example
In the example below, the TPM and certificates are installed. (host)#show tpm cert-info
subject= /CN=AF0000168::00:0b:86:f0:33:e0 issuer= /DC=com/DC=arubanetworks/DC=ca/CN=DEVICE-CA2 serial=1F023F05000000015087 notBefore=Jan 30 01:38:57 2009 GMT notAfter=Jan 25 01:38:57 2029 GMT In the example below, the switch is not able to verify the TPM or Factory Certificate information. (host)#show tpm cert-info
Cannot get TPM and Factory Certificate Info TPM and/or Factory Certificates might be missing.
Command History
Release AOS-W 5.0
Modification Command introduced
Command Information
Platforms MIPS switches (OAW-S3, , OAW-4x04 Series, OAW-4306 Series, OAW-4x50)
Licensing Base operating system
Command Mode Enable Mode
1306 | show tpm cert-info
AOS-W 6.2 | Reference Guide
show trunk
show trunk
Description
Displays the list of trunk ports on the switch.
Syntax
No parameters.
Example
The output of this command shows details of a trunk port. (host) # show trunk
Trunk Port Table ----------------Port Vlans Allowed Vlan ---- --------------FE2/12 1,613,615-617,632-633,636-640,667-668
Vlans Active -----------1,613,615-617,632-633,636-640,667-668
Native -------1
Command History
This command was available in AOS-W 3.0
Command Information
Pslatforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show trunk | 1307
show tunneled-node
show tunneled-node [state|database]
Description
Displays the state of the tunneled node and lists all tunneled nodes connected to the switch.
Syntax
No parameters.
Example
The output of this command shows the tunneled node state. (host) # show tunneled-node state
Tunneled Node State --------IP MAC s/p state vlan tunnel inactive-time -- --- --- ----- ---- ------ ------------192.168.123.14 00:0b:86:40:32:40 1/23 complete 10 9 1 192.168.123.14 00:0b:86:40:32:40 1/22 complete 10 10 1 192.168.123.14 00:0b:86:40:32:40 1/20 complete 10 11 1
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced.
The command name was changed to tunneled-node. The database parameter was added.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1308 | show tunneled-node
AOS-W 6.2 | Reference Guide
show uplink
crypto-local show uplink [config|{connection <link_id>}|signal|{stats <link_id}]
Description
Displays uplink configuration details on an OAW-4306 Series switch.
Syntax
Parameter config
connection
signal stats
Description
Enter the keyword config to display the uplink manager, the default wired priority and default cellular priority
Enter the keyword connection followed by the uplink ID number to display the connection details.
Enter the keyword signal to display the cellular uplink signal strength.
Enter the keyword stats followed by the uplink ID number to display the statistical information on the designated uplink.
Example
The output of this command displays the switch uplink status . (host) ##show uplink Uplink Manager: Enabled
Uplink Management Table
-----------------------
Id Uplink Type Properties Priority State
-- ----------- ---------- ------- -----
1 Wired
vlan 1
200
Initializing
2 Cellular Novatel_U727 100
Standby
Status -----Waiting for link Ready
Command History
Introduced in AOS-W 3.4.
Command Information
Platforms OAW-4306 Series switches
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show uplink | 1309
show usb
crypto-local show usb [cellular|ports|test|verbose]
Description
Display detailed USB device information.
Syntax
Parameter cellular ports test
verbose
Description
Enter the keyword cellular to display cellular devices.
Enter the keyword ports to display detailed TTY port information such as signal strength.
Enter the keyword test to test the USB TTY ports. NOTE: Testing an invalid modem port may cause the switch to "hang". To resolve this, unplug and re-plug the modem.
Enter the keyword verbose to display detailed USB information including serial number and USB type.
Examples
The USB Device table, in the example below, displays the USB port is in the 'Device Ready' state, meaning that the port has passed the diagnostic test and is ready to send and receive data.
(host) (config-cellular new_modem)# show usb
USB Device Table
----------------
Address Product
Vendor ProdID
------- -------
------ ------
18
Novatel Wireless CDMA 1410 4100
ready
Serial -----091087843891000
Type ---Cellular
Profile ------new_modem
State ----Device
Below is an example of the show usb verbose display output (partial).
(host) #show usb verbose ... T: Bus=01 Lev=02 Prnt=02 Port=00 Cnt=01 Dev#= 3 Spd=12 MxCh= 0 D: Ver= 1.10 Cls=00(>ifc ) Sub=00 Prot=00 MxPS=64 #Cfgs= 1 P: Vendor=1410 ProdID=4100 Rev= 0.00 S: Manufacturer=Novatel Wireless Inc. S: Product=Novatel Wireless CDMA S: SerialNumber=091087843891000 C:* #Ifs= 5 Cfg#= 1 Atr=a0 MxPwr=500mA ...
Command History
Introduced in AOS-W 3.4.
1310 | show usb
AOS-W 6.2 | Reference Guide
Command Information
Platforms
OAW-4306 Series and OAW4x50 switches
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
show usb | 1311
show user
show user ap-group <ap-group> ap-name <ap-name> authentication-method dot1x|mac|opensystem|psk|stateful-dot1x|via-vpn|vpn|web[rows <NUMBER> <NUMBER>] bssid <A:B:C:D:E:F> rows <NUMBER> <NUMBER> devtype <device> essid <STRING> rows <NUMBER> <NUMBER> internal rows <NUMBER> <NUMBER> ip <A.B.C.D> rows <NUMBER> <NUMBER> location b.f.l rows <NUMBER> <NUMBER> mac <A:B:C:D:E:F> mobile {[bindings][visitors]} [rows <NUMBER> <NUMBER>] name <STRING> phy-type {[a]|[b]}[rows <NUMBER> <NUMBER>] role <STRING> rows <NUMBER> <NUMBER> rows <NUMBER> <NUMBER>
Description
Displays detailed information about the switch's connection to a user device, in regards to mobility state and statistics, authentication statistics, VLAN assignment method, AP datapath tunnel info, radius accounting statistics, user name, user-role derivation method, datapath session flow entries, and 802.11 association state and statistics. The show user command allows you to filter specific information by parameter.
Syntax
Parameter ap-group <ap-group>
ap-name <ap-name>
authentication-method
dot1x mac opensystem psk
stateful-dot1x via-vpn vpn web
Description Filter the output of this command by showing users connected to APs that belong to the specified AP group.
Filter the output of this command by the name of the AP to which the user is conected.
Filter the output of this command by the authentication method used for the device:
Show data for devices using 802.1X authentication.
Show data for devices using MAC authentication.
Show data for devices using open (no) authentication.
Show data for devices that do not use authentication but use a preshared key for encryption.
Show data for devices using stateful 802.1X authentication.
Show data for devices that authenticate using Alcatel-Lucent VIA.
Show data for devices using VPN authentication.
Show data for devices using captive portal authentication.
1312 | show user
AOS-W 6.2 | Reference Guide
Parameter
Description
rows <NUMBER> <NUMBER>
Displays the log output from the specified number of rows from the end of the log and the total number of rows to display.
bssid <A:B:C:D:E:F>
Show user data for a specific device BSSID.
devtype <device>
Show output for a specified device type, if identified. If the device name includes spaces, you must enclose it in quotation marks.
essid <STRING>
Show user data for a specific ESSID. If the ESSID includes spaces, you must enclose it in quotation marks.
internal rows <NUMBER> <NUMBER> Display internal user entries only. Include the rows options to filter the output of this command by specifying the number of rows from the end of the output and the total number of rows to display/
ip <A.B.C.D>
Show user data for a specific IP address .
mac <A:B:C:D:E:F>
MAC address .
mobile
Filter the output of this command to show data for Mobile users.
bindings
Show data for users that have moved away from their home network.
visitors
Show data for mobility users that are visiting the network.
name <STRING>
User's name.
phy-type
801.11 type
a
Matches PHY type a.
g
Matches PHY type b or g.
role <STRING>
User role such as employee, visitor and so on.
rows <NUMBER> <NUMBER>
Filter the output of the show user role command by specifying the number of rows from the end of the output and the total number of rows to display/
rows <NUMBER> <NUMBER>
Filter the output of the show user command by specifying the number of rows from the end of the output and the total number of rows to display/
Usage Guidelines
Use the show user command to show detailed user statistics which includes the entire output of the user-table, mobility state and statics, authentication statistics, VLAN assignment method, AP datapath tunnel information, radius accounting statistics, user-role derivation method, datapath session flow entries and 802.11 association state and statistics.
Examples
This example displays users currently in the employee role. The output of this command is split into two tables in this document, however it appears in one table in the CLI.
(host) (config) show user role employee
Users
-----
IP
MAC
Name
name
Role
Age(d:h:m) Auth VPN link AP
AOS-W 6.2 | Reference Guide
show user | 1313
-----------192.168.160.1 10.100.105.100 wlan-qa-cage 10.100.105.102 10.100.105.97 10.100.105.109
------------
00:23:6c:80:3d:bc 00:05:4e:45:5e:c8
00:14:a5:30:c2:7f 00:1b:77:c4:a2:fa 00:21:5c:02:16:bb
------
madisonl CORP1NETWORKS
pdedhia CORP1NETWORKS myao
----
employee employee
employee employee employee
----------
01:05:50 00:02:22
01:20:09 00:02:18 00:05:40
----
802.1x 802.1x
802.1x 802.1x 802.1x
--------
---1263
2198 2198 1109
Users ----Roaming
------Associated Associated Associated Associated Associated
Essid/Bssid/Phy ---------------
ethersphere-wpa2/00:1a:1e:85:d3:b1/a-HT ethersphere-wpa2/00:1a:1e:6f:e5:51/a ethersphere-wpa2/00:1a:1e:87:ef:f1/a ethersphere-wpa2/00:1a:1e:87:ef:f1/a ethersphere-wpa2/00:1a:1e:85:c2:11/a-HT
Profile -------
default default default default default
The output of the show user mac <mac-addr> and show user ip <ip-addr> commands include the following information.
(host) # show user-table ip 5.5.5.2 Name: 98:0c:82:45:d6:7b, IP: 5.5.5.2, MAC: 98:0c:82:45:d6:7b, Role: mac-role, ACL: 54/0/0, Age: 00:00:07 Authentication: Yes, status: started, method: MAC, protocol: PAP, server: Internal Bandwidth = No Limit Bandwidth = No Limit Role Derivation: default for authentication type MAC VLAN Derivation: unknown Idle timeouts: 0, Valid ARP: 0 Mobility state: Wireless, HA: Yes, Proxy ARP: No, Roaming: No Tunnel ID: 0 L3 Mob: 0 Flags: internal=0, trusted_ap=0, l3auth=0, mba=1, vpnflags=0, u_stm_ageout=1 Flags: innerip=0, outerip=0, vpn_outer_ind:0, guest=0, download=1, wispr=0 Auth fails: 0, phy_type: g-HT, reauth: 0, BW Contract: up:0 down:0, user-how: 14 Vlan default: 3, Assigned: 5, Current: 5 vlan-how: 0 DP assigned vlan:0 Mobility Messages: L2=0, Move=0, Inter=0, Intra=0, Flags=0x0 Tunnel=0, SlotPort=0x2000, Port=0x1000d (tunnel 13) Role assigment - L3 assigned role: n/a, VPN role: n/a, Dot1x cached role: n/a Current Role name: mac-role, role-how: 1, L2-role: mac-role, L3-role: mac-role Essid: 1_wlan_135, Bssid: d8:c7:c8:38:f4:a0 AP name/group: d8:c7:c8:cb:8f:4a-135/groupfor135 Phy-type: g-HT RadAcct sessionID:n/a RadAcct Traffic In 4/216 Out 2/420 (0:4/0:0:0:216,0:2/0:0:0:420) Timers: reauth 0 Profiles AAA:1_wlan_135-aaa_prof, dot1x:dot1x_prof-rwv10, mac:pMac CP: def-role:'logon' siprole:'' via-auth-profile:'' ncfg flags udr 0, mac 1, dot1x 1, RADIUS interim accounting 0 IP Born: 1354560806 (Mon Dec 3 10:53:26 2012) Core User Born: 1354560805 (Mon Dec 3 10:53:25 2012) Upstream AP ID: 0, Downstream AP ID: 0 Device Type: Dalvik/1.4.0 (Linux; U; Android 2.3.6; SAMSUNG-SGH-I777 Build/GINGERBREAD) Session Timeout from Radius: No, Session Timeout Value:0 Address is from DHCP: yes
The role-how and vlan-how parameters in the output of this command display a code that corresponds to the following values:
1314 | show user
AOS-W 6.2 | Reference Guide
Role Derivation Code 0 1 2 3 4 5 6 7 8 9 10 11
Description Default logon role Default user role for authentication type Role derived from server rules Role derived from user rules Predefined Guest role Role inherited from station Forced role Role derived from Alcatel-Lucent vendor-specific attribute (VSA) RFC 3576 (Change of Authorization) role Role derived from external captive portal Default role from AAA profile Role assigned by an Extended Service Interface (ESI) server group
VLAN Derivation Code 1 2 3 4 5
6
Description VLAN derived from user rule VLAN derived from user role VLAN derived from server rule VLAN derived from Alcatel-Lucent vendor-specific attribute (VSA) VLAN derived from Microsoft Tunnel attributes (Tunnel-Type, Tunnel Medium Type, and Tunnel Private Group ID) VLAN assigned from derived role
Command History
Release AOS-W 3.0 AOS-W 6.1
AOS-W 6.1
AOS-W 6.2
Modification
Command introduced
The devtype parameter was introduced, and the output of this command expanded to include the Type column.
The devtype parameter was introduced, and the output of this command expanded to include the Type column.
Output for IP address show if it is from DHCP.
This command was introduced in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show user | 1315
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Available in Enable and Config modes.
1316 | show user
AOS-W 6.2 | Reference Guide
show user_session_count (deprecated)
show user_session_count
Description
Show the number of users using an ESSID for different time intervals.
Syntax
No parameters
Command History
Version AOS-W 3.0 AOS-W 6.0
Modification Command introduced Command deprecated
AOS-W 6.2 | Reference Guide
show user_session_count (deprecated) | 1317
show util_proc
show util_proc guest-email counters
Description
Show counters for the guest email process.
Syntax
No parameters.
Usage Guidelines
As part of guest provisioning, the guest access email feature allows you to define the SMTP port and server that processes guest provisioning email. This server sends email to the guest or the sponsor when a guest user manually sends email from the Guest Provisioning page, or when a user creates a guest account.
Example
The output of this command shows the numbers of guest emails received, sent and dropped since the switch was last reset
(host) #show util_proc guest-email counters
Guest Email Counters
--------------------
Name
Value
----
-----
Email Received 14
Email Sent
3
Email Dropped 0.
Related Commands
To configure SMTP servers and server ports for guest email, use the command guest-access-email.
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
1318 | show util_proc
AOS-W 6.2 | Reference Guide
show valid-network-oui-profile
show valid-network-oui-profile
Description
This command displays the Valid Equipment OUI Profile table
Syntax
No parameters
Usage Guidelines
If you used the valid-networkoui-profile to add a new OUI to the switch, issue the show valid-network-oui-profile command to see a list of current OUIs.
Example
(Host) (config) #show valid-network-oui-profile
Valid Equipment OUI profile
---------------------------
Parameter Value
--------- -----
OUI
00:1A:1E
Command History
Release AOS-W 5.0
Modification Command introduced
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
show valid-network-oui-profile | 1319
show version
show version
Description
Show the system software version.
Syntax
No parameters.
Example
host) #show version Alcatel-Lucent Operating System-Wireless. AOS-W (MODEL: OAW-4504-US), Version 6.0.0.0 Website: http://www.alcatel.com/enterprise All Rights Reserved (c) 2005-2010, Alcatel-Lucent. Compiled on 2008-12-17 at 22:52:36 PST (build 20263) by p4build
ROM: System Bootstrap, Version CPBoot 1.2.11 (Sep 13 2005 - 17:39:11)
Switch uptime is 41 days 8 hours 57 minutes 18 seconds Reboot Cause: User reboot. Supervisor Card Processor 16.20 (pvr 8081 1014) with 256M bytes of memory. 32K bytes of non-volatile configuration memory. 256M bytes of Supervisor Card System flash (model=CF 256MB). The output of this command includes the following information
Parameter Model Version ROM Switch Uptime Reboot Cause Supervisor Card
Description Switch model type. Version of AOS-W software. System bootstrap version. Switch uptime (time elapsed since the last switch reset. Reason the switch was last rebooted. Details for the switch's internal supervisor card.
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config mode on local and master switches
1320 | show version
AOS-W 6.2 | Reference Guide
show via
show via version websessions
Description
Displays VIA version and web session details.
Syntax
Parameter version
Description Displays the version of VIA client available on the switch.
Range Default
--
--
websessions Displays the list of users connected to the VIA switch using the VIA
--
--
client.
Example
The following example displays the version of VIA client available on the switch.
(host) # show via version(host) (VIA Client WLAN Profile "example") #show Default VIA Installer: ---------------------<aruba>
<via> <platform>win32</platform> <version>1.0.0.23373</version>
</via> </aruba>
via version
Command History
This command was available in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show via | 1321
show vlan-bwcontract-explist
show vlan-bwcontract-explist [internal]
Description
Show entries in the VLAN bandwidth contracts MAC exception lists.
Syntax
Parameter internal
Description
Include the optional internal parameter to display the MAC addresses in the internal, preconfigured VLAN bandwidth contracts MAC exception list.
Example
The following command displays the MAC addresses in the internal MAC exception list.
(host) (config) #show vlan-bwcontract-explist internal
VLAN BW Contracts Internal MAC Exception List --------------------------------------------MAC address ----------01:80:C2:00:00:00 01:00:0C:CC:CC:CD 01:80:C2:00:00:02 01:00:5E:00:82:11
Command History
Command introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or Config mode on master or local switches
1322 | show vlan-bwcontract-explist
AOS-W 6.2 | Reference Guide
show vlan
show vlan <id>
Description
This command shows a configured VLAN interface number, description and associated ports.
Syntax
Parameter <id>
Description Identification number for the VLAN.
Range 1-4094
Default 1
Usage Guidelines
Issue this command to show the selected VLAN configuration. The VLAN column lists the VLAN ID. The Description column provides the VLAN name or number and the Ports column shows the VLAN's associated ports. The AAA Profile column shows if a wired AAA profile has been assigned to a VLAN, enabling role-based access for wired clients connected to an untrusted VLAN or port on the switch.
(host) #show vlan
VLAN CONFIGURATION
------------------
VLAN Description
---- -----------
1
Default
10 VLAN0010
20 RAP_VLAN
25 VLAN0025
30 VLAN0030
56 VLAN0056
57 VLAN0057
58 VLAN0058
Ports ----GE0/3-7 GE0/9 XG0/10-11 Pc0-7 GE0/8
GE0/0
AAA Profile ----------N/A N/A N/A mac-auth-aaa-prof N/A default default default
Related Commands
(host) (config) #vlan (host) (config) #vlan-name
Command History
Release AOS-W 3.0 AOS-W 6.0
Modification Command available. The output of this command was modified to include the AAA Profile column.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master or local switches
AOS-W 6.2 | Reference Guide
show vlan | 1323
show vlan mapping
show vlan mapping
Description
This command shows a configured VLAN name, its pool status, assignment type and the VLAN IDs assigned to the pool.
Syntax
Parameter <id>
Description Identification number for the VLAN.
Range 1-4094
Default 1
Usage Guidelines
Issue this command to show the selected VLAN configuration. The VLANName column displays the name of the VLAN pool. The Pool Status column indicates if the pool is enabled or disabled. The VLAN IDs column lists the VLANs that are part of the pool.
(host) #show vlan mapping
Vlan Mapping Table
------------------
VLAN Name
Pool Status
---------
-----------
mygroup
Enabled
newpoolgroup Enabled
vlannametest Enabled
yourvlan
Disabled
Assignment Type --------------Hash Even Even N/A
VLAN IDs -------62,94
62,1511 62
Related Commands
(host) (config) #vlan (host) (config) #vlan-name
Command History
Release AOS-W 3.0 AOS-W 6.2
Modification Command introduced. The Assignment Type parameter was introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master or local switches
1324 | show vlan mapping
AOS-W 6.2 | Reference Guide
show vlan status
show vlan status <id>
Description
This command shows the current status of all VLANs on the switch.
Syntax
No parameters.
Usage Guidelines
Issue this command to show the status of VLANs on the switch. The VLANID column displays the VLAN ID name or number. The IP Address column provides the VLAN's IP address. The Adminstate column indicates if the VLAN is enabled or disabled. The Operstate column indicates if the VLAN is currently up and running. The PortCount column shows how many ports are associated with the VLAN. The Nat Inside column displays whether source Nat is enabled for the VLAN interface. If Nat is enabled, all the traffic passing through this VLAN interface is the source natted to the outgoing interface's IP address.
(host) #show vlan status
Vlan Status
-----------
VlanId IPAddress
------ ---------
1
10.168.254.221/255.255.255.252
2
unassigned/unassigned
4
unassigned/unassigned
25
unassigned/unassigned
212
10.168.212.2/255.255.255.0
213
10.168.213.2/255.255.255.0
1170 10.3.132.14/255.255.255.0
Adminstate ---------Enabled Enabled Enabled Enabled Enabled Enabled Enabled
Operstate --------Up Down Down Down Down Down Up
PortCount --------5 2 1 1 2 2 2
Nat Inside ---------Disabled Disabled Disabled Disabled Disabled Disabled Disabled
Related Commands
(host) (config) #vlan (host) (config) #vlan-name
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master or local switches
AOS-W 6.2 | Reference Guide
show vlan status | 1325
show vlan summary
show vlan summary
Description
This command shows the number of existing VLANs.
Syntax
Parameter Number of existing VLANs
Description The number of existing VLANs on the switch.
Usage Guidelines
Issue this command to show the number of existing VLANs on the switch.
(host) #show vlan summary
Number of existing VLANs
:13
Related Commands
(host) (config) #vlan (host) (config) #vlan-name
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable or config mode on master or local switches
1326 | show vlan summary
AOS-W 6.2 | Reference Guide
show voice call-cdrs
show voice call-cdrs [bssid <value> | cid <value> | count <number> | detail | essid <value> | extn <value> | ip <ip-address> | proto {sip | svp | noe | sccp | vocera | h323} | rtpa | sta <mac-address>]
Description
Displays detailed call records of voice client.
Syntax
Parameter bssid cid count detail
essid extn ip proto rtpa
sta
Description
Filter records based on BSSID of voice clients.
View the detailed records filtered on the CDR Id.
Specify the number of records to be displayed by entering a number.
Include this parameter to view the following additional information for each call record. l Reason l Codec l Band l Setup Time (sec) l Re-Assoc l Initial-BSSID l Initial-ESSID l Initial-AP Name
Filter records based on ESSID of voice clients.
View detailed records for a particular extension number.
View detailed records of voice client using its IP address.
View detailed records filtered on protocol.
Include this parameter to view the voice call quality reports based on the call quality analysis from the RTP media streams. NOTE: This parameter is applicable only if Real Time Call Quality Analysis is enabled on the voice calls.
View the detailed records filtered on the MAC address of a voice client.
Example
The output of this command shows detailed call records filtered by SIP protocol and limited to 5 entries. (host) #show voice call-cdrs proto sip count 5 detail
Voice Client(s) CDRs (Detail)
-----------------------------
CDR Id Client IP Client Name ALG Dir Called/Calling Party Status
time
R-value Reason
Codec Band Setup Time(sec) Re-Assoc
Initial-ESSID Initial-AP Name
Dur(sec) Orig Initial-BSSID
AOS-W 6.2 | Reference Guide
show voice call-cdrs | 1327
------ --------- ----------- --- --- -------------------- ------
-------- -------
--
------- ------
----- ---- --------------- -------- -------------
--
----------- ---------------
NA
10.15.20.74 6202
sip IC 6203
CONNECTED 2773
Aug 19
13:39:09 82
G729 GREEN 0
0
00:1a:1e:a8:2d:80
legap
AP-65-2
NA
10.15.20.75 6203
sip OG 6202
CONNECTED 2774
Aug 19
13:39:08 65
G729 YELLOW 3
0
NA
NA
NA
56
10.15.20.74 6202
sip IC 6203
SUCC
390
Aug 19
13:20:03 60
Terminated G729 YELLOW 0
0
00:1a:1e:a8:2d:80
legap
AP-65-2
55
10.15.20.75 6203
sip OG 6202
SUCC
390
Aug 19
13:20:03 61
Terminated G729 YELLOW 3
0
00:1a:1e:a8:2d:80
legap
AP-65-2
54
10.15.20.75 6203
sip OG 6203
FAIL
0
Aug 19
13:19:57 NA
NA
NA
0
0
00:1a:1e:a8:2d:80
legap
AP-65-2
Num CDRS:5
Command History
Version AOS-W 3.3.1 AOS-W 6.0
Description Command introduced. The cid and rtpa parameters were introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
1328 | show voice call-cdrs
AOS-W 6.2 | Reference Guide
show voice call-counters
show voice call-counters
Description
Displays outgoing, incoming and terminated call counter details. The total calls equals the sum of the calls originated and terminated. It also equals the sum of the active, success, failed, blocked, aborted, and forwarded calls.
Syntax
No parameters.
Example
The output of this command shows call counter statitics.
(host) # show voice call-counters
System Wide Voice Call Counters
-------------------------------
Total Call Originated Call Terminated
----- --------------- ---------------
31
16
15
Active -----0
Success ------29
Failed -----0
Blocked ------0
Aborted ------2
Forwarded --------0
Command History
Version AOS-W 3.3.1
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice call-counters | 1329
show voice call-density
show voice call-density [bssid <value> | essid <value> | extn <value> | ip <ip-address> | proto <protocol>]
Description
Displays call density report for voice calls.
Syntax
Parameter bssid essid extn ip <ip-address> proto <protocol>
Description
Filter records based on BSSID of voice clients.
Filter records based on ESSID of voice clients.
Filter records based on the extension of a voice client.
Filter records based on the IP address of an AP.
Filter records based on a VOIP protocol. Supported values are: l SIP l SVP l NOE l SCCP l VOCERA l H323
Example
The output of this command shows call density report for extension 3015. (host) # show voice call-density extn 3015
VoIP Call Density Report for Client '3015'
------------------------------------------
Sample Time
Orig Term Active Succ Fail
-----------
---- ---- ------ ---- ----
Jan 31 16:01:42 0
0
0
0
0
Jan 31 16:00:00 0
0
0
0
0
Jan 31 15:50:00 0
0
0
0
0
Jan 31 15:40:00 0
0
0
0
0
Jan 31 15:30:00 0
0
0
0
0
Jan 31 15:20:00 0
1
1
1
0
Jan 31 15:10:00 0
2
3
2
0
Jan 31 15:00:00 0
1
1
0
0
Jan 31 14:50:00 0
0
0
0
0
Jan 31 14:40:00 0
0
0
0
0
Jan 31 14:30:00 0
0
0
0
0
Jan 31 14:20:00 0
0
0
0
0
Jan 31 14:10:00 0
0
0
0
0
...
...
...
Blocked ------0 0 0 0 0 0 0 0 0 0 0 0 0
Aborted ------0 0 0 0 0 0 0 1 0 0 0 0 0
Forwarded --------0 0 0 0 0 0 0 0 0 0 0 0 0
R-Value ------NA NA NA NA NA 73.000000 84.000000 80.000000 NA NA NA NA NA
1330 | show voice call-density
AOS-W 6.2 | Reference Guide
Command History
Version AOS-W 3.0
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice call-density | 1331
show voice call-perf
show voice call-perf [bssid <value> | essid <value> | extn <value> | ip <ip_address> | proto <value>
Description
Displays the performance of voice calls of all clients connected to the switch. You can filter the report based on BSSID, ESSID, extension, IP address or the VOIP protocol type.
Syntax
Parameter bssid essid extn ip <ip-address> proto <protocol>
Description
Filter records based on BSSID of voice clients.
Filter records based on ESSID of voice clients.
Filter records based on the extension of a voice client.
Filter records based on the IP address of an AP.
Filter records based on a VOIP protocol. Supported values are: l SIP l NOE l SCCP l VOCERA l H323
Example
The output of this command shows call performance report for extension 3015.
(host) # show voice call-perf extn 3015
VoIP Call Performance Report for Client '3015'
----------------------------------------------
Sample Time
Delay(ms) AP-Switch Delay(ms)
-----------
--------- -------------------
Jan 31 15:54:46 0.00
0.00
Jan 31 15:50:00 0.00
0.00
Jan 31 15:40:00 0.00
0.00
Jan 31 15:30:00 0.00
0.00
Jan 31 15:20:00 108.24
0.00
Jan 31 15:10:00 106.67
0.00
Jan 31 15:00:00 0.00
0.00
Jan 31 14:50:00 0.00
0.00
Jan 31 14:40:00 0.00
0.00
Jan 31 14:30:00 0.00
0.00
...
...
...
Jitter -----0.000 0.000 0.000 0.000 7.793 12.500 0.000 0.000 0.000 0.000
Packet Loss ----------0.00 0.00 0.00 0.00 8.81 4.44 0.00 0.00 0.00 0.00
R-Value ------0.00 0.00 0.00 0.00 73.00 84.00 0.00 0.00 0.00 0.00
MOS --NA NA NA NA 3.60 4.02 NA NA NA NA
Band ---NA NA NA NA YELLOW GREEN NA NA NA NA
Command History
Version AOS-W 3.3.1
Description Command introduced.
1332 | show voice call-perf
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice call-perf | 1333
show voice call-quality
show voice call-quality [bssid <value> | essid <value> | extn <value> | ip <ip_address> | proto <value> | rtpa | sta <mac-address>
Description
Displays voice call quality for each call over a period of time.
Syntax
Parameter bssid essid extn ip <ip-address> proto <protocol>
rtpa
sta
Description
Filter records based on BSSID of voice clients.
Filter records based on ESSID of voice clients.
Filter records based on the extension of a voice client.
Filter records based on the IP address of a voice client.
Filter records based on a VOIP protocol. Supported values are: l SIP l NOE l SCCP l VOCERA l H323
Include this parameter to view the voice call quality reports based on the call quality analysis from the RTP media streams. NOTE: This parameter is applicable only if Real Time Call Quality Analysis is enabled on the voice calls.
Filter records based on the MAC address of a voice client.
Example
The output of this command shows call quality report for calls made by extension 3015. (host) # show voice call-quality extn 3015
Voice Client(s) Call Quality Reports
------------------------------------
Client(IP) Client(MAC)
Client(Name) ALG Orig Time
Direction
Called/Calling Party Duration Codec Delay Jitter Pkt Loss R-Value Band BSSID
ESSID AP Name
---------- -----------
------------ --- ---------
--------- -------------
------- -------- ----- ----- ------ -------- ------- ---- -----
-----
-------
10.100.1.10 00:11:22:33:bc:bd 3015
sccp Jan 31 15:10:44 IC
3042
141
108.241 7.793 8.809
73
YELLOW 00:0b:86:5c:d6:08 nkrtp
voice-a
10.100.1.10 00:11:22:33:bc:bd 3015
sccp Jan 31 15:07:48 IC
3042
119
115.333 13.000 8.480
78
YELLOW 00:0b:86:5c:d6:08 nkrtp
voice-a
10.100.1.10 00:11:22:33:bc:bd 3015
sccp Jan 31 15:01:22 IC
3042
35
98.000 12.000 0.391
90
GREEN 00:0b:86:5c:d6:08 nkrtp
voice-a
1334 | show voice call-quality
AOS-W 6.2 | Reference Guide
10.100.1.10 00:11:22:33:bc:bd 3015
100
G711 103.528 6.056
voice-a
Num Records:4
sccp Jan 31 14:58:58 IC
3042
4.622
80
GREEN 00:0b:86:5c:d6:08 nkrtp
Command History
Version AOS-W 3.3.1 AOS-W 6.0
Description Command introduced. The rtpa and sta parameters were introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice call-quality | 1335
show voice call-stats
show voice call-stats [bssid <value> | cip <client-ip-address> | essid <value> | extn <value> | ip <ip_address> | proto <value> | sta <value>]
Description
Displays voice call statistics for each client.
Syntax
Parameter bssid cip essid extn ip <ip-address> proto <protocol>
sta
Description
Filter records based on BSSID of a voice client.
Filter records based on a client's IP address.
Filter records based on ESSID of a voice client.
Filter records based on the extension of a voice client.
Filter records based on the IP address of an AP.
Filter records based on a VOIP protocol. Supported values are: l SIP l NOE l SCCP l VOCERA l H323
Filter records based on the MAC address of a voice client.
Example
The output of this command shows call quality report for calls made by extension 6210. (host) # show voice call-stats
Voice Client(s) Call Statistics
-------------------------------
Client IP
Client MAC
Client Name ALG Originated Terminated Active Failed
Success Blocked Aborted Duration
R-Value
Band
---------
----------
----------- --- ---------- ---------- ------ ------ --
----- ------- ------- --------
-------
----
10.15.86.248 00:1f:6c:7a:d4:fd 6005
sccp 3
2
0
0
5
0
0
20489.0/2.0/4173.0 93.00/79.00/89.00 GREEN
10.15.86.247 00:1f:6c:7a:d5:f8 6002
sccp 2
3
0
0
4
0
1
57709.0/2.0/11616.8 93.00/71.00/87.00 GREEN
Num Clients:2
Command History
Version AOS-W 3.3.1
Description Command introduced.
1336 | show voice call-stats
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice call-stats | 1337
show voice client-status
show voice client-status [active-only | bssid | essid <value> | extn <value> | ip <ip_address> | proto <value> | sta <value>]
Description
Displays list of voice clients and their status. You can also view details of a specifc voice client.
Syntax
Parameter active-only bssid essid extn ip <ip-address> proto <protocol>
sta
Description
Filter records based on active voice clients
Filter records based on BSSID of a voice client.
Filter records based on ESSID of a voice client.
Filter records based on the extension of a voice client.
Filter records based on the IP address of a voice client.
Filter records based on a VOIP protocol. Supported values are: l SIP l SVP l NOE l SCCP l VOCERA l H323
Filter records based on the MAC address of a voice client.
Example
The output of this command shows details about all the voice clients on a switch. (host) #show voice client-status
Voice Client(s) Status
----------------------
Client(IP) Client(MAC)
Client Name ALG Server(IP)
Status BSSID
ESSID
AP Name Flags
---------- -----------
----------- --- ----------
- -----
-----
------- -----
10.15.22.32 00:1f:6c:7a:d5:30 6001
sccp 10.15.32.20
00:1a:1e:80:bb:10 keepwalking1 AP-L-125
Num Clients:1
Flags: V - Visitor, W - Wired, R - Remote
Registration State -----------------REGISTERED
Call ---------Idle
Command History
Version AOS-W 3.3.1 AOS-W 6.0
Description Command introduced. The sta parameter was introduced.
1338 | show voice client-status
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice client-status | 1339
show voice configurations
show voice configurations
Description
Displays the details of the voice related configurations on your switch.
Syntax
No parameters.
Example
The output of this command shows details about all voice configurations on a switch.
(host) #show voice configurations
Voice firewall policies
-----------------------
Policy
Action
------
------
Stateful SIP Processing
Enabled
Broadcast-filter ARP
Disabled
SSID Profiles
-------------
Profile Name
WMM
EDCA AP prof Strict SVP
------------
---
----------- ----------
default
Enabled
default
Disabled
qa-ma-vocera
Enabled
default
Disabled
WMM-UAPSD TSPEC Min Inactivity(msec) ... EDCA STA prof
--------- -------------------------- ... ------------- -
Enabled 100000
... default
Enabled 0
default
AP Group Profiles
-----------------
Profile Name VoIP CAC Profile
------------ ----------------
default
default
local
default
Virtual AP Group Profiles
-------------------------
Profile Name
802.11K Profile
Broadcast ARP to Unicast
------------
---------------
------------------
abcd
default
Disabled
HA Discovery on-assoc. ---------------------Disabled
Drop Broadcast/Multicast -----------------------Disabled
----
VoIP Call Admission Control Profiles
------------------------------------
Profile Name VoIP CAC
------------ ---------
default
Disabled
802.11K Profiles
----------------
Profile Name Advertise 802.11K Capability
------------ ----------------------------
default
Disabled
1340 | show voice configurations
AOS-W 6.2 | Reference Guide
SIP settings ------------s Parameter --------Session Timer Session Expiry Dialplan Profile
Value ----Disabled 300 sec N/A
Voice rtcp-inactivity:disable Voice sip-midcall-req-timeout:disable
Command History
Version AOS-W 6.0
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice configurations | 1341
show voice dialplan-profile
show voice dialplan-profile <profile>
Description
Displays list of SIP voice dialplan. You can also specify a dialplan to view configuration.
Syntax
No parameter.
Example
The output of this command shows list of all dialplans and the configuration of long distance dialplan.
(host) (config) #show voice dialplan-profile
Dialplan Profile List
---------------------
Name
References Profile Status
----
---------- --------------
default
1
extenstion 0
local
0
longDistance 0
Total:4
(host) (config) #show voice dialplan-profile longDistance Dialplan Profile "longDistance" ------------------------------Parameter Value --------- ----dialplan 102 +1XXXXXXXXXX 9%e
Command History
Version AOS-W 5.0
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
1342 | show voice dialplan-profile
AOS-W 6.2 | Reference Guide
show voice logging
show voice logging
Description
Displays the MAC address of the voice client that has logging enabled.
Syntax
No parameters.
Example
The output of this command shows the MAC address of the voice client that has logging enabled. (host) #show voice logging
VoIP Logging -----------Parameter --------Client's MAC Address for Logging
Value ----11:22:33:44:55:67
Command History
Version AOS-W 6.0
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice logging | 1343
show voice msg-stats
show voice msg-stats [sccp { bssid <value> | cip <client-ip-address> | essid <value> | ip <ip_address> | sta <client-MAC-address> } ] [sip { bssid <value> | cip <client-ip-address> | essid <value> | ip <ip_address> | sta <client-MAC-address> } ]
Description
Displays voice message counters for each call using either the SCCP or SIP protocol.
Syntax
Parameter bssid cip essid ip sta
Description Filter records based on BSSID of a voice client. Filter records based on a client's IP address. Filter records based on ESSID of a voice client. Filter records based on the IP address of an AP. Filter records based on the MAC address of a voice client.
Example
The output of the command in the example below shows voice message statistics for essid sam filtered on SCCP protocol. In this example, the output has been divided into multiple sections to better fit on the pages of this document. In the actual command-line interface, it will appear in a single, long table.
(host) # show voice msg-stats sccp essid sam
SCCP Voice Client(s) Msg Statistics
-----------------------------------
Client Name Client IP
AP Name
Unregister
----------- ---------
-------
----
6005
10.15.86.248 AP-68-862
2
6002
10.15.86.247 AP-68-862
2
BSSID ----00:0b:86:6d:3e:30 00:0b:86:6d:3e:30
ESSID Register
----- --------
sam 43
5
sam 39
6
Register Ack ------------
1 2
------
Unregister Ack Keepalive Keepalive Ack OpenRecvChannel OpenRecvChannel Ack StartMedia
CloseRecvChannel
-------------- --------- ------------- --------------- ------------------- ---------- --
--------------
5950
6185
7
4
6
7
6
5936
6048
4
4
4
7
6
StopMedia OffHook OnHook Ringing Connected Busy Hold Transfer Invalid
--------- ------- ------ ------- --------- ---- ---- -------- -------
5
17
2
8
0
0
0
0
4
18
3
4
0
0
0
0
Num Clients:2
1344 | show voice msg-stats
AOS-W 6.2 | Reference Guide
Command History
Version AOS-W 3.3.1
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice msg-stats | 1345
show voice real-time-analysis
show voice real-time-analysis [sta <client MAC address>]
Description
Displays the call quality parameters based on the call quality analysis on the RTP media streams for voice calls.
Syntax
Parameter sta
Description
View the detailed Real Time Call Quality analysis report for a voice client based on the MAC address. You can also view the average call quality values for all the clients without passing the MAC address.
Example
The output of this command shows the detailed call quality parameters based on the RTP media stream for a specific voice client. #show voice real-time-analysis sta 00:1f:6c:7a:d5:30
Real-Time Analysis detail report
--------------------------------
Time
Jitter(U)(msec) Pkt-loss(U)(%)
Pkt-loss(D)(%) Delay(D)(usec) rvalue(D)
---------------- --------------- --------------
-------------- -------------- ---------
Aug 17 11:55:18 71.000
0.000
0.000
0.000
NA
Aug 17 11:55:13 76.000
0.000
0.000
0.000
NA
Aug 17 11:55:08 69.000
0.000
0.000
0.000
NA
Aug 17 11:55:03 71.000
0.000
0.000
0.000
NA
...
...
...
Delay(U)(usec) -------------0.000 0.000 0.000 0.000
rvalue(U) --------93.360 93.360 93.360 93.360
Jitter(D)(msec) --------------0.000 0.000 0.000 0.000
Command History
Version AOS-W 6.0
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
1346 | show voice real-time-analysis
AOS-W 6.2 | Reference Guide
show voice real-time-analysis-config
show voice real-time-analysis-config
Description
Displays the status of Real Time Call Quality Analysis configuration.
Syntax
No parameters.
Example
The output of this command shows the status of Real Time Call Quality Analysis configuration on a switch. (host) #show voice real-time-config
Configure Real-Time Analysis ---------------------------Parameter --------Real-Time Analysis of voice calls
Value ----Enabled
Command History
Version AOS-W 6.0
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice real-time-analysis-config | 1347
show voice rtcp-inactivity
show voice rtcp-inactivity
Description
Displays the status of RTCP protocol.
Syntax
No parameters.
Example
The output of this command shows the status of RTCP protocol. (host) #show voice rtcp-inactivity Voice rtcp-inactivity:disable
Command History
Version AOS-W 3.3.1
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
1348 | show voice rtcp-inactivity
AOS-W 6.2 | Reference Guide
show voice sip
show voice sip
Description
Displays the SIP settings on the switch.
Syntax
No parameters.
Example
The output of this command shows the SIP settings on a switch. (host) #show voice sip
SIP settings ------------s Parameter --------Session Timer Session Expiry Dialplan Profile
Value ----Enabled 300 sec N/A
Command History
Version AOS-W 6.0
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice sip | 1349
show voice sip-midcall-req-timeout
show voice sip-midcall-req-timeout
Description
Displays the status of the SIP mid-call request timeout configuration on the switch.
Syntax
No parameters.
Example
The output of this command shows the status of the SIP mid-call request timeout configuration on a switch.
(host) #show voice sip-midcall-req-timeouts Voice sip-midcall-req-timeout:disable
Command History
Version AOS-W 6.0
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
1350 | show voice sip-midcall-req-timeout
AOS-W 6.2 | Reference Guide
show voice statistics
show voice statistics [ cac | sip-dialplan-hits | tspec-enforcement ]
Description
Displays the CAC, UDP SIP dial plan hits, and TSPEC enforced voice statistics.
Syntax
Parameter cac
sip-dialplan-hits tspec-enforcement
Description
Displays the dropped SIP Invites and SIP Status Code for both server and the client side. Note: This filter supports only the SIP protocol and will work only if CAC is enabled for the parameters.
Displays the statistics of SIP dialplan hits.
Displays the statistics of the number of TSPEC requests accepted, rejected, or denied.
Example
The output of this command shows statistics for TSPEC enforced calls. (host) # show voice statistics tspec-enforcement
TSPEC Enforcement statistics ---------------------------Name ---TSPEC ADDTS Request TSPEC accepted TSPEC denied due to CAC TSPEC enforcement timer events Calls established within enforcement period TSPEC deleted after enforcement period
Value ----16 16 0 2 0 1
Command History
Version AOS-W 3.3.1
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice statistics | 1351
show voice trace
show voice trace [ sccp {count <value> | ip <ip_address> | mac <mac_address>} ] [ sip {count <value> | ip <ip_address> | mac <mac_address>} ]
Description
Displays the signalling message trace details for all clients.
Syntax
Parameter count ip mac
Description
View the specified number of the latest SIP or SCCP voice client messages. Specify an integer value.
Specify the IP address of a client to display its SIP or SCCP voice client messages.
Specify the IP address of a client to display its SIP or SCCP voice client messages.
Example
The output of this command shows signaling message trace.
(host) #show voice trace sip count 4
SIP Voice Client(s) Message Trace
---------------------------------
ALG Client Name Client(MAC)
BSSID
--- ----------- -----------
-----
SIP 6201
00:24:7d:99:49:01
00:1a:1e:a8:2d:80
SIP 6201
00:24:7d:99:49:01
00:1a:1e:a8:2d:80
SIP 6201
00:24:7d:99:49:01
REQUEST_FAILURE 00:1a:1e:a8:2d:80
SIP 6201
00:24:7d:99:49:01
00:1a:1e:a8:2d:80
Num of Rows:4
Client(IP) ---------10.15.20.59 10.15.20.59 10.15.20.59 10.15.20.59
Event Time ---------Aug 17 10:21:22 Aug 17 10:21:22 Aug 17 10:21:22 Aug 17 10:21:22
Direction --------Server-To-Client Client-To-Server Server-To-Client Client-To-Server
Msg --200_OK REGISTER 4XX_ REGISTER
Command History
Version AOS-W 3.3.1 AOS-W 6.0
Description Command introduced. The trace output included the BSSID parameter.
1352 | show voice trace
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show voice trace | 1353
show vpdn l2tp configuration
show vpdn l2tp configuration
Description
Displays the VPN L2TP tunnel configuration.
Syntax
No parameters.
Example
The output of this command shows the L2TP tunnel configuration.
(host) # show vpdn l2tp configuration
Enabled Hello timeout: 30 seconds DNS primary server: 10.16.15.1 DNS secondary server: 10.16.14.1 WINS primary server: 0.0.0.0 WINS secondary server: 0.0.0.0 PPP client authentication methods:
PAP IP LOCAL POOLS:
vpnpool: 10.16.15.150 - 10.16.15.160
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1354 | show vpdn l2tp configuration
AOS-W 6.2 | Reference Guide
show vpdn pptp configuration
show vpdn pptp configuration
Description
Displays the PPTP configuration on the switch.
Syntax
No parameters.
Example
The output of this command shows the L2TP tunnel configuration.
(host) # show vpdn pptp configuration
Enabled Hello timeout: 30 seconds DNS primary server: 10.15.1.1 DNS secondary server: 10.15.1.200 WINS primary server: 0.0.0.0 WINS secondary server: 0.0.0.0 PPP client authentication methods:
MSCHAP MSCHAPv2 MPPE Configuration 128 bit encryption enabled IP LOCAL POOLS
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show vpdn pptp configuration | 1355
show vpdn pptp local pool
show vpdn pptp local pool <pool_name>
Description
Displays the IP address pool for VPN users using Point-to-Point Tunneling Protocol.
Syntax
No parameters.
Example
The output of this command shows the all IP address pools for VPN users. (host) # show vpdn pptp local pool
IP addresses used in pool localgroup 0 IPs used - 11 IPs free - 11 IPs configured
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1356 | show vpdn pptp local pool
AOS-W 6.2 | Reference Guide
show vpn-dialer
show vpn-dialer <dialer_name>
Description
Displays the VPN dialer configuration for users using VPN dialers.
Syntax
No parameters.
Example
The output of this command shows the VPN dialer configuration for remote Users.
(host) # show vpn-dialer remoteUser
remoteUser ---------Attribute --------PPTP L2TP DNETCLEAR WIREDNOWIFI PAP CHAP MSCHAP MSCHAPV2 CACHE-SECURID IKESECS IKEENC IKEGROUP IKEHASH IKEAUTH IKEPASSWD IPSECSECS IPSECGROUP IPSECENC IPSECAUTH SECURID_NEWPINMODE
Value ----disabled enabled disabled disabled enabled enabled enabled enabled disabled 4000 3DES ONE MD5 PRE-SHARE ******** 4000 GROUP1 ESP-3DES ESP-MD5-HMAC disabled
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show vpn-dialer | 1357
show vrrp
show vrrp <vrid>
Description
Displays the list of all VRRP configuration on the switch. To view a specific VRRP configuration, specify the VRID number.
Syntax
No parameters.
Example
The output of this command shows the VRRP configuration enabled in one of the floors of the building.
(host) # show vrrp Virtual Router 2:
Description Floor-1 Settings Admin State DOWN, VR State INIT IP Address 10.15.1.10, MAC Address 00:00:5e:00:01:02, vlan 1 Priority 2, Advertisement 10 sec, Preemption Enable Delay 10 Auth type PASSWORD, Auth data: 123456 tracking type is master-up-time, duration 500 minutes, value 3 tracking type is vrrp-master-state, vrid 10, value 1 tracking type is vlan, vlanid 1, subtract value 3 tracking type is interface, fastethernet 1/1, subtract value 3 tracked priority 2
Command History
Version AOS-W 1.0 AOS-W 3.3 AOS-W 3.3.2
Modification Command introduced
The tracking interface and tracking vlan parameters were introduced.
The add option was removed from the tracking interface and tracking vlan parameters.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
1358 | show vrrp
AOS-W 6.2 | Reference Guide
show web-server
show web-server
Description
Displays the configuration of the switch's web server.
Syntax
No parameters.
Example
The output of this command shows the web-server configuration.
(host) # show web-server
Web Server Configuration -----------------------Parameter --------Cipher Suite Strength SSL/TLS Protocol Config Switch Certificate Captive Portal Certificate Management user's WebUI access method User session timeout <30-3600> (seconds) Maximum supported concurrent clients <25-400>
Value ----high sslv3 tlsv1 default default username/password 900 25
Command History
This command was available in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config or Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show web-server | 1359
show whitelist-db cpsec
show whitelist-db cpsec [mac-address <mac-address>]
Description
Display the campus AP whitelist for campus APs using the control plane security feature.
Syntax
Parameter mac-address <mac-address>
Description
MAC address of the campus AP you want to enter into the cpsec whitelist database.
Usage Guidelines
Use this command to display the contents of the control plane security whitelist. To view information for a single AP, use the command show whitelist-db cpsec mac-address <mac-address>. To view a list of all secure APs on your switch, use the command show whitelist-db cpsec. If your deployment includes both master and local switches, then the campus AP whitelist on every switch contains an entry for every secure AP on the network, regardless of the switch to which it is connected.
Example
The output of the following command shows the campus AP whitelist entry for an AP with the MAC address 00:16:CF:AF:3E:E1:
(host) #show whitelist-db cpsec mac-address 00:16:CF:AF:3E:E1
Control-Plane Security Whitelist-entry Details
----------------------------------------------
MAC-Address
Enable State
Cert-Type
Secondary Last
Text Key
Updated
-----------
------ -----
---------
-
--------- ---------
00:16:CF:AF:3E:E1 Enabled certified-controller-cert switch-cert
Fri Oct 16 01:
Whitelist Entries: 1 The output of this command includes
Syntax
Parameter MAC-Address Enable State
Description
MAC address of the campus AP.
Shows whether the campus AP has been enabled or disabled.
Shows the current state of the campus AP. l unapproved-no-cert: AP has no certificate and is not approved. l unapproved-factory-cert: AP has a preinstalled certificate that was not
approved. l approved-ready-for-cert: AP is valid, but is waiting to receive a certificate.
1360 | show whitelist-db cpsec
AOS-W 6.2 | Reference Guide
Parameter
Cert-Type Description Revoke Text Secondary Key Last Updated
Description
l certified-factory-cert: AP has an approved factory-installed certificate l certified-controller-cert: AP has an approved certificate from the switch. l certified-hold-factory-cert: An AP is put in this state when the switch thinks the
AP has been certified with a factory certificate yet the AP requests to be certified again. Since this is not a normal condition, the AP will not be reapproved as a secure AP until a network administrator manually changes the status of the AP to verify that it is not compromised. l certified-hold-controller-cert: An AP is put in this state when the switch thinks the AP has been certified with a switch certificate yet the AP requests to be certified again. Since this is not a normal condition, the AP will not be reapproved as a secure AP until a network administrator manually changes the status of the AP to verify that it is not compromised.
Type of certificate used by the AP. l switch-cert: AP received a certificate from the switch l factory-cert: AP has a factory-installed certificate
If you included an optional description when you added the AP to the campus AP whitelist, that description will appear here.
If you included an optional revoke description when you manually revoked the AP, that description will appear here.
For internal use only.
Date and time that the AP record was last updated in the database.
Related Commands
Command whitelist-db cpsec add mac-address <mac-address>
Description
Configure the campus AP whitelist for the control plane security feature.
Mode
Config mode
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show whitelist-db cpsec | 1361
show whitelist-db cpsec-local-switch-list
show whitelist-db cpsec-local-switch-list [mac-address <mac-address>]
Description
Display the list of local switches with APs using the control plane security feature.
Syntax
Parameter mac-address <mac-address>
Description MAC address of the local switch whose data you want to view.
Usage Guidelines
When you use the control plane feature on a network with both master and local switches, the master switch maintains a whitelist of local switches with APs using control plane security. When you change a campus AP whitelist on any switch, that switch contacts the master switch to check the local switch whitelist, then contacts every other switch on the local switch whitelist to notify it of the change. This allows an AP to move between local switches and still stay connected to the secure network.
To view information for a single local switch, use the command show whitelist-db cpsec-local-list mac-address <mac-address>. To view a list of all local switches, use the command show whitelist-db cpsec-local-switch-list.
Example
The following command shows information for all local switchs in the local switch whitelist:
(host) #show whitelist-db cpsec-local-switch-list
Registered Local Switch Details
-----------------------------------
MAC-Address
IP-Address Sequence Number Remote Sequence Number
-----------
---------- --------------- ----------------------
00:0b:86:51:a5:4c 10.3.53.2
31
0
00:A0:C9:14:C8:29 10.3.53.4
30
0
NULL Update Count -----------------
Whitelist Entries: 2 The output of this command includes
Syntax
Parameter MAC-Address IP-Address Sequence Number
Description
MAC address of the local switch.
IP address of the local switch.
The number of times the local switch in the whitelist received and acknowledged a campus AP whitelist change from the master switch. In the example above, both local switches received and acknowledged three campus AP whitelist changes sent from the master switch.
1362 | show whitelist-db cpsec-local-switch-list
AOS-W 6.2 | Reference Guide
Parameter Remote Sequence Number
Null Update Count
Description
The number of times that the master switch has received and acknowledged a campus AP whitelist change from the local switch in the whitelist. In the example above, the master switch received and acknowledged a single campus AP whitelist change from the local switch with the MAC address 00:0b:86:51:a5:4c.
The number of times the switch has checked its control plane security whitelist and found nothing to synchronize with the remote switch. By default, the switch compares its control plane security whitelist against whitelists on other switches every minute. If the null update count reaches 5, the switch will send an "empty sync" heartbeat to the remote switch to ensure the sequence numbers on both switches are the same, then reset the null update count to zero.
Related Commands
Command
whitelist-db cpsec-local-switchlist
Description
Mode
Configure the local switch whitelist for the control plane Config mode security feature.
Command History
Version AOS-W 5.0 AOS-W 6.0
Modification Command introduced The cpsec-local-ctrlr-list parameter was modified to cpsec-local-switch-list
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
show whitelist-db cpsec-local-switch-list | 1363
show whitelist-db cpsec-master-switch-list
show cpsec-master-ctlr-list-db cpsec show whitelist-db cpsec-master-switch-list [mac-address <mac-address>]
Description
Display the master switch list whitelist on local switches with APs using the control plane security feature.
Syntax
Parameter mac-address <mac-address>
Description MAC address of the master switch.
Usage Guidelines
When you use the control plane feature on a network with both master and local switches, each local switch has a master switch whitelist which contains the IP and MAC addresses of its master switch. If your network has a redundant master switch, then this whitelist will contain more than one entry.
To view information for a single master switch, use the command show whitelist-db cpsec-master-switch-list mac-address <mac-address>. To view a list of all master switches, use the command show whitelist-db cpsecmaster-switch-list.
Example
The following command shows that the local switches have a single master switch with the IP address 10.3.53.3:
(host) #show whitelist-db cpsec-master-list
Registered Master Switch Details
------------------------------------
MAC-Address
IP-Address Sequence Number Remote Sequence Number NULL Update Count
-----------
---------- --------------- ---------------------- -----------------
00:0b:86:61:21:c8
10.3.53.3 1
3
Whitelist Entries: 1 The output of this command includes
Syntax
Parameter MAC-Address IP-Address Sequence Number
Description
MAC address of the master switch.
IP address of the master switch.
The number of times the master switch in the whitelist received and acknowledged a campus AP whitelist change from the local switch. In the example above, the master switch received and acknowledged one campus AP whitelist change from the local switch.
1364 | show whitelist-db cpsec-master-switch-list
AOS-W 6.2 | Reference Guide
Parameter Remote Sequence Number
Null Update Count
Description
The number of times that the local switch has received and acknowledged a campus AP whitelist change from the master switch in the whitelist. In the example above, the local switch received and acknowledged three campus AP whitelist updates from the master switch.
The number of times the switch has checked its control plane security whitelist and found nothing to synchronize with the master switch. By default, the switch compares its control plane security whitelist against whitelists on other switches every minute. If the null update count reaches 5, the switch will send an "empty sync" heartbeat to the remote switch to ensure the sequence numbers on both switches are the same, then reset the null update count to zero.
Related Commands
Command whitelist-db cpsec-masterswitch-list
Description
Configure the master switch whitelist for the control plane security feature.
Mode Config mode
Command History
Version AOS-W 5.0 AOS-W 6.0
Modification
Command introduced
The cpsec-master-ctrlr-list parameter was modified to cpsec-master-switchlist
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Config mode on local switches
AOS-W 6.2 | Reference Guide
show whitelist-db cpsec-master-switch-list | 1365
show whitelist-db cpsec-seq
show whitelist-db cpsec-seq
Description
Display the current sequence number for the master or local switch whitelists.
Syntax
No Parameters
Usage Guidelines
The current sequence number in the Sequence Number Details table shows the number of changes to the campus AP whitelist made on this switch.
Each switch compares its campus AP whitelist against whitelists on other switches every two minutes. If a switch detects a difference, it will send its changes to the other switches on the network. If all other switches on the network have successfully received and acknowledged all whitelist changes made on this switch, every entry in the sequence number column in the switch whitelist will have the same value as the number displayed in the Sequence Number Details table. If a switch in the master or local switch whitelist has a lower sequence number, that switch may still be waiting to complete its update, or its update acknowledgement may not have yet been received.
Example
The output of the first command below shows that the campus AP whitelist has been updated 3 times on the master switch. The second command shows the local switch list on the master switch, and verifies that both local switches have received and acknowledged all three of these changes.
(host) #show whitelist-db cpsec-seq
Sequence Number Details
-----------------------
Table Name
Current Seq Number
----------
------------------
cpsec_whitelist 3
Whitelist Entries: 97
(host) # show whitelist-db cpsec-local-list
Registered Local Controller Details
-----------------------------------
MAC-Address
IP-Address Sequence Number
-----------
---------- ---------------
00:0b:86:51:a5:4c 10.3.53.2
3
0
00:A0:C9:14:C8:29 10.3.53.4
3
0
Remote Sequence Number ---------------------1
0
NULL Update Count -----------------
Whitelist Entries: 2
Related Commands
Command
whitelist-db cpsec add mac-address <mac-address>
Description
Configure the campus AP whitelist for the control plane security feature.
Mode
Config mode
1366 | show whitelist-db cpsec-seq
AOS-W 6.2 | Reference Guide
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show whitelist-db cpsec-seq | 1367
show whitelist-db cpsec-status
show whitelist-db cpsec-status
Description
Display aggregate status information APs in the campus AP whitelist.
Syntax
No parameters.
Example
The output of the following command shows current status information for all APs in the campus AP whitelist: (host) #show whitelist-db cpsec cpsec-status Entries in Whitelist database
Total entries:
41
Approved entries:
0
Unapproved entries:
0
Certified entries:
40
Certified hold entries:
0
Revoked entries:
1
Marked for deletion entries: 0
(Host) # The output of this command includes
Syntax
Parameter Total entries Approved entries: Unapproved entries Certified entries Certified hold entries
Revoked entries Marked for deletion entries
Description
Total number of entries in the campus AP whitelist
Number of APs that are valid, but is waiting to receive a certificate.
Number of APs that have certificate that was not not approved.
Number of APs that have an approved certificate.
Number of APs in the certified hold state. An AP is put in this state when the switch thinks the AP a certified certificate yet the AP requests to be certified again. Since this is not a normal condition, the AP will not be reapproved as a secure AP until a network administrator manually changes the status of the AP to verify that it is not compromised.
Number of APs whose entries have been revoked
Number of APs whose entries have been marked for deletion. An entry will not be permanently deleted until all other switches on the network acknowledge the deletion.
1368 | show whitelist-db cpsec-status
AOS-W 6.2 | Reference Guide
Related Commands
Command show whitelist-db cpsec
Description
Display the campus AP whitelist for campus APs using the control plane security feature.
Mode Config mode
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show whitelist-db cpsec-status | 1369
1370 | show whitelist-db cpsec-status
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
show whitelist-db cpsec-status | 1371
The example below shows that the switch has two configured 3GPP profiles. The References column lists the number of other profiles with references to the advertisement profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column
1372 | show whitelist-db cpsec-status
AOS-W 6.2 | Reference Guide
The example below shows that the switch has two configuredDomain Name profiles. The References column lists the number of other profiles with references to the Domain Name profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column
AOS-W 6.2 | Reference Guide
show whitelist-db cpsec-status | 1373
The example below shows that the switch has three configured IP Address Availability profiles. The References column lists the number of other profiles with references to the IP Address Availability profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column
1374 | show whitelist-db cpsec-status
AOS-W 6.2 | Reference Guide
The example below shows that the switch has three configured NAI Realm profiles. The References column lists the number of other profiles with references to the NAI Realm profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column
(host) # show wlan anqp-nai-realm-profile
ANQP NAI Realm Profile List
---------------------------
Name
References Profile Status
----
---------- --------------
default 0
Realm1 2Realm2 2
Total:3
AOS-W 6.2 | Reference Guide
show whitelist-db cpsec-status | 1375
The example below shows that the switch has two configured Network Authentication profiles. The References column lists the number of other profiles with references to the Network Authentication profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
(host) # show wlan anqp-nwk-auth-profile
ANQP Network Authentication Profile List
----------------------------------------
Name
References Profile Status
----
---------- --------------
auth1
0
default
0
Total:2
(host) #show wlan anqp-nwk-auth-profile default
ANQP Network Authentication Profile "default"
------------------------------------------------
Parameter
Value
---------
-----
Type of Network Authentication acceptance
Redirect URL
N/A
1376 | show whitelist-db cpsec-status
AOS-W 6.2 | Reference Guide
The example below shows that the switch has two configured Roaming Consortium profiles. The References column lists the number of other profiles with references to the Roaming Consortium profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
AOS-W 6.2 | Reference Guide
show whitelist-db cpsec-status | 1377
The example below shows that the switch has two configured Venue Name profiles. The References column lists the number of other profiles with references to the Venue Name profile, and the Profile Status column indicates whether the profile is predefined. User-defined profiles will not have an entry in the Profile Status column.
1378 | show whitelist-db cpsec-status
AOS-W 6.2 | Reference Guide
show wlan bcn-rpt-req-profile
show wlan bcn-rpt-req-profile<profile-name>
Description
Shows configuration and other information about the parameters for the Beacon Report Request frames.
Syntax
Parameter <profile>
Description Name of a WLAN advertisement profile.
Usage Guidelines
Issue this command without the <profile> parameter to display the entire Beacon Report Request profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
For this profile to take effect, the 802.11K feature needs to be enabled.
Examples
(host) #show wlan bcn-rpt-req-profile
Beacon Report Request Profile List
----------------------------------
Name
References Profile Status
----
---------- --------------
default 1
test
0
Total:2
(host) #
(host) #show wlan bcn-rpt-req-profile default
Beacon Report Request Profile "default"
---------------------------------------
Parameter
Value
---------
-----
Interface
1
Regulatory Class
12
Channel
9
Randomization Interval
100
Measurement Duration
100
Measurement Mode for Beacon Reports active-all-ch
Reporting Condition
2
ESSID Name
aruba-ap
Reporting Detail
Disabled
Measurement Duration Mandatory
Disabled
Request Information values
0/21/22
The output of this command includes the following parameters:
AOS-W 6.2 | Reference Guide
show wlan bcn-rpt-req-profile | 1379
Parameter
Description
Interface
Specifies the Radio interface for transmitting the Beacon Report Request frame. It can have a value of either 0 or 1.
Regulatory Class
Specifies the Regulatory Class field in the Beacon Report Request frame.
Channel
Specifies the Channel field in the Beacon Report Request frame.
Randomization Interval
Specifies the Randomization Interval field in the Beacon Report Request frame. The Randomization Interval is used to specify the desired maximum random delay in the measurement start time. It is expressed in units of TUs (Time Units).
Measurement Duration
Specifies the Measurement Duration field in the Beacon Report Request frame. The Measurement Duration is set to the duration of the requested measurement. It is expressed in units of TUs.
Measuremement Mode for Beacon Reports
Specifies the mode used for the measurement. The valid measurement modes are: l active-all-ch l active-ch-rpt l beacon-table l passive
Reporting Condition
Specifies the value for the "Reporting Condition" field in the Beacon Reporting Information sub-element present in the Beacon Report Request frame.
ESSID Name
Specifies the value for the "SSID" field in the Beacon Report Request frame.
Reporting Detail
Indicates the value for the "Detail" field in the Reporting Detail subelement present in the Beacon Report Request frame.
Measurement Duration Mandatory Specifies the "Duration Mandatory" bit of the Measurement Request Mode field of the Beacon Report Request frame.
Request Information values
Indicates the contents of the Request Information IE that could be present in the Beacon Report Request frame. The Request Information IE is present for all Measurement Modes except the 'Beacon Table' mode. It consists of a list of Element IDs that should be included by the client in the response frame.
Command History
The command is introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master or local switches
1380 | show wlan bcn-rpt-req-profile
AOS-W 6.2 | Reference Guide
show wlan dot11k-profile
show wlan dot11k-profile [<profile>]
Description
Show a list of all 802.11k profiles, or display detailed configuration information for a specific 802.11k profile.
Syntax
Parameter <profile>
Description Name of an 802.11k profile.
Usage Guidelines
Issue this command without the <profile> parameter to display the 802.11k profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has two configured 802.11k profiles. The References column lists the number of other profiles with references to the 802.11k profile, and the Profile Status column indicates whether the profile is predefined. (User-defined profiles will not have an entry in the Profile Status column.)
(host) #show wlan dot11k-profile
802.11K Profile List
--------------------
Name
----
default
11kprofile2
1
Total: 2
References Profile Status ---------- -------------8
The following example shows configuration settings defined for the profile default.
(host) #show wlan dot11k-profile default
802.11K Profile "default" ------------------------Parameter --------Advertise 802.11K Capability Forcefully disassociate on-hook voice clients Measurement Mode for Beacon Reports Configure specific channel for Beacon Requests Channel requested for Beacon Reports in 'A' band Channel requested for Beacon Reports in 'BG' band Time duration between consecutive Beacon Requests Time duration between consecutive Link Measurement Requests Time duration between consecutive Transmit Stream Measurement Requests
Value ----Disabled Disabled beacon-table Disabled 36 1 60 sec 60 sec 90 sec
The output of this command includes the following data columns:
AOS-W 6.2 | Reference Guide
show wlan dot11k-profile | 1381
Parameter
Description
Advertise 802.11K Capability
Shows if the profile has enabled or disabled the 802.11K feature.
Forcefully disassociate If enabled, the AP may forcefully disassociate clients that reach the maximum
on-hook voice clients
CAC peak capacity or call handoff reservation.
Measurement Mode for Beacon Reports
Shows the profile's beacon measurement mode: l active: In this mode, the client sends a probe request to the broadcast
destination address on all supported channels, sets a measurement duration timer, and, at the end of the measurement duration, compiles all received beacons or probe response with the requested SSID and BSSID into a measurement report. l beacon-table: In this mode, the client measures beacons and returns a report with stored beacon information for any supported channel with the requested SSID and BSSID. The client does not perform any additional measurements. This is the default beacon measurement mode. l passive: In this mode, the client sets a measurement duration timer, and, at the end of the measurement duration, compiles all received beacons or probe response with the requested SSID and BSSID into a measurement report.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches.
1382 | show wlan dot11k-profile
AOS-W 6.2 | Reference Guide
show wlan edca-parameters-profile
show wlan edca-parameters-profile ap|station [<profile>]
Description
Display an Enhanced Distributed Channel Access (EDCA) profile for APs or for clients (stations). EDCA profiles are specific either to APs or clients.
Syntax
Parameter <profile>
Description Name of a EDCA Parameters profile.
Usage Guidelines
Issue this command without the <profile> parameter to display a EDCA Parameters profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has three EDCA Parameters profiles configured for stations. The References column lists the number of other profiles with references to the EDCA Parameters profile, and the Profile Status column indicates whether the profile is predefined. (User-defined profiles will not have an entry in the Profile Status column.)
(host) #show wlan edca-parameters-profile station
EDCA Parameters profile (Station) List
---------------------------------
Name
References Profile Status
----
---------- --------------
station-corp1 3
station-corp2 1
testprofile 0
Total:3
The following example shows configuration settings defined for the profile station-corp1.
(host) #show wlan edca-parameters-profile ap station-corp1
EDCA Parameters
---------------
AC
ECWmin ECWmax AIFSN TXOP ACM
--
------ ------ ----- ---- ---
Best-effort 4
6
3
0
0
Background 4
10
7
0
0
Video
3
4
1
94 0
Voice
2
3
1
47 0
The output of this command includes the following data columns:
Parameter AC
Description Name of an Access channel queue (Best-effort, Background, Video or Voice).
AOS-W 6.2 | Reference Guide
show wlan edca-parameters-profile | 1383
Parameter ECWmin
ECWmax
AIFSN TXOP ACM
Description
The exponential (n) value of the minimum contention window size, as expressed by 2n-1. A value of 4 computes to 24-1 = 15.
The exponential (n) value of the maximum contention window size, as expressed by 2n-1. A value of 4 computes to 24-1 = 15.
Arbitrary inter-frame space number.
Transmission opportunity, in units of 32 microseconds.
If this column displays a 1, the profile has enabled mandatory admission control. If this column displays a 0, the profile has disabled this feature.
Command History
This command was introduced in AOS-W 3.1.
Command Information
Platforms All platforms
Licensing
This show command is available in the base operating system, but the switch must have the PEFNG license in order to configure EDCA Parameter Profiles.
Command Mode
Enable and Config mode on master or local switches
1384 | show wlan edca-parameters-profile
AOS-W 6.2 | Reference Guide
show wlan handover-trigger-profile
show wlan handover-trigger-profile [<profile-name>]
Description
Displays the current configuration settings for a handover trigger profile.
Usage Guidelines
Issue this command without the <profile> parameter to display a handover trigger profile profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
For this profile to take effect, the 802.11K feature needs to be enabled.
Example
(host) #show wlan handover-trigger-profile default Handover Trigger Profile "default" ---------------------------------Parameter --------Enable Handover Trigger feature Enabled Threshold signal strength value at which Handover Trigger should be sent to the client dBm
Value -----
25 -
The output of this command includes the following information:
Parameter Enable Handover Trigger feature
Threshold signal strength value at which Handover Trigger should be sent to the client
Description
Shows if the handoff trigger feature is enabled of disabled. If enabled, the switch will initiate the handover of a voice client (for example: dual mode handsets) roaming at the edge of Wi-Fi coverage to an alternate carrier or connection. The handover trigger is initiated if the Wi-Fi signal strength reported by the voice client (received from all APs) is equal to or less than the threshold value.
Shows the threshold RSSI value below which a handover trigger message will be sent to an associated client by the AP.
Command History
This command was introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master or local switches
AOS-W 6.2 | Reference Guide
show wlan handover-trigger-profile | 1385
1386 | show wlan handover-trigger-profile
AOS-W 6.2 | Reference Guide
show wlan ht-ssid-profile
show wlan ht-ssid-profile [<profile>]
Description
Show a list of all High-throughput SSID profiles, or display detailed configuration information for a specific Highthroughput SSID profile.
Syntax
Parameter <profile>
Description Name of a High-throughput SSID profile.
Usage Guidelines
Issue this command without the <profile> parameter to display the entire High-throughput SSID profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has two configured High-throughput SSID profiles. The References column lists the number of other profiles with references to the High-throughput SSID profile, and the Profile Status column indicates whether the profile is predefined. (User-defined profiles will not have an entry in the Profile Status column.)
(host) #show wlan ht-ssid-profile
High-throughput SSID profile List
---------------------------------
Name
----
HT-profile1
16default2
References Profile Status ---------- --------------
1
Total:2
The following example shows configuration settings defined for the profile default2.
(host) #show wlan ht-ssid-profile default High-throughput SSID profile "default2" -------------------------------------Parameter --------40 MHz channel usage BA AMSDU Enable High throughput enable (SSID) Legacy stations Low-density Parity Check Maximum number of spatial streams usable for STBC reception Maximum number of spatial streams usable for STBC transmission MPDU Aggregation Max received A-MPDU size Max transmitted A-MPDU size Min MPDU start spacing Short guard interval in 20 MHz mode Short guard interval in 40 MHz mode Supported MCS set
Value ----Enabled Enabled Enabled Allowed Enabled 1 1 Enabled 65535 bytes 65535 bytes 8 usec Enabled Enabled 0-23
AOS-W 6.2 | Reference Guide
show wlan ht-ssid-profile | 1387
. The output of this command includes the following data columns:
Parameter 40 MHz channel usage BA AMSDU Enable High throughput enable (SSID) Legacy stations Low-density Parity Check
Maximum number of spatial streams usable for STBC reception
Maximum number of spatial streams usable for STBC transmission
MPDU Aggregation Max received A-MPDU size Max transmitted A-MPDU size
Description
Shows if the profile enables or disables the use of 40 MHz channels.
Shows of the AP has enabled or disabled the ability to receive AMSDU in BA negotiation.
Shows if the profile enables or disables high-throughput (802.11n) features.
Allow or disallow associations from legacy (non-HT) stations. By default, this parameter is enabled (legacy stations are allowed).
If enabled, the AP will advertise Low-density Parity Check (LDPC) support. LDPC improves data transmission over radio channels with high levels of background noise.
Shows the maximum number of spatial streams usable for STBC reception. 0 disables STBC reception, 1 uses STBC for MCS 0-7. Higher MCS values are not supported. (Supported on the OAW-AP90 series, OAWAP130 Series, OAW-AP68, OAW-AP175 and OAWAP105 only. The configured value will be adjusted based on AP capabilities.)
Shows the maximum number of spatial streams usable for STBC transmission. 0 disables STBC transmission, 1 uses STBC for MCS 0-7. Higher MCS values are not supported. (Supported on OAW-AP90 series, OAWAP175, OAW-AP130 Series and OAW-AP105 only. The configured value will be adjusted based on AP capabilities.)
Shows if the profile enables or disables MAC protocol data unit (MPDU) aggregation.
Configured maximum size of a received aggregate MPDU, in bytes.
Configured maximum size of a transmitted aggregate MPDU, in bytes.
Min MPDU start spacing Supported MCS set
Short guard interval in 20 MHz mode
Configured minimum time between the start of adjacent MPDUs within an aggregate MPDU, in microseconds.
Displays a list of Modulation Coding Scheme (MCS) values or ranges of values to be supported on this SSID. The MCS you choose determines the channel width (20MHz vs. 40MHz) and the number of spatial streams used by the mesh node.
Shows if the profile enables or disables use of short (400ns) guard interval in 20 MHz mode.
1388 | show wlan ht-ssid-profile
AOS-W 6.2 | Reference Guide
Parameter Short guard interval in 20 MHz mode
Description
Shows if the profile enables or disables use of short (400ns) guard interval in 40 MHz mode.
Command History
Version AOS-W 3.3 AOS-W 3.3.1 AOS-W 3.3.2 AOS-W 6.1
Description
Command introduced
The Legacy Stations parameter was introduced
De-aggregation of MAC Service Data Units (A-MSDUs) was introduced
The following parameters were introduced: l Short guard interval in 20 MHz mode l Low-density Parity Check l Maximum number of spatial streams usable for STBC reception l Maximum number of spatial streams usable for STBC transmission The allow weak encryption parameter was deprecated.
Command Information
Platforms
All platforms but operates with IEEE 802.11n compliant devices only
Licensing
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
show wlan ht-ssid-profile | 1389
show wlan ssid-profile
show wlan ssid-profile [<profile>]
Description
Show a list of all SSID profiles, or display detailed configuration information for a specific SSID profile.
Syntax
Parameter <profile>
Description Name of an SSID profile.
Usage Guidelines
Issue this command without the <profile> parameter to display the entire SSID profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has six configured SSID profiles. The References column lists the number of other profiles with references to the SSIDs profile, and the Profile Status column indicates whether the profile is predefined. (User-defined profiles will not have an entry in the Profile Status column.)
(host) #show wlan ssid-profile SSID Profile List ----------------Name ---coltrane-ssid-profile corp1 -ssid-profile Remote Secure-Profile2 test-ssid-profile wizardtest-ssid-profile
References ---------1
1 0 1 1
Profile Status --------------
3
Total:6 The following example shows configuration settings defined for the SSID Profile Remote. (host) #show wlan ssid-profile remote
(host) #show wlan ssid-profile remote SSID Profile "Remote" (host) #show wlan ssid-profile remote ------------------Parameter --------SSID enable ESSID Encryption Enable Management Frame Protection Require Management Frame Protection DTIM Interval 802.11a Basic Rates 802.11a Transmit Rates 802.11g Basic Rates
Value ----Enabled aruba-ap opensystem Disabled Disabled 1 beacon periods 6 12 24 6 9 12 18 24 36 48 54 12
1390 | show wlan ssid-profile
AOS-W 6.2 | Reference Guide
802.11g Transmit Rates Station Ageout Time Max Transmit Attempts RTS Threshold Short Preamble Max Associations Wireless Multimedia (WMM) Wireless Multimedia U-APSD (WMM-UAPSD) Powersave WMM TSPEC Min Inactivity Interval Override DSCP mappings for WMM clients DSCP mapping for WMM voice AC DSCP mapping for WMM video AC DSCP mapping for WMM best-effort AC DSCP mapping for WMM background AC Multiple Tx Replay Counters Hide SSID Deny_Broadcast Probes Local Probe Request Threshold (dB) Disable Probe Retry Battery Boost WEP Key 1 WEP Key 2 WEP Key 3 WEP Key 4 WEP Transmit Key Index WPA Hexkey WPA Passphrase Maximum Transmit Failures EDCA Parameters Station profile EDCA Parameters AP profile BC/MC Rate Optimization Rate Optimization for delivering EAPOL frames Strict Spectralink Voice Protocol (SVP) High-throughput SSID Profile 802.11g Beacon Rate 802.11a Beacon Rate Advertise QBSS Load IE Advertise Location Info Advertise AP Name 802.11R Profile Enforce user vlan for open stations
1 2 5 6 9 11 12 18 24 36 48 54 1000 sec 8 2333 bytes Enabled 64 Disabled Enabled 0 msec Disabled N/A N/A N/A N/A Disabled Disabled Disabled 0 Enabled Disabled N/A N/A N/A N/A 1 N/A N/A 0 N/A N/A Disabled Disabled Disabled default default default Disabled Enabled Disabled N/A Enabled
The output of this command includes the following data columns:
Parameter SSID ESSID
Encryption DTIM Interval
Description
Shows of the profile has enabled or disabled this SSID
Name that uniquely identifies a wireless network. If the ESSID includes spaces, you must enclose it in quotation marks.
The layer-2 authentication and encryption type used on this ESSID.
The interval, in milliseconds, between the sending of Delivery Traffic Indication Messages (DTIMs) in the beacon.
AOS-W 6.2 | Reference Guide
show wlan ssid-profile | 1391
Parameter 802.11a Basic Rates 802.11a Transmit Rates 802.11g Basic Rates 802.11g Transmit Rates Station Ageout Time Max Transmit Attempts RTS Threshold
Short Preamble Max Associations Wireless Multimedia (WMM)
Wireless Multimedia U-APSD (WMMUAPSD) Powersave WMM TSPEC Min Inactivity Interval DSCP mapping for WMM voice AC DSCP mapping for WMM video AC DSCP mapping for WMM best-effort AC DSCP mapping for WMM background AC 902il Compatibility Mode
Hide SSID Deny_Broadcast Probes
Description
List of supported 802.11a rates, in Mbps, that are advertised in beacon frames and probe responses.
Set of 802.11a rates at which the AP is allowed to send data.
List of supported 802.11b/g rates, in Mbps, that are advertised in beacon frames and probe responses.
Set of 802.11b/g rates at which the AP is allowed to send data.
Time, in seconds, that a client is allowed to remain idle before being aged out.
Maximum transmission failures allowed before the client gives up.
Wireless clients transmitting frames larger than this defined threshold must issue Request to Send (RTS) and wait for the AP to respond with Clear to Send (CTS).
Shows if the profile enables or disables short preamble for 802.11b/g radios
Maximum number of wireless clients for the AP
Shows if the profile enables or disables WMM, also known as IEEE 802.11e Enhanced Distribution Coordination Function (EDCF)
Shows if the profile enables or disables Wireless Multimedia (WMM) UAPSD powersave.
Specifies the minimum inactivity time-out threshold of WMM traffic.
DSCP value used to map WMM voice traffic.
DSCP value used to map WMM video traffic.
DSCP value used to map WMM best-effort traffic.
DSCP value used to map WMM background traffic.
(For clients using NTT DoCoMo 902iL phones only) When enabled, the switch does not drop packets from the client if a small or old initialization vector value is received.
Shows if the profile enables or disables hiding of the SSID name in beacon frames.
When a client sends a broadcast probe request frame to search for all available SSIDs, this option controls whether or not the system responds for this SSID. When enabled, no response is sent and clients have to know the SSID in order to associate to the SSID. When disabled, a probe response frame is sent for this SSID
1392 | show wlan ssid-profile
AOS-W 6.2 | Reference Guide
Parameter Local Probe Response
Disable Probe Retry Battery Boost
WEP Key 1 WEP Key 2 WEP Key 3 WEP Key 4 WEP Transmit Key Index WPA Hexkey WPA Passphrase Maximum Transmit Failures EDCA Parameters Station profile EDCA Parameters AP profile BC/MC Rate Optimization
Strict Spectralink Voice Protocol (SVP) High-throughput SSID Profile Advertise Location Info
Enforce user vlan for open stations
Description
Shows if the profile enables or disables local probe response on the AP. If this option is enabled, the AP is responsible for sending 802.11 probe responses to wireless clients' probe requests. If this option is disabled, then the switch sends the 802.11 probe responses
Shows if the profile enables or disables battery MAC level retries for probe response frames.
If enabled, this feature converts multicast traffic to unicast before delivery to the client, thus allowing you to set a longer DTIM interval.
Displays the Static WEP key associated with this key index.
Displays the Static WEP key associated with this key index.
Displays the Static WEP key associated with this key index.
Displays the Static WEP key associated with this key index.
Show the key index that specifies which static WEP key is to be used
WPA pre-shared key (PSK).
WPA passphrase used to generate a pre-shared key (PSK).
Maximum transmission failures allowed before the client gives up.
Name of the enhanced distributed channel access (EDCA) Station profile that applies to this SSID.
Name of the enhanced distributed channel access (EDCA) AP profile that applies to this SSID.
Shows if the profile enables or disables scanning of all active stations currently associated to an AP to select the lowest transmission rate for broadcast and multicast frames. This option only applies to broadcast and multicast data frames; 802.11 management frames are transmitted at the lowest configured rate
Shows if the profile enables or disables strict Spectralink Voice Protocol (SVP).
Name of the high-throughput SSID profile associated with this SSID profile.
APs that are part of this VAP will broadcast their GPS coordinates in the beacons and probe response frames as part of a vendor-specific Information Element.
Shows the strict enforcement of data traffic only in user's assigned vlan (Open stations only).
Command History
This command was introduced in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
show wlan ssid-profile | 1393
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches.
1394 | show wlan ssid-profile
AOS-W 6.2 | Reference Guide
show wlan traffic-management-profile
show wlan traffic-management-profile [<profile>]
Description
Show a list of all traffic management profiles, or display detailed configuration information for a specific traffic management profile.
Syntax
Parameter <profile>
Description Name of a Traffic Management profile.
Usage Guidelines
Issue this command without the <profile> parameter to display the entire Traffic Management profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has three configured Traffic Management profiles. The References column lists the number of other profiles with references to the Traffic Management profile, and the Profile Status column indicates whether the profile is predefined. (User-defined profiles will not have an entry in the Profile Status column.)
(host) #show wlan traffic-management-profile
Traffic management profile List
-------------------------------
Name
References Profile Status
----
---------- --------------
mgmt1 3
mgmt2 2
Total:2
The following example shows configuration settings defined for the profile mgmt1.
(host) #show wlan traffic-management-profile mgmt1
Traffic management profile "default"
------------------------------------
Parameter
Value
---------
-----
Proportional BW Allocation N/A
Report interval
5 min
Station Shaping Policy
default-access
The output of this command includes the following data columns:
Parameter
Proportional BW Allocation
Description
Minimum bandwidth, as a percentage of available bandwidth, allocated to an SSID when there is congestion on the wireless network. An SSID can use all available bandwidth if no other SSIDs are active.
AOS-W 6.2 | Reference Guide
show wlan traffic-management-profile | 1395
Parameter Report interval Station Shaping Policy
Description
Number of minutes between bandwidth usage reports.
Shows which of three possible Station Shaping policies is configured on the profile. l default-access: Traffic shaping is disabled, and client performance is
dependent on MAC contention resolution. This is the default traffic shaping setting. l fair-access: Each client gets the same airtime, regardless of client capability and capacity. This option is useful in environments like a training facility or exam hall, where a mix of 802.11a/g, 802.11g and 802.11n clients need equal to network resources, regardless of their capabilities. The bw-alloc parameter of a traffic management profile allows you to set a minimum bandwidth to be allocated to a virtual AP profile when there is congestion on the wireless network.You must set traffic shaping to fair-access to use this bandwidth allocation value for an individual virtual AP. l preferred-access: High-throughput (802.11n) clients do not get penalized because of slower 802.11a/g or 802.11b transmissions that take more air time due to lower rates. Similarly, faster 802.11a/g clients get more access than 802.11b clients.
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches.
1396 | show wlan traffic-management-profile
AOS-W 6.2 | Reference Guide
show wlan tsm-req-profile
show wlan tsm-req-profile
Description
Shows configuration and other information about the parameters for the Transmit Stream/Category Measurement Request frames.
Syntax
Parameter <profile-name>
Description Name of this instance of the profile. name must be 1-63 characters.
Usage Guidelines
Issue this command without the <profile> parameter to display the entire TSM Request profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
For this profile to take effect, the 802.11K feature needs to be enabled.
Examples
(host) #show wlan tsm-req-profile default
TSM Report Request Profile "default"
------------------------------------
Parameter
Value
---------
-----
Request Mode for TSM Report Request normal
Number of repetitions
65535
Duration Mandatory
Enabled
Randomization Interval
0
Measurement Duration
25
Traffic ID
96
Bin 0 Range
200
The output of this command includes the following information:
Parameter
Description
Request mode for TSM Shows the request mode for the Transmit Stream/Category Measurement Request
Report Request
frame.
Number of repetitions
Shows the "Number of Repetitions" field in the TransmitStream/Category Measurement Request frame.
Duration Mandatory
Shows the "Duration Mandatory" bit of the Measurement Request Mode field of the Transmit Stream/Category Measurement Request frame.
Randomization Inter- Shows the Randomization Interval field in the Transmit Stream/Category
val
Measurement Request frame.
AOS-W 6.2 | Reference Guide
show wlan tsm-req-profile | 1397
Parameter
Description
Measurement Duration Shows the Measurement Duration field in the Transmit Stream/Category Measurement Request frame.
Traffic ID
Shows the Traffic Identifier field in the Transmit Stream/Category Measurement Request frame.
Bin 0 Range
Shows the 'Bin 0 Range' field in the Transmit Stream/Category Measurement Request frame.
Command History
This command is introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master or local switches
1398 | show wlan tsm-req-profile
AOS-W 6.2 | Reference Guide
show wlan virtual-ap
show wlan virtual-ap [<profile>]
Description
Show a list of all Virtual AP profiles, or display detailed configuration information for a specific Virtual AP profile.
Syntax
Parameter <profile>
Description Name of a Virtual AP profile
Usage Guidelines
Issue this command without the <profile> parameter to display the entire Virtual AP profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has six configured Virtual AP profiles. The References column lists the number of other profiles with references to the Virtual AP profile, and the Profile Status column indicates whether the profile is predefined. (User-defined profiles will not have an entry in the Profile Status column.)
(host) #show wlan virtual-ap
Virtual AP profile List ----------------------Name ---coltrane-vap-profile default MegTest Remote test-vap-profile wizardtest-vap-profile Total: 6
References Profile Status ---------- -------------1
1 1 1
The following example shows configuration settings defined for the profile wizardtest-vap-profile.
(host) #show wlan virtual-ap test-vap-profile Virtual AP profile "wizardtest-vap-profile" ---------------------------Parameter --------AAA Profile 802.11K Profile SSID Profile Virtual AP enable VLAN Forward mode Allowed band Band Steering Steering Mode Dynamic Multicast Optimization (DMO) Dynamic Multicast Optimization (DMO) Drop Broadcast and Multicast
Value ----default default default Enabled N/A tunnel all Disabled prefer-5ghz Disabled Threshold 6 Disabled
AOS-W 6.2 | Reference Guide
show wlan virtual-ap | 1399
Convert Broadcast ARP requests to unicast Authentication Failure Blacklist Time Blacklist Time Deny inter user traffic Deny time range DoS Prevention HA Discovery on-association Mobile IP Preserve Client VLAN Remote-AP Operation Station Blacklisting Strict Compliance VLAN Mobility FDB Update on Assoc WMM Traffic Management Profile
Enabled 3600 sec 3600 sec Disabled N/A Disabled Disabled Enabled Disabled standard Enabled Disabled Disabled Disabled N/A
The output of this command includes the following data columns:
Parameter AAA Profile 802.11K Profile SSID Profile Virtual AP enable VLAN Forward mode
Allowed band
Band Steering
Description
Name of the AAA profile associated with this virtual AP.
Name of an 802.11k profile associated with this virtual AP.
Name of an SSID profile associated with this virtual AP.
Shows if the profile enables or disables the virtual AP.
The VLAN(s) into which users are placed in order to obtain an IP address.
Forwarding mode defined on the profile: l tunnel mode l bridge mode l split-tunnel mode l decrypt-tunnel mode The forwarding mode controls whether data is tunneled to the switch using generic routing encapsulation (GRE), bridged into the local Ethernet LAN (for remote APs), or a combination thereof depending on the destination (corporate traffic goes to the switch, and Internet access remains local). When an AP is configured to use the decrypt-tunnel forwarding mode, that AP decrypts and decapsulates all 802.11 frames from a client and sends the 802.3 frames through the GRE tunnel to to the switch, which then applies firewall policies to the user traffic. When the switch sends traffic to a client, the switch sends 802.3 traffic through the GRE tunnel to the AP, which then converts it to encrypted 802.11 and forwards to the client.
The band(s) on which to use the virtual AP: l a--802.11a band only (5 GHz) l g--802.11b/g band only (2.4 GHz) l all--both 802.11a and 802.11b/g bands (5 GHz and 2.4
GHz)
If enabled, ARM's band steering feature encourages dualband capable clients to stay on the 5GHz band on dual-band APs. This frees up resources on the 2.4GHz band for single band clients like VoIP phones.
1400 | show wlan virtual-ap
AOS-W 6.2 | Reference Guide
Parameter
Description
Steering Mode
Band steering supports three different band steering modes.
l Force-5GHz: When the AP is configured in force-5GHz band steering mode, the AP will try to force 5Ghz-capable APs to use that radio band.
l Prefer-5GHz (Default): If you configure the AP to use prefer-5GHz band steering mode, the AP will try to steer the client to 5G band (if the client is 5G capable) but will let the client connect on the 2.4G band if the client persists in 2.4G association attempts.
l Balance-bands: In this band steering mode, the AP tries to balance the clients across the two radios in order to best utilize the available 2.4G bandwidth. This feature takes into account the fact that the 5Ghz band has more channels than the 2.4 Ghz band, and that the 5Ghz channels operate in 40MHz while the 2.5Ghz band operates in 20MHz.
NOTE: Steering modes do not take effect until the band steering feature has been enabled. The band steering feature in AOS-W versions 3.3.2-5.0 does not support multiple bandsteering modes. The band-steering feature in these versions of AOS-W functions the same way as the default prefer-5GHz steering mode available in AOS-W 6.0 and later.
Dynamic Multicast Optimization (DMO) If enabled DMO techniques will be used to reliably transmit video data.
Dynamic Multicast Optimization (DMO) Maximum number of high-throughput stations in a multicast
Threshold
group beyond which dynamic multicast optimization stops.
Drop Broadcast and Multicast
If enabled, the virtual AP will filter out broadcast and multicast traffic in the air.
Convert Broadcast ARP requests to unicast Authentication Failure Blacklist Time Blacklist Time Deny Inter User Traffic
Deny time range
If enabled, all broadcast ARP requests are converted to unicast and sent directly to the client.
Time, in seconds, a client is blocked if it fails repeated authentication. An authentication failure blacklist time of 0 blocks failed users indefinitely.
Number of seconds that a client is quarantined from the network after being blacklisted.
This option, when enabled, denies traffic between the clients using this virtual AP profile. The firewall comand includes an option to deny all inter-user traffic, regardless of the Virtual AP profile used by those clients. If the global setting to deny inter-user traffic is enabled, all inter-user traffic between clients will be denied, regardless of the settings configured in the virtual AP profiles. If the setting to deny inter-user traffic is disabled globally but enabled on an individual virtual ap, only the traffic between un-trusted users and the clients on that particular virtual AP will be blocked.
Time range for which the AP will deny access.
AOS-W 6.2 | Reference Guide
show wlan virtual-ap | 1401
Parameter DoS Prevention HA Discovery on-association
Mobile IP Preserve Client VLAN Remote-AP Operation
Station Blacklisting Strict Compliance
Multi Association Fast Roaming VLAN Mobility WMM Traffic Management Profile
Description
If enabled, APs ignore deauthentication frames from clients. This prevents a successful deauth attack from being carried out against the AP. This does not affect third-party APs.
If enabled, home agent discovery is triggered on client association instead of home agent discovery based on traffic from client. Mobility on association can speed up roaming and improve connectivity for clients that do not send many uplink packets to trigger mobility (VoIP clients). Best practices is to leave this parameter disabled as it increases IP mobility control traffic between switches in the same mobility domain. Enable this parameter only when voice issues are observed in VoIP clients. NOTE: ha-disc-onassoc parameter works only when IP mobility is enabled and configured on the switch.
Shows if the profile has enabled or disabled IP mobility.
This parameter allows clients to retain their previous VLAN assignment if the client disassociates from an AP and then immediately re-associates either with same AP or another AP on same switch.
Shows how the virtual AP operates on a remote AP: l always: Permanently enables the virtual AP. l backup: Enables the virtual AP if the remote AP cannot
connect to the switch. l persistent: Permanently enables the virtual AP after the
remote AP initially connects to the switch. l standard: Enables the virtual AP when the remote AP
connects to the switch.
Shows if the profile has enabled or disabled detection of denial of service (DoS) attacks, such as ping or SYN floods, that are not spoofed deauth attacks.
If enabled, the AP denies client association requests if the AP and client station have no common rates defined. Some legacy client stations which are not fully 802.11-compliant may not include their configured rates in their association requests. Such non-compliant stations may have difficulty associating with APs unless strict compliance is disabled.
If enabled, this feature allows a station to be associated to multiple APs. If this feature is disabled, when a station moves to new AP it will be de authorized by the AP to which it was previously connected, deleting station context and flushing key caching information
Shows if the AP has enabled or disabled fast roaming.
Shows if the AP has enabled or disabled VLAN (Layer-2) mobility.
WMM Traffic Management Profile associated with this Virtual AP Profile
Command History
This command was introduced in AOS-W 3.0.
1402 | show wlan virtual-ap
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches.
AOS-W 6.2 | Reference Guide
show wlan virtual-ap | 1403
show wlan voip-cac-profile
show wlan voip-cac-profile [<profile>]
Description
Show a list of all VoIP Call Admission Control profiles, or display detailed configuration information for a specific VoIP Call Admission Control profile.
Syntax
Parameter <profile>
Description Name of a VoIP Call Admission Control profile
Usage Guidelines
Issue this command without the <profile> parameter to display the entire VoIP Call Admission Control profile list, including profile status and the number of references to each profile. Include a profile name to display detailed configuration information for that profile.
Examples
The example below shows that the switch has three configured VoIP Call Admission Control profiles. The References column lists the number of other profiles with references to the VoIP Call Admission Control profile, and the Profile Status column indicates whether the profile is predefined. (User-defined profiles will not have an entry in the Profile Status column.)
(host) #show wlan voip-cac-profile
VoIP Call Admission Control profile List
----------------------------------------
Name
References Profile Status
----
---------- --------------
corp-voip
6
kgtest
0
QAlab-voip
1
Total:3
The following example shows configuration settings defined for the profile QAlab-voip .
(host) #show wlan voip-cac-profile VoIP Call Admission Control profile "QAlab-voip " --------------------------------------------Parameter --------VoIP Call Admission Control VoIP Bandwidth based CAC VoIP Call Capacity VoIP Bandwidth Capacity (kbps) VoIP Call Handoff Reservation VoIP Send SIP 100 Trying VoIP Disconnect Extra Call VOIP TSPEC Enforcement VOIP TSPEC Enforcement Period VoIP Drop SIP Invite and send status code (client) VoIP Drop SIP Invite and send status code (server)
Value ----Disabled Disabled 10 2000 20 % Enabled Disabled Disabled 1 sec 486 486
The output of this command includes the following data columns:
1404 | show wlan voip-cac-profile
AOS-W 6.2 | Reference Guide
Parameter VoIP Call Admission Control VoIP Bandwidth based CAC
VoIP Call Capacity VoIP Bandwidth Capacity (kbps) VoIP Call Handoff Reservation VoIP Send SIP 100 Trying
VoIP Disconnect Extra Call
VOIP TSPEC Enforcement VOIP TSPEC Enforcement Period VoIP Drop SIP Invite and send status code (client)
VoIP Drop SIP Invite and send status code (server)
Description
Shows if the profile enables or disables WiFi VoIP Call Admission Control features.
Shows the desired call admission control (CAC) Mechanism: l Disable - CAC is based on Call Counts l Enable - CAC should be based on Bandwidth.
Number of simultaneous calls that can be handled by one radio.
The maximum bandwidth that can be handled by one radio, in kbps.
Percentage of call capacity reserved for mobile VoIP clients on call.
Shows if the profile enables or disables sending of SIP 100 - trying messages to a call originator to indicate that the call is proceeding.
If enabled, the switch disconnects calls that exceed the high capacity threshold by sending a deauthentication frame.
Shows if the profile enables or disables validation of TSPEC requests for CAC.
Maximum time for the station to start the call after the TSPEC request
Display the status code sent back to the client if the profile is configured to drop a SIP Invite: l 480: Temporary Unavailable l 486: Busy Here l 503: Ser vice Unavailable l none: Don't send SIP status code
Display the status code sent back to the server if the profile is configured to drop a SIP Invite: l 480: Temporary Unavailable l 486: Busy Here l 503: Ser vice Unavailable l none: Don't send SIP status code
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config mode on master or local switches.
AOS-W 6.2 | Reference Guide
show wlan voip-cac-profile | 1405
show wms ap
show wms ap {<bssid>}|list|{stats [mon-mac <mon-mac> bssid <bssid>}
Description
Display information for APs currently monitored by the AOS-W Wireless Management System (WMS).
Syntax
Parameter
Description
<bssid>
Enter the AP's BSSID number in hexadecimal format (XX:XX:XX:XX:XX:XX).
list
Show the AP Tree table for all APs.
stats
Show the AP Statistics table for all APs.
mon-mac <mon-mac> Show the AP Tree table for an AP with the specified MAC address.
bssid <bssid>
Show the AP Tree table for an AP with the specified BSSID.
Usage Guidelines
The WMS feature periodically sends statistics that it has collected for APs and Probes to the WMS process. When WMS receives an event message from an AM, it will save the event information along with the BSSID of the AP that generated the event in the WMS database. When WMS receives statistics from the AM, it updates its state, and the database.
Examples
The command show wms ap <bssid> displays a list of AP MAC addresses and the BSSIDs seen by each AP. (host)# show wms ap 00:1a:1e:88:01:e0
AP Info
-------
BSSID
SSID
Type HT-Sec-Chan
-----
----
-- -----------
00:1a:1e:88:01:e0 sw-ad
Channel ------11
Type ---soft-ap
RAP_Type -------valid
Status -----up
Match MAC --------00:00:00:00:00:00
Ageout ------1
HT-----
Probe Info ---------MAC --00:1a:1e:88:02:80 00:1a:1e:88:01:e0 00:1a:1e:81:c6:00 00:0b:86:8a:15:20
IP -10.3.129.94 10.3.129.96 10.3.129.99 10.3.129.93
Name ---ad-ap125-13 mp3 ad-ap124-11 sap61-1-6
Type ---soft-ap soft-ap soft-ap soft-ap
Status -----up up down down
AP Type ------125 125 124 65
The output of this command includes the following information:
1406 | show wms ap
AOS-W 6.2 | Reference Guide
Column BSSID SSID Channel Type
RAP_Type
Status Match MAC
Ageout
HT-type
HT-Sec-Chan MAC IP Name Type
Status AP Type
Description
Basic Service Set Identifier for the AP. This is usually the AP's MAC address.
The Service Set Identifier that identifies a wireless network.
Channel used by the AP's radio.
A WMS AP type can be one of the following: l soft-ap: an Alcatel-Lucent Access Point (AP). l air-monitor: An Alcatel-Lucent Air Monitor (AM).
Indicates one of the following Rogue AP types: l Valid (not a rogue AP) l Interfering l Rogue l Suspected Rogue l Disabled Rogue l Unclassified l Known Interfering
If up, the AP is active. If down (or no information is shown) the AP is inactive.
MAC address of a wired device that helped identify the AP as a rogue. If the AP has not been identified as a rogue, this column will display the MAC address 00:00:00:00:00:00.
An ageout time is the time, in minutes, that the client must remain unseen by any probes before it is eliminated from the database. If this column displays a -1, the client has not yet aged out. Any other number indicates the number of minutes since the client has passed its ageout interval.
The type of high-throughput traffic sent by the AP: l HT-20mhz: The AP radio uses a single 20 mHz channel l HT-40mhz: The AP radio uses a 40 MHz channel pair comprised of two
adjacent 20 MHz channels.
Secondary channel used for 40 MHz high-throughput transmissions.
MAC address of a probe that can see the specified AP.
IP address of a probe that can see the specified AP.
Name of the probe.
Displays the probe type: A WMS probe can be one of the following: l soft-ap: an Alcatel-Lucent Access Point (AP). l air-monitor: An Alcatel-Lucent Air Monitor (AM).
If up, the AP is active. If down (or no information is shown) the AP is inactive.
AP model type.
The example below shows received and transmitted data statistics for each BSSID seen by a monitoring AP.
(host)# show wms ap stats
AP Stats Table
----------------
Monitor-MAC
BSSID
-----------
-----
00:0b:86:c1:af:20 00:0b:86:9a:f2:00
00:0b:86:c1:af:20 00:0b:86:9a:f2:08
RSSI ---12 12
TxPkt ----1575675 1560559
RxPkt ----65 0
TxByte -----173239998 162297938
RxByte -----9340 0
HTRates-Rx ---------0 0
AOS-W 6.2 | Reference Guide
show wms ap | 1407
00:0b:86:c1:be:56 00:0b:86:9b:e5:60 12 00:0b:86:c1:be:56 00:0b:86:9b:e5:68 12 00:0b:86:c2:0a:98 00:0b:86:a0:a9:80 48 00:0b:86:c2:1c:08 00:0b:86:a1:c0:80 42 00:0b:86:c2:1c:38 00:0b:86:a1:c3:80 42 00:0b:86:c2:3e:a9 00:0b:86:a3:ea:90 48 00:0b:86:c4:0f:3c 00:0b:86:c0:f3:d0 48 00:0b:86:c4:4d:06 00:0b:86:c4:d0:70 48 00:1a:1e:c0:88:82 00:1a:1e:88:88:30 18 00:1a:1e:c0:88:82 00:1a:1e:88:88:20 18 00:1a:1e:c0:88:88 00:1a:1e:88:88:90 36
1683013 4188 184400159 257583 0
1580152 105
164216336 1470
0
1608023 40596 166962148 568386 0
1587097 26236 164904668 453196 0
1573040 20511 174536514 654024 0
1588204 34179 165017293 897431 0
1571202 14258 174338376 351148 0
1598423 56198 182267018 3805826 0
1717310 247532 394461405 14998234 8
1092023 114722 242006054 2442917 10
1783226 485620 460219125 27781583 16
The output of this command includes the following information:
Column Monitor-MAC BSSID RSSI txPkt RxPkt TxByte RxByte HTRates-Rx
Description MAC address of an AP. Basic Service Set Identifier of a station. Received Signal Strength Indicator for the station, as seen by the AP. Number of transmitted packets. Number of received packets. Number of transmitted bytes. Number of received bytes. Number of bytes received at high-throughput rates.
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced
The mon-mac <mon-mac> and bssid <bssid> parameters for the list option were deprecated.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
1408 | show wms ap
AOS-W 6.2 | Reference Guide
show wms channel
show wms channel stats
Description
Display per-channel statistics for monitored APs.
Syntax
No parameters.
Example
This example shows per-channel statistics for monitored APs.
(host) #show wms channel stats
Channel Stats Table
---------------------
Monitor-MAC
Channel
-----------
-------
00:0b:86:c1:af:20 1
00:0b:86:c1:af:20 6
00:0b:86:c1:af:20 11
00:0b:86:c1:af:20 36
00:0b:86:c1:af:20 40
00:0b:86:c1:af:20 44
00:0b:86:c1:af:20 48
00:0b:86:c1:af:20 149
00:0b:86:c1:af:20 153
00:0b:86:c1:af:20 165
00:0b:86:c1:be:56 1
00:0b:86:c1:be:56 6
00:0b:86:c1:be:56 11
00:0b:86:c1:be:56 36
00:0b:86:c1:be:56 40
00:0b:86:c1:be:56 44
00:0b:86:c1:be:56 48
00:0b:86:c1:be:56 149
00:0b:86:c1:be:56 153
00:0b:86:c1:be:56 165
00:0b:86:c2:0a:98 40
00:0b:86:c2:0a:98 48
00:0b:86:c2:0a:98 149
00:0b:86:c2:1c:08 40
00:0b:86:c2:1c:08 48
00:0b:86:c2:1c:08 149
NumAP ----1 1 8 0 0 0 0 1 3 1 43 8 72 53 8 3 4 0 1 1 4 5 4 3 4 5
NumSta -----0 0 0 0 0 0 0 0 0 0 4 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0
TotalPkt -------5228276 1355 5880 2 2 50 23 27094 4648662 1655 14446324 14168505 180553 14716 3033 1453 5330 609279 7615369 4238 4247 4052 6548323 4613 6235436 18904
TotalByte --------613640650 168764 1040338 28 112 903 544 557579 544817261 200349 1959058619 1955474600 23987119 1022825 501568 217596 1067660 72205247 779579648 486121 434512 420436 732910481 478188 658263321 803078
Noise ----97 0 0 0 0 0 0 0 99 0 0 96 0 0 0 0 0 105 0 0 0 0 104 0 103 0
Column Monitor-MAC Channel
Description MAC address of an AP. 802.11 radio channel.
AOS-W 6.2 | Reference Guide
show wms channel | 1409
Column NumAP NumSta TotalPkt TotalByte Noise
Description Number of other APs seen on the specified channel. Number stations seen on the specified channel. Number of received packets. Number of received bytes. Current noise level.
The output of this command includes the following information:
Command History
This command was introduced in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
1410 | show wms channel
AOS-W 6.2 | Reference Guide
show wms client
show wms client <mac>|{list}|{probe <mac>}|{stats [mon-mac <mon-mac> mac <mac>]}
Description
Display a list of client information for the clients that can be seen by monitoring APs.
Syntax
Parameter <mac>
list probe <mac>
stats
mon-mac <mon-mac> mac <mac>
Description
Show statistics for a client with the specified MAC address, including the BSSID of the AP to which that client is currently associated, and the MAC addresses of other monitoring APs that can see that client.
Show statistics for all monitored clients.
Specify a client's MAC address to show the BSSIDs of all probes that can see that client.
Show the STA stats table, which displays data for all clients seen by each monitoring AP.
Enter a monitoring AP's MAC address (<mon-mac>) and the MAC address of a client (<mac>) to show data for traffic received from and sent to a specific client as seen by a specific AP.
Example
The AP Info table in the example below shows that the client is associated to an AP with the BSSID 00:0b:86:cd:86:a0. The Probe info table shows the MAC addresses of three other APs that can see the client.
(host) #show wms client 00:0e:35:29:9b:28
STA Info -------MAC --00:0e:35:29:9b:28
Type ---valid
Status -----up
Ageout ------1
AP Info ------BSSID ----00:0b:86:cd:86:a0
SSID ---MySSiD
Channel ------11
Type ---soft-ap
RAP_Type -------valid
Status -----up
Match MAC --------00:00:00:00:00:00
Ageout ------1
Probe Info ---------MAC --00:0b:86:a2:2b:50 00:0b:86:ad:94:40 00:0b:86:cd:86:a0
IP -192.168.2.10 192.168.2.5 192.168.2.4
Name ---0 0 0
Type ---soft-ap soft-ap soft-ap
Status -----up up up
Name ---LeftAP 1.1.1 CEO
AP Type ------61 61 70
AOS-W 6.2 | Reference Guide
show wms client | 1411
Column MAC Type Status ageout
BSSID SSID RAP_Type
Status Match MAC
Ageout
MAC IP Type
Status Name AP type
Description
MAC address of the client
Station type (valid, interfering, or disabled rogue client )
If up, the client is active. If down (or no information is shown) the client is inactive.
An ageout time is the time, in minutes, that the client must remain unseen by any probes before it is eliminated from the database. If this column displays a -1, the client has not yet aged out. Any other number indicates the number of minutes since the client has passed its ageout interval.
BSSID of the AP to which the client is associated.
Extended service set identifier (ESSID) of the BSSID.
Indicates one of the following Rogue AP types: l Valid (not a rogue AP) l Interfering l Rogue l Disabled Rogue l Suspected Rogue l Unclassified l Known Interfering
If up, the AP is active. If down (or no information is shown) the AP is inactive.
MAC address of a wired device that helped identify the AP as a rogue. If the AP has not been identified as a rogue, this column will display the MAC address 00:00:00:00:00:00.
An ageout time is the time, in minutes, that the client must remain unseen by any probes before it is eliminated from the database. If this column displays a -1, the client has not yet aged out. Any other number indicates the number of minutes since the client has passed its ageout interval.
MAC address of a WMS probe.
IP address of a WMS probe.
A WMS AP type can be one of the following: l soft-ap: an Alcatel-Lucent Access Point (AP). l air-monitor: An Alcatel-Lucent Air Monitor (AM).
If up, the probe is active. If down (or no information is shown) the probe is inactive.
Name of the probe. If a name has not been defined for the probe, this column may display a zero (0).
Model type of the probe.
The output of this command includes the following information:
Command History
This command was introduced in AOS-W 3.0
1412 | show wms client
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
show wms client | 1413
show wms counters
show wms counters [debug|event]
Description
Show WMS event and debug counters. If you omit the optional debug and events parameters, the show wms counters command will display wms debug and events counters in a single table.
Syntax
Parameter debug events
Description
Show show debug counters only
Show events counters only. If you omit the debug and events parameters, the show wms counters will display debug and events counters in a single table.
Usage Guidelines
This command displays counters for database entries, messages and data structures. The counters displayed will vary for each switch; if the switch does not have an entry for a particular counter type, it will not appear in the output of this command
Example
This example shows part of the output of the command show wms counters.
(host) #show wms counters
Counters -------Name ---DB Reads DB Writes Probe Table DB Reads Probe Table DB Writes AP Table DB Reads AP Table DB Writes STA Table DB Reads STA Table DB Writes Probe STA Table DB Reads Probe STA Table DB Writes Probe Register Probe State Update Set RAP Type Set RAP Type Conf Level ...
Value ----288268 350870 2477 952 143992 138867 40404 99687 101352 117566 2476 37077 42552 152
Command History
This command was introduced in AOS-W 3.0
1414 | show wms counters
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
show wms counters | 1415
show wms monitor-summary
show wms channel stats
Description
Display the numbers of different AP and client types monitored over the last 5 minutes, 1 hour, and since the switch was last reset.
Syntax
No parameters.
Usage Guidelines
The WLAN management system (WMS) on the switch monitors wireless traffic to detect any new AP or wireless client station that tries to connect to the network. When an AP or wireless client is detected, it is classified and its classification is used to determine the security policies which should be enforced on the AP or client. Use the show wms monitor-summary command to view a quick summary of each classified AP and client type currently on the network. If AP learning is enabled (with the wms general command), non-Alcatel-Lucent APs connected on the same wired network as Alcatel-Lucent APs are classified as valid APs. If AP learning is disabled, a non-Alcatel-Lucent AP is classified as an unsecure or suspect-unsecure AP.
Example
This example shows that the switch currently has 144 valid APs and 32 active valid clients, and verifies that the switch currently aware of a single disabled rogue AP.
(host) #show wms monitor-summary
WMS Monitor Summary
-------------------
Last 5 Min Last Hour All
-
---------- --------- ---
Valid APs
1
1
1
Interfering APs
57
57
60
Rogue APs
3
3
3
Manually Contained APs
0
0
0
Unclassified APs
0
0
0
Neighbor APs
0
0
0
Suspected Rogue APs
138
138
139
Valid Clients
0
0
0
Interfering Clients
1
1
1
Manually Contained Clients 0
0
0
Command History
Release AOS-W 3.0. AOS-W 6.1
Release
Command Introduced
The Disabled Rogue AP, Known Interfering APs and Interfering Clients entries were removed from the show command output, and the suspectedrogue, Manually Contained APs and Manually Contained Clients output entries were introduced.
1416 | show wms monitor-summary
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
show wms monitor-summary | 1417
show wms probe
show wms probe
Description
Display detailed information for a list of WMS probes.
Syntax
No parameters.
Example
This example shows the Probe List table for WMS probes. The output below has been split into two tables to better fit in this document. In the actual command-line interface, this information appears in a single, long table.
(host) #show wms monitor-summary
WMS Monitor Summary
-------------------
Last 5 Min Last Hour All
-
---------- --------- ---
Valid APs
1
1
1
Interfering APs
57
57
60
Rogue APs
3
3
3
Manually Contained APs
0
0
0
Unclassified APs
0
0
0
Neighbor APs
0
0
0
Suspected Rogue APs
138
138
139
Valid Clients
0
0
0
Interfering Clients
1
1
1
Manually Contained Clients 0
0
0
Column Monitor Eth MAC BSSID PHY Type
Description
Ethernet MAC address of a probe.
Probe Radio BSSID.
Radio PHY type: l 802.11A l 802.11AHT-40Mbps l 802.11AHT-20Mbps l 802.11G l 802,11GHT-20Mbps
IP LMS IP Scan Status
IP address of the AP. IP address of the AP's local switch. Shows if the Air Monitor is performing scanning. If the scan column displays a status of Up, the AP or AM is active
1418 | show wms probe
AOS-W 6.2 | Reference Guide
Column Updates
Reqs/Fails
Stats Type
Description
Number of updates the AP or AM sent to the WMS database since the switch was last reset.
Number of database update requests that have not yet been added into the database. and the number of failed database requests.
Total number of statistics updates sent to the database.
A WMS AP type can be one of the following: l soft-ap: an Alcatel-Lucent Access Point (AP). l air-monitor: An Alcatel-Lucent Air Monitor (AM).
The output of this command includes the following information:
Command History
Release AOS-W 3.0. AOS-W 6.1
Release
Command Introduced
The output of this command was modified to show the number of failed database requests.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
show wms probe | 1419
show wms rogue-ap
show wms rogue-ap <mac>
Description
Display statistics for APs classified as rogues APs.
Syntax
Parameter <mac>
Description MAC address of a rogue AP.
Example
The output of this command shows statistics for a suspected Rogue AP, including how it was classified as a suspected rogue.
(host) #show wms rogue-ap 00:0b:86:d4:ca:12
Suspect Rogue AP Info
---------------------
Key
Value
---
-----
BSSID
00:0b:86:89:c6:20
SSID
aruba-ap
Channel
1
Type
generic-ap
RAP Type
suspected-rogue
Confidence Level 30%
Status
up
Match Type
AP-Rule
Match MAC
00:0b:86:61:8a:d0
Match IP
0.0.0.0
Match Rule Name rule2
Match Method
Exact-Match
Match Time
Sun Sep 19 19:11:40 2010
Confidence Level Info
---------------------
Match Type
Match Method
----------
------------
Eth-Wired-Mac OUI-Match
AP-Rule
rule1
AP-Rule
rule2
Conf Level ---------20% 5% 5%
The output of this command includes the following information:
Column BSSID SSID Channel
Description BSSID of the suspected rogue AP. The rogue AP's Extended service set identifier. Channel used by a radio on the rogue AP.
1420 | show wms rogue-ap
AOS-W 6.2 | Reference Guide
Column Type RAP Type Status Match Type
Match MAC Match IP Match AM Match Method Suspect Match Types Helper Ap BSSID AP name Match Time Confidence Level
Description
Indicates if the AP is an Alcatel-Lucent AP, a Cisco AP, or an AP from any other manufacturer (generic AP).
Type of rogue AP, l Suspect-unsecure: AP has not been confirmed as a rogue AP. l unsecure: AP has been confirmed as a rogue AP
Shows if the AP is active (up) or inactive (down).
Describes how the AP was classified as a rogue. l Eth-Wired-MAC: An Alcatel-Lucent AP or AM detected that a single MAC
address was in both the Ethernet Wired-Mac table and a non-valid AP wiredMac table. l AP-Wired-MAC: An interfering AP is marked as rogue when the Alcatel-Lucent AP finds a MAC address in one of its valid AP wired-mac table and in an interfering AP wired-mac table. You can enable or disable the AP-Wired-MAC matching method using the CLI command ids unauthorized-deviceprofile overlay-classification. l Config-Wired-MAC: This type of classification occurs when an Alcatel-Lucent AP or AM detects a match between a wired MAC table and a pre-defined MAC address that has manually defined via the command ids unauthorized-deviceprofilevalid-wired-mac. l External-Wired-MAC: This type of classification occurs when an Alcatel-Lucent AP or AM detects a match between a wired MAC table entry and a pre-defined MAC address manually defined in the rap-wml table. l Base-BSSID-Override: If an Alcatel-Lucent AP is detected as rogue, then all virtual APs on the particular rogue are marked as rogue using Base-BSSIDOverride match type. l Manual: An AP is manually defined as a rogue by via the command wms ap <bssid> mode rogue. l EMS: An AP is manually defined as a rogue by via the Element Management System
MAC address of a wired device that helped identify the AP as a rogue. If the AP has not been identified as a rogue, this column will display the MAC address 00:00:00:00:00:00.
IP address of a wired device that helped identify the AP as a rogue.
Alcatel-Lucent Air Monitor that reporting seeing the rogue AP.
This variable indicates the type of match.
Describes how an AP was classified as a suspected rogue AP.
BSSID of the AP or AM that helped classify a rogue AP.
Names of APs that are able to see the specified MAC address.
Time the AP was identified as a rogue AP.
Shows the level of confidence that the AP was classified correctly for each match type.The suspected-rogue classification mechanism are: l Each mechanism that causes a suspected-rogue classification is assigned a
confidence level increment of 20%. l AP classification rules have a configured confidence level. l When a mechanism matches a previously unmatched mechanism, the
confidence level increment associated with that mechanism is added to the current confidence level (the confident level starts at zero).
AOS-W 6.2 | Reference Guide
show wms rogue-ap | 1421
Column
Description
l The confidence level is capped at 100%. If your switch reboots, your suspected-rogue APs are not checked against any new rules that were configured after the reboot. Without this restriction, all the mechanisms that classified your APs as suspected-rogue may trigger again causing the confidence level to surpass their cap of 100%. You can explicitly mark an AP as "interfering" to trigger all new rules to match against it.
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced Confidence level information was added to the output of this command.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
1422 | show wms rogue-ap
AOS-W 6.2 | Reference Guide
show wms routers
show wms routers <mac>
Description
Show Learned Router Mac Information for WMS APs.
Syntax
Parameter <mac>
Description MAC address of a probe that can see the router.
Usage Guidelines
This command displays the MAC addresses of devices that have been determined to be routers by the listed APs. This output of this command will be blank if there is not any broadcast/multicast activity in an AP's subnet.
Example
In the example below, a single WMS AP has learned MAC information for four different routers.
(host) #show wms routers
Router Mac 00:08:00:00:11:12 is Seen by APs ------------------------------------------AP-Name ------AP32 Router Mac 00:08:00:00:11:29 is Seen by APs ------------------------------------------AP-Name ------AP32 Router Mac 00:08:00:00:11:57 is Seen by APs ------------------------------------------AP-Name ------AP32 Router Mac 00:08:00:00:11:6e is Seen by APs ------------------------------------------AP-Name ------AP32
Command History
This command was introduced in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
show wms routers | 1423
show wms rules
show wms rules config state summary
Description
Display the internal state and matching information of rules created using the ids ap-classification-rule change command.
Syntax
Parameter config
state summary
Description
Display the following information for each AP classification rule. l name l ids l match-ssid l min-snr l max-snr l min-prcnt l max-prcnt l ssids l enabled l classify l conf-incr l flags l match-cnt
Display the following informatoin for each AP classification rule: l SSID Match Table l SSID Exclude Table l SNR Table l Probe Count Table
Display an AP classification rules summary.
Usage Guidelines
Issue this command to view existing AP classification rules. AP classification rule configuration is performed only on a master switch. If AMP is enabled via the mobility-manager command, then processing of the AP classification rules is disabled on the master switch. A rule is identified by its ASCII character string name (32 characters maximum). The AP classification rules have one of the following specifications: l SSID of the AP l SNR of the AP l Discovered-AP-Count or the number of APs that can see the AP
Example
The output in the example below shows that although two rules have been defined, neither have been enabled using the ids ap-rule-matching rule-name <name> command. (host) (config) #show wms rules summary
1424 | show wms rules
AOS-W 6.2 | Reference Guide
AP Classification Rules Summary
-------------------------------
Parameter
Value
---------
-----
Num Rules
2
Num Active-Rules
0
Num SSID-to-match
0
Num SSID-to-exclude
0
Num SNR-bounds
0
Num Probe-Count-bounds 0
Command History
This command was introduced in AOS-W 6.1
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
show wms rules | 1425
show wms system
show wms system
Description
Show the WMS system configuration and system state.
Syntax
No parameters.
Example
This example shows the WMS System Configuration and System State tables.
(host) #show wms system
System Configuration -------------------Key --max-threshold max-rbtree-entries max-system-wm system-wm-update-interval
Value ----0 0 1000 8
System State ------------Key --Max Threshold Current Threshold Total AP Count Total STA Count MAX RB-tree Count Total Tree Count Poll Count(Max)
Value ----25000 230 228 5 50000 195 1(2)
Learned OUIs for Deployed APs -----------------------------OUI --00:1a:1e:00:00:00
Column
Description
Max Threshold
The maximum number of table entries allowed. If this table displays a zero (0), there is no configured limit.
NOTE: If a configured maximum limit has reached, the switch will not create new WMS entries for monitored APs and monitored stations. If new APs are deployed after this limit is reached, those APs will not be marked as 'valid', which will impair the effectiveness of the Adaptive Radio Management feature. If there are new Rogue APs in the network, they will not be classified as a rogue.
Current Threshold Current number of table entries.
1426 | show wms system
AOS-W 6.2 | Reference Guide
Column
Description
Total AP Count
Total number of statistics entries for monitored APs in the AP table.
Total STA Count
Total number of statistics entries for monitored stations in the Station table.
MAX RB-tree Count Maximum number of entries allowed in the statistics.
Total Tree Count
Total number of entries currently in the statistics tree. If this limit has been reached, the switch will not add entries with the RSSI information for APs, monitored APs and monitored clients that are seen by them. This can negatively affect the RF Plan application.
Poll Count (Max) Current and maximum poll counts.
The output of this command includes the following information:
Command History
This command was introduced in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
show wms system | 1427
show wms wired-mac
show wms wired-mac gw-mac [<mac>] monitored-ap-wm <mac> prop-eth-mac reg-ap-oui summary system-gw-mac system-wired-mac wireless-device}
Description
Display a summary table of Wireless Management System (wms) wired MAC information. This command can display a list of APs aware of a specific gateway MAC address, or list the wired MAC addresses known to a single AP.
Syntax
Column gw-mac <mac>
monitored-ap-wm <mac>
prop-eth-mac <mac>
Description
Show Gateway Wired Mac Information Collected from the APs. If you include the optional <mac> MAC address parameter, the output of this command will show information for that single MAC address only.
Show Monitored AP Wired Mac Information Collected from the APs. If you include the optional <mac> MAC address parameter, the output of this command will show information for that single MAC address only.
Show Wired Mac Information Collected from the APs. If you include the optional <mac> MAC address parameter, the output of this command will show information for that single MAC address only.
reg-ap-oui <mac> summary
system-gw-mac system-wired-mac
Show Registered AP OUI Information Collected from the APs, including each registered OUI, and the time that OUI was last seen. If you include the optional <mac> MAC address parameter, the output of this command will show information for that single MAC address only
Display a wired MAC summary that includes the number of each of the following MAC types: l Registered AP OUIs l Propagated Ethernet MACs. l Potential Wireless Device MACs l Monitored AP Wired MACs l System Wired MACs l System Gateway MACs
Show system gateway MAC information learned at the switch, including the age of each MAC address. If you include the optional <mac> MAC address parameter, the output of this command will show information for that single MAC address only.
Show system wired MAC information learned at the switch. If you include the optional <mac> MAC address parameter, the output of this command will show information for that single MAC address only.
1428 | show wms wired-mac
AOS-W 6.2 | Reference Guide
Column wireless-device
Description
Show Routers or potential wireless devices information, including the MAC address of the device, and the MAC address of the AP or switch that saw the device.
Example
This example shows the wired MAC summary.
(host) #show wms system
System Configuration -------------------Key --max-threshold max-rbtree-entries max-system-wm system-wm-update-interval
Value ----0 0 1000 8
System State ------------Key --Max Threshold Current Threshold Total AP Count Total STA Count MAX RB-tree Count Total Tree Count Poll Count(Max)
Value ----25000 230 228 5 50000 195 1(2)
Learned OUIs for Deployed APs -----------------------------OUI --00:1a:1e:00:00:00
Command History
Version AOS-W 3.0 AOS-W 6.1
Modification
Command Introduced
The ap-name <ap-name> parameter was deprecated, and the following parameters were introduced: l gw-mac l monitored-ap-wm l prop-eth-mac l reg-ap-oui l summary l system-gw-mac l system-wired-mac l wireless-device
AOS-W 6.2 | Reference Guide
show wms wired-mac | 1429
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1430 | show wms wired-mac
AOS-W 6.2 | Reference Guide
show ip interface brief
show ip interface brief
Description
View IP-related information on all interfaces in summary format.
Syntax
No parameters.
Example
(host) #show ip interface brief
Interface vlan 1 vlan 2 loopback mgmt
IP Address / IP Netmask 172.16.0.254 / 255.255.255.0
10.4.62.9 / 255.255.255.0 unassigned / unassigned unassigned / unassigned
Admin up up up down
The following table details the columns and content in the show command.
Protocol up up up down
Column Interface IP Address /IP Netmask Admin
Protocol
Description
List the interface and interface identification, where applicable.
List the IP address and netmask for the interface, if configured.
States the administrative status of the interface. Enabled--up Disabled--down
Status of the IP on the interface. Enabled--up Disabled--down
Command History
Release AOS-W 3.4
Modification Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Available in Config or Enable mode on master switches.
AOS-W 6.2 | Reference Guide
show ip interface brief | 1431
shutdown
shutdown all
Description
This command disables all interfaces on the switch.
Usage Guidelines
This command stops all traffic through the physical ports on the switch. The console port remains active. Use this command only when you have physical access to the switch, so that you can continue to manage using the console port. To shut down an individual interface, tunnel, or VLAN, use the shutdown option within the interface command. To restore the ports, use the no shutdown command.
Example
The following example shuts down all physical interfaces on the switch. (host) (config)#shutdown all
Command History
This command was introduced in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master or local switches
1432 | shutdown
AOS-W 6.2 | Reference Guide
snmp-server
snmp-server community <string> enable trap engine-id host <ipaddr> version {1 <name> udp-port <port>}|2c|{3 <name>} [inform] [interval <seconds>] [retrycount <number>] [udp-port <port>]} inform queue-length <size> source stats trap enable|disable|{source <ipaddr>} user <name> [auth-prot {md5|sha} <password>] [priv-prot {AES|DES} <password>]
Description
This command configures SNMP parameters.
Syntax
Parameter community enable trap engine-id
host
version inform inform stats
trap disable enable source
Description
Range
Sets the read-only community string.
--
Enables sending of SNMP traps to the configured host.
--
Sets the SNMP server engine ID as a hexadecimal number.
24 characters maximum
Configures the IP address of the host to which SNMP traps are -- sent. This host needs to be running a trap receiver to receive and interpret the traps sent by the switch.
Configures the SNMP version and security string for
--
notification messages.
Sends SNMP inform messages to the configured host.
--
Specifies the length for the SNMP inform queue.
100-350
Allows file-based statistics collection for OV-MM-SW. The switch generates a file that contains statistics data used by OVMM-SW to display information in chart and graph formats.
File-based statistics collection is transparent to the user and increases the efficiency of transferring information between the switch and OV-MM-SW.
Source IP address of SNMP traps.
--
Disables an SNMP trap. You can get a list of valid trap names -- using the show snmp trap-list command.
Enables an SNMP trap.
--
Enter the source IP address for sending traps.
--
Default -- disabled --
--
-- disabled 250 enabled
disabled -- -- --
AOS-W 6.2 | Reference Guide
snmp-server | 1433
Parameter udp-port
user auth-prot
priv-prot
Description
Range
The port number to which notification messages are sent.
--
Configures an SNMPv3 user profile for the specified
--
username.
Authentication protocol for the user, either HMAC-MD5-98 Digest Authentication Protocol (MD5) or HMAC-SHA-98 Digest Authentication Protocol (SHA), and the password for use with the designated protocol.
MD5/SHA
Privacy protocol for the user, either Advanced Encryption Standard (AES) or CBC-DES Symmetric Encryption Protocol (DES), and the password for use with the designated protocol.
AES/DES
Default 162 -- SHA
DES
Usage Guidelines
This command configures SNMP on the switch only. You configure SNMP-related information for APs in an SNMP profile which you apply to an AP group or to a specific AP. To configure SNMP hostname, contact, and location information for the switch, use the hostname, syscontact, and syslocation commands.
Example
The following command configures an SNMP trap receiver: (host) (config) #snmp-server host 191.168.1.1 version 2c 12345678
Command History
Release AOS-W 3.0 AOS-W 3.3.1
Modification Command introduced The stats parameter was introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1434 | snmp-server
AOS-W 6.2 | Reference Guide
spanning-tree (Global Configuration)
spanning-tree [forward-time <value> | hello-time <value> | max-age <value> | priority <value> | vlan range <WORD>
RSTP is backward compatible with STP and is enabled by default. For ease of use, this command uses the spanning tree keyword.
Description
This command is the global configuration for the Rapid Spanning Tree Protocol (RSTP) and Per VLAN Spanning Tree (PVST+). See spanning-tree (Configuration Interface) for details on the RSTP (config-if) command.
Syntax
Parameter forward-time hello-time max-age priority
vlan range <WORD>
Description
Range
Specifies the time, in seconds, the port spends in the listening and learning state. During this time, the port waits to forward data packets.
4-30
Specifies the time, in seconds, between each bridge protocol data unit (BPDU) transmitted by the root bridge.
1-10
Specifies the time, in seconds, the root bridge waits to receive a hello packet before changing the STP topology.
6-40
Set the priority of a bridge to make it more or less likely to become the root bridge. The bridge with the lowest value has the highest priority. When configuring the priority, remember the following: The highest priority bridge is the root bridge. The highest priority value is 0 (zero).
0-65535
Enter the keywords vlan range followed by the
--
range of VLAN iID's. Separate the VLAN IDs
with a hyphen, comma or both to indicate the
range.
For example: 2-3 or 2,4,6 or 2-6,11
Default 15 seconds 2 seconds 20 seconds 32768
--
Usage Guidelines
This command configures the global RSTP settings on the switch and is backward compatible with past versions of AOS-W using STP. By default, all interfaces and ports on the switch run RSTP as specified in 802.1w and 802.1D. The default RSTP values can be used for most implementations. Use the no spanning-tree command to disable RSTP.
Examples
The following command sets the time a port spends in the listening and learning state to 3 seconds:
AOS-W 6.2 | Reference Guide
spanning-tree (Global Configuration) | 1435
spanning-tree forward-time 3 The following command sets the time the root bridge waits to transmit BPDUs to 4 seconds:
spanning-tree hello-time 4 The following command sets the time the root bridge waits to receive a hello packet to 30 seconds: spanning-tree max-age 30 The following command sets the bridge priority to 10, making it more likely to become the root bridge:
spanning-tree priority 10 The follow command sets a spanning-tree VLAN range
spanning-tree vlan range 2-8,11
Command History
Release AOS-W 6.0 AOS-W 3.4 AOS-W 1.0
Modification Added support for PVST+ and VLAN and VLAN Range Upgraded STP to RSTP with full backward compatibility Introduced the Spanning Tree Protocol (STP)
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Configuration (config)
1436 | spanning-tree (Global Configuration)
AOS-W 6.2 | Reference Guide
spanning-tree mode
spanning-tree mode <rapid> | <rapid-pvst>
Description
Set the spanning tree mode to either Rapid Spanning Tree (802.1w) or PVST+ (Per VLAN Spanning Tree).
Syntax
Parameter rapid rapid-pvst
Description Set the spanning tree mode to RSTP (Rapid Spanning Tree Protocol). Set the spanning tree mode to PVST+ (Per VLAN Spanning Tree protocol)
Usage Guidelines
Once the spanning tree mode is set, you can configure RSTP or PVST+.
Command History
Release AOS-W 6.0 AOS-W 3.4
Modification PVST+ added Upgraded STP to RSTP with full backward compatibility.
Command Information
Platform All platforms
Licensing Base operating system
Command Mode
Configuration mode (config) on master switches
AOS-W 6.2 | Reference Guide
spanning-tree mode | 1437
spanning-tree (Configuration Interface)
spanning-tree cost <value> point-to-point port-priority <value> portfast vlan <vlan-id> cost <value> port-priority <value> vlan range <WORD>
RSTP is backward compatible with STP and is enabled by default. For clarity, this RSTP command uses the spanning tree keyword.
Description
Alcatel-Lucent's RSTP implementation interoperates with both PVST (Per VLAN Spanning Tree 802.1D) and RapidPVST (802.1w) implementation on industry-standard router/switches. Syntax
Parameter cost <value>
Description
Enter the spanning tree path cost. Use the cost values to determine the most favorable path to a particular destination: the lower the cost, the better the path
point-to-point
Set the interface to a point-to-point
port-priority <value> Change the spanning tree priority.
portfast
Change from blocking to forwarding
vlan <vlan-id>
Enter the keyword vlan followed by the VLAN-ID
cost <value>
Enter th keyword cost followed by the cost value to change the interface's spanning tree path cost.
port-priority <value>
Change the spanning tree priority.
vlan range <WORD>
Enter the keywords vlan range followed by the range of VLAN iID's. Separate the VLAN IDs with a hyphen, comma or both to indicate the range.
For example: 2-3 or 2,4,6 or 2-6,11
Range 1 - 65535
n/a 0 - 255
n/a n/a 1 - 65535
0 - 255 --
Default Default: Based on Interface type: l Fast Ethernet 10Mbs--100 l Fast Ethernet 100Mbs--19 l 1Gigabit Ethernet--4 l 10 Gigabit Ethernet--2 Enabled 128 Disabled
--
128
--
Usage Guidelines
Alcatel-Lucent supports global instances of RSTP and PVST+. Therefore, the ports on industry-standard routers/switches must be on the default or untagged VLAN for interoperability with switches.
AOS-W supports RSTP on the following interfaces:
1438 | spanning-tree (Configuration Interface)
AOS-W 6.2 | Reference Guide
l FastEthernet IEEE 802.3--fastethernet l Gigabitethernet IEEE 802.3--gigabitethernet l Port Channel ID--port-channel In addition to port state changes, RSTP introduces port roles for all the interfaces.
RSTP (802.1w) Port Role Root Designated Alternate
Backup
Description
The port that receives the best BPDU on a bridge.
The port can send the best BPDU on the segment to which it is connected.
The port offers an alternate path, in the direction of root bridge, to that provided by bridge's root port.
The port acts as a backup for the path provided by a designated port in the direction of the spanning tree.
Example
The RSTP default values are adequate for most implementation. Use caution when making changes to the spanning tree values.
(host) (config-if) #spanning-tree cost 345 (host) (config-if) #spanning-tree point-to-point ? (host) (config-if) #spanning-tree portfast ? (host) (config-if) #spanning-tree vlan range 2-8,11
Related Commands
spanning-tree (Global Configuration)
Command History
Release AOS-W 6.0 AOS-W 3.4 AOS-W 1.0
Modification Added support for PVST+ and VLAN and VLAN Range Upgraded STP to RSTP with full backward compatibility. Introduced the Spanning Tree Protocol (STP).
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Configuration Interface (config-if)
AOS-W 6.2 | Reference Guide
spanning-tree (Configuration Interface) | 1439
spanning-tree vlan range (PVST+)
spanning-tree vlan range <WORD> [forward-time <value> | hello-time <value> | max-age <value> | priority <value>]
Description
Configure PVST+ on a range of VLANs.
Syntax
Parameter <WORD> forward-time
hello-time max-age
priority
Description
Enter a string representing the VLAN range
Specifies the time, in seconds, the VLANs spends in the listening and learning state before transition to the forward state.
Set the time interval, in seconds, between transmission of BPDUs.
Set the time interval for the PVST+ bridge to maintain configuration information before refreshing that information.
Set the priority of a bridge to make it more or less likely to become the root bridge. The bridge with the lowest value has the highest priority. When configuring the priority, remember the following: The highest priority bridge is the root bridge. The highest priority value is 0 (zero).
Range -4-30
1-10 6-40
0-65535
Default -15 seconds
2 seconds 20 seconds
32768
Example
The following command sets the time the VLAN range 2-3 spends in the listening and learning state to 3 seconds: spanning-tree vlan range 2-3 forward-time 3 The following command sets the time the VLAN range 2-3 waits to transmit BPDUs to 4 seconds: spanning-tree vlan range 2-3 hello-time 4 The following command sets the time the VLAN range 2-3 waits to receive a hello packet to 30 seconds: spanning-tree vlan range 2-3 max-age 30 The following command sets the VLAN range 2-3 priority to 10, making it more likely to become the root bridge: spanning-tree vlan range 2-3 priority 10
Command History
Release AOS-W 6.0
Modification Command introduced
1440 | spanning-tree vlan range (PVST+)
AOS-W 6.2 | Reference Guide
Command Information
Platforms All Platforms
Licensing Base operating system
Command Mode Configuration Mode (config)
AOS-W 6.2 | Reference Guide
spanning-tree vlan range (PVST+) | 1441
ssh
ssh disable_dsa | mgmt-auth {public-key [username/password] | username/password [public-key]}
Description
This command configures SSH access to the switch.
Syntax
Parameter disable_dsa
mgmt-auth
Description
Disables DSA authentication for SSH. Only RSA authentication is used.
Configures authentication method for the management user. You can specify username/password only, public key only, or both username/password and public key.
Default --
username/ password
Usage Guidelines
Public key authentication is supported using a X.509 certificate issued to the management client. If you specify public-key authentication, you need to load the client X.509 certificate into the switch and configure certificate authentication for the management user with the mgmt-user ssh-pubkey command.
Example
The following commands configure SSH access using public key authentication only: (host) (config) #ssh mgmt-auth public-key
mgmt-user ssh-pubkey client-cert ssh-pubkey cli-admin root
Command History
Version AOS-W 3.0 AOS-W 3.1
Modification Command introduced The mgmt-auth parameter was introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1442 | ssh
AOS-W 6.2 | Reference Guide
stm
add-blacklist-client <macaddr> kick-off-sta <macaddr> <bssid> purge-blacklist-clients remove-blacklist-client <macaddr>
Description
This command is used to manually disconnect a client from an AP or control the blacklisting of clients.
Syntax
Parameter add-blacklist-client kick-off-sta
<macaddr> <bssid> purge-blacklist-client remove-blacklist-client <macaddr>
Description
MAC address of the client to be added to the denial of service list.
When you use the kick-off-sta feature specify a client's MAC address and BSSID, the AP sends deauthorization frames to the station to disconnect it.
MAC address of client to be disconnected.
The associated BSSID of the client to be disconnected.
Clear the entire client blacklist.
Specify the MAC address of a client to remove it from the denial of service list.
Usage Guidelines
When you blacklist a client, the client is not allowed to associate with any AP in the network. If the client is connected to the network when you blacklist it, a deauthentication message is sent to force the client to disconnect. The blacklisted client is blacklisted for the duration specified in the virtual AP profile. The client blacklist supports up to 4,000 individual client entries. The switch retains the client blacklist in the user database, so the information is not lost if the switch reboots. When you import or export the switch's user database, the client blacklist will be exported or imported as well.
Example
The following command blacklists a client: (host) #stm add-blacklist-client 00:01:6C:CC:8A:6D
Command History
Version AOS-W 1.0 AOS-W 6.0
Modification
Command introduced.
The purge-client-blacklist parameter was introduced. The start-trace and stop-trace parameters are no longer functional.
AOS-W 6.2 | Reference Guide
stm | 1443
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master or local switches
1444 | stm
AOS-W 6.2 | Reference Guide
support
support
Description
This command, which should be used only in conjunction with Alcatel-Lucent customer support, is for switch debugging purposes only.
Syntax
No parameters.
Usage Guidelines
This command is used by Alcatel-Lucent customer support for debugging the switch. Do not use this command without the guidance of Alcatel-Lucent customer support.
Example
The following command allows Alcatel-Lucent customer support to debug the switch: (host) #support
Command History
Version AOS-W 2.4 AOS-W 3.1
Modification Command introduced as the secret command Command renamed to support
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
support | 1445
syscontact
syscontact <syscontact>
Description
This command configures the name of the system contact for the switch.
Syntax
Parameter syscontact
Description An alphanumeric string that specifies the name of the system contact.
Usage Guidelines
Use this command to enter the name of the person who acts as the system contact or administrator for the switch. You can use a combination of numbers, letters, characters, and spaces to create the name. To include a space in the name, use quotation marks to enclose the alphanumeric string. For example, to create the system contact name Lab Technician 1, enter "Lab Technician 1" at the prompt. To change the existing name, enter the command with a different string. The new name takes affect immediately. To unconfigure the name, enter "" at the prompt.
Example
The following command defines LabTechnician as the system contact name: (host) (config) #syscontact LabTechnician
Command History
This command was introduced in AOS-W 3.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1446 | syscontact
AOS-W 6.2 | Reference Guide
syslocation
syslocation <syslocation>
Description
This command configures the name of the system location for the switch.
Syntax
Parameter syslocation
Description An alphanumeric string that specifies the name of the system location.
Usage Guidelines
Use this command to indicate the location of the switch. You can use a combination of numbers, letters, characters, and spaces to create the name. To include a space in the name, use quotation marks to enclose the text string. To change the existing name, enter the command with a different string. To unconfigure the location, enter "" at the prompt.
Example
The following command defines SalesLab as the location for the switch: (host) # syslocation "Building 10, second floor, room 21E" syscontact LabTechnician
Command History
This command was introduced in AOS-W 3.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
syslocation | 1447
tar
tar clean {crash|flash|logs}| crash | flash | logs [tech-support]
Description
This command archives a directory.
Syntax
Parameter clean
crash flash logs crash flash logs
Description Removes a tar file Removes crash.tar Removes flash.tar.gz Removes logs.tar Archives the crash directory to crash.tar. A crash directory must exist. Archives and compresses the /flash directory to flash.tar.gz. Archives the logs directory to log.tar. Optionally, technical support information can be included.
Usage Guidelines
This command creates archive files in Unix tar file format.
Example
The following command creates the log.tar file with technical support information: tar logs tech-support
Command History
The command was introduced in AOS-W 3.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
1448 | tar
AOS-W 6.2 | Reference Guide
telnet
telnet {cli|soe}
Description
Enable telnet to the switch or to an AP through the switch.
Syntax
Parameter cli soe
Description Enable telnet using the CLI. Enable telnet using Serial over Ethernet (SoE).
Default Disabled Disabled
Usage Guidelines
Use the cli option to enable telnet to the switch. Use the soe option to enable telnet using the SoE protocol. This allows you to remotely manage an AP directly connected to the switch.
Example
The following example enables telnet to the switch using the CLI. (host) (config) #telnet cli
Command History
The command was introduced in AOS-W 1.0
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
telnet | 1449
threshold
threshold controlpath-cpu <percentage> controlpath-memory <percentage> datapath-cpu <percentage> no-of-APs <percentage> no-of-locals <percentage> total-tunnel-capacity <percentage> user-capacity <percentage> no ...
Description
This command configures switch capacity thresholds which, when exceeded, will trigger alerts.
Syntax
Parameter controlpath-cpu <percentage>
controlpath-memory <percentage> datapath-cpu <percentage>
no-of-APs <percentage>
no-of-locals <percentage>
total-tunnel-capacity <percentage>
Description
Set an alert threshold for controlpath CPU capacity. The <percentage> parameter is the percentage of the total controlpath CPU capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%.
Set an alert threshold for controlpath memory consumption. The <percentage> parameter is the percentage of the total memory capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 85%.
Set an alert threshold for datapath CPU capacity. The <percentage> parameter is the percentage of the total datapath CPU capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 30%.
The maximum number of APs that can be connected to a switch is determined by that switch's model type and installed licenses. Use this command to trigger an alert when the number of APs currently connected to the switch exceeds a specific percentage of its total AP capacity. The default threshold for this parameter is 80%.
Set an alert threshold for the master switch's capacity to support remote nodes and local switches. A master switch can support a combined total of 256 remote nodes and local switches. The <percentage> parameter is the percentage of the total master switch capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%.
Set an alert threshold for the switch's tunnel capacity. The <percentage> parameter is the percentage of the switch's total tunnel capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%
1450 | threshold
AOS-W 6.2 | Reference Guide
Parameter user-capacity <percentage>
Description
Set an alert threshold for the switch's user capacity. The <percentage> parameter is the percentage of the total resource capacity that must be exceeded before the alert is sent. The default threshold for this parameter is 80%.
Usage Guidelines
The switch will send a wlsxThresholdExceeded SNMP trap and a syslog error message when the switch has exceeded a set percentage of the total capacity for that resource. A wlsxThresholdCleared SNMP trap and error message will be triggered if the resource usage drops below the threshold once again.
Example
The following command configures a new alert threshold for controlpath memory consumption:
(host) (config) #threshold datapath-cpu 90
If this threshold is exceeded then subsequently drops below the 90% threshold, the switch would send the following two syslog error messages.
Mar 10 13:13:58 nanny[1393]: <399816> <ERRS> |nanny| above 90% threshold, value : 93 Mar 10 13:16:58 nanny[1393]: <399816> <ERRS> |nanny| below 90% threshold, value : 87
Resource 'Control-Path Memory' has gone Resource 'Control-Path Memory' has come
Command History
The command was introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
threshold | 1451
time-range
time-range <name> absolute [end <mm/dd/yyyy> <hh:mm>]|[start <mm/dd/yyyy> <hh:mm>] time-range <name> periodic Daily <hh:mm> to <hh:mm> Friday <hh:mm> to <hh:mm> Monday <hh:mm> to <hh:mm> Saturday <hh:mm> to <hh:mm> Sunday <hh:mm> to <hh:mm> Thursday <hh:mm> to <hh:mm> Tuesday <hh:mm> to <hh:mm> Wednesday <hh:mm> to <hh:mm> Weekday <hh:mm> to <hh:mm> Weekend <hh:mm> to <hh:mm> no ...
Description
This command configures time ranges.
Syntax
Parameter <name> absolute periodic
no
Description Name of this time range. You can reference this name in other commands. Specifies an absolute time range, with a specific start and/or end time and date. Specifies a recurring time range. Specify the start and end time and Daily, Weekday, Weekend, or the day of the week. Negates any configured parameter.
Usage Guidelines
You can use time ranges when configuring session ACLs. Once you configure a time range, you can use it in multiple session ACLs.
Example
The following command configures a time range for daytime working hours: (host) (config) #time-range working-hours periodic
weekday 7:30 to 18:00
Command History
The command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1452 | time-range
AOS-W 6.2 | Reference Guide
tracepath
tracepath <global-address>
Description
Traces the path of an IPv6 host.
Syntax
Parameter
Description
<global-address> The IPv6 global address of the host.
Usage Guidelines
Use this command to identify points of failure in your IPv6 network.
Example
The following command traces the path of the specified IPv6 host. (host) #tracepath 2005:d81f:f9f0:1001::14
Command History
The command was introduced in AOS-W 6.1.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
User, Enable, and Config modes on local or master switches
AOS-W 6.2 | Reference Guide
tracepath | 1453
traceroute
traceroute <ipaddr>
Description
Trace the route to the specified IP address.
Syntax
Parameter <ipaddr>
Description The destination IP address.
Usage Guidelines
Use this command to identify points of failure in your network.
Example
The following command traces the route to the device identified by the IP address 10.1.2.3. (host) (config) #traceroute 10.1.2.3
Command History
The command was introduced in AOS-W 2.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
User, Enable, and Config modes on local or master switches
1454 | traceroute
AOS-W 6.2 | Reference Guide
trusted
trusted all
Description
This command makes all physical interfaces on the switch trusted ports.
Syntax
Parameter all
Description Makes all ports on the switch trusted.
Usage Guidelines
Trusted ports are typically connected to internal controlled networks. Untrusted ports connect to third-party APs, public areas, or any other network to which the switch should provide access control. When APs are attached directly to the switch, set the connecting port to be trusted. By default, all ports on the switch are treated as trusted. You can use the interface fastethernet or interface gigabitethernet commands to make individual ports trusted.
Example
The following command makes all ports trusted: (host) (config) #trusted all
Command History
The command was introduced in AOS-W 2.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
trusted | 1455
tunnel-loop-prevention
tunnel-loop-prevention
Description
This command prevents prevent forwarding loops between tunneled nodes on the switch. The tunneled node loop prevention function appears on the WebUI as the "Enable Wired Access Concentrator Loop Prevention" option. It is located on the Configuration > Advanced Services > Wired Access > Wired Access Concentration Configuration pane
Syntax
No parameters.
Usage Guidelines
To prevent broadcast traffic being flooded on the tunneled nodes. You need to enable broadcast-filter-arp if you want to allow a tunneled node-connected machine communicate with another switch that is connected client on the same subnet.
Example
The following command prevents tunneled node forwarding: (host) (config) #tunnel-loop-prevention
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced
The command name changed from mux-loop-prevention to tunnel-loop-prevention.
Related Commands
(host) (config) #show tunneled-node config (host) (config) #show tunneled-node state
Command Information
Platforms All platforms
Licensing Requires the PEFNG license.
Command Mode Config mode on master switches
1456 | tunnel-loop-prevention
AOS-W 6.2 | Reference Guide
tunnel-node-mtu
tunnel-node-mtu <mtu> Description
This command configures the MTU of a tunneled node.
Syntax
Parameter tnode-mtu
Description
Value of the MTU for the tunneled nodes Range - 1024 to 9216
Usage Guidelines
An Alcatel-Lucent switch can operate as a Wi-Fi switch, terminating GRE tunnels from tunneled node switches. As a Wi-Fi switch, the switch does not perform full Wi-Fi switching functions. Instead, it accepts traffic from ports designated as tunneled node ports, packages this traffic inside a GRE tunnel, and forwards the traffic back to a central switch for processing.
Example
The following command configures the MTU of a switch for tunneled nodes: (host) (config) #tunnel-node-mtu 1030
Command History
The command was introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
tunnel-node-mtu | 1457
tunneled-node-address
tunneled-node-address <ipaddr>
Description
This command configures the IP address of a tunneled node server.
Syntax
Parameter
tunneled-nodeaddress
Description
IP address of the switch. This is the loopback or IP address of the switch acting as a tunneled node switch.
Usage Guidelines
An Alcatel-Lucentswitch can operate as a Wi-Fi switch, terminating GRE tunnels from tunneled node switches. As a Wi-Fi switch, the switch does not perform full Wi-Fi switching functions. Instead, it accepts traffic from ports designated as tunneled node ports, packages this traffic inside a GRE tunnel, and forwards the traffic back to a central switch for processing.
Example
The following command configures the address of a switch for tunneled nodes: (host) (config) #tunneled-node-address 192.168.1.245
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification Command introduced The command name changed to tunneled-node-port.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1458 | tunneled-node-address
AOS-W 6.2 | Reference Guide
uplink
crypto-local uplink {cellular priority <prior>}|disable|enable|{wired priority <prior>}|{wired vlan <id>}
Description
Manage and configure the uplink network connection on the OAW-4306 Seriesswitches.
Syntax
Parameter cellular priority <prior>
enable disable wired priority <prior> wired vlan <id>
Description
Set the priority of the cellular uplink. By default, the cellular uplink is a lower priority than the wired uplink; making the wired link the primary link and the cellular link the secondary or backup link. Configuring the cellular link with a higher priority than your wired link priority will set your cellular link as the primary switch link.
Enable the uplink manager.
Disable the uplink manager.
Set the priority of the wired uplink. Each uplink type has an associated priority; wired ports having the highest priority by default.
Define the VLAN identification (ID) of the uplink VLAN . A maxmim of four wired VLANs can be defined
Range 1-255
-- --
1-255 1-4094
Usage Guidelines
The OAW-4306 Seriesswitches supports multiple 3G cellular uplinks in addition to its standard wired ports, providing redundancy in the event of a connection failure. If an OAW-4306 Series' wired link cannot access the internet, the switch can fail over to a secondary cellular link and continue routing traffic.
Command History
Release AOS-W 3.4 AOS-W 6.0
Modification Command introduced The wired prority parameter was introduced.
Command Information
Platforms OAW-4306 Seriesswitches
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
uplink | 1459
usb-printer
usb-printer [printer <printer-name> alias <alias-name>]
Description
This command allows you to provide an alias to USB printers connected to OAW-4306G series switches.
Syntax
Parameter printer
alias
Description
Enter the default printer name. To get the default printer name use the show network-printer status command.
Enter a new alias name for the printer.
Example
The following command creates an alias for a printer: (host) usb-printer printer usblp_HP_Officejet_Pro_L7500_MY872231FX alias HPOJ_L7500 (host) #show network-printer status
Networked Printer Status -----------------------Printer Name -----------usblp_Hewlett-Packard_HP_Color_LaserJet_CP3505_CNBJ8B1003 usblp_HP_Officejet_Pro_L7500_MY872231FX
Printer Alias ------------HPLJ_P3005 HPOJ_L7500
Status -----idle idle
Comment ------enabled enabled
Command History
This command was introduced in AOS-W 3.4.
Command Information
Platforms OAW-4306 Series switches
Licensing Base operating system
Command Mode Enable mode.
1460 | usb-printer
AOS-W 6.2 | Reference Guide
usb reclassify
crypto-local usb reclassify <address>
Description
Disconnect and reclassify an USB device.
Syntax
Parameter <address>
Description USB device address from the show usb command.
Usage Guidelines
There's no way to power off an USB port on the OAW-4306 Series switch, but you can re-initialize the device using the usb reclassify command. This command removes the modem from the USB device list, then detects it via the USB table.
Command History
Introduced in AOS-W 3.4.
Command Information
Platforms OAW-4306 Series switches
Licensing Base operating system
Command Mode Config mode on master and local switches
AOS-W 6.2 | Reference Guide
usb reclassify | 1461
user-role
user-role <name> access-list {eth|mac|session} <acl> [ap-group <group>] [position <number>] bw-contract <name> [per-user] {downstream|upstream} captive-portal <profile> dialer <name> max-sessions <number> no ... pool {l2tp|pptp} <name> reauthentication-interval <minutes> session-acl <string> [ap-group <group>] [position <number>]a stateful-ntlm <ntlm_profile_name> vlan {VLAN ID|VLAN name} wispr <wispr_profile_name>
Description
This command configures a user role.
Syntax
Parameter <name> access-list
<acl> ap-group position bandwidth-con tract
downstream per-user
upstream
Description
Range Default
Name of the user role.
--
--
Type of access control list (ACL) to be applied:
--
--
eth: Ethertype ACL, configured with the ip access-list eth
command.
mac: MAC ACL, configured with the ip access-list mac
command.
session: Session ACL, configured with the ip access-list
session command.
Name of the configured ACL.
(Optional) AP group to which this ACL applies.
--
--
(Optional) Position of this ACL relative to other ACLs that you -- can configure for the user role. 1 is the top.
(last)
Name of a bandwidth contract or rate limiting policy
--
--
configured with the aaa bandwidth-contract command. The
bandwidth contract must be applied to either downstream or
upstream traffic.
Applies the bandwidth contract to traffic from the switch to the --
--
client.
Specifies that bandwidth contract is assigned on a per-user
--
basis instead of a per-role basis. For example, if two users are
active on the network and both are part of the same role with a
500 Kbps bandwidth contract, then each user is able to use
up to 500 Kbps.
(per role)
Applies the bandwidth contract to traffic from the client to the --
--
switch.
1462 | user-role
AOS-W 6.2 | Reference Guide
Parameter captive-portal dialer
max-sessions no pool
<name> reauthentica tion-interval session-acl <string>
ap-group position stateful-ntlm vlan
wispr
Description
Range Default
Name of the captive portal profile configured with the aaa
--
--
authentication captive-portal command.
If VPN is used as an access method, name of the VPN dialer --
--
configured with the vpn-dialer command. The user can login
using captive portal and download the dialer. The dialer is a
Windows application that configures the VPN client.
Maximum number of datapath sessions per user in this role.
0-
65535
65535
Negates any configured parameter.
--
--
If VPN is used as an access method, specifies the IP address --
--
pool from which the user's IP address is assigned:
l2tp: When a user negotiates a Layer-2 Tunneling Protocol
(L2TP)/ IPsec session, specifies an address pool configured
with the ip local pool command.
pptp: When a user negotiates a Point-to-Point Tunneling
Protocol (PPTP) session, specifies an address pool
configured with the pptp ip local pool command.
Name of the L2TP or PPTP pool to be applied.
--
--
Interval, in minutes, after which the client is required to reauthenticate.
0-4096, 0
0 to
(dis-
disable abled)
Session ACL configured with the ip access-list session command. You can specify both IPv4 and IPv6 ACLs.
--
--
(Optional) AP group to which this ACL applies.
--
--
(Optional) Position of this ACL relative to other ACLs that you -- can configure for the user role. 1 is the top.
(last)
Apply stateful NTLM authentication to the specified user role
Identifies the VLAN ID or VLAN name to which the user role is --
--
mapped. This parameters works only when using Layer-2
authentication such as 802.1X or MAC address, ESSID, or
encryption type role mapping because these authentications
occur before an IP address is assigned. If a user authenticates
using a Layer-3 mechanism such as VPN or captive portal this
parameter has no effect.
NOTE: VLAN IDs and VLAN names cannot be listed together.
Apply WISPr authentication to the specified user role.
Usage Guidelines
Every client in a user-centric network is associated with a user role. All wireless clients start in an initial role. From the initial role, clients can be placed into other user roles as they pass authentication.
Example
The following command configures a user role: (host) (config) #user-role new-user
dialer default-dialer
AOS-W 6.2 | Reference Guide
user-role | 1463
pool pptp-pool-1
Command History
Version AOS-W 3.0 AOS-W 3.4.1 AOS-W 6.1
Modification Command introduced
The stateful-ntlm and wispr parameters were introduced.
The ipv6 session-acl parameter was removed. The session-acl parameter is common for both IPv4 and IPv6 ACLs.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license.
Command Mode Config mode on master switches
1464 | user-role
AOS-W 6.2 | Reference Guide
valid-network-oui-profile
valid-network-oui-profile no oui <oui>
Description
This command allows you to add a new OUI to the switch
Syntax
Parameter no oui <oui>
Description
Range
Negates any configured parameter.
--
The new OUI to be added. Use the aa:bb:cc format -- to input the new OUI.
Default -- --
Usage Guidelines
This command adds a new OUI to the switch. The new OUI must be entered in a aa:bb:cc format.
Example
The following command adds a new OUI to the switch.
(host) (config) #valid-network-oui-profile (host) (Valid Equipment OUI profile) # (host) (Valid Equipment OUI profile) #oui 00:11:22 This should only be used when adding equipment with a new OUI. want to proceed? [y/n]: y
Are you sure you
Command History
Release AOS-W 5.0
Modification Command introduced
Command Information
Platforms Available on all platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
valid-network-oui-profile | 1465
vlan-bwcontract-explist
vlan-bwcontract-explist mac <mac>
Description
Use this command to add entries to or remove entries from the MAC exception list for bandwidth contracts on broadcast/multicast traffic.
Syntax
Parameter <mac>
Description
MAC address of a protocol that should be added to or removed from the exception list for bandwidth contracts.
Usage Guidelines
Bandwidth contracts on a VLAN can limit broadcast and multicast traffic. AOS-W version 6.0 and later includes an internal exception list to allow broadcast and multicast traffic using the VRRP, LACP, OSPF, PVST and STP protocols. To remove per-vlan bandwidth contract limits on an additional broadcast or multicast protocol, add the MAC address for that broadcast/multicast protocol to the Vlan Bandwidth Contracts MAC Exception List.
Example
The following command adds the MAC address for CDP (Cisco Discovery Protocol) and VTP (Virtual Trunking Protocol to the list of protocols that are not limited by VLAN bandwidth contracts. (host) (config) #vlan-bwcontract-explist mac 01:00:0C:CC:CC:CC
Command History
Command introduced in AOS-W 6.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master or local switches
1466 | vlan-bwcontract-explist
AOS-W 6.2 | Reference Guide
vlan-name
vlan-name <name> [pool|assignment {even|hash}]
Description
This command creates a named VLAN on the switch. It can be added to a pool and given an assignment type.
Syntax
Parameter <name> [pool] assignment
even
hash
Description
Range
132 characters
Sets the named VLAN to be a pool.
--
Sets the assignment type. This determines how a VLAN -- assignment is handled by the switch.
Sets the assignment type as even.The Even assignment -- type is based on an even distribution of VLAN pool assignments.
Sets the assignment type as hash. The hash type means -- that the VLAN assignment is based on the station MAC address.
Usage Guidelines
Create a named VLAN so you can set up a VLAN pool. A VLAN pool consists of a set of VLAN IDs which are grouped together to efficiently manage multi-switch networks from a single location.
VLAN pooling should not be used with static IP addresses.
The Even VLAN Pool assignment type maintains a dynamic latest usage level of each VLAN ID in the pool. Therefore, as users age out, the number of available addresses increases. This leads to a more even distribution of addresses. The Even type is only supported in tunnel and dtunnel modes. It is not supported in split or bridge modes and it is not allowed for VLAN pools that are configured directly under a virtual AP. It can only be used under named VLANs. If a VLAN pool is given an Even assignment in bridge mode, a message displays indicating that the Hash assignment is automatically used instead to retrieve the VLAN ID. L2 Mobility is not compatible with the existing implementation of the Even VLAN pool assignment type.
Example
The following command creates a VLAN pool named mygroup with the assignment type "even" on the switch: (host) (config) #vlan-name mygroup pool assignment even
Related Commands
(host) (config) #show vlan
AOS-W 6.2 | Reference Guide
vlan-name | 1467
Command History
Version AOS-W 3.0 AOS-W 3.4 AOS-W 6.2
Modification Command introduced.
The pool parameter was introduced.
The assignment type parameter was introduced along with the even and hash options.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1468 | vlan-name
AOS-W 6.2 | Reference Guide
vlan
vlan <id> [<description>] |[<name> <vlan-ids>]|[range <range>]|[wired aaa-profile <profile>]
Description
This command creates a VLAN ID or a range of VLAN IDs on the switch.
Syntax
Parameter <id> <description>
<name>
<vlan-ids>
range <range> wired aaa-profile <profile>
Description
Range
Default
Identification number for the VLAN.
2-4094
1
Description of a VLAN ID.
1-32 characters; cannot begin with a numeric character
VLAN000x, where x is the ID number.
(Optional) Identification name of the VLAN. The VLAN name was created using the vlan-name command.
1-32 characters; a name cannot begin with a numeric character
VLAN<id>
(Optional) List of VLAN IDs that are
Existing
1
associated with this VLAN. If two or more VLAN IDs
IDs are listed, the VLAN needs to specified
first as a VLAN pool using the vlan-name
command.
Create a range of multiple VLAN IDs by
2-4094
--
specifying the beginning and ending
VLAN ID separated by a hyphen.
For example, 55-58
Assign an AAA profile to a VLAN to enable --
--
role-based access for wired clients
connected to an untrusted VLAN or port on
the switch. This parameter applies to wired
clients only.
Note that this profile will only take effect if
the VLAN and/or the port on the switch is
untrusted. If both the port and the VLAN
are trusted, no AAA profile is assigned.
Usage Guidelines
Use the interface vlan command to configure the VLAN interface, including an IP address. Use the vlan-name command to create a named VLAN to set up a VLAN pool. A VLAN pool consists of a set of VLAN IDs which are grouped together to efficiently manage multi-switch networks from a single location.
To enable role-based access for wired clients connected to an untrusted VLAN and/or port on the switch, you must use the wired aaa-profile parameter to specify the wired AAA profile you would like to apply to that VLAN. If you do not specify a per-VLAN wired AAA profile, traffic from clients connected to an untrusted wired port or VLAN will use the global wired AAA profile, if configured.
AOS-W 6.2 | Reference Guide
vlan | 1469
Example
The following command creates VLAN ID 27 with the description myvlan on the switch. (host) (config) #vlan 27 myvlan The following command associates the VLAN IDs 5, 12 and 100 with VLAN guestvlan on the switch. vlan guestvlan 5,12,100 The following command creates VLAN IDs 200-300, 302, 303-400. (host) (config) #vlan range 200-300,302, 303-400
Related Commands
Command show vlan
aaa authentication wired
Description
This command shows a configured VLAN interface number, description and associated ports
This command configures authentication for a client device that is directly connected to a port on the switch.
Command History
Release AOS-W 3.0 AOS-W 3.4 AOS-W 3.4.1 AOS-W 6.0
Modification Command available. vlan-ids parameter introduced. vlan range parameter introduced. wired aaa-profile parameter introduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1470 | vlan
AOS-W 6.2 | Reference Guide
voice dialplan-profile
voice dialplan-profile <profile> clone <source> dialplan {<sequence> <pattern> <action>} no...
Description
This command allows you to create a dial plan profile and configure dial plans to the profile.
Syntax
Parameter <profile> clone dialplan
<sequence> <pattern>
<action>
Description
Name of this instance of the dial plan profile.
Name of the existing dial plan profile from which parameter values are copied.
Configures a dialplan with the sequence, pattern, and action specified for the profile. You can configure upto 20 dialplans for a profile.
A number that positions the dial plan in the list of dial plans configured in the switch. The range is 100 - 65535.
A digit pattern or the number of digits that will be dialed by the user. You can specify the digit pattern using `X', `Z', `N', `[ ]' and `.'. l X is a wild card that represents any character from 0 to 9. l Z is a wild card that represents any character from 1 to 9. l N is a wild card that represents any character from 2 to 9. l [ ] is a wild card that represents the number or the range specified in the
brackets. l . (period) is a wild card that represents any-length digit strings.
A prefix code that is automatically prefixed to the dialed number. This is specified as <prefix-code>%e. Examples of dial plans are: l 9%e: The number 9 is prefixed to the dialed number. l 91%e: The number 91 is prefixed to the dialed number.
Usage Guidelines
You can configure dial plans on the switch that are required by the local EPABX system to provide outgoing PSTN call facility from a SIP device.
Dial plan can be configured only for SIP over UDP.
Example
The following command creates a dial plan for the dial plan profile, local:
(host) (config) #voice dialplan-profile local (host) (Dialplan Profile "local") #dialplan 300 Z. 91%e
AOS-W 6.2 | Reference Guide
voice dialplan-profile | 1471
Command History
Version AOS-W 6.0
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode Config mode on master switch
1472 | voice dialplan-profile
AOS-W 6.2 | Reference Guide
voice logging
voice logging client mac <client mac> no ...
Description
This command allows you to enable logging for a voice client.
Syntax
Parameter client mac
Description MAC address of the voice client to be enabled for voice logging.
Usage Guidelines
You can enable voice logging for a specific voice client based on the MAC address of the client to troubleshoot any voice issues.
Example
The following command enables voice logging on the client with the MAC address 11:22:33:44:55:67: (host) (config) #voice logging (host)(VoIP Logging) #client-mac 11:22:33:44:55:67
Command History
Version AOS-W 6.0
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode Config mode on master switch
AOS-W 6.2 | Reference Guide
voice logging | 1473
voice real-time-config
voice real-time-config config-enable no...
Description
This command enables the switch to analyze the call quality of the voice calls based on the RTP media streams.
Syntax
Parameter config-enable
Description
Enables the switch to analyze the call quality of the voice calls based on the RTP media streams.
Default disabled
Usage Guidelines
You can enable the switch to compute and display the call quality parameters such as Jitter, delay, packet loss, and R-value directly from the RTP media stream of the voice calls. config-enable enables the switch to analyze the call quality of the voice calls based on the RTP media streams.
Example
The following command enables the switch to analyze the RTP media streams for call quality reports: (host) (config) #voice real-time-config (host) (Configure Real-Time Analysis) #config-enable
Command History
Version AOS-W 6.0
Description Command introduced.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode Config mode on master switch
1474 | voice real-time-config
AOS-W 6.2 | Reference Guide
voice rtcp-inactivity
voice rtcp-inactivity {enable | disable}
Description
This command enables or diables the RTCP inactivity timer.
Syntax
Parameter enable disable
Description Enables the RTCP inactivity timer. Disables the RTCP inactivity timer.
Usage Guidelines
You can enable the RTCP inactivity timer to clear a voip session if an on-hold client moves out of the coverage area.
Example
The following command enables the RTCP inactivity timer: (host) (config) #voice rtcp-inactivity enable
Command History
Version AOS-W 5.0 AOS-W 6.0
Description
The rtcp-inactivity parameter was introduced to the voip command.
This was part of the voip command in the earlier version. voip command is now deprecated.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode Config mode on master switch
AOS-W 6.2 | Reference Guide
voice rtcp-inactivity | 1475
voice sip
voice sip dialplan-profile <dial-plan profile> no... session-expiry <session-expiry> session-timer
Description
This command allows you to enable SIP session timer and associate a dial plan profile to the SIP ALG.
Syntax
Parameter dial-plan profile session-expiry
session-timer
Description Name of the existing Dial plan profile to be associated to the SIP ALG.
Default _
Timeout value in seconds for the session timer. The range is 240 - 1200 seconds.
If enabled, the SIP session is terminated when no session refresh request is received within the timeout value.
300 sec disabled
Usage Guidelines
You can configure the SIP settings such as enabling the session timer and associating a dial plan profile to the SIP ALG. session-timer acts as a keep alive mechanism for the SIP sessions using the periodic session refresh requests from the user agents. The interval for the session refresh requests is determined through a negotiation mechanism. If a session refresh request is not received within the negotiated interval, the session is terminated. session-expiry is the timeout interval of the session timer configured on the SIP ALG.
Example
The following command enables session timer on the SIP ALG: (host) (config) #voice sip (host)(SIP settings) #session-timer The following command sets the timeout value of the session timer to 400 seconds on the SIP ALG: (host)(SIP settings) #session-expiry 400 The following command associates the dial plan profile, default to the SIP ALG: (host)(SIP settings) #dialplan-profile default
Command History
Version AOS-W 6.0
Description Command introduced.
1476 | voice sip
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode Config mode on master switch
AOS-W 6.2 | Reference Guide
voice sip | 1477
voice sip-midcall-req-timeout
voice sip-midcall-req-timeout {enable | disable}
Description
This command enables or diables the SIP mid-call request timer.
Syntax
Parameter enable disable
Description Enables the SIP mid-call request timer. Disables the timer.
Usage Guidelines
You can enable the SIP mid-call request timer on the switch to clear the voip session if there is no response to a SIP mid-call request.
Example
The following command enables the SIP mid-call request timer: (host) (config) #voice sip-mid-call-req-timeout enable
Command History
Version AOS-W 5.0 AOS-W 6.0
Description
The sip-midcall-req-timeout parameter was introduced to the voip command.
This was part of the voip command in the earlier version. voip command is now deprecated.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode Config mode on master switch
1478 | voice sip-midcall-req-timeout
AOS-W 6.2 | Reference Guide
voice test
voice test force_send_delts sta <sta-mac> tid <tid_number>
Description
This command allows a user to manually send Delete Traffic Stream (DELTS) management frames.
Syntax
Parameter <sta-mac> <tid_number>
Description
The MAC address of the client station to which the DELTS are sent
The traffic stream id. The valid range for this parameter is 0 to 7. If the traffic stream ID is not specified and there are multiple live traffic streams, multiple DELTS will be sent out to the station.
Usage Guidelines
Issue this command to send DELTS for a live traffic stream, even if the client is not a voice client.
Example
The following command sends DELTS to a station with the MAC address 08:00:69:02:01:FA.
(host) (config) #voice test force_send_delts sta <08:00:69:02:01:FA> tid 6
Command History
This command was introduced in AOS-W 6.1.
Command Information
Platforms All platforms
Licensing
This command requires the PEFNG license
Command Mode Config mode on a master or local switch
AOS-W 6.2 | Reference Guide
voice test | 1479
vpdn group l2tp
vpdn group l2tp client configuration {dns|wins} <ipaddr1> [<ipaddr2>] disable|enable l2tp tunnel hello <seconds> no ... ppp authentication {CACHE-SECURID|CHAP|EAP|MSCHAP|MSCHAPv2|PAP} ppp securid cache <minutes>
Description
This command configures an L2TP/IPsec VPN connection.
Syntax
Parameter client configuration
dns wins disable|enable l2tp tunnel hello no ppp authentication
CACHE-SECURID
CHAP EAP
MSCHAP MSCHAPv2 PAP ppp securid
Description Configures parameters for the remote clients.
Range Default
--
--
Configures a primary and optional secondary DNS
--
server.
Configures a primary and optional secondary WINS
--
server.
Disables or enables termination of L2TP clients.
--
Configures L2TP tunneling hello timeout, in seconds.
101440
Negates any configured parameter.
--
Enables the protocols for PPP authentication. This list -- should match the L2TP configuration configured with the vpn-dialer command on the switch.
The switch caches Secure ID tokens so that the user
--
does not need to reauthenticate each time a network
connection is lost.
Use CHAP with PPP authentication.
--
Use EAP-TLS with PPP authentication. Specify this
--
protocol for Windows IPsec VPN clients that use
Common Access Card (CAC) Smart Cards that contain
user information and digital certificates.
Use MSCHAP with PPP authentication.
--
Use MSCHAPv2 with PPP authentication. This is the
--
default for L2TP
--
If CACHE-SECURID is configured for PPP authentication, this specifies the time, in minutes, that the token is cached.
1510080
-- -- enabled 60 seconds -- --
--
-- --
-- -- -- 1440 minutes
1480 | vpdn group l2tp
AOS-W 6.2 | Reference Guide
Usage Guidelines
L2TP/IPsec relies on the PPP connection process to perform user authentication and protocol configuration. You specify the protocol used for PPP authentication and whether SecureID tokens are cached on the switch. Client addresses are assigned from a pool configured with the ip local pool command.
Example
The following command configures virtual private dial-in networking: (host) (coinfig) #vpdn group l2tp
ppp authentication PAP client configuration dns 10.1.1.2 client configuration wins 10.1.1.2
Command History
The command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
vpdn group l2tp | 1481
vpdn group pptp
vpdn group pptp client configuration {dns|wins} <ipaddr1> [<ipaddr2>] disable|enable no ... ppp authentication {MSCHAP|MSCHAPv2} pptp echo <seconds>
Description
This command configures a PPTP VPN connection.
Syntax
Parameter client configuration
dns wins disable|enable no ppp authentication
MSCHAP MSCHAPv2 pptp echo
Description
Range
Configures parameters for the remote clients.
--
Configures a primary and optional secondary
--
DNS server.
Configures a primary and optional secondary
--
WINS server.
Disables or enables termination of PPTP clients. --
Negates any configured parameter.
--
Enables the protocols for PPP authentication.
--
This list should match the PPTP configuration
configured with the vpn-dialer command on the
switch.
Use MSCHAP with PPP authentication.
--
Use MSCHAPv2 with PPP authentication. This -- is the default for L2TP
Time, in seconds, that the switch waits for a PPTP echo response from the client before considering the client to be down. The client is disconnected if it does not respond within this interval.
10-300
Default -- -- -- enabled -- --
-- -- 60 seconds
Usage Guidelines
PPTP connections require user-level authentication through a PPP authentication protocol (MSHCAPv2 is the currently-supported method.) Client addresses are assigned from a pool configured with the pptp command.
Example
The following command configures virtual private dial-in networking: vpdn group pptp
ppp authentication MSCHAPv2 client configuration dns 10.1.1.2 client configuration wins 10.1.1.2
1482 | vpdn group pptp
AOS-W 6.2 | Reference Guide
Command History
The command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
vpdn group pptp | 1483
vpn-dialer
vpn-dialer <name> enable dnetclear|l2tp|pptp|securid_newpinmode|wirednowifi ike {authentication {pre-share <key>|rsa-sig}|encryption {3des|des}| group {1|2}|hash {md5|sha}|lifetime [<seconds>]} ipsec {encryption {esp-3des|esp-des}|hash {esp-md5-hmac|esp-sha-hmac}| lifetime [<seconds>]|pfs {group1|group2}} no {enable...|ipsec...|ppp...} ppp authentication {cache-securid|chap|mschap|mschapv2|pap}
Description
This command configures the VPN dialer.
Syntax
Parameter <name> enable
dnetclear
l2tp
pptp securid_newpinmode wirednowifi
ike
authentication encryption group hash
Description
Range
Default
Name that identifies this VPN dialer configuration.
--
--
Enables dialer operations:
--
--
Enables "split tunneling" functionality so that
--
traffic destined for the internal network is
tunneled while traffic for the Internet is not. This
option is not recommended for security reasons.
disabled
Allows the dialer to negotiate a Layer-2
--
Tunneling Protocol (L2TP)/IPsec tunnel with the
switch.
enabled
Allows the dialer to negotiate a Point-to-Point
--
Tunneling Protocol (PPTP) with the switch.
disabled
Supports SecurID new and next pin mode.
--
disabled
Allows the dialer to detect when a wired network -- connection is in use, and shuts down the wireless interface.
disabled
Configures internet key exchange (IKE) protocol. --
--
This configuration must match the IKE policy
configured with the crypto isakmp policy
command on the switch.
Specifies whether preshared keys or RSA signatures are used for IKE authentication.
pre-share | pre-share rsa-sig
Specifies the IKE encryption protocol, either DES 3des | des 3des or 3DES.
Specifies the Diffie-Hellman group, either 1 or 2. 1 | 2
2
Specifies the HASH algorithm, ether SHA or MD5.
md5 | sha sha
1484 | vpn-dialer
AOS-W 6.2 | Reference Guide
Parameter lifetime
ipsec
encryption hash
lifetime pfs no ppp authentication
cache-securid
chap mschap mschapv2 pap
Description
Range
Default
Specifies how long an IKE security association lasts, in seconds.
300-86400 28800 seconds
Configures IPsec. This configuration must match --
--
the IPsec parameters configured with the crypto
dynamic-map and crypto ipsec commands on the
switch.
Specifies the encryption type for IPsec, either DES or 3DES.
esp-3des | esp-3des esp-des
Specifies the hash algorithm used by IPsec, either MD5 or SHA.
esp-md5hmac | espsha- hmac
esp-shahmac
Specifies how long an IPsec security association 300-86400 7200
lasts, in seconds.
seconds
Specifies the IPsec Perfect Forward Secrecy (PFS) mode, either group 1 or group 2.
group1 | group2
group2
Negates any configured parameter.
--
--
Enables the protocols for PPP authentication.
--
--
This list should match the L2TP or PPTP
configuration configured with the vpdn command
on the switch.
The switch caches Secure ID tokens so that the -- user does not need to reauthenticate each time a network connection is lost.
disabled
Use CHAP with PPP authentication.
--
enabled
Use MSCHAP with PPP authentication.
--
enabled
Use MSCHAPv2 with PPP authentication.
--
enabled
Use PAP with PPP authentication.
--
enabled
Usage Guidelines
A VPN dialer is a Windows application that configures a Windows client for use with the VPN services in the switch. When VPN is used as an access method, a user can login using captive portal and download a VPN dialer. You can customize a VPN dialer for a user role configured with the user-role command. After the user authenticates via captive portal, a link appears to allow download of the VPN dialer if a dialer is configured for the user role.
Example
The following command configures a VPN dialer: (host) (config) #vpn-dialer default-dialer
ike authentication pre-share f00xYz123BcA
Command History
The command was introduced in AOS-W 3.0.
AOS-W 6.2 | Reference Guide
vpn-dialer | 1485
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1486 | vpn-dialer
AOS-W 6.2 | Reference Guide
vrrp
vrrp <id> advertise <interval> authentication <password> description <text> ip address <ipaddr> no... preempt priority <level> shutdown tracking interface {fastethernet <slot>/<port>|gigabitethernet <slot>/<port>} {sub <value>} tracking master-up-time <duration> add <value> tracking vlan <vlanid> {sub <value>} tracking vrrp-master-state <vrid> add <value> vlan <vlanid>
Description
This command configures the Virtual Router Redundancy Protocol (VRRP).
Syntax
Parameter id
advertise authentication
description
Description
Range
Default
Number that uniquely identifies the VRRP
1-255
--
instance, also known as the VRID. This
number should match the VRID on the other
member of the redundant pair.
For ease in administration, you should
configure this with the same value as the
VLAN ID.
After you configure the VRID, the command
platform enters VRRP mode. From here, you
can access the remaining VRRP
commands.
Specifies the time, in seconds, between successive VRRP advertisements sent by the current master. Best practices are to use the default value.
1-60 seconds
1 second (1s=1000ms)
Configure an optional password of up to
8 characters --
eight characters to be used to authenticate
VRRP peers in their advertisements.
The password must be the same on both
members of the redundant pair.
The password is sent in plain-text and
therefore should not be treated as a security
measure. Rather, the purpose of the
password is to guard against
misconfigurations in the event that other
VRRP devices exist on the same network.
Configure an optional text string to describe 1-80
--
the VRRP instance.
characters
AOS-W 6.2 | Reference Guide
vrrp | 1487
Parameter ip address
no preempt
delay
priority shutdown tracking interface
Description
Range
Configure the virtual IP address that will be -- owned by the elected VRRP master. Use the same IP address on each member of the redundant pair.
This IP address will be redundant - it will be active on the VRRP master, and will become active on the VRRP backup in the event that the VRRP master fails.
The IP address must be unique; the IP address cannot be the loopback address of the switch. Only IPv4 address formats are supported.
Negates all configured VRRP parameters. --
Preempt mode allows a switch to take over -- the role of master if it detects a lower priority switch currently acting as master.
Best practices are to use the default value to avoid excessive interruption to users or "flapping" if a problematic switch is cycling up and down.
Delay value in seconds.
Specifying a value enables the delay timer. The timer is triggered when the VRRP state moves out of backup or init state to become a master. This is applicable only if router pre-emption is enabled.
When the timer is triggered, it delays the router for a specified period of time before taking over the master router. In the mean time, if there is an advertisement from another VRRP master (existing master), the router stops the timer and does not transition to master.
0-60 seconds
Defines the priority level of the VRRP
100
instance for the switch. This value is used in
the election mechanism for the master.
A higher number specifies a higher priority.
The default priority setting is adequate for
most networks.
Administratively shutdown VRRP. When
--
down, VRRP is not active, although the
switch maintains the configuration
information.
To start the VRRP instance, use no
shutdown.
Configures VRRP tracking based on Layer- -- 2 interface state transitions. You can configure this on Fast Ethernet or Gigabit Ethernet interfaces.
You can track a combined maximum of 16 VLAN and Layer-2 interfaces.
Default --
-- disabled
0
1-255 enabled (VRRP is down) --
1488 | vrrp
AOS-W 6.2 | Reference Guide
Parameter <slot> <port>
sub
tracking master-up-time duration tracking master-up-time add
tracking vlan sub
vrrp-masterstate vrrp-masterstate add
vlan
Description
Range
<slot> is always 1 except for the OAW-
--
6000switch, where the slots can be 0, 1, 2,
or 3.
Number assigned to the network interface
--
embedded in the switch or in the line card
installed in the OAW-6000switch. Port
numbers start at 0 from the left-most
position.
Decreases the priority of the VRRP instance by the specified amount. When the interface comes up again, the value is restored to the previous priority level. The combined priority and tracking vales cannot exceed 255. If the priority value exceeds 255, the switch displays an error message.
0-255
Monitors how long the switch has been master for the VRRP instance.
0-1440 minutes
Instructs the switch to add the specified value to the existing priority level. The combined priority and tracking values cannot exceed 255. If the priority value exceeds 255, the switch displays an error message similar to the following: Error: Vrrp 30 priority + tracking value exceeds 255
0-255
Configures VRRP tracking based on VLAN -- state transitions. You can track a combined maximum of 16 VLAN and Layer-2 interfaces.
Decreases the priority of the VRRP instance by the specified amount. When the VLAN comes up again, the value is restored to the previous priority level. The combined priority and tracking values cannot exceed 255. If the priority value exceeds 255, the switch displays an error message.
0-255
Specifies the VRID to use for tracking the state of the VRRP master switch.
1-255
Instructs the switch to add the specified value to the existing priority level. The combined priority and tracking values cannot exceed 255. If the priority value exceeds 255, the switch displays an error message similar to the following: Error: Vrrp 30 priority + tracking value exceeds 255
0-255
Specifies the VLAN ID of the VLAN on which 1-4094 VRRP will run.
Default -- -- --
-- --
-- --
-- --
--
AOS-W 6.2 | Reference Guide
vrrp | 1489
Usage Guidelines
Use this command to set parameters for VRRP on the switch. The default VRRP parameters can be left for most implementations.
You can use a combination of numbers, letters, and characters to create the authentication password and the VRRP description. To include a space in the password or description, enter quotation marks around the string. For example, to create the password Floor 1, enter "Floor 1" at the prompt.
To change the existing password or description, enter the command with a different string. The new password or description takes affect immediately.
To unconfigure the existing password or description, enter "" at the prompt. If you update the password on one switch, you must update the password on the redundant member pair.
Interface Tracking
You can track multiple VRRP instances to prevent asymmetric routing and dynamically change the VRRP master to adapt to changes in the network. VRRP interface tracking can alter the priority of the VRRP instance based on the state of a particular VLAN or Layer-2 interface. The priority of the VRRP instance can increase or decrease based on the operational state of the specified interface. For example, interface transitions (up/down events) can trigger a recomputation of the VRRP priority, which can change the VRRP master depending on the resulting priority. You can track a combined maximum of 16 interfaces.
You must enable preempt mode to allow a switch to take over the role of master if it detects a lower priority switch currently acting as master
Example
The following command configures a priority of 105 for VRRP ID (VRID) 30: (host) (config) #vrrp 30
priority 105
The following commands configure VLAN interface tracking and assumes the following:
l You have two switchs, a primary and a backup. l The configuration highlights the parameters for interface tracking. You may have other parameters configured for
VRRP.
Primary Configuration
vrrp 10 vlan 10 ip address 10.200.22.254 priority 105 preempt tracking vlan 20 sub 10
vrrp 20 vlan 20 ip address 10.200.22.254 preempt priority 105 tracking vlan 10 sub 10
vrrp 30
Backup Configuration
vrrp 10 vlan 10 ip address 10.200.22.254 priority 100 preempt tracking vlan 20 sub 10
vrrp 20 vlan 20 ip address 10.200.22.254 preempt priority 100 tracking vlan 10 sub 10
vrrp 30
1490 | vrrp
AOS-W 6.2 | Reference Guide
vlan 30 ip address 10.200.22.254 preempt priority 105 tracking vlan 20 sub 10
vlan 30 ip address 10.200.22.254 preempt priority 100 tracking vlan 20 sub 10
If VLAN 20 goes down, VRRP 20 automatically fails over, VRRP 10 and VRRP 30 would drop their priority to 95, causing a failover to the backup switch. Once VLAN 20 comes back up, the primary switch restores the VRRP priority to 105 for all VRRP IDs and resumes the master VRRP role.
Command History
Version AOS-W 1.0 AOS-W 3.3 AOS-W 3.3.2
AOS-W 6.1
Modification Command introduced The tracking interface and tracking vlan parameters were introduced. The add option was removed from the tracking interface and tracking vlan parameters. The delay option is added to the preempt parameter.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Config mode on master and local switches
AOS-W 6.2 | Reference Guide
vrrp | 1491
web-server
web-server captive-portal-cert <name> ciphers {high|low|medium} mgmt-auth [certificate] [username/password] no ... ssl-protocol [sslv2] [sslv3] [tlsvl] session-timeout <session-timeout> switch-cert <name> web-max-clients <web-max-clients>
Description
This command configures the switch's web server.
Syntax
Parameter captive-portal-cert
ciphers
mgmt-auth
no session-timeout <sessiontimeout> ssl-protocol
switch-cert
web-max-clients <web-maxclient>
Description
Range Default
Name of the server certificate associated with
--
captive portal. Use the show crypto-local pki
ServerCert command to see the server
certificates installed in the switch.
default
Configures the strength of the cipher suite: high: encryption keys larger than 128 bits low: 56 or 64 bit encryption keys medium: 128 bit encryption keys
high, low, high medium
Authentication method for the management user; you can choose to use either username/password or certificates, or both username/password and certificates.
username/ password, certificate
username/ password
Negates any configured parameter.
--
--
Specifies the amount of time after which the WebUI session times out and requires login for continued access.
30-3600 seconds
900 seconds
Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocol version used for securing communication with the web server: SSLv3 TLSv1
sslv3, tlsv1
sslv3, tlsv1
Name of the server certificate associated with
--
WebUI access. Use the show crypto-local pki
ServerCert command to see the server
certificates installed in the switch.
default
Configures the web server's maximum number 25-400
--
of supported concurrent clients.
1492 | web-server
AOS-W 6.2 | Reference Guide
Usage Guidelines
There is a default server certificate installed in the switch, however this certificate does not guarantee security in production networks. Best practices are to replace the default certificate with a custom certificate issued for your site by a trusted Certificate Authority (CA). See the AOS-W User Guide for more information about how to generate a Certificate Signing Request (CSR) to submit to a CA and how to import the signed certificate received from the CA into the switch. After importing the signed certificate into the switch, use the web-server command to specify the certificate for captive portal or WebUI access. If you need to specify a different certificate for captive portal or WebUI access, use the no command to revert back to the default certificate before you specify the new certificate (see the Example section).
You can use client certificates to authenticate management users. If you specify certificate authentication, you need to configure certificate authentication for the management user with the mgmt-user webui-cacert command.
Example
The following commands configure WebUI access with client certificates only, and specify the server certificate for the switch: (host) (config) #web-server mgmt-auth certificate
switch-cert ServerCert1 mgmt-user webui-cacert serial 1111111 web-admin root
To specify a different server certificate, use the no command to revert back to the default certificate before you specify the new certificate:
(host) (config) #web-server mgmt-auth certificate switch-cert ServerCert1 no switch-cert switch-cert ServerCert2
Command History
Version AOS-W 3.0 AOS-W 3.1 AOS-W 3.2
Modification Command introduced The mgmt-auth parameter was introduced. The captive-portal-cert parameter was introduced.
Command Information
Platforms All platforms
Licensing
The web-server ciphers and web-server ssl-protocol commands require the PEFNG license
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
web-server | 1493
whitelist-db cpsec add
whitelist-db cpsec add mac-address <mac-address> state {approved-ready-for-cert|certified-factory-cert} cert-type {switch-cert|factory-cert} [description <description>]
Description
Add an AP entry to the campus AP whitelist.
Syntax
Parameter mac-address <mac-address> state
cert-type
description
Description
MAC address of the AP you want to enter into the cpsec whitelist database.
Select one of the following AP states: l approved-ready-for-cert: The AP has been approved as a valid AP
and is ready to receive a certificate. l certified-factory-cert: The AP is already has a factory certificate. APs
in this state will not be re-issued a new certificate if control plane security is reenabled.
Identify the type of certificate to be used by the AP. l switch-cert: AP is using a certificate signed by the switch. l factory-cert: AP is using a factory-installed certificate. This option
should only be used for AP model types OAW-AP105 and OAWAP120 Series.
(Optional) Enter a brief description of the AP. If the description includes spaces, you must enclose the description in quotation marks.
Usage Guidelines
You can manually add entries to the campus AP whitelist to grant valid APs secure access to the network.
Example
The following command creates a new campus AP whitelist entry for an AP with the MAC address 00:16:CF:AF:3E:E1: (host) (config) #whitelist-db cpsec add mac-address 00:16:CF:AF:3E:E1
state certified-factory-cert cert-type factory-cert description "A legacy AP model, apname AP-corp22"
Related Commands
Command show whitelist-db cpsec
Description
Show the campus AP whitelist for the control plane feature.
Mode Enable mode
1494 | whitelist-db cpsec add
AOS-W 6.2 | Reference Guide
Command History
Version AOS-W 5.0 AOS-W 6.0
Modification Command introduced The controller-cert parameter was modified to switch-cert.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Config mode on master or local switches
AOS-W 6.2 | Reference Guide
whitelist-db cpsec add | 1495
whitelist-db cpsec delete
whitelist-db cpsec delete mac-address <mac-address>
Description
Remove an individual AP entry to the campus AP whitelist.
Syntax
Parameter mac-address <mac-address>
Description MAC address of the AP you want to remove from the campus AP whitelist.
Usage Guidelines
Use this command to remove an individual whitelist entries for an AP that has been either removed from the network, or is no longer a candidate for automatic certificate provisioning. If the AP whose entry you deleted is still connected to the network and the control plane security feature is configured to send certificates to all APs (or a range of addresses that include that AP), then the switch will send the AP another certificate, and the AP will reappear in the campus whitelist. To permanently revoke a certificate from an invalid or suspected rogue AP, use the command whitelist-db cpsec revoke.
Example
The following command removes an AP with the MAC address 10:14:CA:AF:3E:E1 from the campus AP whitelist.: (host) (config) #whitelist-db cpsec delete mac-address 10:14:CA:AF:3E:E1
Related Commands
Command show whitelist-db cpsec
Description
Show the campus AP whitelist for the control plane feature.
Mode Enable mode
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Config mode on master or local switches
1496 | whitelist-db cpsec delete
AOS-W 6.2 | Reference Guide
whitelist-db cpsec-local-switch-list
whitelist-db cpsec-local-switch-list del mac-address <mac-address> purge
Description
Delete a local switch from the local switch whitelist.
Syntax
Parameter
Description
del mac-address <mac-address> Remove a single switch from the local switch whitelist.
purge
Clear all entries from the local switch whitelist
Usage Guidelines
If your deployment includes both master and local switches, then the campus AP whitelist on each switch contains an entry for every AP on the network, regardless of the switch to which it is connected. The master switch also maintains a whitelist of local switches with APs using control plane security. When you change a campus AP whitelist on any switch, that switch contacts the master switch to check the local switch whitelist, then contacts every other switch on the local switch whitelist to notify it of the change.
If you ever remove a local switch from the network, you must also remove the local switch from the local switch whitelist. If the local switch whitelist contains entries for local switches no longer on the network, then a campus AP whitelist entry can be marked for deletion but will not be physically deleted, as the switch will be waiting for an acknowledgement from another switch no longer on the network. Any unused local switch entries in the local switch whitelist can significantly increase network traffic and reduce switch memory resources.
Example
The following command removes a local switch from the local switch whitelist: (host) (config) #whitelist-db cpsec-local-switch-list del mac-address 00:1E:33:CA:D2:51
Related Commands
Command
show whitelist-db cpsec-localswitch-list
Description
Show the local switch whitelist for the control plane feature.
Mode Enable mode
Command History
Version AOS-W 5.0 AOS-W 6.0
Modification Command introduced The cpsec-local-ctlr-list parameter was modified to cpsec-local-switch-list
AOS-W 6.2 | Reference Guide
whitelist-db cpsec-local-switch-list | 1497
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1498 | whitelist-db cpsec-local-switch-list
AOS-W 6.2 | Reference Guide
whitelist-db cpsec-master-switch-list
whitelist-db cpsec-master-switch-list del mac-address <mac-address> purge
Description
Delete a master switch from the master switch whitelist.
Syntax
Parameter
Description
del mac-address <mac-address> Remove a single master switch from the master switch whitelist.
purge
Clear all entries from the master switch whitelist
Usage Guidelines
Each local switch using the control plane security feature has a master switch whitelist which contains the IP and MAC addresses of its master switch. If your network has a redundant master switch, then this whitelist will contain more than one entry. The master switch whitelist rarely needs to be purged. Although you can delete an entry from the master switch whitelist, you should do so only if you have removed a master switch from the network. Deleting a valid master switch from the master switch whitelist can cause errors in your network.
Example
The following command removes a master switch from the master switch whitelist (host) (config) #whitelist-db cpsec-master-switch-list del mac-address 00:1E:33:CA:D2:51
Related Commands
Command
show whitelist-db cpsec-masterswitch-list
Description
Mode
Show the master switch whitelist for the control Enable mode plane feature.
Command History
Version AOS-W 5.0 AOS-W 6.0
Modification
Command introduced
The cpsec-master-ctrlr-list parameter was modified to cpsec-master-switchlist
AOS-W 6.2 | Reference Guide
whitelist-db cpsec-master-switch-list | 1499
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Config mode on local switches
1500 | whitelist-db cpsec-master-switch-list
AOS-W 6.2 | Reference Guide
whitelist-db cpsec modify
whitelist-db cpsec modify mac-address cert-type switch-cert|factory-cert description <description> mode disable|enable revoke-text <revoke-text> state approved-ready-for-cert|certified-factory-cert
Description
Modify an existing entry in the campus AP whitelist.
Syntax
Parameter mac-address <macaddress> cert-type
description mode
revoke-text state
Description
MAC address of the AP you want to enter into the cpsec whitelist database.
Identify the type of certificate to be used by the AP. l switch-cert: AP is using a certificate signed by the switch. l factory-cert: AP is using a factory-installed certificate. This option should
only be used for AP model types OAW-AP105 and OAW-AP120 Series.
(Optional) Enter a brief description of the AP. If the description includes spaces, you must enclose the description in quotation marks.
Select disable to disable an AP's entry in the campus AP whitelist. A disabled AP will not be able to contact the switch via a secure channel. Select enable to reenable a disabled AP.
If you disable an AP entry, the revoke-text parameter allows you to enter a brief text string describing why the AP was revoked.
Select one of the following AP states: l approved-ready-for-cert: AP has been approved state and is ready to
receive a certificate. l certified-factory-cert: AP is certified and has a factory-installed certificate.
Example
The following command changes the certificate type, AP state and description of the AP with the MAC address 00:1E:37:CB:D4:52: (host) (config) #whitelist-db cpsec modify mac-address 00:1E:37:CB:D4:52
cert-type switch-cert state certified-factory-cert description "An legacy AP model, apname AP-corp16"
Related Commands
Command show whitelist-db cpsec
Description
Show the campus AP whitelist for the control plane feature.
Mode Enable mode
AOS-W 6.2 | Reference Guide
whitelist-db cpsec modify | 1501
Command History
Version AOS-W 5.0 AOS-W 6.0
Modification Command introduced The controller-cert parameter was modified to switch-cert.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Config mode on master or local switches
1502 | whitelist-db cpsec modify
AOS-W 6.2 | Reference Guide
whitelist-db cpsec purge
whitelist-db cpsec purge
Description
Clear the campus AP whitelist.
Syntax
No parameters.
Usage Guidelines
Use this command to clear all entries in the entire campus AP whitelist. If your network includes both master and local switches, then each campus AP whitelist is synchronized across all switches. If you purge the entire campus AP whitelist on one switch, that action will clear the campus AP whitelist on every switch in the network. To delete an individual entry in the campus AP whitelist, use the command whitelist-db cpsec delete.
Example
The following command remove all APs from the campus AP whitelist: (host) (config) #whitelist-db cpsec purge
Related Commands
Command show whitelist-db cpsec
Description
Show the campus AP whitelist for the control plane feature.
Mode Enable mode
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Config mode on master or local switches
AOS-W 6.2 | Reference Guide
whitelist-db cpsec purge | 1503
whitelist-db cpsec revoke
whitelist-db cpsec revoke mac-address <mac-address> revoke-text <revoke-text>
Description
Revoke a certificate from an AP in the campus AP whitelist.
Syntax
Parameter mac-address <mac-address>
revoke-text <revoke-text>
Description
MAC address of the AP you want to remove from the cpsec whitelist database.
A brief description why the AP's certificate was revoked, up to 64 alphanumeric characters. If this comment includes spaces, you must enclose the comment in quotation marks.
Usage Guidelines
Use this command to revoke a certificate from a invalid or suspected rogue AP.
Example
The following command revokes a certificate from an AP. This command does not delete a whitelist entry for a revoked AP, but marks its entry with the revoked state. (host) (config) #whitelist-db cpsec revoke mac-address 00:1E:37:CA:D4:51
revoke-text "revoking cert from a rogue AP."
Related Commands
Command show whitelist-db cpsec
Description
Show the campus AP whitelist for the control plane feature.
Mode Enable mode
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing Base operating system.
Command Mode Config mode on master or local switches
1504 | whitelist-db cpsec revoke
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
whitelist-db cpsec revoke | 1505
1506 | whitelist-db cpsec revoke
AOS-W 6.2 | Reference Guide
(host) (config) #whitelist-db rap modify mac-address 00:16:CF:AF:3E:E1
AOS-W 6.2 | Reference Guide
whitelist-db cpsec revoke | 1507
1508 | whitelist-db cpsec revoke
AOS-W 6.2 | Reference Guide
whoami
whoami
Description
This command displays information about the current user logged into the switch.
Syntax
No parameters.
Usage Guidelines
Example
The following command displays information about the user logged into the switch: (host) #whoami
Command History
This command was available in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Enable and Config modes on master and local switches
AOS-W 6.2 | Reference Guide
whoami | 1509
1510 | whoami
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
whoami | 1511
1512 | whoami
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
whoami | 1513
1514 | whoami
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
whoami | 1515
1516 | whoami
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
whoami | 1517
wlan bcn-rpt-req-profile
wlan bcn-rpt-req-profile <profile-name> channel <channel> clone <source> interface <interface> measure-dur-mandatory measure-duration <measure-duration> measure-mode no random-interval <random-interval> reg-class {1|12} request-info <request-info> rpt-condition <rpt-condition> rpt-detail ssid <ssid>
Description
Configures a Beacon Report Request Profile to provide the parameters for the Beacon Report Request frames.
Syntax
Parameter <profile-name> channel <channel>
clone <source>
interface <interface> measure-dur-mandatory
Description
Range Default
Name of this instance of the profile. The
--
name must be 1-63 characters.
"default"
This option is used to set the Channel field in the Beacon Report Request frame. The Channel value can be set to one of the following: l The channel of the AP (when
Measurement Mode is set to either 'Passive' or 'Active-All channels') l 0 (when Measurement Mode is set to 'Beacon Table') l 255 (when Measurement Mode is set to 'Active-Channel Report')
For
255
802.11b-
/g band:
1 to 14
For
802.11a
band:
36 to
165
Creates a copy of the Beacon Report
--
--
Request Profile specified as the <source>.
<source> is the name of an existing Beacon Report Request Profile from which parameter values are copied.
This field is used to specify the radio
0-1
1
interface for transmitting the Beacon Report
Request frame.
This value is used to set the "Duration
--
Mandatory" bit of the Measurement Request
Mode field of the Beacon Report Request
frame.
Disabled
1518 | wlan bcn-rpt-req-profile
AOS-W 6.2 | Reference Guide
Parameter measure-duration <measureduration>
measure-mode
no random-interval <randominterval>
reg-class {1|12}
Description
Range Default
This value is used to set the Measurement 0
0
Duration field in the Beacon Report
65535
Request frame. The Measurement Duration
is set to the duration of the requested
measurement. It is expressed in units of
TUs.
Indicates the mode used for the
--
measurement. The valid measurement
modes are:
active-all-ch
active-ch-rpt
beacon-table
passive
beacontable
Negates any configured parameter.
--
--
This value is used to set the Randomization 0
0
Interval field in the Beacon Report Request 65535
frame. The Randomization Interval is used
to specify the desired maximum random
delay in the measurement start time. It is
expressed in units of TUs (Time Units). A
Randomization Interval of 0 in a
measurement request indicates that no
random delay is to be used.
This option is used to specify the Regulatory Class field in the Beacon Report Request frame.
For
--
802.11b-
/g
bands,
12. For
802.11-
a, use 1
request-info <request-info>
rpt-condtion <rpt-condition> rpt-detail ssid <ssid>
This option is used to indicate the contents of the Request Information IE that could be present in the Beacon Report Request frame. The Request Information IE is present for all Measurement Modes except the 'Beacon Table' mode. It consists of a list of Element IDs that should be included by the client in the response frame.
Any
--
valid
element
ID in the
x/y/z
format.
For
exam-
ple,
0/21/22.
This option is used to indicate the value for 0 - 255 0 the "Reporting Condition" field in the Beacon Reporting Information sub-element present in the Beacon Report Request frame.
This option is used to indicate the value for -- the "Detail" field in the Reporting Detail subelement present in the Beacon Report Request frame.
Disabled
A unique character string (sometimes
--
--
referred to as a network name), consisting
of no more than 32 characters. The SSID is
case-sensitive (for example, WLAN- 01).
AOS-W 6.2 | Reference Guide
wlan bcn-rpt-req-profile | 1519
Usage Guidelines
The Beacon Report Request profile is configured under the 802.11K profile.
Example
The following commands configure the parameters under the bcn-rpt-req-profile. (host) (config) #wlan bcn-rpt-req-profile default (host) (Beacon Report Request Profile "default") #channel 9 (host) (Beacon Report Request Profile "default") #interface 1 (host) (Beacon Report Request Profile "default") #no measure-dur-mandatory (host) (Beacon Report Request Profile "default") #measure-duration 100 (host) (Beacon Report Request Profile "default") #measure-mode active-all-ch (host) (Beacon Report Request Profile "default") #random-interval 100 (host) (Beacon Report Request Profile "default") #reg-class 12
(host) (Beacon Report Request Profile "default") #rpt-condition 2 (host) (Beacon Report Request Profile "default") #no rpt-detail (host) (Beacon Report Request Profile "default") #request-info 0/21/22 (host) (Beacon Report Request Profile "default") #ssid aruba-ap
Command History
This command is introduced in AOS-W 6.2.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Configuration mode on master and local switches
1520 | wlan bcn-rpt-req-profile
AOS-W 6.2 | Reference Guide
wlan client-wlan-profile
wlan client-wlan-profile <profile-name> auth-as-computer auth-as-guest clone eap-cert eap-cert-connect-only-to eap-peap eap-peap-connect-only-to eap-type enable-8021x ieap-cert-connect-only inner-eap inner-eap-type no non-broadcasting-connection range-connect ssid-profile
Description
You can push WLAN profiles to users computers that use the Microsoft Windows Wireless Zero Config (WZC) service to configure and maintain their wireless networks. After the WLAN profiles are pushed to user computers, they are automatically displayed as an ordered list in the preferred networks.
Syntax
Parameter
Description
auth-as-computer Authenticate with domain credentials.
auth-as-guest
Authenticate as a guest user.
clone
Copy settings from another WLAN client profile.
eap-cert
If you select EAP type as certificate, you can use one of the following options: l mschapv2-use-windows-credentials l use-smartcard l simple-certificate-selection l use-different-name l validate-server-certificate
eap-cert-
Comma separated list of servers.
connect-only-to
eap-peap
Configure EAP-PEAP settings.
eap-peap-
Comma separated list of servers.
connect-only-to
eap-type
Enter a EAP type used by client to connect to wireless network.
enable-8021x
Select this option to enable 802.1x authentication for this network.
Default --
EAP-PEAP Enabled
AOS-W 6.2 | Reference Guide
wlan client-wlan-profile | 1521
Parameter ieap-certconnect-only inner-eap inner-eap-type
no nonbroadcastingconnection range-connect ssid-profile
Description Command separated list of servers
Default
Enter the inner EAP type.
Specify one of the following: l mschapv2-use-windows-credentials: Automatically use the
Windows logon name and password (and domain if any) l use-smartcard: Use a smart card l simple-certificate-selection: Use a certificate on the users
computer or use a simple certificate selection method (recommended) l validate-server-certificate: Validate the server certificate l use-different-name: Use a different user name for the connection (and not the CN on the certificate)
Negate and reset all configuration settings.
Connect even if WLAN is not broadcasting.
EAPMSCHAPv2
Disabled
Automatically connect to this WLAN if in range. Enter the name of the SSID profile.
Command History
This command was introduced in AOS-W 5.0.
Command Information
Platforms All platforms
Licensing
Base operating system on master switches
Command Mode Config mode on master switches
1522 | wlan client-wlan-profile
AOS-W 6.2 | Reference Guide
wlan dot11k-profile
wlan dotllk <profile-name> ap-chan-rpt-11a ap-chan-rpt-11bg bcn-measurement-mode {active|beacon-table|passive} bcn-req-chan-11a bcn-req-chan-11bg bcn-req-time clone <profile-name> dot11k-enable force-disassoc handover-trigger-profile lm-req-time no ... rrm-ie-profile tsm-req-profile tsm-req-time
Description
Configure a 802.11k radio profile.
Syntax
Parameter <profile-name> ap-chan-rpt-11a ap-chan-rpt-11bg bcn-measurement-mode
active
beacon-table
Description
Default
Name of this instance of the profile. The name must be 1-63 characters.
"default"
This value is sent in the 'Channel' field of the AP channel reports 36 on the 'A' radio. You can specify values in the range 34 to 165.
This value is sent in the 'Channel' field of the AP channel reports 1 on the 'BG' radio. You can specify values in the range 1 to 14.
Configures an active, beacon-table or passive beacon measurement mode for the profile.
beacontable
Enables active beacon measurement mode. In this mode, the
--
client sends a probe request to the broadcast destination
address on all supported channels, sets a measurement
duration timer, and, at the end of the measurement duration,
compiles all received beacons or probe response with the
requested SSID and BSSID into a measurement report.
NOTE: If the station doesn't support active measurement mode, it returns a Beacon Measurement Report with the Incapable bit set in the Measurement Report Mode field.
Enables beacon-table beacon measurement mode.In this mode, -- the client measures beacons and returns a report with stored beacon information for any supported channel with the requested SSID and BSSID. The client does not perform any additional measurements. This is the default beacon measurement mode.
NOTE: If a station doesn't support beacon-table able measurement mode, it returns a Beacon Measurement Report
AOS-W 6.2 | Reference Guide
wlan dot11k-profile | 1523
Parameter passive
clone <profile-name> bcn-req-chan-11a bcn-req-chan-11bg bcn-req-time
dot11k-enable force-dissasoc
handover-triggerprofile
lm-req-time
Description
Default
with the Incapable bit set in the Measurement Report Mode field.
Enables passive beacon measurement mode. In this mode, the -- client sets a measurement duration timer, and, at the end of the measurement duration, compiles all received beacons or probe response with the requested SSID and BSSID into a measurement report.
NOTE: If a station doesn't support passive measurement mode, it returns a Beacon Measurement Report with the Incapable bit set in the Measurement Report Mode field.
Copy settings from another specified 802.11k profile.
--
This value is sent in the 'Channel' field of the beacon requests
36
on the 'A' radio. You can specify values in the range 34 to 165.
This value is sent in the 'Channel' field of the Beacon Requests 1 on the 'BG' radio. You can specify values in the range 1 to 14.
This option configures the time duration between two consecutive beacon requests sent to a dot11K client. By default, the beacon requests are sent to a dot11K client every 60 seconds. However, if a different value is required, the bcn-req-
time option can be used. This permits values in the range from 10 seconds to 200 seconds.
60 seconds
Enables the 802.11K feature. This feature is disabled by default. Disabled
This feature allows the AP to forcefully disassociate "on-hook" voice clients (clients that are not on a call) after period of inactivity.
Without the forced disassociation feature, if an AP has reached its call admission control limits and an on-hook voice client wants to start a new call, that client may be denied. If forced disassociation is enabled, those clients can associate to a neighboring AP that can fulfil their QoS requirements.
Disabled
This feature is disabled by default.
Name of the handover trigger profile associated with this 802.11k profile. If the handover trigger feature is enabled in the handover trigger profile, the switch will initiate the handover of a voice client (for example: dual mode handsets) roaming at the edge of Wi-Fi coverage to an alternate carrier or connection. The handover trigger is initiated if the Wi-Fi signal strength reported by the voice client (received from all APs) is equal to or less than the threshold value.
You must enable dot11k before using this command.
This option configures the time duration between two consecutive link measurement requests sent to an dot11K client. By default, link measurement requests are sent to a dot11K client every 61 seconds. However, you can use the lm-req-
time option to specify different time interval. This permits values in the range from 10 seconds to 200 seconds.
61 seconds
1524 | wlan dot11k-profile
AOS-W 6.2 | Reference Guide
Parameter no rrm-ie-profile tsm-req-profile tsm-req-time
Description
Default
Negates or removes any configured parameter
RRM IE Settings Profile
TSM Report Request Settings Profile
This option configures the time duration between two consecutive transmit stream measurement requests sent to a dot11K client. By default, the transmit stream measurement requests are sent to a dot11K client every 90 seconds. However,
you can use the tsm-req time option to specify a different time interval. This permits values in the range from 10 seconds to 200 seconds.
90 seconds
Usage Guidelines
In a 802.11k network, if the AP with the strongest signal is reaches its maximum capacity, clients may connect to an under utilized AP with a weaker signal. A 802.11k profile can assigned to each virtual AP.
Example
The following command enables the 802.11k feature on the 802.11k profile and configures the beacon measurement mode and specifies the time interval for beacon, link, and transmit stream measurement requests. (host) (config) #wlan dot11k-profile default (host) (802.11K Profile "default") #dot11k-enable (host) (802.11K Profile "default") #bcn-measurement-mode beacon-table (host) (802.11K Profile "default") #bcn-req-time 60 (host) (802.11K Profile "default") #lm-req-time 60 (host) (802.11K Profile "default") #tsm-req-time 90
Related Commands
Command Description wlan rrm-ie-profile
Description
Configure a handover trigger profile to ensure QoS for voice calls.
Configure an radio resource management RRM IE profile to define the information elements advertised by an AP with 802.11k support enabled.
Command History
Version AOS-W 3.4 AOS-W 6.2
Description
Command introduced
The following parameters were introduced: l bcn-req-chan-11a l bcn-req-chan-11bg l ap-chan-rpt-11a l ap-chan-rpt-11bg
AOS-W 6.2 | Reference Guide
wlan dot11k-profile | 1525
Version
Description
l handover-trigger-profile l rrm-ie-profile l bcn-rpt-req-profile l tsm-req-profile The handover trigger threshold parameter was deprecated, as the handover trigger settings are now configured using the handover trigger profile.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1526 | wlan dot11k-profile
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
wlan dot11k-profile | 1527
wlan edca-parameters-profile
wlan
wlan edca-parameters-profile {ap|station} <profile-name> {background | best-effort | video | voice} [acm][aifsn <number>] [ecw-max <exponent> [ecw-min <exponent>] [txop <number>] [clone <profile-name>
Description
This command configures an enhanced distributed channel access (EDCA) profile for APs or for clients (stations).
Syntax
Parameter <profilename> background best-effort video voice acm
aifsn ecw-max
ecw-min
txop
clone
Description
Range
Name of this instance of the profile. The name must be 1-63 -- characters.
Configures the background queue.
--
Configures the best-effort queue.
--
Configures the video queue.
--
Configures the voice queue.
--
Specifies mandatory admission control. The client reserves
0, 1
the access category through traffic specification (TSPEC)
signaling. Enter 1 to enable, 0 to disable.
Arbitrary inter-frame space number.
1-15
The exponential (n) value of the maximum contention window size, as expressed by 2n-1. A value of 4 computes to 24-1 =
15.
1-15
The exponential (n) value of the minimum contention window size, as expressed by 2n-1. A value of 4 computes to 24-1 =
15.
0-15
Transmission opportunity, in units of 32 microseconds. Divide the desired transmission duration by 32 to determine the value to configure. For example, for a transmission duration of 3008 microseconds, enter 94 (3008/32).
0-2047
Name of an existing EDCA profile from which parameter
--
values are copied.
Default "default" -- -- -- -- 0 (disabled) 0 0
0
0
--
Usage Guidelines
EDCA profiles are specific either to APs or clients. You apply an EDCA profile to a specific SSID profile. use this command only under the guidance of your Alcatel-Lucent technical support representative.
The following are the default values configured for APs:
1528 | wlan edca-parameters-profile
AOS-W 6.2 | Reference Guide
Access Category best-effort background video voice
ecw-min 4 4 3 2
ecw-max 6 10 4 3
aifsn 3 7 1 1
The following are the default values configured for clients:
txop 0 0 94 47
acm No No No No
Access Category best-effort background video voice
ecw-min 4 4 3 2
ecw-max 10 10 4 3
aifsn 3 7 2 2
txop 0 0 94 47
acm No No No No
Example
The following command configures an EDCA profile for APs: (host) (config) #wlan edca-parameters-profile ap edca1
best-effort ecw-min 15 ecw-max 15 aifsn 15 txop 100 acm 1
Command History
Version AOS-W 3.1 AOS-W 3.4.1
Description
Command introduced.
License requirements changed in AOS-W 3.4.1, so the command requires the PEF license instead of the Voice Services Module license required in earlier versions.
This command was introduced in AOS-W 3.1.
Command Information
Platforms All platforms
Licensing PEFNG license
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
wlan edca-parameters-profile | 1529
1530 | wlan edca-parameters-profile
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
wlan edca-parameters-profile | 1531
Example
1532 | wlan edca-parameters-profile
AOS-W 6.2 | Reference Guide
AOS-W 6.2 | Reference Guide
wlan edca-parameters-profile | 1533
wlan handover-trigger-profile <profile-name> clone <source> handover-threshold <handover-threshold> handover-trigger no
Description
Configure a handover trigger profile to ensure QoS for voice calls.
Syntax
Parameter <profile-name> clone <source>
handoverthreshold <handoverthreshold> handover-trigger
no
Description
Range
Name of this instance of the profile. The name must be 1- -- 63 characters.
Creates a copy of the Handover Trigger Profile specified as -- the <source>. <source> is the name of an existing Handover Trigger Profile from which parameter values are copied.
If the best signal strength (-dbm) of a WiFi signal received by a voice client from all the APs is equal to or lesser than this threshold value, the handover trigger feature initiates the handover process.. Threshold values can be specified in the range 20 to 70.
20 70 -dBM
Issue this command to enable the handover trigger feature. -- If enabled, the switch will initiate the handover of a voice client (for example: dual mode handsets) roaming at the edge of Wi-Fi coverage to an alternate carrier or connection. The handover trigger is initiated if the Wi-Fi signal strength reported by the voice client (received from all APs) is equal to or less than the threshold value.
You must enable dot11k before using this command.
Negates any configured parameter.
--
Default "default" -- 50 -dBM Enabled
--
Usage Guidelines
The handover-trigger profile is a part of the 802.11K profile. It is used to configure the parameters for the "Wi-Fi Edge Detection and Handover of Voice Clients" feature. It is mandatory to enable the 802.11K feature before enabling the"Wi-Fi Edge Detection and Handover of Voice Clients" feature.
Example
The following command enables the handover trigger feature and sets the handover threshold at -20dbm. (host) (config) #wlan handover-trigger-profile default (host) (Handover Trigger Profile "default") #handover-trigger (host) (Handover Trigger Profile "default") #handover-threshold 20
Command History
This command was introduced in AOS-W 6.2.
1534 | wlan edca-parameters-profile
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Configuration mode on master or local switches
AOS-W 6.2 | Reference Guide
wlan edca-parameters-profile | 1535
1536 | wlan edca-parameters-profile
AOS-W 6.2 | Reference Guide
wlan ht-ssid-profile
wlan ht-ssid-profile <profile-name> 40MHz-enable ba-amsdu-enable clone <profile-name> high-throughput-enable ldpc legacy-stations max-rx-a-mpdu-size {8191|16383|32767|65535} max-tx-a-mpdu-size <bytes> min-mpdu-start-spacing {0|.25|.5|1|2|4|8|16} mpdu-agg no... short-guard-intvl-20MHz short-guard-intvl-40MHz STBC-rx-streams STBC-tx-streams supported-mcs-set <mcs-list> txbf-comp-steering txbf-delayed-feedback txbf-explicit-enable txbf-immediate-feedback txbf-noncomp-steering txbf-sounding-interval
Description
This command configures a high-throughput SSID profile.
Syntax
Parameter
Description
Range
<profile-name>
Name of this instance of the profile. The name must -- be 1-63 characters.
40MHz-enable
Enables or disables the use of this high-throughput
--
SSID in 40 MHz mode.
ba-amsdu-enable Enable/Disable Receive AMSDU in BA negotiation. --
clone
Name of an existing high-throughput SSID profile
--
from which parameter values are copied.
high-throughput- Determines if this high-throughput SSID allows high- --
enable
throughput (802.11n) stations to associate.
Enabling high-throughput in an ht-ssid-profile
enables Wi-Fi Multimedia (WMM) base features for
the associated SSID.
ldpc
If enabled, the AP will advertise Low-density Parity
--
Check (LDPC) support. LDPC improves data
transmission over radio channels with high levels of
background noise.
Default "default" enabled disabled --
enabled
enabled
AOS-W 6.2 | Reference Guide
wlan ht-ssid-profile | 1537
Parameter legacy-stations
max-rx-a-mpdusize
8191 16383 32767 65535 max-tx-a-mpdusize min-mpdu-startspacing 0 .25 .5 1 2 4 8 16 mpdu-agg
no short-guardintvl-20MHz short-guardintvl-40MHz
Description
Range
Default
Controls whether or not legacy (non-HT) stations are -- allowed to associate with this SSID. By default, legacy stations are allowed to associate. This setting has no effect on a BSS in which HT support is not available.
enabled
Controls the maximum size, in bytes, of an Aggregated-MAC Packet Data Unit (A-MPDU) that can be received on this high-throughput SSID.
8191/16383/32767/- 65535 65535
Maximum size of 8191 bytes.
Maximum size of 16383 bytes.
Maximum size of 32767 bytes.
Maximum size of 65535 bytes.
Controls the maximum size, in bytes, of an A-MPDU that can be sent on this high-throughput SSID.
1576-65535
65535
Minimum time between the start of adjacent MDPUs 0/.25/.5/1/2/4/8/16 0 within an aggregate MDPU in microseconds.
No restriction on MDPU start spacing.
Minimum time of .25 µsec.
Minimum time of .5 µsec.
Minimum time of 1 µsec.
Minimum time of 2 µsec.
Minimum time of 4 µsec.
Minimum time of 8 µsec.
Minimum time of 16 µsec.
Enables or disables MAC protocol data unit (MDPU) -- aggregation.
High-throughput APs are able to send aggregated MAC protocol data units (MDPUs), which allow an AP to receive a single block acknowledgment instead of multiple ACK signals. This option, which is enabled by default, reduces network traffic overhead by effectively eliminating the need to initiate a new transfer for every MPDU.
enabled
Negates any configured parameter.
--
--
Enables or disables use of short guard interval in 20 MHz mode of operation.
enabled
Enables or disables use of short guard interval in 40 MHz mode of operation.
enabled
1538 | wlan ht-ssid-profile
AOS-W 6.2 | Reference Guide
Parameter
Description
Range
stbc-rx-streams
stbc-tx-streams
supported-mcsset
Controls the maximum number of spatial streams
0-1
usable for STBC reception. 0 disables STBC
reception, 1 uses STBC for MCS 0-7. Higher MCS
values are not supported. (Supported on the OAW-
AP90 series, OAW-AP130 Series, OAW-AP68, OAW-
AP175 and OAW-AP105 only. The configured value
will be adjusted based on AP capabilities.)
NOTE: If transmit beamforming is enabled, STBC will
be disabled for disabled for beamformed frames.
Controls the maximum number of spatial streams
0-1
usable for STBC transmission. 0 disables STBC
transmission, 1 uses STBC for MCS 0-7. Higher MCS
values are not supported. (Supported on OAW-AP90
series, OAW-AP175, OAW-AP130 Series and OAW-
AP105 only. The configured value will be adjusted
based on AP capabilities.)
NOTE: If transmit beamforming is enabled, STBC will
be disabled for disabled for beamformed frames.
Comma-separated list of Modulation Coding Scheme (MCS) values or ranges of values to be supported on this high-throughput SSID.
0-23
Default 1
1
0-23
Usage Guidelines
AP configuration settings related to the IEEE 802.11n standard are configurable for OAW-AP120 Series access points, which are IEEE 802.11n standard compliant devices.
The ht-ssid profile configures the high-throughput SSID. Stations are not allowed to use HT with TKIP standalone encryption, although TKIP can be provided in mixed-mode BSSIDs that support HT. HT is disabled on a BSSID if the encryption mode is standalone TKIP or WEP.
You can also use this profile to configure explicit transmit beamforming for OAW-AP130 Series access points. When this feature is enabled, the AP coordinates the signals sent from each antenna so the signals focus on the receiver, improving radio range and performance. The OAW-AP130 Series AP can advertise transmit beamforming capabilities in beacon, probe response and association responses in the HT capabilities IE, then use the compressed or noncompressed beamforming report from clients to form a steering matrix. The AP ensures that the steering matrix stays current by updating and recalibrating the steering matrix at regular intervals.
By default, OAW-AP130 Series access points support both compressed and non-compressed steering information from clients. If you have many clients that can send only non-compressed steering reports, best practices are to retain the default settings, allowing the AP to support both types of steering reports. If all (or nearly all) of the AP's clients are capable of sending compressed steering reports, best practices are to disable non-compressed steering in the AP's HT SSID profile.
De-aggregation of MAC Service Data Units (A-MSDUs) supported on the
De-aggregation of MAC Service Data Units (A-MSDUs) is supported on the OAW-4504, OAW-4604, and OAW4704,OAW-S3, and OAW-4x50Alcatel-Lucentswitches and the with a maximum frame transmission size of 4k bytes; however, this feature is always enabled and is not configurable. Aggregation is not currently supported.
AOS-W 6.2 | Reference Guide
wlan ht-ssid-profile | 1539
Example
The following command configures the maximum size of a received aggregate MDPU to be 8191 bytes for the highthroughput SSID named "htcorpnet:" (host) (config) #wlan ht-ssid-profile htcorpnet
max-rx-a-mpdu-size 8191
Command History
Version AOS-W 3.3 AOS-W 3.3.1 AOS-W 3.3.2 AOS-W 6.1
Description
Command introduced
The legacy-stations parameter was introduced
De-aggregation of MAC Service Data Units (A-MSDUs) was introduced.
The short-guard-intvl-20Mhz, ldpc, stbc-rx-streams and stbc-rx-streams parameters were introduced. The allow-weak-encryption parameter was deprecated.
Command Information
Platforms
Licensing
All platforms, but operates with IEEE 802.11n-compliant devices only
Command Mode Config mode on master switches
1540 | wlan ht-ssid-profile
AOS-W 6.2 | Reference Guide
wlan rrm-ie-profile
wlan rrm-ie-profile <profile-name> bss-aac-ie clone country-ie enabled-capabilities-ie no pwr-constraint-ie qbss-load-ie quiet-ie tpc-report-ie
Description
Configure an radio resource management RRM IE profile to define the information elements advertised by an AP with 802.11k support enabled.
Syntax
Parameter
Description
bss-aac-ie
The AP will advertise in beacon and probe responses the BSS Available Admission Capacity (ACC) IE, which contains information about the admission capabilities for each User Priority / Access Category
clone
Copy the settings of an existing RRM IE profile.
country-ie
The AP will advertise in beacon and probe responses the device's regulatory domain.
enabled-capabilities-ie The AP will advertise in beacon and probe responses support for radio measurements in a device.
no ...
Disables the transmission of an IE in this profile.
pwr-constraint-ie
The AP will advertise in beacon and probe responses the regulatory maximum transmit power for that current channel.
qbss-load-ie
The AP will advertise in beacon and probe responses the QoS Basic Service Set (QBSS) Load IE, which contains information on the current station count, channel utilization and available admission capacity levels in the QBSS
quiet-ie
The AP will advertise in beacon and probe responses the Quiet IE, which is used to silence the channel for measurement purposes. When an AP uses a quiet IE to schedule a quiet interval, stations may not transmit on that channel during the quiet interval.
tpc-report-ie
The AP will advertise in beacon and probe responses information about its transmit power controls.
Usage Guidelines
AOS-W supports RRM Information Elements (IEs) for APs with 802.11k support enabled. All IEs are sent by default.
Example
The following command prevents the AP from advertising the country IE.
AOS-W 6.2 | Reference Guide
wlan rrm-ie-profile | 1541
(host) (config) #wlan rrm-ie-profile default (host) (Handover Trigger Profile) #no country-ie
Related commands
wlan dot11k-profile <profile> dot11k-enable
Command History
Version AOS-W 6.2
Description Command introduced
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1542 | wlan rrm-ie-profile
AOS-W 6.2 | Reference Guide
wlan ssid-profile
wlan ssid-profile <profile-name> 902il-compatibility-mode a-basic-rates <mbps> a-beacon-rate a-tx-rates <mbps> advertise-ap-name advertise-location ageout <seconds> battery-boost clone <profile-name> deny-bcast disable-probe-retry dtim-period <milliseconds> eapol-rate-opt edca-parameters-profile {ap|station} <profile-name> enforce-user-vlan essid <name> g-basic-rates <mbps> g-beacon-rate g-tx-rates <mbps> hide-ssid ht-ssid-profile <profile-name> local-probe-req-thresh max-clients <number> max-retries <number> max-tx-fail <number> mcast-rate-opt no ... opmode {bSec-128|dynamic-wep|opensystem|static-wep|wpa-aes|wpa2-aes-gcm-128|wpa2-aes-gcm256| wpa-psk-aes|wpa-psk-tkip|wpa-tkip|wpa2-aes|wpa2-psk-aes|wpa2-psk-tkip|wpa2-tkip xSec} qbss-load-enable rts-threshold <number> short-preamble ssid-enable strict-svp wepkey1 <key> wepkey2 <key> wepkey3 <key> wepkey4 <key> weptxkey <index> wmm wmm-be-dscp <best-effort> wmm-bk-dscp <background> wmm-override-dscp-mapping wmm-ts-min-inact-int <milliseconds> wmm-uapsd wmm-vi-dscp <video> wmm-vo-dscp <voice> wpa-hexkey <psk> wpa-passphrase <string>
Description
This command configures an SSID profile.
AOS-W 6.2 | Reference Guide
wlan ssid-profile | 1543
Syntax
<profile-name> 902il-compatibilitymode
a-basic-rates a-beacon-rate
a-tx-rates
advertise-ap-name advertise-location ageout battery-boost
Description
Range Default
Name of this instance of the profile. The name
--
must be 1-63 characters.
"default"
(For clients using NTT DoCoMo 902iL phones
--
only) When enabled, the switch does not drop
packets from the client if a small or old
initialization vector value is received. (When TKIP
or AES is used for encryption and TSPEC is
enabled, the phone resets the value of the
initialization vector after add/delete TSPEC.)
NOTE: This parameter requires the PEFNG
license.
disabled
List of supported 802.11a rates, in Mbps, that are advertised in beacon frames and probe responses.
6, 9, 12, 18, 24, 36, 48, 54 Mbps
6, 12, 24 Mbps
Sets the beacon rate for 802.11a (use for Distributed Antenna System (DAS) only). Using this parameter in normal operation may cause connectivity problems.
default, 6, 9, 12, 18,24, 36,48,54 Mbps
minimum valid rate
Set of 802.11a rates at which the AP is allowed to send data. The actual transmit rate depends on what the client is able to handle, based on information sent at the time of association and on the current error/loss rate of the client.
6, 9, 12, 18, 24, 36, 48, 54 Mbps
6, 9, 12, 18, 24, 36, 48, 54 Mbps
If enabled, APs that are part of this VAP will-
--
--
broadcast the AP Name information in the bea-
cons frames.
If enabled, APs that are part of this VAP will
--
broadcast their GPS coordinates in the beacons
and probe response frames as part of a vendor-
specific Information Element.
disabled
Time, in seconds, that a client is allowed to remain idle before being aged out.
1000 seconds
Converts multicast traffic to unicast before
--
delivery to the client, thus allowing you to set a
longer DTIM interval. The longer interval keeps
associated wireless clients from activating their
radios for multicast indication and delivery,
leaving them in power-save mode longer and
thus lengthening battery life.
NOTE: This parameter requires the PEFNG
license. This parameter should not be enabled if
you plan on using the Push-To-Talk feature for
Polycom SpectraLink devices.
disabled
1544 | wlan ssid-profile
AOS-W 6.2 | Reference Guide
clone deny-bcast
disable-probe-retry dtim-period
eapol-rate-opt edca-parameters -profile
ap|sta enforce-user-vlan essid g-basic-rates
g-beacon-rate
Description
Range Default
Name of an existing SSID profile from which
--
--
parameter values are copied.
When a client sends a broadcast probe request -- frame to search for all available SSIDs, this option controls whether or not the system responds for this SSID. When enabled, no response is sent and clients have to know the SSID in order to associate to the SSID. When disabled, a probe response frame is sent for this SSID.
disabled
Enable or disable battery MAC level retries for probe response frames. By default this parameter is enabled, which mean that MAC level retries for probe response frames is disabled.
Enabled
Specifies the interval, in milliseconds, between
1
the sending of Delivery Traffic Indication
Messages (DTIMs) in the beacon. This is the
maximum number of beacon cycles before
unacknowledged network broadcasts are
flushed. When using wireless clients that employ
power management features to sleep, the client
must revive at least once during the DTIM period
to receive broadcasts.
Enable rate optimization for delivering EAPOL
--
frames.
disabled
Name of the enhanced distributed channel
--
--
access (EDCA) profile that applies to this SSID.
NOTE: This parameter requires the PEFNG
license. Configure this parameter only under the
guidance of your Alcatel-Lucent representative.
Assigns the specified EDCA profile to AP or
--
--
station (client).
Strict enforcement of data traffic only in user's
--
--
assigned vlan (Open stations only).
Name that uniquely identifies a wireless network. -- The ESSID can be up to 31 characters. If the ESSID includes spaces, you must enclose it in quotation marks.
alcatel-ap
List of supported 802.11b/g rates that are advertised in beacon frames and probe responses.
1, 2, 5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps
1, 2 Mbps
Sets the beacon rate for 802.11g (use for Distributed Antenna System (DAS) only). Using this parameter in normal operation may cause connectivity problems.
default, 1,2,5, 6 9, 11, 12, 18, 24, 36, 48, 54 Mbps
minimum valid rate
AOS-W 6.2 | Reference Guide
wlan ssid-profile | 1545
g-tx-rates
hide-ssid ht-ssid-profile local-probe-req-thresh max-clients max-retries max-tx-fail
mcast-rate-opt
no opmode
bSec-128 dynamic-wep opensystem static-wep wpa-aes
Description
Range Default
Set of 802.11b/g rates at which the AP is allowed to send data. The actual transmit rate depends on what the client is able to handle, based on information sent at the time of association and on the current error/loss rate of the client.
1, 2, 5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps
1, 2, 5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps
Enables or disables hiding of the SSID name in -- beacon frames. Note that hiding the SSID does very little to increase security.
disabled
Name of high-throughput SSID profile to use for -- configuring high-throughput support. See wlan ht-ssid-profile on page 1537.
"default"
APs will not respond to client probe requests if
0-100
0
the SNR value in the probe request is less than
the specified threshold value.
Maximum number of wireless clients for the AP. 0-256
64
Maximum number of retries allowed for the AP to 0-15
4
send a frame.
The AP assumes the client has left and should be 0 -2,147, 0 deauthorized when the AP detects this number of 483,647 consecutive frames were not delivered because the max-retries threshold was exceeded.
Enables or disables scanning of all active
--
stations currently associated to an AP to select
the lowest transmission rate for broadcast and
multicast frames. This option only applies to
broadcast and multicast data frames; 802.11
management frames are transmitted at the lowest
configured rate.
NOTE: Do not enable this parameter unless
instructed to do so by your Alcatel-Lucent
technical support representative.
disabled
Negates any configured parameter.
--
--
The layer-2 authentication and encryption to be -- used on this ESSID to protect access and ensure the privacy of the data transmitted to and from the network.
opensystem
WPA2 with AES GCM-128 encryption and
--
--
dynamic keys using 802.1X
WEP with dynamic keys.
--
--
No authentication and encryption.
--
--
WEP with static keys.
--
--
WPA with AES encryption and dynamic keys
--
--
using 802.1x.
1546 | wlan ssid-profile
AOS-W 6.2 | Reference Guide
wpa2-aes-gcm-128
wpa2-aes-gcm-256
wpa-psk-aes wpa-psk-tkip wpa-tkip wpa2-aes wpa2-psk-aes wpa2-psk-tkip wpa2-tkip wpa-psk-aes wpa2-psk-tkip wpa2-tkip xSec
qbss-load-enable
Description
Range
WPA2 with AES GCM-128 (Suite-b) encryption
--
and dynamic keys
using 802.1X. This parameter requires the ACR
license.
WPA2 with AES GCM-256 (Suite-b) encryption
--
and dynamic keys
using 802.1X. This parameter requires the ACR
license.
WPA with AES encryption using a preshared key. --
WPA with TKIP encryption using a preshared
--
key.
WPA with TKIP encryption and dynamic keys
--
using 802.1x.
WPA2 with AES encryption and dynamic keys
--
using 802.1x.
WPA2 with AES encryption using a preshared
--
key.
WPA2 with TKIP encryption using a preshared
--
key.
WPA2 with TKIP encryption and dynamic keys
--
using 802.1x.
WPA with AES encryption using a preshared key. --
WPA2 with TKIP encryption using a preshared
--
key.
WPA2 with TKIP encryption and dynamic keys
--
using 802.1x.
Encryption and tunneling of Layer-2 traffic
--
between the switch and wired or wireless clients,
or between switches. To use xSec encryption,
you must use a RADIUS authentication server.
For clients, you must install the Funk Odyssey
client software.
Requires installation of the xSec license. For
xSec between switches, you must install an xSec
license in each switch.
Enables the AP to advertise the QBSS load
--
element. The element includes the following
parameters that provide information on the traffic
situation:
l Station count: The total number of stations
associated to the QBSS.
l Channel utilization: The percentage of time
(normalized to 255) the channel is sensed to
be busy. The access point uses either the
physical or the virtual carrier sense
mechanism to sense a busy channel.
Default --
--
-- -- -- -- -- -- -- -- -- -- --
disabled
AOS-W 6.2 | Reference Guide
wlan ssid-profile | 1547
rts-threshold
short-preamble
ssid-enable strict-svp wepkey1 - wepkey4 weptxkey wmm
wmm-be-dscp wmm-bk-dscp wmm-override-dscpmapping
Description
Range Default
l Available admission capacity: The remaining amount of medium time (measured as number of 32us/s) available for a station via explicit admission control.
The QAP uses these parameters to decide whether to accept an admission control request. A wireless station uses these parameters to choose the appropriate access points.
NOTE: Ensure that wmm is enabled for legacy APs to advertise the QBSS load element. For 802.11n APs, ensure that either wmm or high throughput is enabled.
Wireless clients transmitting frames larger than this threshold must issue Request to Send (RTS) and wait for the AP to respond with Clear to Send (CTS). This helps prevent mid-air collisions for wireless clients that are not within wireless peer range and cannot detect when other wireless clients are transmitting.
2333 bytes
Enables or disables short preamble for
--
802.11b/g radios. Network performance may be
higher when short preamble is enabled. In mixed
radio environments, some 802.11b wireless
client stations may experience difficulty
associating with the AP using short preamble. To
use only long preamble, disable short preamble.
Legacy client devices that use only long
preamble generally can be updated to support
short preamble.
enabled
Enables/disables this SSID.
--
enabled
Enable Strict Spectralink Voice Protocol (SVP)
--
disabled
Static WEP key associated with the key index.
--
--
Can be 10 or 26 hex characters in length.
Key index that specifies which static WEP key is to be used. Can be 1, 2, 3, or 4.
1, 2, 3, 4 1
Enables or disables WMM, also known as IEEE -- 802.11e Enhanced Distribution Coordination Function (EDCF). WMM provides prioritization of specific traffic relative to other traffic in the network.
disabled
DSCP value used to map WMM best-effort traffic. 0-63
--
DSCP used to map WMM background traffic.
0-63
--
Overrides the default DSCP mappings in the
--
SSID profile with the ToS value. This setting is
useful when you want to set a non-default ToS
value for a specific traffic.
disabled
1548 | wlan ssid-profile
AOS-W 6.2 | Reference Guide
wmm-ts-min-in act-int
wmm-uapsd
wmm-vi-dscp wmm-vo-dscp wpa-hexkey wpa-passphrase
Description
Range Default
Specifies the minimum inactivity time-out threshold of WMM traffic. This setting is useful in environments where low inactivity interval timeouts are advertised, which may cause unwanted timeouts.
0-3,600, 000
0 milliseconds
Enable Wireless Multimedia (WMM) UAPSD
--
powersave.
enabled
DSCP used to map WMM video traffic.
0-63
--
DSCP used to map WMM voice traffic.
0-63
--
WPA pre-shared key (PSK).
--
--
WPA passphrase with which to generate a pre- --
--
shared key (PSK).
Usage Guidelines
The SSID profile configures the SSID.
AP configuration settings related to the IEEE 802.11n standard are configurable for OAW-AP120 Series access points, which are IEEE 802.11n standard compliant devices.
Default WMM mappings exist for all SSIDs. After you customize an WMM mapping and apply it to the SSID, the switch overwrites the default mapping values and uses the user-configured values.
Suite-B cryptography
The opmode parameters for Suite-B encryption, wpa2-aes-gcm-128 , require the ACR license. Note, however, that not all switches support Suite-B encryption. The table below describes the switch support for Suite-B encryption in AOS-W.
Switch OAW-4x50, OAW-4550, OAW-4650/, OAW-4750 OAW-4306 Series OAW-S3 card OAW-S3 card
Serial Number Prefix All serial numbers supported
All serial numbers supported AK A
ACR License Support Yes
Yes Yes No
To determine the serial number prefix for your switch, issue the CLI command show inventory and note the prefix before the system serial number. The serial number prefix in the example below appears in bold.
(host) #show inventory
Supervisor Card slot
System Serial#
SC
Assembly#
SC
Serial#
SC
Model#
:0 : AK0093676 : 2010052B (Rev:02.01) : F01629529 (Date:03/29/10) : OAW-4704-US
AOS-W 6.2 | Reference Guide
wlan ssid-profile | 1549
Multicast Rate Optimization
The Multicast Rate Optimization feature dynamically selects the rate for sending broadcast/multicast frames on any BSS. This feature determines the optimal rate for sending broadcast and multicast frames based on the lowest of the unicast rates across all associated clients.
When the Multicast Rate Optimization option (mcast-rate-opt) is enabled, the switch scans the list of all associated stations in that BSS and finds the lowest transmission rate as indicated by the rate adaptation state for each station. If there are no associated stations in the BSS, it selects the lowest configured rate as the transmission rate for broadcast and multicast frames.
This feature is disabled by default. Multicast Rate Optimization applies to broadcast and multicast frames only. 802.11 management frames are not affected by this feature and will be transmitted at the lowest configured rate.
The Multicast Rate Optimization feature should only be enabled on a BSS where all associated stations are sending or receiving unicast data. If there is no unicast data to or from a particular station, then the rate adaptation state may not accurately reflect the current sustainable transmission rate for that station. This could result in a higher packet error rate for broadcast/multicast packets at that station.
Example
The following command configures an SSID for WPA2 AES authentication: (host) (config) #wlan ssid-profile corpnet
essid Corpnet opmode wpa2-aes
Command History
Release AOS-W 3.0 AOS-W 3.2 AOS-W 3.3 AOS-W 3.3.1 AOS-W 3.4 AOS-W 3.4.1
AOS-W 6.1
AOS-W 6.1.4.1 AOS-W 6.2
Modification
Command introduced
The wmm-ts-min-inact-int parameter was introduced. The wpa2-preauth parameter was removed,
Support for the high-throughput IEEE 802.11n standard was introduced including the ht-ssid-profile parameter and various rate changes.
Support for configurable WMM AC mapping was introduced including the wmm-be-dscp, wmm-bk-dscp, wmm-vi-dscp, and wmm-vo-dscp parameters.
The deny-bcast and disable-probe-retry parameters were introduced. The drop-mcast parameter was deprecated.
License requirements changed in AOS-W 3.4.1, so the command required the PEF license instead of the Voice Services Module license required in earlier versions.
The opmode options wpa2-aes-gcm-128 and wpa2-aes-gcm-256 were introduced. These parameters require the ACR license. The qbss-load-enable option is included.
The advertise-ap-name parameter was added.
The advertise-location and enforce-user-vlan parameters were added.
1550 | wlan ssid-profile
AOS-W 6.2 | Reference Guide
Command Information
Platforms
All platforms, except for the noted opmode parameters.
Licensing
Base operating system, except for the noted parameters
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
wlan ssid-profile | 1551
wlan traffic-management-profile
wlan traffic-management-profile <profile-name> bw-alloc virtual-ap <virtual-ap> share <percent> clone <profile-name> no ... report-interval <minutes> shaping-policy default-access|fair-access|preferred-access
Description
This command configures a traffic management profile.
Syntax
Parameter <profile-name>
bw-alloc
virtual-ap <virtualap> share <percent>
clone <profile-name>
no report-interval <minutes> shaping-policy
Description
Range
Name of this instance of the profile. The name
--
must be 1-63 characters.
Minimum bandwidth, as a percentage of available bandwidth, allocated to a Virtual AP when there is congestion on the wireless network. An virtual AP can use all available bandwidth if no other virtual APs are active.
Name of the virtual AP to which you will allocate -- a share of bandwidth.
Percentage of available bandwidth allocated to this virtual AP.
0-100
Name of an existing traffic management profile -- from which parameter values are copied.
Negates any configured parameter.
--
Number of minutes between bandwidth usage reports.
1 - 999999 minutes
Define Station Shaping Policy This feature has the following three options:
l default-access: Traffic shaping is disabled, and client performance is dependent on MAC contention resolution. This is the default traffic shaping setting.
l fair-access: Each client gets the same airtime, regardless of client capability and capacity. This option is useful in environments like a training facility or exam hall, where a mix of 802.11a/g, 802.11g and 802.11n clients need equal to network resources, regardless of their capabilities. The bw-alloc parameter of a traffic management profile allows you to set a minimum bandwidth to be allocated to a virtual AP profile when there is congestion on the wireless network.You must set traffic shaping to fair-access to use this bandwidth
defaultaccess fair-access preferredaccess
Default "default"
-- -- -- -- 5 minutes defaultaccess
1552 | wlan traffic-management-profile
AOS-W 6.2 | Reference Guide
Parameter
Description
Range
allocation value for an individual virtual AP.
l preferred-access: High-throughput (802.11n) clients do not get penalized because of slower 802.11a/g or 802.11b transmissions that take more air time due to lower rates. Similarly, faster 802.11a/g clients get more access than 802.11b clients.
Default
Usage Guidelines
The traffic management profile allows you to allocate bandwidth to SSIDs. When you enable the band-steering feature, an AP keeps track of all BSSIDs active on a radio, all clients connected to the BSSID, and 802.11a/g, 802.11b, or 802.11n capabilities of each client. Every sampling period, airtime is allocated to each client, giving it opportunity to get and receive traffic. The specific amount of airtime given to an individual client is determined by; l Client capabilities (802.11a/g, 802.11b or 802.11n) l Amount of time the client spent receiving data during the last sampling period l Number of active clients in the last sampling period l Activity of the current client in the last sampling period The bw-alloc parameter of a traffic management profile allows you to set a minimum bandwidth to be allocated to a virtual AP profile when there is congestion on the wireless network.You must set traffic shaping to fair-access to use this bandwidth allocation value for an individual virtual AP.
Example
The following command configures a traffic management profile that allocates bandwidth to the corpnet virtual AP: (host) (config) #wlan traffic-management-profile best
bw-alloc virtual-ap corpnet share 75
Command History
This command was introduced in AOS-W 3.0. The mode parameters were introduced in AOS-W 3.2.
Command Information
Platforms All platforms
Licensing
Base operating system on master switches
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
wlan traffic-management-profile | 1553
wlan tsm-req-profile
wlan tsm-req-profile <profle-name> bin0-range <bin0-range> clone dur-mandatory measure-duration <measure-duration> no num-repeats <num-repeats> random-interval <random-interval> request-mode {normal | triggered} traffic-id <traffic-id>
Description
This command configures a TSM Report Request Profile.
Syntax
Parameter <profile-name> bin0-range <bin0-range>
clone <source> dur-mandatory measure-duration <measureduration>
no
Description
Name of this instance of the profile. The name must be 1-63 characters.
This value is used to set the 'Bin 0 Range' field in the Transmit Stream/Category Measurement Request frame. Bin 0 Range indicates the delay range of the first bin (Bin 0) of the Transmit Delay Histogram, expressed in units of TUs.
Creates a copy of the Transmit Stream Measurement Request Report Request Profile. <source> is the name of an existing TSM Profile from which parameter values are copied.
This parameter is used to set the "Duration Mandatory" bit of the Measurement Request Mode field of the Transmit Stream/Category Measurement Request frame.
This parameter is used to set the Measurement Duration field in the Transmit Stream/Category Measurement Request frame. The Measurement Duration is set to the duration of the requested measurement. It is expressed in units of TUs. When the request mode for the Transmit Stream/Category Measurement Request frame is set to "triggered", the Measurement Duration field should be set to 0.
Negates any configured parameter
Rang- Defau-
e
lt
--
"defaul-
t"
0- 255 6
--
--
--
Ena-
bled
0-
9776
65535
--
--
1554 | wlan tsm-req-profile
AOS-W 6.2 | Reference Guide
Parameter num-repeats <num-repeats>
random-interval <randominterval>
request-mode {normal | triggered} traffic-id <traffic-id>
Description
Rang- Defau-
e
lt
This parameter is used to set the "Number of Repetitions" field in the Transmit Stream/Category Measurement Request frame. The Number of Repetitions field contains the requested number of repetitions for all the Measurement Request elements in this frame. A value of zero in the Number of Repetitions field indicates Measurement Request elements are executed once without repetition. A value of 65535 in the Number of Repetitions field indicates Measurement Request elements are repeated until the measurement is cancelled or superseded.
065535
65535
This parameter is used to set the Randomization
0-
0
Interval field in the Transmit Stream/Category
65535
Measurement Request frame. The Randomization
Interval is used to specify the desired maximum
random delay in the measurement start time. It is
expressed in units of TUs (Time Units). When the
request mode for the Transmit Stream/Category
Measurement Request frame is set to "triggered", the
Randomization Interval is not used and is set to 0. A
Randomization Interval of 0 in a measurement
request indicates that no random delay is to be used.
This parameter is used to determine the request
--
mode for the Transmit Stream/Category
Measurement Request frame. There are two options
for this field:
l normal
l triggered
normal
The parameter is used to set the Traffic Identifier field 0-255 96 in the Transmit Stream/Category Measurement Request frame. The Traffic Identifier field contains the TID subfield. The TID subfield indicates the TC or TS for which traffic is to be measured.
Usage Guidelines
The tsm-req-profile is a part of the 802.11K profile. It is used to configure the parameters for the Transmit Stream/Category Measurement frames. It takes effect only when the 802.11K feature is enabled.
Example
(host) (config) # wlan tsm-req-profile default (host) (TSM Report Request Profile "default") #bin0-range 1 (host) (TSM Report Request Profile "default") #dur-mandatory (host) (TSM Report Request Profile "default") #measure-duration 25 (host) (TSM Report Request Profile "default") #num-repeats 0 (host) (TSM Report Request Profile "default") #random-interval 0 (host) (TSM Report Request Profile "default") #request-mode normal (host) (TSM Report Request Profile "default") #traffic-id 96
Command History
This command is introduced in AOS-W 6.2.
AOS-W 6.2 | Reference Guide
wlan tsm-req-profile | 1555
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode
Configuration mode on master and local switches
1556 | wlan tsm-req-profile
AOS-W 6.2 | Reference Guide
wlan virtual-ap
wlan virtual-ap <profile-name> aaa-profile <profile-name> allowed-band <band>... auth-failure-blacklist-time <seconds> band-steering blacklist blacklist-time <seconds> broadcast-filter all|arp clone <profile-name> deny-inter-user-traffic deny-time-range <range> dos-prevention dot11k-profile dynamic-mcast-optimization dynamic-mcast-optimization-threshold fdb-update-on-assoc forward-mode {tunnel|bridge|split-tunnel|decrypt-tunnel} ha-disc-onassoc mobile-ip no ... outer-vlan preserve-vlan rap-operation {always|backup|persistent|standard} ssid-profile <profile-name> steering-mode band-balancing|force-5ghz|prefer-5ghz strict-compliance vap-enable vlan <vlan>... vlan-mobility wmm-traffic-management-profile
Description
This command configures a virtual AP profile.
Syntax
Parameter <profile-name> aaa-profile allowed-band
auth-failureblacklist-time
Description
Range
Default
Name of this instance of the profile. The
--
name must be 1-63 characters.
"default"
Name of the AAA profile that applies to this -- virtual AP.
"default"
The band(s) on which to use the virtual AP: a/g/all
all
a--802.11a band only (5 GHz)
g--802.11b/g band only (2.4 GHz)
all--both 802.11a and 802.11b/g bands
(5 GHz and 2.4 GHz)
Time, in seconds, a client is blocked if it fails repeated authentication. A value of 0 blocks a client indefinitely.
0-2,147,483, 0 647 seconds
AOS-W 6.2 | Reference Guide
wlan virtual-ap | 1557
Parameter band-steering
blacklist blacklist-time broadcast-filter all
1558 | wlan virtual-ap
Description
Range
Default
ARM's band steering feature can
--
encourage or require dual-band capable
clients to stay on the 5GHz band on dual-
band APs. This frees up resources on the
2.4GHz band for single band clients like
VoIP phones.
Band steering reduces co-channel
interference and increases available
bandwidth for dual-band clients, because
there are more channels on the 5GHz
band than on the 2.4GHz band. Dual-band
802.11n-capable clients may see even
greater bandwidth improvements, because
the band steering feature will automatically
select between 40MHz or 20MHz
channels in 802.11n networks. This
feature is disabled by default, and must be
enabled in a Virtual AP profile.
The band steering feature supports three
steering modes, which can be configured
via the steering-mode parameter:
Band steering can be configured on both
campus APs and remote APs that have a
virtual AP profile set to tunnel, decrypt-
tunnel, split-tunnel or bridge forwarding
mode. Note, however, that if a campus or
remote APs has virtual AP profiles
configured in bridge or split-tunnel
forwarding mode but no virtual AP in
tunnel mode, those APs will gather
information about 5G-capable clients
independently and will not exchange this
information with other APs that also have
bridge or split-tunnel virtual APs only.
disabled
Enables detection of denial of service
--
(DoS) attacks, such as ping or SYN floods,
that are not spoofed deauth attacks.
enabled
Number of seconds that a client is quarantined from the network after being blacklisted.
0-2,147,483, 3600
647
seconds
seconds
(1 hour)
Filter out broadcast and multicast traffic in -- the air.
disabled
Filter out broadcast and multicast traffic in -- the air.
NOTE: Do not enable this option for virtual APs configured in bridge forwarding mode. This configuration parameter is only intended for use for virtual APs in tunnel mode. In tunnel mode, all packets travel to the switch, so the switch is able to drop all broadcast traffic. When a virtual AP is configured to use bridge forwarding mode, most data traffic stays local to the AP, and the switch is not able to filter out that broadcast traffic.
enabled
AOS-W 6.2 | Reference Guide
Parameter arp
clone deny-inter-user-traffic deny-time-range
Description
Range
IMPORTANT: If you enable this option, you must also enable the Broadcast-Filter ARP parameter in the stateful firewall configuration to prevent ARP requests from being dropped. Note also that although a virtual AP profile can be replicated from a master switch to local switches, stateful firewall settings do not. If you select the broadcast-filter all option for a Virtual AP Profile on a master switch, you must enable the broadcast-filter arp setting on each individual local switch.
If enabled, all broadcast ARP requests are -- converted to unicast and sent directly to the client. You can check the status of this option using the show ap active and the show datapath tunnel command. If enabled, the output will display the letter a in the flags column.
Do not enable this option for virtual APs configured in bridge forwarding mode. This configuration parameter is only intended for use for virual APs in tunnel mode. In tunnel mode, all packets travel to the switch, so the switch is able to convert ARP requests directed to the broadcast address into unicast. When a virtual AP is configured to use bridge forwarding mode, most data traffic stays local to the AP, and the switch is not able to convert that broadcast traffic.
Name of an existing traffic management
--
profile from which parameter values are
copied.
Select this checkbox to deny traffic
--
between the clients using this virtual AP
profile.
The firewall comand includes an option to
deny all inter-user traffic, regardless of the
Virtual AP profile used by those clients.
If the global setting to deny inter-user traffic
is enabled, all inter-user traffic between
clients will be denied, regardless of the
settings configured in the virtual AP
profiles. If the setting to deny inter-user
traffic is disabled globally but enabled on
an individual virtual ap, only the traffic
between un-trusted users and the clients
on that particular virtual AP will be
blocked.
Specify the name of the time range for
--
which the AP will deny access. Time
ranges can be defined using the CLI
command time-range.
Default disabled
-- disabled --
AOS-W 6.2 | Reference Guide
wlan virtual-ap | 1559
Parameter
Description
Range
dos-prevention
If enabled, APs ignore deauthentication
--
frames from clients. This prevents a
successful deauth attack from being
carried out against the AP. This does not
affect third-party APs.
dot11k-profile
Name of an 802.11k profile to be
--
associated with this VAP.
dynamic-mcast-optimization Enable/Disable dynamic multicast
--
optimization. This parameter can only be
enabled on a switch with a PEFNG
license.
dynamic-mcast-optimizationthreshold
Maximum number of high-throughput stations in a multicast group beyond which dynamic multicast optimization stops.
2-255 stations
fdb-update-on-assoc
This parameter enables seamless failover -- for silent clients, allowing them to re-associate. If you select this option, the switch will generate a Layer 2 update on behalf of client to update forwarding tables in bridge devices.
Default: Disabled
forward-mode
Controls whether 802.11 frames are tunneled to the switch using generic routing encapsulation (GRE), bridged into the local Ethernet LAN (for remote APs), or a combination thereof depending on the destination (corporate traffic goes to the switch, and Internet access remains local).
Select one of the following forward modes:
l Tunnel: When an AP is in tunnel forwarding mode, the AP handles all 802.11 association requests and responses. The AP sends all 802.11 data packets, action frames and EAPOL frames over a GRE tunnel to the switch for processing. The switch removes or adds the GRE headers, decrypts or encrypts 802.11 frames and applies firewall rules to the user traffic as usual.
l Bridge: When an AP is in bridge mode, data is bridged onto the local Ethernet LAN. When in bridge mode, the AP handles all 802.11 association requests and responses, encryption/decryption processes, and firewall enforcement. 802.11e and 802.11k action frames are also processed by the AP, which then sends out responses as needed. An AP in bridge mode supports only the 802.1x authentication type.
l Split-Tunnel: Data frames are either tunneled or bridged, depending on the
tunnel bridge split-tunnel decrypttunnel
Default disabled
default disabled 6 stations disabled
tunnel
1560 | wlan virtual-ap
AOS-W 6.2 | Reference Guide
Parameter
ha-disc-onassoc mobile-ip
Description
Range
destination (corporate traffic goes to the switch, and Internet access remains local). The AP handles all 802.11 association requests and responses, encryption/decryption, and firewall enforcement. 802.11e and 802.11k action frames are also processed by the AP, which then sends out responses as needed. An AP in splittunnel mode supports only the 802.1x authentication type.
l Decrypt-Tunnel: An AP in decrypttunnel forwarding mode decrypts and decapsulates all 802.11 frames from a station and sends the 802.3 frames through the GRE tunnel to the switch, which then applies firewall policies to the user traffic. This mode allows a network to utilize the encryption/decryption capacity the AP while reducing the demand for processing resources on the switch. APs in decrypt-tunnel forwarding mode also manage all 802.11 association requests and responses, and process all 802.11e and 802.11k action frames.
NOTE: Virtual APs in bridge or split-tunnel mode using static WEP should use key slots 2-4 on the switch. Key slot 1 should only be used with Virtual APs in tunnel mode.
If enabled, home agent discovery is
--
triggered on client association instead of home agent discovery based on traffic from client. Mobility on association can
speed up roaming and improve connectivity for clients that do not send many uplink packets to trigger mobility
(VoIP clients). Best practices is to leave this parameter disabled, as it increases IP mobility control traffic between switches in
the same mobility domain. Enable this parameter only when voice issues are observed in VoIP clients.
NOTE: ha-disc-onassoc parameter
works only when IP mobility is enabled and configured on the switch.
Enables or disables IP mobility for this
--
virtual AP.
Default
disabled enabled
AOS-W 6.2 | Reference Guide
wlan virtual-ap | 1561
Parameter multi-association no preserve-vlan rap-operation
ssid-profile steering-mode
1562 | wlan virtual-ap
Description
Range
Default
Enables or disables multi-association for -- this virtual AP. When enabled, this feature allows a station to be associated to multiple APs. If this feature is disabled, when a station moves to new AP it will be de authorized by the AP to which it was previously connected, deleting station context and flushing key caching information.
disabled
Negates any configured parameter.
--
--
This parameter allows clients to retain their previous VLAN assignment if the client disassociates from an AP and then immediately re-associates either with same AP or another AP on same switch.
Configures when the virtual AP operates on a remote AP: always--Permanently enables the virtual AP. backup--Enables the virtual AP if the remote AP cannot connect to the switch. persistent--Permanently enables the virtual AP after the remote AP initially connects to the switch. standard--Enables the virtual AP when the remote AP connects to the switch. Use always and backup for bridge SSIDs. Use persistent and standard for 802.1x, tunneled, and split-tunneled SSIDs.
always/ backup/ persistent/ standard
standard
Name of the SSID profile that applies to
--
this virtual AP.
"default"
Band steering supports three different band steering modes.
l Force-5GHz: When the AP is configured in force-5GHz band steering mode, the AP will try to force 5Ghz-capable APs to use that radio band.
l Prefer-5GHz (Default): If you configure the AP to use prefer-5GHz band steering mode, the AP will try to steer the client to 5G band (if the client is 5G capable) but will let the client connect on the 2.4G band if the client persists in 2.4G association attempts.
l Balance-bands: In this band steering mode, the AP tries to balance the clients across the two radios in order to best utilize the available 2.4G bandwidth. This feature takes into account the fact that the 5Ghz band has more channels than the 2.4 Ghz band, and that the 5Ghz channels operate in 40MHz while the 2.5Ghz band operates in 20MHz.
Force-5GHz prefer-5ghz balancebands
prefer5ghz
AOS-W 6.2 | Reference Guide
Parameter
strict-compli ance
vap-enable vlan
vlan-mobility wmm-traffic-managementprofile
Description
Range
NOTE: Steering modes do not take effect until the band steering feature has been enabled. The band steering feature in AOS-W versions 3.3.2-5.0 does not support multiple band-steering modes. The band-steering feature in these versions of AOS-W functions the same way as the default prefer-5GHz steering mode available in AOS-W 6.0 and later.
If enabled, the AP denies client
--
association requests if the AP and client
station have no common rates defined.
Some legacy client stations which are not
fully 802.11-compliant may not include
their configured rates in their association
requests. Such non-compliant stations
may have difficulty associating with APs
unless strict compliance is disabled.
Enable or disable the virtual AP.
--
The VLAN(s) into which users are placed in order to obtain an IP address. Enter VLANs as a comma-separated list of existing VLAN IDs or VLAN names. A mixture of names and numeric IDs are not allowed.
Enable or disable VLAN (Layer-2) mobility. --
Specify the WMM Traffic Management
--
Profile to be associated with this Virtual AP
Profile.
Default
disabled
enabled 1 disabled __
Usage Guidelines
Wireless LAN profiles configure WLANs in the form of virtual AP profiles. A virtual AP profile contains an SSID profile which defines the WLAN and an AAA profile which defines the authentication for the WLAN. You can configure and apply multiple instances of virtual AP profiles to an AP group or to an individual AP.
A named VLAN can be deleted although it is configured in a virtual AP profile. If this occurs the virtual AP profiles becomes invalid. If the named VLAN is added back later the virtual AP becomes valid again.
Beginning with AOS-W 6.1.3.2, the broadcast-filter arp parameter is enabled by default. Behaviors associated with these settings are enabled upon upgrade to AOS-W 6.1.3.2. If your switch supports clients behind a wireless bridge or virtual clients on VMware devices, you must disable the broadcast-filter arp setting to allow those clients to obtain an IP address. In previous releases of AOS-W, the virtual AP profile included two unique broadcast filter parameters; the broadcast-filter all parameter, which filtered out all broadcast and multicast traffic in the air except DHCP response frames (these were converted to unicast frames and sent to the corresponding client) and the broadcastfilter arp parameter, which converted broadcast ARP requests to unicast messages sent directly to the client.
Starting with AOS-W 6.1.3.2, the broadcast-filter arp setting includes the additional functionality of broadcast-filter all parameter, where DHCP response frames are sent as unicast to the corresponding client. This can impact DHCP discover/requested packets for clients behind a wireless bridge and virtual clients on VMware devices. Disable the broadcast-filter arp setting using the wlan virtual-ap <profile> no broadcast-filter arp command to resolve this issue and allow clients behind a wireless bridge or VMware devices to receive an IP address.
AOS-W 6.2 | Reference Guide
wlan virtual-ap | 1563
Example
The following command configures a virtual AP: wlan virtual-ap corpnet
vlan 1 aaa-profile corpnet
Command History
Release AOS-W 3.0 AOS-W 3.2 AOS-W 3.3 AOS-W 3.3.2
AOS-W 3.4 AOS-W 5.0 AOS-W 6.0 AOS-W 6.1
AOS-W 6.2
Modification
Command introduced
Support for the split tunneling option and the rap-operation parameter was introduced.
In support of the IEEE 802.11n standard, a change to the allowed-band parameter was introduced.
l Support for the ha-disc-onassoc parameter was introduced. l The band-steering parameter was introduced but is not a released feature
in AOS-W 3.3.2. Do not use band-steering without proper guidance from Alcatel-Lucent technical support. l Support for the voip-proxy-arp parameter was introduced.
The voip-proxy-arp parameter was renamed to broadcast-filter-arp and it does not require a Voice license. The fast-roaming parameter was renamed to multi-association.
The decrypt-tunnel forwarding mode was introduced.
The steering-mode balance-bands|force-5ghz| prefer-5ghz parameters were introduced.
l The deny inter user traffic and Disable conversion multicast RA packets to unicast parameters were introduced.
l The multi-association parameter was deprecated. l The Multicast Optimization for Video and Multicast Optimization
Threshold parameter were renamed to Dynamic Multicast Optimization (DMO) and Dynamic Multicast Optimization (DMO) Threshold.
The outer-vlan and fdb-update-on-assoc parameters wereintroduced.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
1564 | wlan virtual-ap
AOS-W 6.2 | Reference Guide
wlan voip-cac-profile
wlan voip-cac-profile <profile-name> bandwidth-cac bandwidth-capacity <bandwidth-capacity> call-admission-control call-capacity call-handoff-reservation <percent> clone <profile-name> disconnect-extra-call no ... send-sip-100-trying send-sip-status-code client|server <code> wmm_tspec_enforcement wmm_tspec_enforcement_period <seconds>
Description
This command configures a Voice over IP (VoIP) call admission control (CAC) profile.
Syntax
Parameter <profile-name> bandwidth-cac
bandwidth-capacity
<bandwidth-capacity>
call-admissioncontrol call-capacity call-handoff-reservation clone disconnect-ex tra-call
Description
Range Default
Name of this instance of the profile. The
--
name must be 1-63 characters.
"default"
Select the desired call admission control -- (CAC) Mechanism: l Disable - CAC is based on Call
Counts l Enable - CAC should be based on
Bandwidth.
disabled
Define the maximum bandwidth that can --
--
be handled by one radio, in kbps. The
default value is 2000 kbps (2 Mbps)
Maximum bandwidth that can be handled by one radio, in kbps. The default value is 2000 kbps (2 Mbps)
1600000
2000
Enables or disables WiFi VoIP Call
--
disabled
Admission Control features.
Number of simultaneous calls that can be 2-8000 10 handled by one radio.
Percentage of call capacity reserved for mobile VoIP clients on call.
0-100
20%
Name of an existing VoIP CAC profile
--
--
from which parameter values are copied.
Disconnects calls that exceed the high
--
capacity threshold by sending a
deauthentication frame.
disabled
AOS-W 6.2 | Reference Guide
wlan voip-cac-profile | 1565
Parameter no send-sip-100trying
send-sip-status-code client|server <code>
wmm_tspec_en forcement wmm_tspec_en forcement_ period
Description
Range Default
Negates any configured parameter.
--
--
Enables sending of SIP 100 - trying
--
messages to a call originator to indicate
that the call is proceeding. This is useful
when the SIP invite may be redirected
through a number of servers before
reaching the switch.
enabled
Use this parameter with the client or
--
486
server options to drop a SIP Invite and
send status code back to the client or
server. You must also include one of the
following codes:
l 480: Temporary Unavailable
l 486: Busy Here
l 503: Ser vice Unavailable
l none: Don't send SIP status code
Enables validation of TSPEC requests for -- CAC.
disabled
Maximum time for the station to start the call after the TSPEC request.
1-100
1 second
Usage Guidelines
The VoIP CAC profile prevents any single AP from becoming congested with voice calls.
Example
The following command enables VoIP CAC: (host) (config) #wlan voip-cac-profile cac1
call-admission-control disconnect-extra-call
Command History
Version AOS-W 3.0 AOS-W 3.4
Change
Command introduced
The following parameters were deprecated: l active-load-balancing l high-threshold-capacity l noe-call-capacity l sccp-call-capacity l svp-call-capacity l vocera-call-capacity
The following parameters were introduced: l bandwidth-cac l bandwidth-capacity l call-capacity
1566 | wlan voip-cac-profile
AOS-W 6.2 | Reference Guide
Version AOS-W 3.4.1
AOS-W 5.0
Change
License requirements changed in AOS-W 3.4.1, so the command required the PEF license instead of the Voice Services Module license required in earlier versions.
The supported range for the call-capacity parameter changed from 0-8000 to 2-8000.
Command Information
Platforms All platforms
Licensing PEFNG license
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
wlan voip-cac-profile | 1567
wms-local system
wms-local system [max-rbtree-entries <number> | max-system-wm <number> | max-threshold <number> | system-wm-update-interval <number>]
Description
This command sets the local configuration parameters to control the size of the Wired MAC table and APs and Stations.
Syntax
Parameter
Description
max-rbtree-entries
Set the max threshold for the total number of AP and Station RBTree entries.
max-system-wm
Set the max number of system wired MAC table entries learned at the switch. Range: 1-2000 Default: 1000
max-threshold
Set the max threshold for the total number of APs and Stations.
system-wm-update-interval
Set the interval, in minutes, for repopulating the system wired MAC table at the switch. Range: 1 to 30 minutes Default: 8 minutes
Usage Guidelines
The wms-local system command is used for configuring commands that are local, not global. This means in a master-local system, the configuration parameter is modifiable at each individual switch, and the setting on one switch does not affect the setting on other switches. Increasing the max threshold limit will cause an increase in usage in the memory by WMS. In general, each entry will consume about 500 bytes of memory. If the setting is bumped up by 2000, then it will cause an increase in WMS memory usage by 1MB.
Example
The following commands first set the interval time for repopulating the MAC table to 10 minutes and then sets the maximimum number of APs and stations to 500. (host) (config) #wms-local system system-wm-update-interval 10 (host) (config)# wms-local system max-threshold 500
Command History
Release AOS-W 3. AOS-W 6.1
Modification
Introduced
Local configuration parameters to control the size of the Wired MAC table max-system-wm and system-wm-update-interval
1568 | wms-local system
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Config mode on master switches
AOS-W 6.2 | Reference Guide
wms-local system | 1569
wms ap
wms ap <bssid> mode {interfering|manually-contained|neighbor|rogue|suspected-rogue|valid}
Description
This command allows you to classify an AP into one of several categories.
Syntax
Parameter <bssid> mode
interfering manuallycontained neighbor suspected-rogue
rogue
valid
Description BSSID of the AP.
Classify the AP into one of the following categories.
An AP seen in the RF environment but is not connected to the wired network.
Manually enable denial of service from this AP
An neighboring AP whose BSSID is known.
A suspected rogue AP that is plugged into the wired side of the network but may not be an unauthorized device. Automatic shutdown of rogue APs does not apply to these devices.
A rogue AP that is unauthorized and is plugged into the wired side of the network. You can configure automatic shutdown of rogue APs in the IDS unauthorized device detection profile.
An AP that is part of the enterprise providing WLAN service.
Usage Guidelines
If AP learning is enabled (with the wms general learn-ap enable command), non-Alcatel-Lucent APs connected on the same wired network as Alcatel-Lucent APs are classified as valid APs. If AP learning is disabled, a non-AlcatelLucent AP is classified as an unsecure or suspect-unsecure AP.
Example
The following command classifies an interfering AP as a known-interfering AP: (host) #wms ap 01:00:00:00:00:00 mode known-interfering
Command History
Release AOS-W 3.0 AOS-W 6.0 AOS-W 6.1
Modification Introduced Renamed the modes and deprecated the DoS mode. The suspected-rogue parameter was introduced.
1570 | wms ap
AOS-W 6.2 | Reference Guide
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
wms ap | 1571
wms clean-db
wms clean-db
Description
This command deletes the WMS database.
Syntax
Parameter clean-db
Description Cleans the WMS database.
Usage Guidelines
This command deletes all entries from the WMS database. Do not use this command unless instructed to do so by an Alcatel-Lucent representative.
Example
The following command cleans the WMS database: (host) #wms clean-db
WMS Database will be deleted. Do you want to proceed with this action [y/n]:
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
1572 | wms clean-db
AOS-W 6.2 | Reference Guide
wms client
wms client <macaddr> mode {manually-contain|interfering|valid}
Description
This command allows you to classify a wireless client into one of several categories.
Syntax
Parameter client mode
manually-contain interfering valid
Description MAC address of the client. Classify the client into one of the following categories: Manualy enable denial of service to this client. Setting the client mode to interfering makes it part of clients outside the enterprise A client that is part of the enterprise.
Usage Guidelines
AOS-W can automatically determine client classification based on client behavior, but this command allows you to explicitly classify a client. The classification of a client is used in certain policy enforcement features. For example, if protect-valid-sta is enabled in the IDS Unauthorized Device Profile, then clients that are classified as valid cannot connect to non-valid APs.
Example
The following command classifies a client as valid: (host) #wms client 00:00:A4:34:C9:B3 mode valid
Command History
Release AOS-W 3.0 AOS-W 6.1
Modification
Command introduced
The following parameters were deprecated dos neighbor
The following parameters were introduced: manually-contain interfering
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
wms client | 1573
1574 | wms client
AOS-W 6.2 | Reference Guide
wms export-class
wms export-class <filename>
Description
This command exports classification information into a file.
Syntax
Parameter <filename>
Description Name of the file into which you want to export classification information
Usage Guidelines
This command writes classification data into comma separated values (CSV) files--one for APs and one for clients. You can import these files into the Alcatel-Lucent Mobility Manager system.
Example
The following command exports classification data into an AP and a client file: (host) #wms export-class class
Exported data to class_ap.csv and class_sta.csv
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
wms export-class | 1575
wms export-db
wms export-db <filename>
Description
This command exports the WMS database to a specified file.
Syntax
Parameter <filename>
Description
Name of the file into which you want to export the database. The filename plus any extensions must be no longer than 32 characters and may contain only keyboard characters.
Usage Guidelines
The file is exported as an ASCII text file. If you have configured the switch for operation with Alcatel-LucentOV-MMSW, this command will fail and an error will be returned.
Example
The following command exports the WMS database to a file: (host) #wms export-db database
Exported WMS DB to database
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
1576 | wms export-db
AOS-W 6.2 | Reference Guide
wms import-db
wms import-db <filename>
Description
This command imports the specified file into the WMS database.
Syntax
Parameter <filename>
Description
Name of the file into which you want to import into the database. The filename plus any extensions must be no longer than 32 characters and may contain only keyboard characters.
Usage Guidelines
The imported file replaces the WMS database. The imported file must be a valid WMS database file that you previously exported using the wms export-db command.
Example
The following command imports the WMS database from a file: (host) #wms import-db database
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
AOS-W 6.2 | Reference Guide
wms import-db | 1577
wms reinit-db
wms reinit-db
Description
This command reinitializes the WMS database to its factory defaults.
Syntax
No parameters.
Usage Guidelines
When you use this command, there is no automatic backup of the current database. If an OV-MM-SW server is configured on the switch (See mobility-manager on page 451), this command will fail and return an error.
Example
The following command reinitializes the WMS database: (host) #wms reinit-db WMS Database will be re-initialized. Do you want to proceed with this action [y/n ]:
Command History
This command was introduced in AOS-W 3.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable mode on master switches
1578 | wms reinit-db
AOS-W 6.2 | Reference Guide
write
write {erase [all] | memory | terminal}
Description
This command saves the running configuration to memory or displays the running configuration on the screen. This command can also be used to erase the running configuration and return the switch to factory defaults.
Syntax
Parameter erase
memory terminal
Description
Erases the running system configuration file. Rebooting the switch resets it to the factory default configuration. If you specify all, the configuration and all data in the switch databases (including the license, WMS, and internal databases) are erased.
Saves the current system configuration to memory. Any configuration changes made during this session will be made permanent.
Displays the current system configuration.
Usage Guidelines
Configuration changes made using the CLI affect only the current session. You must save your changes for them to be retained across system reboots. Changes are lost if the system reboots before saving the changes. To save your configuration changes, use the write memory command.
If you use the write erase command, the license key management database on the switch is not affected. If you use the write erase all command, all databases on the switch are deleted, including the license key management database. If you reset the switch to the factory default configuration, perform the Initial Setup as described in the AOS-W 6.2 Quick Start Guide.
If you use the write terminal command, all of the commands used to configure the switch appear on the terminal. If paging is enabled, there is a pause mechanism that stops the output from printing continuously to the terminal. To navigate through the output, use any of the commands displayed at the bottom of the output, as described in below. If paging is disabled, the output prints continuously to the terminal. For more information about the paging command, see paging on page 473.
Key Q U spacebar / N
Description Exit the display. Page up through the output. Page down through the output. Enter a text string to search for. Repeat the text string to search for.
Example
The following command saves your changes so they are retained after a reboot:
AOS-W 6.2 | Reference Guide
write | 1579
(host) #write memory The following command deletes the running configuration and databases and returns the switch to the factory default settings: (host) #write erase
Command History
This command was introduced in AOS-W 1.0.
Command Information
Platforms All platforms
Licensing Base operating system
Command Mode Enable and Config modes
1580 | write
AOS-W 6.2 | Reference Guide
Appendix A: Command Modes
The AOS-W command-line interface offers different levels of user access by differentiating between different command modes. When you first log in to the CLI, you start your session in User mode, which provides only limited access for basic operational testing. You must enter an additional password to access Enable mode, which allows you to issue show commands run certain management functions. Configuration commands can only be issued in Config mode. You can access Config mode by entering configure terminal at the command prompt. You can exit your current command mode and return to a lower-level command mode at any time by entering exit at the command prompt. The following sections describes how to access each command mode, the command prompt for each mode, and links to its available commands.
User mode
You always begin a CLI session in user mode, the command mode with the lowest level of user access. The command prompt for a user mode session is a greater-than (>) symbol: (host) > The following commands are available in user mode. l enable l exit l help l logout l ping l traceroute
Enable Mode
To move from user mode to enable mode, you must enter the command enable, press Enter, then enter config mode password that was defined during the switch's initial setup process. (The default password is enable.) Users in enable mode may return to user mode at any time by entering the command exit.
The command prompt for a CLI session in enable mode is a pound (#) symbol: (host) #
To view a list of commands available in enable mode, access the CLI in enable mode and enter a question mark (?): (host) #?
Some top-level commands have different sets of subcommands available in Enable or Config mode. To view a list of available subcommands in Enable mode, access the CLI in Enable mode, enter the top level command, then enter a question mark (?). For example, the following example shows which aaa commands are available in Enable mode:
(host) #aaa ? authentication inservice ipv6 query-user test-server
Authentication Bring authentication server into service Internet Protocol Version 6 Query User Test authentication server
AOS-W 6.2 | Reference Guide
Appendix A: Command Modes | 1581
user
User commands
Config Mode
To move from enable mode to config mode, enter the command config terminal. Users in config mode may return to enable mode at any time by entering the command exit.
When you are in config mode, (config) appears before the # prompt:
(host) (config) #
Some top-level commands have different sets of subcommands available in Enable or Config mode. To view a list of available subcommands in Config mode, access the CLI in Config mode, enter the top level command, then enter a question mark (?). For example, the following example shows which aaa commands are available in Config mode:
(host) (config) #aaa ? alias-group authentication authentication-server bandwidth-contract derivation-rules dns-query-interval password-policy profile radius-attributes server-group tacacs-accounting timers user
Configure an Alias Group Authentication Authentication Servers Configure bandwidth contract (256 Kbps - 2 Gbps) Configure rules to derive user role or vlan Set DNS query interval Password policy for locally configured management users Configure an AAA Profile Configure RADIUS attribute Configure a Server Group Configure accounting Configure authentication timers User commands
Configuration Sub-modes
Some Config mode commands can enter you into a sub-mode with a limited number of available commands specific to that mode. When you are in a configuration sub-mode, the (config) that appears before the command prompt will change to indicate your current mode; e.g (config-if) for config-interface mode, and (config-tunnel) for config-tunnel mode.
You can exit a sub-command mode and return to the basic configuration mode at any time by entering the exit command.
1582 | Appendix A: Command Modes
AOS-W 6.2 | Reference Guide
MadCap Flare V8