User's Manual

Table Of Contents
BreezeMAX Wi
2
and BreezeACCESS VL Wi
2
System Manual xxiii
Table of Contents
5.18.12 beacon-interval..........................................................................................216
5.18.13 dtim-period ................................................................................................216
5.18.14 fragmentation-length .................................................................................217
5.18.15 rts-threshold ..............................................................................................218
5.18.16 super-g ......................................................................................................218
5.18.17 description .................................................................................................219
5.18.18 ssid............................................................................................................219
5.18.19 closed-system ...........................................................................................220
5.18.20 max-association ........................................................................................220
5.18.21 assoc-timeout-interval ...............................................................................221
5.18.22 auth-timeout-value.....................................................................................221
5.18.23 shutdown...................................................................................................221
5.18.24 show interface wireless .............................................................................222
5.18.25 show station ..............................................................................................224
5.19 Rogue AP Detection Commands..........................................................................226
5.19.1 rogue-ap enable ........................................................................................226
5.19.2 rogue-ap authenticate ...............................................................................227
5.19.3 rogue-ap duration......................................................................................227
5.19.4 rogue-ap interval .......................................................................................228
5.19.5 rogue-ap scan ...........................................................................................228
5.19.6 show rogue-ap...........................................................................................229
5.20 Wireless Security Commands...............................................................................230
5.20.1 auth ...........................................................................................................230
5.20.2 encryption..................................................................................................232
5.20.3 key.............................................................................................................232
5.20.4 transmit-key...............................................................................................233