User guide

Table Of Contents
5-130
CHAPTER 5: COMMAND LINE INTERFACE
show rogue-ap
This command displays the current rogue AP database.
Command Mode
Exec
Example
Wireless Security Commands
The commands described in this section configure parameters for wireless security
on the 802.11a and 802.11g interfaces.
Table 28 Wireless Security Commands
Enterprise AP#show rogue-ap
802.11a Channel : Rogue AP Status
AP Address(BSSID) SSID Channel(MHz) RSSI Type Privacy RSN
======================================================================
802.11g Channel : Rogue AP Status
AP Address(BSSID) SSID Channel(MHz) RSSI Type Privacy RSN
======================================================================
00-04-e2-2a-37-23 WLAN1AP 11(2462 MHz) 17 ESS 0 0
00-04-e2-2a-37-3d ANY 7(2442 MHz) 42 ESS 0 0
00-04-e2-2a-37-49 WLAN1AP 9(2452 MHz) 42 ESS 0 0
00-90-d1-08-9d-a7 WLAN1AP 1(2412 MHz) 12 ESS 0 0
00-30-f1-fb-31-f4 WLAN 6(2437 MHz) 16 ESS 0 0
Enterprise AP#
Command Function Mode Page
auth Defines the 802.11 authentication type allowed by
the access point
IC-W-VAP 5-134
encryption Defines whether or not WEP encryption is used to
provide privacy for wireless communications
IC-W-VAP 5-133
key Sets the keys used for WEP encryption IC-W 5-134
transmit-key Sets the index of the key to be used for encrypting
data frames sent between the access point and
wireless clients
IC-W-VAP 5-135
cipher-suite Selects an encryption method for the global key used
for multicast and broadcast traffic
IC-W-VAP 5-136
mic_mode Specifies how to calculate the Message Integrity
Check (MIC)
IC-W 5-137
wpa-pre-shared- key Defines a WPA preshared-key value IC-W-VAP 5-138