User guide
Table Of Contents
- 3Com Wireless 8760 Dual-radio 11a/b/g PoE Access Point
- Contents
- Introduction
- Installing the Access Point
- Installation Requirements
- Power Requirements
- Safety Information
- Deciding Where to Place Equipment and Performing A Site Survey
- Before You Begin
- Connecting the Standard Antennas
- Connecting Power
- Checking the LEDs
- Wall, Ceiling, or Electrical Box Mounting
- Flat Surface Installation
- Selecting and Connecting a Different Antenna Model
- Installing Software Utilities
- Initial Configuration
- System Configuration
- Command Line Interface
- Using the Command Line Interface
- General Commands
- System Management Commands
- System Logging Commands
- System Clock Commands
- DHCP Relay Commands
- SNMP Commands
- snmp-server community
- snmp-server contact
- snmp-server location
- snmp-server enable server
- snmp-server host
- snmp-server trap
- snmp-server engine-id
- snmp-server user
- snmp-server targets
- snmp-server filter
- snmp-server filter-assignments
- show snmp groups
- show snmp users
- show snmp group-assignments
- show snmp target
- show snmp filter
- show snmp filter-assignments
- show snmp
- Flash/File Commands
- RADIUS Client
- 802.1X Authentication
- MAC Address Authentication
- Filtering Commands
- WDS Bridge Commands
- Spanning Tree Commands
- Ethernet Interface Commands
- Wireless Interface Commands
- interface wireless
- vap
- speed
- turbo
- multicast-data-rate
- channel
- transmit-power
- radio-mode
- preamble
- antenna control
- antenna id
- antenna location
- beacon-interval
- dtim-period
- fragmentation-length
- rts-threshold
- super-a
- super-g
- description
- ssid
- closed-system
- max-association
- assoc-timeout-interval
- auth-timeout-value
- shutdown
- show interface wireless
- show station
- Rogue AP Detection Commands
- Wireless Security Commands
- Link Integrity Commands
- IAPP Commands
- VLAN Commands
- WMM Commands
- Troubleshooting
- Index
5-140
CHAPTER 5: COMMAND LINE INTERFACE
Default Setting
Disabled
Command Mode
Interface Configuration (Wireless-VAP)
Command Usage
• Each time a client roams to another access point it has to be fully
re-authenticated. This authentication process is time consuming and can
disrupt applications running over the network. WPA2 includes a
mechanism, known as pre-authentication, that allows clients to roam to a
new access point and be quickly associated. The first time a client is
authenticated to a wireless network it has to be fully authenticated. When
the client is about to roam to another access point in the network, the
access point sends pre-authentication messages to the new access point
that include the client’s security association information. Then when the
client sends an association request to the new access point the client is
known to be already authenticated, so it proceeds directly to key exchange
and association.
• To support pre-authentication, both clients and access points in the
network must be WPA2 enabled.
• Pre-authentication requires all access points in the network to be on the
same IP subnet.
Example
Enterprise AP(if-wireless g: VAP[0])#wpa-pre-shared-key ASCII agoodsecret
Enterprise AP(if-wireless g: VAP[0])#