User`s guide

57
Network
Authentication
Data Encryption CLI Commands
wifinode 0 wpatype tkip
wifinode 0 radiuscfg 1
WPA-PSK TKIP
wifinode 0 security wpapsk
wifinode 0 wpatype tkip
wifinode 0 sharedkey <8..63
char key>
WPA2-PSK TKIP
wifinode 0 security wpa2psk
wifinode 0 wpatype tkip
wifinode 0 sharedkey <8..63
char key>
WPA AES
wifinode 0 security wparadius
wifinode 0 wpatype aes
wifinode 0 radiuscfg 1
WPA2 AES
wifinode 0 security wpa2radius
wifinode 0 wpatype aes
wifinode 0 radiuscfg 1
WPA-PSK AES
wifinode 0 security wpapsk
wifinode 0 wpatype aes
wifinode 0 sharedkey <8..63
char key>
WPA2-PSK AES
wifinode 0 security wpa2psk
wifinode 0 wpatype aes
wifinode 0 sharedkey <8..63
char key>
Rogue Scan
Configuration – Network> Interfaces> Wi-Fi> Rogue Scan
In Rogue Scan mode, the router will perform a scan of the Wi-Fi channels and will report
what Wi-Fi Access Points it detects. This feature can be used to detect unauthorised Access
Points that might be trying to get unsuspecting Wi-Fi clients to connect them.
When an authorised Access Point is detected, an event log entry is created and an alarm
(e.g. email, SMS, SNMP Trap) can be triggered.
It is possible to configure a list of the MAC addresses of the authorised Access Points that
will not be reported when detected.
MAC Address
The MAC address of an authorised Access Point.
Related CLI Commands
Entity
Instance
Parameter
Values
Equivalent Web Parameter