Specifications
Enterasys Wireless Controller Software CLI Reference Guide 3-1
3
root Commands
TherootcontextoftheCLIdisplaysavailablecommandsrelatingtotheEnterasysWireless
Controller’sconfiguration,aswellasavailablesub‐contexts.
Thischapterdocumentsrootcontextcommandsnotassociatedwithfeaturesdocumentedinother
chapters.SeeTable 3‐1foralistinganddescriptionofrootcommandsdocumentedoutsideofthis
chapter.
Note: All CLI commands cache changes. For this reason, sometimes when you make a change in a
particular context, the change may not be visible immediately. If this happens, you must exit and re-
enter the context in order to ensure that the database is synchronized with the latest change.
Table 3-1 Root Commands Documented in Feature Chapters
Command Description
ap The ap command moves you to the ap context of the CLI, providing
access to commands required to manage the basic functions of the
Wireless APs on the system. See Chapter 4, ap Commands.
checkpoint The checkpoint command moves you to the checkpoint context of the
CLI, providing access to commands which enable and configure Check
Point event logging options for the Enterasys Wireless Controller. See
Chapter 5, checkpoint Commands.
exit The exit command returns to the previous context or exits the shell if you
are in the base context. See “2.3, exit” on page 2-2.
ip The ip command moves you to the ip context of the CLI, providing access
to commands for the configuration of routing information. See Chapter 7,
ip Commands.
l2ports The l2ports command moves you to the l2ports context of the CLI,
providing access to commands for the enabling and disabling of ports.
See Chapter 6, l2ports Commands.
login The login command moves you to the login context of the CLI, providing
access to commands for the configuration of the login authentication
modes . See Chapter 8, login Commands.
logout The logout command exits the shell immediately. See “2.5, logout” on
page 2-3.
mitigator The mitigator command moves you to the mitigator context of the CLI,
providing commnads that assist in the detection of rogue Access Points.
See Chapter 9, mitigator Commands.