Specifications

AP Overview
RoamAbout Mobility System Software Configuration Guide 9-15
cac-mode none Does not limit the number of active user sessions based on
Call Admission Control (CAC).
cac-session 14 If session-based CAC is enabled (cac-mode is set to
session), limits the number of active user sessions on a
radio to 14.
cipher-ccmp disable Does not use Counter with Cipher Block Chaining Message
Authentication Code Protocol (CCMP) to encrypt traffic sent
to WPA clients.
cipher-tkip enable When the WPA IE is enabled, uses Temporal Key Integrity
Protocol (TKIP) to encrypt traffic sent to WPA clients.
cipher-wep104 disable Does not use Wired Equivalent Privacy (WEP) with 104-bit
keys to encrypt traffic sent to WPA clients.
cipher-wep40 disable Does not use WEP with 40-bit keys to encrypt traffic sent to
WPA clients.
cos 0 If static CoS is enabled (static-cos is set to enable), assigns
CoS 0 to all data traffic to or from clients.
dhcp-restrict disable Does not restrict a client’s traffic to only DHCP traffic while
the client is being authenticated and authorized.
idle-client-probing enable Sends a keepalive packet (a null-data frame) to each client
every 10 seconds.
keep-initial-vlan disable Reassigns the user to a VLAN after roaming, instead of
leaving the roamed user on the VLAN assigned by the switch
where the user logged on.
Note: Enabling this option does not retain the users initial
VLAN assignment in all cases.
long-retry-count 5 Sends a long unicast frame up to five times without
acknowledgment.
no-broadcast disable Does not reduce wireless broadcast traffic by sending
unicasts to clients for ARP requests and DHCP Offers and
Acks instead of forwarding them as multicasts.
proxy-arp disable Does not reply on behalf of wireless clients to ARP requests
for client IP addresses. Instead, the radio forwards the ARP
Requests as wireless broadcasts.
psk-phrase No passphrase
defined
Uses dynamically generated keys rather than statically
configured keys to authenticate WPA clients.
psk-raw No preshared
key defined
Uses dynamically generated keys rather than statically
configured keys to authenticate WPA clients.
rsn-ie disable Does not use the RSN IE in transmitted frames.
shared-key-auth disable Does not use shared-key authentication.
This parameter does not enable PSK authentication for
WPA. To enable PSK encryption for WPA, use the set radio-
profile auth-psk command.
Table 9-2 Defaults for Service Profile Parameters (continued)
Parameter Default Value Radio Behavior When Parameter Set To Default Value