Specifications
Table of Contents
Altitude 35x0 Access Point Product Reference Guide4
Rogue AP Enhancements .....................................................................................................19
Radius Time-Based Authentication .......................................................................................19
QBSS Support ....................................................................................................................20
Reliable Multicast ...............................................................................................................20
Configurable WPA Handshake Retry Levels ............................................................................20
Theory of Operations .................................................................................................................20
Cellular Coverage ................................................................................................................21
MAC Layer Bridging.............................................................................................................21
Media Types .......................................................................................................................22
MU Association Process.......................................................................................................22
Chapter 3: CLI Reference ............................................................................................................... 25
Connecting to the CLI................................................................................................................25
Accessing the CLI through the Serial Port ..............................................................................25
Accessing the CLI via Telnet ................................................................................................26
Admin and Common Commands .................................................................................................27
Network Commands ..................................................................................................................35
Network LAN Commands .....................................................................................................36
Network LAN, Bridge Commands ....................................................................................39
Network LAN, WLAN-Mapping Commands .......................................................................42
Network LAN, DHCP Commands .....................................................................................50
Network Type Filter Commands ......................................................................................56
Network WAN Commands ....................................................................................................61
Network WAN NAT Commands .......................................................................................64
Network WAN, VPN Commands ......................................................................................70
Network WAN Content Commands ..................................................................................79
Network WAN, Dynamic DNS Commands.........................................................................83
Network Wireless Commands................................................................................................87
Network WLAN Commands.............................................................................................88
Network Security Commands ..........................................................................................94
Network Security Policy Edit Commands........................................................................100
Network ACL Commands ..............................................................................................107
Network Radio Configuration Commands .......................................................................112
Network Quality of Service (QoS) Commands..................................................................127
Network Bandwith Management Commands...................................................................132
Network Rogue-AP Commands......................................................................................135
WIPS Commands ........................................................................................................145
Network MU Locationing Commands .............................................................................148
Network Reliable Multicast Commands..........................................................................151
Network DOT 11i Retry Commands ...............................................................................156
Network Firewall Commands ..............................................................................................159
Network Router Commands ................................................................................................164
System Commands..................................................................................................................170
Adaptive AP Setup Commands ...........................................................................................176
System Access Commands .................................................................................................180
System Certificate Management Commands.........................................................................183
System SNMP Commands..................................................................................................196
System SNMP Access Commands .................................................................................197
System SNMP Traps Commands ...................................................................................202
System User Database Commands ......................................................................................208
Adding and Removing Users from the User Database ......................................................209
Adding and Removing Groups from the User Database ....................................................214