CLI Reference Guide

Organizer Panel 45
Object Description
Admin Access
Rules
Rules for securing Admin access and console access to the WX
switch.
Network Access
Rules
Rules for authenticating users attempting to access the network.
You can create rules for the following authentication types:
IEEE 802.1X
MAC authentication
Web AAA
Last-resort
RF Detection Settings for RF detection scans. RF detection scans can discover
third-party transmitters, in addition to other 3Com radios.
VLANs Groups of physical ports configured as a distinct Layer 2
broadcast domain. Each VLAN has its own Spanning Tree
Protocol (STP) and Internet Group Management Protocol (IGMP)
settings. Optionally, a VLAN can be associated with an IP
interface.
Spanning Tree
Properties
Settings for optional STP fast convergence features.
Service Profiles Sets of encryption parameters associated with an SSID and with
radio profiles.
Radio Profiles Sets of radio parameters that can be applied to multiple radios,
including the beacon interval, RF Auto-Tuning settings, and
service profiles. (Service profiles associate SSIDs with the radios.)
Mobility Profiles Attributes for Mobility Profiles. Mobility Profile attributes allow
or deny access to the network for a specific user or group of
users. When you create a Mobility Profile, you specify which
MAP ports, Distributed MAPs, or wired authentication ports are
to be included.
Local User
Database
Settings for the local user database on the WX switch. You can
use the local database to create users and authenticate them, or
you can use the local database in conjunction with a RADIUS
server.
Location Policy Settings for location policy rules. Location policies allow you to
locally override VLAN or security ACLs assigned to a user by a
RADIUS server.
Table 7 Policy Objects (continued)