Operation Manual

MP Access Point Commands
Mobility System Software Command Reference Guide
Version 7.3
12 – 304
set service-profile [rsn-ie | wpa-ie] auth-psk on page 12-289
set service-profile [rsn-ie | wpa-ie ]cipher-ccmp on page 12-292
set service-profile [rsn-ie | wpa-ie] cipher-wep104 on page 12-293
set service-profile [rsn-ie | wpa-ie ] cipher-wep40 on page 12-294
show service-profile on page 12-357
set service-profile shared-key-auth
Enables shared-key authentication, in a service profile.
Syntax
set service-profile profile-name shared-key-auth {enable | disable}
Defaults
Disabled.
Access
Enabled.
History
Introduced in MSS Version 3.0.
Usage
Shared-key authentication is supported only for encrypted SSIDs. In addition, if you
enable shared-key authentication, RSN, WPA, TKIP, and CCMP must be disabled. By default,
RSN, WPA, and CCMP are already disabled, but TKIP is enabled; you must manually disable
TKIP. To disable TKIP, use the set service-profile cipher-tkip disable command.
Examples
The following command enables shared-key authentication in service profile sp4:
MX# set service-profile sp4 shared-key-auth enable
success: change accepted.
See Also
set radio-profile mode on page 12-272
set service-profile [rsn-ie | wpa-ie] cipher-tkip on page 12-293
show service-profile on page 12-357
set service-profile short-retry-count
Changes the short retry threshold for a service profile. The short retry threshold specifies the
number of times a radio can send a short unicast frame without receiving an acknowledgment. A
short unicast frame is a frame that is shorter than the frag-threshold.
Note:
Use this command only if advised to do so by Trapeze Networks. This command does
not enable preshared key (PSK) authentication for Wi-Fi Protected Access (WPA). To
enable PSK encryption for WPA, use the set service-profile auth-psk command.
profile-name Service profile name.
enable Enables shared-key authentication.
disable Disables shared-key authentication.