display {ap | dap} status
307
MAP port
MAP port number connected to this WX port.
State
State of the MAP:
init
— The MAP has been recognized by the WX but has
not yet begun booting.
booting
— The MAP has asked the WX for a boot
image.
image downloading
— The MAP is receiving a boot
image from the WX.
image downloaded
— The MAP has received a boot
image from the WX and is booting.
configuring
— The MAP has booted and is ready to
receive or is already receiving configuration parameters
from the WX.
operational
— The MAP has received configuration
parameters for one or more radios and is ready to accept
client connections.
configure failure
— One or more of the radio
parameters received from the WX is invalid.
For Distributed MAPs, this field also indicates whether the
MAP’s management traffic with the WX is encrypted, and
whether the MAP’s fingerprint has been verified on the WX:
not encrypted—The management session is not
encrypted.
encrypted but fingerprint not verified—The MAP’s
management traffic is encrypted, but the MAP’s
fingerprint has not been verified in MSS.
encrypted and verified—The MAP’s management traffic is
encrypted and the MAP’s fingerprint has been verified in
MSS.
CPU info
Specifications and identification of the CPU.
For MAP models MP-352, MP-341, and MP-52, the ID
portion of this field is not applicable.
Uptime
Amount of time since the MAP last rebooted using this link.
Note:
This field is displayed only when this link is the MAP
access point’s primary link.
Table 56
Output for display ap status (continued)
Field
Description
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...