348
C
HAPTER
11: M
ANAGED
A
CCESS
P
OINT
C
OMMANDS
Even when association of 802.11b clients is disabled, if an 802.11b/g
radio detects a beacon from an 802.11b network, the radio enters
protection mode to guard against interference.
The
set radio-profile 11g-only
command does not affect the radio
support configured with the
set port type ap
command. For example, if
you configure a radio to be 802.11b only when you set the port type, the
set radio-profile 11g-only enable
command does not enable 802.11g
support on the radio.
Examples
— The following command configures the 802.11b/g radios in
radio profile
rp1
to allow associations from 802.11g clients only:
WX4400#
set radio-profile rp1 11g-only enable
success: change accepted.
See Also
display {ap | dap} config
on page 290
display radio-profile
on page 317
set port type ap
on page 91
set radio-profile mode
on page 362
set radio-profile
active-scan
Disables or reenables active RF detection scanning on the MAP radios
managed by a radio profile. When active scanning is enabled, MAP radios
look for rogue devices by sending
probe any
requests (probe requests
with a null SSID name), to solicit probe responses from other access
points.
Passive scanning is always enabled and cannot be disabled. During
passive scanning, radios look for rogues by listening for beacons and
probe responses.
Syntax
—
set radio-profile
name
active-scan {enable |
disable}
name
— Radio profile name.
enable
— Configures radios to actively scan for rogues.
disable
— Configures radios to scan only passively for rogues by
listening for beacons and probe responses.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...