D-Link DWS-1008 User Manual
11
Parameter
Default Value
Radio Behavior When Parameter
Set To Default Value
cac-mode
None
Does not limit the number of active user sessions based on
Call Admission Control (CAC).
cac-session
14
If session-based CAC is enabled (cac-mode is set to
session), limits the number of active user sessions on a
radio to 14.
cipher-ccmp
Disable
Does not use Counter with Cipher Block Chaining Message
Authentication Code Protocol (CCMP) to encrypt traffic
sent to WPA clients.
cipher-tkip
Enable
When the WPA IE is enabled, uses Temporal Key Integrity
Protocol (TKIP) to encrypt traffic sent to WPA clients.
cipher-wep 104
Disable
Does not use Wired Equivalent Privacy (WEP) with 104-bit
keys to encrypt traffic sent to WPA clients.
cipher-wep40
Disable
Does not use WEP with 40-bit keys to encrypt traffic sent
to WPA clients.
cos
0
If static CoS is enabled (static-cos is set to enable), assigns
CoS 0 to all data traffic to or from clients.
dhcp-restrict
Disable
Does not restrict a client’s traffic to only DHCP traffic while
the client is being authenticated and authorized.
idle-client-probing
Enable
Sends a keepalive packet (a null-data frame) to each client
every 10 seconds.
keep-initial-vlan
Disable
Reassigns the user to a VLAN after roaming, instead of
leaving the roamed user on the VLAN assigned by the
switch where the user logged on.
Note: Enabling this option does not retain the user’s initial
VLAN assignment in all cases.
long-retry-count
5
Sends a long unicast frame up to five times without
acknowledgment.
no-broadcast
Disable
Does not reduce wireless broadcast traffic by sending
unicasts to clients for ARP requests and DHCP Offers and
Acks instead of forwarding them as multicasts.
proxy-arp
Disable
Does not reply on behalf of wireless clients to ARP requests
for client IP addresses. Instead, the radio forwards the ARP
Requests as wireless broadcasts.
psk-phrase
No Passphrase defined
Uses dynamically generated keys rather than statically
configured keys to authenticate WPA clients.
psk-raw
No pre-shared key
defined
Uses dynamically generated keys rather than statically
configured keys to authenticate WPA clients.
rsn-ie
Disable
Does not use the RSN IE intransmitted frames.
shared-key-auth
Disable
Does not use shared-key authentication.
This parameter does not enable PSK authentication for
WPA. To enable PSK encryption for WPA, use the
set
radio-profileauth-psk command.
short-retry-count
5
Sends a short unicast frame up to five times without
acknowledgment.
soda
Disable
Sygate On Demand Agent (SODA) files are not downloaded
to connecting clients.
Summary of Contents for DWS-1008
Page 1: ......