Siemens SCALANCE W760 Configuration Manual page 12

Industrial wireless lan
Hide thumbs Also See for SCALANCE W760:
Table of Contents

Advertisement

Table of contents
7.8
ARP ...................................................................................................................................... 340
7.8.1
show ip arp ........................................................................................................................... 340
7.9
SSH server ........................................................................................................................... 341
7.9.1
show ip ssh .......................................................................................................................... 342
7.9.2
Commands in the Global Configuration mode ..................................................................... 342
7.9.2.1
ssh-server ............................................................................................................................ 342
7.9.2.2
no ssh-server ....................................................................................................................... 343
8
Load control ......................................................................................................................................... 345
8.1
Dynamic MAC aging ............................................................................................................ 345
8.1.1
show mac-address-table aging-time .................................................................................... 345
8.1.2
show mac-address-table aging-status ................................................................................. 346
8.1.3
Commands in the global configuration mode ...................................................................... 346
8.1.3.1
mac-address-table aging-time ............................................................................................. 346
9
Layer 3 functions ................................................................................................................................. 349
9.1
NAT ...................................................................................................................................... 349
9.1.1
show nat (client) ................................................................................................................... 349
9.1.2
Commands in the global configuration mode ...................................................................... 350
9.1.2.1
nat (client) ............................................................................................................................ 350
9.1.3
Commands in the NAT configuration mode ......................................................................... 351
9.1.3.1
nat (client) ............................................................................................................................ 351
9.1.3.2
no nat (client) ....................................................................................................................... 353
9.1.3.3
nat local ip address (client) .................................................................................................. 354
9.1.3.4
nat interface (client) ............................................................................................................. 355
9.1.3.5
no nat interface (client) ........................................................................................................ 356
9.1.3.6
nat timeout (client) ............................................................................................................... 356
9.1.3.7
no nat timeout (client) .......................................................................................................... 358
10
Security and authentication .................................................................................................................. 359
10.1
User rights management ...................................................................................................... 359
10.1.1
whoami ................................................................................................................................. 359
10.1.2
show users ........................................................................................................................... 360
10.2
WLAN ................................................................................................................................... 360
10.2.1
show wlan security ............................................................................................................... 361
10.2.2
show wlan security ap-radius-authenticator (Access Point) ................................................ 361
10.2.3
show wlan security keys ...................................................................................................... 362
10.2.4
Commands in the WLAN configuration mode ...................................................................... 363
10.2.4.1
wlan security ap-radius-authenticator .................................................................................. 363
10.2.4.2
no wlan security ap-radius-authenticator ............................................................................. 364
10.2.4.3
wlan security ap-radius-authenticator address .................................................................... 365
10.2.4.4
wlan security ap-radius-authenticator max-retransmit ......................................................... 366
10.2.4.5
wlan security ap-radius-authenticator port-number ............................................................. 367
10.2.4.6
wlan security ap-radius-authenticator primary ..................................................................... 368
10.2.4.7
no wlan security ap-radius-authenticator primary ................................................................ 369
10.2.4.8
wlan security ap-radius-authenticator reauth-interval .......................................................... 370
10.2.4.9
wlan security ap-radius-authenticator reauth-mode............................................................. 371
10.2.4.10
wlan security ap-radius-authenticator shared-secret ........................................................... 372
10.2.5
Commands in the WLAN Interface configuration mode ...................................................... 373
10.2.5.1
wlan security authentication (client) ..................................................................................... 374
10.2.5.2
wlan security cipher (client) .................................................................................................. 376
12
SCALANCE W760/W720 to IEEE 802.11n Command Line Interface
Configuration Manual, 11/2014, C79000-G8976-C351-03

Advertisement

Table of Contents
loading

This manual is also suitable for:

Scalance w720

Table of Contents