D-Link DWS-4000 Series Cli Command Reference page 564

Hide thumbs Also See for DWS-4000 Series:
Table of Contents

Advertisement

D-Link Unified Switch CLI Command Reference
vlan port ingressfilter all ........................................................................................................................................................36
vlan port priority all................................................................................................................................................................47
vlan port pvid all ....................................................................................................................................................................36
vlan port tagging all...............................................................................................................................................................36
vlan priority ...........................................................................................................................................................................47
vlan protocol group add protocol...........................................................................................................................................37
vlan protocol group remove ..................................................................................................................................................37
vlan protocol group ...............................................................................................................................................................37
vlan pvid................................................................................................................................................................................39
vlan routing .........................................................................................................................................................................180
vlan tagging ..........................................................................................................................................................................39
vlan .......................................................................................................................................................................................33
voice vlan (Global Config).....................................................................................................................................................45
voice vlan (Interface Config) .................................................................................................................................................45
voice vlan data priority ..........................................................................................................................................................46
wep authentication ..............................................................................................................................................................248
wep key length ....................................................................................................................................................................250
wep key type .......................................................................................................................................................................250
wep key...............................................................................................................................................................................249
wep tx-key...........................................................................................................................................................................249
wids-security admin-config-rogue .......................................................................................................................................322
wids-security ap-chan-illegal...............................................................................................................................................322
wids-security ap-de-auth-attack ..........................................................................................................................................322
wids-security client auth-with-unknown-ap .........................................................................................................................333
wids-security client configured-auth-rate ............................................................................................................................332
wids-security client configured-deauth-rate ........................................................................................................................332
wids-security client configured-probe-rate ..........................................................................................................................332
wids-security client known-client-database.........................................................................................................................331
wids-security client known-db-location................................................................................................................................337
wids-security client known-db-radius-server-name.............................................................................................................337
wids-security client max-auth-failure...................................................................................................................................333
wids-security client rogue-det-trap-interval .........................................................................................................................331
wids-security client threat-mitigation ...................................................................................................................................333
wids-security client threshold-auth-failure...........................................................................................................................336
wids-security client threshold-interval-auth .........................................................................................................................335
wids-security client threshold-interval-deauth .....................................................................................................................334
wids-security client threshold-interval-probe.......................................................................................................................336
wids-security client threshold-value-auth ............................................................................................................................335
wids-security client threshold-value-deauth ........................................................................................................................334
wids-security client threshold-value-probe..........................................................................................................................335
wids-security fakeman-ap-chan-invalid...............................................................................................................................323
wids-security fakeman-ap-managed-ssid ...........................................................................................................................323
wids-security fakeman-ap-no ssid.......................................................................................................................................323
wids-security managed-ap-ssid-invalid ...............................................................................................................................324
wids-security managed-ssid-secu-bad................................................................................................................................324
wids-security rogue-det-trap-interval...................................................................................................................................324
wids-security standalone-cfg-invalid ...................................................................................................................................325
wids-security unknown-ap-managed-ssid...........................................................................................................................325
wids-security unmanaged-ap-wired ....................................................................................................................................325
wids-security wds-device-unexpected ................................................................................................................................326
wids-security wired-detection-interval .................................................................................................................................326
wireless acknowledge-rogue...............................................................................................................................................225
wireless ap channel set.......................................................................................................................................................287
wireless ap debug ...............................................................................................................................................................287
wireless ap download abort ................................................................................................................................................288
wireless ap download group-size........................................................................................................................................288
© 2009 D-Link Corporation. All Rights Reserved
556

Advertisement

Table of Contents
loading

This manual is also suitable for:

Dwl-8600ap

Table of Contents