D-Link DWS-1008 Cli Reference Manual page 204

8 port 10/100 wireless switch with power over ethernet
Hide thumbs Also See for DWS-1008:
Table of Contents

Advertisement

Defaults: None.
Access: Enabled.
Usage: To change the value of an attribute, enter set mac-user attr with the new value. To delete
an attribute, use clear mac-user attr.
You can assign attributes to individual MAC users and to MAC user groups. If attributes are
configured for a MAC user and also for the group the MAC user is in, the attributes assigned to
the individual MAC user take precedence for that user. For example, if the start-date attribute
configured for a MAC user is sooner than the start-date configured for the MAC user group the
user is in, the MAC user's network access can begin as soon as the user start-date. The MAC
user does not need to wait for the MAC user group's start date.
Attribute
encryption-type
end-date
D-Link DWS-1008 CLI Manual
Description
Type of encryption required for access by
the client. Clients who attempt to use an
unauthorized encryption method are rejected.
Note: Encryption-Type is a D-Link vendor-
specific attribute (VSA). The vendor ID is 14525,
and the vendor type is 3.
Date and time after which the user is no longer
allowed to be on the network.
Valid Value(s)
One of the following numbers that identifies an
encryption algorithm:
• 1—AES_CCM (Advanced Encryption
Standard using Counter with CBC-MAC)
• 2—Reserved
• 4—TKIP (Temporal Key Integrity Protocol)
• 8—WEP_104 (the default) (Wired-
Equivalent Privacy protocol using 104 bits
of key strength)
• 16—WEP_40 (Wired-Equivalent Privacy
protocol using 40 bits of key strength)
• 32—NONE (no encryption)
• 64—Static WEP In addition to these
values, you can specify a sum of them for
a combination of allowed encryption types.
For example, to specify WEP_104 and
WEP_40, use 24.
Date and time, in the following format:
YY/MM/DD-HH:MM Y
You can use end-date alone or with start-date.
You also can use start-date, end-date, or both
in conjunction with time-of-day.
01

Advertisement

Table of Contents
loading

Table of Contents