D-Link DWS-1008 Cli Reference Manual page 413

8 port 10/100 wireless switch with power over ethernet
Hide thumbs Also See for DWS-1008:
Table of Contents

Advertisement

Field
DAP
Port
IP-addr
AP model
manufacturer
fingerprint
name
Link
AP port
State
CPU info
Uptime
D-Link DWS-1008 CLI Manual
Connection ID for the Distributed AP.
Note: This field is applicable only if the AP is configured on the DWS-1008 as a
Distributed AP.
DWS-1008 port number.
Note: This field is applicable only if the AP is directly connected to the DWS-
1008 and the DWS-1008's port is configured as an AP access port.
IP address of the AP. The address is assigned to the AP by a DHCP server.
Note: This field is applicable only if the AP is configured on the DWL-8220AP
as a Distributed AP.
Access point model number.
Company that made the access point.
Hexadecimal fingerprint of the AP's public encryption key.
Note: This field is displayed only for Distributed APs.
AP access point name.
Status of this link with the DWL-8220AP access point and the DWL-8220AP
port at the other end of the link. The status can be up or down.
AP port number connected to this DWS-1008 port.
State of the AP:
• init—The AP has been recognized by the DWS-1008 but has not yet begun
booting.
• booting—The AP has asked the DWS-1008 for a boot image.
• image downloading—The AP is receiving a boot image from the DWS-1008.
• image downloaded—The AP has received a boot image from the DWS-1008
and is booting.
• configuring—The AP has booted and is ready to receive or is already receiving
configuration parameters from the DWS-1008.
• operational—The AP has received configuration parameters for one or more
radios and is ready to accept client connections.
• configure failure—One or more of the radio parameters received from the
DWL-1008 is invalid.
For Distributed APs, this field also indicates whether the AP's management
traffic with the DWS-1008 is encrypted, and whether the AP's fingerprint has
been verified on the DWS-1008:
• not encrypted—The management session is not encrypted.
• encrypted but fingerprint not verified—The AP's management traffic is
encrypted, but the AP's fingerprint has not been verified in MSS.
• encrypted and verified—The AP's management traffic is encrypted and the
AP's fingerprint has been verified in MSS.
Specifications and identification of the CPU.
Amount of time since the AP booted using this link.
Description
10

Advertisement

Table of Contents
loading

Table of Contents