Aerohive CLI Guide for HiveOS 6.5r3 Honolulu (AP1130)

The following is a complete list of commands available in the HiveOS 6.5r3 Honolulu for the AP1130 along with explanations of every keyword. Click a command to see its keyword explanations. Then click the Back Arrow in your browser to return to the list of commands. For an introduction to the Aerohive CLI, explaining different ways to access it, some keyboard shortcuts, and usage tips, click here.

802.1x-mac-table expire-time <number>
802.1x-mac-table Set parameters for the client MAC address table that is used to track the status of authenticated clients and those attempting authentication through 802.1X/EAP
expire-time Set the interval of idle time after which the status of an authenticated client elapses
<number> Enter an expiration time interval in seconds (Range: 60-86400; Default: 300)
802.1x-mac-table suppress-interval <number>
802.1x-mac-table Set parameters for the client MAC address table that is used to track the status of authenticated clients and those attempting authentication through 802.1X/EAP
suppress-interval Set a length of time to ignore further authentication requests after a client fails an authentication check
<number> Enter a suppress interval in seconds (Range: 0-3600; Default: 0; Note: 0 means that no suppression is applied after an authentication failure.)
aaa attribute NAS-Identifier <string>
aaa Set parameters for AAA (authentication, authorization, accounting)
attribute Set attribute parameters for RADIUS Access-Request and Accounting-Request packets
NAS-Identifier Set the RADIUS Access-Request and Accounting-Request packets NAS-Identifier parameter (Note: The NAS identifier contains a string that identifies the NAS that is originating the access or accounting request.)
<string> Enter the custom NAS-Identifier (Default: HiveAP host name; 1-64 chars)
aaa attribute Operator-Name namespace-id <number>
aaa Set parameters for AAA (authentication, authorization, accounting)
attribute Set attribute parameters for RADIUS Access-Request and Accounting-Request packets
Operator-Name Set the operator name of the RADIUS Access-Request and Accounting-Request packets (Note: The operator name contains the operator namespace ID and the operator name. The operator name is combined with the namespace ID to uniquely identify the owner of the access network.)
namespace-id Set the namespace ID parameter of the Operator-Name (Default: realm)
<number> Enter a number used for namespace ID (Range: 4-206; Note: These namespace ID values anticipate future additions to the list of namespaces as defined by IANA and reference in RFC 5580.)
aaa attribute Operator-Name namespace-id {TADIG|REALM|E212|ICC}
aaa Set parameters for AAA (authentication, authorization, accounting)
attribute Set attribute parameters for RADIUS Access-Request and Accounting-Request packets
Operator-Name Set the operator name of the RADIUS Access-Request and Accounting-Request packets (Note: The operator name contains the operator namespace ID and the operator name. The operator name is combined with the namespace ID to uniquely identify the owner of the access network.)
namespace-id Set the namespace ID parameter of the Operator-Name (Default: realm)
TADIG Set the Namespace-ID parameter to TADIG (Transferred Account Data Interchange Group; Note: TADIG namespaces include a country code and a company code, and are used in cellular telephone networks.)
REALM Set the Namespace-ID parameter to REALM (Note: Realm namespaces must be globally unique, so administrators commonly use device fully qualified domain name.)
E212 Set the Namespace-ID parameter to E212 (Note: The E.212 standard is defined in the ITU (International Telecommunication Union) standard. E.212 namespaces include a mobile country code and a mobile network code, and are used in cellular telephone networks.)
ICC Set the Namespace-ID parameter to ICC (ITU carrier code; Note: ICC namespaces consist of a country code and the carrier code, and are used in cellular telephone networks.)
aaa attribute Operator-Name value <string>
aaa Set parameters for AAA (authentication, authorization, accounting)
attribute Set attribute parameters for RADIUS Access-Request and Accounting-Request packets
Operator-Name Set the operator name of the RADIUS Access-Request and Accounting-Request packets (Note: The operator name contains the operator namespace ID and the operator name. The operator name is combined with the namespace ID to uniquely identify the owner of the access network.)
value Set the value for the operator name attribute
<string> Enter a string for Operator-Name(1-64 chars)
aaa attribute user-profile-attribute vendor-id <number> attribute-id <number>
aaa Set parameters for AAA (authentication, authorization, accounting)
attribute Set attribute parameters for RADIUS Access-Request and Accounting-Request packets
user-profile-attribute Map a RADIUS attribute to the user profile
vendor-id Set a vendor ID RADIUS attribute
<number> Enter the vendor ID number (Range: 1-65535; Note: Aerohive recommends a vendor ID of 26928, which identifies Aerohive as the vendor.)
attribute-id Set an ID for a private RADIUS attribute
<number> Enter the private RADIUS attribute ID number to be combined with the vendor ID number(Range: 1-255; Note: Aerohive recommends an attribute ID of 6, which corresponds to the user profile attribute.)
aaa mac-format case-sensitivity {lower-case|upper-case}
aaa Set parameters for AAA (authentication, authorization, accounting)
mac-format Set the MAC address format to use when sending client MAC addresses to an external authentication server
case-sensitivity Set the letter case to use when formatting MAC addresses
lower-case Use lowercase formatting (Example: 01ab23cd45ef; Default: lower-case)
upper-case Use uppercase formatting (Example: 01AB23CD45EF; Default: lower-case)
aaa mac-format delimiter {dash|dot|colon}
aaa Set parameters for AAA (authentication, authorization, accounting)
mac-format Set the MAC address format to use when sending client MAC addresses to an external authentication server
delimiter Set the type of delimiter to use when formatting MAC addresses
dash Set a dash ( - ) as the MAC address delimiter (Default: colon)
dot Set a dot ( . ) as the MAC address delimiter (Default: colon)
colon Set a colon ( : ) as the MAC address delimiter (Default: colon)
aaa mac-format style {two-delimiter|five-delimiter|no-delimiter}
aaa Set parameters for AAA (authentication, authorization, accounting)
mac-format Set the MAC address format to use when sending client MAC addresses to an external authentication server
style Set the number of delimiters to use when grouping the hexadecimal digits in a MAC address
two-delimiter Set the number of delimiters in a MAC address as two (Example: 0123.4567.89ab; Default: no-delimiter)
five-delimiter Set the number of delimiters in a MAC address as five (Example: 01-23-45-67-89-ab; Default: no-delimiter)
no-delimiter Set the number of delimiters in a MAC address as none (Example: 0123456789ab; Default: no-delimiter)
aaa ppsk-server auto-save-interval <number>
aaa Set parameters for AAA (authentication, authorization, accounting)
ppsk-server Set parameters for the local HiveAP when it is acting as a private PSK server
auto-save-interval Set the length of time to save the list of private PSK-to-client MAC address bindings to flash memory
<number> Enter the interval in seconds(Default: 600 sec; Range: 60-3600)
aaa ppsk-server radius-server {primary|backup1|backup2|backup3} <ip_addr|string> [ shared-secret <string> ] [ auth-port <number> ] [ via-vpn-tunnel ]
aaa Set parameters for AAA (authentication, authorization, accounting)
ppsk-server Set parameters for the local HiveAP when it is acting as a private PSK server
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
primary Set the RADIUS server that is first queried when authenticating users
backup1 Set the RADIUS server that is queried if the primary server stops responding
backup2 Set the RADIUS server that is queried if the backup1 server stops responding
backup3 Set the RADIUS server that is queried if the backup2 server stops responding
<ip_addr> Enter an IP address or a domain name for the RADIUS server (max 32 chars)
<string> Enter an IP address or a domain name for the RADIUS server (max 32 chars)
shared-secret Set the shared secret for authenticating communications with a RADIUS server
<string> Enter the shared secret for authenticating communications with a RADIUS server (1-64 chars)
auth-port Set the RADIUS authentication port number
<number> Enter the RADIUS authentication port number (Default: 1812; Range: 1-65535)
via-vpn-tunnel Send all RADIUS traffic through a VPN tunnel (Note: Set this option on VPN clients when the RADIUS server is in a different subnet from the tunnel interface. When they are in the same subnet, tunneling is automatic.)
aaa radius-server account-interim-interval <number>
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
account-interim-interval Set the interval in seconds for sending RADIUS accounting updates
<number> Enter the interval in seconds for sending RADIUS accounting updates (Default: 600; Range: 10-100000000)
aaa radius-server accounting {primary|backup1|backup2|backup3} <ip_addr|string> [ shared-secret <string> ] [ acct-port <number> ] [ via-vpn-tunnel ]
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
accounting Set parameters for a RADIUS accounting server
primary Set the RADIUS accounting server to which the HiveAP sends Accounting-Request packets first
backup1 Set the RADIUS accounting server to which the HiveAP sends Accounting-Request packets if the primary server does not respond
backup2 Set the RADIUS accounting server to which the HiveAP sends Accounting-Request packets if the backup1 server does not respond
backup3 Set the RADIUS accounting server to which the HiveAP sends Accounting-Request packets if the backup2 server does not respond
<ip_addr> Enter the IP address or domain name for the RADIUS accounting server (max 32 chars)
<string> Enter the IP address or domain name for the RADIUS accounting server (max 32 chars)
shared-secret Set the shared secret for securing communications with RADIUS accounting servers
<string> Enter the shared secret (1-64 chars; Note: The RADIUS shared secret is case sensitive and can contain spaces.)
acct-port Set the RADIUS accounting port number
<number> Enter the RADIUS accounting port number (Default: 1813; Range: 1-65535)
via-vpn-tunnel Send all RADIUS traffic through a VPN tunnel (Note: Set this option on VPN clients when the RADIUS server is in a different subnet from the tunnel interface. When they are in the same subnet, tunneling is automatic.)
aaa radius-server dynamic-auth-extension
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
dynamic-auth-extension Enable the HiveAP acting as a NAS to accept unsolicited messages from the RADIUS authentication server (Default: Disabled)
aaa radius-server inject Operator-Name
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
inject Set injection parameters for RADIUS Access-Request and Accounting-Request packets
Operator-Name Set the operator name of the RADIUS Access-Request and Accounting-Request packets (Note: The operator name contains the operator namespace ID and the operator name. The operator name is combined with the namespace ID to uniquely identify the owner of the access network.)
aaa radius-server keepalive enable
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
keepalive Set parameters for periodically checking network connectivity to RADIUS servers
enable Set parameters for periodically checking network connectivity to RADIUS servers
aaa radius-server keepalive interval <number>
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
keepalive Set parameters for periodically checking network connectivity to RADIUS servers
interval Set the interval between periodic connectivity status checks
<number> Enter the interval in seconds (Default: 60; Range: 60-86400)
aaa radius-server keepalive retry <number>
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
keepalive Set parameters for periodically checking network connectivity to RADIUS servers
retry Set the number of times to retry sending an Access-Request or Accounting-Request that does not elicit a response from a RADIUS authentication or accounting server
<number> Enter the retry value (Default: 3; Range: 1-10)
aaa radius-server keepalive retry-interval <number>
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
keepalive Set parameters for periodically checking network connectivity to RADIUS servers
retry-interval Set the interval between retries if no response is received from the RADIUS server
<number> Enter the retry interval value in seconds (Default: 10; Range: 1-60)
aaa radius-server keepalive username <string> password <string>
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
keepalive Set parameters for periodically checking network connectivity to RADIUS servers
username Set the user name to submit in Access-Request messages when checking the connectivity to RADIUS authentication servers
<string> Enter the user name (1-32 chars)
password Set the password to submit in Access-Request messages
<string> Enter the password (1-64 chars)
aaa radius-server local user-group <string>
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
local Set the local Aerohive device as a RADIUS server
user-group Add a user group on the local RADIUS server
<string> Enter the user group name (1-32 chars)
aaa radius-server retry-interval <number>
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
retry-interval Set RADIUS server retry interval
<number> Enter RADIUS server retry interval (Default: 600 secs; Range: 60-100000000)
aaa radius-server {primary|backup1|backup2|backup3} <ip_addr|string> [ shared-secret <string> ] [ auth-port <number> ] [ acct-port <number> ] [ via-vpn-tunnel ]
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
primary Set the RADIUS server that is first queried when authenticating users
backup1 Set the RADIUS server that is queried if the primary server stops responding
backup2 Set the RADIUS server that is queried if the backup1 server stops responding
backup3 Set the RADIUS server that is queried if the backup2 server stops responding
<ip_addr> Enter an IP address or a domain name for the RADIUS server (max 32 chars)
<string> Enter an IP address or a domain name for the RADIUS server (max 32 chars)
shared-secret Set the shared secret for authenticating communications with a RADIUS server
<string> Enter the shared secret for authenticating communications with a RADIUS server (1-64 chars)
auth-port Set the RADIUS authentication port number
<number> Enter the RADIUS authentication port number (Default: 1812; Range: 1-65535)
acct-port Set the RADIUS accounting port number
<number> Enter the RADIUS accounting port number (Default: 0; Range: 0-65535)
via-vpn-tunnel Send all RADIUS traffic through a VPN tunnel (Note: Set this option on VPN clients when the RADIUS server is in a different subnet from the tunnel interface. When they are in the same subnet, tunneling is automatic.)
access-console custom-ssid <string>
access-console Set access console parameters
custom-ssid Set custom SSID profile name for the access console
<string> Enter an SSID profile name (1-32 chars)
access-console hide-ssid
access-console Set access console parameters
hide-ssid Hide the SSID in beacons and ignore broadcast probe requests(Default: disabled)
access-console max-client <number>
access-console Set access console parameters
max-client Set the maximum number of clients that can associate with the access console SSID
<number> Enter the maximum number of clients that can associate (Default: 2; Range: 1-64)
access-console mode {auto|disable|enable}
access-console Set access console parameters
mode Set the mode for the access console (Note: 'auto' enables the access console only when there is no Ethernet or wireless backhaul connection. 'enable' and 'disable' set the mode manually.)
auto Set the mode as auto (Default: auto)
disable Set the mode as disable (Default: auto)
enable Set the mode as enable (Default: auto)
access-console security mac-filter <string>
access-console Set access console parameters
security Set the security parameters for the access console
mac-filter Assign a MAC filter to the access console to restrict access only to those MAC addresses and OUIs (organizational unique identifiers) specified in the filter
<string> Enter the filter name (1-32 chars)
access-console security protocol-suite open
access-console Set access console parameters
security Set the security parameters for the access console
protocol-suite Set the security protocol suite for the access console
open Set the security protocol suite as open
access-console security protocol-suite {wpa2-aes-psk|wpa2-tkip-psk|wpa-auto-psk} ascii-key <string>
access-console Set access console parameters
security Set the security parameters for the access console
protocol-suite Set the security protocol suite for the access console
wpa2-aes-psk Set the security protocol suite as wpa2-aes-psk
wpa2-tkip-psk Set the security protocol suite as wpa2-tkip-psk
wpa-auto-psk Set the security protocol suite as wpa-auto-psk
ascii-key Set key type as an ASCII string
<string> Enter the ASCII key value (8-63 chars)
access-console telnet
access-console Set access console parameters
telnet Enable Telnet manageability of the access console (Default: enabled)
admin manager-ip <ip_addr/netmask>
admin Set the administrator parameters
manager-ip Allow administrative access from a host or subnet (By default, access from all addresses are allowed.)
<ip_addr/netmask> Enter an IP address and netmask
admin min-password-length <number>
admin Set the administrator parameters
min-password-length Set the minimum password length
<number> Enter the minimum password length (Default: 8; Range: 8-32)
admin root-admin <string> password <string>
admin Set the administrator parameters
root-admin The root-admin has complete privileges, including the ability to add, modify, and delete other admins
<string> Enter root-admin name (3-20 chars)
password Set password for the root-admin
<string> Set password for the root-admin ([min-password-length]-32 chars, use CLI "show min-password-length" to get value of min-password-length, default: 8)
admin {read-write|read-only} <string> password <string>
admin Set the administrator parameters
read-write The read-write admin has the ability to view, set commands and modify his or her own password, but not the ability to reset the configuration or add, modify, and delete other admins
read-only The read-only admin has the ability to view settings
<string> Enter an admin user's name (3-20 chars)
password Set password for the user
<string> Set password for the user ([min-password-length]-32 chars, use CLI "show min-password-length" to get value of min-password-length, default: 8)
alg {ftp|tftp|sip|dns|http} enable
alg Set ALG (Application Level Gateway) parameters
ftp Set an FTP (File Transfer Protocol) ALG
tftp Set a TFTP (Trivial File Transfer Protocol) ALG
sip Set a SIP (Session Initiation Protocol) ALG
dns Set a DNS (Domain Name System) ALG
http Set an HTTP ALG
enable Enable ALG functionality
alg {ftp|tftp|sip|dns} qos <number>
alg Set ALG (Application Level Gateway) parameters
ftp Set an FTP (File Transfer Protocol) ALG
tftp Set a TFTP (Trivial File Transfer Protocol) ALG
sip Set a SIP (Session Initiation Protocol) ALG
dns Set a DNS (Domain Name System) ALG
qos Set an Aerohive QoS class for ALG data traffic
<number> Enter an Aerohive QoS class (Default: 0 for FTP, 0 for TFTP, 6 for SIP, 0 for DNS; Range: 0-7)
alg {ftp|tftp|sip} inactive-data-timeout <number>
alg Set ALG (Application Level Gateway) parameters
ftp Set an FTP (File Transfer Protocol) ALG
tftp Set a TFTP (Trivial File Transfer Protocol) ALG
sip Set a SIP (Session Initiation Protocol) ALG
inactive-data-timeout Set a timeout to close an inactive gate
<number> Enter an inactive gateway timeout value in seconds (Default: 30 for FTP, 30 for TFTP, 60 for SIP; Range: 1-1800s)
alg {ftp|tftp|sip} max-duration <number>
alg Set ALG (Application Level Gateway) parameters
ftp Set an FTP (File Transfer Protocol) ALG
tftp Set a TFTP (Trivial File Transfer Protocol) ALG
sip Set a SIP (Session Initiation Protocol) ALG
max-duration Set the maximum duration for the ALG
<number> Enter the maximum duration in minutes (Default: 60 for FTP, 60 for TFTP, 720 for SIP; Range: 1-7200(min))
amrp l2-neighbor-keepalive-count <number>
amrp Set AMRP (Advanced Mobility Routing Protocol) parameters
l2-neighbor-keepalive-count Number of keepalive packet loss allowed before mesh failover
<number> [1~255] Packet number N. Failover delay time is about 2sec * N (Default: 16; Min: 1; Max: 255)
cac airtime-per-second <number>
cac Set CAC (Call Admission Control) parameters for regulating the admission of new VoIP calls
airtime-per-second Set airtime reserved for VoIP calls
<number> Enter the airtime for VoIP calls (Default: 500ms; Range: 100ms-1000ms)
cac enable
cac Set CAC (Call Admission Control) parameters for regulating the admission of new VoIP calls
enable Enable CAC protection of VoIP traffic
cac roaming airtime-percentage <number>
cac Set CAC (Call Admission Control) parameters for regulating the admission of new VoIP calls
roaming Set parameters for VoIP calls when a client roams
airtime-percentage Set the percentage of airtime reserved for VoIP calls during roaming
<number> Enter the percentage of reserved airtime (Default: 20; Range: 0-100)
capture interface <wifix> [ count <number> ] [ filter <number> ] [ promiscuous ]
capture Set packet capture parameters
interface Enable packet capturing on a radio interface
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
count Set the number of frames to capture
<number> Enter the number of frames to capture (Default: 2000; Range: 1-100000)
filter Set the packet capture filter
<number> Enter a filter ID (Range: 1-64)
promiscuous Enable the wifi interfaces to operate in promiscuous mode during packet capturing (Default: Disabled)
capture save interface <wifix> <string>
capture Set packet capture parameters
save Set the packet capture tool to save captured packets to a file
interface Set the packet capture tool to save captured packets to a file on a radio interface
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
<string> Enter a local file name or the remote location, path, and file name (Format: filename or tftp://server:/path/filename; Default: wifix.dmp)
clear arp-cache
clear Clear dynamic system information or remove all web directories
arp-cache Clear the ARP cache
clear auth roaming-cache mac <mac_addr> {hive-neighbors|hive-all}
clear Clear dynamic system information or remove all web directories
auth Clear dynamic authentication information
roaming-cache Clear all entries from the roaming cache, which contains authentication information for stations currently connected to neighboring hive members
mac Set the MAC address of the station whose cached authentication information you want to clear
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
hive-neighbors Clear all entries from the local roaming cache and from the roaming caches of all neighboring hive members
hive-all Clear the MAC address from the local roaming cache and from the roaming caches of all hive members
clear auth roaming-cache {hive-neighbors}
clear Clear dynamic system information or remove all web directories
auth Clear dynamic authentication information
roaming-cache Clear all entries from the roaming cache, which contains authentication information for stations currently connected to neighboring hive members
hive-neighbors Clear all entries from the local roaming cache and from the roaming caches of all neighboring hive members
clear auth username <string>
clear Clear dynamic system information or remove all web directories
auth Clear dynamic authentication information
username Clear dynamic authentication information by user name
<string> Enter a user name (1-32 chars)
clear auth {local-cache|roaming-cache|station} [ mac <mac_addr> ]
clear Clear dynamic system information or remove all web directories
auth Clear dynamic authentication information
local-cache Clear all entries from the local cache, which contains authentication information for stations currently connected to the local HiveAP
roaming-cache Clear all entries from the roaming cache, which contains authentication information for stations currently connected to neighboring hive members
station Clear authentication information for a specific station
mac Set the MAC address of the station whose cached authentication information you want to clear
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
clear auth {local-cache|roaming-cache|station} ssid <string>
clear Clear dynamic system information or remove all web directories
auth Clear dynamic authentication information
local-cache Clear all entries from the local cache, which contains authentication information for stations currently connected to the local HiveAP
roaming-cache Clear all entries from the roaming cache, which contains authentication information for stations currently connected to neighboring hive members
station Clear authentication information for a specific station
ssid Clear cached authentication information based on the SSID with which stations associated
<string> Enter a user name (1-32 chars)
clear cac station-airtime [ mac <mac_addr> ]
clear Clear dynamic system information or remove all web directories
cac Clear CAC (Call Admission Control) statistics
station-airtime Clear airtime statistics for a specific station
mac Set the specific destination MAC
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
clear capture local [ <string> ]
clear Clear dynamic system information or remove all web directories
capture Clear packet capture parameters
local Clear one or all locally stored packet capture files
<string> Enter the file name to clear
clear forwarding-engine counters [ interface <wifix|wifix.y|ethx|mgtx> ] [ station <mac_addr> ] [ drop ] [ tunnel ] [ policy ]
clear Clear dynamic system information or remove all web directories
forwarding-engine Clear dynamically generated data from the forwarding engine
counters Clear forwarding engine counter statistics
interface Clear forwarding engine counter by interface
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
<ethx> Enter the name of an Ethernet interface, where x = 0
<mgtx> Enter the name of the management interface, where x = 0
station Clear forwarding engine counter by station MAC
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
drop Clear the drop packet counter
tunnel Clear the counter on tunnels
policy Clear the counter on policies
clear forwarding-engine ip-sessions [ src-ip <ip_addr> ] [ dst-ip <ip_addr> ] [ src-port <number> ] [ dst-port <number> ] [ protocol <number> ]
clear Clear dynamic system information or remove all web directories
forwarding-engine Clear dynamically generated data from the forwarding engine
ip-sessions Clear IP sessions
src-ip Clear IP sessions by source IP address
<ip_addr> Source IP address
dst-ip Clear IP sessions by destination IP address
<ip_addr> Destination IP address
src-port Clear IP essions by source port number
<number> source IP port (Range: 1-65535)
dst-port Clear IP sessions by destination port number
<number> destination IP port (Range: 1-65535)
protocol Clear IP sessions by protocol type
<number> source IP port (Range: 1-255)
clear forwarding-engine ip-sessions id <number>
clear Clear dynamic system information or remove all web directories
forwarding-engine Clear dynamically generated data from the forwarding engine
ip-sessions Clear IP sessions
id Clear IP sessions by session ID number
<number> Enter the IP session ID (Range: 1-9999)
clear forwarding-engine mac-sessions [ src-mac <mac_addr> ] [ dst-mac <mac_addr> ]
clear Clear dynamic system information or remove all web directories
forwarding-engine Clear dynamically generated data from the forwarding engine
mac-sessions Clear MAC sessions
src-mac Clear MAC sessions by source MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
dst-mac Clear MAC sessions by destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
clear forwarding-engine mac-sessions id <number>
clear Clear dynamic system information or remove all web directories
forwarding-engine Clear dynamically generated data from the forwarding engine
mac-sessions Clear MAC sessions
id Clear MAC sessions by session ID number
<number> Enter the MAC session ID (Range: 1-9999)
clear gre-tunnel counters tunnel
clear Clear dynamic system information or remove all web directories
gre-tunnel Clear GRE (Generic Routing Encapsulation) tunnel information
counters Clear GRE tunnel counter statistics
tunnel Clear the counter on tunnels
clear hive <string> counter neighbor [ <mac_addr> ]
clear Clear dynamic system information or remove all web directories
hive Clear hive info
<string> Enter a hive profile name (1-32 chars)
counter Clear counters for neighboring hive members
neighbor Clear counters for all neighbors or a specific neighbor in this hive
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
clear interface <ethx> mac-learning dynamic <mac_addr>
clear Clear dynamic system information or remove all web directories
interface Clear interface info
<ethx> Enter the name of an Ethernet interface, where x = 0
mac-learning Clear entries in the MAC address learning table
dynamic Clear dynamically learned MAC address entries
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
clear interface <ethx> mac-learning dynamic all
clear Clear dynamic system information or remove all web directories
interface Clear interface info
<ethx> Enter the name of an Ethernet interface, where x = 0
mac-learning Clear entries in the MAC address learning table
dynamic Clear dynamically learned MAC address entries
all Clear all dynamically learned MAC address entries
clear interface <ethx|wifix|wifix.y> counter
clear Clear dynamic system information or remove all web directories
interface Clear interface info
<ethx> Enter the name of an Ethernet interface, where x = 0
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
counter Clear all counters for the interface
clear interface <wifix> wlan-idp mitigate rogue-ap [ <mac_addr> ]
clear Clear dynamic system information or remove all web directories
interface Clear interface info
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
wlan-idp Clear rogue AP entries from the WLAN IDP (intrusion detection and prevention) table
mitigate Clear mitigated rogue APs
rogue-ap Clear all mitigated rogue APs or a specific rogue AP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
clear lldp [ {cdp} ] table
clear Clear dynamic system information or remove all web directories
lldp Set LLDP (Link Layer Discovery Protocol) parameters
cdp Set CDP (Cisco Discovery Protocol) parameters
table Clear LLDP or CDP neighbor table
clear qos counter
clear Clear dynamic system information or remove all web directories
qos Clear dynamic QoS information
counter Clear dynamic QoS statistics counters
clear service [ <string> ] counter
clear Clear dynamic system information or remove all web directories
service Clear dynamically generated information for all services or for a specific service
<string> Enter the name of the service whose counters you want to clear
counter Clear the counter statistics for all services or for a specific service
clear ssid <string> counter station [ <mac_addr> ]
clear Clear dynamic system information or remove all web directories
ssid Clear SSID info
<string> Enter an SSID profile name (1-32 chars)
counter Clear counters for stations (wireless clients) associated with the SSID
station Clear counters for all stations or a specific station associated with the SSID
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
clear user-and-group all
clear Clear dynamic system information or remove all web directories
user-and-group Clear all users and user-groups
all Clear all users and user-groups
clear wlan-idp mitigate [ <mac_addr> ]
clear Clear dynamic system information or remove all web directories
wlan-idp Clear rogue AP entries from the WLAN IDP (intrusion detection and prevention) table
mitigate Clear one or a list of the rogue APs against which mitigation was performed and the HiveAPs that reported them
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
client-monitor enable
client-monitor Set parameters for Client Monitor
enable Enable client monitor to detect client issues and report client connection activities and problems to HiveManager (Default: Enabled)
client-monitor policy <string> problem-type {association|authentication|networking} [ trigger-times <number> ] [ report-interval <number> ] [ quiet-time <number> ]
client-monitor Set parameters for Client Monitor
policy Set parameters for a Client Monitor policy
<string> Enter the Client Monitor policy name (1-32 chars)
problem-type Set the problem type which specifies a category of client-centric problems
association Detect, analyze and report the client association problem
authentication Detect, analyze and report the client authentication problem
networking Detect, analyze and report the client networking problem
trigger-times Set how many times the problem type is detected to trigger reporting the problem and related logs
<number> Enter trigger times for the problem type (Range: 1-10; Default: 1)
report-interval Set the interval to report the problem and related logs
<number> Enter a report interval in seconds for the problem type (Range: 0 or 30-3600; Default: 0; Note: The default value of 0 reports every instance of the problem)
quiet-time Set the time period after which the problem elapses
<number> Enter quiet time in seconds for the problem type (Range: 60-86400; Default: 300)
client-tracing <mac_addr>
client-tracing Test client tracing
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
clock date-time <date> <time>
clock Set the internal clock
date-time Set the date and time for the internal clock
<date> Enter the date for the internal clock, (Format: YYYY-MM-DD, Range: 1970-01-01 to 2035-12-31)
<time> Enter the time for the internal clock, (Format: hh:mm:ss, Range: hh(00-23), mm(00-59), ss(00-59)
clock time-zone <number> [ {30|45} ]
clock Set the internal clock
time-zone Set the time zone for the internal clock
<number> Enter the time zone for the internal clock (Default: 0; Range: from -12 to 12)
30 Add 30 minutes to the specified time zone
45 Add 45 minutes to the specified time zone
clock time-zone daylight-saving-time <date> <time> <date> <time>
clock Set the internal clock
time-zone Set the time zone for the internal clock
daylight-saving-time Set the daylight saving time parameters
<date> Enter the start date for the daylight saving time (Format: MM-DD, Range: 01-01 to 12-31)
<time> Enter the start time for the daylight saving time (Format: hh:mm:ss, Range: hh(00-23), mm(00-59), ss(00-59)
<date> Enter the end date for the daylight saving time (Format: MM-DD, Range: 01-01 to 12-31)
<time> Enter the end time for the daylight saving time (Format: hh:mm:ss, Range: hh(00-23), mm(00-59), ss(00-59)
designated-server idm-proxy dynamic
designated-server Set parameters for a dynamic server
idm-proxy Set parameters for a dynamic proxy server to forward RADIUS requests over a secure TLS tunnel between the local device and ID Manager
dynamic Enable the Aerohive device acting as a NAS to send RADIUS requests to the designated proxy server (Default: Disabled)
device-group <string> [ mac-object <string> ] [ domain-object <string> ] [ os-object <string> ]
device-group Set a device group containing various objects that the HiveAP can use to classify client devices (Max: 64 groups)
<string> Enter a device group name (1-32 chars)
mac-object Add a MAC object to the device group
<string> Enter the MAC object name (1-32 chars)
domain-object Add a domain object to the device group
<string> Enter the domain object name (1-32 chars)
os-object Add an OS object to the device group
<string> Enter the OS object name (1-32 chars)
device-group <string> ownership {cid|byod}
device-group Set a device group containing various objects that the HiveAP can use to classify client devices (Max: 64 groups)
<string> Enter a device group name (1-32 chars)
ownership Set an attribute for the client device group identifying its devices as user-owned (BYOD=bring your own device) or company-issued (CID=company-issued device)
cid Set the devices in the device group as company-issued
byod Set the devices in the device group as user-owned
dns domain-name <string>
dns Set DNS (Domain Name System) parameters
domain-name Set the domain name suffix for the local AP
<string> Enter the domain name suffix for the local AP (1-32 chars)
dns server-ip <ip_addr> [ {second|third} ]
dns Set DNS (Domain Name System) parameters
server-ip Set the IP address of the primary, secondary, or tertiary DNS server
<ip_addr> Enter the IP address of the primary, secondary, or tertiary DNS server
second Assign the IP address to a secondary DNS server
third Assign the IP address to a tertiary DNS server
domain-object <string> domain <string>
domain-object Set parameters for a domain object that the HiveAP can use to assign a client that belongs to a matching device domain to a user profile (Max: 64 domain objects per HiveAP)
<string> Enter a domain object name (1-32 chars; Note: The object name is an admin-defined name and does not have to be the name of a device domain.)
domain Add a device domain to the domain object (Note: Specify the domain to which devices in an LDAP-structured database belong.)
<string> Enter an domain name (1-64 chars)
exec aaa idm-test auth username <string> password <string> [ {pap|ms-chap-v2} ] [ proxy <string> ] [ bind-ssid <string> ]
exec Execute a command to initiate a task immediately
aaa Set parameters for AAA (authentication, authorization, accounting)
idm-test Test TLS connectivity from the Aerohive device acting as the RadSec or AUTH proxy to the ID Manager gateway
auth Send a RADIUS Access-Request message from the Aerohive device to the ID Manager
username Set the user name belonging to an account on the ID Manager
<string> Enter the user name (1-32 chars)
password Set the password that belongs to the same account as the user name on the ID Manager
<string> Enter the password (1-64 chars)
pap Set PAP (Password Authentication Protocol) as the method for sending authentication requests between the Aerohive device and ID Manager (Default: MS-CHAP-v2)
ms-chap-v2 Set MS-CHAP-v2 (Microsoft CHAP Version 2) as the method for sending authentication requests between the Aerohive device and ID Manager (Default: MS-CHAP-v2)
proxy Set parameters for connecting to an ID Manager proxy server
<string> Enter the IP address or domain name of the ID Manager proxy server (1-32 chars)
bind-ssid Set the SSID to which the user name binds for ID Manager testing (Note: By default, wired links use the user name-password pair for testing ID Manager accounts, so the user name does not need to bind to an SSID.)
<string> Enter the name of the SSID to which you want to bind the user name (1-32 chars)
exec aaa radius-test <string> accounting
exec Execute a command to initiate a task immediately
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-test Send a RADIUS Access-Request message from the HiveAP to a RADIUS authentication server or an Accounting-Request message to a RADIUS accounting server
<string> Enter the IP address or domain name of the RADIUS server (1-32 chars)
accounting Check the network connectivity status of a RADIUS accounting server (Default: Check the status of a RADIUS authentication server.)
exec aaa radius-test <string> username <string> password <string> [ {pap|chap|ms-chap-v2} ]
exec Execute a command to initiate a task immediately
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-test Send a RADIUS Access-Request message from the HiveAP to a RADIUS authentication server or an Accounting-Request message to a RADIUS accounting server
<string> Enter the IP address or domain name of the RADIUS server (1-32 chars)
username Set the user name belonging to an account on the RADIUS server
<string> Enter the user name (1-32 chars)
password Set the password that belongs to the same account as the user name on the RADIUS server
<string> Enter the password (1-64 chars)
pap Set PAP (Password Authentication Protocol) as the method for sending authentication requests between the HiveAP and RADIUS server (Default: MS-CHAP-v2)
chap Set CHAP (Challenge-Handshake Authentication Protocol) as the method for sending authentication requests between the HiveAP and RADIUS server (Default: MS-CHAP-v2)
ms-chap-v2 Set MS-CHAP-v2 (Microsoft CHAP Version 2) as the method for sending authentication requests between the HiveAP and RADIUS server (Default: MS-CHAP-v2)
exec antenna-alignment interface <wifix> peer <mac_addr> [ count <number> ] [ interval <number> ] [ text-size <number> ] [ beep {static|adaptive|no} ] [ static-rssi-range <number> - <number> ]
exec Execute a command to initiate a task immediately
antenna-alignment Set parameters for aligning a directional or sectional antenna connected to a radio in backhaul or dual (access and backhaul) mode with a specified peer
interface Set the interface bound to the radio whose antenna you want to align with that of a peer
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
peer Set the MAC address of the peer to which the AP sends antenna alignment request frames
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
count Set the total number of request frames to send to the peer
<number> Enter the total number of request frames (Range: 1-1000; Default: 60)
interval Set the interval between each request frame transmission
<number> Enter the interval in seconds (Range: 1-30; Default: 1)
text-size Set the amount of filler text in each request frame
<number> Enter the amount of filler text in bytes (Range: 16-2048; Default: 16)
beep Set the mode of antenna buzzer, which the device uses to indicate the quality of antenna alignment by increasing the frequency of audible beeps as the signal strength improves (Default: adaptive)
static Set the antenna buzzer to beep when the signal strength falls between 0 to 80 dB
adaptive Set the antenna buzzer to beep based on the signal strengths that are determined during the alignment process
no Disable the antenna buzzer
static-rssi-range Set the signal strength range(instead of default 0 ~ 80 dB) which is used in the static beep mode
<number> Enter the lowest signal strength in dB
- Set a range of signal strength
<number> Enter the highest signal strength in dB
exec capture remote-sniffer [ user <string> <string> ] [ host-allowed <string> ] [ local-port <number> ] [ promiscuous ]
exec Execute a command to initiate a task immediately
capture Initiate packet capturing
remote-sniffer Set parameters for a remote packet sniffer
user Set user name and password that the remote sniffer uses when authenticating itself to the HiveAP
<string> Enter the user name (1-32 chars)
<string> Enter the password (1-32 chars)
host-allowed Set the IP address or domain name of the remote packet sniffer that is allowed to connect to the HiveAP
<string> Enter the IP address or domain name (1-32 chars)
local-port Set the port number on which the HiveAP listens for connection requests from the remote sniffer
<number> Enter the port number (Default: 2002; Range: 1024-65535)
promiscuous Enable the wifi interfaces to operate in promiscuous mode during packet capturing (Default: Disabled)
exec mobile-device-manager aerohive status-change <string>
exec Execute a command to initiate a task immediately
mobile-device-manager Set the mobile device manager parameters
aerohive Aerohive MDM notifies client status change to AP
status-change Set status notification body as parameter
<string> MDM status notification body(1-256 chars)
exec user-group <string> psk-to-pmk
exec Execute a command to initiate a task immediately
user-group Execute a user-group command
<string> Enter the user group name (1-32 chars)
psk-to-pmk Regenerate all users' PMKs (pairwise master keys) based on their PSKs (preshared keys)
exec wlan-idp ap-classify {rogue|friendly} <mac_addr> [ - <mac_addr> ]
exec Execute a command to initiate a task immediately
wlan-idp Execute a command relating to WLAN IDP (intrusion detection and prevention)
ap-classify Classify one or more APs as rogue or friendly by MAC address
rogue Classify APs as rogue
friendly Classify APs as friendly
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
- Set a range of MAC addresses
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
exec wlan-idp mitigate {rogue-ap} <mac_addr>
exec Execute a command to initiate a task immediately
wlan-idp Execute a command relating to WLAN IDP (intrusion detection and prevention)
mitigate Mitigate a specific rogue AP and its clients by sending a deauth DoS attack against them
rogue-ap Mitigate a specific rogue AP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
exec wlan-idp mitigate {rogue-ap} <mac_addr> interface <wifix>
exec Execute a command to initiate a task immediately
wlan-idp Execute a command relating to WLAN IDP (intrusion detection and prevention)
mitigate Mitigate a specific rogue AP and its clients by sending a deauth DoS attack against them
rogue-ap Mitigate a specific rogue AP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
interface Execute the command through a specific interface
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
exec {jss-check|airwatch-check|aerohive-check} mobile-device <mac_addr> enroll-status
exec Execute a command to initiate a task immediately
jss-check Check the enrollment status of a mobile device on the JSS (JAMF software server)
airwatch-check Check the enrollment status of a mobile device on the AirWatch
aerohive-check Check the enrollment status of a mobile device on the Aerohive MDM server
mobile-device Set the MAC address or ID of a mobile device
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
enroll-status Retrieve the enrollment status of the mobile device
exit
exit Exit from the current mode
filter <number> l2 [ {data|ctl|mgmt} ] [ subtype <hex> ] [ src-mac <mac_addr> ] [ dst-mac <mac_addr> ] [ bssid <mac_addr> ] [ tx-mac <mac_addr> ] [ rx-mac <mac_addr> ] [ error {crc|decrypt|mic|all|no} ] [ etype <hex> ]
filter Set packet capture filter parameters
<number> Enter a filter ID (Range: 1-64)
l2 Set packet capture filter for layer 2 parameters
data Filter by data traffic
ctl Filter by ctl traffic
mgmt Filter by mgmt traffic
subtype Filter by frame subtype
<hex> Enter frame subtype value
src-mac Filter by source MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
dst-mac Filter by destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
bssid Filter by BSSID
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
tx-mac Filter by transmitter MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
rx-mac Filter by receiver MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
error Filter by error condition
crc Filter by crc error
decrypt Filter by decrypt error
mic Filter by mic error
all Filter by all error
no Filter by no error
etype Filter by Ethernet value
<hex> Enter the value indicating an ethernet type (ARP:0806; IP:0800; IPX:8137; RARP:8035)
filter <number> l3 [ src-ip <ip_addr> ] [ dst-ip <ip_addr> ] [ protocol <number> ] [ src-port <number> ] [ dst-port <number> ]
filter Set packet capture filter parameters
<number> Enter a filter ID (Range: 1-64)
l3 Set packet capture filter for layer 3 parameters
src-ip Filter by source IP address
<ip_addr> Enter a source IP address
dst-ip Filter by destination IP address
<ip_addr> Enter a destination IP address
protocol Filter by protocol number in IP header
<number> Enter a protocol value (UDP:17; TCP:6 ICMP:1)
src-port Filter by source port filter
<number> Enter a source port number
dst-port Filter by destination port
<number> Enter a destination port number (HTTP:80; FTP:21; TELNET:23; DHCP:67; TFTP:79)
filter [ <number> ] [ direction bidirectional ]
filter Set packet capture filter parameters
<number> Enter a filter ID (Range: 1-64)
direction Set filter traffic flowing direction
bidirectional Filter traffic flowing in both directions
forwarding-engine drop {ip-fragmented-packets|to-self-non-management-traffic}
forwarding-engine Set parameters to shape the behavior of the forwarding engine
drop Set parameters for dropping packets
ip-fragmented-packets Drop fragmented IP packets
to-self-non-management-traffic Drop all non-management traffic destined to the HiveAP itself
forwarding-engine inter-ssid-flood enable
forwarding-engine Set parameters to shape the behavior of the forwarding engine
inter-ssid-flood Forward multicast and broadcast traffic between access interfaces to protect SSIDs from flooding (Default: Enabled)
enable Enable the protection of SSIDs from multicast and broadcast flooding
forwarding-engine log {firewall-dropped-packets|to-self-sessions}
forwarding-engine Set parameters to shape the behavior of the forwarding engine
log Set logging parameters for packets
firewall-dropped-packets Log dropped packets that are denied by IP or MAC firewall policies (Default: Do not log dropped packets)
to-self-sessions Log the first packets of sessions destined for the HiveAP itself (Default: Do not log first packets)
forwarding-engine mac-sessions sync-vlan
forwarding-engine Set parameters to shape the behavior of the forwarding engine
mac-sessions Set MAC session parameters
sync-vlan Enable the local AP to inform its neighbors of the VLAN ID assigned to a client that initially connected it (Default: Disabled; Note: Enabling this option allows neighbors to do a Layer 2 default route lookup based on VLAN.)
forwarding-engine max-ip-sessions-per-station <number>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
max-ip-sessions-per-station Set the maximum number of IP sessions that can be created to or from a station
<number> Enter the maximum IP sessions number per station (Range: 1-8000; Note: By default, IP session limiting is disabled.)
forwarding-engine max-mac-sessions-per-station <number>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
max-mac-sessions-per-station Set the maximum number of MAC sessions that can be created to or from a station
<number> Enter the maximum MAC sessions number per station (Range: 1-8000; Note: By default, MAC session limiting is disabled.)
forwarding-engine proxy-arp enable
forwarding-engine Set parameters to shape the behavior of the forwarding engine
proxy-arp Set ARP proxying parameters
enable Enable learning MAC addresses and proxy replies to ARP requests
forwarding-engine static-rule <string> action drop in-if <ethx|aggx|redx> dst-mac <mac_addr>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
drop Drop packets that match the rule
in-if Set the inbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
forwarding-engine static-rule <string> action drop in-if <ethx|aggx|redx> src-mac <mac_addr> dst-mac <mac_addr>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
drop Drop packets that match the rule
in-if Set the inbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
src-mac Set the source MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
forwarding-engine static-rule <string> action drop in-if <ethx|aggx|redx> src-oui <oui> dst-mac <mac_addr>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
drop Drop packets that match the rule
in-if Set the inbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
src-oui Set the source OUI, apply the rule to any MAC address sharing the same OUI as the MAC address
<oui> Enter the OUI (Note: You can use colons, dashes, or periods to format the OUI. Examples: Apple iPhone=00:1b:63; D-Link Phone=00-17-9a; Vocera=00.09.ef.)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
forwarding-engine static-rule <string> action drop in-if <wifix.y> dst-mac <mac_addr> tx-mac <mac_addr>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
drop Drop packets that match the rule
in-if Set the inbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
tx-mac Set the MAC address of the transmitter; that is the MAC address of the device on the network that forwarded the frame to the HiveAP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
forwarding-engine static-rule <string> action drop in-if <wifix.y> src-mac <mac_addr> dst-mac <mac_addr> tx-mac <mac_addr>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
drop Drop packets that match the rule
in-if Set the inbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
src-mac Set the source MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
tx-mac Set the MAC address of the transmitter; that is the MAC address of the device on the network that forwarded the frame to the HiveAP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
forwarding-engine static-rule <string> action drop in-if <wifix.y> src-oui <oui> dst-mac <mac_addr> tx-mac <mac_addr>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
drop Drop packets that match the rule
in-if Set the inbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
src-oui Set the source OUI, apply the rule to any MAC address sharing the same OUI as the MAC address
<oui> Enter the OUI (Note: You can use colons, dashes, or periods to format the OUI. Examples: Apple iPhone=00:1b:63; D-Link Phone=00-17-9a; Vocera=00.09.ef.)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
tx-mac Set the MAC address of the transmitter; that is the MAC address of the device on the network that forwarded the frame to the HiveAP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
forwarding-engine static-rule <string> action pass in-if <ethx|aggx|redx> dst-mac <mac_addr> out-if <ethx|aggx|redx>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
pass Pass packets that match the rule
in-if Set the inbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
out-if Set the outbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
forwarding-engine static-rule <string> action pass in-if <ethx|aggx|redx> dst-mac <mac_addr> out-if <wifix.y> rx-mac <mac_addr>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
pass Pass packets that match the rule
in-if Set the inbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
out-if Set the outbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
rx-mac Set the MAC address of the receiver; that is the MAC address of the device on the network to which the HiveAP forwards the frame
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
forwarding-engine static-rule <string> action pass in-if <ethx|aggx|redx> src-mac <mac_addr> dst-mac <mac_addr> out-if <ethx|aggx|redx>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
pass Pass packets that match the rule
in-if Set the inbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
src-mac Set the source MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
out-if Set the outbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
forwarding-engine static-rule <string> action pass in-if <ethx|aggx|redx> src-mac <mac_addr> dst-mac <mac_addr> out-if <wifix.y> rx-mac <mac_addr>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
pass Pass packets that match the rule
in-if Set the inbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
src-mac Set the source MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
out-if Set the outbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
rx-mac Set the MAC address of the receiver; that is the MAC address of the device on the network to which the HiveAP forwards the frame
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
forwarding-engine static-rule <string> action pass in-if <ethx|aggx|redx> src-oui <oui> dst-mac <mac_addr> out-if <ethx|aggx|redx>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
pass Pass packets that match the rule
in-if Set the inbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
src-oui Set the source OUI, apply the rule to any MAC address sharing the same OUI as the MAC address
<oui> Enter the OUI (Note: You can use colons, dashes, or periods to format the OUI. Examples: Apple iPhone=00:1b:63; D-Link Phone=00-17-9a; Vocera=00.09.ef.)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
out-if Set the outbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
forwarding-engine static-rule <string> action pass in-if <ethx|aggx|redx> src-oui <oui> dst-mac <mac_addr> out-if <wifix.y> rx-mac <mac_addr>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
pass Pass packets that match the rule
in-if Set the inbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
src-oui Set the source OUI, apply the rule to any MAC address sharing the same OUI as the MAC address
<oui> Enter the OUI (Note: You can use colons, dashes, or periods to format the OUI. Examples: Apple iPhone=00:1b:63; D-Link Phone=00-17-9a; Vocera=00.09.ef.)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
out-if Set the outbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
rx-mac Set the MAC address of the receiver; that is the MAC address of the device on the network to which the HiveAP forwards the frame
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
forwarding-engine static-rule <string> action pass in-if <wifix.y> dst-mac <mac_addr> tx-mac <mac_addr> out-if <ethx|aggx|redx>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
pass Pass packets that match the rule
in-if Set the inbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
tx-mac Set the MAC address of the transmitter; that is the MAC address of the device on the network that forwarded the frame to the HiveAP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
out-if Set the outbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
forwarding-engine static-rule <string> action pass in-if <wifix.y> dst-mac <mac_addr> tx-mac <mac_addr> out-if <wifix.y> rx-mac <mac_addr>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
pass Pass packets that match the rule
in-if Set the inbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
tx-mac Set the MAC address of the transmitter; that is the MAC address of the device on the network that forwarded the frame to the HiveAP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
out-if Set the outbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
rx-mac Set the MAC address of the receiver; that is the MAC address of the device on the network to which the HiveAP forwards the frame
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
forwarding-engine static-rule <string> action pass in-if <wifix.y> src-mac <mac_addr> dst-mac <mac_addr> tx-mac <mac_addr> out-if <ethx|aggx|redx>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
pass Pass packets that match the rule
in-if Set the inbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
src-mac Set the source MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
tx-mac Set the MAC address of the transmitter; that is the MAC address of the device on the network that forwarded the frame to the HiveAP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
out-if Set the outbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
forwarding-engine static-rule <string> action pass in-if <wifix.y> src-mac <mac_addr> dst-mac <mac_addr> tx-mac <mac_addr> out-if <wifix.y> rx-mac <mac_addr>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
pass Pass packets that match the rule
in-if Set the inbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
src-mac Set the source MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
tx-mac Set the MAC address of the transmitter; that is the MAC address of the device on the network that forwarded the frame to the HiveAP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
out-if Set the outbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
rx-mac Set the MAC address of the receiver; that is the MAC address of the device on the network to which the HiveAP forwards the frame
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
forwarding-engine static-rule <string> action pass in-if <wifix.y> src-oui <oui> dst-mac <mac_addr> tx-mac <mac_addr> out-if <ethx|aggx|redx>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
pass Pass packets that match the rule
in-if Set the inbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
src-oui Set the source OUI, apply the rule to any MAC address sharing the same OUI as the MAC address
<oui> Enter the OUI (Note: You can use colons, dashes, or periods to format the OUI. Examples: Apple iPhone=00:1b:63; D-Link Phone=00-17-9a; Vocera=00.09.ef.)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
tx-mac Set the MAC address of the transmitter; that is the MAC address of the device on the network that forwarded the frame to the HiveAP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
out-if Set the outbound interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
forwarding-engine static-rule <string> action pass in-if <wifix.y> src-oui <oui> dst-mac <mac_addr> tx-mac <mac_addr> out-if <wifix.y> rx-mac <mac_addr>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
static-rule Add a static packet-forwarding rule that preempts dynamic forwarding decisions
<string> Enter the name of the packet-forwarding rule (1-32 chars)
action Set the action to apply to packets matching the static packet-forwarding rule
pass Pass packets that match the rule
in-if Set the inbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
src-oui Set the source OUI, apply the rule to any MAC address sharing the same OUI as the MAC address
<oui> Enter the OUI (Note: You can use colons, dashes, or periods to format the OUI. Examples: Apple iPhone=00:1b:63; D-Link Phone=00-17-9a; Vocera=00.09.ef.)
dst-mac Set the destination MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
tx-mac Set the MAC address of the transmitter; that is the MAC address of the device on the network that forwarded the frame to the HiveAP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
out-if Set the outbound interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
rx-mac Set the MAC address of the receiver; that is the MAC address of the device on the network to which the HiveAP forwards the frame
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
forwarding-engine tunnel selective-multicast-forward allow-all except <ip_addr|ip_addr/mask>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
tunnel Set tunnel (GRE tunnel or GRE-over-IPsec tunnel) parameters
selective-multicast-forward Selective multicast forwarding through GRE tunnels
allow-all Allow the forwarding of all IP multicast traffic through tunnels except for specified IP multicast groups
except Block specific IP multicast traffic through tunnels
<ip_addr> Enter the IP address and netmask of the multicast group to block (Example: 224.1.1.1 or 224.1.1.0/24)
<ip_addr/netmask> Enter the IP address and netmask of the multicast group to block (Example: 224.1.1.1 or 224.1.1.0/24)
forwarding-engine tunnel selective-multicast-forward block-all
forwarding-engine Set parameters to shape the behavior of the forwarding engine
tunnel Set tunnel (GRE tunnel or GRE-over-IPsec tunnel) parameters
selective-multicast-forward Selective multicast forwarding through GRE tunnels
block-all Block the forwarding of all IP multicast traffic through tunnels except for specified IP multicast groups
forwarding-engine tunnel selective-multicast-forward block-all except <ip_addr|ip_addr/mask>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
tunnel Set tunnel (GRE tunnel or GRE-over-IPsec tunnel) parameters
selective-multicast-forward Selective multicast forwarding through GRE tunnels
block-all Block the forwarding of all IP multicast traffic through tunnels except for specified IP multicast groups
except Allow specific IP multicast traffic through tunnels
<ip_addr> Enter the IP address and netmask of the multicast group to allow (Example: 224.1.1.1 or 224.1.1.0/24)
<ip_addr/netmask> Enter the IP address and netmask of the multicast group to allow (Example: 224.1.1.1 or 224.1.1.0/24)
forwarding-engine tunnel tcp-mss-threshold enable
forwarding-engine Set parameters to shape the behavior of the forwarding engine
tunnel Set tunnel (GRE tunnel or GRE-over-IPsec tunnel) parameters
tcp-mss-threshold Set TCP MSS (Maximum Segment Size) parameters
enable Enable the TCP MSS threshold feature
forwarding-engine tunnel tcp-mss-threshold threshold-size <number>
forwarding-engine Set parameters to shape the behavior of the forwarding engine
tunnel Set tunnel (GRE tunnel or GRE-over-IPsec tunnel) parameters
tcp-mss-threshold Set TCP MSS (Maximum Segment Size) parameters
threshold-size Set the TCP MSS threshold size
<number> Enter the TCP MSS size in bytes(GRE Tunnel Range: 64-1414; GRE-over-IPSec Tunnel Range: 64-1336)
history <number>
history Set the capacity for command history
<number> Enter the max number of commands to store in command history (Default: 20; Range: 1-50)
hive <string>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
hive <string> frag-threshold <number>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
frag-threshold Set fragment threshold parameters for the hive
<number> Enter the fragment threshold in bytes for the hive (Default: 2346; Range: 256-2346)
hive <string> manage all
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
manage Set management service parameters
all Enable all manageability options (ping, SNMP, SSH, and Telnet) for mgt0 through wireless backhaul interfaces in this hive (Defaults: ping enabled, SNMP disabled, SSH enabled, Telnet disabled)
hive <string> manage {Telnet|SSH|SNMP|ping}
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
manage Set management service parameters
Telnet Enable Telnet manageability of mgt0 through wireless backhaul interfaces in this hive (Default: Disabled)
SSH Enable SSH manageability of mgt0 through wireless backhaul interfaces in this hive (Default: Enabled)
SNMP Enable SNMP manageability of mgt0 through wireless backhaul interfaces in this hive (Default: Disabled)
ping Enable mgt0 to respond to pings through subinterfaces bound to this SSID (Default: Enabled)
hive <string> neighbor connecting-threshold <number> polling-interval <number>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
neighbor Set the threshold parameters for connecting wirelessly with neighboring hive members
connecting-threshold Set the minimum signal strength threshold required for connecting with a neighboring hive member
<number> Enter a minimum signal strength value in dBm (Default: -80; Range: -90~-55)
polling-interval Set the time interval in minutes for polling the signal strength of neighboring hive members
<number> Enter the polling time interval (Default: 1 minute; range: 1-60)
hive <string> neighbor connecting-threshold {low|medium|high} polling-interval <number>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
neighbor Set the threshold parameters for connecting wirelessly with neighboring hive members
connecting-threshold Set the minimum signal strength threshold required for connecting with a neighboring hive member
low Set a relatively low minimum signal strength threshold (-85dBm)
medium Set a relatively moderate minimum signal strength threshold (-80dBm)
high Set a relatively high minimum signal strength threshold (-75dBm)
polling-interval Set the time interval in minutes for polling the signal strength of neighboring hive members
<number> Enter the polling time interval (Default: 1 minute; range: 1-60)
hive <string> password <string>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
password Set a key for hive member authentication
<string> Enter a string (8-63 chars) for hive member authentication (Default: a default password is derived from the hive name)
hive <string> rts-threshold <number>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
rts-threshold Set the RTS (request to send) threshold for the hive
<number> Enter the packet size for the RTS threshold for the hive (Default: 2346 bytes; Range: 1-2346)
hive <string> security mac-filter <string>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
security Set hive security parameters
mac-filter Assign a filter for MAC addresses or OUIs (organizational unique identifiers)
<string> Enter the filter name for MAC addresses or OUIs (organizational unique identifiers)
hive <string> security wlan dos station-level frame-type {assoc-req|auth|eapol} ban <number>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
security Set hive security parameters
wlan Set WLAN parameters
dos Set WLAN DoS (Denial of Service) parameters
station-level Set DoS parameters at station-level
frame-type Set WLAN DoS (Denial of Service) frame type
assoc-req Specify WLAN DoS frame type assoc-req
auth Specify WLAN DoS frame type auth
eapol Specify WLAN DoS frame type eapol
ban Set the period of time to ignore frames after a theshold has been crossed
<number> Enter the period of time in seconds to ignore frames after a theshold has been crossed (Default: 60; Min: 0 Max: None)
hive <string> security wlan dos station-level frame-type {assoc-req|auth|eapol} ban forever
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
security Set hive security parameters
wlan Set WLAN parameters
dos Set WLAN DoS (Denial of Service) parameters
station-level Set DoS parameters at station-level
frame-type Set WLAN DoS (Denial of Service) frame type
assoc-req Specify WLAN DoS frame type assoc-req
auth Specify WLAN DoS frame type auth
eapol Specify WLAN DoS frame type eapol
ban Set the period of time to ignore frames after a theshold has been crossed
forever Set ban forever
hive <string> security wlan dos {hive-level|station-level} frame-type {probe-req|probe-resp|assoc-req|assoc-resp|disassoc|auth|deauth|eapol|all}
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
security Set hive security parameters
wlan Set WLAN parameters
dos Set WLAN DoS (Denial of Service) parameters
hive-level Set DoS parameters at hive-level
station-level Set DoS parameters at station-level
frame-type Set WLAN DoS (Denial of Service) frame type
probe-req Specify WLAN DoS frame type probe-req
probe-resp Specify WLAN DoS frame type probe-resp
assoc-req Specify WLAN DoS frame type assoc-req
assoc-resp Specify WLAN DoS frame type assoc-resp
disassoc Specify WLAN DoS frame type disassoc
auth Specify WLAN DoS frame type auth
deauth Specify WLAN DoS frame type deauth
eapol Specify WLAN DoS frame type eapol
all Specify WLAN DoS frame type all
hive <string> security wlan dos {hive-level|station-level} frame-type {probe-req|probe-resp|assoc-req|assoc-resp|disassoc|auth|deauth|eapol|all} alarm <number>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
security Set hive security parameters
wlan Set WLAN parameters
dos Set WLAN DoS (Denial of Service) parameters
hive-level Set DoS parameters at hive-level
station-level Set DoS parameters at station-level
frame-type Set WLAN DoS (Denial of Service) frame type
probe-req Specify WLAN DoS frame type probe-req
probe-resp Specify WLAN DoS frame type probe-resp
assoc-req Specify WLAN DoS frame type assoc-req
assoc-resp Specify WLAN DoS frame type assoc-resp
disassoc Specify WLAN DoS frame type disassoc
auth Specify WLAN DoS frame type auth
deauth Specify WLAN DoS frame type deauth
eapol Specify WLAN DoS frame type eapol
all Specify WLAN DoS frame type all
alarm Set the interval in seconds between alarms to indicate continuous DoS conditions
<number> Enter the interval in seconds between alarms to indicate continuous DoS conditions (Default: 60 secs; Min: 0 Max: None)
hive <string> security wlan dos {hive-level|station-level} frame-type {probe-req|probe-resp|assoc-req|assoc-resp|disassoc|auth|deauth|eapol|all} threshold <number>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
security Set hive security parameters
wlan Set WLAN parameters
dos Set WLAN DoS (Denial of Service) parameters
hive-level Set DoS parameters at hive-level
station-level Set DoS parameters at station-level
frame-type Set WLAN DoS (Denial of Service) frame type
probe-req Specify WLAN DoS frame type probe-req
probe-resp Specify WLAN DoS frame type probe-resp
assoc-req Specify WLAN DoS frame type assoc-req
assoc-resp Specify WLAN DoS frame type assoc-resp
disassoc Specify WLAN DoS frame type disassoc
auth Specify WLAN DoS frame type auth
deauth Specify WLAN DoS frame type deauth
eapol Specify WLAN DoS frame type eapol
all Specify WLAN DoS frame type all
threshold Set the frame threshold in ppm (packets per minute) that must be crossed to trigger an alarm
<number> Enter threshold in ppm (Default: hive-level probe-req 12000, probe-resp 24000, eapol 6000, auth 6000, assoc-req 6000, assoc-resp 2400, all others 1200; sta-level probe-req 1200 ppm, probe-resp 2400, eapol 600, auth 600, assoc-req 600, assoc-resp 240, all others 120; Min: 0 Max: None)
hive <string> wlan-idp in-net-ap
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
in-net-ap Mitigate rogue APs and their clients only if the rogues are in the same backhaul network as the HiveAPs that detected them (Default: Mitigate all rogue APs and their clients)
hive <string> wlan-idp max-mitigator-num <number>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
max-mitigator-num Set the maximum number of detector APs that can be assigned as mitigator APs to perform mitigation on a rogue and its clients
<number> Enter the maximum number of mitigator APs (Default: 1; Range: 0-1024; 0 means all detector APs can be assigned to perform rogue mitigation))
hive <string> wlan-idp mitigation-mode {automatic|semi-automatic|manual}
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
mitigation-mode Set the mode for mitigating rogue APs and their clients
automatic Set the arbitrator AP to appoint a mitigator AP and start the mitigation process automatically (Default: semi-automatic)
semi-automatic Set the arbitrator AP to appoint a mitigator AP automatically but start the mitigation process manually (Default: semi-automatic)
manual Set the mitigator AP and start the mitigation process manually (Default: semi-automatic)
hive <string> wlan-idp mitigation-mode {automatic|semi-automatic} action {mitigate|report}
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
mitigation-mode Set the mode for mitigating rogue APs and their clients
automatic Set the arbitrator AP to appoint a mitigator AP and start the mitigation process automatically (Default: semi-automatic)
semi-automatic Set the arbitrator AP to appoint a mitigator AP automatically but start the mitigation process manually (Default: semi-automatic)
action Set the action that you want detector APs to take after discovering rogue APs and their clients
mitigate Mitigate rogue APs and their clients (Default: Rogue mitigation)
report Report rogue APs and their clients (Default: Rogue mitigation)
hive <string> wlan-idp mitigator-reeval-period <number>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
mitigator-reeval-period Set the recurring period of time after which the arbitrator AP reevaluates which HiveAPs to make mitigator APs
<number> Enter the period of time in minutes (Default: 5 mins; Range: 1-1440)
hive <string> wlan-idp query-interval <number>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
query-interval Set a period of time in minutes for DA to query ap-classify info from HiveManager
<number> Enter the period of time in minutes (Default: 60 mins; Range: 60-43200; Note: 43200 minutes is 30 days)
hive <string> wlan-idp wait-interval <number>
hive Create a hive or set hive parameters
<string> Enter a hive profile name (1-32 chars)
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
wait-interval Set a time interval for a newly promoted arbitrator AP to wait for AP classification information from HiveManager or the previous arbitrator, or to wait for the previous arbitrator to come back online, before taking over arbitration responsibilities
<number> Enter the time interval in minutes (Default: 1 minute; Range: 1-10)
interface <ethx> allowed-vlan <number> [ - <number> ]
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
allowed-vlan Set a list of VLAN IDs by which traffic allowed to cross the interface can be filtered
<number> Enter the VLAN ID to be allowed (Range: 1-4094)
- Set a range of allowed VLAN IDs
<number> Enter the last VLAN ID in the range (Range: 1-4094)
interface <ethx> allowed-vlan {all|auto}
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
allowed-vlan Set a list of VLAN IDs by which traffic allowed to cross the interface can be filtered
all Allow traffic tagged with any VLAN ID
auto Allow traffic whose VLAN ID matches that of mgt0, the native vlan, or the default VLAN configured in user profiles
interface <ethx> client-monitor-policy <string>
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
client-monitor-policy Assign a Client Monitor policy to automatically detect, analyze and report problems about the clients which access network through the specified Ethernet interface
<string> Enter the Client Monitor policy name (1-32 chars)
interface <ethx> duplex {full|half|auto}
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
duplex Set the duplex for the interface
full Set the duplex of ethernet interface to full (Default: auto)
half Set the duplex of ethernet interface to half (Default: auto)
auto Set the duplex of ethernet interface to auto (Default: auto)
interface <ethx> inter-station-traffic
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
inter-station-traffic Set the HiveAP to permit traffic between stations connected to one or more of its access interfaces (Default: Enabled)
interface <ethx> ip <ip_addr/netmask>
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
ip Set an IP address and netmask for the interface
<ip_addr/netmask> Enter the interface IP address and netmask
interface <ethx> link-discovery {lldp|cdp}
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
link-discovery Enable the communication of network-related information with neighboring network devices through the interface (Default: LLDP enabled; CDP enabled)
lldp Set LLDP (Link Layer Discovery Protocol) parameters on the interface
cdp Set CDP (Cisco Discovery Protocol) parameters on the interface
interface <ethx> mac-learning enable
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
mac-learning Set parameters for MAC address learning
enable Enable MAC address learning on the Ethernet interface
interface <ethx> mac-learning idle-timeout <number>
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
mac-learning Set parameters for MAC address learning
idle-timeout Set the timeout for automatically clearing an inactive dynamically learned MAC address from the MAC learning table
<number> Enter the timeout value in seconds (Default: 180; Range: 10-3600)
interface <ethx> mac-learning static <mac_addr>
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
mac-learning Set parameters for MAC address learning
static Set statically defined MAC address entries
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
interface <ethx> manage {Telnet|SSH|SNMP|ping|all}
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
manage Set management service parameters
Telnet Enable Telnet manageability of mgt0 through this interface (Default: Disabled)
SSH Enable SSH manageability of mgt0 through this interface (Default: Enabled)
SNMP Enable SNMP manageability of mgt0 through this interface (Default: Disabled)
ping Enable mgt0 to respond to pings through this interface (Default: Enabled)
all Enable all manageability options (ping, SNMP, SSH, and Telnet) for mgt0 through this interface
interface <ethx> mode bridge-802.1q user-profile-attribute <number>
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
mode Set the operational mode for the interface (Default: backhaul except wan in case of usbnet)
bridge-802.1q Set the interface in bridge-802.1Q mode, making it a VLAN-aware layer 2 interface to enable the bridging of traffic between 802.1Q VLAN-capable devices in a wired LAN segment and the wireless LAN (Note: The default MAC route is never on an interface in this mode.)
user-profile-attribute Map a RADIUS attribute to the user profile
<number> Enter a numeric value for a single RADIUS attribute (Default:0; Range: 0-4095)
interface <ethx> mode bridge-access [ user-profile-attribute <number> ]
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
mode Set the operational mode for the interface (Default: backhaul except wan in case of usbnet)
bridge-access Set the interface in bridge-access mode, making it a layer 2 interface to enable the bridging of traffic between devices in a single VLAN in a wired LAN segment and the wireless LAN (Note: The default MAC route is never on an interface in this mode.)
user-profile-attribute Map a RADIUS attribute to the user profile
<number> Enter a numeric value for a single RADIUS attribute (Default:0; Range: 0-4095)
interface <ethx> mode wan
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
mode Set the operational mode for the interface (Default: backhaul except wan in case of usbnet)
wan Set the interface in WAN mode, making it a layer 3 interface through which the default IP route for traffic to and from the main LAN passes
interface <ethx> mode wan nat
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
mode Set the operational mode for the interface (Default: backhaul)
wan Set the interface in WAN mode, making it a layer 3 interface through which the default IP route for traffic to and from the main LAN passes
nat Enable NAT (network address translation) on the interface to translate the source IP address and port number in from-access packets to the IP address of the Ethernet interface and a randomly chosen port number (Default: Enabled)
interface <ethx> mode {bridge-802.1q|backhaul}
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
mode Set the operational mode for the interface (Default: backhaul except wan in case of usbnet)
bridge-802.1q Set the interface in bridge-802.1Q mode, making it a VLAN-aware layer 2 interface to enable the bridging of traffic between 802.1Q VLAN-capable devices in a wired LAN segment and the wireless LAN (Note: The default MAC route is never on an interface in this mode.)
backhaul Set the interface in backhaul mode, making it a VLAN-aware layer 2 interface through which the default MAC route for traffic to and from the main LAN passes
interface <ethx> native-vlan <number>
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
native-vlan Set the native (untagged) VLAN used by the switch infrastructure in the surrounding Ethernet network
<number> Enter the native (untagged) VLAN (Range: 1-4094)
interface <ethx> qos-classifier <string>
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
qos-classifier Assign a QoS classification profile (classifier) to the interface
<string> Enter the QoS classifier profile name (1 to 32 chars)
interface <ethx> qos-marker <string>
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
qos-marker Assign a QoS marker profile to the interface
<string> Enter the QoS marker profile name (1 to 32 chars)
interface <ethx> rate-limit broadcast <number>
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
rate-limit Set parameter for interface-based rate limiting
broadcast Set broadcast traffic rate limiting
<number> Enter the maximum rate for incoming broadcast traffic for the interface (Default: 10000 Kbps; Range: 0-20000)
interface <ethx> rate-limit multicast <number>
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
rate-limit Set parameter for interface-based rate limiting
multicast Set multicast traffic rate limiting
<number> Enter the maximum rate for incoming multicast traffic for the interface (Default: 20000 Kbps; Range: 0-20000)
interface <ethx> rate-limit unicast <number>
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
rate-limit Set parameter for interface-based rate limiting
unicast Set unicast traffic rate limiting
<number> Enter the maximum rate for incoming unicast traffic for the interface (Default: 1000000 Kbps; Range: 0-1000000)
interface <ethx> rate-limit {multicast|broadcast|unicast} enable
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
rate-limit Set parameter for interface-based rate limiting
multicast Set multicast traffic rate limiting
broadcast Set broadcast traffic rate limiting
unicast Set unicast traffic rate limiting
enable Enable rate limiting on the interface for this type of traffic (Default: multicast/broadcast Enable,unicast Disable)
interface <ethx> security-object <string>
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
security-object Assign a security object to control network access through this interface
<string> Enter the security object name (1-32 chars)
interface <ethx> shutdown
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
shutdown Disable the interface
interface <ethx> speed {10|100|1000|auto}
interface Set interface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
speed Set the speed for the interface
10 Set the speed of ethernet interface to 10 Mbps (Default: auto)
100 Set the speed of ethernet interface to 100 Mbps (Default: auto)
1000 Set the speed of ethernet interface to 1000 Mbps (Default: auto)
auto Set the speed of ethernet interface to auto Mbps (Default: auto)
interface <mgtx.y> ip <ip_addr/netmask>
interface Set interface parameters
<mgtx.y> Enter the name of the virtual management interface (Ranges: x: 0; y: 1-16)
ip Set IP address for the virtual management interface
<ip_addr/netmask> Enter the virtual management interface IP address and netmask
interface <mgtx.y> manage ping
interface Set interface parameters
<mgtx.y> Enter the name of the virtual management interface (Ranges: x: 0; y: 1-16)
manage Set management service parameters
ping Enable the virtual management interface to respond to pings (Default: Enabled)
interface <mgtx.y> vlan <number>
interface Set interface parameters
<mgtx.y> Enter the name of the virtual management interface (Ranges: x: 0; y: 1-16)
vlan Set the VLAN ID for the interface
<number> Enter the VLAN ID (Default: 1; Range: 1-4094)
interface <mgtx> default-ip-prefix <ip_addr/netmask>
interface Set interface parameters
<mgtx> Enter the name of the management interface, where x = 0
default-ip-prefix Set the network address to combine with the automatically generated host IP address to make a complete IP address (The netmask for the default IP address is 255.255.0.0)
<ip_addr/netmask> Enter the network address/netmask (Default: 192.168.0.0/16; Note: Only 8, 16, and 24-bit netmasks are supported.)
interface <mgtx> default-ip-prefix <ip_addr>
interface Set interface parameters
<mgtx> Enter the name of the management interface, where x = 0
default-ip-prefix Set the network address to combine with the automatically generated host IP address to make a complete IP address (The netmask for the default IP address is 255.255.0.0)
<ip_addr> Enter the network address (Default: 192.168.0.0)
interface <mgtx> hive <string>
interface Set interface parameters
<mgtx> Enter the name of the management interface, where x = 0
hive Set the hive profile to the mgt0 interface or enable/disable the wifi interface used for hive communications
<string> Enter a hive profile name (1-32 chars)
interface <mgtx> ip <ip_addr/netmask>
interface Set interface parameters
<mgtx> Enter the name of the management interface, where x = 0
ip Set mgt0 IP address
<ip_addr/netmask> Enter mgt0 IP address/netmask
interface <mgtx> ip <ip_addr> <netmask>
interface Set interface parameters
<mgtx> Enter the name of the management interface, where x = 0
ip Set mgt0 IP address
<ip_addr> Enter mgt0 IP address
<netmask> Enter mgt0 netmask
interface <mgtx> mtu <number>
interface Set interface parameters
<mgtx> Enter the name of the management interface, where x = 0
mtu Set the MTU (maximum transmission unit) to determine when to start fragmenting packets
<number> Enter the MTU value in bytes (Default: 1500; Range: 100-1500)
interface <mgtx> native-vlan <number>
interface Set interface parameters
<mgtx> Enter the name of the management interface, where x = 0
native-vlan Set the native (untagged) VLAN that the switch infrastructure in the surrounding wired and wireless backhaul network uses
<number> Enter the native (untagged) VLAN (Default: 1; Range: 1-4094)
interface <mgtx> vlan <number>
interface Set interface parameters
<mgtx> Enter the name of the management interface, where x = 0
vlan Set the VLAN for administrative access to the HiveAP, management traffic between HiveAPs and HiveManager, and control traffic among hive members
<number> Enter the VLAN ID for the interface (Default: 1; Range: 1-4094)
interface <wifix> hive <string> shutdown
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
hive Set the hive profile to the mgt0 interface or enable/disable the wifi interface used for hive communications
<string> Enter a hive profile name (1-32 chars)
shutdown Disable the wifi subinterface used for hive communications
interface <wifix> link-discovery {lldp|cdp}
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
link-discovery Enable the communication of network-related information with neighboring network devices through the interface (Default: LLDP enabled; CDP enabled)
lldp Set LLDP (Link Layer Discovery Protocol) on the interface in backhaul mode
cdp Set CDP (Cisco Discovery Protocol) on the interface in backhaul mode
interface <wifix> mode {access|backhaul|dual|sensor}
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
mode Set the operational mode for the interface
access Set the operational mode of the interface to access (Default: access (wifi0), dual (wifi1))
backhaul Set the operational mode of the interface to backhaul (Default: access (wifi0), dual (wifi1))
dual Set the operational mode of the interface to dual so that it can provide both access and backhaul services (Default: access (wifi0), dual (wifi1))
sensor Set the operational mode of the interface to sensor (Default: access (wifi0), dual (wifi1))
interface <wifix> radio antenna diversity
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
radio Set parameters for the wifi radio interface
antenna Set the antenna parameters for the interface
diversity Set radio antenna diversity
interface <wifix> radio antenna type {omni|directional}
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
radio Set parameters for the wifi radio interface
antenna Set the antenna parameters for the interface
type Set the type of antennas that the AP will use (Default: Omni)
omni Set the antenna type to be omnidirectional for point-to-multipoint wireless links
directional Set the antenna type to be directional for point-to-point wireless links (supported on the 5 GHz band only)
interface <wifix> radio channel <string>
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
radio Set parameters for the wifi radio interface
channel Set the radio channel for the interface
<string> Enter the frequency with an optional suffix (G: GHz; M: MHz; K: KHz;), or the channel number, or "auto" to allow ACSP (Advanced Channel Selection Protocol) to select a channel automatically (Default: auto)
interface <wifix> radio channel exclude <string>
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
radio Set parameters for the wifi radio interface
channel Set the radio channel for the interface
exclude Exclude a channel from the list of available ACSP channels
<string> Enter the frequency with an optional suffix (G: GHz; M: MHz; K: KHz;), or the channel number
interface <wifix> radio power <number>
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
radio Set parameters for the wifi radio interface
power Set the radio power for an interface
<number> Enter the radio power (in dBm) for an interface (Default: auto; Range: 1-30 dBm)
interface <wifix> radio power auto
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
radio Set parameters for the wifi radio interface
power Set the radio power for an interface
auto Set the radio power to be adjusted automatically
interface <wifix> radio profile <string>
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
radio Set parameters for the wifi radio interface
profile Set radio profile parameters for an interface
<string> Enter a radio profile name (1-32 chars)
interface <wifix> radio range <number>
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
radio Set parameters for the wifi radio interface
range Set the transmission range for the radio linked to the interface
<number> Enter the range value in meters (Default: 300; Range: 300-10000)
interface <wifix> radio tx-power-control <number>
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
radio Set parameters for the wifi radio interface
tx-power-control Set the desired radio power for clients
<number> Enter the desired client radio power (in dBm) (Default: auto; Range: 1-20 dBm)
interface <wifix> radio tx-power-control auto
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
radio Set parameters for the wifi radio interface
tx-power-control Set the desired radio power for clients
auto Set the client radio power to be adjusted automatically based on ACSP (Default: auto)
interface <wifix> ssid <string>
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
ssid Set the SSID (Service Set Identifier) profile for the interface
<string> Enter an SSID profile name (1-32 chars)
interface <wifix> ssid <string> ip <ip_addr/netmask>
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
ssid Set the SSID (Service Set Identifier) profile for the interface
<string> Enter an SSID profile name (1-32 chars)
ip Set IP address for the SSID
<ip_addr/netmask> Enter the SSID IP address
interface <wifix> ssid <string> shutdown
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
ssid Set the SSID (Service Set Identifier) profile for the interface
<string> Enter an SSID profile name (1-32 chars)
shutdown Disable the subinterface to which the SSID is bound
interface <wifix> wlan-idp profile <string>
interface Set interface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Bind an IDP profile to the interface
<string> Enter an IDP profile name (1-32 chars)
ip path-mtu-discovery enable
ip Set IP parameters
path-mtu-discovery Set Path MTU (Maximum Transmission Unit) Discovery parameters on a device functioning as a router or VPN gateway
enable Enable Path MTU Discovery to learn the maximum packet size that can be sent across the network between two hosts without fragmentation (Default: Enabled)
ip route default gateway <ip_addr> [ metric <number> ]
ip Set IP parameters
route Set a routing entry
default Set a default route entry
gateway Set the network gateway
<ip_addr> Enter the gateway IP address
metric Set metric parameter
<number> Enter a metric for an IP route (Default: 0; Range: 0-32766)
ip route host <ip_addr> [ gateway <ip_addr> ] [ metric <number> ]
ip Set IP parameters
route Set a routing entry
host Set a route to a host
<ip_addr> Enter target IP address
gateway Set the network gateway
<ip_addr> Enter the gateway IP address
metric Set metric parameter
<number> Enter a metric for an IP route (Default: 0; Range: 0-32766)
ip route net <ip_addr> <netmask> [ gateway <ip_addr> ] [ metric <number> ]
ip Set IP parameters
route Set a routing entry
net Set a route to a net
<ip_addr> Enter target IP address
<netmask> Enter target netmask
gateway Set the network gateway
<ip_addr> Enter the gateway IP address
metric Set metric parameter
<number> Enter a metric for an IP route (Default: 0; Range: 0-32766)
ip-policy <string> [ id <number> ] [ {before|after} id <number> ] [ from <ip_addr|string_64> [ <mask> ] ] [ to <ip_addr|string_64> [ <mask> ] ] [ service <string> ] [ action {permit|deny|nat|inter-station-traffic-drop|redirect} ]
ip-policy Set IP policy parameters
<string> Enter an IP policy name (1-32 chars)
id Assign an IP policy ID
<number> Enter the IP policy ID (Range: 1-1023)
before Set the before parameters for an IP policy
after Set the after parameters for an IP policy
id Assign an IP policy ID
<number> Enter the IP policy ID (Range: 1-1023)
from Set the source IP (Default: any)
<ip_addr> Enter an IP or domain name (1-64 chars)
<string> Enter an IP or domain name (1-64 chars)
<mask> Enter a netmask or IP wildcard mask in which 0 masks the octet where it appears (For example, the 0s in '255.0.0.255' mask the second and third octets, applying the IP policy to all addresses matching only the first and fourth octets.)
to Set the destination IP (Default: any)
<ip_addr> Enter an IP or domain name (1-64 chars)
<string> Enter an IP or domain name (1-64 chars)
<mask> Enter a netmask or IP wildcard mask in which 0 masks the octet where it appears (For example, the 0s in '255.0.0.255' mask the second and third octets, applying the IP policy to all addresses matching only the first and fourth octets.)
service Set the service (Default: any)
<string> Enter the service (1-32 chars)
action Set action for an IP policy (Default: deny)
permit Set the action to permit (Default: deny)
deny Set the action to deny (Default: deny)
nat Set the action to translate clients' source IP address to that of mgt0 and source port number to a dynamically chosen number (Default: deny; Note: NAT is applied only to TCP and UDP traffic.)
inter-station-traffic-drop Set the action to drop traffic between stations if they are both associated with one or more members of the same hive (Default: deny)
redirect redirect http traffic to specified url(Default: deny)
ip-policy <string> [ id <number> ] [ {before|after} id <number> ] [ from <ip_addr|string_64> [ <mask> ] ] [ to <ip_addr|string_64> [ <mask> ] ] [ service <string> ] action deny log packet-drop
ip-policy Set IP policy parameters
<string> Enter an IP policy name (1-32 chars)
id Assign an IP policy ID
<number> Enter the IP policy ID (Range: 1-1023)
before Set the before parameters for an IP policy
after Set the after parameters for an IP policy
id Assign an IP policy ID
<number> Enter the IP policy ID (Range: 1-1023)
from Set the source IP (Default: any)
<ip_addr> Enter an IP or domain name (1-64 chars)
<string> Enter an IP or domain name (1-64 chars)
<mask> Enter a netmask or IP wildcard mask in which 0 masks the octet where it appears (For example, the 0s in '255.0.0.255' mask the second and third octets, applying the IP policy to all addresses matching only the first and fourth octets.)
to Set the destination IP (Default: any)
<ip_addr> Enter an IP or domain name (1-64 chars)
<string> Enter an IP or domain name (1-64 chars)
<mask> Enter a netmask or IP wildcard mask in which 0 masks the octet where it appears (For example, the 0s in '255.0.0.255' mask the second and third octets, applying the IP policy to all addresses matching only the first and fourth octets.)
service Set the service (Default: any)
<string> Enter the service (1-32 chars)
action Set action for an IP policy (Default: deny)
deny Set the action to deny (Default: deny)
log Set logging options for packets and sessions that match the IP firewall policy
packet-drop Log dropped packets that the IP firewall policy denies
ip-policy <string> [ id <number> ] [ {before|after} id <number> ] [ from <ip_addr|string_64> [ <mask> ] ] [ to <ip_addr|string_64> [ <mask> ] ] [ service <string> ] action inter-station-traffic-drop log [ {initiate-session|terminate-session|packet-drop} ]
ip-policy Set IP policy parameters
<string> Enter an IP policy name (1-32 chars)
id Assign an IP policy ID
<number> Enter the IP policy ID (Range: 1-1023)
before Set the before parameters for an IP policy
after Set the after parameters for an IP policy
id Assign an IP policy ID
<number> Enter the IP policy ID (Range: 1-1023)
from Set the source IP (Default: any)
<ip_addr> Enter an IP or domain name (1-64 chars)
<string> Enter an IP or domain name (1-64 chars)
<mask> Enter a netmask or IP wildcard mask in which 0 masks the octet where it appears (For example, the 0s in '255.0.0.255' mask the second and third octets, applying the IP policy to all addresses matching only the first and fourth octets.)
to Set the destination IP (Default: any)
<ip_addr> Enter an IP or domain name (1-64 chars)
<string> Enter an IP or domain name (1-64 chars)
<mask> Enter a netmask or IP wildcard mask in which 0 masks the octet where it appears (For example, the 0s in '255.0.0.255' mask the second and third octets, applying the IP policy to all addresses matching only the first and fourth octets.)
service Set the service (Default: any)
<string> Enter the service (1-32 chars)
action Set action for an IP policy (Default: deny)
inter-station-traffic-drop Set the action to drop traffic between stations if they are both associated with one or more members of the same hive (Default: deny)
log Set logging options for packets and sessions that match IP FW policy
initiate-session Log the creation of sessions that are permitted by the policy
terminate-session Log the termination of sessions that are permitted by the policy
packet-drop Log dropped packets that are denied by the policy
ip-policy <string> [ id <number> ] [ {before|after} id <number> ] [ from <ip_addr|string_64> [ <mask> ] ] [ to <ip_addr|string_64> [ <mask> ] ] [ service <string> ] action permit log [ {initiate-session|terminate-session} ]
ip-policy Set IP policy parameters
<string> Enter an IP policy name (1-32 chars)
id Assign an IP policy ID
<number> Enter the IP policy ID (Range: 1-1023)
before Set the before parameters for an IP policy
after Set the after parameters for an IP policy
id Assign an IP policy ID
<number> Enter the IP policy ID (Range: 1-1023)
from Set the source IP (Default: any)
<ip_addr> Enter an IP or domain name (1-64 chars)
<string> Enter an IP or domain name (1-64 chars)
<mask> Enter a netmask or IP wildcard mask in which 0 masks the octet where it appears (For example, the 0s in '255.0.0.255' mask the second and third octets, applying the IP policy to all addresses matching only the first and fourth octets.)
to Set the destination IP (Default: any)
<ip_addr> Enter an IP or domain name (1-64 chars)
<string> Enter an IP or domain name (1-64 chars)
<mask> Enter a netmask or IP wildcard mask in which 0 masks the octet where it appears (For example, the 0s in '255.0.0.255' mask the second and third octets, applying the IP policy to all addresses matching only the first and fourth octets.)
service Set the service (Default: any)
<string> Enter the service (1-32 chars)
action Set action for an IP policy (Default: deny)
permit Set the action to permit (Default: deny)
log Set logging options for packets and sessions that match the IP firewall policy
initiate-session Log session details when a session is created after passing a IP firewall policy lookup
terminate-session Log session details when a session matching a IP firewall policy is terminated
ip-policy <string> [ id <number> ] [ {before|after} id <number> ] [ from <ip_addr|string_64> [ <mask> ] ] to local-subnet [ service <string> ] [ action {permit|deny|nat|inter-station-traffic-drop|redirect} ]
ip-policy Set IP policy parameters
<string> Enter an IP policy name (1-32 chars)
id Assign an IP policy ID
<number> Enter the IP policy ID (Range: 1-1023)
before Set the before parameters for an IP policy
after Set the after parameters for an IP policy
id Assign an IP policy ID
<number> Enter the IP policy ID (Range: 1-1023)
from Set the source IP (Default: any)
<ip_addr> Enter an IP or domain name (1-64 chars)
<string> Enter an IP or domain name (1-64 chars)
<mask> Enter a netmask or IP wildcard mask in which 0 masks the octet where it appears (For example, the 0s in '255.0.0.255' mask the second and third octets, applying the IP policy to all addresses matching only the first and fourth octets.)
to Set the destination IP (Default: any)
local-subnet Set the subnet of the mgt0 interface as the destination
service Set the service (Default: any)
<string> Enter the service (1-32 chars)
action Set action for an IP policy (Default: deny)
permit Set the action to permit (Default: deny)
deny Set the action to deny (Default: deny)
nat Set the action to translate clients' source IP address to that of mgt0 and source port number to a dynamically chosen number (Default: deny; Note: NAT is applied only to TCP and UDP traffic.)
inter-station-traffic-drop Set the action to drop traffic between stations if they are both associated with one or more members of the same hive (Default: deny)
redirect redirect http traffic to specified url(Default: deny)
ipv6 dhcpv6-shield enable
ipv6 Set IPv6 parameters
dhcpv6-shield Set the DHCPv6 shield to block the forwarding of DHCPv6 server messages received on any access interface
enable Enable the DHCPv6 shield on access interfaces
ipv6 ra-guard stateless enable
ipv6 Set IPv6 parameters
ra-guard Set the IPv6 RA guard (router advertisement guard) to block router advertisements on access interfaces
stateless Set the IPv6 RA guard as stateless, meaning that incoming router advertisements are examined and then either blocked or forwarded based only on the information of the received frame; specifically, the port on which the frame was received
enable Enable the IPv6 RA guard on access interfaces
kddr enable
kddr Enable/disable the kddr report to HM
enable Enable the kddr feature
license <string> <string>
license Set license parameters
<string> Enter registration license
<string> Enter registration key
lldp [ {cdp|receive-only} ]
lldp Set LLDP (Link Layer Discovery Protocol) parameters
cdp Set CDP (Cisco Discovery Protocol) parameters
receive-only Enable the HiveAP to receive and cache LLDP advertisements from neighboring network devices but not send them
lldp [ {cdp} ] max-entries <number>
lldp Set LLDP (Link Layer Discovery Protocol) parameters
cdp Set CDP (Cisco Discovery Protocol) parameters
max-entries Set the maximum number of entries to cache in the LLDP or CDP neighbor table
<number> Enter the maximum number of entries to cache (Default: 64; Range: 1-128)
lldp holdtime <number>
lldp Set LLDP (Link Layer Discovery Protocol) parameters
holdtime Set the length of time that the neighboring network devices to retain the LLDP advertisements that it sends to them
<number> Enter the length of time in seconds that the neighboring network devices to hold LLDP advertisements (Default: 90; Range: 0-65535)
lldp max-power <number>
lldp Set LLDP (Link Layer Discovery Protocol) parameters
max-power Set the maximum power that can be requested when transmitting LLDP advertisements
<number> Enter the maximum power in watts to be requested (Default: 154; Range: 1-250; Note: 154 = 15.4 watts)
lldp timer <number>
lldp Set LLDP (Link Layer Discovery Protocol) parameters
timer Set the interval between LLDP advertisements to neighboring network device
<number> Enter the interval in seconds between LLDP advertisements (Default: 30; Range: 5-65534)
logging buffered level {emergency|alert|critical|error|warning|notification|info|debug}
logging Set logging parameters
buffered Set logging buffer
level Set logging level
emergency Send emergency-level log entries (Default: debug)
alert Send log entries from alert to emergency levels (Default: debug)
critical Send log entries from critical to emergency levels (Default: debug)
error Send log entries from error to emergency levels (Default: debug)
warning Send log entries from warning to emergency levels (Default: debug)
notification Send log entries from notification to emergency levels (Default: debug)
info Send log entries from info to emergency levels (Default: debug)
debug Send log entries for all severity levels (Default: debug)
logging debug
logging Set logging parameters
debug Enable debug messages
logging facility {local0|local1|local2|local3|local4|local5|local6|local7|auth|authpriv|security|user}
logging Set logging parameters
facility Set logging facility
local0 Set log facility to local0 (Default: local6)
local1 Set log facility to local1 (Default: local6)
local2 Set log facility to local2 (Default: local6)
local3 Set log facility to local3 (Default: local6)
local4 Set log facility to local4 (Default: local6)
local5 Set log facility to local5 (Default: local6)
local6 Set log facility to local6 (Default: local6)
local7 Set log facility to local7 (Default: local6)
auth Set log facility to auth (Default: local6)
authpriv Set log facility to authpriv (Default: local6)
security Set log facility to security (Default: local6)
user Set log facility to user (Default: local6)
logging flash level {emergency|alert|critical|error|warning|notification|info|debug}
logging Set logging parameters
flash Set logging flash
level Set logging level
emergency Send emergency-level log entries (Default: error)
alert Send log entries from alert to emergency levels (Default: error)
critical Send log entries from critical to emergency levels (Default: error)
error Send log entries from error to emergency levels (Default: error)
warning Send log entries from warning to emergency levels (Default: error)
notification Send log entries from notification to emergency levels (Default: error)
info Send log entries from info to emergency levels (Default: error)
debug Send log entries for all severity levels (Default: error)
logging server <string> [ level {emergency|alert|critical|error|warning|notification|info|debug} ] [ {via-vpn-tunnel} ]
logging Set logging parameters
server Set parameters for a syslog server
<string> Set the IP address or domain name (1-32 chars) for the syslog server
level Set the severity level for the log messages you want to send
emergency Send emergency-level log entries
alert Send log entries from alert to emergency levels
critical Send log entries from critical to emergency levels
error Send log entries from error to emergency levels
warning Send log entries from warning to emergency levels
notification Send log entries from notification to emergency levels
info Send log entries from info to emergency levels
debug Send log entries for all severity levels
via-vpn-tunnel Send all logging traffic through a VPN tunnel (Note: Set this option on VPN clients when the logging server is in a different subnet from the tunnel interface. When they are in the same subnet, tunneling is automatic.)
logging trap all [ {emerg|alert|crit|err|warning|notice|info} ]
logging Set logging parameters
trap Set logging trap parameters
all Set logging trap level for all trap categorys
emerg Set logging SNMP trap level to emerg (Default: info)
alert Set logging SNMP trap level to alert (Default: info)
crit Set logging SNMP trap level to crit (Default: info)
err Set logging SNMP trap level to err (Default: info)
warning Set logging SNMP trap level to warning (Default: info)
notice Set logging SNMP trap level to notice (Default: info)
info Set logging SNMP trap level to info (Default: info)
logging trap level [ {emerg|alert|crit|err|warning|notice|info} ]
logging Set logging parameters
trap Set logging trap parameters
level Set logging trap level
emerg Set logging trap level to emerg (Default: info)
alert Set logging trap level to alert (Default: info)
crit Set logging trap level to crit (Default: info)
err Set logging trap level to err (Default: info)
warning Set logging trap level to warning (Default: info)
notice Set logging trap level to notice (Default: info)
info Set logging trap level to info (Default: info)
logging trap white-list category {failure|threshold|statechange|connectionchange|idp|powerinfo|channelpower|mitigate|clientinfo|interferencealert|bwsentinel|alarmalert} [ {emerg|alert|crit|err|warning|notice|info} ]
logging Set logging parameters
trap Set logging trap parameters
white-list Set logging trap white list
category Set logging trap white list for trap category
failure Enable the trap category failure send to SNMP server
threshold Enable the trap category threshold send to SNMP server
statechange Enable the trap category statechange send to SNMP server
connectionchange Enable the trap category connectionchange send to SNMP server
idp Enable the trap category idp send to SNMP server
powerinfo Enable the trap category powerinfo send to SNMP server
channelpower Enable the trap category channelpower send to SNMP server
mitigate Enable the trap category mitigate send to SNMP server
clientinfo Enable the trap category clientinfo send to SNMP server
interferencealert Enable the trap category interferencealert send to SNMP server
bwsentinel Enable the trap category bwsentinel send to SNMP server
alarmalert Enable the trap category alarmalert send to SNMP server
emerg Set category trap level to emerg (Default: info)
alert Set category trap level to alert (Default: info)
crit Set category trap level to crit (Default: info)
err Set category trap level to err (Default: info)
warning Set category trap level to warning (Default: info)
notice Set category trap level to notice (Default: info)
info Set category trap level to info (Default: info)
mac-object <string> mac-range <mac_addr> - <mac_addr>
mac-object Set parameters for an MAC object that the HiveAP can use to assign a client with a matching MAC address to a user profile (Max: 128 MAC objects per HiveAP.)
<string> Enter the MAC object name (1-32 chars)
mac-range Set a range of MAC addresses for the MAC object (Max: 255 MAC address ranges per MAC object)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
- Set a range of MAC addresses
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
mac-policy <string> [ id <number> ] [ {before|after} id <number> ] [ from <mac_addr> [ <number> ] ] [ to <mac_addr> [ <number> ] ] [ action {permit|deny} ]
mac-policy Set MAC policy parameters
<string> Enter a MAC policy name (1-32 chars)
id Assign a MAC policy ID
<number> Enter the MAC policy ID (Range: 1-1023)
before Set the before parameters for a MAC policy
after Set the after parameters for a MAC policy
id Assign a MAC policy ID
<number> Enter the MAC policy ID (Range: 1-1023)
from Set the source MAC (Default: any)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
<number> Enter a MAC mask length (value: 0, 24, 48)
to Set the destination MAC (Default: any)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
<number> Enter a MAC mask length (value: 0, 24, 48)
action Set action for a MAC policy (Default: deny)
permit Set the action to permit (Default: deny)
deny Set the action to deny (Default: deny)
mac-policy <string> [ id <number> ] [ {before|after} id <number> ] [ from <mac_addr> [ <number> ] ] [ to <mac_addr> [ <number> ] ] action deny log packet-drop
mac-policy Set MAC policy parameters
<string> Enter a MAC policy name (1-32 chars)
id Assign a MAC policy ID
<number> Enter the MAC policy ID (Range: 1-1023)
before Set the before parameters for a MAC policy
after Set the after parameters for a MAC policy
id Assign a MAC policy ID
<number> Enter the MAC policy ID (Range: 1-1023)
from Set the source MAC (Default: any)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
<number> Enter a MAC mask length (value: 0, 24, 48)
to Set the destination MAC (Default: any)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
<number> Enter a MAC mask length (value: 0, 24, 48)
action Set action for a MAC policy (Default: deny)
deny Set the action to deny (Default: deny)
log Set logging options for packets and sessions that match the MAC firewall policy
packet-drop Log dropped packets that the MAC firewall policy denies
mac-policy <string> [ id <number> ] [ {before|after} id <number> ] [ from <mac_addr> [ <number> ] ] [ to <mac_addr> [ <number> ] ] action permit log [ {initiate-session|terminate-session} ]
mac-policy Set MAC policy parameters
<string> Enter a MAC policy name (1-32 chars)
id Assign a MAC policy ID
<number> Enter the MAC policy ID (Range: 1-1023)
before Set the before parameters for a MAC policy
after Set the after parameters for a MAC policy
id Assign a MAC policy ID
<number> Enter the MAC policy ID (Range: 1-1023)
from Set the source MAC (Default: any)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
<number> Enter a MAC mask length (value: 0, 24, 48)
to Set the destination MAC (Default: any)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
<number> Enter a MAC mask length (value: 0, 24, 48)
action Set action for a MAC policy (Default: deny)
permit Set the action to permit (Default: deny)
log Set logging options for packets and sessions that match the MAC firewall policy
initiate-session Log session details when a session is created after passing a MAC firewall policy lookup
terminate-session Log session details when a session matching a MAC firewall policy is terminated
mdm-object <string> [ enroll-status {enrolled|non-enrolled|unknown} ] [ compliance-status {compliant|non-compliant|unknown} ] [ client-tag <string> ]
mdm-object Set the MDM (mobile device management) object
<string> Enter an MDM object name (1-32 chars)
enroll-status Set the enrollment status of the managed mobile device
enrolled Set the MDM enrollment status of the device as enrolled
non-enrolled Set the MDM enrollment status of the device as non-enrolled
unknown Set the MDM enrollment status of the device as unknown
compliance-status Set a compliance status
compliant Set the compliance status as compliant
non-compliant Set the compliance status as non-compliant
unknown Set the compliance status as unknown
client-tag Set an MDM client tag name to indicate the ownership of the managed mobile device (Note: BYOD and CID are common ownership tags that describe bring-your-own-device and corporate-issues-device situations.)
<string> Enter a tag name (1-32 chars)
mobile-device-policy <string> [ rule <number> ] [ original-user-profile <string> ] device-group <string> reassigned-user-profile-attr <number>
mobile-device-policy Set a policy that assigns a user profile to traffic from a client based on the originally assigned user profile or the MAC address, device domain, and OS of the user's client
<string> Enter the mobile device policy name (1-32 chars)
rule Add a rule to the mobile device policy
<number> Enter a number for the rule ID (Range: 1-65535; Note: If you do not specify a rule ID, the HiveAP automatically assigns one.)
original-user-profile Specify the user profile that the HiveAP first assigns to traffic before it completes the device classification process
<string> Enter the original user profile (1-32 chars)
device-group Set the device group that the policy rule references to classify the type of client device in use
<string> Enter a device group name (1-32 chars)
reassigned-user-profile-attr Reassign the client to a different user profile if it belongs to the specified device group or was initially assigned to the specified original user profile
<number> Enter the attribute of the user profile to assign in place of the originally assigned one (Range: 0-4095)
mobile-device-policy <string> apply {once|multiple-times}
mobile-device-policy Set a policy that assigns a user profile to traffic from a client based on the originally assigned user profile or the MAC address, device domain, and OS of the user's client
<string> Enter the mobile device policy name (1-32 chars)
apply Set the method for applying mobile device policy rules
once Apply a policy rule once if a client match is found after finishing the complete device type classification process(Default: Once)
multiple-times Apply a policy rule if a client match is found at any point during the device type detection process (Default: Once)(Note: Different rules might be applied at different times as the HiveAP collects more information about a client.)
mobile-device-policy <string> client-classification [ {mac} ] [ {domain} ] [ {os} ]
mobile-device-policy Set a policy that assigns a user profile to traffic from a client based on the originally assigned user profile or the MAC address, device domain, and OS of the user's client
<string> Enter the mobile device policy name (1-32 chars)
client-classification Set the client device classification methods that you want to use
mac Use the client classification method that is based on the MAC address of the device
domain Use the client classification method that is based on the computer domain to which a client belongs in the database
os Use the client classification method that is based on the OS running on the device
mobile-device-policy <string> rule <number> {before|after} rule <number>
mobile-device-policy Set a policy that assigns a user profile to traffic from a client based on the originally assigned user profile or the MAC address, device domain, and OS of the user's client
<string> Enter the mobile device policy name (1-32 chars)
rule Add a rule to the mobile device policy
<number> Enter a number for the rule ID (Range: 1-65535; Note: If you do not specify a rule ID, the HiveAP automatically assigns one.)
before Move the mobile device policy rule before another rule in the policy
after Move the mobile device policy rule after another rule in the policy
rule Set a rule before or after another rule in the mobile device policy
<number> Enter a rule ID number (Range: 1-65535)
ntp enable
ntp Set NTP (Network Time Protocol) parameters
enable Enable the local AP to act as an NTP client
ntp interval <number>
ntp Set NTP (Network Time Protocol) parameters
interval Set the interval for synchronizing the internal clock with an NTP server
<number> Enter the interval in minutes (Default: 1440; Range: 60-10080)
ntp server <string> [ {second|third|fourth} ] [ {via-vpn-tunnel} ]
ntp Set NTP (Network Time Protocol) parameters
server Set NTP server parameters
<string> Enter the IP address or domain name of an NTP server (1-32 chars)
second Set the priority of the NTP server as second
third Set its priority as third
fourth Set its priority as fourth
via-vpn-tunnel Send all NTP traffic through a VPN tunnel (Note: Set this option on VPN clients when the NTP server is in a different subnet from the tunnel interface. When they are in the same subnet, tunneling is automatic.)
os-detection enable
os-detection Set the OS (Operating System) detection parameters
enable Enable OS detection to learn client station operating systems (Default: Enabled)
os-detection method dhcp-option55
os-detection Set the OS (Operating System) detection parameters
method Set the OS detection method (Note: HiveAPs can detect the OS of client stations using option 55 in the DHCP packets or by parsing the HTTP headers to find the User-Agent field.)
dhcp-option55 Detect client station operating systems by parsing option 55 in DHCP messages from clients (Default: Enabled)
os-detection method user-agent
os-detection Set the OS (Operating System) detection parameters
method Set the OS detection method (Note: HiveAPs can detect the OS of client stations using option 55 in the DHCP packets or by parsing the HTTP headers to find the User-Agent field.)
user-agent Detect client station operating systems by parsing the User-Agent field in HTTP packets (Default: Disabled)
os-object <string> os-version <string>
os-object Set parameters for an OS object that the HiveAP can use to assign a client running a matching OS to a user profile (Max: 64 OS objects per HiveAP.)
<string> Enter an OS object name (1-32 chars; Note: The object name is an admin-defined name and does not have to be the name of an operating system.)
os-version Set the name and version of an operating system version (Max: 32 OS versions per OS object)
<string> Enter the exact text string that identifies an operating system as it appears in the user agent ID field in HTTP headers (1-32 chars; Note: Use quotation marks if spaces are required. Examples: "Windows NT 5.1", "Mac OS X", "Linux i686")
os-version <string> option55 <string>
os-version Set the OS (operating system) version you want to detect in the DHCP packets
<string> Enter the OS version name (1-32 chars; Note: The OS version name can be in any form you choose; for example, "Windows XP" or "WinXP".)
option55 Set the option 55 string for the type of operating system you want to detect
<string> Enter the DHCP option 55 string (1-256 chars)
performance-sentinel notification-interval <number>
performance-sentinel Set performance sentinel parameters to moderate client throughput
notification-interval Set the interval for sending SNMP traps to HiveManager to update the performance sentinel log
<number> Enter the performance sentinel log update interval in seconds (Default: 600; Range: 30-1800)
probe <ip_addr|mac_addr> [ size <number> ] [ src-mac <mac_addr> ] [ wait-time <number> ] [ ttl <number> ] [ count <number> ]
probe Set the probe parameters
<ip_addr> Enter the target IP or MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
size Set the probe request packet size (default: 512 bytes)
<number> Enter a packet size (range: 256-1400 bytes)
src-mac Set the Source MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
wait-time Set the timeout value (default: 1 second)
<number> Enter an timeout value (range: 1-30 seconds)
ttl Set the TTL value (default 32)
<number> Enter an TTL value (range: 1-255)
count Set probe request count (default: 5)
<number> Enter the probe request count (range: 1-64)
probe portal [ size <number> ] [ src-mac <mac_addr> ] [ wait-time <number> ] [ ttl <number> ] [ count <number> ]
probe Set the probe parameters
portal Set the target of the probe as the MAC address of the HiveAP acting as portal
size Set the probe request packet size (default: 512 bytes)
<number> Enter a packet size (range: 256-1400 bytes)
src-mac Set the Source MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
wait-time Set the timeout value (default: 1 second)
<number> Enter an timeout value (range: 1-30 seconds)
ttl Set the TTL value (default 32)
<number> Enter an TTL value (range: 1-255)
count Set probe request count (default: 5)
<number> Enter the probe request count (range: 1-64)
qos airtime enable
qos Set QoS (Quality of Service) parameters
airtime Set QoS parameters based on the amount of airtime that wireless client traffic uses
enable Enable dynamic airtime scheduling
qos airtime rate-preference-weight {none|moderate|high}
qos Set QoS (Quality of Service) parameters
airtime Set QoS parameters based on the amount of airtime that wireless client traffic uses
rate-preference-weight Set a preference for forwarding traffic to and from wireless clients that are capable of fast data transfer rates
none Set no preference for clients with a fast data rate (Default: high)
moderate Set a moderate preference for clients with a fast data rate (Default: high)
high Set a high preference for clients with a fast data rate (Default: high)
qos classifier-map 80211e <number> <number>
qos Set QoS (Quality of Service) parameters
classifier-map Map QoS priority markers on incoming packets to Aerohive QoS classes
80211e Map IEEE 802.11e user priority markers on incoming packets to Aerohive QoS classes
<number> Enter IEEE 802.11e user priority (Range: 0-7)
<number> Enter Aerohive QoS class (Range: 0-7)
qos classifier-map 8021p <number> <number>
qos Set QoS (Quality of Service) parameters
classifier-map Map QoS priority markers on incoming packets to Aerohive QoS classes
8021p Map IEEE 802.1p priority markers on incoming packets to Aerohive QoS classes
<number> Enter IEEE 802.1p Priority (Range: 0-7)
<number> Enter Aerohive QoS class (Range: 0-7)
qos classifier-map diffserv <number> <number>
qos Set QoS (Quality of Service) parameters
classifier-map Map QoS priority markers on incoming packets to Aerohive QoS classes
diffserv Map diffserv DSCP (Differentiated Services Code Point) values on incoming packets to Aerohive QoS classes
<number> Enter the DSCP class (Range: 0-63)
<number> Enter the Aerohive QoS class (Range: 0-7)
qos classifier-map interface <ethx> <number>
qos Set QoS (Quality of Service) parameters
classifier-map Map QoS priority markers on incoming packets to Aerohive QoS classes
interface Map incoming Ethernet traffic to Aerohive QoS classes by its ingress interface
<ethx> Enter the name of an Ethernet interface, where x = 0
<number> Enter the Aerohive QoS class (Range: 0-7)
qos classifier-map oui <oui> [ qos <number> ] [ action {permit|deny|log} ] [ comment <string> ]
qos Set QoS (Quality of Service) parameters
classifier-map Map QoS priority markers on incoming packets to Aerohive QoS classes
oui Set a MAC OUI (Organizational Unique Identifier) classification table
<oui> Enter the OUI (Note: You can use colons, dashes, or periods to format the OUI. Examples: Apple iPhone=00:1b:63; D-Link Phone=00-17-9a; Vocera=00.09.ef.)
qos Set an Aerohive QoS class to the MAC
<number> Enter Aerohive QoS class (Range: 0-7)
action Set an action to the MAC OUI
permit permit the packet
deny deny the packet
log log the packet
comment Add a comment to the MAC OUI
<string> Enter a comment (Maximum:32 chars) to the MAC
qos classifier-map service <string> [ qos <number> ] [ action {permit|deny|log} ]
qos Set QoS (Quality of Service) parameters
classifier-map Map QoS priority markers on incoming packets to Aerohive QoS classes
service Set service-based classification table
<string> Enter service name (1-32 chars)
qos Set an Aerohive QoS class to the service
<number> Enter the Aerohive QoS class (Range: 0-7)
action Set the action to take when receiving a packet for this service
permit permit the packet
deny deny the packet
log log the packet
qos classifier-map ssid <string> <number>
qos Set QoS (Quality of Service) parameters
classifier-map Map QoS priority markers on incoming packets to Aerohive QoS classes
ssid Map incoming wireless traffic to Aerohive QoS classes by SSID
<string> Enter an SSID name
<number> Enter the Aerohive QoS class (Range: 0-7)
qos classifier-profile <string> [ {interface/ssid-only|8021p|80211e|diffserv|interface/ssid|mac|service} ]
qos Set QoS (Quality of Service) parameters
classifier-profile Set a QoS classification profile
<string> Enter a classifier profile name (1-32 chars)
interface/ssid-only Classify all incoming and outgoing packets using the interface or SSID bound to this classifier profile (Note: The interface/ssid-only method cannot be combined with other methods in the same classifier profile or applied to more than one profile. This profile has precedence over all others.)
8021p Classify incoming packets by 802.1p priority markers present in Layer2 frame headers
80211e Classify incoming packets by 802.11e priority markers present in wireless frame headers
diffserv Classify incoming packets by DiffServ DSCP values present in Layer3 packet headers
interface/ssid Classify packets by the interface or SSID that they traverse (Note: If two interface/SSID classifier profiles apply to the same session, the one providing better QoS is used.)
mac Classify packets by the OUI (organizationally unique identifier) of the session participants (Note: If two OUI classifier profiles apply to the same session, the one providing better QoS is used.)
service Classify incoming packets by network service type
qos enable
qos Set QoS (Quality of Service) parameters
enable Enable QoS (Quality of Service)
qos marker-map 80211e <number> <number>
qos Set QoS (Quality of Service) parameters
marker-map Map Aerohive QoS classes to QoS priority markers on outgoing packets
80211e Map Aerohive QoS classes to IEEE 802.11e user priority markers on outgoing packets
<number> Enter the Aerohive QoS class (Range: 0-7)
<number> Enter the IEEE 802.11e user priority (Range: 0-7)
qos marker-map 8021p <number> <number>
qos Set QoS (Quality of Service) parameters
marker-map Map Aerohive QoS classes to QoS priority markers on outgoing packets
8021p Map Aerohive QoS classes to IEEE 802.1p priority markers on outgoing packets
<number> Enter Aerohive QoS class (Range: 0-7)
<number> Enter IEEE 802.1p Priority (Range: 0-7)
qos marker-map 8021p <string> [ <number> <number> ]
qos Set QoS (Quality of Service) parameters
marker-map Map Aerohive QoS classes to QoS priority markers on outgoing packets
8021p Map Aerohive QoS classes to IEEE 802.1p priority markers on outgoing packets
<string> Enter marker name (1-32 chars)
<number> Enter Aerohive QoS class (Range: 0-7)
<number> Enter IEEE 802.1p Priority (Range: 0-7)
qos marker-map diffserv <number> <number>
qos Set QoS (Quality of Service) parameters
marker-map Map Aerohive QoS classes to QoS priority markers on outgoing packets
diffserv Map Aerohive QoS classes to diffserv DSCP (Differentiated Services Code Point) values on outgoing packets
<number> Enter the Aerohive QoS class (Range: 0-7)
<number> Enter the DSCP class (Range: 0-63)
qos marker-map diffserv <string> [ <number> <number> ]
qos Set QoS (Quality of Service) parameters
marker-map Map Aerohive QoS classes to QoS priority markers on outgoing packets
diffserv Map Aerohive QoS classes to diffserv DSCP (Differentiated Services Code Point) values on outgoing packets
<string> Enter marker name (1-32 chars)
<number> Enter the Aerohive QoS class (Range: 0-7)
<number> Enter the DSCP class (Range: 0-63)
qos marker-profile <string> [ {8021p|80211e|diffserv} ]
qos Set QoS (Quality of Service) parameters
marker-profile Set a QoS marker profile
<string> Enter the marker profile name (1-32 chars)
8021p Use 802.1p priority markers in Layer 2 frame headers as the marking method
80211e Use 802.11e priority markers in wireless frame headers as the marking method
diffserv Use DiffServ DSCP values in Layer 3 packet headers as the marking method
qos policy <string> [ user-profile <number> <number> ] [ user <number> ] [ qos <number> {strict|wrr} <number> <number> ]
qos Set QoS (Quality of Service) parameters
policy Set a QoS policy to control traffic forwarding
<string> Enter the policy name (1-32 chars)
user-profile Set QoS policy parameters at the user profile level
<number> Enter the user profile rate limit in kbps (Range: 0-2000000)
<number> Enter the scheduling weight for the user profile (Range: 0-1000)
user Set QoS parameters at the user level
<number> Enter the user rate limit in kbps (Range: 0-2000000)
qos Set QoS parameters at the Aerohive QoS class level
<number> Enter the Aerohive QoS class (Range: 0-7)
strict Set the scheduling mode as strict to forward traffic without queuing it
wrr Set the scheduling mode as WRR (weighted round robin) to queue traffic and use rate limits and weights to prioritize forwarding
<number> Enter the class rate limit in kbps (Range: 0-2000000)
<number> Enter the scheduling weight (Range: 0-1000; Note: If the scheduling mode is strict, its weight must be zero.)
quit
quit Quit CLI (Command Line Interface)
radio profile <string>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
radio profile <string> acsp access channel-auto-select time-range <time> <time> [ station <number> ]
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
acsp Set parameters for ACSP (Advanced Channel Selection Protocol)
access Set access point interface parameters
channel-auto-select Set conditions for automatically selecting radio channels
time-range Set the time range when a new radio channel can be selected (Note: During this time, the radio re-evaluates the channel in use. It might switch to a different channel or continue using the same channel.)
<time> Enter the start time (Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
<time> Enter the end time (Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
station Set the maximum number of stations that can be connected to the HiveAP when selecting a channel (If more are connected during the time range, no channel selection occurs.)
<number> Enter the station maximum (Range: 0-100; Default: 0)
radio profile <string> acsp all-channels-model enable
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
acsp Set parameters for ACSP (Advanced Channel Selection Protocol)
all-channels-model Set all channels from which the radio can select the optimal channel
enable Enable all channels selection
radio profile <string> acsp channel-model 4-channels [ <channel_g4> ]
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
acsp Set parameters for ACSP (Advanced Channel Selection Protocol)
channel-model Set the pool of channels from which the radio can select the optimal channel(Default: 3-channel model)
4-channels Set a 4-channel model
<channel_g4> Enter the pool of channels from which the radio can select one to use (Format: xx-xx-xx-xx; Default for FCC: 01-04-08-11; Default for all other regions: 01-05-09-13)
radio profile <string> acsp channel-model {3-channels} [ <channel_g3> ]
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
acsp Set parameters for ACSP (Advanced Channel Selection Protocol)
channel-model Set the pool of channels from which the radio can select the optimal channel(Default: 3-channel model)
3-channels Set a 3-channel model
<channel_g3> Enter the pool of channels from which the radio can select one to use (Format: xx-xx-xx; Default for all regions: 01-06-11)
radio profile <string> acsp interference-switch crc-err-threshold <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
acsp Set parameters for ACSP (Advanced Channel Selection Protocol)
interference-switch Set parameters for the collection of RF interference-related data and switch channels if the threshold is reached
crc-err-threshold Set an RF interference threshold based on the rate of CRC (cyclic redundancy check) errors (Note: If the rate of CRC errors exceeds this threshold, the HiveAP switches channels)
<number> Enter the threshold as a percent (Default: 25; Range: 10-80)
radio profile <string> acsp interference-switch iu-threshold <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
acsp Set parameters for ACSP (Advanced Channel Selection Protocol)
interference-switch Set parameters for the collection of RF interference-related data and switch channels if the threshold is reached
iu-threshold Set an RF interference threshold based on interference utilization (Note: If the percent of interference utilization exceeds this value, the HiveAP switches channels)
<number> Enter the threshold as a percent (Default: 25; Range: 10-80)
radio profile <string> acsp interference-switch {enable|no-station-enable|disable}
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
acsp Set parameters for ACSP (Advanced Channel Selection Protocol)
interference-switch Set parameters for the collection of RF interference-related data and switch channels if the threshold is reached
enable Enable the radio to switch channels if the RF interference threshold is reached (Default setting: no-station-enable)
no-station-enable Enable the radio to switch channels only if the RF interference threshold is reached and no stations are connected (Default setting: no-station-enable)
disable Disable the radio from switching channels because of RF interference-related data (Default setting: no-station-enable)
radio profile <string> acsp max-tx-power <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
acsp Set parameters for ACSP (Advanced Channel Selection Protocol)
max-tx-power Set radio max transmit power
<number> Enter the max transmit power (Default: 20 dBm; Range: 10-20 dBm)
radio profile <string> ampdu
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
ampdu Enable AMPDU (Aggregate MAC Protocol Data Unit) transmissions to reduce overhead when the transmission channel is busy
radio profile <string> amsdu
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
amsdu Enable AMSDU (Aggregate MAC Service Data Unit) transmissions to reduce overhead when the transmission channel is busy
radio profile <string> backhaul failover [ trigger-time <number> ] [ hold-time <number> ]
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
backhaul Set parameters for failing over the backhaul link from Ethernet to wireless (Note: Only set this command on a HiveAP that acts as a portal.)
failover Enable backhaul communications to fail over to the wireless link if the Ethernet link goes down (Default: enabled)
trigger-time Set how long the Ethernet link must be down to trigger a failover to the wireless link
<number> Enter the failover trigger time in seconds (Default: 2; Range: 1-5)
hold-time Set how long the Ethernet link must be up to revert backhaul communications from wireless to Ethernet
<number> Enter the hold time in seconds (Default: 30; Range: 1-300)
radio profile <string> band-steering balance-band threshold <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
band-steering Distribute wireless clients that support both 2.4 and 5 GHz bands evenly across the two bands when an SSID is available on both bands
balance-band Balance clients according to an approximate ratio between 2.4 GHz and 5 GHz channels (Default: Allow four 5 GHz clients for every one 2.4 GHz client, or 80%.)
threshold Set the minimum ratio of 5 GHz clients to 2.4 GHz clients, expressed as a percentage (Example: Four 5-GHz stations to five total stations is 80%.)
<number> Enter the threshold to begin balancing band usage as a percentage (Range: 0-100; Default: 80)
radio profile <string> band-steering enable
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
band-steering Distribute wireless clients that support both 2.4 and 5 GHz bands evenly across the two bands when an SSID is available on both bands
enable Enable band steering (Default: Disabled)
radio profile <string> band-steering mode {balance-band|prefer-5g|force-5g}
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
band-steering Distribute wireless clients that support both 2.4 and 5 GHz bands evenly across the two bands when an SSID is available on both bands
mode Set the mode for band steering (Default: balance-band)
balance-band Balance clients according to an approximate ratio between 2.4 GHz and 5 GHz channels (Default: Allow four 5 GHz clients for every one 2.4 GHz client, or 80%.)
prefer-5g Encourage clients that are 5-GHz capable to move to the 5 GHz band by ignoring requests from them on the 2.4 GHz band (Note: If a client continues to attempt using 2.4 GHz even when offered a 5 GHz connection, the system allows it to connect at 2.4 GHz after a specified number of attempts. The default is 5.)
force-5g Answer probe requests from 5 GHz-capable clients only on 5 GHz interfaces
radio profile <string> band-steering prefer-5g suppression-limit <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
band-steering Distribute wireless clients that support both 2.4 and 5 GHz bands evenly across the two bands when an SSID is available on both bands
prefer-5g Encourage clients that are 5-GHz capable to move to the 5 GHz band by ignoring requests from them on the 2.4 GHz band (Note: If a client continues to attempt using 2.4 GHz even when offered a 5 GHz connection, the system allows it to connect at 2.4 GHz after a specified number of attempts. The default is 5.)
suppression-limit Set a limit number to the number of probe responses the system suppresses before accepting a client on the 2.4 GHz band
<number> Enter the number of probe responses the system suppresses before accepting client in the 2.4 GHz band (Default: 5; Range: 1-100)
radio profile <string> beacon-period <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
beacon-period Set the period of time between beacon broadcasts
<number> Enter the beacon period in TUs (time units, a measurement of time equal to 1024 microseconds) for the radio profile (Default: 100, Range: 40-3500)
radio profile <string> benchmark phymode 11a rate {6|9|12|18|24|36|48|54} success <number> usage <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
benchmark Set benchmark parameters for gauging the health of client connectivity
phymode Set the physical mode for which you want to measure client connectivity
11a Set benchmark parameters for 11a mode
rate Set the transmission rate that you expect clients with healthy connectivity to use (Note: You can set up to 3 rates for the same phymode)
6 Enter the transmission rate
9 Enter the transmission rate
12 Enter the transmission rate
18 Enter the transmission rate
24 Enter the transmission rate
36 Enter the transmission rate
48 Enter the transmission rate
54 Enter the transmission rate
success Set the percent of packets that you expect clients with healthy connectivity to transmit successfully
<number> Enter the percent for successfully transmitted packets (Range: 1-100)
usage Set the percent of time that you expect clients with healthy connectivity to transmit at the defined rate
<number> Enter the percent of time that clients transmit at the defined rate (Range: 1-100)
radio profile <string> benchmark phymode 11ac rate {6|9|12|18|24|36|48|54|mcs0/1|mcs1/1|mcs2/1|mcs3/1|mcs4/1|mcs5/1|mcs6/1|mcs7/1|mcs8/1|mcs9/1|mcs0/2|mcs1/2|mcs2/2|mcs3/2|mcs4/2|mcs5/2|mcs6/2|mcs7/2|mcs8/2|mcs9/2|mcs0/3|mcs1/3|mcs2/3|mcs3/3|mcs4/3|mcs5/3|mcs6/3|mcs7/3|mcs8/3|mcs9/3} success <number> usage <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
benchmark Set benchmark parameters for gauging the health of client connectivity
phymode Set the physical mode for which you want to measure client connectivity
11ac Set benchmark parameters for 11ac mode
rate Set the transmission rate that you expect clients with healthy connectivity to use (Note: You can set up to 3 rates for the same phymode)
6 Enter the transmission rate
9 Enter the transmission rate
12 Enter the transmission rate
18 Enter the transmission rate
24 Enter the transmission rate
36 Enter the transmission rate
48 Enter the transmission rate
54 Enter the transmission rate
mcs0/1 Enter the transmission rate
mcs1/1 Enter the transmission rate
mcs2/1 Enter the transmission rate
mcs3/1 Enter the transmission rate
mcs4/1 Enter the transmission rate
mcs5/1 Enter the transmission rate
mcs6/1 Enter the transmission rate
mcs7/1 Enter the transmission rate
mcs8/1 Enter the transmission rate
mcs9/1 Enter the transmission rate
mcs0/2 Enter the transmission rate
mcs1/2 Enter the transmission rate
mcs2/2 Enter the transmission rate
mcs3/2 Enter the transmission rate
mcs4/2 Enter the transmission rate
mcs5/2 Enter the transmission rate
mcs6/2 Enter the transmission rate
mcs7/2 Enter the transmission rate
mcs8/2 Enter the transmission rate
mcs9/2 Enter the transmission rate
mcs0/3 Enter the transmission rate
mcs1/3 Enter the transmission rate
mcs2/3 Enter the transmission rate
mcs3/3 Enter the transmission rate
mcs4/3 Enter the transmission rate
mcs5/3 Enter the transmission rate
mcs6/3 Enter the transmission rate
mcs7/3 Enter the transmission rate
mcs8/3 Enter the transmission rate
mcs9/3 Enter the transmission rate
success Set the percent of packets that you expect clients with healthy connectivity to transmit successfully
<number> Enter the percent for successfully transmitted packets (Range: 1-100)
usage Set the percent of time that you expect clients with healthy connectivity to transmit at the defined rate
<number> Enter the percent of time that clients transmit at the defined rate (Range: 1-100)
radio profile <string> benchmark phymode 11b rate {1|2|5.5|11} success <number> usage <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
benchmark Set benchmark parameters for gauging the health of client connectivity
phymode Set the physical mode for which you want to measure client connectivity
11b Set benchmark parameters for 11b mode
rate Set the transmission rate that you expect clients with healthy connectivity to use (Note: You can set up to 3 rates for the same phymode)
1 Enter the transmission rate
2 Enter the transmission rate
5.5 Enter the transmission rate
11 Enter the transmission rate
success Set the percent of packets that you expect clients with healthy connectivity to transmit successfully
<number> Enter the percent for successfully transmitted packets (Range: 1-100)
usage Set the percent of time that you expect clients with healthy connectivity to transmit at the defined rate
<number> Enter the percent of time that clients transmit at the defined rate (Range: 1-100)
radio profile <string> benchmark phymode 11g rate {1|2|5.5|11|6|9|12|18|24|36|48|54} success <number> usage <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
benchmark Set benchmark parameters for gauging the health of client connectivity
phymode Set the physical mode for which you want to measure client connectivity
11g Set benchmark parameters for 11g mode
rate Set the transmission rate that you expect clients with healthy connectivity to use (Note: You can set up to 3 rates for the same phymode)
1 Enter the transmission rate
2 Enter the transmission rate
5.5 Enter the transmission rate
11 Enter the transmission rate
6 Enter the transmission rate
9 Enter the transmission rate
12 Enter the transmission rate
18 Enter the transmission rate
24 Enter the transmission rate
36 Enter the transmission rate
48 Enter the transmission rate
54 Enter the transmission rate
success Set the percent of packets that you expect clients with healthy connectivity to transmit successfully
<number> Enter the percent for successfully transmitted packets (Range: 1-100)
usage Set the percent of time that you expect clients with healthy connectivity to transmit at the defined rate
<number> Enter the percent of time that clients transmit at the defined rate (Range: 1-100)
radio profile <string> benchmark phymode 11n rate {6|9|12|18|24|36|48|54|mcs0|mcs1|mcs2|mcs3|mcs4|mcs5|mcs6|mcs7|mcs8|mcs9|mcs10|mcs11|mcs12|mcs13|mcs14|mcs15|mcs0/1|mcs1/1|mcs2/1|mcs3/1|mcs4/1|mcs5/1|mcs6/1|mcs7/1|mcs0/2|mcs1/2|mcs2/2|mcs3/2|mcs4/2|mcs5/2|mcs6/2|mcs7/2} success <number> usage <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
benchmark Set benchmark parameters for gauging the health of client connectivity
phymode Set the physical mode for which you want to measure client connectivity
11n Set benchmark parameters for 11n mode
rate Set the transmission rate that you expect clients with healthy connectivity to use (Note: You can set up to 3 rates for the same phymode)
6 Enter the transmission rate
9 Enter the transmission rate
12 Enter the transmission rate
18 Enter the transmission rate
24 Enter the transmission rate
36 Enter the transmission rate
48 Enter the transmission rate
54 Enter the transmission rate
mcs0 Enter the transmission rate
mcs1 Enter the transmission rate
mcs2 Enter the transmission rate
mcs3 Enter the transmission rate
mcs4 Enter the transmission rate
mcs5 Enter the transmission rate
mcs6 Enter the transmission rate
mcs7 Enter the transmission rate
mcs8 Enter the transmission rate
mcs9 Enter the transmission rate
mcs10 Enter the transmission rate
mcs11 Enter the transmission rate
mcs12 Enter the transmission rate
mcs13 Enter the transmission rate
mcs14 Enter the transmission rate
mcs15 Enter the transmission rate
mcs0/1 Enter the transmission rate
mcs1/1 Enter the transmission rate
mcs2/1 Enter the transmission rate
mcs3/1 Enter the transmission rate
mcs4/1 Enter the transmission rate
mcs5/1 Enter the transmission rate
mcs6/1 Enter the transmission rate
mcs7/1 Enter the transmission rate
mcs0/2 Enter the transmission rate
mcs1/2 Enter the transmission rate
mcs2/2 Enter the transmission rate
mcs3/2 Enter the transmission rate
mcs4/2 Enter the transmission rate
mcs5/2 Enter the transmission rate
mcs6/2 Enter the transmission rate
mcs7/2 Enter the transmission rate
success Set the percent of packets that you expect clients with healthy connectivity to transmit successfully
<number> Enter the percent for successfully transmitted packets (Range: 1-100)
usage Set the percent of time that you expect clients with healthy connectivity to transmit at the defined rate
<number> Enter the percent of time that clients transmit at the defined rate (Range: 1-100)
radio profile <string> channel-width {20|40|40-above|40-below|80}
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
channel-width Set the channel width or the extensive channel offset when channel width is 40 MHz
20 Enter the channel width and extensive channel offset (Default: 20 Mhz)
40 Enter the channel width and extensive channel offset (Default: 20 Mhz)
40-above Enter the channel width and extensive channel offset (Default: 20 Mhz)
40-below Enter the channel width and extensive channel offset (Default: 20 Mhz)
80 Enter the channel width and extensive channel offset (Default: 20 Mhz)
radio profile <string> client-load-balance crc-error-limit <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
client-load-balance Enable the HiveAP to engage in client load balancing with neighboring hive members and set client load balancing parameters
crc-error-limit Set the maximum CRC (cyclic redundancy check) error rate that the HiveAP will tolerate before ignoring probes and association requests
<number> Enter the maximum CRC error rate as a percent (Default: 30; Range: 1-99)
radio profile <string> client-load-balance enable
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
client-load-balance Enable the HiveAP to engage in client load balancing with neighboring hive members and set client load balancing parameters
enable Enable client load balancing (Default: Disabled)
radio profile <string> client-load-balance hold-time <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
client-load-balance Enable the HiveAP to engage in client load balancing with neighboring hive members and set client load balancing parameters
hold-time Set the amount of time that a client must be associated with a HiveAP before it can roam (Note: Roaming before the hold time elapses is allowed if the client SNR is below the SNR threshold, the owner HiveAP is overloaded, or the client is experiencing a high level of interference.)
<number> Enter the hold time for clients in seconds (Default: 60; Range: 10-600)
radio profile <string> client-load-balance interference-limit <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
client-load-balance Enable the HiveAP to engage in client load balancing with neighboring hive members and set client load balancing parameters
interference-limit Set the maximum amount of RF interference that the HiveAP will tolerate before ignoring probes and association requests
<number> Enter the maximum interference limit as a percent (Default: 40; Range: 1-99)
radio profile <string> client-load-balance mode {airtime|sta-num}
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
client-load-balance Enable the HiveAP to engage in client load balancing with neighboring hive members and set client load balancing parameters
mode Set the mode for balancing client load with neighboring hive members (Default: airtime)
airtime Enable load balancing based on airtime; that is, on the amount of the wireless medium being used
sta-num Enable load balancing based on the total number of clients associated with the device
radio profile <string> client-load-balance neighbor-load-query-interval <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
client-load-balance Enable the HiveAP to engage in client load balancing with neighboring hive members and set client load balancing parameters
neighbor-load-query-interval Set the time interval to query neighboring HiveAPs for load information
<number> Enter the load query time interval in seconds (Range: 1-600; Default: 60)
radio profile <string> client-load-balance sta-mini-airtime <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
client-load-balance Enable the HiveAP to engage in client load balancing with neighboring hive members and set client load balancing parameters
sta-mini-airtime Set the minimum average percent of airtime consumed by all clients associated with the HiveAP before it begins ignoring probes and association requests from new client
<number> Enter the minimum station airtime as a percent (Default: 4; Range: 1-5)
radio profile <string> deny-client {11b|11abg}
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
deny-client Deny connections from wireless clients using the specified standards
11b Deny connections from wireless clients using the 802.11b standard (Default: All connections are accepted)
11abg Deny connections from wireless clients using the 802.11a/b/g standard (Default: All connections are accepted; Note: This option is only allowed for radio profiles supporting 802.11n)
radio profile <string> detect-bssid-spoofing
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
detect-bssid-spoofing Enable the detection of spoofed BSSIDs (Default: Disabled)
radio profile <string> dfs
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
dfs Enable DFS (Dynamic Frequency Selection) so the radio can switch channels automatically when detecting a radar signal (Default: Disabled)
radio profile <string> frameburst
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
frameburst Enable frame bursting, which allows the device to send a series of frames in succession without having to give up contorl of the medium(Default: Disabled)
radio profile <string> high-density broadcast-probe-suppress oui <oui>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
high-density Set parameters to reduce management traffic and improve the processing of client traffic in a high-density RF environment
broadcast-probe-suppress Suppress responses to broadcast probe requests that are broadcast by specified clients
oui Set the OUI (Organizationally Unique Identifier) portion of client MAC addresses to which you want to suppress probe responses
<oui> Enter the OUI (Note: You can use colons, dashes, or periods to format the OUI. Examples: Apple iPhone=00:1b:63; D-Link Phone=00-17-9a; Vocera=00.09.ef.)
radio profile <string> high-density continuous-probe-suppress enable
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
high-density Set parameters to reduce management traffic and improve the processing of client traffic in a high-density RF environment
continuous-probe-suppress Suppress subsequent transmissions of probe responses to clients that send multiple probe requests within the same beacon interval
enable Enable the suppression of subsequent probe responses (Default: Disabled)
radio profile <string> high-density enable
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
high-density Set parameters to reduce management traffic and improve the processing of client traffic in a high-density RF environment
enable Enable high-density settings (Default: Disabled)
radio profile <string> high-density mgmt-frame-tx-rate {low|high}
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
high-density Set parameters to reduce management traffic and improve the processing of client traffic in a high-density RF environment
mgmt-frame-tx-rate Set the management frame transmit bit rate as low or high (Note: This setting also applies to broadcast and multicast data frame bit rates and unicast data frame retry bit rates.)
low Set the basic transmit rate for a high density deployment as low (Default: Low)
high Set the basic transmit rate for a high density deployment as high (Default: Low)
radio profile <string> interference-map crc-err-threshold <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
interference-map Set parameters for the collection of RF interference-related data and the reporting of this data to HiveManager
crc-err-threshold Set an RF interference threshold based on the rate of CRC (cyclic redundancy check) errors (Note: If the rate of CRC errors exceeds this threshold, the HiveAP alerts HiveManager to switch from its regular polling interval to a shorter one)
<number> Enter the threshold as a percent (Default: 20; Range: 15-60)
radio profile <string> interference-map cu-threshold <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
interference-map Set parameters for the collection of RF interference-related data and the reporting of this data to HiveManager
cu-threshold Set an RF interference threshold based on channel utilization (Note: If the percent of channel utilization exceeds this value, the HiveAP alerts HiveManager to switch from its regular polling interval to a shorter one)
<number> Enter the threshold as a percent (Default: 20; Range: 15-60)
radio profile <string> interference-map enable
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
interference-map Set parameters for the collection of RF interference-related data and the reporting of this data to HiveManager
enable Enable the collection and reporting of RF interference-related data to HiveManager
radio profile <string> interference-map short-term-interval <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
interference-map Set parameters for the collection of RF interference-related data and the reporting of this data to HiveManager
short-term-interval Set the interval during which the HiveAP calculates a short-term average of channel utilization and CRC errors (Note: The HiveAP calculates three averages: a running average, a configurable short-term average, and a 60-second snapshot average)
<number> Enter the short-term interval in minutes (Default: 5; Range: 5-30)
radio profile <string> max-client <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
max-client Set radio profile's max number of clients/neighbors
<number> Enter the maximum number of clients (Range: 1-100)
radio profile <string> phymode {11a|11b/g|11na|11ng|11ac}
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
phymode Set the physical mode of the radio profile
11a Set the physical mode to 11a (Default: 11b/g)
11b/g Set the physical mode to 11b/g (Default: 11b/g)
11na Set the physical mode to 11na (Default: 11b/g)
11ng Set the physical mode to 11ng (Default: 11b/g)
11ac Set the physical mode to 11ac (Default: 11b/g)
radio profile <string> presence aggr-interval <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
presence Set precense parameters for the radio profile
aggr-interval Set the precense aggr interval of the radio profile
<number> Enter a interval number to which the aggregation will be done (Default: 120 sec;Range: 15 - 600)
radio profile <string> presence aging-time <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
presence Set precense parameters for the radio profile
aging-time Set the precense aging time of the radio profile
<number> Enter an aging time for presence client (Default: 120 sec; Range: 15 - 600)
radio profile <string> presence enable
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
presence Set precense parameters for the radio profile
enable Enable presence setting (Default: Disabled)
radio profile <string> presence trap-interval <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
presence Set precense parameters for the radio profile
trap-interval Set the precense trap interval of the radio profile
<number> Enter a interval number to which the trap was sent (Default: 120 sec;Range: 15 - 600)
radio profile <string> primary-channel-offset {auto|0|1|2|3}
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
primary-channel-offset Set the primary channel offset of the radio profile
auto Set primary channel offset to auto (Default: auto)
0 Set primary channel offset to 0 (Default: auto)
1 Set primary channel offset to 1 (Default: auto)
2 Set primary channel offset to 2 (Default: auto)
3 Set primary channel offset to 3 (Default: auto)
radio profile <string> receive-chain <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
receive-chain Set the number of receive chains for frame reception
<number> Enter the number of receive chains (Default: 2; Range: 1-2)
radio profile <string> safety-net enable
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
safety-net Enable the HiveAP, when it is in an overloaded state or if the client's SNR is low, to respond to a client making association requests after the timeout period elapses
enable Enable safety net checking (Default: Enabled)
radio profile <string> safety-net timeout <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
safety-net Enable the HiveAP, when it is in an overloaded state or if the client's SNR is low, to respond to a client making association requests after the timeout period elapses
timeout Set the maximum length of time to ignore association requests from a client when the HiveAP is in an overloaded state or if the client's SNR is low
<number> Enter the timeout in seconds (Default: 15; Range: 5-300)
radio profile <string> scan access
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
scan Enable scanning to detect neighboring APs
access Enable scanning for interfaces in access mode (Default: Enabled)
radio profile <string> scan access client
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
scan Enable scanning to detect neighboring APs
access Enable scanning for interfaces in access mode (Default: Enabled)
client Allow scanning to occur when clients are connected (Default: Allowed)
radio profile <string> scan access client power-save
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
scan Enable scanning to detect neighboring APs
access Enable scanning for interfaces in access mode (Default: Enabled)
client Allow scanning to occur when clients are connected (Default: Allowed)
power-save Allow scanning to occur when connected clients are in a power save state (Default: Disallowed)
radio profile <string> scan access interval <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
scan Enable scanning to detect neighboring APs
access Enable scanning for interfaces in access mode (Default: Enabled)
interval Set the scan interval
<number> Enter the scan interval in minutes (Default: 10 minutes; Range: 1-1440)
radio profile <string> scan access voice
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
scan Enable scanning to detect neighboring APs
access Enable scanning for interfaces in access mode (Default: Enabled)
voice Allow scanning to occur while processing voice traffic (Default: Disallowed)
radio profile <string> sensor channel-list <string>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
sensor Set sensor parameters for the radio profile
channel-list Set the channel list to sensor mode of the radio profile
<string> Enter a string comprised of channel list. channel number and separated by ','(e.g. 1,6,11).or "all" (Default: all)(1-256 chars)
radio profile <string> sensor dwell-time <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
sensor Set sensor parameters for the radio profile
dwell-time Set the dwell time to sensor mode of the radio profile
<number> Enter a numeric value for sensor dwell time (Default:1200 millisecond; Range: 250-30000)
radio profile <string> short-guard-interval
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
short-guard-interval Enable the short guard interval option (400ns) to avoid inter-symbol interference and improve media throughput (Note: This is only valid in 40-MHz channel mode.)
radio profile <string> short-preamble
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
short-preamble Set short preamble mode of radio profile
radio profile <string> transmit-chain <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
transmit-chain Set the number of transmit chains for frame transmission or configure the HiveAP to determine them automatically
<number> Enter the number of transmit chains (Default: 2; Range: 1-2)
radio profile <string> tx-beamforming [ {explicit-only|auto} ]
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
tx-beamforming Enable beamforming on the transmit antennas (Default: Disabled)
explicit-only Use explicit transmit beamforming, in which the transmitter uses a steering matrix calculated by the receiver as a basis for calculating its own steering matrix
auto Allow the transmitter to choose whether it uses implicit or explicit beamforming rules to calculate its steering matrix based on whether it receives explicit feedback from the receiver(default)
radio profile <string> tx-rate vht-mcs {MCS0/1|MCS1/1|MCS2/1|MCS3/1|MCS4/1|MCS5/1|MCS6/1|MCS7/1|MCS8/1|MCS9/1|MCS0/2|MCS1/2|MCS2/2|MCS3/2|MCS4/2|MCS5/2|MCS6/2|MCS7/2|MCS8/2|MCS9/2|MCS0/3|MCS1/3|MCS2/3|MCS3/3|MCS4/3|MCS5/3|MCS6/3|MCS7/3|MCS8/3|MCS9/3}
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
tx-rate Set the Tx (transmission) rate for the radio profile
vht-mcs Set the 802.11ac Tx(transmission) rate
MCS0/1 Set the transmit rate as MCS0/1
MCS1/1 Set the transmit rate as MCS1/1
MCS2/1 Set the transmit rate as MCS2/1
MCS3/1 Set the transmit rate as MCS3/1
MCS4/1 Set the transmit rate as MCS4/1
MCS5/1 Set the transmit rate as MCS5/1
MCS6/1 Set the transmit rate as MCS6/1
MCS7/1 Set the transmit rate as MCS7/1
MCS8/1 Set the transmit rate as MCS8/1
MCS9/1 Set the transmit rate as MCS9/1
MCS0/2 Set the transmit rate as MCS0/2
MCS1/2 Set the transmit rate as MCS1/2
MCS2/2 Set the transmit rate as MCS2/2
MCS3/2 Set the transmit rate as MCS3/2
MCS4/2 Set the transmit rate as MCS4/2
MCS5/2 Set the transmit rate as MCS5/2
MCS6/2 Set the transmit rate as MCS6/2
MCS7/2 Set the transmit rate as MCS7/2
MCS8/2 Set the transmit rate as MCS8/2
MCS9/2 Set the transmit rate as MCS9/2
MCS0/3 Set the transmit rate as MCS0/3
MCS1/3 Set the transmit rate as MCS1/3
MCS2/3 Set the transmit rate as MCS2/3
MCS3/3 Set the transmit rate as MCS3/3
MCS4/3 Set the transmit rate as MCS4/3
MCS5/3 Set the transmit rate as MCS5/3
MCS6/3 Set the transmit rate as MCS6/3
MCS7/3 Set the transmit rate as MCS7/3
MCS8/3 Set the transmit rate as MCS8/3
MCS9/3 Set the transmit rate as MCS9/3
radio profile <string> tx-rate {auto|1Mbps|2Mbps|5.5Mbps|6Mbps|9Mbps|11Mbps|12Mbps|18Mbps|24Mbps|36Mbps|48Mbps|54Mbps|MCS0|MCS1|MCS2|MCS3|
MCS4|MCS5|MCS6|MCS7|MCS8|MCS9|MCS10|MCS11|MCS12|MCS13|MCS14|MCS15|MCS16|MCS17|MCS18|MCS19|MCS20|MCS21|MCS22|MCS23}
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
tx-rate Set the Tx (transmission) rate for the radio profile
auto Set the radio to determine its transmission rate automatically (Default: auto; Range: 1-54 Mbps)
1Mbps Set the transmit rate as 1Mbps (Only for 802.11bg and 802.11ng)
2Mbps Set the transmit rate as 2Mbps (Only for 802.11bg and 802.11ng)
5.5Mbps Set the transmit rate as 5.5Mbps (Only for 802.11bg and 802.11ng)
6Mbps Set the transmit rate as 6Mbps
9Mbps Set the transmit rate as 9Mbps
11Mbps Set the transmit rate as 11Mbps (Only for 802.11bg and 802.11ng)
12Mbps Set the transmit rate as 12Mbps
18Mbps Set the transmit rate as 18Mbps
24Mbps Set the transmit rate as 24Mbps
36Mbps Set the transmit rate as 36Mbps
48Mbps Set the transmit rate as 48Mbps
54Mbps Set the transmit rate as 54Mbps
MCS0 Set the transmit rate as MCS0
MCS1 Set the transmit rate as MCS1
MCS2 Set the transmit rate as MCS2
MCS3 Set the transmit rate as MCS3
MCS4 Set the transmit rate as MCS4
MCS5 Set the transmit rate as MCS5
MCS6 Set the transmit rate as MCS6
MCS7 Set the transmit rate as MCS7
MCS8 Set the transmit rate as MCS8
MCS9 Set the transmit rate as MCS9
MCS10 Set the transmit rate as MCS10
MCS11 Set the transmit rate as MCS11
MCS12 Set the transmit rate as MCS12
MCS13 Set the transmit rate as MCS13
MCS14 Set the transmit rate as MCS14
MCS15 Set the transmit rate as MCS15
MCS16 Set the transmit rate as MCS16 (Only for the HiveAP 330, 350, 370 and 390)
MCS17 Set the transmit rate as MCS17 (Only for the HiveAP 330, 350, 370 and 390)
MCS18 Set the transmit rate as MCS18 (Only for the HiveAP 330, 350, 370 and 390)
MCS19 Set the transmit rate as MCS19 (Only for the HiveAP 330, 350, 370 and 390)
MCS20 Set the transmit rate as MCS20 (Only for the HiveAP 330, 350, 370 and 390)
MCS21 Set the transmit rate as MCS21 (Only for the HiveAP 330, 350, 370 and 390)
MCS22 Set the transmit rate as MCS22 (Only for the HiveAP 330, 350, 370 and 390)
MCS23 Set the transmit rate as MCS23 (Only for the HiveAP 330, 350, 370 and 390)
radio profile <string> vht-2g
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
vht-2g Set VHT (802.11ac) support mode on 2.4GHz interface or configure the AP to determine it automatically(Default: Disabled)
radio profile <string> weak-snr-suppress enable
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
weak-snr-suppress Set parameters to determine when the SNR (signal-to-noise ratio) for a client is weak, and enable the HiveAP to ignore probes and association requests from clients with weak SNRs
enable Enable the suppression of probe responses when the client SNR is weak (Default: Disabled)
radio profile <string> weak-snr-suppress threshold <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
weak-snr-suppress Set parameters to determine when the SNR (signal-to-noise ratio) for a client is weak, and enable the HiveAP to ignore probes and association requests from clients with weak SNRs
threshold Set the minium amount of SNR(signal-to-noise ratio) that the HiveAP will accepting probes and association requests
<number> Enter threshold of weak snr suppress in dB (Default: 15, Range: 1-100)
radio profile <string> wmm ac {background|best-effort|video|voice} aifs <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
wmm Set Wi-Fi Multimedia parameters
ac Set Access Category parameters
background Set background access category parameters
best-effort Set best-effort access category parameters
video Set video access category parameters
voice Set voice access category parameters
aifs Set AIFS (arbitration interframe space) parameters
<number> Set the AIFS value (Range: 0-15)
radio profile <string> wmm ac {background|best-effort|video|voice} cwmax <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
wmm Set Wi-Fi Multimedia parameters
ac Set Access Category parameters
background Set background access category parameters
best-effort Set best-effort access category parameters
video Set video access category parameters
voice Set voice access category parameters
cwmax Set maximal contention window parameters
<number> contention window maximal value (Range: 1-15)
radio profile <string> wmm ac {background|best-effort|video|voice} cwmin <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
wmm Set Wi-Fi Multimedia parameters
ac Set Access Category parameters
background Set background access category parameters
best-effort Set best-effort access category parameters
video Set video access category parameters
voice Set voice access category parameters
cwmin Set minimal contention window parameters
<number> Set contention window minimal value (Range: 1-15)
radio profile <string> wmm ac {background|best-effort|video|voice} noack
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
wmm Set Wi-Fi Multimedia parameters
ac Set Access Category parameters
background Set background access category parameters
best-effort Set best-effort access category parameters
video Set video access category parameters
voice Set voice access category parameters
noack Set no acknowledgments
radio profile <string> wmm ac {background|best-effort|video|voice} txoplimit <number>
radio Set radio profile parameters
profile Set radio profile parameters
<string> Enter a radio profile name (1-32 chars)
wmm Set Wi-Fi Multimedia parameters
ac Set Access Category parameters
background Set background access category parameters
best-effort Set best-effort access category parameters
video Set video access category parameters
voice Set voice access category parameters
txoplimit Set transmission opportunity limit parameters
<number> Set transmission opportunity limit value (Range: 0-8192; Note: Your input must be multiples of 32)
report statistic alarm-threshold client {tx-drop-rate|rx-drop-rate|tx-retry-rate|airtime-consumption} <number>
report Set the parameters for gathering traffic statistics and reporting them to HiveManager
statistic Set the periodic reporting of interface-level and client-level traffic statistics
alarm-threshold Set the alarm threshold for the CRC error rate, Tx/Rx drop rate, and Tx retry rate(Note: If the rate exceeds the threshold, the HiveAP sends an alarm to HiveManager.)
client Set the Tx/Rx drop rate, Tx retry rate, and airtime consumption alarm threshold of clients
tx-drop-rate Set the Tx drop rate alarm threshold for clients (Default: 40%)
rx-drop-rate Set the Rx drop rate alarm threshold for clients (Default: 40%)
tx-retry-rate Set the Tx retry rate alarm threshold for clients (Default: 40%)
airtime-consumption Set the airtime consumption (Tx airtime percentage + Rx airtime percentage) alarm threshold for clients (Default: 30%)
<number> Enter the alarm threshold (Range: 1-100)
report statistic alarm-threshold interface {crc-error-rate|tx-drop-rate|rx-drop-rate|tx-retry-rate|airtime-consumption} <number>
report Set the parameters for gathering traffic statistics and reporting them to HiveManager
statistic Set the periodic reporting of interface-level and client-level traffic statistics
alarm-threshold Set the alarm threshold for the CRC error rate, Tx/Rx drop rate, and Tx retry rate(Note: If the rate exceeds the threshold, the HiveAP sends an alarm to HiveManager.)
interface Set the CRC error rate, Tx/Rx drop rate, Tx retry rate, and airtime consumption alarm threshold of wifi interfaces
crc-error-rate Set CRC error rate alarm threshold for the wifi interfaces (Default: 30%)
tx-drop-rate Set the Tx drop rate alarm threshold for the wifi interfaces (Default: 40%)
rx-drop-rate Set the Rx drop rate alarm threshold for the wifi interfaces (Default: 40%)
tx-retry-rate Set the Tx retry rate alarm threshold for the wifi interfaces (Default: 40%)
airtime-consumption Set the airtime consumption (Tx airtime percentage + Rx airtime percentage) alarm threshold for the wifi interfaces (Default: 50%)
<number> Enter the alarm threshold (Range: 1-100)
report statistic enable
report Set the parameters for gathering traffic statistics and reporting them to HiveManager
statistic Set the periodic reporting of interface-level and client-level traffic statistics
enable Enable the creation of traffic statistics reports
report statistic period <number>
report Set the parameters for gathering traffic statistics and reporting them to HiveManager
statistic Set the periodic reporting of interface-level and client-level traffic statistics
period Set the time interval for gathering traffic statistics and calculating percentages
<number> Enter the time interval (Default: 10 minutes; Supported: 1, 5, 10, 30 or 60 minutes)
reset web-directory all-running-ssid
reset Return the configuration to its default settings or the files in a web directory to the default file set
web-directory Reset the files in all web directories, in a specific directory, or in directories referenced by SSIDs to the default file set
all-running-ssid Reset the web directories for all SSIDs to the default file set
roaming cache update-interval <number> ageout <number>
roaming Set roaming parameter
cache Set the interval between updates and the number of times to update station's roaming cache
update-interval Set the interval for sending roaming cache updates to neighbors
<number> Enter the roaming cache update interval in seconds (Default: 60; Range: 10-36000)
ageout Set how many times an entry must be absent from a neighbors updates before removing it from the roaming cache
<number> Enter the number of absences required to remove an entry (Default:60; Range: 1-1000)
roaming cache-broadcast neighbor-type access enable
roaming Set roaming parameter
cache-broadcast Set parameters for broadcasting roaming cache data to hive neighbors
neighbor-type Set the type of neighbor to which you want to broadcast roaming cache data
access Broadcast roaming cache data to hive neighbors discovered through wireless access links
enable Enable the broadcasting of roaming cache data to hive neighbors over wireless access links (Default: Enabled)
roaming cache-broadcast neighbor-type backhaul enable
roaming Set roaming parameter
cache-broadcast Set parameters for broadcasting roaming cache data to hive neighbors
neighbor-type Set the type of neighbor to which you want to broadcast roaming cache data
backhaul Broadcast roaming cache data to hive neighbors discovered through Ethernet and wireless backhaul links
enable Enable the broadcasting of roaming cache data to hive neighbors over backhaul links (Default: Enabled)
roaming hop <number>
roaming Set roaming parameter
hop Set the number of HiveAPs away from the source HiveAP to which it sends station authentication information
<number> Set roaming hop value (Defaule: 1, Range: 0-16)
route <mac_addr> outgoing-interface <string> next-hop <mac_addr>
route Set a MAC address route
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
outgoing-interface Set outgoing interface
<string> Enter interface name
next-hop Set the MAC address of the next hop in the L2 forwarding route
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
save config users [ bootstrap ]
save Save a configuration, HiveOS image, RADIUS database, or files used by the internal web, RADIUS servers, or packet capture tool
config Save a configuration from the HiveAP to a remote server, from a remote server to the HiveAP, or from DRAM to flash as the current or bootstrap config
users Save private PSK user accounts to the current or bootstrap configuration
bootstrap Save private PSK user accounts to the bootstrap configuration
save ssid <string> mac-bind <location>
save Save a configuration, HiveOS image, RADIUS database, or files used by the internal web, RADIUS servers, or packet capture tool
ssid Save a locally stored file to a remote server
<string> Enter the file name to upload to a remote server
mac-bind Save auth-ppsk mac-binding file
<location> Enter the protocol, SCP user name, location, path, file name, and SCP port number (Range: 1-256 chars; Default SCP port number: 22; Format: tftp://location:path/filename, scp://username@location:path/filename or scp://username@location:port:path/filename)
schedule <string> once <date> <time> to <date> <time> [ time-zone <number> ] [ comment <string> ]
schedule Set a schedule to control the application of user profiles and the availability of SSIDs
<string> Enter a schedule name (1-32 chars)
once Set a one-time schedule
<date> Enter a start date for the schedule (Format: yyyy-mm-dd; Range: 1970-01-01 to 2035-12-31)
<time> Enter a start time for the schedule (Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
to Set a date and time range
<date> Enter an end date for the schedule (Format: yyyy-mm-dd; Range: 1970-01-01 to 2035-12-31)
<time> Enter an end time for the schedule (Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
time-zone Set the time zone for the schedule (Note: If you do not specify a time zone, the time zone for the local system will be used.)
<number> Enter the time zone for the schedule (Default: 0; Range: -12 to 12)
comment Write a comment about the schedule for future reference
<string> Enter a comment about the schedule (max 128 chars)
schedule <string> ppsk once <date> <time> to <date> <time> [ time-zone <number> ] [ comment <string> ]
schedule Set a schedule to control the application of user profiles and the availability of SSIDs
<string> Enter a schedule name (1-32 chars)
ppsk Set a schedule to determine the validity period for the private PSK users to which the schedule is applied
once Set a one-time schedule
<date> Enter a start date for the schedule (Format: yyyy-mm-dd; Range: 1970-01-01 to 2035-12-31)
<time> Enter a start time for the schedule (Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
to Set a date and time range
<date> Enter an end date for the schedule (Format: yyyy-mm-dd; Range: 1970-01-01 to 2035-12-31)
<time> Enter an end time for the schedule (Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
time-zone Set the time zone for the schedule (Note: If you do not specify a time zone, the time zone for the local system will be used.)
<number> Enter the time zone for the schedule (Default: 0; Range: -12 to 12)
comment Write a comment about the schedule for future reference
<string> Enter a comment about the schedule (max 128 chars)
schedule <string> ppsk recurrent [ date-range <date> [ to <date> ] ] [ weekday <string> ] time-range <time> to <time> [ time-range <time> to <time> ] [ time-zone <number> ] [ comment <string> ]
schedule Set a schedule to control the application of user profiles and the availability of SSIDs
<string> Enter a schedule name (1-32 chars)
ppsk Set a schedule to determine the validity period for the private PSK users to which the schedule is applied
recurrent Set a recurrent schedule
date-range Set dates to mark the start and end of the schedule (If you do not want to set start and end dates, do not use this option.)
<date> Enter a start date for the schedule (Format: yyyy-mm-dd; Range: 1970-01-01 to 2035-12-31)
to Set a date range (If you do not want to set an end date, do not use this option.)
<date> Enter a end date for the schedule (Format: yyyy-mm-dd; Range: 1970-01-01 to 2035-12-31)
weekday Set the weekdays during which private PSK users are valid
<string> Enter one or more numbers to indicate which days the schedule is applied (1=Sunday, 2=Monday, ... 7=Saturday; Examples: 246=Monday, Wednesday, Friday; 23456=Monday-Friday; 1234567=everyday)
time-range Set a time range during which the schedule will be applied on each scheduled day
<time> Enter a start time for the schedule (Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
to Set a time range
<time> Enter a end time for the schedule,(Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
time-range Set a second time range for the schedule
<time> Enter a second start time for the schedule (Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
to Set a time range
<time> Enter a second end time for the schedule,(Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
time-zone Set the time zone for the schedule (Note: If you do not specify a time zone, the time zone for the local system will be used.)
<number> Enter the time zone for the schedule (Default: 0; Range: -12 to 12)
comment Write a comment about the schedule for future reference
<string> Enter a comment about the schedule (max 128 chars)
schedule <string> recurrent [ date-range <date> [ to <date> ] ] [ weekday-range {Monday|Tuesday|Wednesday|Thursday|Friday|Saturday|Sunday} [ to {Monday|Tuesday|Wednesday|Thursday|Friday|Saturday|Sunday} ] ] time-range <time> to <time> [ time-range <time> to <time> ] [ time-zone <number> ] [ comment <string> ]
schedule Set a schedule to control the application of user profiles and the availability of SSIDs
<string> Enter a schedule name (1-32 chars)
recurrent Set a recurrent schedule
date-range Set dates to mark the start and end of the schedule (If you do not want to set start and end dates, do not use this option.)
<date> Enter a start date for the schedule (Format: yyyy-mm-dd; Range: 1970-01-01 to 2035-12-31)
to Set a date range (If you do not want to set an end date, do not use this option.)
<date> Enter a end date for the schedule (Format: yyyy-mm-dd; Range: 1970-01-01 to 2035-12-31)
weekday-range Apply the schedule on specific days of the week (To apply the schedule everyday, do not use this option.)
Monday Apply the schedule on every Monday within the date range
Tuesday Apply the schedule on every Tuesday within the date range
Wednesday Apply the schedule on every Wednesday within the date range
Thursday Apply the schedule on every Thursday within the date range
Friday Apply the schedule on every Friday within the date range
Saturday Apply the schedule on every Saturday within the date range
Sunday Apply the schedule on every Sunday within the date range
to Set a range of weekdays during which the schedule will be applied (Example: monday to friday)
Monday Apply the schedule on every Monday within the date range
Tuesday Apply the schedule on every Tuesday within the date range
Wednesday Apply the schedule on every Wednesday within the date range
Thursday Apply the schedule on every Thursday within the date range
Friday Apply the schedule on every Friday within the date range
Saturday Apply the schedule on every Saturday within the date range
Sunday Apply the schedule on every Sunday within the date range
time-range Set a time range during which the schedule will be applied on each scheduled day
<time> Enter a start time for the schedule (Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
to Set a time range
<time> Enter a end time for the schedule,(Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
time-range Set a second time range for the schedule
<time> Enter a second start time for the schedule (Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
to Set a time range
<time> Enter a second end time for the schedule,(Format: hh:mm; Hour Range: 00-23; Minute Range: 00-59)
time-zone Set the time zone for the schedule (Note: If you do not specify a time zone, the time zone for the local system will be used.)
<number> Enter the time zone for the schedule (Default: 0; Range: -12 to 12)
comment Write a comment about the schedule for future reference
<string> Enter a comment about the schedule (max 128 chars)
security mac-filter <string> address <mac_addr> {permit|deny} [ comment <string> ]
security Set the security parameters
mac-filter Set a filter for MAC addresses or OUIs (organizationally unique identifiers)
<string> Enter the filter name for MAC addresses or OUIs (1-32 chars)
address Set MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
permit Set the action of the specified MAC to permit
deny Set the action of the specified MAC to deny
comment Enter a comment
<string> Enter a comment (max 64 chars)
security mac-filter <string> default {permit|deny}
security Set the security parameters
mac-filter Set a filter for MAC addresses or OUIs (organizationally unique identifiers)
<string> Enter the filter name for MAC addresses or OUIs (1-32 chars)
default Set MAC-filter default action
permit Set MAC-filter default action to permit (Default: permit)
deny Set MAC-filter default action to deny (Default: permit)
security mac-filter <string> oui <oui> {permit|deny} [ comment <string> ]
security Set the security parameters
mac-filter Set a filter for MAC addresses or OUIs (organizationally unique identifiers)
<string> Enter the filter name for MAC addresses or OUIs (1-32 chars)
oui Set the OUI used to identify a vendor
<oui> Enter the OUI (Note: You can use colons, dashes, or periods to format the OUI. Examples: Apple iPhone=00:1b:63; D-Link Phone=00-17-9a; Vocera=00.09.ef.)
permit Set the action of the specified OUI to permit
deny Set the action of the specified OUI to deny
comment Enter a comment
<string> Enter a comment (max 64 chars)
security wlan-idp profile <string>
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
security wlan-idp profile <string> adhoc
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
adhoc Detect adhoc networks
security wlan-idp profile <string> ap-detection client-mac-in-net
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
ap-detection Set attributes to note when detecting APs
client-mac-in-net Determine that a detected rogue AP is in the same backhaul network as the local device if any of its client MAC addresses appear in the MAC learning table
security wlan-idp profile <string> ap-detection connected
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
ap-detection Set attributes to note when detecting APs
connected Determine that a rogue AP is in the same backhaul network as the local device if any MAC address within a 64-address range of the BSSID used by the detected rogue AP appears in the MAC learning table
security wlan-idp profile <string> ap-policy
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
ap-policy Set an AP policy for the IDP profile
security wlan-idp profile <string> ap-policy ap-oui
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
ap-policy Set an AP policy for the IDP profile
ap-oui Categorize neighboring APs as compliant by OUI (organizationally unique identifier)
security wlan-idp profile <string> ap-policy ap-oui entry <oui>
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
ap-policy Set an AP policy for the IDP profile
ap-oui Categorize neighboring APs as compliant by OUI (organizationally unique identifier)
entry Add an OUI entry
<oui> Enter the OUI (Note: You can use colons, dashes, or periods to format the OUI. Examples: Apple iPhone=00:1b:63; D-Link Phone=00-17-9a; Vocera=00.09.ef.)
security wlan-idp profile <string> ap-policy short-beacon
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
ap-policy Set an AP policy for the IDP profile
short-beacon Categorize neighboring APs as non-compliant if their beacon transmissions are at shorter intervals than stated in their beacon frames
security wlan-idp profile <string> ap-policy short-preamble
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
ap-policy Set an AP policy for the IDP profile
short-preamble Categorize neighboring APs as compliant if they use short preambles
security wlan-idp profile <string> ap-policy ssid
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
ap-policy Set an AP policy for the IDP profile
ssid Categorize neighboring APs as compliant by SSID (service set identifier)
security wlan-idp profile <string> ap-policy ssid entry <string>
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
ap-policy Set an AP policy for the IDP profile
ssid Categorize neighboring APs as compliant by SSID (service set identifier)
entry Add an SSID entry
<string> Enter an SSID name
security wlan-idp profile <string> ap-policy ssid entry <string> encryption
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
ap-policy Set an AP policy for the IDP profile
ssid Categorize neighboring APs as compliant by SSID (service set identifier)
entry Add an SSID entry
<string> Enter an SSID name
encryption Set approved encryption types for the SSID
security wlan-idp profile <string> ap-policy ssid entry <string> encryption {open|wep|wpa}
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
ap-policy Set an AP policy for the IDP profile
ssid Categorize neighboring APs as compliant by SSID (service set identifier)
entry Add an SSID entry
<string> Enter an SSID name
encryption Set approved encryption types for the SSID
open Categorize a neighboring AP as compliant if its SSID uses open (Default: open)
wep Categorize a neighboring AP as compliant if its SSID uses wep (Default: open)
wpa Categorize a neighboring AP as compliant if its SSID uses wpa (Default: open)
security wlan-idp profile <string> ap-policy wmm
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
ap-policy Set an AP policy for the IDP profile
wmm Categorize neighboring APs as compliant if they apply WMM (Wi-Fi Multimedia) classifications
security wlan-idp profile <string> mitigate deauth-time <number>
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
mitigate Set rogue AP and client mitigation parameters for the IDP profile
deauth-time Set the number of consecutive periods that the HiveAP sends deauth frames to mitigate clients of a rogue AP after detecting client activity
<number> Enter the number of consecutive rogue AP and client mitigation periods (Default: 60; Range: 0-65535; 0 means to send deauth frames for the entire mitigation duration)
security wlan-idp profile <string> mitigate duration <number> quiet-time <number>
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
mitigate Set rogue AP and client mitigation parameters for the IDP profile
duration Set the overall duration for detecting clients of a rogue AP and performing deauth DoS attacks against the AP and its clients
<number> Enter the duration in seconds (Default: 14400 secs; Range: 0 or 60-2592000; 0 secs means infinite)
quiet-time Set the period of time after which the mitigation process stops if no clients are connected to the rogue AP
<number> Enter the quiet time in seconds (Default: 3600 secs; Range: 0 or 60-2592000; 0 means that the quiet time is the same length as the mitigation duration)
security wlan-idp profile <string> mitigate period <number>
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
mitigate Set rogue AP and client mitigation parameters for the IDP profile
period Set the interval to check periodically for clients of a rogue AP and--if found--send deauth DoS attacks against the AP and clients
<number> Enter the period in seconds (Default: 1 secs; Range: 1-600)
security wlan-idp profile <string> sta-report
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
sta-report Set rogue client report parameters for the IDP profile (Default: Disabled)
security wlan-idp profile <string> sta-report age-time <number>
security Set the security parameters
wlan-idp Set WLAN IDP (intrusion detection and prevention) parameters
profile Set an IDP profile
<string> Enter an IDP profile name (1-32 chars)
sta-report Set rogue client report parameters for the IDP profile (Default: Disabled)
age-time Set age time a rogue client must be disconnected from a rogue AP before removing it from the report
<number> Enter the age time in seconds (Default: 3600 secs; Range: 60-86400)
security-object <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security-object <string> default-user-profile-attr <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
default-user-profile-attr Set the attribute of the user profile to apply to user traffic by default
<number> Enter the default user profile attribute for the security object (Default: 0; Range: 0-4095)
security-object <string> dhcp-server lease-time <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
dhcp-server Set DHCP-server parameters
lease-time Set the lease time
<number> Enter the lease time in seconds (Default: 10; Range: 5-36000)
security-object <string> dhcp-server renewal-response {renew-nak-unicast|keep-silent}
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
dhcp-server Set DHCP-server parameters
renewal-response Set the response to a DHCP lease renewal request for a nonexistent lease
renew-nak-unicast Respond to a DHCP lease renewal request for a nonexistent lease with a unicast DHCP-NAK message (Default: Broadcast a DHCP-NAK message)
keep-silent Do not respond to a DHCP lease renewal request for a nonexistent lease (Default: Broadcast a DHCP-NAK message)
security-object <string> mobile-device-policy <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
mobile-device-policy Set a policy that assigns a user profile to traffic from a client based on the originally assigned user profile and the MAC OUI, domain, and OS of the user's client
<string> Enter a mobile device policy name (1-32 chars)
security-object <string> ppsk-web-server auth-user
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
ppsk-web-server Set parameters for redirecting HTTP or HTTPS traffic to the HiveAP hosting a private PSK web server
auth-user Send credentials submitted by users during private PSK self-registration to a RADIUS server for authentication before issuing private PSKs to them
security-object <string> ppsk-web-server bind-to-ppsk-ssid <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
ppsk-web-server Set parameters for redirecting HTTP or HTTPS traffic to the HiveAP hosting a private PSK web server
bind-to-ppsk-ssid Bind the SSID referencing this security object, which must be set with open authentication and an external captive web portal, to an SSID using private PSKs so the PSKs can be assigned to users automatically
<string> Enter the name of the SSID using private PSK authentication (1-32 chars)
security-object <string> ppsk-web-server https
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
ppsk-web-server Set parameters for redirecting HTTP or HTTPS traffic to the HiveAP hosting a private PSK web server
https Use HTTPS for redirection from the private PSK authenticator to the private PSK server (Default: HTTP)
security-object <string> ppsk-web-server login-page <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
ppsk-web-server Set parameters for redirecting HTTP or HTTPS traffic to the HiveAP hosting a private PSK web server
login-page Specify the .cgi file on the private PSK web server through which the user registers (Default: ppsk-index.cgi)
<string> Enter the .cgi file name for the registration page (1-32 chars; Note: The file name cannot be index.cgi.)
security-object <string> ppsk-web-server login-script <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
ppsk-web-server Set parameters for redirecting HTTP or HTTPS traffic to the HiveAP hosting a private PSK web server
login-script Specify the .cgi file that the private PSK web server uses for processing user registration requests (Default: ppsk-login.cgi)
<string> Enter the script name (1-32 chars)
security-object <string> ppsk-web-server web-directory <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
ppsk-web-server Set parameters for redirecting HTTP or HTTPS traffic to the HiveAP hosting a private PSK web server
web-directory Set the name of the web directory containing the login page and script files that the private PSK web server uses
<string> Enter the web directory name (1-32 chars)
security-object <string> security aaa radius-server [ first-retry-interval <number> ] [ max-retries <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
first-retry-interval Set the initial interval to wait for a RADIUS auth or accounting server to reply before resending a request(Note: A NAS makes repeated requests before failing over to a backup server, and the interval for each successive attempt is double that of the previous one. Example: If an initial interval is 3 secs, 3 retry intervals are 3-6-12.)
<number> Enter the initial retry interval in seconds (Range: 1-5; Default: 3)
max-retries Set the maximum number of retries to elicit a response from the RADIUS server before failing over to a backup RADIUS server (if a backup server is configured)
<number> Enter the maximum number of retries (Range: 1-5; Default: 3)
security-object <string> security aaa radius-server account-interim-interval <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
account-interim-interval Set the interval in seconds for sending RADIUS accounting updates
<number> Enter the interval in seconds for sending RADIUS accounting updates (Default: 600 secs; Range: 10-100000000)
security-object <string> security aaa radius-server accounting {primary|backup1|backup2|backup3} <ip_addr|string> [ shared-secret <string> ] [ acct-port <number> ] [ via-vpn-tunnel ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
accounting Set parameters for a RADIUS accounting server
primary Set the RADIUS accounting server to which the HiveAP sends Accounting-Request packets first
backup1 Set the RADIUS accounting server to which the HiveAP sends Accounting-Request packets if the primary server does not respond
backup2 Set the RADIUS accounting server to which the HiveAP sends Accounting-Request packets if the backup1 server does not respond
backup3 Set the RADIUS accounting server to which the HiveAP sends Accounting-Request packets if the backup2 server does not respond
<ip_addr> Enter the IP address or domain name for the RADIUS accounting server (max 32 chars)
<string> Enter the IP address or domain name for the RADIUS accounting server (max 32 chars)
shared-secret Set the shared secret for securing communications with RADIUS accounting servers
<string> Enter the shared secret (1-64 chars)
acct-port Set the RADIUS accounting port number
<number> Enter the RADIUS accounting port number (Default: 1813; Range: 1-65535)
via-vpn-tunnel Send all RADIUS traffic through a VPN tunnel (Note: Set this option on VPN clients when the RADIUS server is in a different subnet from the tunnel interface. When they are in the same subnet, tunneling is automatic.)
security-object <string> security aaa radius-server dynamic-auth-extension
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
dynamic-auth-extension Enable the HiveAP acting as a NAS to accept unsolicited messages from the RADIUS authentication server (Default: Disabled)
security-object <string> security aaa radius-server idm [ pri ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
idm Set ID Manager as RADIUS server
pri Set the ID Manager RADIUS server to have the highest priority
security-object <string> security aaa radius-server idm acct-disable
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
idm Set ID Manager as RADIUS server
acct-disable Disable the accounting function in the AP when using ID Manager authentication (Default: Enabled)
security-object <string> security aaa radius-server inject Operator-Name
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
inject Set injection parameters for RADIUS Access-Request and Accounting-Request packets
Operator-Name Set the operator name of the RADIUS Access-Request and Accounting-Request packets (Note: The operator name contains the operator namespace ID and the operator name. The operator name is combined with the namespace ID to uniquely identify the owner of the access network.)
security-object <string> security aaa radius-server retry-interval <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
retry-interval Set RADIUS server retry interval
<number> Enter RADIUS server retry interval (Default: 600 secs; Range: 60-100000000)
security-object <string> security aaa radius-server {primary|backup1|backup2|backup3} <ip_addr|string> [ shared-secret <string> ] [ auth-port <number> ] [ acct-port <number> ] [ via-vpn-tunnel ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
aaa Set parameters for AAA (authentication, authorization, accounting)
radius-server Set parameters for a RADIUS (Remote Authentication Dial In User Service) server
primary Set the RADIUS server that is first queried when authenticating users
backup1 Set the RADIUS server that is queried if the primary server stops responding
backup2 Set the RADIUS server that is queried if the backup1 server stops responding
backup3 Set the RADIUS server that is queried if the backup2 server stops responding
<ip_addr> Enter an IP address or a domain name for the RADIUS server (max 32 chars)
<string> Enter an IP address or a domain name for the RADIUS server (max 32 chars)
shared-secret Set the shared secret for authenticating communications with a RADIUS server
<string> Enter the shared secret for authenticating communications with a RADIUS server (1-64 chars)
auth-port Set the RADIUS authentication port number
<number> Enter the RADIUS authentication port number (Default: 1812; Range: 1-65535)
acct-port Set the RADIUS accounting port number
<number> Enter the RADIUS accounting port number (Default: 0; Range: 0-65535)
via-vpn-tunnel Send all RADIUS traffic through a VPN tunnel (Note: Set this option on VPN clients when the RADIUS server is in a different subnet from the tunnel interface. When they are in the same subnet, tunneling is automatic.)
security-object <string> security aaa user-profile-mapping attribute-id <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
aaa Set parameters for AAA (authentication, authorization, accounting)
user-profile-mapping Map an attribute value returned in RADIUS-Accept messages to a user profile attribute
attribute-id Set an ID for a RADIUS attribute that contains the text that maps to the user profile (Default: 11; Note: Attribute ID 11 corresponds to the Filter-ID RADIUS attribute.)
<number> Enter the RADIUS attribute ID number (Range: 1-255)
security-object <string> security aaa user-profile-mapping enable
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
aaa Set parameters for AAA (authentication, authorization, accounting)
user-profile-mapping Map an attribute value returned in RADIUS-Accept messages to a user profile attribute
enable Enable the mapping of attribute values to user profile attributes (Default: Disabled)
security-object <string> security aaa user-profile-mapping vendor-id <number> attribute-id <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
aaa Set parameters for AAA (authentication, authorization, accounting)
user-profile-mapping Map an attribute value returned in RADIUS-Accept messages to a user profile attribute
vendor-id Set a vendor ID RADIUS attribute
<number> Enter the vendor ID number (Range: 1-65535)
attribute-id Set an ID for a private RADIUS attribute
<number> Enter the private RADIUS attribute ID number to be combined with the vendor ID number (Range: 1-255)
security-object <string> security additional-auth-method captive-web-portal [ reg-user-profile-attr <number> ] [ auth-user-profile-attr <number> ] [ timeout <number> ] [ timer-display ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
reg-user-profile-attr Set the registered user profile attribute
<number> Enter the registered user profile attribute (Default: 0; Range: 0-4095)
auth-user-profile-attr Set the default authenticated user profile
<number> Enter the default authenticated user profile (Default: 0; Range: 0-4095)
timeout Set the default timeout for a registered user's session (Note: A timeout provided by an external authentication server overrides this setting.)
<number> Enter the timeout in minutes (Default: 720 mins; Range: 1-120960)
timer-display Enable timer-display windows to communicate login and session information
security-object <string> security additional-auth-method captive-web-portal anonymous-access
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
anonymous-access Enable anonymous access which will indicate users to read and accept the network use policy and apply a time and data usage limit to the client (Default: Disabled)
security-object <string> security additional-auth-method captive-web-portal apple-wispr-bypass
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
apple-wispr-bypass Set AP bypass the WISPr from apple devices(Default: Disabled)
security-object <string> security additional-auth-method captive-web-portal auth-method [ {pap|chap|ms-chap-v2} ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
auth-method Set the CWP (captive web portal) user authentication method
pap Set PAP (Password Authentication Protocol) as the method for sending authentication requests between the HiveAP and RADIUS server (Default: PAP)
chap Set CHAP (Challenge-Handshake Authentication Protocol) as the method for sending authentication requests between the HiveAP and RADIUS server (Default: PAP)
ms-chap-v2 Set MS-CHAP-v2 (Microsoft CHAP Version 2) as the method for sending authentication requests between the HiveAP and RADIUS server (Default: PAP)
security-object <string> security additional-auth-method captive-web-portal check-use-policy
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
check-use-policy Check if users select the check box on the login page to indicate they have read and accepted the network use policy (Note: This option only applies to captive web portals that require user authentication and use policy acceptance.)
security-object <string> security additional-auth-method captive-web-portal cloud-cwp api-key <string> api-nonce <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
cloud-cwp Set a cloud captive web portal for additional user authentication or registration
api-key Set the API key used to encrypt traffic between the Aerohive device and the cloud services
<string> Enter the API key (16 chars)
api-nonce Set the API nonce
<string> Enter the API nonce (1-64 chars)
security-object <string> security additional-auth-method captive-web-portal cloud-cwp customer-id <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
cloud-cwp Set a cloud captive web portal for additional user authentication or registration
customer-id Set customer ID for cloud captive web portal
<string> Enter the customer ID (1-16 chars)
security-object <string> security additional-auth-method captive-web-portal cloud-cwp enable
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
cloud-cwp Set a cloud captive web portal for additional user authentication or registration
enable Enable cloud captive web portal
security-object <string> security additional-auth-method captive-web-portal cloud-cwp service-id <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
cloud-cwp Set a cloud captive web portal for additional user authentication or registration
service-id Set the service ID for cloud captive web portal
<number> Enter service ID number(Range: 1-255)
security-object <string> security additional-auth-method captive-web-portal cloud-cwp url-root-path <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
cloud-cwp Set a cloud captive web portal for additional user authentication or registration
url-root-path Set the root URL path to register CWP portal service
<string> Enter the HTTP protocol, remote server domain name, port, directory path(Range: 1-256 chars, Format: https://domain/path)
security-object <string> security additional-auth-method captive-web-portal default-language {chinese-simple|chinese-traditional|dutch|english|french|german|italian|korean|spanish|portuguese|swedish|japanese|norwegian|danish}
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
default-language Set the default language for the captive web portal web pages
chinese-simple Set Simple Chinese as the default language
chinese-traditional Set Traditional Chinese as the default language
dutch Set Dutch as the default language
english Set English as the default language
french Set French as default language
german Set German as the default language
italian Set Italian as the default language
korean Set Korean as the default language
spanish Set Spanish as the default language
portuguese Set Portuguese as default language
swedish Set Swedish as the default language
japanese Set Japanese as the default language
norwegian Set Norwegian as the default language
danish Set Danish as the default language
security-object <string> security additional-auth-method captive-web-portal external-server {primary} login-page <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
external-server Set parameters for the primary or backup external captive web portal server
primary Set parameters for the primary external captive web portal server
login-page Set the login page to which the HiveAP redirects traffic from unregistered users
<string> Enter the login page URL (1-256 chars; Format: http:///.php/; Example: http://10.1.1.20/weblogin.php/5)
security-object <string> security additional-auth-method captive-web-portal external-server {primary} password-encryption uam-basic
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
external-server Set parameters for the primary or backup external captive web portal server
primary Set parameters for the primary external captive web portal server
password-encryption Set the method for encrypting the user password that the HiveAP forwards to the RADIUS server
uam-basic Set the encryption method as UAM (User Authentication Module)-Basic (Note: The HiveAP uses XOR to recover the password encrypted by the external CWP and sends it to the RADIUS server. PAP, CHAP, or MSCHAPv2 can be used. Default: No encryption)
security-object <string> security additional-auth-method captive-web-portal external-server {primary} password-encryption uam-shared <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
external-server Set parameters for the primary or backup external captive web portal server
primary Set parameters for the primary external captive web portal server
password-encryption Set the method for encrypting the user password that the HiveAP forwards to the RADIUS server
uam-shared Set the encryption method as UAM-Shared (Note: The HiveAP sends the user password encrypted by the external CWP and the means for the RADIUS server to perform the same operation and validate the user's password by comparing results. CHAP must be used. Default: No encryption)
<string> Enter the shared secret (1-128 chars)
security-object <string> security additional-auth-method captive-web-portal external-server {primary} {success-register|no-roaming-at-login|no-radius-auth}
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
external-server Set parameters for the primary or backup external captive web portal server
primary Set parameters for the primary external captive web portal server
success-register Permit network access without first disconnecting the client after it registers on the external captive web portal (Default: Permit network access only after an initial client disconnection)
no-roaming-at-login Disable roaming support for clients while they log in (Default: Enabled)
no-radius-auth Disable RADIUS authentication when the external captive web portal returns an attribute indicating that the user has already been authenticated
security-object <string> security additional-auth-method captive-web-portal failure-redirect external-page <string> [ delay <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
failure-redirect Set options for the page shown to a user after an unsuccessful registration attempt
external-page Display a page stored on an external web server that indicates the login attempt was unsuccessful
<string> Enter the URL for the page on the external web server (1-256 chars; Format: http:///.html or https: ///.html)
delay Set the length of time to display a message that the registration succeeded before redirecting the user to an external web page
<number> Enter the length of time in seconds that the HiveAP displays the message (Default: 5; Range: 5-60)
security-object <string> security additional-auth-method captive-web-portal failure-redirect login-page [ delay <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
failure-redirect Set options for the page shown to a user after an unsuccessful registration attempt
login-page Display the login page again
delay Set the length of time to display a message that the registration succeeded before redirecting the user to an external web page
<number> Enter the length of time that the HiveAP displays the message (Default: 5 seconds; Range: 5-60 seconds)
security-object <string> security additional-auth-method captive-web-portal internal-pages {no-success-page|no-failure-page}
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
internal-pages Set options for showing pages stored internally on the HiveAP
no-success-page Do not display the success page stored on the HiveAP when a registration attempt is successful (Default: Display)
no-failure-page Do not display the failure page stored on the HiveAP when a registration attempt is unsuccessful (Default: Display)
security-object <string> security additional-auth-method captive-web-portal internal-servers
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
internal-servers Enable internal servers to process unregistered users' DHCP and DNS traffic
security-object <string> security additional-auth-method captive-web-portal login-page-method http302
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
login-page-method Set the method to redirect the user to the login page
http302 Use HTTP 302 redirect code as the redirection method (Default: JavaScript)
security-object <string> security additional-auth-method captive-web-portal pass-through vlan <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
pass-through Set the captive web portal to pass DHCP, DNS, and ICMP traffic from unregistered users to external servers
vlan Set the VLAN ID to assign users before and after registration (Note: This setting overrides any VLAN ID set locally or received from a RADIUS server.)
<number> Enter a CWP VLAN ID (Range: 1-4094)
security-object <string> security additional-auth-method captive-web-portal process-sip-info
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
process-sip-info Enable the captive web portal to process library SIP information (Default: Enabled)
security-object <string> security additional-auth-method captive-web-portal process-sip-info block-redirect <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
process-sip-info Enable the captive web portal to process library SIP information (Default: Enabled)
block-redirect Set the page that appears when a library patron logs in but is denied network access because of overdue fines
<string> Enter the URL for the page to which the patron is redirected to submit payment (Max 256 chars; Format: http:///.html or https: ///.html)
security-object <string> security additional-auth-method captive-web-portal report-guest-info
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
report-guest-info Enable the reporting to HiveManager of information that guests enter during registration, such as their first and last names, email address, the person they are visiting, and so on (Default: Disabled)
security-object <string> security additional-auth-method captive-web-portal self-reg-via-idm
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
self-reg-via-idm Enable self register via ID Mananger (Default: Disabled)
security-object <string> security additional-auth-method captive-web-portal self-reg-via-idm crl-file <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
self-reg-via-idm Enable self register via ID Mananger (Default: Disabled)
crl-file Set the URL of the CRL file for validate the ID Manager server certificate
<string> Enter the URL of CRL file (1-256 chars)
security-object <string> security additional-auth-method captive-web-portal self-reg-via-idm {api|v2-api} <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
self-reg-via-idm Enable self register via ID Mananger (Default: Disabled)
api Set the URL of the API for register via ID Mananger
v2-api Set the URL for API v2 to register via ID Manager
<string> Enter the URL of API (1-256 chars)
security-object <string> security additional-auth-method captive-web-portal server-name <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
server-name Set a domain name for the local web server (Default server name: IP address of the interface on which the captive web portal will operate; Note: The authoritative DNS server must be configured to resolve this domain name to the interface IP address.)
<string> Enter the domain name for the web server (1-32 chars)
security-object <string> security additional-auth-method captive-web-portal server-name cert-dn
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
server-name Set a domain name for the local web server (Default server name: IP address of the interface on which the captive web portal will operate; Note: The authoritative DNS server must be configured to resolve this domain name to the interface IP address.)
cert-dn Set the same domain name as the CN value in the certificate that the captive web portal uses for HTTPS (Note: The CN must be a valid domain name that can be resolved to the IP address of the interface hosting the portal. The CN max length is 32 chars.)
security-object <string> security additional-auth-method captive-web-portal success-redirect external-page <string> [ delay <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
success-redirect Set options for displaying the page shown to a user after a successful registration
external-page Display a page stored on an external web server
<string> Enter the URL for the page on the external web server (1-256 chars; Format: http:///.html or https: ///.html)
delay Set the length of time to display a message that the registration succeeded before redirecting the user to an external web page
<number> Enter the length of time in seconds that the HiveAP displays the message (Default: 5; Range: 5-60)
security-object <string> security additional-auth-method captive-web-portal success-redirect original-page [ delay <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
success-redirect Set options for displaying the page shown to a user after a successful registration
original-page Display the original page that the user requested
delay Set the length of time to display a message that the registration succeeded before redirecting the user to an external web page
<number> Enter the length of time that the HiveAP displays the message (Default: 5 seconds; Range: 5-60 seconds)
security-object <string> security additional-auth-method captive-web-portal timer-display alert <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
captive-web-portal Set a captive web portal for additional user authentication or registration
timer-display Enable timer-display windows to communicate login and session information
alert Notify users when their session is about to expire
<number> Enter the interval before the session expires in minutes (Default: 5 mins; Range: 1-30)
security-object <string> security additional-auth-method mac-based-auth [ {auth-method} {pap|chap|ms-chap-v2} ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mac-based-auth Use client MAC addresses as user names and passwords for RADIUS authentication (Default: Disabled)
auth-method Set user authentication method
pap Set PAP (Password Authentication Protocol) as the method for sending authentication requests between the HiveAP and RADIUS server (Default: PAP)
chap Set CHAP (Challenge-Handshake Authentication Protocol) as the method for sending authentication requests between the HiveAP and RADIUS server (Default: PAP)
ms-chap-v2 Set MS-CHAP-v2 (Microsoft CHAP Version 2) as the method for sending authentication requests between the HiveAP and RADIUS server (Default: PAP)
security-object <string> security additional-auth-method mac-based-auth fallback-to-ecwp
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mac-based-auth Use client MAC addresses as user names and passwords for RADIUS authentication (Default: Disabled)
fallback-to-ecwp Redirect HTTP/HTTPS traffic to an external captive web portal if MAC-based authentication fails on the RADIUS server
security-object <string> security additional-auth-method mobile-device-manager aerohive api-key <string> api-instance-id <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
aerohive Set connection and access parameters for the aerohive MDM (Aerohive MDM server) to enforce client management such as mobile device enrollment
api-key Set the API key for location group to enable API access on the aerohive MDM
<string> Enter the API key (16 chars)
api-instance-id Set the API instance ID
<string> Enter the instance ID (1-64 chars)
security-object <string> security additional-auth-method mobile-device-manager aerohive onboard access-ssid <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
aerohive Set connection and access parameters for the aerohive MDM (Aerohive MDM server) to enforce client management such as mobile device enrollment
onboard Enable onboard procedures
access-ssid Set SSID for onboard accessing
<string> Enter an SSID profile name (1-32 chars)
security-object <string> security additional-auth-method mobile-device-manager airwatch api-key <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
airwatch Set connection and access parameters for the AirWatch (AirWatch MDM server) to enforce client management such as mobile device enrollment
api-key Set the API key for location group to enable API access on the AirWatch
<string> Enter the API key for location group (1-128 chars)
security-object <string> security additional-auth-method mobile-device-manager airwatch non-compliant disconnect-for-vlan-change
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
airwatch Set connection and access parameters for the AirWatch (AirWatch MDM server) to enforce client management such as mobile device enrollment
non-compliant Set the non-compliant parameters
disconnect-for-vlan-change Disconnect the station when the VLAN is changed
security-object <string> security additional-auth-method mobile-device-manager airwatch non-compliant guest-upid <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
airwatch Set connection and access parameters for the AirWatch (AirWatch MDM server) to enforce client management such as mobile device enrollment
non-compliant Set the non-compliant parameters
guest-upid Set the user profile attribute number for non-compliant device
<number> Enter the default user profile attribute number (Range: 0-4095)
security-object <string> security additional-auth-method mobile-device-manager airwatch non-compliant send-message content <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
airwatch Set connection and access parameters for the AirWatch (AirWatch MDM server) to enforce client management such as mobile device enrollment
non-compliant Set the non-compliant parameters
send-message Set the send message parameters
content Set the content of message
<string> Enter the content of the message (1-140 chars)
security-object <string> security additional-auth-method mobile-device-manager airwatch non-compliant send-message title <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
airwatch Set connection and access parameters for the AirWatch (AirWatch MDM server) to enforce client management such as mobile device enrollment
non-compliant Set the non-compliant parameters
send-message Set the send message parameters
title Set Set the subject of the message (Note: The title only takes effect when message type is email.)
<string> Enter the subject of the message (1-32 chars)
security-object <string> security additional-auth-method mobile-device-manager airwatch non-compliant send-message type {email|sms|push|all}
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
airwatch Set connection and access parameters for the AirWatch (AirWatch MDM server) to enforce client management such as mobile device enrollment
non-compliant Set the non-compliant parameters
send-message Set the send message parameters
type Set the message type
email Send message using email
sms Send message using SMS (Short Message Service)
push Send message using push
all Send message using all of push, email and SMS
security-object <string> security additional-auth-method mobile-device-manager airwatch url-enrollment <url>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
airwatch Set connection and access parameters for the AirWatch (AirWatch MDM server) to enforce client management such as mobile device enrollment
url-enrollment Set the enrollment URL path on the AirWatch
<url> Enter the HTTP protocol, remote server domain name, port, directory path, and file name (Default port: 80; 1-256 chars; Format: http://domain/path or http://domain:port/path; Note: You can substitute "https" for "http".)
security-object <string> security additional-auth-method mobile-device-manager airwatch url-rest-api <url>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
airwatch Set connection and access parameters for the AirWatch (AirWatch MDM server) to enforce client management such as mobile device enrollment
url-rest-api Set the REST API URL path on the AirWatch
<url> Enter the HTTP protocol, remote server domain name, port, directory path, and file name (Default port: 80; 1-256 chars; Format: http://domain/path or http://domain:port/path; Note: You can substitute "https" for "http".)
security-object <string> security additional-auth-method mobile-device-manager {jss|aerohive} url-root-path <url>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
jss Set connection and access parameters for the JSS (JAMF software server) to enforce client management such as mobile device enrollment
aerohive Set connection and access parameters for the aerohive MDM (Aerohive MDM server) to enforce client management such as mobile device enrollment
url-root-path Set the root URL path to the "/enroll" page on the JSS (Note: A JSS always displays the device enrollment page at "/enroll", so enter just the root URL path that precedes "/enroll".)
<url> Enter the HTTP protocol, remote server domain name, port, directory path, and file name (Default port: 80; 1-256 chars; Format: http://domain/path or http://domain:port/path; Note: You can substitute "https" for "http".)
security-object <string> security additional-auth-method mobile-device-manager {jss|airwatch|aerohive} enable
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
jss Set connection and access parameters for the JSS (JAMF software server) to enforce client management such as mobile device enrollment
airwatch Set connection and access parameters for the AirWatch (AirWatch MDM server) to enforce client management such as mobile device enrollment
aerohive Set connection and access parameters for the aerohive MDM (Aerohive MDM server) to enforce client management such as mobile device enrollment
enable Enable client management through MDM
security-object <string> security additional-auth-method mobile-device-manager {jss|airwatch|aerohive} os-object <string> [ {ios|mac-os} ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
jss Set connection and access parameters for the JSS (JAMF software server) to enforce client management such as mobile device enrollment
airwatch Set connection and access parameters for the AirWatch (AirWatch MDM server) to enforce client management such as mobile device enrollment
aerohive Set connection and access parameters for the aerohive MDM (Aerohive MDM server) to enforce client management such as mobile device enrollment
os-object Set the name of an OS of clients whose network traffic you want the Aerohive device to redirect to the MDM server for enrollment
<string> Enter the OS object name (1-32 chars)
ios Define the type of OS object as Apple iOS (Default client OS type: iOS; Note: JSS only supports iOSv4 or later.)
mac-os Define the type of OS object as Apple Mac OS (Default client OS type: iOS)
security-object <string> security additional-auth-method mobile-device-manager {jss|airwatch} http-auth user <string> password <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
jss Set connection and access parameters for the JSS (JAMF software server) to enforce client management such as mobile device enrollment
airwatch Set connection and access parameters for the AirWatch (AirWatch MDM server) to enforce client management such as mobile device enrollment
http-auth Set parameters for HTTP authentication when the HiveAP connects to the MDM server
user Set the user name for HTTP authentication
<string> Enter the user name (1-32 chars)
password Set the password for HTTP authentication
<string> Enter the password (1-32 chars)
security-object <string> security additional-auth-method mobile-device-manager {jss|airwatch} poll-status [ interval <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
additional-auth-method Set an additional authentication method in addition to the one in the security protocol suite
mobile-device-manager Set the mobile device manager parameters
jss Set connection and access parameters for the JSS (JAMF software server) to enforce client management such as mobile device enrollment
airwatch Set connection and access parameters for the AirWatch (AirWatch MDM server) to enforce client management such as mobile device enrollment
poll-status Query the station for enrollment and compliance status periodically
interval Set the query interval
<number> Enter the query interval in seconds (Default: 60; Range: 30-600)
security-object <string> security auth-mode host-based
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
auth-mode Set the authentication mode (Default: host based)
host-based Permit 802.1X authentication for multiple hosts on the same port (Note: For a single domain, the RADIUS server must assign all hosts to the same VLAN. Traffic from an authenticated host assigned to a different VLAN is dropped.)
security-object <string> security auth-mode {port-based} [ failure-user-profile-attr <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
auth-mode Set the authentication mode (Default: host based)
port-based Limit 802.1X authentication to a single host per port
failure-user-profile-attr Set the user profile attribute to assign users who do not pass the authentication check
<number> Enter the failure user profile attribute (Range: 0-4095)
security-object <string> security eap retries <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
eap Set parameters for exchanging EAP packets during 802.1X authentication
retries Set the number of times that the HiveAP will resend an EAP packet when it receives no response from a client
<number> Enter the number of retries (Default: 3; Range: 1-5)
security-object <string> security eap timeout <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
eap Set parameters for exchanging EAP packets during 802.1X authentication
timeout Set the interval that the HiveAP waits for a client to respond before resending an EAP packet
<number> Enter the EAP timeout in seconds (Default: 30; Range: 5-300)
security-object <string> security initial-auth-method mac-based-auth
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
initial-auth-method Set the user authentication method to apply first
mac-based-auth Apply MAC-based authentcation first (Note: By default, 802.1X authentication is applied first.)
security-object <string> security local-cache timeout <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
local-cache Set parameters for storing PMK (pairwise master key) entries in the local cache
timeout Set the length of time to keep PMK entries before deleting them
<number> Enter the timeout in seconds (Default: 86400; that is, 1 day; Range: 60-604800; that is, 1 minute to 7 days)
security-object <string> security mac-white-list bypass-cwp
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
mac-white-list Set parameters for a list of MAC addresses, in which the login station would have some special liberty once its MAC address exists (Note: The whitelist can have up to 8 entries.)
bypass-cwp Enable bypassing CWP(captive web portal) authentication process for the stations which MAC addresses exist in current security object's MAC white list (Default: Disabled)
security-object <string> security mac-white-list mac-object <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
mac-white-list Set parameters for a list of MAC addresses, in which the login station would have some special liberty once its MAC address exists (Note: The whitelist can have up to 8 entries.)
mac-object Add a MAC object to current MAC white list
<string> Enter the MAC object name (1-32 chars)
security-object <string> security preauth [ interface <ethx|wifix.y> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
preauth Set an interface to accept pre-authenticated 802.1X frames for fast roaming
interface Set an interface to accept pre-authenticated 802.1X frames for fast roaming
<ethx> Enter the name of an Ethernet interface, where x = 0
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
security-object <string> security private-psk
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
private-psk Set the parameters for creating individual user PSKs (preshared keys)
security-object <string> security private-psk both [ {parallel} ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
private-psk Set the parameters for creating individual user PSKs (preshared keys)
both Set a security object for both external and local servers simultaneously (Default: Disabled)
parallel Set AP do authentication in IDM and local PPSK server at the same time(Default: Disabled)
security-object <string> security private-psk default-psk-disabled
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
private-psk Set the parameters for creating individual user PSKs (preshared keys)
default-psk-disabled Disable the default PSK (Default: Enabled)
security-object <string> security private-psk external-server [ {web-portal} ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
private-psk Set the parameters for creating individual user PSKs (preshared keys)
external-server Look up private PSKs that users submit on an external private PSK server
web-portal Enable the creation of a new private PSK when the current PSK expires (Default: disabled)
security-object <string> security private-psk mac-binding-enable
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
private-psk Set the parameters for creating individual user PSKs (preshared keys)
mac-binding-enable Enable the automatic binding of a private PSK to a MAC address (Default: Disabled)
security-object <string> security private-psk ppsk-server <ip_addr>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
private-psk Set the parameters for creating individual user PSKs (preshared keys)
ppsk-server Set the HiveAP private PSK server to which other hive members redirect users to self-register and receive private PSK assignments automatically
<ip_addr> Enter the mgt0 IP address of the HiveAP private PSK server
security-object <string> security private-psk radius-auth [ {pap|chap|ms-chap-v2} ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
private-psk Set the parameters for creating individual user PSKs (preshared keys)
radius-auth Enable the HiveAP to forward authentication checks for private PSKs to an external RADIUS server and set the method for authenticating communications with it (Default: disabled)
pap Set PAP (Password Authentication Protocol) as the method for sending authentication requests between the HiveAP and RADIUS server (Default: PAP)
chap Set CHAP (Challenge-Handshake Authentication Protocol) as the method for sending authentication requests between the HiveAP and RADIUS server (Default: PAP)
ms-chap-v2 Set MS-CHAP-v2 (Microsoft CHAP Version 2) as the method for sending authentication requests between the HiveAP and RADIUS server (Default: PAP)
security-object <string> security private-psk same-user-limit <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
private-psk Set the parameters for creating individual user PSKs (preshared keys)
same-user-limit Set a limit for the number of private PSK users that can be authenticated with the same user name and PSK concurrently
<number> Enter the maximum number of private PSK users that can use the same user name and PSK concurrently (Default: 0, which means there is no limit; Range: 0-15)
security-object <string> security private-psk self-reg-enable
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
private-psk Set the parameters for creating individual user PSKs (preshared keys)
self-reg-enable Enable support of user self-registration (Default: Enabled)
security-object <string> security protocol-suite 802.1x
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
802.1x Set the security protocol suite as 802.1X authentication
security-object <string> security protocol-suite open
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
open Set network access as 'open', meaning that user traffic is neither authenticated nor encrypted
security-object <string> security protocol-suite wep-open <number> {hex-key|ascii-key} <string> [ default ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wep-open Set the security protocol suite as preshared-key key management, WEP40/WEP104 encryption, and open authentication
<number> Enter the index to identify one of 4 possible WEP keys (Default: 0; Range: 0-3)
hex-key Set key type as hexadecimal
ascii-key Set key type as ASCII (American Standard Code for Information Interchange)
<string> Enter key value (ascii-key: a 5(WEP40)/13(WEP104) characters key; hex-key: a 10(WEP40)/26(WEP104) digit hex key)
default Set the current key as the default WEP key
security-object <string> security protocol-suite wep-shared <number> {hex-key|ascii-key} <string> [ default ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wep-shared Set the security protocol suite as preshared-key key management, WEP40/WEP104 encryption, and preshared-key authentication
<number> Enter the index to identify one of 4 possible WEP keys (Range: 0-3)
hex-key Set key type as hexadecimal
ascii-key Set key type as ASCII (American Standard Code for Information Interchange)
<string> Enter key value (ascii-key: a 5(WEP40)/13(WEP104) characters key; hex-key: a 10(WEP40)/26(WEP104) digit hex key)
default Set the current key as the default WEP key
security-object <string> security protocol-suite wep104-8021x [ rekey-period <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wep104-8021x Set the security protocol suite as 104-bit WEP encryption and EAP (802.1x) authentication
rekey-period Set the period after which a new group temporal key replaces the current one
<number> Enter the period after which a new group temporal key replaces current one (Default: 600secs; Min: 600; Max: 50000000)
security-object <string> security protocol-suite wep40-8021x [ rekey-period <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wep40-8021x Set the security protocol suite as 40-bit WEP encryption and EAP (802.1x) authentication
rekey-period Set the period after which a new group temporal key replaces the current one
<number> Enter the period after which a new group temporal key replaces current one (Default: 600secs; Min: 600; Max: 50000000)
security-object <string> security protocol-suite wpa-auto-8021x [ rekey-period <number> ] [ {non-strict|strict} ] [ gmk-rekey-period <number> ] [ ptk-timeout <number> ] [ ptk-retry <number> ] [ gtk-timeout <number> ] [ gtk-retry <number> ] [ roaming proactive-pmkid-response ] [ ptk-rekey-period <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wpa-auto-8021x Set security protocol suite as WPA-/WPA2-EAP (802.1X) key management, TKIP/AES-CCMP encryption, and EAP (802.1X) authentication
rekey-period Set the period after which a new group temporal key replaces the current one
<number> Enter the period in seconds after which a new group temporal key replaces the current one (Range: 0 or 600-50000000, where 0 means disabled; Default: 0)
non-strict Refresh the GTK (group temporal key) whenever the rekey period elapses, regardless of whether any clients disassociate (Default: non-strict)
strict Refresh the GTK whenever a client to which the security object settings are applied disconnects from the HiveAP (Default: non-strict)
gmk-rekey-period Set the GMK (group master key) rekey periodDefault: 0)
<number> Enter the interval in seconds for rekeying the GMK (Range: 0 or 600-50000000, where 0 means disabled; Default: 0)
ptk-timeout Set the interval that the HiveAP waits for client replies during the 4-way handshake in which they derive a PTK (pairwise transient key) for encrypting and decrypting unicast traffic
<number> Enter the timeout in milliseconds (Range: 100-8000; Default: 4000 milliseconds)
ptk-retry Set the maximum number of times the HiveAP will retry sending PTK messages
<number> Enter the maximum number of retries (Range: 1-10; Default: 3)
gtk-timeout Set the interval that the HiveAP waits for client replies during the 2-way handshake in which the HiveAP sends a GTK (group temporal key) to the client for encrypting and decrypting multicast traffic
<number> Enter the timeout in milliseconds (Range: 100-8000; Default: 4000 milliseconds)
gtk-retry Set the maximum number of times the HiveAP will retry sending GTK messages
<number> Enter the maximum number of retries (Range: 1-10; Default: 3)
roaming Set roaming parameters for the protocol suite
proactive-pmkid-response Respond to a client sending an empty PMK (pairwise master key) ID list with a cached PMK ID (Default: Disabled)
ptk-rekey-period Set the period after which a new PTK (pairwise transient key) replaces the current one
<number> Enter the period in seconds after which a new PTK replaces the current one (Range: 0 or 10-50000000, where 0 means disabled; Default: 0)
security-object <string> security protocol-suite wpa-auto-psk {hex-key|ascii-key} <string> [ rekey-period <number> ] [ {non-strict|strict} ] [ gmk-rekey-period <number> ] [ ptk-timeout <number> ] [ ptk-retry <number> ] [ gtk-timeout <number> ] [ gtk-retry <number> ] [ ptk-rekey-period <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wpa-auto-psk Set security protocol suite as WPA-/WPA2-PSK (preshared key) key management, TKIP or AES-CCMP encryption, open authentication
hex-key Set key type as hexadecimal
ascii-key Set key type as ASCII (American Standard Code for Information Interchange)
<string> Enter key value (ASCII key length: 8-63 chars; hexadecimal key length: 64 hex digits)
rekey-period Set the period after which a new group temporal key replaces the current one
<number> Enter the period in seconds after which a new group temporal key replaces the current one (Range: 0 or 600-50000000, where 0 means disabled; Default: 0)
non-strict Refresh the GTK (group temporal key) whenever the rekey period elapses, regardless of whether any clients disassociate (Default: non-strict)
strict Refresh the GTK whenever a client to which the security object settings are applied disconnects from the HiveAP (Default: non-strict)
gmk-rekey-period Set the GMK (group master key) rekey periodDefault: 0)
<number> Enter the interval for rekeying GMK (Group Master Key; Default: 0; Range: 0 or 600-50000000 Seconds, where 0 means disabled)
ptk-timeout Set the interval that the HiveAP waits for client replies during the 4-way handshake in which they derive a PTK (pairwise transient key) for encrypting and decrypting unicast traffic
<number> Enter the timeout in milliseconds (Range: 100-8000; Default: 4000 milliseconds)
ptk-retry Set the maximum number of times the HiveAP will retry sending PTK messages
<number> Enter the maximum number of retries (Range: 1-10; Default: 3)
gtk-timeout Set the interval that the HiveAP waits for client replies during the 2-way handshake in which the HiveAP sends a GTK (group temporal key) to the client for encrypting and decrypting multicast traffic
<number> Enter the timeout in milliseconds (Range: 100-8000; Default: 4000 milliseconds)
gtk-retry Set the maximum number of times the HiveAP will retry sending GTK messages
<number> Enter the maximum number of retries (Range: 1-10; Default: 3)
ptk-rekey-period Set the period after which a new PTK (pairwise transient key) replaces the current one
<number> Enter the period in seconds after which a new PTK replaces the current one (Range: 0 or 10-50000000, where 0 means disabled; Default: 0)
security-object <string> security protocol-suite wpa2-aes-8021x [ rekey-period <number> ] [ {non-strict|strict} ] [ gmk-rekey-period <number> ] [ ptk-timeout <number> ] [ ptk-retry <number> ] [ gtk-timeout <number> ] [ gtk-retry <number> ] [ roaming proactive-pmkid-response ] [ ptk-rekey-period <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wpa2-aes-8021x Set the security protocol suite as WPA2-EAP (802.1X) key management, AES-CCMP encryption, and EAP (802.1X) authentication
rekey-period Set the period after which a new group temporal key replaces the current one
<number> Enter the period in seconds after which a new group temporal key replaces the current one (Range: 0 or 600-50000000, where 0 means disabled; Default: 0)
non-strict Refresh the GTK (group temporal key) whenever the rekey period elapses, regardless of whether any clients disassociate (Default: non-strict)
strict Refresh the GTK whenever a client to which the security object settings are applied disconnects from the HiveAP (Default: non-strict)
gmk-rekey-period Set the GMK (group master key) rekey periodDefault: 0)
<number> Enter the interval in seconds for rekeying GMK (Group Master Key; Default: 0; Range: 0 or 600-Seconds, where 0 means disabled)
ptk-timeout Set the interval that the HiveAP waits for client replies during the 4-way handshake in which they derive a PTK (pairwise transient key) for encrypting and decrypting unicast traffic
<number> Enter the timeout in milliseconds (Range: 100-8000; Default: 4000 milliseconds)
ptk-retry Set the maximum number of times the HiveAP will retry sending PTK messages
<number> Enter the maximum number of retries (Range: 1-10; Default: 3)
gtk-timeout Set the interval that the HiveAP waits for client replies during the 2-way handshake in which the HiveAP sends a GTK (group temporal key) to the client for encrypting and decrypting multicast traffic
<number> Enter the timeout in milliseconds (Range: 100-8000; Default: 4000 milliseconds)
gtk-retry Set the maximum number of times the HiveAP will retry sending GTK messages
<number> Enter the maximum number of retries (Range: 1-10; Default: 3)
roaming Set roaming parameters for the protocol suite
proactive-pmkid-response Respond to a client sending an empty PMK (Pairwise Master Key) ID list with a cached PMK ID (Default: disabled)
ptk-rekey-period Set the period after which a new PTK (pairwise transient key) replaces the current one
<number> Enter the period in seconds after which a new PTK replaces the current one (Range: 0 or 10-50000000, where 0 means disabled; Default: 0)
security-object <string> security protocol-suite wpa2-aes-psk {hex-key|ascii-key} <string> [ rekey-period <number> ] [ {non-strict|strict} ] [ gmk-rekey-period <number> ] [ ptk-timeout <number> ] [ ptk-retry <number> ] [ gtk-timeout <number> ] [ gtk-retry <number> ] [ ptk-rekey-period <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wpa2-aes-psk Set the security protocol suite as WPA2-PSK (preshared key) key management, AES-CCMP encryption, and open authentication
hex-key Set key type as hexadecimal
ascii-key Set key type as ASCII (American Standard Code for Information Interchange)
<string> Enter key value (ASCII key length: 8-63 chars; hexadecimal key length: 64 hex digits)
rekey-period Set the period after which a new group temporal key replaces the current one
<number> Enter the period after which a new group temporal key replaces the current one (Default: 0; Range: 0 or 600-50000000 Seconds, where 0 means disabled)
non-strict Refresh the GTK (group temporal key) whenever the rekey period elapses, regardless of whether any clients disassociate (Default: non-strict)
strict Refresh the GTK whenever a client to which the security object settings are applied disconnects from the HiveAP (Default: non-strict)
gmk-rekey-period Set the GMK (group master key) rekey periodDefault: 0)
<number> Enter the interval for rekeying GMK (Group Master Key; Default: 0; Range: 0 or 600-50000000 Seconds, where 0 means disabled)
ptk-timeout Set the interval that the HiveAP waits for client replies during the 4-way handshake in which they derive a PTK (pairwise transient key) for encrypting and decrypting unicast traffic
<number> Enter the timeout in milliseconds (Range: 100-8000; Default: 4000 milliseconds)
ptk-retry Set the maximum number of times the HiveAP will retry sending PTK messages
<number> Enter the maximum number of retries (Range: 1-10; Default: 3)
gtk-timeout Set the interval that the HiveAP waits for client replies during the 2-way handshake in which the HiveAP sends a GTK (group temporal key) to the client for encrypting and decrypting multicast traffic
<number> Enter the timeout in milliseconds (Range: 100-8000; Default: 4000 milliseconds)
gtk-retry Set the maximum number of times the HiveAP will retry sending GTK messages
<number> Enter the maximum number of retries (Range: 1-10; Default: 3)
ptk-rekey-period Set the period after which a new PTK (pairwise transient key) replaces the current one
<number> Enter the period in seconds after which a new PTK replaces the current one (Range: 0 or 10-50000000, where 0 means disabled; Default: 0)
security-object <string> security protocol-suite wpa2-tkip-8021x [ rekey-period <number> ] [ {non-strict|strict} ] [ gmk-rekey-period <number> ] [ ptk-timeout <number> ] [ ptk-retry <number> ] [ gtk-timeout <number> ] [ gtk-retry <number> ] [ roaming proactive-pmkid-response ] [ ptk-rekey-period <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wpa2-tkip-8021x Set the security protocol suite as WPA2-EAP (802.1X) key management, TKIP encryption, and EAP (802.1X) authentication
rekey-period Set the period after which a new group temporal key replaces the current one
<number> Enter the period in seconds after which a new group temporal key replaces the current one (Range: 0 or 600-50000000, where 0 means disabled; Default: 0)
non-strict Refresh the GTK (group temporal key) whenever the rekey period elapses, regardless of whether any clients disassociate (Default: non-strict)
strict Refresh the GTK whenever a client to which the security object settings are applied disconnects from the HiveAP (Default: non-strict)
gmk-rekey-period Set the GMK (group master key) rekey periodDefault: 0)
<number> Enter the interval for rekeying GMK (Group Master Key; Default: 0; Range: 0 or 600-50000000 Seconds, where 0 means disabled)
ptk-timeout Set the interval that the HiveAP waits for client replies during the 4-way handshake in which they derive a PTK (pairwise transient key) for encrypting and decrypting unicast traffic
<number> Enter the timeout in milliseconds (Range: 100-8000; Default: 4000 milliseconds)
ptk-retry Set the maximum number of times the HiveAP will retry sending PTK messages
<number> Enter the maximum number of retries (Range: 1-10; Default: 3)
gtk-timeout Set the interval that the HiveAP waits for client replies during the 2-way handshake in which the HiveAP sends a GTK (group temporal key) to the client for encrypting and decrypting multicast traffic
<number> Enter the timeout in milliseconds (Range: 100-8000; Default: 4000 milliseconds)
gtk-retry Set the maximum number of times the HiveAP will retry sending GTK messages
<number> Enter the maximum number of retries (Range: 1-10; Default: 3)
roaming Set roaming parameters for the protocol suite
proactive-pmkid-response Respond to a client sending an empty PMK (pairwise master key) ID list with a cached PMK ID (Default: Disabled)
ptk-rekey-period Set the period after which a new PTK (pairwise transient key) replaces the current one
<number> Enter the period in seconds after which a new PTK replaces the current one (Range: 0 or 10-50000000, where 0 means disabled; Default: 0)
security-object <string> security protocol-suite wpa2-tkip-psk {hex-key|ascii-key} <string> [ rekey-period <number> ] [ {non-strict|strict} ] [ gmk-rekey-period <number> ] [ ptk-timeout <number> ] [ ptk-retry <number> ] [ gtk-timeout <number> ] [ gtk-retry <number> ] [ ptk-rekey-period <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wpa2-tkip-psk Set the security protocol suite as WPA2-PSK (preshared key) key management, TKIP encryption, and open authentication
hex-key Set key type as hexadecimal
ascii-key Set key type as ASCII (American Standard Code for Information Interchange)
<string> Enter key value (ASCII key length: 8-63 chars; hexadecimal key length: 64 hex digits)
rekey-period Set the period after which a new group temporal key replaces the current one
<number> Enter the period in seconds after which a new group temporal key replaces the current one (Range: 0 or 600-50000000, where 0 means disabled; Default: 0)
non-strict Refresh the GTK (group temporal key) whenever the rekey period elapses, regardless of whether any clients disassociate (Default: non-strict)
strict Refresh the GTK whenever a client to which the security object settings are applied disconnects from the HiveAP (Default: non-strict)
gmk-rekey-period Set the GMK (group master key) rekey periodDefault: 0)
<number> Enter the interval for rekeying GMK (Group Master Key; Default: 0; Range: 0 or 600-50000000 Seconds, where 0 means disabled)
ptk-timeout Set the interval that the HiveAP waits for client replies during the 4-way handshake in which they derive a PTK (pairwise transient key) for encrypting and decrypting unicast traffic
<number> Enter the timeout in milliseconds (Range: 100-8000; Default: 4000 milliseconds)
ptk-retry Set the maximum number of times the HiveAP will retry sending PTK messages
<number> Enter the maximum number of retries (Range: 1-10; Default: 3)
gtk-timeout Set the interval that the HiveAP waits for client replies during the 2-way handshake in which the HiveAP sends a GTK (group temporal key) to the client for encrypting and decrypting multicast traffic
<number> Enter the timeout in milliseconds (Range: 100-8000; Default: 4000 milliseconds)
gtk-retry Set the maximum number of times the HiveAP will retry sending GTK messages
<number> Enter the maximum number of retries (Range: 1-10; Default: 3)
ptk-rekey-period Set the period after which a new PTK (pairwise transient key) replaces the current one
<number> Enter the period in seconds after which a new PTK replaces the current one (Range: 0 or 10-50000000, where 0 means disabled; Default: 0)
security-object <string> security protocol-suite {wpa-auto-8021x[wpa2-tkip-8021x[wpa2-aes-8021x} reauth-interval <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wpa-auto-8021x[wpa2-tkip-8021x[w pa2-aes-8021x Set the default interval for reauthenticating users (no)
itv::[600~86400]Enter the defaul t reauth interval in seconds (Range: 600-86400; Default: Disabled)
reauth-interval Set the default interval for reauthenticating users
<number> Enter the default reauth interval in seconds (Range: 600-86400; Default: Disabled)
security-object <string> security protocol-suite {wpa-auto-8021x[wpa2-tkip-8021x|wpa-auto-psk[wpa2-tkip-psk[wpa2-aes-psk[wpa2-aes-8021x} replay-window <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wpa-auto-8021x[wpa2-tkip-8021x Set a window size within which the HiveAP accepts replies to previously sent messages during 4-way handshakes (no)
wnd::[0~10]Enter the number of p ackets prior to the one most recently sent to which the HiveAP will accept a reply (Default: 0; Range: 0-10)
wpa-auto-psk[wpa2-tkip-psk[wpa2- aes-psk[wpa2-aes-8021x Set a window size within which the HiveAP accepts replies to previously sent messages during 4-way handshakes (no)
wnd::[0~10]Enter the number of p ackets prior to the one most recently sent to which the HiveAP will accept a reply (Default: 0; Range: 0-10)
replay-window Set a window size within which the HiveAP accepts replies to previously sent messages during 4-way handshakes
<number> Enter the number of packets prior to the one most recently sent to which the HiveAP will accept a reply (Default: 0; Range: 0-10)
security-object <string> security protocol-suite {wpa-auto-8021x[wpa2-tkip-8021x|wpa-auto-psk[wpa2-tkip-psk} local-tkip-counter-measure
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wpa-auto-8021x[wpa2-tkip-8021x Enable the deauthentication of all previously authenticated clients when the local HiveAP detects MIC (message integrity check) failures during TKIP operations (Default: enabled)(no)
wpa-auto-psk[wpa2-tkip-psk Enable the deauthentication of all previously authenticated clients when the local HiveAP detects MIC (message integrity check) failures during TKIP operations (Default: enabled)(no)
local-tkip-counter-measure Enable the deauthentication of all previously authenticated clients when the local HiveAP detects MIC (message integrity check) failures during TKIP operations (Default: enabled)
security-object <string> security protocol-suite {wpa-auto-8021x[wpa2-tkip-8021x|wpa-auto-psk[wpa2-tkip-psk} remote-tkip-counter-measure
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wpa-auto-8021x[wpa2-tkip-8021x Enable the deauthentication of all previously authenticated clients when a client reports MIC (message integrity check) failures during TKIP operations (Default: enabled)](no)
wpa-auto-psk[wpa2-tkip-psk Enable the deauthentication of all previously authenticated clients when a client reports MIC (message integrity check) failures during TKIP operations (Default: enabled)](no)
remote-tkip-counter-measure Enable the deauthentication of all previously authenticated clients when a client reports MIC (message integrity check) failures during TKIP operations (Default: enabled)]
security-object <string> security protocol-suite {wpa2-aes-psk|wpa2-aes-8021x} mfp {mandatory|optional} [ bip ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
protocol-suite Set the security protocol suite for the security object
wpa2-aes-psk Set the security protocol suite as WPA2-PSK (preshared key) key management, AES-CCMP encryption, and open authentication
wpa2-aes-8021x Set the security protocol suite as WPA2-EAP (802.1X) key management, AES-CCMP encryption, and EAP (802.1X) authentication
mfp Enable 802.11w support of MFP (Management Frame Protection)
mandatory Require that clients support MFP
optional Use MFP only if clients support it
bip Set broadcast/multicast integrity protocol
security-object <string> security roaming cache update-interval <number> ageout <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
security Set security parameters for the security object
roaming Set roaming parameters for clients to which the security object is applied
cache Set the interval between updates and the number of times to update a station's roaming cache
update-interval Set the interval for sending roaming cache updates to neighbors
<number> Enter the roaming cache update interval in seconds (Default: 60; Range: 10-36000)
ageout Set how many times an entry must be absent from a neighbor's updates before removing it from the roaming cache
<number> Enter the number of absences required to remove an entry (Default: 60; Range: 1-1000)
security-object <string> user-profile-allowed <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
user-profile-allowed Allow network access for members of all or specified user profiles bound to the security object
<string> Enter the user profile name (1-32 chars)
security-object <string> user-profile-allowed {all}
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
user-profile-allowed Allow network access for members of all or specified user profiles bound to the security object
all Allow network access to members of all user profiles
security-object <string> user-profile-deny action ban [ <number> ] [ strict ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
user-profile-deny Set parameters for denying network access to users if they do not belong to an allowed user profile
action Set an action which will be taken if a user profile is not allowed to access this SSID
ban Set the action to ban network access for a specified length of time
<number> Enter the amount of time in seconds to perform the action (Default: 60; Range: 1-100000000)
strict Set the behavior to deauthenticate all connected stations whenever a user profile bound to the security object changes (Note: When stations reauthenticate, the user profile changes take effect.)
security-object <string> user-profile-deny action {ban-forever|disconnect} [ strict ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
user-profile-deny Set parameters for denying network access to users if they do not belong to an allowed user profile
action Set an action which will be taken if a user profile is not allowed to access this SSID
ban-forever Set the action to ban network access indefinitely
disconnect Set the action to disconnect the station from the HiveAP
strict Set the behavior to deauthenticate all connected stations whenever a user profile bound to the security object changes (Note: When stations reauthenticate, the user profile changes take effect.)
security-object <string> user-profile-policy <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
user-profile-policy Set the user profile mapping policy
<string> Enter a policy name (1-32 chars)
security-object <string> user-profile-sequence {cwp-ssid-mac|cwp-mac-ssid|ssid-cwp-mac|ssid-mac-cwp|mac-ssid-cwp|mac-cwp-ssid}
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
user-profile-sequence Set the sequential order to apply user profiles when the authentication process involves multiple components referencing different profiles (Default: mac-ssid-cwp; Note: The user profile applied last is the one that is ultimately used.)
cwp-ssid-mac Apply the user profile for a captive web portal first, SSID second, and MAC authentication last
cwp-mac-ssid Apply the user profile for a captive web portal first, MAC authentication second, and SSID last
ssid-cwp-mac Apply the user profile for an SSID first, captive web portal second, and MAC authentication last
ssid-mac-cwp Apply the user profile for an SSID first, MAC authentication second, and captive web portal last
mac-ssid-cwp Apply the user profile for MAC authentication first, SSID second, and captive web portal last
mac-cwp-ssid Apply the user profile for MAC authentication first, captive web portal second, and SSID last
security-object <string> walled-garden hostname <string> [ service {all|web} ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
walled-garden Set the parameters for a walled garden in which unregistered users can access specified servers (Maximum: 64 IP address and host name entries combined)
hostname Set the host name of a server in the walled garden
<string> Enter the domain name (1-64 chars)
service Set the service permitted to reach the server (Maximum: 8 services per IP address or host name entry)
all Permit all services
web Permit HTTP and HTTPS
security-object <string> walled-garden hostname <string> service protocol <number> port <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
walled-garden Set the parameters for a walled garden in which unregistered users can access specified servers (Maximum: 64 IP address and host name entries combined)
hostname Set the host name of a server in the walled garden
<string> Enter the domain name (1-64 chars)
service Set the service permitted to reach the server (Maximum: 8 services per IP address or host name entry)
protocol Set the protocol of the service that you want to permit
<number> Enter the protocol number (Note: UDP: 17; TCP: 6; All: 0; Range: 0-255)
port Set the port number
<number> Enter the port number (Range: 1-65535)
security-object <string> walled-garden ip-address <ip_addr|ip_addr/mask> [ service {all|web} ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
walled-garden Set the parameters for a walled garden in which unregistered users can access specified servers (Maximum: 64 IP address and host name entries combined)
ip-address Set the IP address of a server or a subnet in the walled garden
<ip_addr> Enter the IP address or subnet (Note: To define a subnet, enter the first address in the subnet, followed by a slash, and then the routing prefix bit length. Example: 10.1.1.0/24)
<ip_addr/netmask> Enter the IP address or subnet (Note: To define a subnet, enter the first address in the subnet, followed by a slash, and then the routing prefix bit length. Example: 10.1.1.0/24)
service Set the service permitted to reach the server (Maximum: 8 services per IP address or host name entry)
all Permit all services
web Permit HTTP and HTTPS
security-object <string> walled-garden ip-address <ip_addr|ip_addr/mask> service protocol <number> port <number>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
walled-garden Set the parameters for a walled garden in which unregistered users can access specified servers (Maximum: 64 IP address and host name entries combined)
ip-address Set the IP address of a server or a subnet in the walled garden
<ip_addr> Enter the IP address or subnet (Note: To define a subnet, enter the first address in the subnet, followed by a slash, and then the routing prefix bit length. Example: 10.1.1.0/24)
<ip_addr/netmask> Enter the IP address or subnet (Note: To define a subnet, enter the first address in the subnet, followed by a slash, and then the routing prefix bit length. Example: 10.1.1.0/24)
service Set the service permitted to reach the server (Maximum: 8 services per IP address or host name entry)
protocol Set the protocol of the service that you want to permit
<number> Enter the protocol number (Note: UDP: 17; TCP: 6; ICMP: 1; All: 0; Range: 0-255)
port Set the port number
<number> Enter the port number (Range: 1-65535)
security-object <string> web-directory <string>
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
web-directory Enter the web directory name for the captive web portal specified in the security object
<string> Enter the web directory name for the security object
security-object <string> web-server [ port <number> ] [ index-file <string> ] [ success-file <string> ] [ failure-file <string> ] [ ssl server-key <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
web-server Enable the internal web server
port Set the HTTP port number for the web server
<number> Enter the HTTP port number for the web server. Set the port number to 0 is disable the HTTP method (Default: 80; Range: 0-65535)
index-file Specify the .html file as the default index page
<string> Enter the .html file name (Default: index.html; Range: 1-32 chars)
success-file Specify the .html file that you want to appear after a user successfully registers through the captive web portal
<string> Enter the .html file name (Default: success.html; Range: 1-32 chars)
failure-file Specify the .html file that you want to appear after a user failed registers through the captive web portal
<string> Enter the .html file name (Default: failure.html; Range: 1-32 chars)
ssl Enable the SSL (Secure Socket Layer) method
server-key Set the server key (a X509 certificate) for SSL
<number> Enter the server key index (Default: 0; Range: 0-15)
security-object <string> web-server web-page {mandatory-field} <number> [ optional-field <number> ]
security-object Set parameters for a security object controlling network access through the SSIDs and Ethernet interfaces to which it is applied
<string> Enter the security object name (1-32 chars)
web-server Enable the internal web server
web-page Set the web pages parameters
mandatory-field Set the mandatory field numbers in login web page
<number> Enter the mandatory field numbers in login web page (Default: 4; Range: 0-8)
optional-field Set the optional field numbers in login web page
<number> Enter the optional field numbers in login web page (Default: 2; Range: 0-8)
service <string> alg {ftp|tftp|sip|dns|http}
service Set a custom service
<string> Enter service name (1-32 chars)
alg Assign an ALG (Application Level Gateway) to the service
ftp Assign an FTP (File Transfer Protocol) ALG to the service
tftp Assign a TFTP (Trivial File Transfer Protocol) ALG to the service
sip Assign a SIP (Session Initiation Protocol) ALG to the service
dns Assign a DNS (Domain Name System) ALG to the service
http Assign an HTTP (Hypertext Transfer Protocol) ALG to the service
service <string> app-id <number> [ timeout <number> ]
service Set a custom service
<string> Enter service name (1-32 chars)
app-id Assign an L7 application ID to the service
<number> Assign an L7 application ID to the service
timeout Set the service session timeout
<number> Set the session timeout value in seconds (Range: 0-65535; Default 300)
service <string> protocol <number> [ port <number> ] [ timeout <number> ]
service Set a custom service
<string> Enter service name (1-32 chars)
protocol Set the protocol used by the custom service
<number> Enter the protocol number (Range: 1-255)
port Set the destination port number for the transport protocol
<number> Enter the port number (Range: 0-65535)
timeout Set the service session timeout
<number> Set the session timeout value in seconds (Range: 0-65535; Default TCP: 300; UDP: 100; Other: 100)
service <string> protocol {tcp|udp|svp} [ port <number> ] [ timeout <number> ]
service Set a custom service
<string> Enter service name (1-32 chars)
protocol Set the protocol used by the custom service
tcp Enter the transport protocol as TCP (Transmission Control Protocol)
udp Enter the transport protocol as UDP (User Datagram Protocol)
svp Enter the transport protocol as SVP (SpectraLink Voice Priority)
port Set the destination port number for the transport protocol
<number> Enter the port number (Range: 0-65535)
timeout Set the service session timeout
<number> Set the session timeout value in seconds (Range: 0-65535; Default TCP: 300; UDP: 100; Other: 100)
show 802.1x-mac-table [ interface <ethx> ] [ mac <mac_addr> ]
show Show settings, parameters, or dynamically generated information
802.1x-mac-table Show the MAC table used for 802.1X/EAP user authentication on an Ethernet interface
interface Show interface and subinterface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
mac Specify a station MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show aaa
show Show settings, parameters, or dynamically generated information
aaa Show parameters for AAA (authentication, authorization, accounting)
show access-console
show Show settings, parameters, or dynamically generated information
access-console Show access console status and parameters
show acsp
show Show settings, parameters, or dynamically generated information
acsp Show parameters for ACSP (Advanced Channel Selection Protocol)
show acsp channel-info [ {detail|arbiter} ]
show Show settings, parameters, or dynamically generated information
acsp Show parameters for ACSP (Advanced Channel Selection Protocol)
channel-info Show channel information for ACSP
detail Show detailed channel information about the calculated cost of each channel and the factors used to determine that cost
arbiter Show information regarding the assignment of channels to hive members
show acsp neighbor
show Show settings, parameters, or dynamically generated information
acsp Show parameters for ACSP (Advanced Channel Selection Protocol)
neighbor Show acsp neighbor list
show admin manager-ip
show Show settings, parameters, or dynamically generated information
admin Show admin parameters
manager-ip Show IP addresses from which administrative traffic is accepted
show alg [ {ftp|tftp|sip|dns|http} ]
show Show settings, parameters, or dynamically generated information
alg Show ALG (Application Level Gateway) information
ftp Show FTP (File Transfer Protocol) information
tftp Show TFTP (Trivial File Transfer Protocol) information
sip Show SIP (Session Initiation Protocol) information
dns Show DNS (Domain Name System) information
http Show settings for the HTTP ALG
show alg sip calls [ <string> ]
show Show settings, parameters, or dynamically generated information
alg Show ALG (Application Level Gateway) information
sip Show SIP (Session Initiation Protocol) information
calls Show information for all currently active SIP calls
<string> Enter the call ID to show information for a specific SIP call (1 - 128 chars)
show amrp
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
show amrp Ethlink
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
Ethlink Show the number of AMRP Ethernet links, and the number of hive members and interfaces on each link
show amrp Ethlink <mac_addr>
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
Ethlink Show the number of AMRP Ethernet links, and the number of hive members and interfaces on each link
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show amrp bonjour [ <ip_addr> ]
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
bonjour Show Bonjour information
<ip_addr> Enter the BDD IPv4-address
show amrp client [ <mac_addr> ]
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
client Show information about currently active clients associated with all hive members
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show amrp dnxp cache [ <mac_addr> ]
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
dnxp Show DNXP (Dynamic Network Extension Protocol) information
cache Show the entire DNXP cache or the cached entry for a specific client
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show amrp dnxp neighbor [ <mac_addr> ]
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
dnxp Show DNXP (Dynamic Network Extension Protocol) information
neighbor Show information about all DNXP neighbors or a specific neighbor to which the local HiveAP can tunnel the traffic of roaming clients
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show amrp interface
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
interface Show AMRP statistics for access interfaces reporting client associations and backhaul interfaces exchanging route information with other AMRP nodes
show amrp interface <ethx|redx|aggx> bmt-table
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
interface Show AMRP statistics for access interfaces reporting client associations and backhaul interfaces exchanging route information with other AMRP nodes
<ethx> Enter the name of an Ethernet interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
bmt-table Broadcast Master Table
show amrp interface <ethx|redx|aggx> mac-learning
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
interface Show AMRP statistics for access interfaces reporting client associations and backhaul interfaces exchanging route information with other AMRP nodes
<ethx> Enter the name of an Ethernet interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
mac-learning Show the MAC addresses learned on this interface
show amrp interface <ethx|redx|aggx|mgtx|wifix.y>
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
interface Show AMRP statistics for access interfaces reporting client associations and backhaul interfaces exchanging route information with other AMRP nodes
<ethx> Enter the name of an Ethernet interface, where x = 0
<redx> Enter the name of the redundant interface, where x = 0
<aggx> Enter the name of the aggregate interface, where x = 0
<mgtx> Enter the name of the management interface, where x = 0
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
show amrp neighbor [ {Ethernet|WiFi} ]
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
neighbor Show AMRP neighbor information (Note: An AMRP neighbor is another hive member that is one hop away.)
Ethernet Show AMRP neighbors that connect to the local HiveAP through its Ethernet interfaces
WiFi Show AMRP neighbors that connect to the local HiveAP through its WiFi interfaces
show amrp node <ip_addr|mac_addr>
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
node Show information about all AMRP nodes or a specific node (Note: An AMRP node is another hive member in the same layer-2 domain.)
<ip_addr> Enter node address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show amrp node [ all ]
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
node Show information about all AMRP nodes or a specific node (Note: An AMRP node is another hive member in the same layer-2 domain.)
all Show amrp all node detail
show amrp tunnel [ <ip_addr> ]
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
tunnel Show a information about all DNXP, INXP (Identity Network Extension Protocol), and VPN tunnels or about a tunnel to a specific peer
<ip_addr> Enter the tunnel peer IPv4 address
show amrp tunnel route [ <ip_addr> ]
show Show settings, parameters, or dynamically generated information
amrp Show AMRP (Advanced Mobility Routing Protocol) parameters
tunnel Show a information about all DNXP, INXP (Identity Network Extension Protocol), and VPN tunnels or about a tunnel to a specific peer
route Show tunneled route
<ip_addr> Enter the tunneled route IPv4 address
show arp-cache
show Show settings, parameters, or dynamically generated information
arp-cache Show arp cache table
show auth [ interface <wifix.y|ethx> ]
show Show settings, parameters, or dynamically generated information
auth Show authentication parameters per interface
interface Show authentication parameters for special interface
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
<ethx> Enter the name of an Ethernet interface, where x = 0
show auth private-psk
show Show settings, parameters, or dynamically generated information
auth Show authentication parameters per interface
private-psk Show private PSK (preshared key) entries
show band-steering status
show Show settings, parameters, or dynamically generated information
band-steering Show settings, parameters, or dynamically generated information
status Show parameters for band steering in the WLAN
show cac summary
show Show settings, parameters, or dynamically generated information
cac Show CAC (Call Admission Control) parameters
summary Show a summary of CAC settings and statistics
show capture interface <wifix>
show Show settings, parameters, or dynamically generated information
capture Show packet capture parameters
interface Show the status of packet capturing on a radio interface
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
show capture local
show Show settings, parameters, or dynamically generated information
capture Show packet capture parameters
local Show local captured files
show capture remote-sniffer
show Show settings, parameters, or dynamically generated information
capture Show packet capture parameters
remote-sniffer Show the status and connection settings for the remote packet sniffer
show client-info-collection [ ip <ip_addr> ]
show Show settings, parameters, or dynamically generated information
client-info-collection Show client information collection result
ip Show client information by IP address
<ip_addr> Enter client IP address
show client-load-balance status
show Show settings, parameters, or dynamically generated information
client-load-balance Show settings, parameters, or dynamically generated information
status Show parameters for client load balancing in the WLAN
show client-monitor policy [ <string> ]
show Show settings, parameters, or dynamically generated information
client-monitor Show Client Monitor parameters
policy Show the parameters of all Client Monitor policies or one specified policy
<string> Enter the name of a Client Monitor policy (1-32 chars)
show cmds
show Show settings, parameters, or dynamically generated information
cmds Show CLI (Command Line Interface) commands including ones derived from optional keywords
show device-group [ <string> ]
show Show settings, parameters, or dynamically generated information
device-group Show all device group names or the settings of an individual device group
<string> Enter a device group name (1-32 chars)
show domain-object [ <string> ]
show Show settings, parameters, or dynamically generated information
domain-object Show all domain object names or the device domains assigned to an individual domain object
<string> Enter an domain object name (1-32 chars)
show filter [ <number> ]
show Show settings, parameters, or dynamically generated information
filter Show capture filter parameters
<number> Enter a filter ID (Range: 1-64)
show forwarding-engine counters [ interface <wifix|wifix.y|ethx|mgtx> ] [ station <mac_addr> ] [ drop ]
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
counters Show forwarding engine counter statistics
interface Show forwarding engine counter by interface
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
<ethx> Enter the name of an Ethernet interface, where x = 0
<mgtx> Enter the name of the management interface, where x = 0
station Show forwarding engine counter by station MAC
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
drop Show the drop packet counter
show forwarding-engine inter-ssid-flood
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
inter-ssid-flood Show status of flooding multicast or broadcast packets between access interfaces
show forwarding-engine ip-gates
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
ip-gates Show IP gates information
show forwarding-engine ip-sessions [ src-ip <ip_addr> ] [ dst-ip <ip_addr> ] [ src-port <number> ] [ dst-port <number> ] [ protocol <number> ] [ qos <number> ]
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
ip-sessions Show IP session information
src-ip Filter by source IP
<ip_addr> Source IP address
dst-ip Filter by destination IP
<ip_addr> Destination IP address
src-port Filter by source port
<number> source IP port (Range: 1-65535)
dst-port Filter by destination port
<number> destination IP port (Range: 1-65535)
protocol Filter by protocol
<number> protocol (Range: 1-255)
qos Filter by QoS value
<number> QoS value (Range: 0-7)
show forwarding-engine ip-sessions id <number>
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
ip-sessions Show IP session information
id Show a IP session by ID
<number> Enter the flow ID (Range: 1-9999)
show forwarding-engine mac-sessions [ src-mac <mac_addr> ] [ dst-mac <mac_addr> ] [ vlan <number> ]
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
mac-sessions Show MAC session information
src-mac Filter by source MAC
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
dst-mac Filter by destination MAC
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
vlan Filter by VLAN ID of station
<number> VLAN ID (Range: 1-4094)
show forwarding-engine mac-sessions id <number>
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
mac-sessions Show MAC session information
id Show a MAC session by ID
<number> Enter the flow ID (Range: 1-9999)
show forwarding-engine max-ip-sess-per-station
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
max-ip-sess-per-station Show the maximum number of IP sessions that can be created to or from a station
show forwarding-engine max-mac-sess-per-station
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
max-mac-sess-per-station Show the maximum number of MAC sessions that can be created to or from a station
show forwarding-engine open-ports-to-self
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
open-ports-to-self Show permitted services destined for the HiveAP itself when it is set to drop all non-management traffic
show forwarding-engine policy
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
policy Show policy information
show forwarding-engine static-rule
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
static-rule Show static packet-forwarding rules that preempts dynamic forwarding decisions
show forwarding-engine tunnel selective-multicast-forward
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
tunnel Show tunnel (GRE tunnel or GRE-over-IPsec tunnel) parameters
selective-multicast-forward Show the settings for selective multicast forwarding through GRE tunnels
show forwarding-engine tunnel tcp-mss-threshold
show Show settings, parameters, or dynamically generated information
forwarding-engine Show forwarding engine parameters
tunnel Show tunnel (GRE tunnel or GRE-over-IPsec tunnel) parameters
tcp-mss-threshold Show TCP MSS threshold parameters
show gre-tunnel
show Show settings, parameters, or dynamically generated information
gre-tunnel Show GRE (Generic Routing Encapsulation) tunnel information
show high-density status
show Show settings, parameters, or dynamically generated information
high-density Show parameters for optimizing performance in a high-density WLAN
status Show high-density settings and the running status of operations pertaining to them on both the 2.4 and 5 GHz radio bands
show history
show Show settings, parameters, or dynamically generated information
history Show command history
show hive <string> connecting-threshold
show Show settings, parameters, or dynamically generated information
hive Show hive parameters
<string> Enter a hive profile name (1-32 chars)
connecting-threshold Show hive neighbor connecting threshold parameters
show hive <string> counter neighbor [ <mac_addr> ]
show Show settings, parameters, or dynamically generated information
hive Show hive parameters
<string> Enter a hive profile name (1-32 chars)
counter Show detailed statistics (counters) for neighboring hive members
neighbor Show statistics for all neighbors or a single neighbor in this hive
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show hive <string> manage
show Show settings, parameters, or dynamically generated information
hive Show hive parameters
<string> Enter a hive profile name (1-32 chars)
manage Show management options enabled on wireless backhaul interfaces in this hive
show hive <string> neighbor [ mac <mac_addr> ]
show Show settings, parameters, or dynamically generated information
hive Show hive parameters
<string> Enter a hive profile name (1-32 chars)
neighbor Show information about all neighbors currently associated with the Hive or about the ongoing wireless activity of a specific neighbor
mac Show the ongoing wireless activity of a neighbor that is currently associated with the Hive (Note: To stop the display of output, press CTRL+C.)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show hive <string> security wlan dos
show Show settings, parameters, or dynamically generated information
hive Show hive parameters
<string> Enter a hive profile name (1-32 chars)
security Show hive security parameters
wlan Show WLAN parameters
dos Show WLAN Dos parameters
show hive [ <string> ]
show Show settings, parameters, or dynamically generated information
hive Show hive parameters
<string> Enter a hive profile name (1-32 chars)
show icsa
show Show settings, parameters, or dynamically generated information
icsa Show ICSA (International Computer Security Association) parameters
show interface <ethx> allowed-vlan
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
allowed-vlan Show all allowed VLAN IDs on the interface
show interface <ethx> mac-learning {static|dynamic|all}
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
mac-learning Show entries in the MAC address learning table
static Show statically defined MAC address entries
dynamic Show dynamically learned MAC address entries
all Show statically defined and dynamically learned MAC address entries
show interface <ethx> manage
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
manage Show management options enabled on this interface
show interface <ethx> qos-classifier
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
qos-classifier Show the QoS classification profile (classifier) assigned to the interface
show interface <ethx> qos-marker
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
qos-marker Show the QoS marker profile assigned to the interface
show interface <ethx> rate-limit
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
rate-limit Show the settings for interface-based rate limiting
show interface <mgtx.y> manage
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<mgtx.y> Enter the name of the virtual management interface (Ranges: x: 0; y: 1-16)
manage Show management options enabled on this interface
show interface <wifix.y> multicast
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
multicast Show multicast settings, statistics, groups, and group members
show interface <wifix> channel
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
channel Show channel list of the radio interface
show interface <wifix> dfs
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
dfs Show DFS (Dynamic Frequency Selection) status
show interface <wifix> multicast
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
multicast Show multicast settings, statistics, groups, and group members
show interface <wifix> wlan-idp ap-info
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
wlan-idp Show WLAN IDP (intrusion detection and prevention) parameters
ap-info Show IDP AP statistics for the radio interface
show interface <wifix> wlan-idp ap-info compliance {compliant|non-compliant}
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
wlan-idp Show WLAN IDP (intrusion detection and prevention) parameters
ap-info Show IDP AP statistics for the radio interface
compliance Show one compliance type of IDP AP statistics for the radio interface
compliant Show compliant type of IDP AP statistics for the radio interface
non-compliant Show non-compliant type of IDP AP statistics for the radio interface
show interface <wifix> wlan-idp ap-info type {rogue|valid|external}
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
wlan-idp Show WLAN IDP (intrusion detection and prevention) parameters
ap-info Show IDP AP statistics for the radio interface
type Show one type of IDP AP statistics for the radio interface
rogue Show rogue type of IDP AP statistics for the radio interface
valid Show valid type of IDP AP statistics for the radio interface
external Show external type of IDP AP statistics for the radio interface
show interface <wifix> wlan-idp client-info
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
wlan-idp Show WLAN IDP (intrusion detection and prevention) parameters
client-info Show IDP client statistics for the radio interface
show interface <wifix> wlan-idp mitigate rogue-ap [ <mac_addr> ]
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
wlan-idp Show WLAN IDP (intrusion detection and prevention) parameters
mitigate Show mitigated rogue APs and their clients
rogue-ap Show rogue APs currently being mitigated or clients connected to a specific rogue AP
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show interface <wifix|wifix.y> counter
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
counter Show detailed statistics (counters) for traffic traversing the interface
show interface [ <ethx|mgtx|mgtx.y|wifix|wifix.y|tunnelx|bgdx.y> ]
show Show settings, parameters, or dynamically generated information
interface Show interface and subinterface parameters
<ethx> Enter the name of an Ethernet interface, where x = 0
<mgtx> Enter the name of the management interface, where x = 0
<mgtx.y> Enter the name of the virtual management interface (Ranges: x: 0; y: 1-16)
<wifix> Enter the name of a Wi-Fi radio interface, where x = 0 or 1
<wifix.y> Enter the name of a Wi-Fi radio subinterface (Ranges: x: 0-1; y: 1-16)
<tunnelx> Enter the name of the tunnel interface, where x = 0 or 1
<bgdx.y> Enter the name of the BGD (Bonjour Gateway Daemon) interface (Ranges: x: 0; y: 1-16)
show ip path-mtu-discovery
show Show settings, parameters, or dynamically generated information
ip Show IP parameters
path-mtu-discovery Show the Path MTU Discovery status
show ip-policy
show Show settings, parameters, or dynamically generated information
ip-policy Show parameters for IP policy
show ip-policy <string>
show Show settings, parameters, or dynamically generated information
ip-policy Show parameters for IP policy
<string> Enter an IP policy name (1-32 chars)
show ip-policy user-profile <number|string> [ {from-access|to-access} ] [ from <ip_addr|string> <mask> ] [ to <ip_addr|string> <mask> ] [ service <string> ] [ action {permit|deny|inter-station-traffic-drop} ] [ lines <number> ]
show Show settings, parameters, or dynamically generated information
ip-policy Show parameters for IP policy
user-profile Show parameters for a user profile
<number> Enter the user profile name or ID
<string> Enter the user profile name or ID
from-access Show IP policy for data sent from this station
to-access how IP policy for data arriving at this station
from Show the specific source IP (Default: any)
<ip_addr> Enable an IP or net address
<string> Enable an IP or net address
<mask> Enter a netmask or IP wildcard mask in which 0 masks the octet where it appears (For example, the 0s in '255.0.0.255' mask the second and third octets, applying the IP policy to all addresses matching only the first and fourth octets.)
to Show the specific destination IP (Default: any)
<ip_addr> Enter an IP or net address
<string> Enter an IP or net address
<mask> Enter a netmask or IP wildcard mask in which 0 masks the octet where it appears (For example, the 0s in '255.0.0.255' mask the second and third octets, applying the IP policy to all addresses matching only the first and fourth octets.)
service Show the specific service (Default: any)
<string> Enter the service (1-32 chars)
action Show the action (Default:any)
permit Set the action
deny Set the action
inter-station-traffic-drop Set the action
lines Set the most number of IP policy to show
<number> Enter a num (Range: 1-32)
show l3 interface
show Show settings, parameters, or dynamically generated information
l3 Show Layer 3 information
interface Show all Layer 3 interfaces
show license
show Show settings, parameters, or dynamically generated information
license Show license information
show lldp [ {cdp} ] [ {neighbor} ]
show Show settings, parameters, or dynamically generated information
lldp Set LLDP (Link Layer Discovery Protocol) parameters
cdp Set CDP (Cisco Discovery Protocol) parameters
neighbor Show the LLDP or CDP neighbor table
show mac-object [ <string> ]
show Show settings, parameters, or dynamically generated information
mac-object Show all MAC object names or the parameters of an individual MAC object
<string> Enter an MAC object name (1-32 chars)
show mac-policy
show Show settings, parameters, or dynamically generated information
mac-policy Show parameters for MAC policy
show mac-policy <string> [ from <mac_addr> [ <number> ] ] [ to <mac_addr> [ <number> ] ] [ action {permit|deny} ] [ lines <number> ]
show Show settings, parameters, or dynamically generated information
mac-policy Show parameters for MAC policy
<string> Enter a MAC policy name (1-32 chars)
from Show the specific source MAC (Default: any)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
<number> Enter a MAC mask length (value: 0, 24, 48)
to Show the specific destination MAC (Default: any)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
<number> Enter a MAC mask length (value: 0, 24, 48)
action Show the specific action (Default:any)
permit Set the action
deny Set the action
lines Set the most number of MAC policy to show
<number> Enter a num (Range: 1-32)
show mac-policy user-profile <number|string> [ {from-access|to-access} ] [ from <mac_addr> [ <number> ] ] [ to <mac_addr> [ <number> ] ] [ action {permit|deny} ] [ lines <number> ]
show Show settings, parameters, or dynamically generated information
mac-policy Show parameters for MAC policy
user-profile Show parameters for a user profile
<number> Enter the user profile name or ID
<string> Enter the user profile name or ID
from-access Show MAC policy for data sent from this station
to-access how IP policy for data arriving at this station
from Show the specific source MAC (Default: any)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
<number> Enter a MAC mask length (value: 0, 24, 48)
to Show the specific destination MAC (Default: any)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
<number> Enter a MAC mask length (value: 0, 24, 48)
action Show the specific action (Default:any)
permit Set the action
deny Set the action
lines Set the most number of MAC policy to show
<number> Enter a num (Range: 1-32)
show min-password-length
show Show settings, parameters, or dynamically generated information
min-password-length Show the minimum password length
show mobile-device-policy [ <string> ]
show Show settings, parameters, or dynamically generated information
mobile-device-policy Show all mobile device policy names or the settings of an individual policy
<string> Enter a mobile device policy name (1-32 chars)
show os-detection [ {option55-to-os-database|dhcp-fingerprint-version} ]
show Show settings, parameters, or dynamically generated information
os-detection Display the OS (Operating System) detection configuration
option55-to-os-database Display the contents of the database that contains the option55-to-database mapping (Note: The command displays user configuration database and default database contents.)
dhcp-fingerprint-version Display DHCP fingerprint file version
show os-object [ <string> ]
show Show settings, parameters, or dynamically generated information
os-object Show all OS object names or the operating systems assigned to an individual OS object
<string> Enter an OS object name (1-32 chars)
show performance-sentinel
show Show settings, parameters, or dynamically generated information
performance-sentinel Show performance sentinel parameters
show ppsk schedule [ <string> ]
show Show settings, parameters, or dynamically generated information
ppsk Show parameters of private-PSK
schedule Show information about previously defined private-PSK schedules
<string> Enter a name to see information about a specific schedule (1-32 chars)
show proxy
show Show settings, parameters, or dynamically generated information
proxy Show proxy parameters
show qos
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
show qos classifier-map 80211e [ <number> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
classifier-map Show the mapping of QoS priority markers on incoming packets to Aerohive QoS classes
80211e Show mapping of IEEE 802.11e priority markers on incoming packets to Aerohive QoS classes
<number> Enter the IEEE 802.11e user priority (Range: 0-7)
show qos classifier-map 8021p [ <number> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
classifier-map Show the mapping of QoS priority markers on incoming packets to Aerohive QoS classes
8021p Show mapping of IEEE 802.1p priority markers on incoming packets to Aerohive QoS classes
<number> Enter IEEE 802.1p priority (Range: 0-7)
show qos classifier-map diffserv [ <number> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
classifier-map Show the mapping of QoS priority markers on incoming packets to Aerohive QoS classes
diffserv Show mapping of diffserv DSCP (Differentiated Services Code Point) values on incoming packets to Aerohive QoS classes
<number> Enter The DSCP class (Range: 0-63)
show qos classifier-map interface <ethx>
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
classifier-map Show the mapping of QoS priority markers on incoming packets to Aerohive QoS classes
interface Show interface-based classification table
<ethx> Enter the name of an Ethernet interface, where x = 0
show qos classifier-map oui [ <oui> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
classifier-map Show the mapping of QoS priority markers on incoming packets to Aerohive QoS classes
oui Show the MAC OUI (Organizational Unique Identifier) classification table
<oui> Enter the OUI (Note: You can use colons, dashes, or periods to format the OUI. Examples: Apple iPhone=00:1b:63; D-Link Phone=00-17-9a; Vocera=00.09.ef.)
show qos classifier-map service [ <string> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
classifier-map Show the mapping of QoS priority markers on incoming packets to Aerohive QoS classes
service Show the service-based classification table or enter the name of a specific service to see the QoS classification for just that one
<string> Enter the name of a specific service
show qos classifier-map ssid <string>
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
classifier-map Show the mapping of QoS priority markers on incoming packets to Aerohive QoS classes
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID name
show qos classifier-profile [ <string> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
classifier-profile Show the parameters of all QoS classification profiles or enter the name of a specific profile to see the parameters of just that one
<string> Enter the name of a specific QoS classifier profile
show qos counter user [ <mac_addr> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
counter Show QoS statistics counters
user Show station QoS statistics counters
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show qos counter user-profile [ <string> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
counter Show QoS statistics counters
user-profile Show QoS statistics counters for all user profiles or enter the name of a specific user profile to see counters for just that one
<string> Enter the name of a specific user profile
show qos marker-map 80211e [ <number> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
marker-map Show the mapping of Aerohive QoS classes to QoS priority markers on outgoing packets
80211e Show mapping of Aerohive QoS classes to IEEE 802.11e priority markers on outgoing packets
<number> Enter the Aerohive QoS class (Range: 0-7)
show qos marker-map 8021p [ <number> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
marker-map Show the mapping of Aerohive QoS classes to QoS priority markers on outgoing packets
8021p Show mapping of Aerohive QoS classes to IEEE 802.1p priority markers on outgoing packets
<number> Enter the Aerohive QoS class (Range: 0-7)
show qos marker-map diffserv [ <number> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
marker-map Show the mapping of Aerohive QoS classes to QoS priority markers on outgoing packets
diffserv Show map of Aerohive QoS classes to diffserv DSCP (Differentiated Services Code Point) values on outgoing packets
<number> Enter the Aerohive QoS class (Range: 0-7)
show qos marker-map {diffserv|8021p} <string>
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
marker-map Show the mapping of Aerohive QoS classes to QoS priority markers on outgoing packets
diffserv Show map of Aerohive QoS classes to diffserv DSCP (Differentiated Services Code Point) values on outgoing packets
8021p Show mapping of Aerohive QoS classes to IEEE 802.1p priority markers on outgoing packets
<string> Enter marker name (1-32 chars)
show qos marker-profile [ <string> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
marker-profile Show the parameters for all QoS marker profiles or enter a name to see those of a specific one
<string> Enter the name of a specific QoS marker profile
show qos policy [ <string> ]
show Show settings, parameters, or dynamically generated information
qos Show QoS (Quality of Service) parameters
policy Show the parameters for all QoS policies or enter a name to see those of a specific one
<string> Enter the name of a specific a QoS policy
show radio profile [ <string> ]
show Show settings, parameters, or dynamically generated information
radio Show radio profile parameters
profile Show radio profile parameters for an interface
<string> Enter a radio profile name
show report statistic
show Show settings, parameters, or dynamically generated information
report Show report parameters for traffic statistics
statistic Show parameters for reporting interface-level and client-level traffic statistics
show roaming cache
show Show settings, parameters, or dynamically generated information
roaming Show the roaming cache and neighbors
cache Show the roaming cache containing MAC addresses and PMKs (Pairwise Master Keys)
show roaming cache mac <mac_addr>
show Show settings, parameters, or dynamically generated information
roaming Show the roaming cache and neighbors
cache Show the roaming cache containing MAC addresses and PMKs (Pairwise Master Keys)
mac Specify a station MAC address
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show route
show Show settings, parameters, or dynamically generated information
route Show route parameters
show running-config
show Show settings, parameters, or dynamically generated information
running-config Show currently running configurations
show running-config password
show Show settings, parameters, or dynamically generated information
running-config Show currently running configurations
password Show passwords and sensitive networking keys as obscured text strings in the output (Default: Passwords and keys are represented by asterisks; Note: A HiveAP can recover an original string from an obscured one, but not if the string is replaced with asterisks.)
show running-config users [ password ] [ all ]
show Show settings, parameters, or dynamically generated information
running-config Show currently running configurations
users Show users configurations
password Show passwords and sensitive networking keys as obscured text strings in the output (Default: Passwords and keys are represented by asterisks; Note: A HiveAP can recover an original string from an obscured one, but not if the string is replaced with asterisks.)
all Show all the user configurations including temporary users
show schedule [ <string> ]
show Show settings, parameters, or dynamically generated information
schedule Show information about previously defined schedules
<string> Enter a name to see information about a specific schedule (1-32 chars)
show schedule-in-detail
show Show settings, parameters, or dynamically generated information
schedule-in-detail Show detailed information about all previously defined schedules
show security mac-filter [ <string> ]
show Show settings, parameters, or dynamically generated information
security Show security parameters
mac-filter Show MAC-filter parameters
<string> Specify MAC-filter name
show security protocol-suite
show Show settings, parameters, or dynamically generated information
security Show security parameters
protocol-suite Show predefine security protocol suites
show security-object <string> dhcp-server
show Show settings, parameters, or dynamically generated information
security-object Show security object names and individual parameters
<string> Enter a security object name (1-32 chars)
dhcp-server Show DHCP-server parameters
show security-object <string> dns-server
show Show settings, parameters, or dynamically generated information
security-object Show security object names and individual parameters
<string> Enter a security object name (1-32 chars)
dns-server Show DNS-server parameters
show security-object <string> mobile-device-manager {jss|airwatch|aerohive}
show Show settings, parameters, or dynamically generated information
security-object Show security object names and individual parameters
<string> Enter a security object name (1-32 chars)
mobile-device-manager Show mobile device manager parameters
jss JAMP software server
airwatch AirWatch MDM server
aerohive Aerohive MDM server
show security-object <string> mobile-device-policy
show Show settings, parameters, or dynamically generated information
security-object Show security object names and individual parameters
<string> Enter a security object name (1-32 chars)
mobile-device-policy Show the mobile device policy to which the security object is bound
show security-object <string> security aaa
show Show settings, parameters, or dynamically generated information
security-object Show security object names and individual parameters
<string> Enter a security object name (1-32 chars)
security Show security settings
aaa Show AAA (authentication, authorization, and accounting) settings
show security-object <string> security mac-white-list
show Show settings, parameters, or dynamically generated information
security-object Show security object names and individual parameters
<string> Enter a security object name (1-32 chars)
security Show security settings
mac-white-list Show the members in MAC white list
show security-object <string> security protocol-suite
show Show settings, parameters, or dynamically generated information
security-object Show security object names and individual parameters
<string> Enter a security object name (1-32 chars)
security Show security settings
protocol-suite Show the security protocol suite
show security-object <string> walled-garden
show Show settings, parameters, or dynamically generated information
security-object Show security object names and individual parameters
<string> Enter a security object name (1-32 chars)
walled-garden Show the list of walled gardens
show security-object <string> web-server
show Show settings, parameters, or dynamically generated information
security-object Show security object names and individual parameters
<string> Enter a security object name (1-32 chars)
web-server Show the internal web server configuration in the interface
show security-object [ <string> ]
show Show settings, parameters, or dynamically generated information
security-object Show security object names and individual parameters
<string> Enter a security object name (1-32 chars)
show service [ <string> ]
show Show settings, parameters, or dynamically generated information
service Show details or counters about predefined and custom services
<string> Show the transport protocol, port, and timeout for a specific service
show service [ <string> ] counter
show Show settings, parameters, or dynamically generated information
service Show details or counters about predefined and custom services
<string> Show the transport protocol, port, and timeout for a specific service
counter Show counter statistics for all services or for a specific service
show snmp [ {v3-admin} ]
show Show settings, parameters, or dynamically generated information
snmp Show SNMP (Simple Network Management Protocol) parameters
v3-admin Show parameters for SNMP v3 administrators
show snmp community [ {read-only} ]
show Show settings, parameters, or dynamically generated information
snmp Show SNMP (Simple Network Management Protocol) parameters
community Show previously defined SNMP communities and their parameters
read-only Enter a community privilege to show previously defined SNMP communities parameters
show snmp contact
show Show settings, parameters, or dynamically generated information
snmp Show SNMP (Simple Network Management Protocol) parameters
contact Show SNMP contact information
show snmp location
show Show settings, parameters, or dynamically generated information
snmp Show SNMP (Simple Network Management Protocol) parameters
location Show the AP location for SNMP
show ssid <string> counter station [ <mac_addr> ]
show Show settings, parameters, or dynamically generated information
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID profile name (1-32 chars)
counter Show detailed statistics (counters) for stations (wireless clients) associated with the SSID
station Show statistics for all stations or a specific station associated with the SSID
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show ssid <string> manage
show Show settings, parameters, or dynamically generated information
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID profile name (1-32 chars)
manage Show management options enabled on subinterfaces bound to the SSID
show ssid <string> multicast
show Show settings, parameters, or dynamically generated information
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID profile name (1-32 chars)
multicast Show multicast settings
show ssid <string> qos-classifier
show Show settings, parameters, or dynamically generated information
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID profile name (1-32 chars)
qos-classifier Show the QoS classification profile (classifier) assigned to the interface
show ssid <string> qos-marker
show Show settings, parameters, or dynamically generated information
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID profile name (1-32 chars)
qos-marker Show the QoS marker profile assigned to the interface
show ssid <string> schedule [ detail ]
show Show settings, parameters, or dynamically generated information
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID profile name (1-32 chars)
schedule Show all schedules bound to the SSID
detail Show detailed information about all schedules bound to the SSID
show ssid <string> security screening [ detail ]
show Show settings, parameters, or dynamically generated information
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID profile name (1-32 chars)
security Show SSID security parameters
screening Show SSID security screening parameters
detail Show more information
show ssid <string> security wlan dos
show Show settings, parameters, or dynamically generated information
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID profile name (1-32 chars)
security Show SSID security parameters
wlan Show SSID WLAN parameters
dos Show SSID DoS parameters
show ssid <string> station [ mac <mac_addr> ]
show Show settings, parameters, or dynamically generated information
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID profile name (1-32 chars)
station Show information about all stations currently associated with the SSID or about the ongoing wireless activity of a specific station
mac Show the ongoing wireless activity of a station that is currently associated with the SSID (Note: To stop the display of output, press CTRL+C.)
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show ssid <string> station ipv6
show Show settings, parameters, or dynamically generated information
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID profile name (1-32 chars)
station Show information about all stations currently associated with the SSID or about the ongoing wireless activity of a specific station
ipv6 Show IPv6 related information
show ssid <string> user-group
show Show settings, parameters, or dynamically generated information
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID profile name (1-32 chars)
user-group Show SSID bind user-groups
show ssid [ <string> ]
show Show settings, parameters, or dynamically generated information
ssid Show SSID (Service Set Identifier) profile names and individual profile parameters
<string> Enter an SSID profile name (1-32 chars)
show ssid-schedule
show Show settings, parameters, or dynamically generated information
ssid-schedule Show the status of all SSID schedules
show station [ <mac_addr> ]
show Show settings, parameters, or dynamically generated information
station Show information about all stations or about the ongoing wireless activity of a specific station
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show station [ <mac_addr> ] counter
show Show settings, parameters, or dynamically generated information
station Show information about all stations or about the ongoing wireless activity of a specific station
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
counter Show detailed statistics (counters) for stations (wireless clients) associated with the HiveAP
show station ipv6
show Show settings, parameters, or dynamically generated information
station Show information about all stations or about the ongoing wireless activity of a specific station
ipv6 Show IPv6 related information
show system connection-trap delay
show Show settings, parameters, or dynamically generated information
system Show system information
connection-trap Show system connection-trap parameters
delay Show system connection-trap delay value
show system led
show Show settings, parameters, or dynamically generated information
system Show system information
led Show LED configuration parameters and current status
show system power status
show Show settings, parameters, or dynamically generated information
system Show system information
power Show power information
status Show power status information
show user
show Show settings, parameters, or dynamically generated information
user Show all user
show user-group <string> psk-digest [ <string> ]
show Show settings, parameters, or dynamically generated information
user-group Show a user group parameters
<string> Enter the user group name (1-32 chars)
psk-digest Show the digest string for the auto-PSK
<string> Enter the user name (1-32 chars)
show user-group [ <string> ]
show Show settings, parameters, or dynamically generated information
user-group Show a user group parameters
<string> Enter the user group name (1-32 chars)
show user-profile <string> cac airtime-percentage
show Show settings, parameters, or dynamically generated information
user-profile Show parameters for a user profile
<string> Enter the user profile name (1-32 chars)
cac Show CAC (Call Admission Control) parameters and statistics
airtime-percentage Show the percentage of airtime for VoIP calls
show user-profile <string> schedule [ detail ]
show Show settings, parameters, or dynamically generated information
user-profile Show parameters for a user profile
<string> Enter the user profile name (1-32 chars)
schedule Show all schedules bound to the user profile
detail Show detailed information about all schedules bound to the user profile
show user-profile [ <string> ]
show Show settings, parameters, or dynamically generated information
user-profile Show parameters for a user profile
<string> Enter the user profile name (1-32 chars)
show user-profile-policy [ <string> ]
show Show settings, parameters, or dynamically generated information
user-profile-policy Show parameters for a user profile mapping policy
<string> Enter a policy name
show user-profile-schedule
show Show settings, parameters, or dynamically generated information
user-profile-schedule Show the status of all user profile schedules
show version [ {detail} ]
show Show settings, parameters, or dynamically generated information
version Show information about the current and backup HiveOS versions on the HiveAP and the HiveAP platform type
detail Show detailed information about the current and backup HiveOS versions on the HiveAP and the HiveAP platform type
show video ip <ip_addr> <number>
show Show settings, parameters, or dynamically generated information
video Show information about streaming video traffic
ip Set the IP multicast group address that is the source of the video stream
<ip_addr> Enter the IP address
<number> Enter a destination port number to which the video traffic was sent (Range: 0 - 65535)
show video ip <ip_addr> dst-port-range <number> - <number>
show Show settings, parameters, or dynamically generated information
video Show information about streaming video traffic
ip Set the IP multicast group address that is the source of the video stream
<ip_addr> Enter the IP address
dst-port-range Set a range of destination port numbers
<number> Enter the first destination port number in the range (Range: 0 - 65535)
- Set a range of destination port numbers
<number> Enter the last destination port number in the range (Range: 0 - 65535)
show vpn gre-tunnel
show Show settings, parameters, or dynamically generated information
vpn Show VPN information and VPN objects
gre-tunnel Show GRE (Generic Routing Encapsulation) tunnel information
show wlan-idp mitigate [ <mac_addr> ]
show Show settings, parameters, or dynamically generated information
wlan-idp Show WLAN IDP (intrusion detection and prevention) parameters
mitigate Show one or a list of rogue APs against which mitigation was performed, the HiveAPs that reported them, and those that attacked them
<mac_addr> Enter a MAC address (Note: You can use colons, dashes, or periods to format the address. Examples: 1111:1111:1111, 11-11-11-11-11-11, 1111.1111.1111 ...)
show wlan-idp profile [ <string> ]
show Show settings, parameters, or dynamically generated information
wlan-idp Show WLAN IDP (intrusion detection and prevention) parameters
profile Show IDP profile parameters
<string> Enter an IDP profile name (1-32 chars)
snmp contact <string>
snmp Set SNMP (Simple Network Management Protocol) parameters
contact Set SNMP contact information
<string> Enter SNMP contact information (1-32 chars)
snmp location <string>
snmp Set SNMP (Simple Network Management Protocol) parameters
location Set the AP location for SNMP
<string> Enter the SNMP location string (1-255 chars; Default: change-me)
snmp reader version {v1|v2c|any} community <string> [ <string> ]
snmp Set SNMP (Simple Network Management Protocol) parameters
reader Set the SNMP community mode as read-only (Note: This setting allows the NMS, or network management station, to read MIB data on the AP but not receive traps from it.)
version Set the SNMP community version
v1 Set the community version as SNMP v1
v2c Set the community version as SNMP v2c
any Set the community version to support both SNMP v1 and v2c
community Set SNMP community parameters
<string> Set the SNMP community string for authenticating communications between the SNMP agent on the AP and the NMS (Note: This string acts like a password or a shared secret.)
<string> Enter the domain name (1-32 chars) or the IP address and netmask for the NMS
snmp trap-host {v1|v2c} <ip_addr|string> [ port <number> ] [ {via-vpn-tunnel} ] [ community <string> ]
snmp Set SNMP (Simple Network Management Protocol) parameters
trap-host Set parameters for the SNMP trap host (Note: This is an NMS, or network management station, that can receive SNMP traps from the AP.)
v1 Set the trassid
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
ssid <string> 11a-rate-set [ {6|6-basic} ] [ {9|9-basic} ] [ {12|12-basic} ] [ {18|18-basic} ] [ {24|24-basic} ] [ {36|36-basic} ] [ {48|48-basic} ] [ {54|54-basic} ]
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
11a-rate-set Set the basic (mandatory) and optional 11a data rates for the radio (Default rates in Mbps: basic=6, 12, 24, opt=9, 18, 36, 48, 54)
6 Set 6 Mbps as a basic (mandatory) or optional data rate
6-basic Set 6 Mbps as a basic (mandatory) or optional data rate
9 Set 9 Mbps as a basic (mandatory) or optional data rate
9-basic Set 9 Mbps as a basic (mandatory) or optional data rate
12 Set 12 Mbps as a basic (mandatory) or optional data rate
12-basic Set 12 Mbps as a basic (mandatory) or optional data rate
18 Set 18 Mbps as a basic (mandatory) or optional data rate
18-basic Set 18 Mbps as a basic (mandatory) or optional data rate
24 Set 24 Mbps as a basic (mandatory) or optional data rate
24-basic Set 24 Mbps as a basic (mandatory) or optional data rate
36 Set 36 Mbps as a basic (mandatory) or optional data rate
36-basic Set 36 Mbps as a basic (mandatory) or optional data rate
48 Set 48 Mbps as a basic (mandatory) or optional data rate
48-basic Set 48 Mbps as a basic (mandatory) or optional data rate
54 Set 54 Mbps as a basic (mandatory) or optional data rate
54-basic Set 54 Mbps as a basic (mandatory) or optional data rate
ssid <string> 11ac-mcs-rate-set [ <string> ]
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
11ac-mcs-rate-set Set the 802.11ac MCS rate indexes for which the SSID advertizes its support
<string> Enter specific MCS rates (Range: 1-256 chars; Format: Use commas as separators. Example: mcs2/1,mcs8/1,mcs4/2,mcs8/2,mcs9/2,mcs3/3)
ssid <string> 11g-rate-set [ {1|1-basic} ] [ {2|2-basic} ] [ {5.5|5.5-basic} ] [ {11|11-basic} ] [ {6|6-basic} ] [ {9|9-basic} ] [ {12|12-basic} ] [ {18|18-basic} ] [ {24|24-basic} ] [ {36|36-basic} ] [ {48|48-basic} ] [ {54|54-basic} ]
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
11g-rate-set Set the basic (mandatory) and optional 11g data rates for the radio (Default rates in Mbps: basic=1, 2, 5.5, 11, opt=6, 9, 12, 18, 24, 36, 48, 54)
1 Set 1 Mbps as a basic (mandatory) or optional data rate
1-basic Set 1 Mbps as a basic (mandatory) or optional data rate
2 Set 2 Mbps as a basic (mandatory) or optional data rate
2-basic Set 2 Mbps as a basic (mandatory) or optional data rate
5.5 Set 5.5 Mbps as a basic (mandatory) or optional data rate
5.5-basic Set 5.5 Mbps as a basic (mandatory) or optional data rate
11 Set 11 Mbps as a basic (mandatory) or optional data rate
11-basic Set 11 Mbps as a basic (mandatory) or optional data rate
6 Set 6 Mbps as a basic (mandatory) or optional data rate
6-basic Set 6 Mbps as a basic (mandatory) or optional data rate
9 Set 9 Mbps as a basic (mandatory) or optional data rate
9-basic Set 9 Mbps as a basic (mandatory) or optional data rate
12 Set 12 Mbps as a basic (mandatory) or optional data rate
12-basic Set 12 Mbps as a basic (mandatory) or optional data rate
18 Set 18 Mbps as a basic (mandatory) or optional data rate
18-basic Set 18 Mbps as a basic (mandatory) or optional data rate
24 Set 24 Mbps as a basic (mandatory) or optional data rate
24-basic Set 24 Mbps as a basic (mandatory) or optional data rate
36 Set 36 Mbps as a basic (mandatory) or optional data rate
36-basic Set 36 Mbps as a basic (mandatory) or optional data rate
48 Set 48 Mbps as a basic (mandatory) or optional data rate
48-basic Set 48 Mbps as a basic (mandatory) or optional data rate
54 Set 54 Mbps as a basic (mandatory) or optional data rate
54-basic Set 54 Mbps as a basic (mandatory) or optional data rate
ssid <string> 11n-mcs-expand-rate-set [ <string> ]
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
11n-mcs-expand-rate-set Set the 802.11n MCS rate indexes for which the SSID advertizes its support(By default, all MCS rates for three spatial streams on the HiveAP 330 and 350 are supported: 0-23. On the HiveAP 110, 120, 320, and 340, which support a maximum of two spatial streams, use the 11n-mcs-rate-set option instead.)
<string> Enter specific MCS rates (Range: 1-256 chars; Format: Use commas as separators. Example: mcs2/1,mcs5/1,mcs4/2,mcs3/3)
ssid <string> client-age-out <number>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
client-age-out Set the length of time to age out inactive clients and automatically disassociate them
<number> Enter the client age-out time in minutes (Default: 5; Range: 1-30)
ssid <string> client-monitor-policy <string>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
client-monitor-policy Assign a Client Monitor policy to automatically detect, analyze and report problems about the clients which access the network through the specified ssid
<string> Enter the Client Monitor policy name (1-32 chars)
ssid <string> dtim-period <number>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
dtim-period Set the DTIM (delivery traffic indication message) period
<number> Set the number of beacons between DTIM frames (Default: 1; Range: 1-255)
ssid <string> frag-threshold <number>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
frag-threshold Set the fragment threshold for the SSID
<number> Enter the fragment threshold in bytes for the SSID (Default: 2346; Range: 256-2346)
ssid <string> hide-ssid
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
hide-ssid Hide the SSID in beacons and ignore broadcast probe requests
ssid <string> ignore-broadcast-probe
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
ignore-broadcast-probe Ignore broadcasted probe requests
ssid <string> inter-station-traffic
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
inter-station-traffic Set the HiveAP to permit traffic between stations connected to one or more of its access interfaces (Default: Enabled)
ssid <string> manage all
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
manage Set management service parameters
all all_service::Enable all manageability options (ping, SNMP, SSH, and Telnet) for mgt0 through subinterfaces bound to the SSID (Defaults: ping enabled, SNMP disabled, SSH enabled, Telnet disabled)
ssid <string> manage {Telnet|SSH|SNMP|ping}
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
manage Set management service parameters
Telnet Enable Telnet manageability of mgt0 through subinterfaces bound to the SSID (Default: Disabled)
SSH Enable SSH manageability of mgt0 through subinterfaces bound to the SSID (Default: Enabled)
SNMP Enable SNMP manageability of mgt0 through subinterfaces bound to the SSID (Default: Disabled)
ping Enable mgt0 to respond to pings through subinterfaces bound to the SSID (Default: Enabled)
ssid <string> max-client <number>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
max-client Set the maximum number of clients that can associate with the SSID
<number> Enter the maximum number of clients that can associate (Default: 100; Range: 1-100; Note: A radio profile can support a maximum of 100 clients by default, and there can be a maximum of 16 SSIDs per radio.)
ssid <string> mode compliance
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
mode Set SSID mode parameter
compliance Set SSID mode compliance with 11n standard
ssid <string> mode legacy
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
mode Set SSID mode parameter
legacy Set this mode to disable the advertisement of 802.11n capabilities when there are legacy 802.11a/b/g clients that cannot support 802.11n IEs (information elements) in management frames
ssid <string> multicast conversion-to-unicast {auto|always|disable}
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
multicast Set parameters for sending IP datagrams to a group of interested receivers in a single transmission
conversion-to-unicast Set the method for converting multicast frames to unicast frames (Default: Disabled)
auto Convert from multicast to unicast automatically whenever the channel utilization and multicast group membership count are below their respective thresholds
always Always convert from multicast to unicast regardless of channel utilization and group membership numbers
disable Disable convert from multicast to unicast
ssid <string> multicast cu-threshold <number>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
multicast Set parameters for sending IP datagrams to a group of interested receivers in a single transmission
cu-threshold Set the channel utilization threshold that determines when to convert multicast to unicast frames
<number> Enter the channel utilization threshold as a percent (Default: 60; Range: 1-100; Note: Conversion from multicast to unicast frames occurs when the percent of channel utilization is below or equal to this value.)
ssid <string> multicast member-threshold <number>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
multicast Set parameters for sending IP datagrams to a group of interested receivers in a single transmission
member-threshold Set the membership count threshold that determines when to convert multicast to unicast frames
<number> Enter the multicast group membership threshold (Default: 10; Range: 1-30; Note: Converting multicast frames to unicast frames occurs when the number of group members is below or equal to this value.)
ssid <string> qos-classifier <string>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
qos-classifier Assign a QoS classification profile (classifier) to the interface
<string> Enter the QoS classifier profile name (1-32 chars)
ssid <string> qos-marker <string>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
qos-marker Assign a QoS marker profile to the interface
<string> Enter the QoS marker profile name (1-32 chars)
ssid <string> rts-threshold <number>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
rts-threshold Set the RTS (request to send) threshold for the SSID
<number> Enter the packet size for the RTS (request to send) threshold for the SSID (Default: 2346 bytes; Range: 1-2346)
ssid <string> schedule <string>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
schedule Set a schedule during which the SSID will be available for use
<string> Enter a schedule name (1-32 chars)
ssid <string> security mac-filter <string>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
mac-filter Assign a filter for MAC addresses or OUIs (organizational unique identifiers)
<string> Enter the filter name for MAC addresses or OUIs (organizational unique identifiers)
ssid <string> security screening radius-attack
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
radius-attack Enable the screening method of RADIUS attack procection (Default: Disabled)
ssid <string> security screening radius-attack action ban-forever
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
radius-attack Enable the screening method of RADIUS attack procection (Default: Disabled)
action Set the action to perform if an alarm is triggered (Default: alarm)
ban-forever Disconnect the station and ban it from reconnecting indefinitely
ssid <string> security screening radius-attack action {alarm|ban} [ [ <number> ] ]
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
radius-attack Enable the screening method of RADIUS attack procection (Default: Disabled)
action Set the action to perform if an alarm is triggered (Default: alarm)
alarm Send an alarm but continue to pass traffic
ban Disconnect the station and ban it from reconnecting for a period of time
<number> Enter the amount of time in seconds to perform the action (Range: 1-100000000; Default: 10 for an alarm, 3600 for a ban)
ssid <string> security screening radius-attack threshold <number> [ action {alarm|ban} [ <number> ] ]
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
radius-attack Enable the screening method of RADIUS attack procection (Default: Disabled)
threshold Set the length of time during which 10 RADIUS rejections for the same source MAC address is considered unacceptable
<number> Enter the length of time in seconds (Range: 1-3600; Default: 5)
action Set the action to perform if an alarm is triggered (Default: alarm)
alarm Send an alarm but continue to pass traffic
ban Disconnect the station and ban it from reconnecting for a period of time
<number> Enter the amount of time in seconds to perform the action (Range: 1-100000000; Default: 10 for an alarm, 3600 for a ban)
ssid <string> security screening radius-attack threshold <number> action ban-forever
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
radius-attack Enable the screening method of RADIUS attack procection (Default: Disabled)
threshold Set the length of time during which 10 RADIUS rejections for the same source MAC address is considered unacceptable
<number> Enter the length of time in seconds (Range: 1-3600; Default: 5)
action Set the action to perform if an alarm is triggered (Default: alarm)
ban-forever Disconnect the station and ban it from reconnecting indefinitely
ssid <string> security screening tcp-syn-check
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
tcp-syn-check Enable checking that the SYN flag is set in TCP segments before creating new IP sessions (Default: Disabled, Note: When enabled, the IP session idle timeout is 10 seconds until the TCP three-way handshake is complete.)
ssid <string> security screening {icmp-flood|udp-flood|syn-flood|arp-flood|address-sweep|port-scan|ip-spoof} [ threshold <number> ]
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
icmp-flood Enable the screening method for protection against ICMP floods (Default: Disabled)
udp-flood Enable the screening method for protection against UDP floods (Default: Disabled)
syn-flood Enable the screening method for protection against TCP SYN floods (Default: Disabled)
arp-flood Enable the screening method for protection against ARP floods (Default: Disabled)
address-sweep Enable the screening method for protection against IP address sweeps (Default: Disabled)
port-scan Enable the screening method for protection against port scans (Default: Disabled)
ip-spoof Enable the screening method for protection against IP spoofing (Default: Disabled)
threshold Set the threshold: packets per second for syn-flood and arp-flood, air time for icmp-flood and udp-flood, milliseconds every 10 packets for address-sweep and port-scan, IP addresses for ip-spoof
<number> Enter the threshold value (Defaults and Ranges: ICMP flood: 20%, 1-100%; UDP flood 50%, 1-100%; SYN flood: 1000 pkts/sec, 1-1000000 pkts/sec; ARP flood 100 pkts/sec, 1-1000000 pkts/sec; address sweep and port scan: 100 ms/10 pkts, 1-10000 ms; IP spoof: 3 src IPs/src MAC, 2-10 IPs; RADIUS attack: 5 secs/10 rejects, 1-3600 secs)
ssid <string> security screening {icmp-flood|udp-flood|syn-flood|arp-flood|address-sweep|port-scan|ip-spoof} action ban-forever
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
icmp-flood Enable the screening method for protection against ICMP floods (Default: Disabled)
udp-flood Enable the screening method for protection against UDP floods (Default: Disabled)
syn-flood Enable the screening method for protection against TCP SYN floods (Default: Disabled)
arp-flood Enable the screening method for protection against ARP floods (Default: Disabled)
address-sweep Enable the screening method for protection against IP address sweeps (Default: Disabled)
port-scan Enable the screening method for protection against port scans (Default: Disabled)
ip-spoof Enable the screening method for protection against IP spoofing (Default: Disabled)
action Set the action to perform if an alarm is triggered (Default: alarm)
ban-forever Disconnect the station and ban it from reconnecting indefinitely
ssid <string> security screening {icmp-flood|udp-flood|syn-flood|arp-flood|address-sweep|port-scan|ip-spoof} action disconnect
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
icmp-flood Enable the screening method for protection against ICMP floods (Default: Disabled)
udp-flood Enable the screening method for protection against UDP floods (Default: Disabled)
syn-flood Enable the screening method for protection against TCP SYN floods (Default: Disabled)
arp-flood Enable the screening method for protection against ARP floods (Default: Disabled)
address-sweep Enable the screening method for protection against IP address sweeps (Default: Disabled)
port-scan Enable the screening method for protection against port scans (Default: Disabled)
ip-spoof Enable the screening method for protection against IP spoofing (Default: Disabled)
action Set the action to perform if an alarm is triggered (Default: alarm)
disconnect Disconnect the station but do not ban it from reconnecting
ssid <string> security screening {icmp-flood|udp-flood|syn-flood|arp-flood|address-sweep|port-scan|ip-spoof} action {alarm|drop|ban} <number>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
icmp-flood Enable the screening method for protection against ICMP floods (Default: Disabled)
udp-flood Enable the screening method for protection against UDP floods (Default: Disabled)
syn-flood Enable the screening method for protection against TCP SYN floods (Default: Disabled)
arp-flood Enable the screening method for protection against ARP floods (Default: Disabled)
address-sweep Enable the screening method for protection against IP address sweeps (Default: Disabled)
port-scan Enable the screening method for protection against port scans (Default: Disabled)
ip-spoof Enable the screening method for protection against IP spoofing (Default: Disabled)
action Set the action to perform if an alarm is triggered (Default: alarm)
alarm Send an alarm but continue to pass traffic
drop Drop traffic for a period of time
ban Disconnect the station and ban it from reconnecting for a period of time
<number> Enter the amount of time in seconds to perform the action (Range: 1-1000000000; Default: 10 for alarm, 1 for drop, 3600 for ban)
ssid <string> security screening {icmp-flood|udp-flood|syn-flood|arp-flood|address-sweep|port-scan|ip-spoof} threshold <number> action ban-forever
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
icmp-flood Enable the screening method for protection against ICMP floods (Default: Disabled)
udp-flood Enable the screening method for protection against UDP floods (Default: Disabled)
syn-flood Enable the screening method for protection against TCP SYN floods (Default: Disabled)
arp-flood Enable the screening method for protection against ARP floods (Default: Disabled)
address-sweep Enable the screening method for protection against IP address sweeps (Default: Disabled)
port-scan Enable the screening method for protection against port scans (Default: Disabled)
ip-spoof Enable the screening method for protection against IP spoofing (Default: Disabled)
threshold Set the threshold: packets per second for syn-flood and arp-flood, air time for icmp-flood and udp-flood, milliseconds every 10 packets for address-sweep and port-scan, IP addresses for ip-spoof
<number> Enter the threshold value (Defaults and Ranges: ICMP flood: 20%, 1-100%; UDP flood 50%, 1-100%; SYN flood: 1000 pkts/sec, 1-1000000 pkts/sec; ARP flood 100 pkts/sec, 1-1000000 pkts/sec; address sweep and port scan: 100 ms/10 pkts, 1-10000 ms; IP spoof: 3 src IPs/src MAC, 2-10 IPs; RADIUS attack: 5 secs/10 rejects, 1-3600 secs)
action Set the action to perform if an alarm is triggered (Default: alarm)
ban-forever Disconnect the station and ban it from reconnecting indefinitely
ssid <string> security screening {icmp-flood|udp-flood|syn-flood|arp-flood|address-sweep|port-scan|ip-spoof} threshold <number> action disconnect
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
icmp-flood Enable the screening method for protection against ICMP floods (Default: Disabled)
udp-flood Enable the screening method for protection against UDP floods (Default: Disabled)
syn-flood Enable the screening method for protection against TCP SYN floods (Default: Disabled)
arp-flood Enable the screening method for protection against ARP floods (Default: Disabled)
address-sweep Enable the screening method for protection against IP address sweeps (Default: Disabled)
port-scan Enable the screening method for protection against port scans (Default: Disabled)
ip-spoof Enable the screening method for protection against IP spoofing (Default: Disabled)
threshold Set the threshold: packets per second for syn-flood and arp-flood, air time for icmp-flood and udp-flood, milliseconds every 10 packets for address-sweep and port-scan, IP addresses for ip-spoof
<number> Enter the threshold value (Defaults and Ranges: ICMP flood: 20%, 1-100%; UDP flood 50%, 1-100%; SYN flood: 1000 pkts/sec, 1-1000000 pkts/sec; ARP flood 100 pkts/sec, 1-1000000 pkts/sec; address sweep and port scan: 100 ms/10 pkts, 1-10000 ms; IP spoof: 3 src IPs/src MAC, 2-10 IPs; RADIUS attack: 5 secs/10 rejects, 1-3600 secs)
action Set the action to perform if an alarm is triggered (Default: alarm)
disconnect Disconnect the station but do not ban it from reconnecting
ssid <string> security screening {icmp-flood|udp-flood|syn-flood|arp-flood|address-sweep|port-scan|ip-spoof} threshold <number> action {alarm|drop|ban} <number>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
screening Set the security screen parameters
icmp-flood Enable the screening method for protection against ICMP floods (Default: Disabled)
udp-flood Enable the screening method for protection against UDP floods (Default: Disabled)
syn-flood Enable the screening method for protection against TCP SYN floods (Default: Disabled)
arp-flood Enable the screening method for protection against ARP floods (Default: Disabled)
address-sweep Enable the screening method for protection against IP address sweeps (Default: Disabled)
port-scan Enable the screening method for protection against port scans (Default: Disabled)
ip-spoof Enable the screening method for protection against IP spoofing (Default: Disabled)
threshold Set the threshold: packets per second for syn-flood and arp-flood, air time for icmp-flood and udp-flood, milliseconds every 10 packets for address-sweep and port-scan, IP addresses for ip-spoof
<number> Enter the threshold value (Defaults and Ranges: ICMP flood: 20%, 1-100%; UDP flood 50%, 1-100%; SYN flood: 1000 pkts/sec, 1-1000000 pkts/sec; ARP flood 100 pkts/sec, 1-1000000 pkts/sec; address sweep and port scan: 100 ms/10 pkts, 1-10000 ms; IP spoof: 3 src IPs/src MAC, 2-10 IPs; RADIUS attack: 5 secs/10 rejects, 1-3600 secs)
action Set the action to perform if an alarm is triggered (Default: alarm)
alarm Send an alarm but continue to pass traffic
drop Drop traffic for a period of time
ban Disconnect the station and ban it from reconnecting for a period of time
<number> Enter the amount of time in seconds to perform the action (Range: 1-1000000000; Default: 10 for alarm, 1 for drop, 3600 for ban)
ssid <string> security wlan dos station-level frame-type {assoc-req|auth|eapol} ban <number>
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
wlan Set WLAN parameters
dos Set WLAN DoS (Denial of Service) parameters
station-level Set DoS parameters at station-level
frame-type Set WLAN DoS (Denial of Service) frame type
assoc-req Specify WLAN DoS frame type assoc-req
auth Specify WLAN DoS frame type auth
eapol Specify WLAN DoS frame type eapol
ban Set the period of time to ignore frames after a theshold has been crossed
<number> Enter the period of time in seconds to ignore frames after a theshold has been crossed (Default: 60; Min: 0 Max: None)
ssid <string> security wlan dos station-level frame-type {assoc-req|auth|eapol} ban forever
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
wlan Set WLAN parameters
dos Set WLAN DoS (Denial of Service) parameters
station-level Set DoS parameters at station-level
frame-type Set WLAN DoS (Denial of Service) frame type
assoc-req Specify WLAN DoS frame type assoc-req
auth Specify WLAN DoS frame type auth
eapol Specify WLAN DoS frame type eapol
ban Set the period of time to ignore frames after a theshold has been crossed
forever Set ban forever
ssid <string> security wlan dos {ssid-level|station-level} frame-type {probe-req|probe-resp|assoc-req|assoc-resp|disassoc|auth|deauth|eapol|all}
ssid Set SSID (Service Set Identifier) parameters
<string> Enter an SSID profile name (1-32 chars)
security Set the security parameters for the SSID
wlan Set WLAN parameters
dos Set WLAN DoS (Denial of Service) parameters
ssid-level Set DoS parameters at ssid-level