Printronix Network Interface Card User Manual

Page 308

Advertising
background image

Chapter 15

Complete Command List

308

WLAN

ADAPTER,

WLAN

Defines the authentication scheme:

store ifc <ifnum> wlan auth <auth-method>
(eg. open, shared, leap, kerb)

“Open” system authentication allows all devices that have the
authentication algorithm number for open system to
authenticate.

“Shared” key authentication involves a four step process using
secure or encrypted text by means of WEP.

“Leap” is to enable/disable LEAP operation.

“Kerb” is for Kerberos.

WLAN

ADAPTER,

WLAN

Define a auth-user-name to be used in the LEAP operation:

store ifc <ifnum> wlan user <auth-user-name>J/F3 1 Tf9.96 0 0 9.96 243 ( a4“)-6.6 9

•rn8( a)-1228(u)-0.1(th-)6228(u)-0.1sc

meen

the usn a

be e(te)-12.2(r)5.8(e)-122(du)-0.1 .96c0 nu

the

LEPEiceusis(.)]TJ/F2 1 Tf11.5355 0 0 12 190.8 0-6.64 Tm-0.0077 Tc0 Tw[(WLA)6.9(N)]TJ-2.0805 -1.17 TD-0.0146 Tc[(AD)-10.4(AP)-13.4(T)-7(E)-3(R,)]TJ2.0805 -1.17 TD-0.0077 Tc[(WLA)6.9(N)]TJ/F3 1 Tf9.96 0 0 9.96 243 0-6.64 Tm-0.0017 Tc0.0008 Tw[(Defi)-864(ne)-28( a au)-21(th-)61(p-0.1 a)-12(s)4.3(s)-7.7wnforu(s)-7.7ednthn APA( one)-28rtion:

Advertising