Set rogue access point detection (rad) parameters, Command line interface (cli) – HP ProCurve 520wl Wireless Access Point User Manual

Page 159

Advertising
background image

Command Line Interface (CLI)

Figure C-18 Result of “show radius” CLI Command

Configure RADIUS Accounting server

[Device-Name]>set radacctbl <index> status <enable> seraddrfmt <ipaddr or name> ipaddr

<RADIUS IP address or name> port <user defined> ssecret <user defined>

responsetm <1 to 4 seconds> maxretx <1 to 10 times>

[Device-Name]>show radacctbl

Figure C-19 Results of “show radacctbl” CLI command

Set Rogue Access Point Detection (RAD) Parameters

The Rogue AP Detection (RAD) feature enables an additional security level for wireless LAN deployments. The RAD
feature provides a mechanism for detecting Rogue Access Points by utilizing the coverage of the trusted Access Point
deployment.
The Rogue AP Scan employs background scanning using low-level 802.11 scanning functions for effective wireless
detection of Access Points in its coverage area with minimal impact on the normal operation of the Access Point.
The set radstatus command enables Rogue Access Point Detection. The scan repetition duration (radscanint) is
also configurable.If the Access Point uses directional antennas to provide directional coverage, then the interface
bitmask (radifbitmask) can be configured to maximize the scanning coverage area.

[Device-Name]>set radstatus enable

[Device-Name]>set radscanint <15-1440>

[Device-Name]>set radifbitmask <4 (WiF A), 8 (WiF B), or 12 (both interfaces)>

[Device-Name]>show rad

Figure C-20 Results of “show rad” CLI command

C-23

Advertising