Digi 90000566_H Gtc, Mschapv2, Otp, Ttlsmschapv2, Shortpreamble, Verifycert, Username=string

Models: 90000566_H

1 278
Download 278 pages 26.72 Kb
Page 247
Image 247

set wlan

inner_eap={[gtc],[md5],[mschapv2],[otp],[chap],[mschap], [ttls_mschapv2],[pap,[any]]}

The types of protocols that are allowed to authenticate the device. These are used within the encrypted connection established by PEAP or TTLS.

The following are Extensible Access Protocols (EAP) that can be used with PEAP or TTLS:

gtc

Generic token card.

md5

Message Digest Algorithm (MD5).

mschapv2

Microsoft Challenge response Protocol version 2.

otp

One Time Password.

The following are non-EAP protocols that can be used with TTLS:

chap

Challenge response Protocol.

mschap

Microsoft Challenge response Protocol.

ttls_mschapv2

Microsoft Challenge response Protocol version 2.

pap

Password Authentication Protocol.

any

Sets all inner Extensible Authentication Protocols.

options={[diversity],[short_preamble],[verify_cert]} diversity

Enable reception on multiple antennas on devices with this capability.

short_preamble

Enable transmission of wireless frames using short preambles, if allowed by the access point.

verify_cert

Verify that certificates received from an authentication server or access point are signed by a trusted certificate authority (CA). Standard CAs are built in, and additional trusted certificates may be added.

username=string

Used when the “security” option is set to “wpa_auth.” This option specifies the user name to be used during authentication.

password=string

Used when the “security” option is set to “wpa_auth.” This option specifies the password to be used during authentication.

Chapter 2 Command Descriptions

247

Page 247
Image 247
Digi 90000566_H Gtc, Mschapv2, Otp, Ttlsmschapv2, Options=diversity,shortpreamble,verifycert diversity, Shortpreamble