304 Configuring APs
NN47250-500 (Version 03.01)
operational channel: 48 operational power: 11
base mac: 00:0b:0e:0a:60:01
bssid1: 00:0b:0e:0a:60:01, ssid: public
bssid2: 00:0b:0e:0a:60:03, ssid: nortel
The fingerprint is displayed regardless of whether it has been verified in WSS Software.

Verifying a fingerprint on the switch

To verify an AP’s fingerprint on a WSS, use the following command:
set ap num fingerprint hex
where hex is the 16-digit hexadecimal number of the fingerprint. Use a colon between each digit. Make sure
the fingerprint you enter matches the fingerprint used by the AP.
The following example sets the fingerprint for Distributed AP 8:
WSS# set ap 8 fingerprint b4:f9:2a:52:37:58:f4:d0:10:75:43:2f:45:c9:52:c3
success: change accepted.

Setting the AP security requirement on a WSS

You can configure the WSS to require all Distributed APs to have encryption keys. In this case, the WSS does
not establish a management session with a Distributed AP unless the AP has a key, and you have confirmed
the key’s fingerprint in WSS Software.
To configure AP security requirements, use the following command:
set ap security {require | optional | none}
The require option enforces encryption of management traffic for all Distributed APs, and requires the key
fingerprints to be confirmed in WSS Software. The none option disables encryption of management traffic for
all Distributed APs. The default is optional, which allows connection to APs with or without encryption.
The following command configures a WSS to require Distributed APs to have encryption keys:
WSS# set ap security require
Note. The show ap config command lists an AP’s fingerprint only if the fingerprint has
been verified in WSS Software. If the fingerprint has not been verified, the fingerprint info in
the command output is blank.
Note. A change to AP security support does not affect management sessions that are
already established. To apply the new setting to an AP, restart the AP.