Chapter 15 Complete Command List

WLAN

Defines the authentication scheme:

ADAPTER,

store ifc <ifnum> wlan auth <auth-method>

WLAN

(eg. open, shared, leap, kerb)

 

“Open” system authentication allows all devices that have the

 

 

authentication algorithm number for open system to

 

 

authenticate.

 

“Shared” key authentication involves a four step process using

 

 

secure or encrypted text by means of WEP.

 

“Leap” is to enable/disable LEAP operation.

 

“Kerb” is for Kerberos.

WLAN

Define a auth-user-name to be used in the LEAP operation:

ADAPTER,

store ifc <ifnum> wlan user <auth-user-name>J /F3 1 Tf 9.96 0 0 9.96

WLAN

the

LEPEiceusis(.)]TJ /F2 1 Tf 11.5355 0 0 12 190.8 0-6.64 Tm -0.007

 

the

LEPEiceusis(.)]TJ /F2 1 Tf 11.5355 0 0 12 190.824“WLAN

ADAPTER,

WLAN

308