Transcription

Cisco IOS Command Reference forCisco Aironet Access Points and BridgesCisco IOS Release 12.4(25d)JA and 12.3(8)JEEDecember 2010Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000800 553-NETS (6387)Fax: 408 527-0883Text Part Number: OL-24115-01

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALLSTATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUTWARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THATSHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSEOR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s publicdomain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITHALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUTLIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OFDEALING, USAGE, OR TRADE PRACTICE.IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCOOR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, the Cisco logo, DCE, and Welcome to the Human Network aretrademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You,Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems,Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing,FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, IronPort, the IronPort logo,LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels,ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and theWebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationshipbetween Cisco and any other company. (0807R)Cisco IOS Command Reference for Cisco Aironet Access Points and BridgesCopyright 2010 Cisco Systems, Inc. All rights reserved.

CONTENTSPrefacevUsing the Command-Line InterfaceType of Memory1-11-1CLI Command Modes 1-1User EXEC Mode 1-2Privileged EXEC Mode 1-2Global Configuration Mode 1-3Interface Configuration Mode 1-3Cisco IOS Commands for Access Pointsand Bridges 2-1List of Supported Cisco IOS CommandsA-1Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-01iii

ContentsCisco IOS Command Reference for Cisco Aironet Access Points and Bridgesiv0L-24115-01

PrefaceAudienceThis guide is for the networking professional using the Cisco IOS command-line interface (CLI) tomanage Cisco Aironet access points and bridges that run Cisco IOS software. Before using this guide,you should have experience working with Cisco IOS commands and access point and bridge softwarefeatures.You also need to be familiar with the concepts and terminology of Ethernet and local areanetworking.PurposeThis guide provides information about new and revised Cisco IOS commands. For information about thestandard Cisco IOS commands, refer to the IOS documentation set available from the Cisco.com home tsd products support series home.htmlThis guide does not provide procedures for configuring your access point or bridge. For detailedconfiguration procedures, refer to the Cisco IOS Software Configuration Guide for Cisco Aironet AccessPoints, the Cisco Aironet 1300 Series Outdoor Access Point/Bridge Software Configuration Guide, orthe Cisco Aironet 1400 Series Bridge Software Configuration Guide for this release.OrganizationThis guide is organized into these sections:Chapter 1, “Using the Command-Line Interface,” describes how to access the command modes and usethe command-line interface (CLI) to configure software features.Chapter 2, “Cisco IOS Commands for Access Points and Bridges,” describes in alphabetical order theCisco IOS commands that you use to configure and monitor your access point or bridge.Appendix A, “List of Supported Cisco IOS Commands,” lists the Cisco IOS commands that accesspoints and bridges support. Cisco IOS commands that are not in this list have not been tested on accesspoints and bridges and might not be supported.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-01v

PrefaceConventionsThis publication uses these conventions to convey instructions and information:Command descriptions use these conventions: Commands and keywords are in boldface text. Arguments for which you supply values are in italic. Square brackets ([ ]) means optional elements. Braces ({ }) group required choices, and vertical bars ( ) separate the alternative elements. Braces and vertical bars within square brackets ([{ }]) mean a required choice within an optionalelement.Notes, cautions, and warnings use these conventions and symbols:NoteCautionWarningMeans reader take note. Notes contain helpful suggestions or references to materials not contained inthis manual.Means reader be careful. In this situation, you might do something that could result in equipmentdamage or loss of data.The warning symbol means danger. You are in a situation that could cause bodily injury. Before youwork on any equipment, be aware of the hazards involved with electrical circuitry and be familiarwith standard practices for preventing accidents.Related PublicationsThese documents provide complete information about the access point and are available from thisCisco.com html Cisco IOS Software Configuration Guide for Cisco Aironet Access Points, Cisco IOS Releases12.4(25d)JA & 12.3(8)JEE and the Cisco IOS Software Configuration Guide for Aironet 1400 SeriesWireless Bridge (12.3.(8)JA) describe major product features and how to install and configure accesspoints and bridges. Getting Started Guide: Cisco Aironet 1260 Series Access Points; Getting Started Guide: CiscoAironet 1040 Series Access Points; Quick Start Guide: Cisco Aironet 1250 Series Access Points; andQuick Start Guide: Cisco Aironet 1400 Series Wireless Bridges describe how to attach cables, mountthe access point or bridge, and how to obtain product documentation. A quick start guide is includedin the shipping box with your access point or bridge. Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.4(23c)JA and Release Notesfor Cisco Aironet Access Points and Bridges for Cisco IOS Release 12.4(21a)JY describe features,important notes, and caveats for access points and bridges running this release.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridgesvi0L-24115-01

PrefaceObtaining Documentation, Obtaining Support, and SecurityGuidelinesFor information on obtaining documentation, obtaining support, providing documentation feedback,security guidelines, and also recommended aliases and general Cisco documents, see the monthlyWhat’s New in Cisco Product Documentation, which also lists all new and revised Cisco technicaldocumentation, w/whatsnew.htmlCisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-01vii

PrefaceCisco IOS Command Reference for Cisco Aironet Access Points and Bridgesviii0L-24115-01

C H A P T E R1Using the Command-Line InterfaceThis chapter describes how to use the Cisco IOS command-line interface (CLI) for configuring softwarefeatures on your access point or bridge.For a complete description of the new and revised Cisco IOS commands supported by access points andbridges, see Appendix A, “List of Supported Cisco IOS Commands.”For more information on Cisco IOS commands, refer to the Cisco IOS Release 12.3 Command Summary.For task-oriented configuration steps, refer to the Cisco IOS Software Configuration Guide for CiscoAironet Access Points or the Cisco Aironet 1400 Series Wireless Bridge Software Configuration Guide.Type of MemoryThe access point and bridge Flash memory stores the Cisco IOS software image, the startupconfiguration file, and helper files.CLI Command ModesThis section describes the CLI command mode structure. Command modes support specific Cisco IOScommands. For example, the interface interface-id command works only when entered in globalconfiguration mode.These are the main command modes for access points and bridges: User EXEC Privileged EXEC Global configuration Interface configurationTable 1-1 lists the main command modes, how to access each mode, the prompt you see in that mode,and how to exit that mode. The prompts listed use the default name ap.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-011-1

Chapter 1Using the Command-Line InterfaceCLI Command ModesTable 1-1Command Modes SummaryCommand ModeAccess MethodPromptExitUser EXECThis is the first level of access.AP Enter the logout command.Change terminal settings,perform basic tasks, and listsystem information.Privileged EXECFrom user EXEC mode, enter the AP#enable command.To exit to user EXEC mode, enter thedisable command.GlobalconfigurationFrom privileged EXEC mode,enter the configure command.To exit to privileged EXEC mode,enter the exit or end command, orpress Ctrl-Z.InterfaceconfigurationFrom global configuration mode, AP(config-if)#specify terminal then specify aninterface by entering theinterface command followed bythe interface type and number.AP(config)#To exit to privileged EXEC mode,enter the end command, or pressCtrl-Z.To exit to global configuration mode,enter the exit command.User EXEC ModeAfter you access the device, you are automatically in user EXEC command mode. The EXEC commandsavailable at the user level are a subset of those available at the privileged level. In general, use the EXECcommands to temporarily change terminal settings, perform basic tests, and list system information.The supported commands can vary depending on the version of Cisco IOS software in use. To view acomprehensive list of commands, enter a question mark (?) at the prompt.AP ?Privileged EXEC ModeBecause many of the privileged commands configure operating parameters, privileged access should bepassword-protected to prevent unauthorized use. The privileged command set includes those commandscontained in user EXEC mode, as well as the configure privileged EXEC command through which youaccess the remaining command modes.If your system administrator has set a password, you are prompted to enter it before being granted accessto privileged EXEC mode. The password does not appear on the screen and is case sensitive.The privileged EXEC mode prompt is the device name followed by the pound sign (#):AP#Enter the enable command to access privileged EXEC mode:AP enableAP#Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges1-20L-24115-01

Chapter 1Using the Command-Line InterfaceCLI Command ModesThe supported commands can vary depending on the version of Cisco IOS software in use. To view acomprehensive list of commands, enter a question mark (?) at the prompt.AP# ?To return to user EXEC mode, enter the disable privileged EXEC command.Global Configuration ModeGlobal configuration commands apply to features that affect the device as a whole. Use the configureprivileged EXEC command to enter global configuration mode. The default is to enter commands fromthe management console.When you enter the configure command, a message prompts you for the source of the configurationcommands:AP# configureConfiguring from terminal, memory, or network [terminal]?You can specify the terminal or memory as the source of configuration commands.This example shows you how to access global configuration mode:AP# configure terminalEnter configuration commands, one per line. End with CNTL/Z.AP(config)#The supported commands can vary depending on the version of Cisco IOS software in use. To view acomprehensive list of commands, enter a question mark (?) at the prompt:AP(config)# ?To exit global configuration command mode and to return to privileged EXEC mode, enter the end orexit command, or press Ctrl-Z.Interface Configuration ModeInterface configuration commands modify the operation of the interface. Interface configurationcommands always follow a global configuration command, which defines the interface type.Use the interface interface-id command to access interface configuration mode. The new prompt meansinterface configuration mode:AP(config-if)#The supported commands can vary depending on the version of Cisco IOS software in use. To view acomprehensive list of commands, enter a question mark (?) at the prompt:AP(config-if)# ?To exit interface configuration mode and to return to global configuration mode, enter the exitcommand. To exit interface configuration mode and to return to privileged EXEC mode, enter the endcommand, or press Ctrl-Z.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-011-3

Chapter 1Using the Command-Line InterfaceCLI Command ModesCisco IOS Command Reference for Cisco Aironet Access Points and Bridges1-40L-24115-01

C H A P T E R2Cisco IOS Commands for Access Pointsand BridgesThis chapter lists and describes Cisco IOS commands in Cisco IOS Release 12.3(8)JA that you use toconfigure and manage your access point, bridge, and wireless LAN. The commands are listedalphabetically. Refer to Appendix A, “List of Supported Cisco IOS Commands,” for a complete list ofCisco IOS commands supported by access points and bridges.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-012-1

Chapter 2Cisco IOS Commands for Access Points and Bridgesaaa authentication login default local cacheaaa authentication login default local cacheTo set a local login cache for authentication, authorization, and accounting (AAA) authentication, usethe aaa authentication login default local cache command in global configuration mode. To disablethe local login cache, use the no form of this command:[no] aaa authentication login default local cache [word radius tacacs ]Syntax DescriptionwordCharacter string used to name the local login cache used for AAAauthentication login.radius(Optional) Specifies the RADIUS host used for the AAA authenticationlogin.tacacs (Optional) Specifies the TACACS host used for the AAA authenticationlogin.Command DefaultThere is no default for this command.Command ModesGlobal configurationCommand HistoryReleaseModification12.3(7)JAThis command was introduced.ExamplesThe following example creates a local cache for an AAA authentication list called tac admin set as thedefault list used for all login authentications. This authentication checks the local cache first, and if theinformation is not available, the authentication server (group tac admin) is contacted and theinformation is also stored in the local cache.AP(config)# aaa authentication login default cache tac admin group tac adminRelated CommandsCommandDescriptionaaa authorization exec defaultlocal cacheSets the local cache for AAA exec authorizationaaa cache profileSets the AAA cache profile nameaaa group serverSets the AAA group server namecache authorization profileSets the cache authorization profile namecache expirySets the expiration time for the local cacheserverSets the IP address for the serverCisco IOS Command Reference for Cisco Aironet Access Points and Bridges2-20L-24115-01

Chapter 2Cisco IOS Commands for Access Points and Bridgesaaa authorization exec default local cacheaaa authorization exec default local cacheTo set a local cache for AAA exec authorization, use the aaa authorization exec default local cachecommand in global configuration mode. To disable the local cache, use the no form of this command:[no] aaa authorization exec default local cache [word radius tacacs ]Syntax DescriptionwordCharacter string used to name the local cache for exec AAA authorization.radius(Optional) Specifies the RADIUS server used for the exec AAAauthorization.tacacs (Optional) Specifies the TACACS server used for the exec AAAauthorization.Command DefaultThere is no default for this command.Command ModesGlobal configurationCommand HistoryReleaseModification12.3(7)JAThis command was introduced.ExamplesThe following example creates a local exec mode cache for an AAA authorization list called tac adminset as the default list used for all login authorizations. This authorization checks the local cache first, andif the information is not available, the authorization server (group tac admin) is contacted and theinformation is also stored in the local cache.AP(config)# aaa authorization exec default cache tac admin group tac adminRelated CommandsCommandDescriptionaaa authentication login defaultlocal cacheSets local cache for AAA authentication loginaaa cache profileSets the AAA cache profile nameaaa group serverSets the AAA group server namecache authentication profileSets the cache authentication profile namecache expirySets the expiration time for the local cacheserverSets the IP address for the serverCisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-012-3

Chapter 2Cisco IOS Commands for Access Points and Bridgesaaa cache profileaaa cache profileTo set storage rules for the AAA cache, use the aaa cache profile command in global configurationmode. To disable the AAA cache profile, use the no form of this command:[no] aaa cache profile name[no] profile exact match [no-auth][no] regexp match expression [any only] [no-auth][no] all [no-auth]Syntax DescriptionnameCharacter string used to name the AAA cache profile.profile exact matchSpecifies a username that must exactly match the AAA server responsebefore the information is saved in the cache.no-authSpecifies that password authentication is not performed.regexp match expression Specifies a regular expression that must match the AAA server responsebefore the information is included in the cache.NoteThis option is not recommended because it can require extensiveprocessing time.anySpecifies that any AAA server response that matchesregexp match expression is saved in the cache.onlySpecifies that only 1 AAA server response that matchesregexp match expression is saved in the cache.allSpecifies that all AAA server responses are saved in the cache.Command DefaultThere is no default for this command.Command ModesGlobal configurationCommand HistoryReleaseModification12.3(7)JAThis command was introduced.ExamplesThe following example sets a name of admin cache for the AAA cache profile and only stores AAAserver responses with the username administrator in the cache.AP(config)# aaa cache admin cacheAP(config-profile-map)# profile administratorCisco IOS Command Reference for Cisco Aironet Access Points and Bridges2-40L-24115-01

Chapter 2Cisco IOS Commands for Access Points and Bridgesaaa cache profileRelated CommandsCommandDescriptionaaa authentication login defaultlocal cacheSets local cache for AAA authentication loginaaa authentication login defaultlocal cacheSets local cache for AAA authentication loginaaa group serverSets the AAA group server namecache authentication profileSets the cache authentication profile namecache authorization profileSets the cache authorization profile namecache expirySets the expiration time for the local cacheserverSets the IP address for the serverCisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-012-5

Chapter 2Cisco IOS Commands for Access Points and Bridgesaaa pod serveraaa pod serverTo enable inbound user sessions to be disconnected when specific session attributes are presented, use theaaa pod server global configuration command. To disable this feature, use the no form of this command.Packet of Disconnect (POD) consists of a method of terminating a session that has already been connected.The POD is a RADIUS disconnect request packet and is intended to be used in situations where the authenticating agent server wants to disconnect the user after the session has been accepted by the RADIUSaccess accept packet.aaa pod server {auth-type [all any session-key] clients IP-address ignore [server-key session-key] port number server-key string}no aaa pod serverSyntax Descriptionauth-type(Optional) Specifies the type of authorization required for disconnectingsessions. For 802.11 sessions, the Calling-Station-ID [31] RADIUS attribute mustbe supplied in the POD request. This is the MAC address of the client. No otherattributes are used; therefore all and any have the same effect.Notesession-key is not supported for 802.11 sessions.any(Optional) Specifies that the session that matches all attributes sent in the PODpackets are disconnected. The POD packet can contain one or more of four keyattributes (user-name, framed-IP-address, session-ID, and session-key).(Optional) Only a session that matches all four key attributes is disconnected. All isthe default.(Optional) Specifies the IP addresses for up to four RADIUS servers that may benominated as clients. If this configuration is present and a POD request originatesfrom a device that is not on the list, it is rejected.(Optional) When set to server-key, the shared secret is not validated when a PODrequest is received.(Optional) Specifies the unsolicited data packet (UDP) port on which the accesspoint listens for packet of disconnect (POD) requests. If no port is specified, thedefault 1700 port is used.(Optional) Specifies that the session that has a matching session-key attribute isdisconnected. All other attributes are ignored.NoteThis option is not supported for 802.11 sessions.allclients addressignoreport numbersession-keyserver-key stringCommand DefaultConfigures the secret text string that is shared between the network access server andthe client workstation. This secret string must be the same on both systems.The POD server function is disabled.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges2-60L-24115-01

Chapter 2Cisco IOS Commands for Access Points and Bridgesaaa pod serverCommand ModesGlobal configurationCommand HistoryReleaseModification12.1(3)TThis command was introduced.12.3(8)JAThe clients and ignore keywords were added.Usage GuidelinesRelated CommandsFor a session to be disconnected, the values in one or more of the key fields in the POD request mustmatch the values for a session on one of the network access server ports. Which values must matchdepends on the auth-type attribute defined in the command. If no auth-type is specified, all four valuesmust match. If no match is found, all connections remain intact and an error response is returned. Thekey fields are as follows: User-Name Framed-IP-Address Session-Id Server-KeyCommandDescriptionaaa authenticationEnables authentication.aaa accountingEnables accounting records.aaa accountingdelay-startDelays generation of the start accounting record until the user IP address isestablished.debug aaa podDisplays debug messages related to POD packets.radius-server hostIdentifies a RADIUS host.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-012-7

Chapter 2Cisco IOS Commands for Access Points and Bridgesaccounting (SSID configuration mode)accounting (SSID configuration mode)Use the accounting SSID configuration mode command to enable RADIUS accounting for the radiointerface (for the specified SSID). Use the no form of the command to disable accounting.[no] accounting list-nameSyntax Descriptionlist-nameDefaultsThis command has no defaults.Command ModesSSID configuration interfaceCommand HistoryReleaseModification12.2(4)JAThis command was introduced.Specifies the name of an accounting list.Usage GuidelinesYou create accounting lists using the aaa accounting command. These lists indirectly reference theserver where the accounting information is stored.ExamplesThis example shows how to enable RADIUS accounting and set the RADIUS server name:AP(config-if-ssid)# accounting radius1This example shows how to disable RADIUS accounting:AP(config-if-ssid)# no accountingRelated CommandsCommandDescriptionssidSpecifies the SSID and enters the SSID configuration modeCisco IOS Command Reference for Cisco Aironet Access Points and Bridges2-80L-24115-01

Chapter 2Cisco IOS Commands for Access Points and Bridgesadmission-control (QOS Class interface configuration mode)admission-control (QOS Class interface configuration mode)Use the admission-control QOS Class interface configuration mode command to require call admissioncontrol (CAC) traffic for a radio interface. Use the no form of the command to remove the setting.[no] admission-controlNoteThis command is not supported on c1200 and c1100 platforms.NoteThis command is not supported when operating in repeater mode.Syntax DescriptionThis command has no arguments or keywords.DefaultsThis command has no defaults.Command ModesQOS Class interface configuration modeCommand HistoryReleaseModification12.3(8)JAThis command was introduced.ExamplesThis example shows how to configure CAC admission control as a requirement for the radio interface:AP(config)# interface dot11radio 0AP(config-if)# dot11 qos class voiceAP(config-if-qosclass)# admission-controlThis example shows how to remove the CAC admission control requirement on the radio interface:AP(config-if-qosclass)# no admission-controlRelated CommandsCommandDescriptionadmit-traffic (QOS Class interface Specifies that CAC traffic is enabled for the radio interface.configuration mode)cw-max (QOS Class interfaceconfiguration mode)Specifies the CAC maximum contention window size for theradio interface.cw-min (QOS Class interfaceconfiguration mode)Specifies the CAC minimum contention window size for theradio interface.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-012-9

Chapter 2Cisco IOS Commands for Access Points and Bridgesadmission-control (QOS Class interface configuration mode)CommandDescriptionfixed-slot (QOS Class interfaceconfiguration mode)Specifies the CAC fixed fallback slot time for the radiointerface.transmit-op (QOS Class interfaceconfiguration mode)Specifies the CAC transmit opportunity time for the radiointerface.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges2-100L-24115-01

Chapter 2Cisco IOS Commands for Access Points and Bridgesadmit-traffic (SSID configuration mode)admit-traffic (SSID configuration mode)Use the admit-traffic SSID configuration mode command to enable or disable call admission control(CAC) traffic for an SSID. Use the no form of the command to disable all CAC traffic for the SSID.[no] admit-trafficNoteThis command is not supported when operating in repeater mode.Syntax DescriptionThis command has no arguments or keywords.DefaultsBy default, the admission control is disabled on all SSIDs.Command ModesSSID configuration modeCommand HistoryReleaseModification12.3(8)JAThis command was introduced.ExamplesThis example shows how to enable CAC traffic support for the test SSID:AP(config)# dot11 ssid testAP(config-ssid)# admit-trafficThis example shows how to disable CAC traffic on the test SSID:AP(config)# dot11 ssid testAP(config-ssid)# no admit-trafficRelated CommandsCommandDescriptionadmit-traffic (QOS ClassConfigures CAC admission control on the access point.interface configuration mode)show dot11 cacDisplays admission control information on the access point.traffic-streamConfigures CAC traffic data rates and priorities on the access point.debug cacProvides debug information for CAC admission control on the accesspoint.Cisco IOS Command Reference for Cisco Aironet Access Points and Bridges0L-24115-012-11

Chapter 2Cisco IOS Commands for Access Points and Bridgesadmit-traffic (QOS Class interface configuration mode)admit-traffic (QOS Class interface configuration mode)Use the admit-traffic QOS Class interface configuration mode command to enable CAC traffic for aradio interface. Use the no form of the command to disable all CAC traffic for the access point.admit-traffic {narrowband signaling} {infinite max-channel percent}[roam-channel roam]no admit-trafficNoteSyntax DescriptionThis command is not supported when operating in repeater mode.narrowbandSpecifies that narrowband codecs are allowed on the radio interface.signalingSpecifies that signaling only is allowed on the radio interface.infiniteSpecifies unlimited channel utilization is allowed for the CAC traffic on theradio interface.max-channel percentSpecifies the maximum percentage (1 to 100) of channel utilization a

Chapter 2, “Cisco IOS Commands for Access Points and Bridges,” describes in alphabetical order the Cisco IOS commands that you use to configure and monitor your access point or bridge. Appendix A, “List of Supported Cisco IOS Commands,” lists the Cisco