Siemens SCALANCE W770 Series Configuration Manuals

Siemens SCALANCE W770 Series Configuration Manuals

Simatic net industrial wireless lan ieee 802.11n command line interface
Table of Contents

Advertisement

SIMATIC NET
Industrial Wireless LAN
SCALANCE W770/W730 acc. to
IEEE 802.11n Command Line
Interface
Configuration Manual
09/2017
C79000-G8976-C324-08
Introduction
Description
Security recommendations
Configuration
Functions specific to
SCALANCE
System time
Network structures
Network protocols
Load control
Layer 3 functions
Security and authentication
Diagnostics
1
2
3
4
5
6
7
8
9
10
11
12

Advertisement

Table of Contents
loading

Summary of Contents for Siemens SCALANCE W770 Series

  • Page 1 Introduction Description Security recommendations SIMATIC NET Configuration Industrial Wireless LAN SCALANCE W770/W730 acc. to Functions specific to SCALANCE IEEE 802.11n Command Line Interface System time Configuration Manual Network structures Network protocols Load control Layer 3 functions Security and authentication Diagnostics 09/2017 C79000-G8976-C324-08...
  • Page 2 Note the following: WARNING Siemens products may only be used for the applications described in the catalog and in the relevant technical documentation. If products and components from other manufacturers are used, these must be recommended or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and maintenance are required to ensure that the products operate safely and without any problems.
  • Page 3: Table Of Contents

    Table of contents Introduction..............................19 Information on the Configuration Manual................19 Description..............................23 Configuration limits for WBM and CLI..................23 Working with the Command Line Interface (CLI)..............25 CLI modes..........................26 The CLI command prompt.....................27 Symbols of the CLI commands....................28 Interface identifiers and addresses..................29 2.6.1 Naming interfaces........................29 2.6.2 Address types, address ranges and address masks.............31 2.6.3...
  • Page 4 Table of contents 4.1.1.10 show ipv6 interface........................55 4.1.1.11 show pnio..........................56 4.1.1.12 show lldp neighbors.......................57 4.1.1.13 show lldp status........................57 4.1.1.14 show versions........................58 4.1.2 clear counters.........................59 4.1.3 configure terminal........................60 4.1.4 clear line vty...........................60 4.1.5 disable............................61 4.1.6 enable............................62 4.1.7 logout.............................62 4.1.8 ping............................63 4.1.9 ping ipv6..........................64 4.1.10 Commands in the global configuration mode.................65...
  • Page 5 Table of contents 4.2.5.8 sftp save..........................94 4.2.5.9 sftp server..........................95 4.2.5.10 password..........................96 4.2.5.11 no password...........................97 4.2.5.12 firmware-in-configpack......................98 4.2.5.13 no firmeware-in-configpack....................99 Reset and Defaults.........................99 4.3.1 restart.............................99 Configuration Save & Restore....................101 4.4.1 The "show" commands......................101 4.4.1.1 show running-config......................101 4.4.2 write startup-config.......................103 4.4.3 Commands in the global configuration mode...............104 4.4.3.1 auto-save..........................104 4.4.3.2...
  • Page 6 Table of contents 5.4.1.1 show wlan ipcf........................123 5.4.2 WLAN Interface Configuration mode...................124 5.4.2.1 wlan ipcf..........................124 5.4.2.2 no wlan ipcf..........................125 5.4.2.3 wlan ipcf protocol-support pnio (access point)..............126 5.4.2.4 no wlan ipcf protocol-support (access point)................127 5.4.2.5 wlan ipcf cycle-time (access point)..................127 5.4.2.6 wlan ipcf scan-mode (access point)..................128 5.4.2.7 wlan ipcf signal-quality-threshold (access point)..............129...
  • Page 7 Table of contents 5.9.2 WLAN Interface configuration mode..................157 5.9.2.1 wlan spectrumanalyzer centerfrequency (Access Point).............157 5.9.2.2 wlan spectrumanalyzer start (Access Point)................158 5.9.2.3 wlan spectrumanalyzer stop (Access Point)................159 5.10 Remote capture........................159 5.10.1 show remote capture......................160 5.10.2 Commands in the global configuration mode...............160 5.10.2.1 remote capture........................161 5.10.3...
  • Page 8 Table of contents 7.1.1.2 show wlan allowed channels....................186 7.1.1.3 show wlan antennas......................187 7.1.1.4 show wlan ap (access point)....................187 7.1.1.5 show wlan advanced-11n.....................188 7.1.1.6 show wlan available-ap-list (client)..................189 7.1.1.7 show wlan basic........................190 7.1.1.8 show wlan client (Client)......................191 7.1.1.9 show wlan client-list (access point)..................192 7.1.1.10 show wlan client-list-vap (access point)................193 7.1.1.11...
  • Page 9 Table of contents 7.1.5.21 wlan background scan mode (client)..................226 7.1.5.22 wlan background scan threshold (Client)................227 7.1.5.23 wlan beacon interval (access point)..................228 7.1.5.24 wlan channel (Access Point)....................229 7.1.5.25 wlan client mac mode (client)....................230 7.1.5.26 wlan client mac address (client)...................231 7.1.5.27 wlan data rates-11abg selected only (access point)............232 7.1.5.28 no wlan data rates-11abg selected only (access point)............233 7.1.5.29...
  • Page 10 Table of contents 7.1.7.4 wds connection over (access point)..................273 7.1.8 Commands in the force roaming configuration mode............273 7.1.8.1 Introductory sentence for the force roaming configuration mode.........273 7.1.8.2 dest-addr (Access Point)......................274 7.1.8.3 lost (Access Point).......................275 7.1.8.4 interval (Access Point)......................276 7.1.8.5 port (Access Point).......................277 7.1.8.6 no port (Access Point)......................278 VLAN............................278...
  • Page 11 Table of contents 7.3.1.10 show spanning-tree root.......................308 7.3.2 clear spanning-tree counters....................309 7.3.3 Commands in the global configuration mode...............309 7.3.3.1 spanning-tree........................310 7.3.3.2 no spanning-tree........................310 7.3.3.3 spanning-tree compatibility....................311 7.3.3.4 no spanning-tree compatibility.....................312 7.3.3.5 spanning-tree l2t-auto-edge....................313 7.3.3.6 no spanning-tree l2t-auto-edge....................313 7.3.3.7 spanning-tree l2t-edge......................314 7.3.3.8 no spanning-tree l2t-edge....................315 7.3.3.9...
  • Page 12 Table of contents 8.1.2.2 no telnet-server........................346 8.1.2.3 ip echo-reply.........................347 8.1.2.4 no ip echo-reply........................348 8.1.2.5 ip route..........................348 8.1.2.6 no ip route..........................349 8.1.2.7 dcp server..........................350 8.1.2.8 no dcp server........................350 8.1.2.9 ip domain lookup........................351 8.1.2.10 no ip domain lookup......................351 8.1.2.11 ip domain used server......................352 8.1.2.12 ip name server........................353 8.1.2.13...
  • Page 13 Table of contents 8.3.2.2 no ip dhcp config-file-request....................380 8.3.2.3 ip dhcp client mode......................381 DHCPv6 client (IPv6)......................382 8.4.1 clear ipv6 dhcp client statistics.....................382 8.4.2 The "show" commands......................383 8.4.2.1 show ipv6 dhcp........................383 8.4.2.2 show ipv6 dhcp interface......................383 8.4.2.3 show ipv6 dhcp client statistics....................384 8.4.3 Commands in the Interface configuration mode..............385 8.4.3.1...
  • Page 14 Table of contents 8.6.2.3 snmp agent version......................414 8.6.2.4 snmp access........................415 8.6.2.5 no snmp access........................416 8.6.2.6 snmp community index......................417 8.6.2.7 no snmp community index....................418 8.6.2.8 snmp engineid migrate......................419 8.6.2.9 no snmp engineid migrate....................420 8.6.2.10 snmp filterprofile........................421 8.6.2.11 no snmp filterprofile......................422 8.6.2.12 snmp group..........................423 8.6.2.13 no snmp group........................424...
  • Page 15 Table of contents 8.11.1.1 show ip ssh..........................447 8.11.2 Commands in the Global Configuration mode..............447 8.11.2.1 ssh-server..........................448 8.11.2.2 no ssh-server........................448 Load control..............................451 Dynamic MAC aging......................451 9.1.1 The "show" commands......................451 9.1.1.1 show mac-address-table aging-time..................451 9.1.1.2 show mac-address-table aging-status.................452 9.1.2 Commands in the global configuration mode...............452 9.1.2.1 mac-address-table aging-time....................452 Layer 3 functions............................455...
  • Page 16 Table of contents 11.1.4.5 user-account-ext........................481 11.1.4.6 no user-account-ext......................483 11.1.4.7 user-group..........................483 11.1.4.8 no user-group........................485 11.1.4.9 username..........................485 11.1.4.10 password policy........................486 11.2 RADIUS client........................487 11.2.1 The "show" commands......................487 11.2.1.1 show radius statistics......................488 11.2.1.2 show radius server.......................488 11.2.2 Commands in the global configuration mode...............489 11.2.2.1 login authentication......................489 11.2.2.2...
  • Page 17 Table of contents 11.3.5 Commands in the VAP Interface configuration mode............525 11.3.5.1 vap security authentication (access point)................525 11.3.5.2 vap security cipher (access point)..................527 11.3.5.3 vap security default-key (access point)................528 11.3.5.4 vap security encryption (access point).................529 11.3.5.5 no vap security encryption (access point)................530 11.3.5.6 vap security wpa-group-key-update-interval (Access Point)..........531 11.3.5.7...
  • Page 18 Table of contents 11.5.5.3 permit icmp...........................565 11.5.5.4 deny icmp..........................567 11.5.5.5 permit tcp..........................569 11.5.5.6 deny tcp..........................571 11.5.5.7 permit udp..........................573 11.5.5.8 deny udp..........................575 11.6 Management Access Control List..................577 11.6.1 The "show" commands......................577 11.6.1.1 show authorized-managers....................577 11.6.2 Commands in the global configuration mode...............578 11.6.2.1 authorized-manager ip-source.....................578 11.6.2.2...
  • Page 19: Introduction

    Introduction Information on the Configuration Manual Validity of the configuration manual This Configuration Manual covers the following products: ● SCALANCE W774-1 RJ-45 ● SCALANCE W774-1 M12 EEC ● SCALANCE W734-1 RJ-45 ● SCALANCE W778‑1 M12 ● SCALANCE W778-1 M12 EEC ●...
  • Page 20 The system manual also covers connecting cables as well as a variety of plug- in connectors, lightning protectors, a power splitter and an attenuator. SIMATIC NET manuals You will find SIMATIC NET manuals on the Internet pages of Siemens Industry Online Support: ● Using the search function: support.automation.siemens.com (http://support.automation.siemens.com/WW/llisapi.dll?
  • Page 21 Siemens’ products and solutions undergo continuous development to make them more secure. Siemens strongly recommends that product updates are applied as soon as they are available and that the latest product versions are used. Use of product versions that are no longer supported, and failure to apply the latest updates may increase customer’s exposure to cyber...
  • Page 22 Siemens AG: SIMATIC NET, SCALANCE, C-PLUG, RCoax Firmware The firmware is signed and encrypted. This ensures that only firmware created by Siemens can be downloaded to the device. SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface...
  • Page 23: Description

    Description Configuration limits for WBM and CLI Configuration limits of the device The following table lists the configuration limits for Web Based Management and the Command Line Interface of the device. Depending on your device, some functions are not available. Configurable function Maximum number System...
  • Page 24 Description 2.1 Configuration limits for WBM and CLI Configurable function Maximum number Security IP addresses from RADIUS servers ● AAA: 4 ● WLAN: 2 Management ACLs (access rules for management) MAC ACL rule configuration Ingress and egress rules for MAC ACL (total) 40 per interface (20 ingress rules / 20 egress rules) ●...
  • Page 25: Working With The Command Line Interface (Cli)

    Description 2.2 Working with the Command Line Interface (CLI) Working with the Command Line Interface (CLI) Introduction All the configuration settings for the device can be made using the Command Line Interface (CLI). The CLI therefore provides the same options as Web Based Management (WBM). You should read the detailed explanations of the parameters in the relevant configuration manual "Web Based Management".
  • Page 26: Cli Modes

    Description 2.3 CLI modes CLI modes Grouping of the commands in the various modes The commands of the Command Line Interface are grouped according to various modes. Apart from a few exceptions (help, exit), commands can only be called up in the mode to which they are assigned.
  • Page 27: The Cli Command Prompt

    Description 2.4 The CLI command prompt Global Configuration mode In this mode, you can make basic configuration settings. In addition to this, you can also call up modes for the configuration of special interfaces or functions, for example to configure a VLAN or a PLUG.
  • Page 28: Symbols Of The Cli Commands

    Description 2.5 Symbols of the CLI commands Note Question mark "?" in the user name/password In the CLI the question mark "?" is a command. If the user name or the password contains a "?" for example for the login to the RADIUS server, it will be interpreted as a command. Configure this user name and password using the WBM.
  • Page 29: Interface Identifiers And Addresses

    Description 2.6 Interface identifiers and addresses Interface identifiers and addresses 2.6.1 Naming interfaces Addressing interfaces The device has several types of interface that are addressed in different ways: Addressing physical interfaces This notation also applies to other commands that address an Interface. ●...
  • Page 30 Description 2.6 Interface identifiers and addresses Available physical interfaces Device Interfaces interface-type interface-id W774-1 RJ-45 2 x Fast Ethernet fa: fast-ethernet X = 2 fa 0/X W734-1 RJ-45 1 x WLAN X = 1 wlan wlan 0/X Available logical interfaces ●...
  • Page 31: Address Types, Address Ranges And Address Masks

    Description 2.6 Interface identifiers and addresses 2.6.2 Address types, address ranges and address masks Overview Since the various types of addresses can be represented by different notations, the notations used in the Command Line Interface are shown below: ● IPv4 addresses An IPv4 address consists of 4 bytes.
  • Page 32: Ipv4 / Ipv6

    Description 2.6 Interface identifiers and addresses 2.6.3 IPv4 / IPv6 What are the essential differences? IPv4 IPv6 IP configuration ● DHCP server ● Stateless Address Autoconfiguration (SLAAC): Stateless autoconfiguration using NDP (Neighbor Discovery ● Manual Protocol) – Creates a link local address for every interface that does not require a router on the link.
  • Page 33 Description 2.6 Interface identifiers and addresses IPv4 IPv6 Identification of DHCP clients/ Client ID: DUID + IAID(s) = exactly one interface of the host server MAC address DUID = DHCP unique identifier Identifies server and clients uniquely and should not change, not even when replacing network components! IAID = Identity Association Identifier At least one per interface is generated by the client and re‐...
  • Page 34: Structure Of An Ipv4 Address

    Description 2.6 Interface identifiers and addresses 2.6.4 Structure of an IPv4 address Address classes IP address range Max. number of networks Max. number of hosts/net‐ Class CIDR work 1.x.x.x through 126.x.x.x 16777214 128.0.x.x through 191.255.x.x 16383 65534 192.0.0.x through 223.255.255.x 2097151 224.0.0.0 - 239.255.255.255 Multicast applications...
  • Page 35: Ipv6 Terms

    Description 2.6 Interface identifiers and addresses 2.6.5 IPv6 terms Network node A network node is a device that is connected to one or more networks via one or more interfaces. Router A network node that forwards IPv6 packets. Host A network node that represents an end point for IPv6 communication relations. Link A link is, according to IPv6 terminology, a direct layer 3 connection within an IPv6 network.
  • Page 36: Structure Of An Ipv6 Address

    Description 2.6 Interface identifiers and addresses MAC address = AA:BB:CC:DD:EE:FF OUI = AA:BB:CC NIC = DD:EE:FF EUI-64 = OUI + FFFE + NIC = AA:BB:CC:FF:FE:DD:EE:FF Scope Defines the range of the IPv6 address. 2.6.6 Structure of an IPv6 address IPv6 address format - notation IPv6 addresses consist of 8 fields each with four-character hexadecimal numbers (128 bits in total).
  • Page 37: General Cli Commands

    Description 2.7 General CLI commands The prefix for the link local address is always fe80:0000:0000:0000. The prefix is shortened and noted as follows: fe80:: IPv6 prefix Specified in: RFC 4291 The IPv6 prefix represents the subnet identifier. Prefixes and IPv6 addresses are specified in the same way as with the CIDR notation (Classless Inter-Domain Routing) for IPv4.
  • Page 38: End

    Description 2.7 General CLI commands The command prompt is displayed. 2.7.2 Description With this command, you can execute the commands from the Privileged EXEC mode in any configuration mode. Syntax Call up the command with the following parameters: do [command ] To do this, you replace [command ] with the command from the Privileged EXEC mode that you want to execute.
  • Page 39: Exit

    Description 2.7 General CLI commands Result You are in the Privileged EXEC mode. The command prompt is as follows: cli# 2.7.4 exit Description With this command, you close the current mode. Syntax Call the command without parameters: exit Result The current mode was exited. You are then at the next higher level. If you are in Privileged EXEC Modus or in User EXEC Modus mode, you will be logged out.
  • Page 40: The Command

    Description 2.7 General CLI commands Syntax Call up help with the following parameters: help [command] Here, you replace [command] with the command for which you require help. If the command for which you require help consists of several words, enter these words without spaces.
  • Page 41: Completion Of Command Entries

    Description 2.7 General CLI commands Result The mode-specific as well as the global commands are displayed. Note Incomplete command names If you have specified an incomplete command when calling the help function, a list of all commands that start with the term you have entered is created. Note Output in pages With long lists, the results are displayed as pages.
  • Page 42: Abbreviated Notation Of Commands

    Description 2.7 General CLI commands 2.7.5.4 Abbreviated notation of commands Description The command interpreter of the Command Line Interface also detects commands if only the first character of the command or its parts is entered. This is only possible if all the parts of the abbreviated input can be assigned to exactly one command or to the parts of the command.
  • Page 43 Description 2.7 General CLI commands show history Description This command shows the last 14 commands you entered. The commands are listed in the order in which they were called up. The show history command is listed as the last command to be entered. The list depends on the mode.
  • Page 44 Description 2.7 General CLI commands SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface Configuration Manual, 09/2017, C79000-G8976-C324-08...
  • Page 45: Security Recommendations

    You will find information on this on the Internet pages "Industrial Security (http:// www.siemens.com/industrialsecurity)" ● Inform yourself regularly about security advisories and bulletins published by Siemens ProductCERT (http://www.siemens.com/cert/en/cert-security-advisories.htm). ● Only activate protocols that you really require to use the device.
  • Page 46 Security recommendations ● Enable logging functions. Use the central logging function to log changes and access attempts centrally. Check the logging information regularly. ● Configure a Syslog server to forward all logs to a central location. ● Use WPA2/ WPA2-PSK with AES to protect the WLAN. If iPCF or iPCF-MC is used, use the AES encryption.
  • Page 47 Security recommendations ● The following protocols provide secure alternatives: – SNMPv1/v2 → SNMPv3 Check whether use of SNMPv1 is necessary. SNMPv1 is classified as non-secure. Use the option of preventing write access. The product provides you with suitable setting options. If SNMP is enabled, change the community names.
  • Page 48 Security recommendations Available protocols The following list provides you with an overview of the open protocol ports. The table includes the following columns: ● Protocol ● Port ● Port status – Open The port is always open and cannot be closed. –...
  • Page 49: Configuration

    Configuration The following is described in this section: ● System settings ● Saving and loading configurations and firmware ● Restart of the device and restoring the factory defaults ● Saving and restoring configuration backups System This section describes commands with which general system properties can be displayed and configured.
  • Page 50: Show Coordinates

    Configuration 4.1 System 4.1.1.2 show coordinates Description This command shows the system coordinates. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli> or cli# Syntax Call the command without parameters: show coordinates Result The system coordinates are displayed.
  • Page 51: Show Ethernetip

    Configuration 4.1 System ● System up time ● System name ● System contact ● System location ● Device Type ● Restart counter ● Config Save mode ● Config Change: This indicates whether or not the current configuration has been saved. ●...
  • Page 52: Show Interfaces

    Configuration 4.1 System Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli> or cli# Syntax Call the command without parameters: show im Result The information is displayed. 4.1.1.6 show interfaces Description This command shows the status and the configuration of one, several or all interfaces.
  • Page 53: Show Interfaces

    Configuration 4.1 System Parameter Description Range of values / note Keyword for a VLAN connection vlan Number of the addressed VLAN 1 ... 4094 vlan-id For information on identifiers of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)". If you do not select any parameters from the parameter list, the status and configuration of all available interfaces will be displayed.
  • Page 54: Show Interface Mtu

    Configuration 4.1 System Result The counters of the selected interfaces are displayed. 4.1.1.8 show interface mtu Description With this command, you show the setting for the Maximum Transmission Unit (MTU) of the interfaces on the device. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 55: Show Ipv6 Interface

    Configuration 4.1 System Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: Thiscli> or cli# Syntax Call up the command with the following parameters: show ip interface Vlan <vlan-id(1-4094)> | <interface-type>...
  • Page 56: Show Pnio

    Configuration 4.1 System Syntax Call up the command with the following parameters: show ipv6 interface [{vlan <id> | <interface-type> <interface-id>} [prefix]] The parameters have the following meaning: Parameter Description Range of values / note Keyword for a VLAN connection vlan Number of the addressed VLAN 1 ...
  • Page 57: Show Lldp Neighbors

    Configuration 4.1 System show pnio Result The current PROFINET configuration is displayed. 4.1.1.12 show lldp neighbors Description This command shows the current content of the neighborhood table. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 58: Show Versions

    Configuration 4.1 System The parameters have the following meaning: Parameter Description Range of values/note Keyword for a port description. port Type or speed of the interface Enter a valid interface. interface-type Module no. and port no. of the interface interface-id For information on identifiers of interfaces and addresses, refer to the section "Interface identifiers and addresses (Page 29)".
  • Page 59: Clear Counters

    Configuration 4.1 System ● Version ● Date 4.1.2 clear counters Description With this command, you reset the counters of an interface. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 60: Configure Terminal

    Configuration 4.1 System 4.1.3 configure terminal Description With this command, you change to the Global configuration mode. Requirement You are in the Privileged EXEC mode. The command prompt is as follows: cli# Syntax Call the command without parameters: configure terminal Result You are now in the Global configuration mode.
  • Page 61: Disable

    Configuration 4.1 System Syntax Call up the command with the following parameters: clear line vty {<line-number(2-9)>|all}[forceful-clear] The parameters have the following meaning: Parameter Description Range of values / note Number of the connection that will be 2 ... 9 line-number terminated terminates all connections closes a session that is not reacting...
  • Page 62: Enable

    Configuration 4.1 System 4.1.6 enable Description With this command, you change to the Privileged EXEC mode. Requirement You are in the User EXEC mode. The command prompt is as follows: cli> Syntax Call the command without parameters: enable Result You are prompted to enter the administrator password. After logging in successfully, you are in the Privileged EXEC mode.
  • Page 63: Ping

    Configuration 4.1 System Result The CLI session is ended and the Windows Login prompt is displayed. 4.1.8 ping Description With this command, you request a response from a device in the network. This allows you to check whether or not another node is reachable. Requirement You are in the User EXEC mode or in the Privileged EXEC mode.
  • Page 64: Ping Ipv6

    Configuration 4.1 System At system start or when using the restart command with the option memoryor factory, the following defaults apply: Parameter Default value size count timeout Result The messages relating to the response of the called node are displayed. 4.1.9 ping ipv6 Description...
  • Page 65: Commands In The Global Configuration Mode

    Configuration 4.1 System Parameter Description Range of values / note Number of packets count Keyword for the size of the packets to size be transferred Packet size 0 … 2080 bytes value Default: 100 Addressing mode anycast anycast Keyword for the sender interface source ●...
  • Page 66: Coordinates Latitude

    Configuration 4.1 System cli(config)# Syntax Call up the command with the following parameters: coordinates height <meter> The parameter has the following meaning: Parameter Description Range of values / note Input box for the height coordinate max. 32 characters meter To use spaces in the entry, enter the height coordinate in quotes: coordinates height "123 456"...
  • Page 67: Coordinates Longitude

    Configuration 4.1 System Result The latitude coordinate is created. 4.1.10.3 coordinates longitude Description With this command, you enter a longitude coordinate. Requirement You are in the Global Configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: coordinates longitude <longitude>...
  • Page 68: Interface

    Configuration 4.1 System cli(config)# Syntax Call up the command with the following parameters: ethernetip {off|on} The parameters have the following meaning: Parameter Description Range of values / note EtherNet/IP will be disa‐ bled after the next restart. EtherNet/IP will be ena‐ ●...
  • Page 69: No Interface

    Configuration 4.1 System Syntax Call up the command with the following parameters: interface{vlan<vlan-id(1-4094)> <interface-type><interface-id>} The parameters have the following meaning: Parameter Description Range of values / note Keyword for a VLAN connection vlan Number of the addressed VLAN 1 … 4094 vlan-id Type or speed of the interface Enter a valid interface.
  • Page 70: Cli-Console-Timeout

    Configuration 4.1 System Requirement You are in the Global Configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: no interface{vlan<vlan-id(1-4094)>} The parameters have the following meaning: Parameter Description Range of values / note Keyword for a VLAN connection vlan Number of the addressed VLAN...
  • Page 71: No Cli-Console-Timeout

    Configuration 4.1 System The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: cli-console-timeout [seconds(60-600)] The parameters have the following meaning: Parameter Description Range of values / note Time in seconds until automatic logout 60 ...
  • Page 72: Pnio

    Configuration 4.1 System Further notes You enable automatic logout with the cli-console-timeout command. You display the current timeout setting with the show cli-console-timeout command. 4.1.10.9 pnio Description With this command, you configure the setting for PROFINET after the next restart of the device. Requirement You are in the Global configuration mode.
  • Page 73: System Contact

    Configuration 4.1 System 4.1.10.10 system contact Description With this command, you enter contact information for the system. Requirement You are in the Global Configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: system contact <contact info>...
  • Page 74: System Name

    Configuration 4.1 System The parameter has the following meaning: Parameter Description Range of values / note Input box for the location information max. 255 characters location name Result The location information is created in the system. 4.1.10.12 system name Description This command, you enter a name for the system.
  • Page 75: Alias

    Configuration 4.1 System Commands relating to other topics that can be called in the interface configuration mode can be found in the relevant sections. ● If you exit the Interface configuration mode with the exit command, you return to the Global configuration mode.
  • Page 76: Duplex

    Configuration 4.1 System Requirement You are in the Interface Configuration mode. The command prompt is as follows: cli(config-if-$$$)# Syntax Call the command without parameter assignment: no alias Result The name of the interface is removed. Further notes You configure the name of the interface with the alias command. 4.1.11.3 duplex Description...
  • Page 77: No Duplex

    Configuration 4.1 System The parameters have the following meaning: Parameter Description Range of values / note The Interface will be operated in full du‐ Default: full full plex mode. The Interface will be operated in half du‐ half plex mode Result The duplex mode of the interface is configured.
  • Page 78: Lldp

    Configuration 4.1 System 4.1.11.5 lldp Description With this command, you enable the sending and receipt of LLDP packets on the interface. Requirement You are in the Interface Configuration mode. The command prompt is as follows: cli(config-if-$$$)# Syntax Call up the command with the following parameters: lldp{transmit|receive} The parameters have the following meaning: Parameters...
  • Page 79: No Lldp

    Configuration 4.1 System 4.1.11.6 no lldp Description With this command, you disable the sending and receipt of LLDP packets on the interface. Requirement You are in the Interface Configuration mode. The command prompt is as follows: cli(config-if-$$$)# Syntax Call up the command with the following parameters: no lldp{transmit|receive} The parameters have the following meaning: Parameters...
  • Page 80: Shutdown Complete

    Configuration 4.1 System Requirement ● The Interface must be shut down. You are in the Interface configuration mode. The command prompt is as follows: cli(config-if-$$$)# Syntax Call up the command with the following parameters: mtu <frame-size(64-1514)> The parameter has the following meaning: Parameter Description Range of values / note...
  • Page 81: No Shutdown

    Configuration 4.1 System Syntax Call the command without parameters: shutdown complete Result The Interface is shut down. Note If you use this command in the Interface Configuration mode for a VLAN (input prompt CLI(config-if-vlan-$)#, management access to the device is no longer possible. This relates to configuration using CLI, WBM and SNMP.
  • Page 82: Load And Save

    "Maintenance". CountryList The zip file contains the country list as a csv and as a pdf file. Debug This file contains information for Siemens Support. Electronic Data Sheet (EDS) Electronic data sheets for describing devices in the EtherNet/IP mode Firmware...
  • Page 83 ConfigPack incl. firmware, refer to the section "Maintenance". CountryList The zip file contains the country list as a csv and as a pdf file. Debug This file contains information for Siemens Support. SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface Configuration Manual, 09/2017, C79000-G8976-C324-08...
  • Page 84 Configuration 4.2 Load and Save File type Description Save Down‐ load Electronic Data Sheet (EDS) Electronic data sheets for describing devices in the EtherNet/IP mode Firmware Loading firmware updates GSDML Information on the device properties (PROFINET) HTTPS Cert HTTPS certificate Maximum file size: 8192 bits LogFile File with entries from the event log table...
  • Page 85: The "Show" Commands

    Configuration 4.2 Load and Save 4.2.1 The "show" commands This section describes commands with which you display various settings. 4.2.1.1 show loadsave files Description This command shows the current Load&Save file information. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 86: Save Filetype

    Configuration 4.2 Load and Save Result The current configuration of the TFTP server for Load&Save is displayed. 4.2.2 save filetype Description With this command, you save files on a TFTP server. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 87: Load Tftp

    Configuration 4.2 Load and Save Result The file is saved on the TFTP server. 4.2.3 load tftp Description With this command, you load the files from a TFTP server. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 88: Commands In The Global Configuration Mode

    Configuration 4.2 Load and Save For information on the file types , refer to this list (Page 82). Result The file is loaded on the device from the TFTP server. 4.2.4 Commands in the global configuration mode This section describes commands that you can call up in the Global configuration mode. In Privileged EXEC mode, enter the configure terminal command to change to this mode.
  • Page 89: Commands In The Loadsave Configuration Mode

    Configuration 4.2 Load and Save 4.2.5 Commands in the LOADSAVE configuration mode This section describes commands that you can call up in the LOADSAVE configuration mode. In the Global Configuration mode, enter the loadsave command to change to this mode. You display the valid file types for the commands in the LOADSAVE Configuration mode with the global command show loadsave tftp.
  • Page 90: Tftp Filename

    Configuration 4.2 Load and Save 4.2.5.2 tftp filename Description With this command, you assign a name to a file type. The file type decides the type that is affected by the tftp load or tftp save action. The name decides the file to be copied to or from the TFTP server. Requirement You are in the LOADSAVE configuration mode.
  • Page 91: Tftp Save

    Configuration 4.2 Load and Save Requirement ● The name of the file is specified ● You are in the LOADSAVE configuration mode. The command prompt is: cli(config-loadsave)# Syntax Call up the command with the following parameters: tftp load{showfiles|filetype<filetype>} The parameters have the following meaning: Parameter Description Range of values / note...
  • Page 92: Tftp Server

    Configuration 4.2 Load and Save The parameters have the following meaning: Parameter Description Range of values / note Shows the available files showfiles Keyword for a file type to be loaded filetype Name of the file type max. 100 characters filetype Result The file types are displayed or the file is copied.
  • Page 93: Sftp Filename

    Configuration 4.2 Load and Save Parameter Description Range of values / note Keyword for the port of the server via port which the TFTP connection runs Number of the port 1 … 65535 tcp port For information on identifiers of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)".
  • Page 94: Sftp Load

    Configuration 4.2 Load and Save Further notes With the "show loadsave files" command, you can display the file types. 4.2.5.7 sftp load Description With this command, you load a file from an SFTP server into the file system of the device. You can also display a list of available files.
  • Page 95: Sftp Server

    Configuration 4.2 Load and Save Requirement ● The name of the file is specified ● You are in the LOADSAVE configuration mode. The command prompt is: cli(config-loadsave)# Syntax Call up the command with the following parameters: sftp save {showfiles|filetype<filetype>} The parameters have the following meaning: Parameter Description Range of values / note...
  • Page 96: Password

    Configuration 4.2 Load and Save The parameters have the following meaning: Parameter Description Range of values / note Keyword for an IPv4 address ipv4 Value for an IPv4 unicast address Enter a valid IPv4 unicast address. ipv4-address Keyword for a domain name fqdn-name Domain name (Fully Qualified Domain Maximum of 100 characters...
  • Page 97: No Password

    Configuration 4.2 Load and Save Requirement You are in the LOADSAVE configuration mode. The command prompt is as follows: cli(config-loadsave)# Syntax Call up the command with the following parameters: password {showfiles | filetype <filetype> [pw <password>]} The parameters have the following meaning: Parameter Description Range of values / note...
  • Page 98: Firmware-In-Configpack

    Configuration 4.2 Load and Save Syntax Call up the command with the following parameters: no password {showfiles | filetype <filetype>} The parameters have the following meaning: Parameter Description Range of values / note Shows the available files showfiles Shows that the file type follows that will be loaded filetype Name of the file type max.
  • Page 99: No Firmeware-In-Configpack

    Configuration 4.3 Reset and Defaults Further notes You disable the setting with the no firmeware-in-configpack command. 4.2.5.13 no firmeware-in-configpack Description With this command you take firmware file out of the ConfigPack file. Requirement You are in the LOADSAVE configuration mode. The command prompt is as follows: cli(config-loadsave)# Syntax...
  • Page 100 Configuration 4.3 Reset and Defaults Select one of the following configuration settings: ● Device restart with the current configuration ● Device restart with the factory configuration settings with the exception of the following parameters: – IP addresses – Subnet mask –...
  • Page 101: Configuration Save & Restore

    Configuration 4.4 Configuration Save & Restore NOTICE Loss of IP address / passwords with factory By resetting all the settings to the factory settings, the IP address and the passwords are also lost. Following this, the device can only be accessed via the serial interface using the Primary Setup Tool or using DHCP.
  • Page 102 Configuration 4.4 Configuration Save & Restore <interface-type><interface-list>| vlan<vlan-id(1-4094)> ssh|ssl|acl|ip|snmp|sntp|http|locked-port| auto-logout|time| ntp|auto-save|wlan|events|nat|radius|umac }][all] The parameters have the following meaning: Parameter Description Range of values / note Shows the configuration settings of the Syslog syslog function shows the configuration settings of the Dynamic dhcp Host Configuration Protocol shows the configuration settings of QoS (Quality...
  • Page 103: Write Startup-Config

    Configuration 4.4 Configuration Save & Restore Parameter Description Range of values / note Shows the configuration settings of the auto auto-save save function Shows the configuration settings of the WLAN wlan Shows the configuration settings of the events events Shows the configuration settings of the Network Address Translation Shows the configuration settings of the Remote radius...
  • Page 104: Commands In The Global Configuration Mode

    Configuration 4.4 Configuration Save & Restore Use the restart command without parameters to restart the system with this configuration. Further notes You enable the auto save function or disable the Trial mode with the auto-save command. You disable the auto save function or enable the Trial mode with the no auto-save command. 4.4.3 Commands in the global configuration mode This section describes commands that you can call up in the Global configuration mode.
  • Page 105: No Auto-Save

    Configuration 4.4 Configuration Save & Restore Result The auto save function is enabled. Further notes You save changes to the configuration in the Trial mode with the write startup-config command. You disable the function with the no auto-save command. You can display the status of this function and other information with the show device informationcommand.
  • Page 106: Sinema

    Configuration 4.5 SINEMA SINEMA 4.5.1 The "show" commands This section describes commands with which you display various settings. 4.5.1.1 show sinema Description This command shows whether the SINEMA configuration interface is enabled or disabled. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 107: Sinema

    Configuration 4.5 SINEMA 4.5.2.1 sinema Description With this command, you enable the SINEMA configuration interface. Requirement You are in the Global Configuration mode. The command prompt is as follows: cli(config)# Syntax Call the command without parameter assignment: sinema Result The SINEMA configuration interface is enabled. Further notes You disable the SINEMA configuration interface with the no sinema command.
  • Page 108 Configuration 4.5 SINEMA Result The SINEMA configuration interface is disabled. Further notes You enable the SINEMA configuration interface with the sinema command. You display the setting whether the SINEMA configuration interface is enabled or disabled with the command show sinema. SCALANCE W770/W730 acc.
  • Page 109: Functions Specific To Scalance

    Functions specific to SCALANCE This part contains the sections that describe functions specific to SCALANCE. PLUG The C-PLUG or KEY-PLUG stores the configuration of a device and can therefore transfer the configuration of the old device to the new device when a device is replaced. In addition to the configuration, the KEY-PLUG also contains a license that enables the use of certain functions.
  • Page 110: Commands In The Global Configuration Mode

    Functions specific to SCALANCE 5.1 PLUG 5.1.2 Commands in the global configuration mode This section describes commands that you can call up in the Global configuration mode. In Privileged EXEC mode, enter the configure terminal command to change to this mode. Commands relating to other topics that can be called in the Global configuration mode can be found in the relevant sections.
  • Page 111: Factoryclean

    Functions specific to SCALANCE 5.1 PLUG In the Global Configuration mode, enter the plug command to change to this mode. ● If you exit the Plug Configuration mode with the exit command, you return to the Global Configuration mode. ● If you exit the Plug Configuration mode with the end command, you return to the Privileged EXEC mode.
  • Page 112: No Firmware On Plug

    Functions specific to SCALANCE 5.1 PLUG firmware-on-plug Result The firmware is stored on the PLUG. When the device starts up there is a check whether the version on the PLUG is valid and whether this version matches the version on the device. If this is not the case, the firmware is installed on the device and it is restarted.
  • Page 113: Presetplug

    Functions specific to SCALANCE 5.1 PLUG Requirement ● The PLUG is formatted. ● You are in the Plug Configuration mode. The command prompt is: cli(config-plug)# Syntax Call the command without parameter assignment: write Result The current device configuration has been copied to the formatted PLUG. 5.1.3.5 presetplug Description...
  • Page 114: Wbm

    Functions specific to SCALANCE 5.2 WBM On the device, you can limit the time available for access with Web Based Management. If no entry is made for a specific time, the WBM session is closed. This section describes commands relevant for the configuration of this feature. 5.2.1 The "show"...
  • Page 115: Web-Session-Timeout

    Functions specific to SCALANCE 5.2 WBM 5.2.2.1 web-session-timeout Description With this command, you enable the automatic logoff and you configure the timeout setting for the WBM. Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters:...
  • Page 116: Signal Recorder

    Functions specific to SCALANCE 5.3 Signal recorder Syntax Call the command without parameters: no web-session-timeout Result Automatic logoff is disabled. Further notes You enable automatic logoff with the web-session-timeout command. You display the current timeout setting with the show web-session-timeout command. Signal recorder This section describes the commands relevant for working with the signal recorder.
  • Page 117: Wlan Signal-Recorder Start (Client)

    Functions specific to SCALANCE 5.3 Signal recorder show wlan signal-recorder <wlan 0/X> The parameter has the following meaning: Parameter Description Range of values / note WLAN interface Enter a valid interface. wlan 0/X For information on identifiers of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)".
  • Page 118 Functions specific to SCALANCE 5.3 Signal recorder Syntax Call up the command with the following parameters: wlan signal-recorder <wlan 0/X> <ms (1-60000)> <sample_number (1-20000)> [bidirectional] start The parameter has the following meaning: Parameter Description Range of values / note WLAN interface Enter a valid interface.
  • Page 119: Wlan Signal-Recorder Stop (Client)

    Functions specific to SCALANCE 5.3 Signal recorder 5.3.3 wlan signal-recorder stop (client) Description With this command, you stop the recording with the signal recorder. Note This command is only available in the client mode. Requirement ● A recording was started. You are in the User EXEC mode or in the Privileged EXEC mode.
  • Page 120: Wlan Signal-Recorder Display (Client)

    Functions specific to SCALANCE 5.3 Signal recorder 5.3.4 wlan signal-recorder display (client) Description With this command, you configure and start recording with the signal recorder without specifying a total for the measured values. The measured values are output in the CLI and logged in files.
  • Page 121: Wlan Signal-Recorder Display Sample_Number (Client)

    Functions specific to SCALANCE 5.3 Signal recorder Result The recording is configured and will be started. The measured values are output in the CLI and logged in files. If these files already exist, they will be overwritten. Use the wlan signal-recorder <wlan 0/X> stop command to stop the recording. During the recording, it is possible that working in the CLI becomes slower.
  • Page 122 Functions specific to SCALANCE 5.3 Signal recorder The parameter has the following meaning: Parameter Description Range of values / note WLAN interface Enter a valid interface. wlan 0/X The interval in milliseconds (ms) be‐ 100 - 60000 tween acquisition of two measured val‐ The first measured value is dis‐...
  • Page 123: Ipcf

    Functions specific to SCALANCE 5.4 iPCF iPCF This section describes the commands relevant for working with the iPCF function (industrial Point Coordination Function). Note This commands are only available with the following KEY-PLUGs: ● W780 iFeatures (MLFB 6GK5 907-8PA00) ● W740 iFeatures (MLFB 6GK5 907-4PA00) 5.4.1 The "show"...
  • Page 124: Wlan Interface Configuration Mode

    Functions specific to SCALANCE 5.4 iPCF show wlan ipcf <wlan 0/X> The parameter has the following meaning: Parameter Description Range of values / note WLAN interface Enter a valid interface. wlan 0/X For information on identifiers of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)".
  • Page 125: No Wlan Ipcf

    Functions specific to SCALANCE 5.4 iPCF Syntax Call the command without parameters: wlan ipcf Result The iPCF mode is enabled. Further notes You disable the iPCF mode with the no wlan ipcf command. You display the setting with the show wlan ipcf command. 5.4.2.2 no wlan ipcf Note...
  • Page 126: Wlan Ipcf Protocol-Support Pnio (Access Point)

    Functions specific to SCALANCE 5.4 iPCF 5.4.2.3 wlan ipcf protocol-support pnio (access point) Note This command is only available with the following KEY-PLUG: ● W740 iFeatures (MLFB 6GK5 907-4PA00) Description With this command, you enable the optimized support of PROFINET or Ethernet/IP. Frames with the selected protocol are preferred.
  • Page 127: No Wlan Ipcf Protocol-Support (Access Point)

    Functions specific to SCALANCE 5.4 iPCF 5.4.2.4 no wlan ipcf protocol-support (access point) Note This command is only available with the following KEY-PLUG: ● W740 iFeatures (MLFB 6GK5 907-4PA00) Description With this command, you disable the optimized support of PROFINET or Ethernet/IP. Requirement The SCALANCE W700 device is in access point mode You are in the Interface Configuration mode of the WLAN interface.
  • Page 128: Wlan Ipcf Scan-Mode (Access Point)

    Functions specific to SCALANCE 5.4 iPCF The following points need to be taken into account when setting the cycle time. Otherwise it may not be possible to establish stable communication. ● There is only one access point in the system; in other words, the clients move only in one wireless cell.
  • Page 129: Wlan Ipcf Signal-Quality-Threshold (Access Point)

    Functions specific to SCALANCE 5.4 iPCF Description With this command, you configure the scanning mode of the logged on clients. Requirement The SCALANCE W700 device is in access point mode. You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax...
  • Page 130 Functions specific to SCALANCE 5.4 iPCF The signal quality is determined by the client based on the RSSI values (Received Signal Strength Indicator) of received packets. The RSSI value indicates how strong the arriving signal is and is displayed in the signal recorder. Requirement The SCALANCE W700 device is in access point mode.
  • Page 131: Ipcf-Ht

    Functions specific to SCALANCE 5.5 iPCF-HT iPCF-HT This section describes the commands relevant for working with iPCF-HT (industrial Point Coordination Function High Throughput). Note This commands are only available with the following KEY-PLUGs: ● W780 iFeatures (MLFB 6GK5 907-8PA00) ● W740 iFeatures (MLFB 6GK5 907-4PA00) Note Use of iPCF-HT The function iPCF-HT...
  • Page 132: Wlan Interface Configuration Mode

    Functions specific to SCALANCE 5.5 iPCF-HT Syntax Call up the command with the following parameters: show wlan ipc-ht <wlan 0/X> The parameter has the following meaning: Parameter Description Range of values / note WLAN interface Enter a valid interface. wlan 0/X For information on identifiers of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)".
  • Page 133: No Wlan Ipcf-Ht

    Functions specific to SCALANCE 5.5 iPCF-HT Syntax Call the command without parameters: wlan ipcf-ht Result The iPCF mode is enabled. Further notes You disable the iPCF-HT mode with the no wlan ipcf-ht command. You display the setting with the show wlan ipcf-ht command. 5.5.2.2 no wlan ipcf-ht Note...
  • Page 134: Wlan Ipcf-Ht Protocol-Support (Access Point)

    Functions specific to SCALANCE 5.5 iPCF-HT 5.5.2.3 wlan ipcf-ht protocol-support (Access Point) Note This command is only available with the following KEY-PLUG: ● W780 iFeatures (MLFB 6GK5 907-8PA00) Description With this command, you enable the optimized support of PROFINET or Ethernet/IP. Frames with the selected protocol are preferred.
  • Page 135: No Wlan Ipcf-Ht Protocol-Support (Access Point)

    Functions specific to SCALANCE 5.5 iPCF-HT 5.5.2.4 no wlan ipcf-ht protocol-support (Access Point) Note This command is only available with the following KEY-PLUG: ● W780 iFeatures (MLFB 6GK5 907-8PA00) Description With this command, you disable the optimized support of PROFINET or Ethernet/IP. Requirement The SCALANCE W700 device is in access point mode You are in the Interface Configuration mode of the WLAN interface.
  • Page 136 Functions specific to SCALANCE 5.5 iPCF-HT Description With this command, you configure the cycle time for iPCF-HT. The following points need to be taken into account when setting the cycle time. Otherwise it may not be possible to establish stable communication. ●...
  • Page 137: Wlan Ipcf-Ht Scan-Mode (Access Point)

    Functions specific to SCALANCE 5.5 iPCF-HT 5.5.2.6 wlan ipcf-ht scan-mode (access point) Note This command is only available with the following KEY-PLUG: ● W780 iFeatures (MLFB 6GK5 907-8PA00) Description With this command, you configure the scanning mode of the logged on clients. Requirement The SCALANCE W700 device is in access point mode.
  • Page 138: Wlan Ipcf-Ht Signal-Quality-Threshold (Access Point)

    Functions specific to SCALANCE 5.5 iPCF-HT 5.5.2.7 wlan ipcf-ht signal-quality-threshold (access point) Note This command is only available with the following KEY-PLUG: ● W780 iFeatures (MLFB 6GK5 907-8PA00) Description With this command, you set a signal strength for the client. When scanning the client must receive the signal coming from the access point with at least the specified signal quality.
  • Page 139: Ipcf-Mc

    Functions specific to SCALANCE 5.6 iPCF-MC Further notes You display the setting with the show wlan ipcf-ht command. You configure the scanning mode with the Befehl wlan ipcf-ht scan-mode command. iPCF-MC This section describes the commands relevant for working with the iPCF-MC function (industrial Point Coordination Function - Management Channel).
  • Page 140: Commands In The Wlan Configuration Mode

    Functions specific to SCALANCE 5.6 iPCF-MC Syntax Call the command without parameter assignment: show wlan ipcf-mc Result The iPCF_MC settings are displayed. 5.6.2 Commands in the WLAN configuration mode This section describes commands that you can call up in the WLAN configuration mode. In the Global Configuration mode, enter the wlan command to change to this mode.
  • Page 141: No Wlan Ipcf-Mc

    Functions specific to SCALANCE 5.6 iPCF-MC ● Client mode: Client with KEY-PLUG W740 iFeatures (MLFB 6GK5 907-4PA00) ● The management interface and data interface must be operated in the same frequency band and mode and must match in terms of their wireless coverage. iPCF-MC will not work if both wireless interfaces are equipped with directional antennas that cover different areas.
  • Page 142: Wlan Ipcf-Mc Protocol-Support (Access Point)

    Functions specific to SCALANCE 5.6 iPCF-MC Requirement You are in the WLAN configuration mode. The command prompt is as follows: cli(config-wlan)# Syntax Call the command without parameter assignment: no wlan ipcf-mc Result iPCF-MC is disabled. Further notes You enable iPCF-MC with the wlan ipcf-mc command. You display the setting with the show wlan ipcf-mc command.
  • Page 143: Wlan Ipcf-Mc Cycle-Time (Access Point)

    Functions specific to SCALANCE 5.6 iPCF-MC cli(config-wlan)# Syntax Call up the command with the following parameters: wlan ipcf-mc protocol-support {pnio | ethernet-ip} Parameter Description Range of values / note Keyword for the PROFI‐ pnio Keyword for the Ether‐ ethernet-ip Net/IP Result The optimized support of PROFINET or Ethernet/IP is enabled.
  • Page 144: Wlan Ipcf-Mc Mgmt-Scan-Period (Client)

    Functions specific to SCALANCE 5.6 iPCF-MC wlan ipcf-mc cycle-time <ms (32-512)> The parameter has the following meaning: Parameter Description Range of values / note Cycle time in millisec‐ 32 ... 512 onds (ms) Result The cycle time is configured. Further notes You display the setting with the show wlan ipcf-mc command.
  • Page 145: Wlan Ipcf-Mc Roaming-Filter (Client)

    Functions specific to SCALANCE 5.6 iPCF-MC The parameter has the following meaning: Parameter Description Range of values / note Duration 1 ... 10 num-of-cycles Result The time is set. Further notes You display the setting with the show wlan ipcf-mc command. 5.6.2.6 wlan ipcf-mc roaming-filter (client) Note...
  • Page 146: No Wlan Ipcf-Mc Roaming-Filter (Client)

    Functions specific to SCALANCE 5.6 iPCF-MC Result The number of measurements is specified. Further notes You display the setting with the show wlan ipcf-mc command. You disable the setting with the no wlan ipcf-mc roaming-filter command. 5.6.2.7 no wlan ipcf-mc roaming-filter (client) Note The command is only available if the SCALANCE W700 device supports iPFC-MC or the function can be enabled.
  • Page 147: Iprp

    Functions specific to SCALANCE 5.7 iPRP iPRP This section describes the commands relevant for working with iPRP (industrial Parallel Redundancy Protocol). Note The commands are only available if the SCALANCE W700 device supports iPRP or the function can be enabled. ●...
  • Page 148: Commands In The Wlan Configuration Mode

    Functions specific to SCALANCE 5.7 iPRP Result The configuration is displayed. 5.7.2 Commands in the WLAN configuration mode This section describes commands that you can call up in the WLAN configuration mode. In the Global Configuration mode, enter the wlan command to change to this mode. Commands relating to other topics that can be called in the WLAN configuration mode can be found in the relevant sections.
  • Page 149: Commands In The Wlan Iprp Configuration Mode

    Functions specific to SCALANCE 5.7 iPRP Further notes You exit the WLAN iPRP configuration mode with the end or exit command. You display this setting and other information with the show wlan iprp command. 5.7.3 Commands in the WLAN iPRP configuration mode This section describes commands that you can call up in the WLAN iPRP configuration mode.
  • Page 150: No Wlan Iprp Interface

    Functions specific to SCALANCE 5.7 iPRP The parameters have the following meaning: Parameter Description Range of values / note The interface that will be assigned to the interface wlan 0/X PRP network. vap X 0/Y PRP Network network A: PRP A B: PRP B ●...
  • Page 151: Wlan Iprp Network

    Functions specific to SCALANCE 5.7 iPRP Result The assignment is removed. Further notes You configure the assignment with the wlan iprp interface command. 5.7.3.3 wlan iprp network Description With this command, you specify the VLAN assignment for PRP A and PRP B. Requirement You are in the WLAN iPRP configuration mode.
  • Page 152: No Wlan Iprp Network

    Functions specific to SCALANCE 5.8 AeroScout 5.7.3.4 no wlan iprp network Description With this command, you remove the VLAN assignment for PRP A and PRP B. Requirement You are in the WLAN iPRP configuration mode. The command prompt is as follows: cli (config-wlan-iprp-$)# Syntax Call up the command with the following parameters:...
  • Page 153: The "Show" Commands

    Functions specific to SCALANCE 5.8 AeroScout Note The AeroScout function cannot be combined with other iFeatures (IPCF, iREF). AeroScout can only be used in the 2.4 GHz band according to IEEE 802.11g. For more detailed information, please refer to the documentation of the AeroScout company (www.aeroscout.com).
  • Page 154: Wlan Interface Configuration Mode

    Functions specific to SCALANCE 5.8 AeroScout Result The following information is displayed for the specified WLAN interface. ● AeroScout Status If the forwarding of AeroScout frames is enabled on the SCALANCE W700 device, "enabled" is shown here, otherwise "disabled". ● Tag information forwarding If the forwarding of AeroScout frames is enabled in the management program, "enabled"...
  • Page 155: No Wlan Aeroscout

    Functions specific to SCALANCE 5.9 Spectrum analyzer Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax Call the command without parameters: wlan aeroscout Result AeroScout is enabled. 5.8.2.2 no wlan aeroscout Description With this command, you disable AeroScout for the specified WLAN interface.
  • Page 156: The "Show" Commands

    Functions specific to SCALANCE 5.9 Spectrum analyzer Which the spectrum analyzer you can recognize and represent the electromagnetic signals of a frequency range. You can measure the strength of all signals located in the environment of the access point. Note Spectrum analyzer in the change mode "Manual Commit".
  • Page 157: Wlan Interface Configuration Mode

    Functions specific to SCALANCE 5.9 Spectrum analyzer 5.9.2 WLAN Interface configuration mode This section describes commands that you can call up in the WLAN Interface Configuration mode. Depending on the Interface selected, various command sets are available. In the Global Configuration mode, enter the interface wlan 0/X command to change to this mode.
  • Page 158: Wlan Spectrumanalyzer Start (Access Point)

    Functions specific to SCALANCE 5.9 Spectrum analyzer Further notes You display the settings of the spectrum analyzer with the show wlan spectrumanalyzer command. 5.9.2.2 wlan spectrumanalyzer start (Access Point) Description With this command you start measurement with the spectrum analyzer. If you start a new measurement, the previous measurement will be overwritten.
  • Page 159: Wlan Spectrumanalyzer Stop (Access Point)

    Functions specific to SCALANCE 5.10 Remote capture Further notes You stop the recording with the wlan spectrumanalyzer stop command. You display the settings of the spectrum analyzer with the show wlan spectrumanalyzer command. 5.9.2.3 wlan spectrumanalyzer stop (Access Point) Description With this command, you stop the recording with the spectrum analyzer .
  • Page 160: Show Remote Capture

    Functions specific to SCALANCE 5.10 Remote capture 5.10.1 show remote capture Description This command shows the settings of remote capture of one or all interfaces. Requirement You are in the Privileged EXEC mode. The command prompt is as follows: cli# Syntax Call up the command with the following parameters: show remote capture {<interface-type>...
  • Page 161: Remote Capture

    Functions specific to SCALANCE 5.10 Remote capture 5.10.2.1 remote capture Description With this command, you change to the REMOTE CAPTURE configuration mode. Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call the command without parameters: remote capture Result You are now in the REMOTE CAPTURE configuration mode.
  • Page 162: No-Activate-After-Restart

    Functions specific to SCALANCE 5.10 Remote capture Requirement You are in the REMOTE CAPTURE configuration mode. The command prompt is as follows: cli(remote-capture)# Syntax Call the command without parameter assignment: activate-after-restart Result The function is disabled. Further notes You disable the setting with the no activate-after-restart command. 5.10.3.2 no-activate-after-restart Description...
  • Page 163: Capture

    Functions specific to SCALANCE 5.10 Remote capture 5.10.3.3 capture Description With this command, you enable the function "Remote Capture" on the interface (WLAN, Ethernet) and specify the recording mode of the WLAN interface. You can also enable the function on several interfaces at the same time. As default, this function is disabled. When the function is enabled you can link the interface in Wireshark.
  • Page 164 Functions specific to SCALANCE 5.10 Remote capture Parameter Description Range of values / note All interfaces Recording mode of the WLAN inter‐ ● all-traffic (access point only) face Note In this mode the access point sends no more frames but records all incoming frames.
  • Page 165: No Capture

    Functions specific to SCALANCE 5.10 Remote capture 9. Select the interface and click the "OK" button" button. 10.To start the recording click "Start". You can obtain further information about handling the program in Wireshark. If you analyze several interfaces you can use a Wireshark instance for each interface. Further notes You display this setting and other information with the show remote capture command.
  • Page 166 Functions specific to SCALANCE 5.10 Remote capture SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface Configuration Manual, 09/2017, C79000-G8976-C324-08...
  • Page 167: System Time

    System time This part contains the sections describing how the system time is obtained and the settings. System time setting This section describes commands relevant for the configuration of the system time. 6.1.1 The "show" commands This section describes commands with which you display various settings. 6.1.1.1 show time Description...
  • Page 168: Commands In The Global Configuration Mode

    System time 6.1 System time setting Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli> or cli# Syntax Call the command without parameters: show dst info Result The entries for daylight saving time are displayed. 6.1.2 Commands in the global configuration mode This section describes commands that you can call up in the Global configuration mode.
  • Page 169: Time Set

    System time 6.1 System time setting The parameters have the following meaning: Parameter Description The system time is entered by the user manual The system time is obtained from an NTP server The system time is obtained from an SNTP server sntp The system time is obtained using the "SIMATIC time protocol"...
  • Page 170: Time Dst Date

    System time 6.1 System time setting Result The system time is set. Further notes You display the settings for the system clock with the show time command. 6.1.2.3 time dst date Description With this command, you configure the start and end of daylight saving time. Requirement You are in the Global Configuration mode.
  • Page 171: Time Dst Recurring

    System time 6.1 System time setting Result The entry for the start and end of daylight saving time was created. Further notes You display the settings for the daylight saving time changeover with the show dst info command. 6.1.2.4 time dst recurring Description With this command, you configure the start and end of daylight saving time with a generic description.
  • Page 172: No Time Dst

    System time 6.2 NTP client Result The entry for the start and end of daylight saving time was created. Further notes You display the settings for the daylight saving time changeover with the show dst info command. 6.1.2.5 no time dst Description With this command you delete the entry for the start and end of daylight saving time with the specified name.
  • Page 173: The "Show" Commands

    System time 6.2 NTP client 6.2.1 The "show" commands This section describes commands with which you display various settings. 6.2.1.1 show ntp info Description This command shows the current settings for the Network Time Protocol (NTP). Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 174: Commands In The Ntp Configuration Mode

    System time 6.2 NTP client Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call the command without parameters: Result You are now in the NTP configuration mode. The command prompt is as follows: cli(config-ntp)# Further notes You exit the NTP configuration mode with the end or exit command.
  • Page 175: No Ntp Server

    System time 6.2 NTP client Syntax Call up the command with the following parameters: ntp server { ipv4 <ip_addr> | fqdn-name <Fully Qualified Domain Name(100)> | ipv6 <ip6_addr> } [port { <1025-36564> | default}] [poll <seconds(64-1024)>] The parameters have the following meaning: Parameter Description Range of values / note...
  • Page 176: Ntp Time Diff

    System time 6.2 NTP client Requirement You are in the NTP configuration mode. The command prompt is as follows: cli(config-ntp)# Syntax Call the command without parameter assignment: no ntp server Result The connection to a server is deleted on the NTP client. Further notes You configure the connection to a server with the ntp server command.
  • Page 177: Sntp Client

    System time 6.3 SNTP client Parameter Description Number of hours difference Number of minutes difference Enter the number of hours and number of minutes with two digits each. Default: No time difference. Result The time difference between the device and the NTP server is configured. SNTP client This section describes commands relevant for configuration of the SNTP client.
  • Page 178: Show Sntp Status

    System time 6.3 SNTP client 6.3.1.2 show sntp status Description This command shows the settings of the Simple Network Time Protocol. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 179: Commands In The Global Configuration Mode

    System time 6.3 SNTP client 6.3.2 Commands in the global configuration mode This section describes commands that you can call up in the Global configuration mode. In Privileged EXEC mode, enter the configure terminal command to change to this mode. Commands relating to other topics that can be called in the Global configuration mode can be found in the relevant sections.
  • Page 180: Sntp Time Diff

    System time 6.3 SNTP client In the Global configuration mode, enter the sntp command to change to this mode. ● If you exit the SNTP configuration mode with the exit command, you return to the Global configuration mode. ● If you exit the SNTP configuration mode with the end command, you return to the Privileged EXEC mode.
  • Page 181: Sntp Unicast-Server

    System time 6.3 SNTP client Further notes You can display the settings of this function and other information with the show sntp statuscommand. 6.3.3.2 sntp unicast-server Description With this command, you configure an SNTP unicast server. Requirement ● The addressing mode of the SNTP client is configured as "unicast". ●...
  • Page 182: No Sntp Unicast-Server

    System time 6.3 SNTP client Further notes You can reset the setting to the default with the no sntp unicast-server command. You display this setting and other information with the show sntp unicast–mode status command. 6.3.3.3 no sntp unicast-server Description With this command, you delete the attributes for an SNTP unicast server and reset the address.
  • Page 183: Sntp Client Addressing-Mode

    System time 6.3 SNTP client 6.3.3.4 sntp client addressing-mode Description With this command, you configure the addressing mode of the SNTP client as unicast or broadcast. Requirement ● The SNTP client is activated. ● You are in the SNTP Configuration mode. The command prompt is: cli(config-sntp)# Syntax...
  • Page 184 System time 6.3 SNTP client SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface Configuration Manual, 09/2017, C79000-G8976-C324-08...
  • Page 185: Network Structures

    Network structures WLAN This section describes commands for configuring and managing wireless LANs (WLANs). Some commands are available only in the "access point" or in the "client" mode. In these cases, the titles have the term access point or client added to them. Example: wlan mode ●...
  • Page 186: Show Wlan Allowed Channels

    Network structures 7.1 WLAN Result The following settings are displayed: ● RTS/CTS threshold ● Fragmentation length threshold ● HW retries In Access Point mode, the following additional settings are displayed: ● Beacon interval ● DTIM ● Force roaming on link down ●...
  • Page 187: Show Wlan Antennas

    Network structures 7.1 WLAN 7.1.1.3 show wlan antennas Description This command shows the antenna settings for the SCALANCE W700 device, for example cable length. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 188: Show Wlan Advanced-11N

    Network structures 7.1 WLAN Syntax Call up the command with the following parameters: show wlan ap <wlan 0/X> The parameter has the following meaning: Parameter Description Range of values / note WLAN interface Enter a valid interface. wlan 0/X For information on identifiers of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)".
  • Page 189: Show Wlan Available-Ap-List (Client)

    Network structures 7.1 WLAN Result The following 802.11n configuration is displayed: ● A-MPDU ● A-MPDU limit [frames] ● A-MPDU limit [bytes] ● Guard Interval (only with access points) 7.1.1.6 show wlan available-ap-list (client) Description This command shows the access points to which the client device can establish a wireless link or with which the client device is connected.
  • Page 190: Show Wlan Basic

    Network structures 7.1 WLAN 7.1.1.7 show wlan basic Description This command displays the WLAN-basic configuration, for example, transmission standard, frequency band. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 191: Show Wlan Client (Client)

    Network structures 7.1 WLAN 7.1.1.8 show wlan client (Client) Description This command shows the client configuration of the SCALANCE W700 device, for example how the MAC address is assigned to the client. Note This command is only available in the client mode. Requirement You are in the User EXEC mode or in the Privileged EXEC mode.
  • Page 192: Show Wlan Client-List (Access Point)

    Network structures 7.1 WLAN 7.1.1.9 show wlan client-list (access point) Description This command shows a table with the clients logged on with the access point as well as additional information, for example status, signal strength, MAC address. Note The command is available only in access point mode. Requirement You are in the User EXEC mode or in the Privileged EXEC mode.
  • Page 193: Show Wlan Client-List-Vap (Access Point)

    Network structures 7.1 WLAN 7.1.1.10 show wlan client-list-vap (access point) Description This command shows the VAP interface via which the clients are logged on to the access point in the form of a table. Note The command is available only in access point mode. Requirement You are in the User EXEC mode or in the Privileged EXEC mode.
  • Page 194: Show Wlan Device

    Network structures 7.1 WLAN Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli> or cli# Syntax Call up the command with the following parameters: show wlan data rates <wlan 0/X> The parameter has the following meaning: Parameter Description...
  • Page 195: Show Wlan Force Roaming Ip-Down (Access Point)

    Network structures 7.1 WLAN Result The following settings of the SCALANCE W700 device are displayed: ● Country code ● Device mode ● Commit Mode See also device mode (Page 205) commit mode (Page 206) country (Page 207) 7.1.1.13 show wlan force roaming ip-down (Access Point) Description This command shows the configuration of the function "Force Roaming on IP down"...
  • Page 196: Show Wlan Noise-Floor

    Network structures 7.1 WLAN 7.1.1.14 show wlan noise-floor Description This command shows the background noise of the channel at the antenna connector. If available the background noise of the extended channel (HT-40) is displayed. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 197: Show Wlan Overview

    Network structures 7.1 WLAN The parameter has the following meaning: Parameter Description Range of values / note WLAN interface Enter a valid interface. wlan 0/X For information on identifiers of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)". Result The access points are displayed.
  • Page 198: Show Wlan Statistics

    Network structures 7.1 WLAN Result The configuration of the SCALANCE W700 device is displayed. The content depends on the operating mode that is set. ● Access point: – Radio – WLAN mode – Configured Channel – Alternative DFS channel – Operative channel –...
  • Page 199: Show Wlan Ssid-Table (Client)

    Network structures 7.1 WLAN In access point mode, the following additional statistics are available: ● how many frames in response to logging on or logging off were counted per VAP interface ● how many requesting frames for logging on or logging off were counted per VAP interface Requirement You are in the User EXEC mode or in the Privileged EXEC mode.
  • Page 200: Show Wlan Vap (Access Point)

    Network structures 7.1 WLAN Syntax Call up the command with the following parameters: show wlan ssid-table <wlan 0/X> The parameter has the following meaning: Parameter Description Range of values / note WLAN interface Enter a valid interface. wlan 0/X For information on identifiers of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)".
  • Page 201: Show Wlan Wds (Access Point)

    Network structures 7.1 WLAN For information on identifiers of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)". Result The following settings of the VAP are displayed: ● Admin status ● SSID ● Broadcast SSID ● WDS only ●...
  • Page 202: Show Wlan Wds-List (Access Point)

    Network structures 7.1 WLAN Result The following WDS settings are displayed: ● Admin status ● Connection over ● Partner ID type ● Partner MAC ● Partner WDS ID 7.1.1.21 show wlan wds-list (access point) Description This command shows the WDS partners connected to the WLAN interface. Note This command is available only in access point mode.
  • Page 203: Show Wlan Ip-Mapping

    Network structures 7.1 WLAN 7.1.1.22 show wlan ip-mapping Description This command shows the table for the IP mapping. The table contains the assignment of MAC address and IP address of the SCALANCE W700 devices for which the client makes WLAN access possible.
  • Page 204: Commands In The Global Configuration Mode

    Network structures 7.1 WLAN Result The WLAN statistics are reset. Further notes You display the WLAN statistics tables with the show wlan statistics command. 7.1.3 Commands in the global configuration mode This section describes commands that you can call up in the Global configuration mode. In Privileged EXEC mode, enter the configure terminal command to change to this mode.
  • Page 205: Commands In The Wlan Configuration Mode

    Network structures 7.1 WLAN Further notes You exit the particular WLAN Configuration mode with the end or exit command. 7.1.4 Commands in the WLAN configuration mode This section describes commands that you can call up in the WLAN configuration mode. In the Global Configuration mode, enter the wlan command to change to this mode.
  • Page 206: Commit Mode

    Network structures 7.1 WLAN Result The mode of the SCALANCE W700 device is specified. Note If you change the operating mode, the SCALANCE W700 devices needs to be restarted. Before the device restarts, a prompt for confirmation is displayed. If you confirm the prompt, the SCALANCE W700 device starts automatically in the new operating mode.
  • Page 207: Commit Wlan-Settings

    Network structures 7.1 WLAN Further notes You show the settings for the commit mode with the show wlan device command. See also show wlan device (Page 194) commit wlan-settings (Page 207) 7.1.4.3 commit wlan-settings Description With this command, you confirm modified WLAN settings. The modified WLAN settings are then effective on the SCALANCE W700 device.
  • Page 208: Force Roaming Ip-Down (Access Point)

    Network structures 7.1 WLAN Requirement You are in the WLAN Configuration mode. The command prompt is as follows: cli (config-wlan)# Syntax Call up the command with the following parameters: country { show-countries | code <iso-code> } The parameters have the following meaning: Parameters Description Range of values / note...
  • Page 209: No Force Roaming Ip-Down (Access Point)

    Network structures 7.1 WLAN cli (config-wlan)# Syntax Call up the command with the following parameters: force roaming ip-down <index (1-10)> The parameter has the following meaning: Parameters Description Range of values / note Number of the entry 1 ... 10 index Result The entry is has been created.
  • Page 210: Commands In The Wlan Interface Configuration Mode

    Network structures 7.1 WLAN Syntax Call up the command with the following parameters: no force roaming ip-down <index(1-10)> The parameter has the following meaning: Parameters Description Range of values / note Number of the entry 1 ... 10 index Result The entry is deleted.
  • Page 211 Network structures 7.1 WLAN cli (config-if-wlan-0-X)# Syntax Call up the command with the following parameters: wlan allowed channels{ all | none | {[add]|[del]} [ 2.4 | 4 | 5 ] <channels> } The parameters have the following meaning: Parameters Description All permitted channels are entered in the list.
  • Page 212: Wlan Allowed Channels Only

    Network structures 7.1 WLAN See also wlan allowed channels only (Page 212) 7.1.5.2 wlan allowed channels only Description With this command, you enable the "Use allowed channels only" function. Only the channels you specified with the wlan allowed channels list command are used. Requirement You are in the Interface Configuration mode of the WLAN interface.
  • Page 213: Wlan Alternative Channel (Access Point)

    Network structures 7.1 WLAN Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax Call the command without parameter assignment: no wlan allowed channels only Result The function is disabled. Further notes You display the setting with the show wlan allowed channels <wlan 0/X>...
  • Page 214: Wlan Ampdu

    Network structures 7.1 WLAN Syntax Call up the command with the following parameters: wlan alternative channel { show-channels | <number (0=auto)> } The parameters have the following meaning: Parameters Description Range of values / note Lists all available channels. show-channels Number of the alternative channel Default value: 0 (AUTO) number...
  • Page 215: No Wlan Ampdu

    Network structures 7.1 WLAN Result The sending of AMPDU data packets is enabled. Further notes You display the setting with the show wlan advanced-11n <wlan 0/X> command. You disable the function with the no wlan ampdu command. See also no wlan ampdu (Page 215) 7.1.5.6 no wlan ampdu Description...
  • Page 216: Wlan Ampdu Bytes-Limit

    Network structures 7.1 WLAN 7.1.5.7 wlan ampdu bytes-limit Description With this command, you specify the maximum size of the AMPDU data packet in bytes. Note This command is available only in access point mode. Requirement ● The IEEE 802.11n transmission standard is enabled. You are in the Interface Configuration mode of the WLAN interface.
  • Page 217: Wlan Amsdu

    Network structures 7.1 WLAN Requirement ● The IEEE 802.11n transmission standard is enabled. You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax Call up the command with the following parameters: wlan ampdu frames-limit <frames(2-64)>...
  • Page 218: No Wlan Amsdu

    Network structures 7.1 WLAN Result The sending of A-MSDU data packets is enabled. Further notes You display the setting with the show wlan advanced-11n <wlan 0/X> command. You disable the function with the no wlan amsdu command. 7.1.5.10 no wlan amsdu Description With this command, you disable the sending of A-MSDU data packets.
  • Page 219: Wlan Antenna Additional-Attenuation

    Network structures 7.1 WLAN Requirement ● The IEEE 802.11n transmission standard is enabled. ● You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax Call up the command with the following parameters: wlan amsdu packet-size <size (50-200)>...
  • Page 220: Wlan Antenna Cable-Length

    Network structures 7.1 WLAN The parameters have the following meaning: Parameter Description Range of values / note Antenna connector X = 1 index Attenuation in decibels [dB] 0...70 Default: 0 For information on names of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)".
  • Page 221: Wlan Antenna Gain-2-4Ghz

    Network structures 7.1 WLAN Further notes You show the set cable length with the show wlan antennas <wlan 0/X> command. 7.1.5.14 wlan antenna gain-2-4GHz Description With this command, you specify the antenna gain of the antenna type "User defined" in the 2.4 GHz frequency band.
  • Page 222: Wlan Antenna Type

    Network structures 7.1 WLAN Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax Call up the command with the following parameters: wlan antenna gain-5GHz <index(1-3)> <dBi (0-30)> The parameters have the following meaning: Parameter Description Range of values / note...
  • Page 223: Wlan Antenna Mode

    Network structures 7.1 WLAN The parameters have the following meaning: Parameters Description Range of values / note Shows a list of supported antennas show-types with the corresponding antenna index. Antenna connector 1...3 index antenna-index Antenna index Enter the required antenna index. You can obtain an overview of the anten‐...
  • Page 224: Wlan Any Ssid (Client)

    Network structures 7.1 WLAN The following table shows which combinations are possible: Index 1 Index 2 Rx\Tx Rx\Tx Rx\Tx Rx\Tx Rx\Tx Further notes You display the setting with the show wlan antennas <wlan 0/X> command. 7.1.5.18 wlan any ssid (Client) Description With this command, you enable the "Any SSID"...
  • Page 225: No Wlan Any Ssid (Client)

    Network structures 7.1 WLAN See also no wlan any ssid (client) (Page 225) vap broadcast ssid (access point) (Page 266) 7.1.5.19 no wlan any ssid (client) Description With this command, you disable the "Any ssid" function. The client attempts to connect to the access point from the SSID list that provides the best transmission quality and on which the "Broadcast SSID"...
  • Page 226: Wlan Background Scan Interval (Client)

    Network structures 7.1 WLAN 7.1.5.20 wlan background scan interval (client) Description With this command, you specify the Interval at which the client scans for further access points. Note This command is only available in the client mode. Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax...
  • Page 227: Wlan Background Scan Threshold (Client)

    Network structures 7.1 WLAN Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax Call up the command with the following parameters: wlan background scan mode { disable | idle | always } The parameters have the following meaning: Parameters Description...
  • Page 228: Wlan Beacon Interval (Access Point)

    Network structures 7.1 WLAN The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax Call up the command with the following parameters: wlan background scan threshold <dBm(-95-0)> The parameter has the following meaning: Parameters Description Range of values / note Threshold value in deci‐ -95 ...
  • Page 229: Wlan Channel (Access Point)

    Network structures 7.1 WLAN The parameter has the following meaning: Parameters Description Range of values / note Length of the interval in milliseconds 40 ... 1000 (ms). Default: 100 Result The interval is specified. Further notes You show the set interval with the show wlan advanced <wlan 0/X> command. 7.1.5.24 wlan channel (Access Point) Description...
  • Page 230: Wlan Client Mac Mode (Client)

    Network structures 7.1 WLAN Result The channel is set. Further notes You display the setting with the show wlan ap <wlan 0/X> command. 7.1.5.25 wlan client mac mode (client) Description With this command, you specify how the MAC address is assigned to the client. This MAC address is used by the client for communication with the access point.
  • Page 231: Wlan Client Mac Address (Client)

    Network structures 7.1 WLAN Further notes You display the setting with the show wlan client <wlan 0/X> command. 7.1.5.26 wlan client mac address (client) Description With this command, you specify the MAC address of the client. Note This command is only available in the client mode. Requirement ●...
  • Page 232: Wlan Data Rates-11Abg Selected Only (Access Point)

    Network structures 7.1 WLAN 7.1.5.27 wlan data rates-11abg selected only (access point) Description With this command, you enable the "Use selected data rates only" function. Only the data transmission speeds you specified with the wlan data rate-11abg command are used. Note This command is available only in access point mode.
  • Page 233: No Wlan Data Rates-11Abg Selected Only (Access Point)

    Network structures 7.1 WLAN 7.1.5.28 no wlan data rates-11abg selected only (access point) Description With this command, you enable / disable the automatic selection of the data transmission speed. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode of the WLAN interface.
  • Page 234: No Wlan Data Rates-11N Selected Only (Access Point)

    Network structures 7.1 WLAN Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# ● The transmission standard IEEE 802.11n or IEEE 802.11n only is set. Syntax Call the command without parameter assignment: wlan data rates-11n selected only Result The function is enabled.
  • Page 235: Wlan Data Rate-11Abg (Access Point)

    Network structures 7.1 WLAN Syntax Call the command without parameter assignment: no wlan data rates-11n selected only Result The function is disabled. The data transmission speed is adapted automatically. Further notes You display the setting with the show wlan data rates command. You enable the function with the wlan data rates-11abg selected only command.
  • Page 236 Network structures 7.1 WLAN The parameters have the following meaning: Parameters Description Shows a list of the available data transmission speeds. show-rates The data transmission speed is assigned to the WLAN interface entered in the <rate> parameter. The data transmission speed is removed from the WLAN interface en‐ tered in the <rate>...
  • Page 237: Wlan Data Rate-11N (Access Point)

    Network structures 7.1 WLAN 7.1.5.32 wlan data rate-11n (access point) Description With this command, you assign data transmission speeds to the required WLAN interface. The access point will then use only the selected data transmission speeds for communication with the clients. Note This command is available only in access point mode.
  • Page 238: Wlan Data Rate-11Abg Defaults (Access Point)

    Network structures 7.1 WLAN Result The MCS indexes are assigned to the WLAN interface. Further notes You display the setting with the show wlan data rates command. You enable the function with the wlan data rates-11n selected only command. You configure the transmission standard with the wlan mode command. 7.1.5.33 wlan data rate-11abg defaults (access point) Description...
  • Page 239: Wlan Data Rate-11N Defaults (Access Point)

    Network structures 7.1 WLAN You configure the data transmission speeds with the wlan data rate-11abg command. You configure the transmission standard with the wlan mode command. 7.1.5.34 wlan data rate-11n defaults (Access Point) Description You can reset the selection to the default setting with this command. Note This command is available only in access point mode.
  • Page 240: Wlan Dfs

    Network structures 7.1 WLAN 7.1.5.35 wlan dfs Description With this command, you enable the "DFS(802.11h)" function. If the access point discovers a disruption on the current channel, for example due to a radar device, it automatically switches to an alternative channel. Requirement ●...
  • Page 241: Wlan Dfs Prefer-Configured-Channel

    Network structures 7.1 WLAN cli (config-if-wlan-0-X)# Syntax Call the command without parameter assignment: no wlan dfs Result The DFS function is enabled. Further notes You display the setting with the show wlan basic <wlan 0/X> command. You enable the function with the wlan dfs command. See also wlan dfs (Page 240) 7.1.5.37...
  • Page 242: No Wlan Dfs Prefer-Configured-Channel

    Network structures 7.1 WLAN wlan dfs prefer-configured-channel Result The function is enabled. Further notes You display the setting with the show wlan advanced <wlan 0/X> command. You disable the function with the no wlan dfs prefer-configured-channel command (default setting). 7.1.5.38 no wlan dfs prefer-configured-channel Description With this command you disable the access point changing back to the configured channel...
  • Page 243: Wlan Dfs Multi-Radar-Detection

    Network structures 7.1 WLAN 7.1.5.39 wlan dfs multi-radar-detection Description When an access point detects a radar signal it distributes this information to all access points that it reaches directly via Ethernet.. If at least one further access point verifies the radar signal within 40 ms, all connected access points are informed.
  • Page 244: No Wlan Dfs Multi-Radar-Detection

    Network structures 7.1 WLAN 7.1.5.40 no wlan dfs multi-radar-detection Description With this command you disable access points exchanging information about radar signals among themselves and verifying them. Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax Call the command without parameter assignment:...
  • Page 245: No Wlan Dhcp Renew (Client)

    Network structures 7.1 WLAN Syntax Call the command without parameter assignment: wlan dhcp renew Result The function is enabled. Further notes You display the setting with the show wlan client <wlan 0/X> command. You disable the function with the no wlan dhcp renew command. 7.1.5.42 no wlan dhcp renew (Client) Description...
  • Page 246: Wlan Dtim (Access Point)

    Network structures 7.1 WLAN 7.1.5.43 wlan dtim (access point) Description With this command, you configure the DTIM interval. The DTIM interval (1-15) specifies the number of beacons to be sent before the access point sends the packets (broadcast/unicast/ multicast) to the client. If, for example, you enter "5", this would mean that the access point collects the packets and sends them after every fifth beacon.
  • Page 247: Wlan Min-Ap-Signal-Strength (Client)

    Network structures 7.1 WLAN 7.1.5.44 wlan min-ap-signal-strength (Client) Description With this command, you specify the signal strength. The client must receive the signal coming from the access point with at least the specified signal strength to be able to connect to this access point.
  • Page 248: Wlan Ssid-Table Edit (Client)

    Network structures 7.1 WLAN 7.1.5.45 wlan ssid-table edit (client) Description With this command, you change or delete an entry in the SSID list. Note This command is only available in the client mode. Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax...
  • Page 249: Wlan Force Roaming Eth-Down (Access Point)

    Network structures 7.1 WLAN See also show wlan ssid-table (client) (Page 199) 7.1.5.46 wlan force roaming eth-down (access point) Description If the wired Ethernet interface is no longer available (cable break, connector removed), a client connected over the wireless network is not aware of this. The access point can force the logged-on clients to roam by deactivating its WLAN interface.
  • Page 250: No Wlan Force Roaming Eth-Down (Access Point)

    Network structures 7.1 WLAN 7.1.5.47 no wlan force roaming eth-down (access point) Description With this command, you disable roaming if the connection aborts on the Ethernet interface. This setting is activated as default. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode of the WLAN interface.
  • Page 251: Wlan Frequency Band (Access Point)

    Network structures 7.1 WLAN Requirement ● The transmission standard 802.11g or 802.11a is set. ● You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax Call up the command with the following parameters: wlan fragmentation threshold <bytes(256-2346)>...
  • Page 252: Wlan Frequency Band (Client)

    Network structures 7.1 WLAN Syntax Call up the command with the following parameters: wlan frequency band { 2.4 | 5 } The parameters have the following meaning: Parameters Description Range of values / note Frequency band 2.4 GHz Default setting: WLAN1: 2.4 GHz Frequency band 5.2 (4.9;...
  • Page 253: Wlan Guard Interval (Access Point)

    Network structures 7.1 WLAN Result The frequency band for the WLAN interface is specified. Further notes You display the setting with the show wlan basic <wlan 0/X> command. 7.1.5.51 wlan guard interval (access point) Description With this command, you specify the send pause that must be kept to between two transferred OFDM symbols.
  • Page 254: Wlan Ht Channel Width (Access Point)

    Network structures 7.1 WLAN 7.1.5.52 wlan ht channel width (access point) Description With this command, you specify the channel bandwidth. With IEEE 802.11n, data can be transferred via two directly neighboring channels (channel bonding). The two 20 MHz channels are put together to form one channel with 40 MHz channel bandwidth Note This command is available only in access point mode.
  • Page 255: Wlan Hw-Retries

    Network structures 7.1 WLAN 7.1.5.53 wlan hw-retries Description With this command, you specify the number of retries. The hardware repetition is performed by the WLAN chip itself when it tries to repeat an unacknowledged packet immediately. Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax...
  • Page 256: Wlan Mode (Access Point)

    Network structures 7.1 WLAN Using the show wlan basic command, check whether or not the current WLAN settings violate the permitted transmit power restrictions (TX Power Check) of the selected country. Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax...
  • Page 257 Network structures 7.1 WLAN Syntax Call up the command with the following parameters: wlan mode { show-modes | [2.4 | 5] <mode>} The parameter has the following meaning: Parameters Description Range of values / note Lists the transmission standards. -- show- modes Optional.
  • Page 258: Wlan Mode (Client)

    Network structures 7.1 WLAN Further notes You display the setting with the show wlan basic <wlan 0/X> command. 7.1.5.56 wlan mode (client) Description With this command, you specify the transmission standard. Note This command is only available in the client mode. Requirement You are in the Interface Configuration mode of the WLAN interface.
  • Page 259: Wlan Outdoor

    Network structures 7.1 WLAN Parameters Description Range of values / note Optional. You can use the parameter in conjunction with "auto" and "n". This on‐ ly takes into account the transmission standard for 5 GHz. Use the parameter if the client operates in dual-frequency mode.
  • Page 260: No Wlan Outdoor

    Network structures 7.1 WLAN cli (config-if-wlan-0-X)# Syntax Call the command without parameter assignment: wlan outdoor Result The outdoor mode is enabled. Further notes You display the setting with the show wlan basic <wlan 0/X> command. You disable the function with the no wlan outdoor command (default setting). See also no wlan outdoor (Page 260) 7.1.5.58...
  • Page 261: Wlan Overlap-Ap Aging (Access Point)

    Network structures 7.1 WLAN Further notes You display the setting with the show wlan basic <wlan 0/X> command. You enable the outdoor mode with the wlan outdoor command. See also wlan outdoor (Page 259) 7.1.5.59 wlan overlap-ap aging (access point) Description With this command, you configure the aging time for the list of overlapping access points.
  • Page 262: Wlan Roaming Threshold (Client)

    Network structures 7.1 WLAN 7.1.5.60 wlan roaming threshold (client) Description With this command, you specify the threshold after which the client roams to the new access point. Note This command is only available in the client mode. Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax...
  • Page 263: Wlan Rts-Cts Threshold

    Network structures 7.1 WLAN 7.1.5.61 wlan rts-cts threshold Description With this command, you specify the packet size starting at which RTS/CTS (Request To Send/ Clear To Send) will be used. Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-if-wlan-0-X)# Syntax...
  • Page 264: Vap Wds Id (Access Point)

    Network structures 7.1 WLAN 7.1.6.1 vap wds id (access point) Description With this command, you set the WDS ID for the relevant VAP interface. To establish a WDS connection, enter this WDS ID on the WDS partner. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode of the VAP interface.
  • Page 265: Vap Ssid (Access Point)

    Network structures 7.1 WLAN 7.1.6.2 vap ssid (access point) Description With this command, you configure the SSID for the relevant VAP interface. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode of the VAP interface. The command prompt is as follows: cli (config-if-vapX-0-Y)# Syntax...
  • Page 266: Vap Broadcast Ssid (Access Point)

    Network structures 7.1 WLAN 7.1.6.3 vap broadcast ssid (access point) Description With this command, you enable the "Broadcast SSID" function. The SSID is sent in the frame of the access point and is visible for other SCALANCE W700 devices. This means that clients on which the "Any SSID"...
  • Page 267: No Vap Broadcast Ssid (Access Point)

    Network structures 7.1 WLAN 7.1.6.4 no vap broadcast ssid (access point) Description With this command, you disable the "Broadcast SSID" function. The SSID is no longer sent in the frame of the access point. This means that the SSID is not visible for other SCALANCE W700 devices.
  • Page 268: Vap Wds Only (Access Point)

    Network structures 7.1 WLAN 7.1.6.5 vap wds only (access point) Description With this command, you specify that the access point only supports communication via WDS. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode of the VAP interface. The command prompt is as follows: cli (config-if-vapX-0-Y)# Syntax...
  • Page 269: Commands In The Wds Interface Configuration Mode

    Network structures 7.1 WLAN Requirement You are in the Interface Configuration mode of the VAP interface. The command prompt is as follows: cli (config-if-vapX-0-Y)# Syntax Call the command without parameter assignment: no vap wds only Result You have specified who the VAP interface connects to. Further notes You display the setting with the show wlan vap <vap X 0/Y>command.
  • Page 270: Wds Partner Id-Type (Access Point)

    Network structures 7.1 WLAN 7.1.7.1 wds partner id-type (access point) Description With this command, you specify whether the WDS partner is detected by the access point by the MAC address or the WDS ID. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode for the WDS interface.
  • Page 271: Wds Partner Mac (Access Point)

    Network structures 7.1 WLAN 7.1.7.2 wds partner mac (access point) Description With this command, you enter the MAC address of the WDS partner. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode for the WDS interface. The command prompt is as follows: cli (config-if-wdsX-0-Y)# Syntax...
  • Page 272: Wds Partner Wds-Id (Access Point)

    Network structures 7.1 WLAN 7.1.7.3 wds partner wds-id (access point) Description With this command, you enter the WDS ID of the WDS partner. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode for the WDS interface. The command prompt is as follows: cli (config-if-wdsX-0-Y)# Syntax...
  • Page 273: Wds Connection Over (Access Point)

    Network structures 7.1 WLAN 7.1.7.4 wds connection over (access point) Description With this command, you specify the VAP interface via which the WDS connection is established. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode for the WDS interface. The command prompt is as follows: cli (config-if-wdsX-0-Y)# Syntax...
  • Page 274: Dest-Addr (Access Point)

    Network structures 7.1 WLAN In the WLAN configuration mode, enter the force roaming ip-down <index (1-10)> command to change to this mode. ● If you exit the force roaming configuration mode with the exit command, you return to the WLAN configuration mode. ●...
  • Page 275: Lost (Access Point)

    Network structures 7.1 WLAN Result The destination address is configured. Note Destination address not in the agent IPv4 subnet If the destination address is not in the agent IPv4 subnet, a gateway must be entered. The Base Bridge mode "802.1Q VLAN Bridge" If you have configured the "Base Bridge Mode"...
  • Page 276: Interval (Access Point)

    Network structures 7.1 WLAN Result The setting is configured. Further notes You display this setting and other information with the show wlan force roaming ip- down command. 7.1.8.4 interval (Access Point) Description With this command, you specify the interval at which echo messages (pings) are sent. Note This command is available only in access point mode.
  • Page 277: Port (Access Point)

    Network structures 7.1 WLAN 7.1.8.5 port (Access Point) Description With this command you specify which VAP interface will be monitored. You can assign multiple destination addresses to a VAP interface. ● VAP interface monitors a destination address If no ping response is received from this destination address, the access point turns the relevant VAP interface off.
  • Page 278: No Port (Access Point)

    Network structures 7.2 VLAN 7.1.8.6 no port (Access Point) Description With this command, you disable the monitoring of the VAP interface. Note This command is available only in access point mode. Requirement You are in the force roaming configuration mode. The command prompt is as follows: cli (config-wlan-froid-$)# Syntax...
  • Page 279: The "Show" Commands

    Network structures 7.2 VLAN 7.2.1 The "show" commands This section describes commands with which you display various settings. 7.2.1.1 show dot1d mac-address-table Description This command shows the table with the static and dynamic unicast entries and the dynamic multicast entries. Requirement You are in the Privileged EXEC mode.
  • Page 280: Show Mac-Address-Table

    Network structures 7.2 VLAN 7.2.1.2 show mac-address-table Description This command shows the table with the static and dynamic unicast MAC addresses and multicast MAC addresses. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 281: Show Mac-Address-Table Dynamic Unicast

    Network structures 7.2 VLAN 7.2.1.3 show mac-address-table dynamic unicast Description This command shows the MAC addresses of the dynamic unicast configuration. Requirement ● In "base bridge-mode", the mode for the device is set to "transparent". You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 282: Show Mac-Address-Table Count

    Network structures 7.2 VLAN 7.2.1.4 show mac-address-table count Description With this command, you show the number of MAC addresses for all or a selected VLAN. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 283: Show Vlan Device Info

    Network structures 7.2 VLAN show vlan[brief|id<vlan-range>|summary] The parameters have the following meaning: Parameter Description Range of values / note Shows brief information about all VLANs - brief Keyword for a VLAN or VLAN range Number of the addressed VLAN or 1 ...
  • Page 284: Show Vlan Learning Params

    Network structures 7.2 VLAN 7.2.1.7 show vlan learning params Description This command shows the parameters for the automatic learning of addresses for selected or all VLANs (active and inactive VLANs). Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 285: Commands In The Global Configuration Mode

    Network structures 7.2 VLAN Syntax Call up the command with the following parameters: show vlan port config[{port<interface-type><interface-id>}] The parameters have the following meaning: Parameter Description Range of values / note Keyword for a port port Type of interface Enter a valid interface. interface-type Module no.
  • Page 286: No Mac-Address-Table Aging

    Network structures 7.2 VLAN Syntax Call the command without parameters: mac-address-table aging Result The "Aging" function is enabled. Further notes You configure the time with the mac-address-table aging-time command. You disable the "Aging" function with the no mac-address-table aging command. 7.2.2.2 no mac-address-table aging Description...
  • Page 287: Vlan

    Network structures 7.2 VLAN 7.2.2.3 vlan Description With this command, you create a VLAN on the device and change to the VLAN configuration mode. Note The device supports up to 8 virtual networks. In the provider backbone bridge mode, this command is used to create user, service and backbone VLANs.
  • Page 288: No Vlan

    Network structures 7.2 VLAN 7.2.2.4 no vlan Description With this command, you delete a VLAN on the device. Requirement ● The VLAN must not be assigned to a physical port. ● You are in the Global Configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameter:...
  • Page 289: Mgmt Vlan

    Network structures 7.2 VLAN Syntax Call up the command with the following parameters: base bridge-mode {dot1d-bridge|dot1q-vlan} The parameters have the following meaning: Parameter Description Range of values / note Sets the mode of the device to "transparent" for Default setting dot1d-bridge the Spanning Tree protocol.
  • Page 290: Commands In The Interface Configuration Mode

    Network structures 7.2 VLAN The parameter has the following meaning: Parameters Description Range of values / note Number of the addressed VLAN 1 ... 4094 vlan-id Result The Agent VLAN ID has been changed. Further notes You reset the dot1q-vlan setting with the base bridge-mode command. 7.2.3 Commands in the interface configuration mode This section describes commands that you can call up in the interface configuration mode.
  • Page 291: Switchport Access Vlan

    Network structures 7.2 VLAN The parameters have the following meaning: Parameters Description All frames (with and without VLAN variables) are accepted Only frames with VLAN variables are accepted tagged At system start or when using the restart command with the option memoryor factory, the following defaults apply: ●...
  • Page 292: No Switchport Access Vlan

    Network structures 7.2 VLAN Further notes You can reset the setting to the default with the no switchport access vlan command. You display the setting and other information with the show vlan port config command. 7.2.3.3 no switchport access vlan Description With this command, you reset the setting for the port VLAN identifier (PVID) for an interface to the default value.
  • Page 293: No Switchport Ingress-Filter

    Network structures 7.2 VLAN Requirement You are in the Interface configuration mode. The command prompt is as follows: cli(config-if-$$$)# Syntax Call the command without parameters: switchport ingress-filter Result The ingress filter is activated. Further notes You disable the filter with the no switchport ingress-filter command. You can display the status of the ingress filter and other settings with the show vlan port config command.
  • Page 294: Switchport Priority Default

    Network structures 7.2 VLAN Further notes You enable the filter with the switchport ingress-filter command. You can display the status of the ingress filter and other settings with the show vlan port config command. 7.2.3.6 switchport priority default Description With this command, you configure the priority default for the interface. Requirement You are in the Interface configuration mode.
  • Page 295: Switchport Pvid

    Network structures 7.2 VLAN The default value is 0. Requirement You are in the Interface configuration mode. The command prompt is as follows: cli(config-if-$$$)# Syntax Call the command without parameters: no switchport priority default Result The setting is reset to the default value. Further notes You configure the priority default with the switchport priority default command.
  • Page 296: No Switchport Pvid

    Network structures 7.2 VLAN The parameter has the following meaning: Parameter Description Range of values / note Number of the addressed VLAN 1 ... 4094 vlan-id Result The PVID is configured Further notes You can reset the setting to the default with the no switchport pvid command. You configure the VLAN ID with the switchport access vlan command.
  • Page 297: Commands In The Vlan Configuration Mode

    Network structures 7.2 VLAN You can display the status of this function and other information with the show vlan port config command. 7.2.4 Commands in the VLAN configuration mode This section describes commands that you can call up in the VLAN Configuration mode. In the Global Configuration mode, enter the vlan $$$ command to change to this mode.
  • Page 298: No Name

    Network structures 7.2 VLAN Further notes You delete name assignment for a VLAN with the no name command. 7.2.4.2 no name Description With this command, you delete the name assignment for a VLAN. Requirement You are in the VLAN configuration mode. The command prompt is as follows: cli(config-vlan-$$$)# Syntax...
  • Page 299 Network structures 7.2 VLAN Requirement You are in the VLAN Configuration mode. The command prompt is as follows: cli(config-vlan-$$$)# Syntax Call up the command with the following parameters: ports [<interface-type><0/a-b,0/c,...>] [<interface-type><0/a-b,0/c,...>] untagged<interface-type> <0/a-b,0/c,...> [<interface-type><0/a-b,0/c,...>] [all] forbidden<interface-type><0/a-b,0/c,...> [<interface-type><0/a-b,0/c,...>] [name<vlan-name>] The parameters have the following meaning: Parameter Description Range of values / note...
  • Page 300: No Ports

    Network structures 7.2 VLAN 7.2.4.4 no ports Description With this command, you reset the ports for a VLAN. Requirement You are in the VLAN Configuration mode. The command prompt is as follows: cli(config-vlan-$$$)# Syntax Call up the command with the following parameters: no ports [<interface-type><0/a-b,0/c,...>] [<interface-type><0/a-b,0/c,...>]...
  • Page 301: Spanning Tree

    Network structures 7.3 Spanning Tree Further notes You display details of the function with the show vlan command. You reset the setting with the no ports command. Spanning Tree The Spanning Tree Protocol is used to monitor a LAN for redundant connections. These are blocked and reactivated when necessary if there are changes to the network topology.
  • Page 302: Show Spanning-Tree Active

    Network structures 7.3 Spanning Tree The parameters have the following meaning: Parameter Description Shows a summary summary Shows the blocked ports blockedports Shows whether 16-bit (short) or 32 bit (long) values are used in the calculation pathcost method Result The settings for the spanning tree function are displayed. Further notes You can show further settings for special aspects of the Spanning Tree Protocol with the following commands:...
  • Page 303: Show Spanning-Tree Bridge

    Network structures 7.3 Spanning Tree Result The settings for the active ports of the spanning tree function are displayed. 7.3.1.3 show spanning-tree bridge Description This command shows the settings of the spanning tree function of the bridge. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 304: Show Spanning-Tree Interface

    Network structures 7.3 Spanning Tree Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli> or cli# Syntax Call the command without parameters: show spanning-tree detail Result The detailed settings for the spanning tree function are displayed. 7.3.1.5 show spanning-tree interface Description...
  • Page 305: Show Spanning-Tree L2T-Edge

    Network structures 7.3 Spanning Tree Parameter Description Range of values / note Shows the costs of the path to the root rootcost bridge. Shows whether spanning-tree restricted-role restricted-role is enabled. Shows whether spanning-tree restricted-tcn restricted-tcn is enabled. Shows the status of the interface. state Shows the counters of the various stats...
  • Page 306: Show Spanning-Tree Mst Configuration

    Network structures 7.3 Spanning Tree 7.3.1.7 show spanning-tree mst configuration Description This command shows various settings for an instance of the Multiple Spanning Tree Protocol. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 307: Show Spanning-Tree Mst Interface

    Network structures 7.3 Spanning Tree The parameters have the following meaning: Parameter Description Range of values / note Number of the instance or range of in‐ ● 1 ... 64 instance-id stances whose settings are displayed ● 4094 Shows detailed information about the detail selected interface Result...
  • Page 308: Show Spanning-Tree Root

    Network structures 7.3 Spanning Tree Parameter Description Range of values / note Shows the number of incoming and outgoing stats packets for each path of the interface Shows the intervals at which the root switch hello-time sends its "Hello" message to the other switches Shows detailed information about the selec‐...
  • Page 309: Clear Spanning-Tree Counters

    Network structures 7.3 Spanning Tree Parameter Description Shows the maximum age of the data packet after which it is deleted max-age Shows the interface via which the spanning tree is set up port Shows the priority of the bridge priority Shows detailed information about the root bridge detail Result...
  • Page 310: Spanning-Tree

    Network structures 7.3 Spanning Tree 7.3.3.1 spanning-tree Description The Spanning Tree Protocol is used to monitor a LAN for redundant connections. These are blocked and reactivated when necessary if there are changes to the network topology. With this command, you enable the spanning tree function. Requirement You are in the Global configuration mode.
  • Page 311: Spanning-Tree Compatibility

    Network structures 7.3 Spanning Tree Syntax Call the command without parameters: no spanning-tree Result The spanning tree function is disabled. Further notes You enable the spanning tree function with the spanning-tree command. You can display the status of this function and other information with the show spanning- tree detailcommand.
  • Page 312: No Spanning-Tree Compatibility

    Network structures 7.3 Spanning Tree Result The compatibility version of the protocol is selected. Further notes You can reset the setting to the default mst with the no spanning-tree compatibility command. You can display the status of this function and other information with the show spanning tree detail command.
  • Page 313: Spanning-Tree L2T-Auto-Edge

    Network structures 7.3 Spanning Tree 7.3.3.5 spanning-tree l2t-auto-edge Description This command specifies that at all layer 2 tunnel ports it should be automatically detected whether or not an end device is connected. Requirement You are in the Global Configuration mode. The command prompt is as follows: cli(config)# Syntax...
  • Page 314: Spanning-Tree L2T-Edge

    Network structures 7.3 Spanning Tree no spanning-tree l2t-auto-edge Result The automatic discovery of a bridge on the interface is disabled. Further notes You enable the automatic detection with the spanning-tree l2t-auto-edge command. You can display the status of this function with the show spanning-tree l2t- edgecommand.
  • Page 315: No Spanning-Tree L2T-Edge

    Network structures 7.3 Spanning Tree 7.3.3.8 no spanning-tree l2t-edge Description With this command, you disable the setting that an end device may be located at a layer 2 tunnel port. Requirement You are in the Global Configuration mode. The command prompt is as follows: cli(config)# Syntax Call the command without parameters:...
  • Page 316: Spanning-Tree Mst Instance-Id Root

    Network structures 7.3 Spanning Tree Syntax Call the command without parameters: spanning-tree mst configuration Result You are now in the MSTP configuration mode. The command prompt is as follows: cli(config-mst)# Further notes You exit the MSTP configuration mode with the end or exit command. 7.3.3.10 spanning-tree mst instance-id root Description...
  • Page 317: No Spanning-Tree Mst Instance-Id Root

    Network structures 7.3 Spanning Tree Parameter Description Range of values / note The priority of the device is set to a low value so that the The priority is set to the val‐ primary device can become the root bridge (primary) of the Span‐ ue 24576.
  • Page 318: Spanning-Tree Mst Max-Hops

    Network structures 7.3 Spanning Tree Result The "root bridge" function is disabled. Further notes You enable the root bridge function with the spanning-tree mst instance-id root command. You display this setting and other information with the commands that start with show spanning tree ..
  • Page 319: No Spanning-Tree Mst Max-Hops

    Network structures 7.3 Spanning Tree 7.3.3.13 no spanning-tree mst max-hops Description With this command, you reset the maximum number of hops that a path in an MST can run through to the default value. The default value is 20. Requirement You are in the Global configuration mode.
  • Page 320: No Spanning-Tree Priority

    Network structures 7.3 Spanning Tree Syntax Call up the command with the following parameters: spanning-tree[mst <instance-id(1-64)>] priority <value(0-61440)> The parameters have the following meaning: Parameter Description Range of values / note Keyword for a Multiple Spanning Tree instance Number of the instance 1 ...
  • Page 321: Time Settings For The Spanning Tree Protocol

    Network structures 7.3 Spanning Tree The parameters have the following meaning: Parameter Description Range of values / note Keyword for a Multiple Spanning Tree instance Number of the instance 1 ... 64 instance-id Result The priority of the device is reset to the default value. Further notes You configure the setting with the spanning-tree priority command.
  • Page 322 Network structures 7.3 Spanning Tree The parameters have the following meaning: Parameter Description Range of values / note Keyword for the time after which a port forward-time changes its spanning tree status from "Blocking" to "Forwarding" Time after which the changeover takes 4 ...
  • Page 323 Network structures 7.3 Spanning Tree If you call the command without parameters, you disable the spanning tree function. The configured time settings are retained. If you call the restart factory command, the system restarts with the factory configuration settings All rime settings are reset. The default values are as follows: Parameter Default value...
  • Page 324: Commands In The Interface Configuration Mode

    Network structures 7.3 Spanning Tree 7.3.4 Commands in the interface configuration mode This section describes commands that you can call up in the Interface configuration mode. ● The commands are only available with layer 3 ● Enable routing to use VRRP. ●...
  • Page 325 Network structures 7.3 Spanning Tree cli(config-if-$$$)# Syntax Call up the command with the following parameters: spanning-tree {cost <0-200000000>|disable| link-type{point-to-point|shared}|portfast| port-priority<0-240>} The parameters have the following meaning: Parameter Description Range of values / note Keyword 0 ... 200000000 cost Describes the costs of the port for cal‐ Default: culating the lowest cost path.
  • Page 326: No Spanning-Tree

    Network structures 7.3 Spanning Tree Further notes You can reset the setting to the default with the no spanning-tree (properties) command. You display these settings and other information with the commands that start with show spanning tree ..7.3.4.2 no spanning-tree Description With this command, you reset the various properties of the spanning tree function to the default value:...
  • Page 327: Spanning-Tree Auto-Edge

    Network structures 7.3 Spanning Tree Note Configure multiple properties With each call of the command, you can configure precisely one property. If you want to configure several properties, call the command several times. Result The selected setting was reset to the default value. Further notes You configure the setting with the spanning-tree command (properties).
  • Page 328: No Spanning-Tree Auto-Edge

    Network structures 7.3 Spanning Tree 7.3.4.4 no spanning-tree auto-edge Description With this command, you disable automatic discovery of a bridge connected to the interface. Requirement You are in the Interface Configuration mode. The command prompt is as follows: cli(config-if-$$$)# Syntax Call the command without parameters: no spanning-tree auto-edge Result...
  • Page 329: Spanning-Tree Bpdu-Receive

    Network structures 7.3 Spanning Tree The parameters have the following meaning: Parameter Description Range of values / note The transfer of BPDU packets is disa‐ Default: disabled disable bled for the port The transfer of BPDU packets is ena‐ enable bled for the port Result The BPDU transmit status is configured.
  • Page 330: Spanning-Tree Bpdu-Transmit

    Network structures 7.3 Spanning Tree 7.3.4.7 spanning-tree bpdu-transmit Description With this command, you enable or disable the BPDU transmit status at the port. Requirement You are in the Interface Configuration mode. The command prompt is as follows: cli(config-if-$$$)# Syntax Call up the command with the following parameters: spanning-tree bpdu-transmit{enabled|disabled} The parameters have the following meaning: Parameter...
  • Page 331 Network structures 7.3 Spanning Tree Requirement You are in the Interface Configuration mode. The command prompt is as follows: cli(config-if-$$$)# Syntax Call up the command with the following parameters: spanning-tree mst<instance-id(1-64)> {cost(0-200000000)|port-priority (0-240)|disable} The parameters have the following meaning: Parameter Description Range of values / note Number of the addressed instance...
  • Page 332: No Spanning-Tree Mst

    Network structures 7.3 Spanning Tree 7.3.4.9 no spanning-tree mst Description With this command, you reset the various properties of the Multiple Spanning Tree function to the default value. The default values are as follows: Parameter Default value ● 200000 for physical interfaces cost ●...
  • Page 333: Spanning-Tree Mst Hello-Time

    Network structures 7.3 Spanning Tree Further notes You configure the setting with the spanning-tree mst command (properties). You display these settings and other information with the commands that start with show spanning tree ..7.3.4.10 spanning-tree mst hello-time Description With this command, you configure the Hello time after which the bridge sends its configuration frames (BPDUs).
  • Page 334: No Spanning-Tree Mst Hello-Time

    Network structures 7.3 Spanning Tree 7.3.4.11 no spanning-tree mst hello-time Description With this command, you reset the hello time after which the bridge sends its configuration BPDUs to the default value. The default value is 2 seconds. Requirement You are in the interface configuration mode. The command prompt is as follows: cli(config-if-$$$)# Syntax...
  • Page 335: Instance

    Network structures 7.3 Spanning Tree Requirements for changing to this mode: ● MSTP is enabled ● Base bridge mode: 802.1Q VLAN Bridge ● Compatibility mode: MSTP 7.3.5.1 instance Description With this command, you assign a range of VLANs to an MST instance. Requirement You are in the MSTP Configuration mode.
  • Page 336: No Instance

    Network structures 7.3 Spanning Tree You display this setting and other information with the show spanning-tree mst configuration command. 7.3.5.2 no instance Description With this command, you cancel the assignment of a VLAN to an MST instance or delete the MST instance.
  • Page 337: Name

    Network structures 7.3 Spanning Tree 7.3.5.3 name Description With this command, you configure a name for the MST region. Requirement You are in the MSTP Configuration mode. The command prompt is as follows: cli(config-mst)# Syntax Call up the command with the following parameters: name <region-name>...
  • Page 338: Revision

    Network structures 7.3 Spanning Tree The command prompt is as follows: cli(config-mst)# Syntax Call the command without parameters: no name Result The name is reset to the default value. Further notes You configure the name of the MST region with the name command. You display this setting and other information with the show spanning tree mst configuration command.
  • Page 339: No Revision

    Network structures 7.3 Spanning Tree Further notes You delete a revision number with the no revision command. You display this setting and other information with the show spanning tree mst configuration command. 7.3.5.6 no revision Description With this command, you reset the revision number of the MST region to the default value. The default value is 0.
  • Page 340 Network structures 7.3 Spanning Tree SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface Configuration Manual, 09/2017, C79000-G8976-C324-08...
  • Page 341: Network Protocols

    Network protocols This part contains the sections that describe the commands for working with the various network protocols. IPv4 protocol This section describes commands of the Internet Protocol (IP) version 4. 8.1.1 The "show" commands This section describes commands with which you display various settings. 8.1.1.1 show dcp forwarding Description...
  • Page 342: Show Dcp Server

    Network protocols 8.1 IPv4 protocol Result The overview of the DCP forwarding behavior is displayed. 8.1.1.2 show dcp server Description This command shows whether or not the DCP function is enabled on the device. If the DCP function is enabled, the read and write permissions are displayed. Requirement You are in the User EXEC mode or in the Privileged EXEC mode.
  • Page 343: Show Ip Telnet

    Network protocols 8.1 IPv4 protocol The parameters have the following meaning: Parameter Description Range of values / note ip-address shows the information for a specific IP address enter a valid IP ad‐ dress defines an address range using the subnet mask /8, /16 or /24 mask Shows the direct connections...
  • Page 344: Show Ip Dns Cache

    Network protocols 8.1 IPv4 protocol The command prompt is as follows: cli> or cli# Syntax Call the command without parameters: show ip dns Result Information on the DNS client is displayed. 8.1.1.6 show ip dns cache Description This command shows the content of the DNS cache. The DNS cache buffers replies of the DNS server for a brief time.
  • Page 345: Show Ip Dns Statistics

    Network protocols 8.1 IPv4 protocol Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli> or cli# Syntax Call the command without parameters: show ip dns name-server Result The table with the information about the DNS servers is displayed. 8.1.1.8 show ip dns statistics Description...
  • Page 346: Telnet-Server

    Network protocols 8.1 IPv4 protocol Commands relating to other topics that can be called in the Global configuration mode can be found in the relevant sections. You exit the Global configuration mode with the end or exit command and are then in the Privileged EXEC mode again.
  • Page 347: Ip Echo-Reply

    Network protocols 8.1 IPv4 protocol Syntax Call the command without parameters: no telnet-server Result The Telnet server is disabled. Further notes You enable the Telnet server with the telnet-server command. 8.1.2.3 ip echo-reply Description To check the availability of a network node, packets of the Internet Control Message Protocol (ICMP) can be sent to it.
  • Page 348: No Ip Echo-Reply

    Network protocols 8.1 IPv4 protocol 8.1.2.4 no ip echo-reply Description With this command you stop the network node reacting to ping queries. Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call the command without parameters: no ip echo-reply Result "ICMP echo reply messages"...
  • Page 349: No Ip Route

    Network protocols 8.1 IPv4 protocol The parameter has the following meaning: Parameter Description Range of values / note Specifies the IP address of the gateway enter a valid IP address gateway Result The entry is configured. Further notes You delete an entry from the IP routing table with the no ip route command. You display the IP routing table with the show ip route command.
  • Page 350: Dcp Server

    Network protocols 8.1 IPv4 protocol 8.1.2.7 dcp server Description With this command, you configure the read and write permissions for the DCP server and enable it. Requirement You are in the Global Configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters:...
  • Page 351: Ip Domain Lookup

    Network protocols 8.1 IPv4 protocol The command prompt is as follows: cli(config)# Syntax Call the command without parameters: no dcp server Result The DCP server is disabled. Further notes You enable and configure the DCP server with the dcp server command. 8.1.2.9 ip domain lookup Description...
  • Page 352: Ip Domain Used Server

    Network protocols 8.1 IPv4 protocol Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call the command without parameters: no ip domain lookup Result The DNS client of the device is disabled. 8.1.2.11 ip domain used server Description This command specifies which DNS server the device uses.
  • Page 353: Ip Name Server

    Network protocols 8.1 IPv4 protocol The parameters have the following meaning: Parameter Description Range of values / note The device uses only the DNS servers as‐ learned-only signed by DHCP. The device uses only the manually config‐ manually-only ured DNS servers. A maximum of three DNS servers can be configured.
  • Page 354: No Ip Name-Server

    Network protocols 8.1 IPv4 protocol Result The IP address and, if specified, the index for a DNS server has been set. Further notes You display the DNS servers configured in the device with Befehl show ip dns name- server . You delete the DNS server with the no ip name-server command.
  • Page 355: Commands In The Interface Configuration Mode

    Network protocols 8.1 IPv4 protocol 8.1.3 Commands in the interface configuration mode This section describes commands that you can call up in the interface configuration mode. Depending on the Interface selected, various command sets are available. In the Global configuration mode, enter the interface command to change to this mode. Commands relating to other topics that can be called in the interface configuration mode can be found in the relevant sections.
  • Page 356: No Ip Address

    Network protocols 8.1 IPv4 protocol Result The IP address is assigned to the VLAN interface. Note Effectiveness of the command The command is effective immediately. If you configure the interface via which you access the device, the connection will be lost! Further notes You delete the settings with the no ip address command.
  • Page 357: Ip Address Dhcp

    Network protocols 8.1 IPv4 protocol Result The assignment of the IP address to a VLAN interface is deleted and DHCP is disabled. Note Effectiveness of the command The command is effective immediately. If you configure the interface via which you access the device, you can lose the connection! Further notes You configure the setting with the ip address command.
  • Page 358: Dcp Forwarding

    Network protocols 8.2 IPv6 protocol 8.1.3.4 dcp forwarding Description With this command, you configure the forwarding behavior of the interface for DCP frames. Requirement You are in the Interface Configuration mode. The command prompt is as follows: cli(config-if-$$$)# Syntax Call up the command with the following parameters: dcp forwarding {block|forward} The parameters have the following meaning: Parameter...
  • Page 359: The "Show" Commands

    Network protocols 8.2 IPv6 protocol 8.2.2 The "show" commands This section describes commands with which you display various settings. 8.2.2.1 show ipv6 neighbors Description This command shows IPv6 neighbors table. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 360: Show Ipv6 Route

    Network protocols 8.2 IPv6 protocol Syntax Call the command without parameter assignment: show ipv6 pmtu Result The settings are displayed. 8.2.2.3 show ipv6 route Description This command shows the routes currently being used. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 361: Show Ipv6 Traffic

    Network protocols 8.2 IPv6 protocol cli> or cli# Syntax Call the command without parameters: show ipv6 static route Result The static routes are displayed. 8.2.2.5 show ipv6 traffic Description This command shows the statistics for UDP and ICMPv6 for the corresponding interface. Requirement You are in the User EXEC mode or in the Privileged EXEC mode.
  • Page 362: Commands In The Global Configuration Mode

    Network protocols 8.2 IPv6 protocol For information on names of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)". If you do not select any parameter from the parameter list, the statistics are displayed for all available IP interfaces.
  • Page 363: No Ipv6 Neighbor

    Network protocols 8.2 IPv6 protocol The parameter has the following meaning: Parameter Description Range of values / note IPv6 address of the neighbor node Enter a valid IPv6 address. prefix Keyword for a VLAN connection vlan Number of the addressed VLAN 1 ...
  • Page 364: Ipv6 Path Mtu

    Network protocols 8.2 IPv6 protocol The parameter has the following meaning: Parameter Description Range of values / note IPv6 address of the neighbor node Enter a valid IPv6 address. prefix Keyword for a VLAN connection vlan Number of the addressed VLAN 1 ...
  • Page 365: No Ipv6 Path Mtu

    Network protocols 8.2 IPv6 protocol The parameters have the following meaning: Parameter Description Range of values / note IPv6 address of the recipient Enter a valid IPv6 address prefix addr Size in bytes 0 ... 65535 Default: 1500 For information on names of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)".
  • Page 366: Ipv6 Path Mtu Discover

    Network protocols 8.2 IPv6 protocol Result The setting for the maximum packet size is no longer used. Further notes You display the configuration with the show ipv6 pmtu command. You configure the maximum packet size with the ipv6 path mtu command. 8.2.3.5 ipv6 path mtu discover Description...
  • Page 367: Ipv6 Default Route

    Network protocols 8.2 IPv6 protocol Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call the command without parameters: no ipv6 path mtu discover Result The PMTU Discovery function is disabled. Further notes You enable the PMTU Discovery function with the command ipv6 path mtu discover.
  • Page 368: No Ipv6 Default Route

    Network protocols 8.2 IPv6 protocol [<administrative distance>] [unicast] Parameter Description Range of values / note Number of bits belonging to the prefix 1 ... 128 bits prefix len (from left to right) IPv6 address of the gateway to which the IPv6 packets will be forwar‐ Enter a valid IPv6 address.
  • Page 369: Commands In The Interface Configuration Mode

    Network protocols 8.2 IPv6 protocol [<NextHop>] {vlan <vlan-id (1-4094)> [<administrative distance>] [unicast]| [<administrative distance>] [unicast] | [<interface-type> <interface-id>] [<administrative distance>] [unicast] The parameters have the following meaning: Parameter Description Range of values / note Number of bits belonging to the prefix 1 ...
  • Page 370: Ipv6 Address

    Network protocols 8.2 IPv6 protocol Commands relating to other topics that can be called in the interface configuration mode can be found in the relevant sections. ● If you exit the Interface configuration mode with the exit command, you return to the Global configuration mode.
  • Page 371: No Ipv6 Address

    Network protocols 8.2 IPv6 protocol Result The IPv6 address is assigned to the interface. If you assign a link local address to the IP interface, the automatically created local address is overwritten. Further notes You delete the IPv6 address with the no ipv6 address command. You enable IPv6 with the ipv6 enable command.
  • Page 372: Ipv6 Address Autoconfig

    Network protocols 8.2 IPv6 protocol Result The IPv6 address has been deleted. Further notes You configure the IPv6 address with the ipv6 address command. You display this setting and other information with the show ipv6 interface command. 8.2.4.3 ipv6 address autoconfig Description With this command you enable stateless autoconfiguration of the IPv6 address via NDP (Neighbor Discovery Protocol).
  • Page 373: No Ipv6 Address Autoconfig

    Network protocols 8.2 IPv6 protocol 8.2.4.4 no ipv6 address autoconfig Description With this command you disable stateless autoconfiguration of the IPv6 address via NDP (Neighbor Discovery Protocol). Requirement ● IPv6 is activated ● The interface is an IP interface. ● You are in the Interface configuration mode The command prompt is as follows: cli(config-if-$$)# Syntax...
  • Page 374: No Ipv6 Address Dhcp

    Network protocols 8.2 IPv6 protocol Requirement ● IPv6 is activated ● The interface is an IP interface. ● You are in the Interface configuration mode The command prompt is as follows: cli(config-if-$$)# Syntax Call up the command with the following parameters: ipv6 address dhcp [rapid-commit] The parameters have the following meaning: Parameter...
  • Page 375: Ipv6 Address Link-Local

    Network protocols 8.2 IPv6 protocol Requirement ● IPv6 is activated ● The interface is an IP interface. ● You are in the Interface configuration mode The command prompt is as follows: cli(config-if-$$)# Syntax Call the command without parameter assignment: no ipv6 address dhcp Result DHCPv6 is disabled.
  • Page 376: No Ipv6 Address Link-Local

    Network protocols 8.2 IPv6 protocol The parameter has the following meaning: Parameter Description Range of values / note Link local address Specify a valid link local address. prefix fe80::XXXX:XXXX:XXXX:XXXX For information on names of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)".
  • Page 377: Ipv6 Enable

    Network protocols 8.2 IPv6 protocol Result The link local address is deleted. Further notes You assign a link local address to an IP interface with the command ipv6 address link- local. You display this setting and other information with the show ipv6 interface command. 8.2.4.9 ipv6 enable Description...
  • Page 378: No Ipv6 Enable

    Network protocols 8.3 DHCPv4 client (IPv4) 8.2.4.10 no ipv6 enable Description With this command, you disable IPv6 on the interface. Requirement You are in the Interface configuration mode of VLAN The command prompt is as follows: cli(config-if-vlan-$$$)# Syntax Call the command without parameter assignment: no ipv6 enable Result IPv6 is disabled.
  • Page 379: Show Ip Dhcp Client

    Network protocols 8.3 DHCPv4 client (IPv4) Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli> or cli# Syntax Call the command without parameters: show ip dhcp client stats Result The counters are displayed.
  • Page 380: Ip Dhcp Config-File-Request

    Network protocols 8.3 DHCPv4 client (IPv4) You exit the Global configuration mode with the end or exit command and are then in the Privileged EXEC mode again. 8.3.2.1 ip dhcp config-file-request Description If the DHCP config file request option is set, the device requests the TFTP address and the name of a configuration file from the DHCP server.
  • Page 381: Ip Dhcp Client Mode

    Network protocols 8.3 DHCPv4 client (IPv4) Syntax Call the command without parameters: no ip dhcp config-file-request Result The DHCP config file request option is disabled. Further notes You enable the DHCP config file request option with the ip dhcp config-file- request command.
  • Page 382: Dhcpv6 Client (Ipv6)

    Network protocols 8.4 DHCPv6 client (IPv6) DHCPv6 client (IPv6) This section describes commands for DHCPv6. 8.4.1 clear ipv6 dhcp client statistics Description With this command, you reset the counter to zero on the required interface. Requirement ● DHCPv6 is enabled. You are in the Privileged EXEC mode.
  • Page 383: The "Show" Commands

    Network protocols 8.4 DHCPv6 client (IPv6) You display the setting with the show ipv6 dhcp interface command. You display the statistics with the show ipv6 dhcp client statistics command. 8.4.2 The "show" commands This section describes commands with which you display various settings. 8.4.2.1 show ipv6 dhcp Description...
  • Page 384: Show Ipv6 Dhcp Client Statistics

    Network protocols 8.4 DHCPv6 client (IPv6) Syntax Call up the command with the following parameters: show ipv6 dhcp interface [{vlan <vlan-id(1-4094)> | <interface- type> <interface-id>}] The parameters have the following meaning: Parameter Description Range of values / note Keyword for a VLAN connection vlan Number of the addressed VLAN 1 ...
  • Page 385: Commands In The Interface Configuration Mode

    Network protocols 8.4 DHCPv6 client (IPv6) The parameters have the following meaning: Parameter Description Range of values / note Shows that an interface description follows interface Keyword for a VLAN connection vlan Number of the addressed VLAN 1 ... 4094 vlan-id Type or speed of the interface Specify a valid interface.
  • Page 386: No Ipv6 Dhcp Client Request

    Network protocols 8.4 DHCPv6 client (IPv6) Requirement ● DHCPv6 Is activated. ● IPv6 is activated ● The interface is an IP interface. ● You are in the Interface configuration mode The command prompt is as follows: cli(config-if-$$)# Syntax Call up the command with the following parameters: ipv6 dhcp client request {dns-server-address | domain-name | sntp- server-address | option <code (1-100)>} The parameters have the following meaning:...
  • Page 387: Dhcp Server

    Network protocols 8.5 DHCP server ● The interface is an IP interface. ● You are in the Interface configuration mode The command prompt is as follows: cli(config-if-$$)# Syntax Call up the command with the following parameters: no ipv6 dhcp client request {dns-server-address | domain-name | sntp- server-address | option <code (1-100)>} The parameters have the following meaning: Parameter...
  • Page 388: The "Show" Commands

    Network protocols 8.5 DHCP server Both with the dynamic and static assignment a pool is selected based on the following criteria: 1. With the DHCP query option 82 is enabled. The DHCP server checks whether there is a pool with option 82. You configure this criterion with the relay-information command.
  • Page 389: Show Ip Dhcp-Server Bindings

    Network protocols 8.5 DHCP server Result The configuration of the DHCP server and the DHCP options is displayed. 8.5.1.2 show ip dhcp-server bindings Description This command shows the current assignments of IPv4 addresses of the DHCP server. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 390: Ip Dhcp-Server

    Network protocols 8.5 DHCP server 8.5.2.1 ip dhcp-server Description With this command, you enable the DHCP server on the device. Note To avoid conflicts with IPv4 addresses, only one device may be configured as a DHCP server in the network. Note Maximum number of IP addresses The maximum number of IPv4 addresses that the DHCP server supports is 100.
  • Page 391: Ip Dhcp-Server Icmp-Probe

    Network protocols 8.5 DHCP server Requirement You are in the Global Configuration mode. The command prompt is as follows: cli(config)# Syntax Call the command without parameter assignment: no ip dhcp-server Result The DHCP server is disabled. Further notes You enable the DHCP server with the ip dhcp-server command. 8.5.2.3 ip dhcp-server icmp-probe Description...
  • Page 392: Ip Dhcp-Server Pool

    Network protocols 8.5 DHCP server Result The function is enabled. Further notes You disable the function with the no ip dhcp-server icmp-probe command. 8.5.2.4 ip dhcp-server pool Description With this command, you have three options of changing to the DHCPPOOL configuration mode and to assign an interface to the IPv4 address band.
  • Page 393: No Ip Dhcp-Server Pool

    Network protocols 8.5 DHCP server Parameter Description Range of values / note Type of interface Specify a valid interface. interface-type Module no. and port no. of the interface interface-id For information on identifiers of addresses and interfaces, refer to the section "Interface identifiers and addresses (Page 29)".
  • Page 394: No Ip Dhcp-Server Icmp-Probe

    Network protocols 8.5 DHCP server Further notes You create the IPv4 address band with the ip dhcp-server pool command. 8.5.2.6 no ip dhcp-server icmp-probe Description With this command you disable the function "Probe address with ICMP echo before offer". Requirement You are in the Global Configuration mode.
  • Page 395: Lease-Time

    Network protocols 8.5 DHCP server 8.5.3.1 lease-time Description With this command, you specify how long the assigned IPv4 address remains valid. When half the period of validity has elapsed. the DHCP client can extend the period of the assigned IPv4 address.
  • Page 396: Network

    Network protocols 8.5 DHCP server 8.5.3.2 network Description With this command you configure the IPv4 address band from which the DHCP client receives any IPv4 address. Note Maximum number of IP addresses The maximum number of IPv4 addresses that the DHCP server supports is 100. In other words, a total of 100 IPv4 addresses (dynamic + static).
  • Page 397: Option (Ip Address)

    Network protocols 8.5 DHCP server Result The IPv4 address band is configured. The DHCP options 1, 3, 6, 66 and 67 are created automatically. With the exception of option 1, the options can be deleted. Note DHCP options supported The DHCP options 1, 2, 3. 4. 5, 6, 42, 66, 67 are supported. Further notes You display the setting with the show ip dhcp-server pools command.
  • Page 398: Option Value-Hex

    Network protocols 8.5 DHCP server The parameters have the following meaning: Parameter Description Range of values / note Code of the DHCP option ● 3 - Router option- code ● 6 - DNS server ● 66 - TFTP server name IPv4 address or IPv4 address list ●...
  • Page 399: Option Value-String

    Network protocols 8.5 DHCP server Requirement You are in the DHCPPOOL configuration mode. The command prompt is as follows: cli(config-dhcp-pool-<ID>)# Syntax Call up the command with the following parameters: option <option-code> value-hex <dhcp-param> The parameters have the following meaning: Parameter Description Range of values / note Code of the DHCP option...
  • Page 400: No Option

    Network protocols 8.5 DHCP server Syntax Call up the command with the following parameters: option <option-code> value-string <dhcp-param> The parameters have the following meaning: Parameter Description Range of values / note Code of the DHCP option ● 12 - Host name option- code ●...
  • Page 401: Pool-Enable

    Network protocols 8.5 DHCP server Result The specified DHCP option is deleted. Further notes You configure the DHCP options 12, 66 and 67 with the option value-string command. You configure the DHCP options 3 and 6 with the option command. 8.5.3.7 pool-enable Description...
  • Page 402: No Pool-Enable

    Network protocols 8.5 DHCP server 8.5.3.8 no pool-enable Description With this command you specify that this IPv4 address band will not be used. Note Deleting DHCP server bindings If you disable or delete an IPv4 address band or you switch the DHCP server off and on again, the DHCP server bindings are deleted.
  • Page 403 Network protocols 8.5 DHCP server Description With this command, you specify the interface via which the IPv4 addresses are dynamically assigned. Note Assignment of IP addresses When assigning IP addresses from a local address band, the IPv4 address of the interface must be located within the IPv4 address band.
  • Page 404: Static-Lease

    Network protocols 8.5 DHCP server 8.5.3.10 static-lease Description With this command you specify that devices with a certain MAC address or client ID are assigned to the preset IPv4 address. Requirement ● The assignment has not yet been created. ● You are in the DHCPPOOL configuration mode. The command prompt is as follows: cli(config-dhcp-pool-<ID>)# Syntax...
  • Page 405: No Static-Lease

    Network protocols 8.6 SNMP 8.5.3.11 no static-lease Description With this command, you delete the assignment of an IPv4 address to a MAC address. Requirement You are in the DHCPPOOL configuration mode. The command prompt is as follows: cli(config-dhcp-pool-<ID>)# Syntax Call up the command with the following parameters: no static-lease { mac <mac-address>...
  • Page 406 Network protocols 8.6 SNMP Example of a configuration IP configuration IP address setting of the device suitable for the SNMP trap recipient used. Execute the following commands: configure terminal int vlan 1 no ip address ip address 192.168.1.1 255.255.255.0 Trap configuration forr SNMPv2c notifications To configure the sending of SNMP traps, an SBMP community is required.
  • Page 407: The "Show" Commands

    Network protocols 8.6 SNMP 8.6.1 The "show" commands This section describes commands with which you display various settings. 8.6.1.1 show snmp Description This command shows the status information of SNMP. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 408: Show Snmp Engineid

    Network protocols 8.6 SNMP Result The details of the configured SNMP communities are displayed. 8.6.1.3 show snmp engineID Description This command shows the SNMP identification number of the device. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 409: Show Snmp Group

    Network protocols 8.6 SNMP Result The configured SNMP filters are displayed. 8.6.1.5 show snmp group Description This command shows the configured SNMP groups. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 410: Show Snmp Inform Statistics

    Network protocols 8.6 SNMP Result The rights of the configured SNMP groups are displayed. 8.6.1.7 show snmp inform statistics Description This command shows the statistics of the Inform Messages. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 411: Show Snmp Targetaddr

    Network protocols 8.6 SNMP Result The configured SNMP notification types are displayed. 8.6.1.9 show snmp targetaddr Description This command shows the configured SNMP target addresses. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 412: Show Snmp User

    Network protocols 8.6 SNMP Result The configured SNMP target parameters are displayed. 8.6.1.11 show snmp user Description This command shows the settings for the SNMP users. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 413: Commands In The Global Configuration Mode

    Network protocols 8.6 SNMP Result The settings for the SNMP tree view are displayed. 8.6.2 Commands in the global configuration mode This section describes commands that you can call up in the Global configuration mode. In Privileged EXEC mode, enter the configure terminal command to change to this mode. Commands relating to other topics that can be called in the Global configuration mode can be found in the relevant sections.
  • Page 414: No Snmpagent

    Network protocols 8.6 SNMP 8.6.2.2 no snmpagent Description With this command, you disable the SNMP agent function. Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call the command without parameters: no snmpagent Result The SNMP agent function is disabled.
  • Page 415: Snmp Access

    Network protocols 8.6 SNMP The parameters have the following meaning: Parameter Description Range of values / note Only SNMPv3 queries are processed v3only All SNMP queries are processed Default: all Result The setting is configured. 8.6.2.4 snmp access Description With this command, you configure the access to an SNMP group. Requirement You are in the Global configuration mode.
  • Page 416: No Snmp Access

    Network protocols 8.6 SNMP Parameter Description Range of values / note The data can be read. ● ReadView read Keyword ● none The data can be read and written ● WriteView write Keyword ● none Changes can be sent as a tag. ●...
  • Page 417: Snmp Community Index

    Network protocols 8.6 SNMP Syntax Call up the command with the following parameters: no snmp access <GroupName> {v1|v2c|v3 {auth|noauth|priv}} The parameters have the following meaning: Parameter Description Range of values / note Name of the group to which access is max.
  • Page 418: No Snmp Community Index

    Network protocols 8.6 SNMP snmp community index <CommunityIndex> name <CommunityName> security <SecurityName> [context <Name>][{volatile|nonvolatile}] The parameters have the following meaning: Parameter Description Range of values / note Index of the community max. 32 characters CommunityIndex Keyword for the name of the community - name Name of the community max.
  • Page 419: Snmp Engineid Migrate

    Network protocols 8.6 SNMP Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: no snmp community index <CommunityIndex> The parameter has the following meaning: Parameter Description Range of values / note Name of the community...
  • Page 420: No Snmp Engineid Migrate

    Network protocols 8.6 SNMP snmp engineid migrate Result The SNMPv3 user migration is enabled. Further notes You disable the SNMPv3 user migration with the no snmp engineid migrate command. 8.6.2.9 no snmp engineid migrate Description With this command, you disable the SNMPv3 user migration. If the function is disabled, a device-specific SNMP engine ID is generated.
  • Page 421: Snmp Filterprofile

    Network protocols 8.6 SNMP 8.6.2.10 snmp filterprofile Description With this command, you configure a filter that describes the access rights to the MIB tree. Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: snmp filterprofile <profile-name>...
  • Page 422: No Snmp Filterprofile

    Network protocols 8.6 SNMP Result The filter is created. Further notes You delete a filter with the no snmp filterprofile command. You display the created filter with the show snmp filter table command. 8.6.2.11 no snmp filterprofile Description With this command, you delete a filter. Requirement You are in the Global configuration mode.
  • Page 423: Snmp Group

    Network protocols 8.6 SNMP 8.6.2.12 snmp group Description With this command, you configure the details of an SNMP group. Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: snmp group <GroupName>...
  • Page 424: No Snmp Group

    Network protocols 8.6 SNMP 8.6.2.13 no snmp group Description With this command, you delete the details of an SNMP group. Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: no snmp group <GroupName>...
  • Page 425: No Snmp Notify

    Network protocols 8.6 SNMP Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: snmp notify <NotifyName> tag <TagName> type {Trap|Inform} [{volatile|nonvolatile}] The parameters have the following meaning: Parameter Description Range of values / note...
  • Page 426: Snmp Targetaddr

    Network protocols 8.6 SNMP Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: no snmp notify <NotifyName> The parameter has the following meaning: Parameter Description Range of values / note Name of the notification max.
  • Page 427 Network protocols 8.6 SNMP [timeout <Seconds(1-1500)] [retries <RetryCount(1-3)] [taglist <TagIdentifier | none>] [{volatile | nonvolatile}] [port <integer (1-65535)>] The parameters have the following meaning: Parameter Description Range of values / note Name of the target address Maximum of 32 characters TargetAddressName Keyword for the parameter name param...
  • Page 428: No Snmp Targetaddr

    Network protocols 8.6 SNMP Further notes You delete the SNMP target address with the no snmp targetaddr command. You display the SNMP target address with the show snmp targetaddr command. You configure the SNMP target parameters with the snmp targetparams command. You display the SNMP target parameters with the show snmp targetparam command.
  • Page 429 Network protocols 8.6 SNMP Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: snmp targetparams <ParamName> user <UserName> security-model {v1|v2c|v3 {auth|noauth|priv}} message-processing {v1|v2c|v3}[{volatile|nonvolatile}] The parameters have the following meaning: Parameter Description Range of values / note...
  • Page 430: No Snmp Targetparams

    Network protocols 8.6 SNMP If optional parameters are not specified when configuring, the default values apply. Result The SNMP target parameters are configured. Further notes You delete the SNMP target parameters with the no snmp targetparams command. You display settings of this function with the show snmp targetparam command. You configure the user profile with the snmp user command.
  • Page 431: Snmp V1-V2 Readonly

    Network protocols 8.6 SNMP 8.6.2.20 snmp v1-v2 readonly Description With this command, you block write access for SNMPv1 and SNMPv2 PDUs. Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call the command without parameters: snmp v1-v2 readonly Result Write access for SNMPv1 and SNMPv2 PDUs is blocked.
  • Page 432: Snmp User

    Network protocols 8.6 SNMP Result Write access for SNMPv1 and SNMPv2 PDUs is enabled. Further notes You block write access for SNMPv1 and SNMPv2 PDUs with the snmp v1-v2 readonly command. 8.6.2.22 snmp user Description With this command, you configure the details of an SNMP user. Requirement You are in the Global configuration mode.
  • Page 433: No Snmp User

    Network protocols 8.6 SNMP Parameter Description Range of values / note Value for the password of the encryption max. 32 characters passwd Storage type Specifies whether the settings remain ● volatile: following a restart. The default settings are used after a restart. ●...
  • Page 434: Snmp View

    Network protocols 8.6 SNMP Further notes You change the settings with the snmp user command. You display the configured users with the show snmp usercommand. 8.6.2.24 snmp view Description With this command, you configure an SNMP view. Requirement ● An SNMP group has been created ●...
  • Page 435: No Snmp View

    Network protocols 8.6 SNMP Result The SNMP view is configured. Further notes You delete the view with the no snmp view command. You display the configured SNMP tree views with the show snmp viewtree command. You display the access rights of the SNMP groups with the show snmp group access command.
  • Page 436: Smtp Client

    Network protocols 8.7 SMTP client SMTP client This section describes commands of the Simple Mail Transfer Protocol (SMTP). 8.7.1 The "show" commands This section describes commands with which you display various settings. 8.7.1.1 show events smtp-server Description This command shows the configured SMTP servers. Requirement You are in the User EXEC mode or in the Privileged EXEC mode.
  • Page 437: Show Events Smtp-Port

    Network protocols 8.7 SMTP client Syntax Call the command without parameters: show events sender email Result The configured e-mail sender address is displayed. 8.7.1.3 show events smtp-port Description This command shows the configured SNMP port. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 438: Smtp-Server

    Network protocols 8.7 SMTP client 8.7.2.1 smtp-server Description With this command, you configure an entry for an SMTP server. Requirement You are in the EVENTS configuration mode. The command prompt is as follows: cli(config-events)# Syntax Call up the command with the following parameters: smtp-server { ipv4 <ucast_addr>...
  • Page 439: No Smtp-Server

    Network protocols 8.7 SMTP client 8.7.2.2 no smtp-server Description With this command, you delete an SMTP server entry. Requirement You are in the EVENTS configuration mode. The command prompt is as follows: cli(config-events)# Syntax Call up the command with the following parameters: no smtp-server { ipv4 <ucast_addr>...
  • Page 440: No Sender Mail-Address

    Network protocols 8.7 SMTP client Requirement You are in the EVENTS configuration mode. The command prompt is as follows: cli(config-events)# Syntax Call up the command with the following parameters: sender mail-address <mail-address> The parameter has the following meaning: Parameter Description Range of values / note Email name of the sender max.
  • Page 441: Smtp-Port

    Network protocols 8.7 SMTP client Further notes You configure the e-mail name of the sender with the sender mail-address. You display the setting with the show events sender email command. 8.7.2.5 smtp-port Description With this command, you configure an SMTP port. Requirement You are in the EVENTS configuration mode.
  • Page 442: Http Server

    Network protocols 8.8 HTTP server Requirement You are in the EVENTS configuration mode. The command prompt is as follows: cli(config-events)# Syntax Call the command without parameters: no smtp-port Result The SMTP port is reset to the default value. Further notes You configure the setting with the smtp-port command.
  • Page 443: Commands In The Global Configuration Mode

    Network protocols 8.8 HTTP server Syntax Call the command without parameters: show ip http server status Result The status of the HTTP server is displayed. 8.8.2 Commands in the Global Configuration mode This section describes commands that you can call up in the Global configuration mode. In Privileged EXEC mode, enter the configure terminal command to change to this mode.
  • Page 444: No Ip Http

    Network protocols 8.9 HTTPS server Further notes You can display the setting of this function and other information with the show ip http server statuscommand. You deactivate HTTP on the device with the no ip http command. 8.8.2.2 no ip http Description With this command, you disable the access via HTTP.
  • Page 445: Show Ip Http Secure Server Status

    Network protocols 8.9 HTTPS server 8.9.1.1 show ip http secure server status Description This command shows the status of the HTTPS server. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 446: Arp

    Network protocols 8.10 ARP 8.10 This section describes commands of the Address Resolution Protocol (ARP). 8.10.1 The "show" commands This section describes commands with which you display various settings. 8.10.1.1 show ip arp Description With this command, you display the IP ARP table. Requirement You are in the User EXEC mode or in the Privileged EXEC mode.
  • Page 447: Ssh Server

    Network protocols 8.11 SSH server Result The IP ARP table is displayed. 8.11 SSH server This section describes commands of the Secure Shell (SSH) Server. 8.11.1 The "show" commands This section describes commands with which you display various settings. 8.11.1.1 show ip ssh Description This command shows the settings of the SSH server.
  • Page 448: Ssh-Server

    Network protocols 8.11 SSH server You exit the Global configuration mode with the end or exit command and are then in the Privileged EXEC mode again. 8.11.2.1 ssh-server Description With this command, you enable the SSH protocol on the device. Requirement You are in the Global configuration mode.
  • Page 449 Network protocols 8.11 SSH server Syntax Call the command without parameters: no ssh-server Result The SSH protocol is disabled on the device. Further notes You enable the SSH protocol with the ssh-server command. SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface Configuration Manual, 09/2017, C79000-G8976-C324-08...
  • Page 450 Network protocols 8.11 SSH server SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface Configuration Manual, 09/2017, C79000-G8976-C324-08...
  • Page 451: Load Control

    Load control This part contains the sections describing the functions for controlling and balancing network load. Dynamic MAC aging The section describes commands with which the aging of dynamically learned entries is configured in a MAC address list. 9.1.1 The "show" commands This section describes commands with which you display various settings.
  • Page 452: Show Mac-Address-Table Aging-Status

    Load control 9.1 Dynamic MAC aging 9.1.1.2 show mac-address-table aging-status Description This command shows whether or not MAC aging is enabled. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 453 Load control 9.1 Dynamic MAC aging Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: mac-address-table aging-time <seconds(10-1000000)> The parameter has the following meaning: Parameter Description Range of values / note Life of the entry in seconds...
  • Page 454 Load control 9.1 Dynamic MAC aging SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface Configuration Manual, 09/2017, C79000-G8976-C324-08...
  • Page 455: Layer 3 Functions

    Layer 3 functions 10.1 This section describes commands relevant for NAT / NAPT. 10.1.1 The "show" commands 10.1.1.1 show nat connections Note This command is only available in the client mode. Description This command shows the NAT connections in the form of a table. Requirement You are in the User EXEC mode or in the Privileged EXEC mode.
  • Page 456: Show Nat (Client)

    Layer 3 functions 10.1 NAT 10.1.1.3 show nat (Client) Note This command is only available in the client mode. Description This command shows the NAT configuration and the translation list. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 457: Nat (Client)

    Layer 3 functions 10.1 NAT 10.1.2.1 nat (client) Note This command is only available in the client mode. Description With this command, you change to the NAT Configuration mode. Requirement You are in the Global Configuration mode. The command prompt is as follows: cli(config)# Syntax Call the command without parameters:...
  • Page 458: Ipv6 Transparent Mode (Client)

    Layer 3 functions 10.1 NAT 10.1.3.1 ipv6 transparent mode (Client) Note This command is only available in the client mode. Description With this command, you enable the transparent mode. IPv6 frames are forwarded unchanged between Ethernet and WLAN. Requirement ● You are now in the NAT Configuration mode. The command prompt is as follows: cli(config-nat)# ●...
  • Page 459: Nat (Client)

    Layer 3 functions 10.1 NAT Requirement You are now in the NAT Configuration mode. The command prompt is as follows: cli(config-nat)# Syntax Call the command without parameters: no ipv6 transparent mode Result The transparent mode is deactivated. Further notes You enable the transparent mode with the command ipv6 transparent mode. 10.1.3.3 nat (Client) Note...
  • Page 460 Layer 3 functions 10.1 NAT nat {tcp|udp} <globalportfrom> [<globalportto>] <localip> <localportfrom> [<localportto>] [{enable|disable}] The parameters have the following meaning: Parameter Description Range of values / note Assignment of TCP for the follow‐ ing global port Assignment of UDP for the follow‐ ing global port Start port of the global port range enter the start port...
  • Page 461: No Nat (Client)

    Layer 3 functions 10.1 NAT 10.1.3.4 no nat (Client) Note This command is only available in the client mode. Description With this command, you delete an entry from the translation list. Note This command is only available in the client mode Requirement You are now in the NAT Configuration mode.
  • Page 462: Nat Local Ip Address (Client)

    Layer 3 functions 10.1 NAT Further notes You show the NAT configuration and the translation list with the show nat command. You configure entries with the nat command. See also show nat (Client) (Page 456) 10.1.3.5 nat local ip address (Client) Note This command is only available in the client mode.
  • Page 463: Nat Interface (Client)

    Layer 3 functions 10.1 NAT Further notes You show the NAT configuration and the translation list with the show nat command. See also show nat (Client) (Page 456) 10.1.3.6 nat interface (Client) Note This command is only available in the client mode. Description With this command, you enable NAT for the Ethernet interface.
  • Page 464: No Nat Interface (Client)

    Layer 3 functions 10.1 NAT You show the NAT configuration and the translation list with the show nat command. 10.1.3.7 no nat interface (Client) Note This command is only available in the client mode. Description With this command, you disable NAT. Requirement You are now in the NAT Configuration mode.
  • Page 465: No Nat Ipv4 Multicast Forward Global-To-Local (Client)

    Layer 3 functions 10.1 NAT Description With this command, you enable the forwarding of multicast frames. The multicast frames incoming on the WLAN interface are forwarded via the Ethernet interface into the internal network. Requirement ● You are now in the NAT Configuration mode. The command prompt is as follows: cli(config-nat)# Syntax...
  • Page 466: Nat Ipv4 Multicast Forward Local-To-Global (Client)

    Layer 3 functions 10.1 NAT Syntax Call the command without parameters: no nat ipv4 multicast forward global-to-local Result The forwarding of multicast frames is disabled. Further notes You enable the forwarding with the nat ipv4 multicast forward global-to-local command. 10.1.3.10 nat ipv4 multicast forward local-to-global (Client) Note This command is only available in the client mode.
  • Page 467: No Nat Ipv4 Multicast Forward Local-To-Global (Client)

    Layer 3 functions 10.1 NAT Further notes You disable the forwarding with the no nat ipv4 multicast forward local-to- global command. 10.1.3.11 no nat ipv4 multicast forward local-to-global (Client) Note This command is only available in the client mode. no nat ipv4 multicast forward local-to-global Description With this command, you disable the forwarding of multicast frames.
  • Page 468: Nat Timeout (Client)

    Layer 3 functions 10.1 NAT 10.1.3.12 nat timeout (Client) Note This command is only available in the client mode. Description With this command, you configure the time period for the TCP / UDP connection. If no data exchange takes place, the TCP / UDP connection is deleted from the translation table when this time has elapsed.
  • Page 469: No Nat Timeout (Client)

    Layer 3 functions 10.1 NAT 10.1.3.13 no nat timeout (Client) Note This command is only available in the client mode. Description With this command, you delete the time period for the TCP / UDP connection. Requirement You are now in the NAT Configuration mode. The command prompt is as follows: cli(config-nat)# Syntax...
  • Page 470 Layer 3 functions 10.1 NAT SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface Configuration Manual, 09/2017, C79000-G8976-C324-08...
  • Page 471: Security And Authentication

    Security and authentication This part contains the sections that describe the access rights and authentication methods. 11.1 User rights management This section describes commands for access as administrator and the configuration of the authentication methods. When you transfer the configuration of a device to TIA, the configured users, roles and groups are not transferred.
  • Page 472: Whoami

    Security and authentication 11.1 User rights management Result The password is changed. Note Changing the password in Trial mode Even if you change the password in Trial mode, this change is saved immediately. Further notes You create a user with the user-account command. You delete a user with the no user-account command.
  • Page 473: Show Password-Policy

    Security and authentication 11.1 User rights management 11.1.3.1 show password-policy Description This command shows which password policy is currently being used. Requirement You are in the Privileged EXEC mode. The command prompt is as follows: cli# Syntax Call the command without parameters: show password-policy Result The currently valid password policy is displayed.
  • Page 474: Show Roles

    Security and authentication 11.1 User rights management Result The available function rights are displayed. 11.1.3.3 show roles Description This command shows the created roles. Requirement You are in the Privileged EXEC mode. The command prompt is as follows: cli# Syntax Call the command without parameters: show roles Result...
  • Page 475: Show User-Groups

    Security and authentication 11.1 User rights management Syntax Call up the command with the following parameters: show user-accounts [external] The parameter has the following meaning: Parameter Description Range of values / note Keyword for the table "External User Accounts" external If you do not specify the optional parameters, the local users are shown.
  • Page 476: Show Users

    Security and authentication 11.1 User rights management Result The links are shown. Further notes You link a group with a role with the user-group command. You delete a link with the no user-group command. 11.1.3.6 show users Description This command shows the logged-in CLI users. Requirement You are in the User EXEC mode or in the Privileged EXEC mode.
  • Page 477: Role

    Security and authentication 11.1 User rights management 11.1.4.1 role Description With this command, you create roles that are valid locally on the device. Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: role <role-name>...
  • Page 478: No Role

    Security and authentication 11.1 User rights management Result The role is created. Note Role name cannot be changed After creating a role, the name of the role can no longer be changed. If a name of a role needs to be changed, the role must be deleted and a new role created. Note Function rights changeable with restrictions You can only change the function rights of a role when the role is no longer linked to a user.
  • Page 479: User-Account

    Security and authentication 11.1 User rights management Result The role is deleted. Further notes You create a role with the role command. You show the created roles with the show roles command. 11.1.4.3 user-account Description With this command, you specify a new user. You can also change the password / role / description of an already created user.
  • Page 480 Security and authentication 11.1 User rights management Parameter Description Range of values / note Value for the password Enter the password. user-password The following characters must not be in‐ cluded: ● § ? " ; : ● The characters for Space and Delete must also not be included.
  • Page 481: No User-Account

    Security and authentication 11.1 User rights management 11.1.4.4 no user-account Description With this command, you delete a user. Note Default users "admin" as well as logged in users cannot be deleted. Requirement You are in the Global Configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters:...
  • Page 482 Security and authentication 11.1 User rights management associated role. If the corresponding group is known on the device, both tables are evaluated. The user is assigned the role with the higher rights. Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax...
  • Page 483: No User-Account-Ext

    Security and authentication 11.1 User rights management You show the links in the table "External User Accounts" with the show user-accounts external command. 11.1.4.6 no user-account-ext Description With this command, you delete the link between a user and a role in the table "External User Accounts".
  • Page 484 Security and authentication 11.1 User rights management Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: user-group <user-group-name> role <role-name> [description <user- group-description>] The parameters have the following meaning: Parameter Description Range of values / note...
  • Page 485: No User-Group

    Security and authentication 11.1 User rights management 11.1.4.8 no user-group Description With this command, you delete the link between a group and a role. Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: no user-group <user-group-name>...
  • Page 486: Password Policy

    Security and authentication 11.1 User rights management Syntax Call up the command with the following parameters: username {admin} password <passwd> The parameters have the following meaning: Parameter Description Range of values / note User name of the default user with admin read and write access to the config‐...
  • Page 487: Radius Client

    Security and authentication 11.2 RADIUS client Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: password policy < low | high > The parameters have the following meaning: Parameter Description Range of values / note...
  • Page 488: Show Radius Statistics

    Security and authentication 11.2 RADIUS client 11.2.1.1 show radius statistics Description This command shows the connection statistics from the RADIUS client to the RADIUS server. Requirement You are in the Privileged EXEC mode. The command prompt is as follows: cli# Syntax Call the command without parameters: show radius statistics...
  • Page 489: Commands In The Global Configuration Mode

    Security and authentication 11.2 RADIUS client If no parameters are specified, all configured RADIUS servers are displayed. Result The RADIUS server configuration is displayed. The password cannot be read as plain language, instead asterisks * are displayed. 11.2.2 Commands in the global configuration mode This section describes commands that you can call up in the Global configuration mode.
  • Page 490: No Login Authentication

    Security and authentication 11.2 RADIUS client The parameters have the following meaning: Parameter Description Range of values / note The login is via a RADIUS server. radius The login is possible both with the users The local users have priority. local-and-radius that exist in the firmware (user name The user is first searched for in the...
  • Page 491: Radius Authorization-Mode

    Security and authentication 11.2 RADIUS client Result The RADIUS authentication is deactivated. Note The login is possible only with a local user name and password. If the local logon fails, there is no authentication via a RADIUS server. Further notes You enable the authentication via a RADIUS server with the login authentication command.
  • Page 492: Radius-Server

    Security and authentication 11.2 RADIUS client Further notes You can display the status of this function and other information with the show device information command. 11.2.2.4 radius-server Description With this command, you configure a RADIUS server entry on the RADIUS client. Requirement You are in the Global configuration mode.
  • Page 493: No Radius-Server

    Security and authentication 11.2 RADIUS client Parameter Description Range of values / note Enter the maximum number of retries 1 … 5 for an attempted query. Default: 3 (retries, this means 4 The initial connection attempt is repea‐ connection attempts) ted the number of times specified here before another configured RADIUS server is queried or the login counts as...
  • Page 494: Wlan

    Security and authentication 11.3 WLAN Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: no radius-server { ipv4 <ipv4-address> | fqdn-name <FQDN> | ipv6 <ipv6-address>} [primary] The parameters have the following meaning: Parameter Description...
  • Page 495: The "Show" Commands

    Security and authentication 11.3 WLAN Some commands are available only in the "access point" or in the "client" mode. In these cases, the titles have the term access point or client added to them. Example: wlan mode ● wlan mode (access point): The function can only be used with access points. ●...
  • Page 496: Show Wlan Security Ap-Radius-Authenticator (Access Point)

    Security and authentication 11.3 WLAN Result The settings are displayed. 11.3.1.2 show wlan security ap-radius-authenticator (Access Point) Description This command shows the settings of the RADIUS server. Note This command is available only in access point mode. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 497: Show Wlan Security Keys

    Security and authentication 11.3 WLAN 11.3.1.3 show wlan security keys Description This command shows a table with the WEP key of the SCALANCE W700 device. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 498: Show Wlan Inter-Ap-Blocking Allowed Addresses

    Security and authentication 11.3 WLAN 11.3.1.4 show wlan inter-ap-blocking allowed addresses Description This command shows a list of the SCALANCE W700 devices with which the clients are allowed to communicate. Note The command is only available when the following requirements are met: ●...
  • Page 499: Commands In The Wlan Configuration Mode

    Security and authentication 11.3 WLAN 11.3.2 Commands in the WLAN configuration mode This section describes commands that you can call up in the WLAN configuration mode. In the Global Configuration mode, enter the wlan command to change to this mode. Commands relating to other topics that can be called in the WLAN configuration mode can be found in the relevant sections.
  • Page 500: No Wlan Security Ap-Radius-Authenticator

    Security and authentication 11.3 WLAN Further notes You disable the RADIUS server with the no wlan security ap-radius- authenticator command. You display the setting with the show wlan security ap-radius-authenticator command. See also no wlan security ap-radius-authenticator (Page 500) show wlan security ap-radius-authenticator (Access Point) (Page 496) 11.3.2.2 no wlan security ap-radius-authenticator Description...
  • Page 501: Wlan Security Ap-Radius-Authenticator Address

    Security and authentication 11.3 WLAN Further notes You disable the RADIUS server with the wlan security ap-radius-authenticator command. You display the setting with the show wlan security ap-radius-authenticator command. See also wlan security ap-radius-authenticator (Page 499) show wlan security ap-radius-authenticator (Access Point) (Page 496) 11.3.2.3 wlan security ap-radius-authenticator address Description...
  • Page 502: Wlan Security Ap-Radius-Authenticator Max-Retransmit

    Security and authentication 11.3 WLAN Result The RADIUS server is enabled. Further notes You display the setting with the show wlan security ap-radius-authenticator command. See also show wlan security ap-radius-authenticator (Access Point) (Page 496) 11.3.2.4 wlan security ap-radius-authenticator max-retransmit Description With this command, you configure maximum number of attempts to establish a connection.
  • Page 503: Wlan Security Ap-Radius-Authenticator Port-Number

    Security and authentication 11.3 WLAN Further notes You display the setting with the show wlan security ap-radius-authenticator command. See also show wlan security ap-radius-authenticator (Access Point) (Page 496) 11.3.2.5 wlan security ap-radius-authenticator port-number Description With this command, you configure the input port of the RADIUS server. Note This command is available only in access point mode.
  • Page 504: Wlan Security Ap-Radius-Authenticator Primary

    Security and authentication 11.3 WLAN See also show wlan security ap-radius-authenticator (Access Point) (Page 496) 11.3.2.6 wlan security ap-radius-authenticator primary Description With this command, you configure the RADIUS server as primary server. Note This command is available only in access point mode. Requirement You are in the WLAN Configuration mode and the "wlan security ap-radius-authenticator address"...
  • Page 505: No Wlan Security Ap-Radius-Authenticator Primary

    Security and authentication 11.3 WLAN See also no wlan security ap-radius-authenticator primary (Page 505) show wlan security ap-radius-authenticator (Access Point) (Page 496) 11.3.2.7 no wlan security ap-radius-authenticator primary Description With this command, you disable the primary server. Note This command is available only in access point mode. Requirement You are in the WLAN Configuration mode of the WLAN interface.
  • Page 506: Wlan Security Ap-Radius-Authenticator Reauth-Interval

    Security and authentication 11.3 WLAN See also wlan security ap-radius-authenticator primary (Page 504) show wlan security ap-radius-authenticator (Access Point) (Page 496) 11.3.2.8 wlan security ap-radius-authenticator reauth-interval Description With this command, you configure the lifetime of the authentication (in seconds). Note This command is available only in access point mode.
  • Page 507: Wlan Security Ap-Radius-Authenticator Reauth-Mode

    Security and authentication 11.3 WLAN See also wlan security ap-radius-authenticator reauth-mode (Page 507) show wlan security ap-radius-authenticator (Access Point) (Page 496) 11.3.2.9 wlan security ap-radius-authenticator reauth-mode Description With this command, you specify who decides the time before the clients are forced to reauthenticate.
  • Page 508: Wlan Security Ap-Radius-Authenticator Shared-Secret

    Security and authentication 11.3 WLAN Further notes You display the setting with the show wlan security ap-radius-authenticator command. See also wlan security ap-radius-authenticator reauth-interval (Page 506) show wlan security ap-radius-authenticator (Access Point) (Page 496) 11.3.2.10 wlan security ap-radius-authenticator shared-secret Description With this command, you configure the password for the RADIUS server.
  • Page 509: Wlan Security Context (Client)

    Security and authentication 11.3 WLAN Further notes You display the setting with the show wlan security ap-radius-authenticator command. See also show wlan security ap-radius-authenticator (Access Point) (Page 496) 11.3.2.11 wlan security context (Client) Description With this command, you create a new security context and change to the security context configuration mode.
  • Page 510: No Wlan Security Context (Client)

    Security and authentication 11.3 WLAN Further notes You exit the security context configuration mode with the command end or exit. You delete a security context with the no wlan security context command. You display the setting with the show wlan security command. 11.3.2.12 no wlan security context (Client) Description...
  • Page 511: Vap Inter-Ap-Blocking Refresh Time

    Security and authentication 11.3 WLAN 11.3.2.13 vap inter-ap-blocking refresh time Core statement This command specifies the update interval for the ARP table. The default for this value is 60 seconds. Note The command is only available when the following requirements are met: ●...
  • Page 512: Wlan Security Edit Key

    Security and authentication 11.3 WLAN In the Global Configuration mode, enter the interface wlan 0/X command to change to this mode. ● If you exit the WLAN Interface Configuration mode with the exit command, you return to the Global Configuration mode. ●...
  • Page 513: Wlan Security Ssid

    Security and authentication 11.3 WLAN Further notes You display the settings with the show wlan security <wlan 0/X> command. 11.3.3.2 wlan security ssid Description With this command, you assign the SSID of a WLAN interface a security context. Note iPCF or iPCF-MC mode activated If the iPCF or iPCF-MC mode is enabled, you can only select security context 1.
  • Page 514: Commands In The Security Context Configuration Mode

    Security and authentication 11.3 WLAN 11.3.4 Commands in the security context configuration mode This section describes commands that you can call up in the security context configuration mode. In the WLAN configuration mode, enter the wlan security context <ID (1-8)> command to change to this mode.
  • Page 515: Wlan Security Cipher (Client)

    Security and authentication 11.3 WLAN The parameters have the following meaning: Parameter Description Range of values / note Lists the available types of ● open-system show- authentication Without authentication. Encryption with a fixed methods (unchanging) key can be selected as an option. To Value corresponding to an methods authentication method.
  • Page 516 Security and authentication 11.3 WLAN Note iPCF, iPCF-HT, iPCF-MC mode enabledt If you want encryption with AES in iPCF, iPCF-HT or iPCF-MC mode, only keys with a 128 bit key length are supported. Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-wlan-context-x)# Syntax...
  • Page 517: Wlan Security Default-Key (Client)

    Security and authentication 11.3 WLAN 11.3.4.3 wlan security default-key (client) Description With this command, you specify which WEP key from the key table is used for encryption. Note This command is only available in the client mode. Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-wlan-context-x)# Syntax...
  • Page 518: No Wlan Security Dot1X Check-Server-Certificate (Client)

    Security and authentication 11.3 WLAN Requirement You are in the Interface Configuration mode of the WLAN interface. The command prompt is as follows: cli (config-wlan-context-x)# Syntax Call the command without parameter assignment: wlan security dot1x check-server-certificate Result Validation is enabled. Further notes You display the settings with the show wlan security command.
  • Page 519: Wlan Security Dot1X Eap-Authentication-Type (Client)

    Security and authentication 11.3 WLAN Syntax Call the command without parameter assignment: no wlan security dot1x check-server-certificate Result Validation is disabled. Further notes You display the settings with the show wlan security command. You enable the validation with the wlan security dot1x check-server- certificate command.
  • Page 520: Wlan Security Dot1X Username (Client)

    Security and authentication 11.3 WLAN The parameters have the following meaning: Parameters Description Range of values / note Lists the available authentica‐ ● auto show-types tion methods Client offers RADIUS server all methods Value that contains the au‐ type ● eap-tls thentication method Extensible Authentication Protocol - Transport Layer Security: Uses certificates for authentication...
  • Page 521: Wlan Security Dot1X Password (Client)

    Security and authentication 11.3 WLAN The command prompt is as follows: cli (config-wlan-context-x)# Syntax Call up the command with the following parameters: wlan security dot1x username <string> The parameter has the following meaning: Parameters Description Range of values / note User name Enter the user name for the RADIUS server.
  • Page 522: Wlan Security Encryption (Client)

    Security and authentication 11.3 WLAN cli (config-wlan-context-x)# Syntax Call up the command with the following parameters: wlan security dot1x password <string> The parameter has the following meaning: Parameters Description Range of values / note New password Enter the password for the user name. You specify the string user name with the wlan security dot1x username command...
  • Page 523: No Wlan Security Encryption (Client)

    Security and authentication 11.3 WLAN wlan security encryption Result The encryption is enabled. Further notes You display the settings with the show wlan security command. You disable the encryption with the no wlan security encryption command (default setting). You define a WEP key with the wlan security edit key command. You configure which WEP key is used with the wlan security default-key (Client) command.
  • Page 524: Wlan Security Wpa-Psk-Passphrase (Client)

    Security and authentication 11.3 WLAN Result The encryption is disabled. Further notes You display the settings with the show wlan security command. You enable the encryption with the wlan security encryption command. See also wlan security encryption (client) (Page 522) wlan security authentication (client) (Page 514) 11.3.4.11 wlan security wpa-psk-passphrase (client)
  • Page 525: Commands In The Vap Interface Configuration Mode

    Security and authentication 11.3 WLAN The parameter has the following meaning: Parameter Description Range of values / note WPA(2) key 8..63ASCII or exactly 64 hex string Result A WPA(2) key is specified. Further notes You display the settings with the show wlan security command. See also wlan security authentication (client) (Page 514) 11.3.5...
  • Page 526 Security and authentication 11.3 WLAN Requirement You are in the Interface Configuration mode of the VAP interface. The command prompt is as follows: cli (config-if-vapX-0-Y)# Syntax Call up the command with the following parameters: vap security authentication { show-methods | <method> } The parameters have the following meaning: Parameter Description...
  • Page 527: Vap Security Cipher (Access Point)

    Security and authentication 11.3 WLAN 11.3.5.2 vap security cipher (access point) Description With this command, you configure the encryption method for the WPA authentication. Note This command is available only in access point mode. Note iPCF, iPCF-HT or iPCF-MC mode activated If iPCF, iPCF-HT or iPCF-MC mode is enabled, only "Open System"...
  • Page 528: Vap Security Default-Key (Access Point)

    Security and authentication 11.3 WLAN Further notes You display the settings with the show wlan security <vapX 0/Y> command. 11.3.5.3 vap security default-key (access point) Description With this command, you specify which WEP key from the key table is used for encryption. Note This command is available only in access point mode.
  • Page 529: Vap Security Encryption (Access Point)

    Security and authentication 11.3 WLAN 11.3.5.4 vap security encryption (access point) Description With this command, you enable encryption with a fixed (unchanging) WEP key. You can only enable or disable encryption if you have selected "Open System" for authentication. All other security methods include both authentication and encryption.
  • Page 530: No Vap Security Encryption (Access Point)

    Security and authentication 11.3 WLAN 11.3.5.5 no vap security encryption (access point) Description With this command, you disable encryption with a fixed (unchanging) WEP key. This setting is activated as default. You can only enable or disable encryption if you have selected "Open System"...
  • Page 531: Vap Security Wpa-Group-Key-Update-Interval (Access Point)

    Security and authentication 11.3 WLAN 11.3.5.6 vap security wpa-group-key-update-interval (Access Point) Description With this command you specify the time after which the key is renewed. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode of the VAP interface. The command prompt is as follows: cli (config-if-vapX-0-Y)# Syntax...
  • Page 532: Vap Security Wpa-Psk-Passphrase (Access Point)

    Security and authentication 11.3 WLAN 11.3.5.7 vap security wpa-psk-passphrase (access point) Description With this command, you store the WPA(2) key that is used in WPA-PSK and WPA2-PSK authentication. Note The key can be 8 to 63 ASCII characters or exactly 64 hexadecimal characters long. It should be selected so that is complex for example consisting of random numbers, letters (upper-/ lowercase), have few repetitions and special characters.
  • Page 533: Vap Communication With Own-Vap (Access Point)

    Security and authentication 11.3 WLAN 11.3.5.8 vap communication with own-vap (access point) Description With this command, you specify that the clients logged on to the same SSID of an access point can communicate with each other. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode of the VAP interface.
  • Page 534: No Vap Communication With Own-Vap (Access Point)

    Security and authentication 11.3 WLAN 11.3.5.9 no vap communication with own-vap (access point) Description With this command, you specify that clients logged on to the same SSID of an access point cannot communicate with each other. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode of the VAP interface.
  • Page 535: Vap Communication With Other-Vaps (Access Point)

    Security and authentication 11.3 WLAN 11.3.5.10 vap communication with other-vaps (access point) Description With this command, you specify that clients logged on to different SSIDs of an access point can communicate with each other. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode of the VAP interface.
  • Page 536: No Vap Communication With Other-Vaps (Access Point)

    Security and authentication 11.3 WLAN 11.3.5.11 no vap communication with other-vaps (access point) Description With this command, you specify that clients logged on to different SSIDs of an access point cannot communicate with each other. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode of the VAP interface.
  • Page 537: Vap Communication With Ethernet (Access Point)

    Security and authentication 11.3 WLAN 11.3.5.12 vap communication with ethernet (access point) Description With this command, you specify that the client can communicate via the Ethernet interface. Note This command is available only in access point mode. Requirement You are in the Interface Configuration mode of the VAP interface. The command prompt is as follows: cli (config-if-vapX-0-Y)# Syntax...
  • Page 538: Vap Inter-Ap-Blocking Allowed Address

    Security and authentication 11.3 WLAN Requirement You are in the Interface Configuration mode of the VAP interface. The command prompt is as follows: cli (config-if-vapX-0-Y)# Syntax Call the command without parameter assignment: no vap communication with ethernet Result The communication option is disabled. Further notes You display the settings with the show wlan security <vapX 0/Y>...
  • Page 539: No Vap Inter-Ap-Blocking Allowed Address

    Security and authentication 11.3 WLAN Syntax Call up the command with the following parameters: vap inter-ap-blocking allowed address {ipv4 <ucast_addr>} [resolver- address {ipv4 <ucast_addr>}] The parameters have the following meaning: Parameter Description Range of values / note Keyword for an IPv4 ad‐ ipv4 dress ucast_addr IPv4 address...
  • Page 540: Vap Inter-Ap-Blocking

    Security and authentication 11.3 WLAN Requirement You are in the Interface Configuration mode of the VAP interface. The command prompt is as follows: cli (config-if-vapX-0-Y)# Syntax Call up the command with the following parameters: no vap inter-ap-blocking allowed address {ipv4 <ipv4-address>} The parameters have the following meaning: Parameter Description...
  • Page 541: No Vap Inter-Ap-Blocking

    Security and authentication 11.3 WLAN Syntax Call the command without parameters: vap inter-ap-blocking Result The client can only communicate via the Ethernet interface with SCALANCE W700 devices that were configured as permitted communications partners. Further notes The show wlan inter-ap-blocking allowed addresses vapX 0/Y command shows information about the SCALANCE W700 devices with which communication is possible.
  • Page 542: Vap Inter-Ap-Blocking Block Gratuitous Arp

    Security and authentication 11.3 WLAN Result The client can communicate with all available SCALANCE W700 devices via the Ethernet interface. If permitted communications partners were configured previously, this information is retained after calling this command. Further notes The show wlan inter-ap-blocking allowed addresses vapX 0/Y command shows information about the SCALANCE W700 devices with which communication is possible.
  • Page 543: No Vap Inter-Ap-Blocking Block Gratuitous Arp

    Security and authentication 11.3 WLAN 11.3.5.19 no vap inter-ap-blocking block gratuitous arp Description This command allows the forwarding of gratuitous ARP packets. Note The command is only available when the following requirements are met: ● Access point mode ● The SCALANCE W700 device is equipped with one of the following KEY-PLUGs: –...
  • Page 544: No Vap Inter-Ap-Blocking Block Non-Ip-Traffic

    Security and authentication 11.3 WLAN Requirement You are in the Interface Configuration mode of the VAP interface. The command prompt is as follows: cli (config-if-vapX-0-Y)# Syntax Call the command without parameters: vap inter-ap-blocking block non-ip-traffic Result There is no exchange of non-IP packets, for example layer 2 packets between the client and the SCALANCE W700 devices configured on the access point as permitted communications partners.
  • Page 545: Mac Access Control List

    Security and authentication 11.4 MAC access control list Result Non-IP packets can also be exchanged between the client and the SCALANCE W700 devices configured on the access point as permitted communications partners. 11.4 MAC access control list This section describes commands for working with MAC access control lists. 11.4.1 The "show"...
  • Page 546: Show Interface Access Lists

    Security and authentication 11.4 MAC access control list Result The configuration of the access control lists is displayed. 11.4.1.2 show interface access lists Description This command shows the access control list of one or all interfaces. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 547: Mac Access-List Extended

    Security and authentication 11.4 MAC access control list Commands relating to other topics that can be called in the Global configuration mode can be found in the relevant sections. You exit the Global configuration mode with the end or exit command and are then in the Privileged EXEC mode again.
  • Page 548: No Mac Access-List Extended

    Security and authentication 11.4 MAC access control list 11.4.2.2 no mac access-list extended Description With this command, you delete a MAC access control list. Requirement You are in the Global configuration mode. The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: no mac access-list extended<short(1-20)>...
  • Page 549: Mac Access-Group

    Security and authentication 11.4 MAC access control list 11.4.3.1 mac access-group Description With this command, you enable the access control of the packets of an interface. Requirement ● A MAC access control list has been created. ● You are in the Interface configuration mode. The command prompt is: cli(config-if-$$$)# Syntax...
  • Page 550: Commands In The Mac Acl Configuration Mode

    Security and authentication 11.4 MAC access control list Requirement You are in the Interface configuration mode. The command prompt is as follows: cli(config-if-$$$)# Syntax Call up the command with the following parameters: no mac access-group <access-list-number(1-20)>{in|out} The parameters have the following meaning: Parameter Description Range of values / note...
  • Page 551: Permit

    Security and authentication 11.4 MAC access control list 11.4.4.1 permit Description With this command, you configure a MAC address control list that describes the MAC addresses for which incoming and/or outgoing data traffic is permitted. The access control list contains only one entry. If you want to lock or permit further addresses, create a new access control list.
  • Page 552: Deny

    Security and authentication 11.4 MAC access control list Note MAC address input Use "any", if the rule is to apply to all src and/or dest MAC addresses. This corresponds to the MAC address "00:00:00:00:00:00". Result The MAC access control list is configured. Further notes You exit the MAC ACL configuration mode with the exit command.
  • Page 553: Ip Access Control List

    Security and authentication 11.5 IP access control list deny {any|host<src-mac-address>}{any|host<dest-mac-address>} The parameters have the following meaning: Parameter Description Range of values / note Keyword for "all" Keyword for the MAC address of an in‐ host coming connection that is locked MAC address of the locked incoming Specify a valid MAC address.
  • Page 554: Show Access-Lists

    Security and authentication 11.5 IP access control list 11.5.1.1 show access-lists Description This command shows the configuration of the access control lists (Access Control List). Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 555: Commands In The Global Configuration Mode

    Security and authentication 11.5 IP access control list Syntax Call up the command with the following parameters: show interface access-lists [{<interface-type><interface-id>|vlan <vlan-id(1-4094)>}] The parameters have the following meaning: Parameter Description Range of values / note Type or speed of the interface Enter a valid interface.
  • Page 556: No Ip Access-List

    Security and authentication 11.5 IP access control list Syntax Call up the command with the following parameters: ip access-list standard<access-list-number(1-20)> The parameters have the following meaning: Parameter Description Range of values / note Specifies that a standard access control standard list is generated Number of the standard access control 1 ...
  • Page 557: Commands In The Interface Configuration Mode

    Security and authentication 11.5 IP access control list The parameters have the following meaning: Parameter Description Range of values / note Specifies that a standard access control standard list is generated Number of the standard access control 1 ... 20 access-list- list number...
  • Page 558: No Ip Access-Group

    Security and authentication 11.5 IP access control list Syntax Call up the command with the following parameters: ip access-group <access-list-number(1-20)> {in|out} The parameters have the following meaning: Parameter Description Range of values / note Number of the access control list 1 ...
  • Page 559: Commands In The Interface Configuration Mode Vlan

    Security and authentication 11.5 IP access control list Syntax Call up the command with the following parameters: no ip access-group [<access-list-number(1-20)>]{in|out} The parameters have the following meaning: Parameter Description Range of values / note Number of the access control list 1 ...
  • Page 560: Ip Access-Group

    Security and authentication 11.5 IP access control list 11.5.4.1 ip access-group Description With this command, you enable the access control of the packets of a VLAN. Note The ACL rule applies to all ports that belong to the VLAN. Requirement ●...
  • Page 561: No Ip Access-Group

    Security and authentication 11.5 IP access control list 11.5.4.2 no ip access-group Description With this command, you disable the access control of the packets of a VLAN. Requirement You are in the Interface configuration mode of VLAN. The command prompt is as follows: cli(config-if-vlan-$$$)# Syntax Call up the command with the following parameters:...
  • Page 562: Permit

    Security and authentication 11.5 IP access control list In the Global configuration mode, enter the ip access-list standard <acl-num> command, to change to the configuration mode for this ACL. If an ACL with the specified number does not exist, an ACL with the corresponding number is created. Note You can display existing access control lists with the show access-lists command.
  • Page 563 Security and authentication 11.5 IP access control list permit {any | host <src-ip-address> | <network-src-ip> <mask> } [ { any | host <dest-ip-address> | <network-dest-ip> <mask> } ] The parameters have the following meaning: Parameter Description Range of values / note Allows all protocol types Keyword for the protocol type protocol-type...
  • Page 564: Deny

    Security and authentication 11.5 IP access control list 11.5.5.2 deny Description With this command, you configure an IP access control list. The IP ACL contains a description of the IP addresses for which the incoming and outgoing frames will not be forwarded. You have the following options: ●...
  • Page 565: Permit Icmp

    Security and authentication 11.5 IP access control list Parameter Description Range of values / note Source IP address Enter a valid IP address. src-ip-address Network source address Enter a valid combination of IPv4 src-ip-address address and subnet mask. Corresponding subnet mask mask Blocks all outgoing frames Keyword for a an individual IPv4 ad‐...
  • Page 566 Security and authentication 11.5 IP access control list You have the following options: ● All incoming and/or outgoing ICMP messages are forwarded. ● Incoming and/or outgoing ICMP messages of a specific host are forwarded. ● Incoming and/or outgoing ICMP messages of hosts of a specific subnet are forwarded. Note Processing order of the lists The access control lists are processed on the interface in the order in which they were created.
  • Page 567: Deny Icmp

    Security and authentication 11.5 IP access control list Result The IP access control list for ICMP messages has been configured. Note Subnet mask for individual hosts If you create the rule for a single system (one IPv4 address), specify the subnet mask "255.255.255.255".
  • Page 568 Security and authentication 11.5 IP access control list Syntax Call up the command with the following parameters: deny icmp {any | host <src-ip-address> | <src-ip-address> <src- mask>} [{any | host <dest-ip-address> | dest-ip-address> <dest- mask>}] [<message-type type(0-255)>] [<message-code code(0-255)>] The parameters have the following meaning: Parameter Description Range of values / note...
  • Page 569: Permit Tcp

    Security and authentication 11.5 IP access control list You display the configuration of the access control list with the show access-lists command. 11.5.5.5 permit tcp Description With this command, you configure an IP access control list for the TCP protocol. You have the following options: ●...
  • Page 570 Security and authentication 11.5 IP access control list Parameter Description Range of values / note Source IPv4 address Enter a valid IPv4 address. src-ip-address Network source address Enter a valid combination of IPv4 src-ip-address address and subnet mask. Corresponding subnet mask src-mask src-port-number Port number...
  • Page 571: Deny Tcp

    Security and authentication 11.5 IP access control list 11.5.5.6 deny tcp Description With this command, you configure an IP access control list for the TCP protocol. You have the following options: ● All incoming and/or outgoing TCP segments are not forwarded. ●...
  • Page 572 Security and authentication 11.5 IP access control list Parameter Description Range of values / note src-port-number Port number 1 ... 65535 port-number Keyword for port numbers higher than the specified number (gt: greater than). Keyword for port numbers lower than the specified number (lt: less than).
  • Page 573: Permit Udp

    Security and authentication 11.5 IP access control list 11.5.5.7 permit udp Description With this command, you configure an IP access control list for the UDP protocol. You have the following options: ● All incoming and/or outgoing UDP datagrams are forwarded. ●...
  • Page 574 Security and authentication 11.5 IP access control list Parameter Description Range of values / note Source port number 1 ... 65535 src-port-number Destination port number dest-port-number Keyword for port numbers higher than the specified number (gt: greater than). Keyword for port numbers lower than the specified number (lt: less than).
  • Page 575: Deny Udp

    Security and authentication 11.5 IP access control list 11.5.5.8 deny udp Description With this command, you configure an IP access control list for the UDP protocol. You have the following options: ● All incoming and/or outgoing UDP datagrams are not forwarded. ●...
  • Page 576 Security and authentication 11.5 IP access control list Parameter Description Range of values / note Source port number 1 ... 65535 src-port-number Destination port number dest-port-number Keyword for port numbers higher than the specified number (gt: greater than). Keyword for port numbers lower than the specified number (lt: less than).
  • Page 577: Management Access Control List

    Security and authentication 11.6 Management Access Control List 11.6 Management Access Control List This section describes the commands relevant for working with the management access control list. 11.6.1 The "show" commands This section describes commands with which you display various settings. 11.6.1.1 show authorized-managers Description...
  • Page 578: Commands In The Global Configuration Mode

    Security and authentication 11.6 Management Access Control List 11.6.2 Commands in the global configuration mode This section describes commands that you can call up in the Global configuration mode. In Privileged EXEC mode, enter the configure terminal command to change to this mode. Commands relating to other topics that can be called in the Global configuration mode can be found in the relevant sections.
  • Page 579: No Authorized-Manager Ip-Source

    Security and authentication 11.6 Management Access Control List Parameter Description Range of values / note Number of a VLAN or VLAN range enter a valid VLAN or VLAN a,b or a-b range or a,b,c-d Specifies the services for which the manager is ●...
  • Page 580 Security and authentication 11.6 Management Access Control List The command prompt is as follows: cli(config)# Syntax Call up the command with the following parameters: no authorized-manager ip-source <ip-address> [{<subnet-mask>|/<prefix-length(0-32)>}] The parameters have the following meaning: Parameter Description Range of values / note Specifies the network or the IP address Enter a valid IP address or a net‐...
  • Page 581: Diagnostics

    Diagnostics The monitoring of the system and error diagnostics are handled in different ways: ● Events and faults handling: Predefined events generate a message. These messages can be distributed in different ways: – Entry in the local log – Transfer to the Syslog server –...
  • Page 582: Show Events Config

    Diagnostics 12.1 Diagnostics cli> or cli# Syntax Call the command without parameters: show authlog Call up the command with the following parameters: show authlog [{ info | warning | critical }] The parameters have the following meaning: Parameter Description All log entries of the category "Information" are displayed. info All log entries of the category "Warning"...
  • Page 583: Show Events Severity

    Diagnostics 12.1 Diagnostics 12.1.1.3 show events severity Description This command shows the degree of severity of an event ("Info", "Warning" or "Critical") starting at which a notification (sending of an e-mail, entry in the Syslog table, entry in the Syslog file) is generated.
  • Page 584: Show Events Faults Status

    Diagnostics 12.1 Diagnostics Syntax Call up the command with the following parameters: show events faults config [{power|link}] The parameters have the following meaning: Parameter Description Monitoring of the power supply for power outage. power Monitoring of the network connections for a change in the connection sta‐ link tus.
  • Page 585: Show Logbook

    Diagnostics 12.1 Diagnostics Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli> or cli# Syntax Call the command without parameters: show events fault counter Result The number of indicated faults is displayed. 12.1.1.7 show logbook Description...
  • Page 586: Show Power-Line-State

    Diagnostics 12.1 Diagnostics Result The content of the logbook is displayed. 12.1.1.8 show power-line-state Description This command shows the status of the power supply. Requirement You are in the User EXEC mode or in the Privileged EXEC mode. The command prompt is as follows: cli>...
  • Page 587: Clear Authlog

    Diagnostics 12.1 Diagnostics The parameters have the following meaning: Parameter Description Range of val‐ ues / note Keyword for the rmon statistics to be investigated. statistics stats-index Index number for the statistical values 1 ... 65535 If you enter the command without parameters, the display shows whether rmon is enabled or disabled.
  • Page 588: Fault Report Ack

    Diagnostics 12.1 Diagnostics Requirement You are in the Privileged EXEC mode. The command prompt is as follows: cli# Syntax Call the command without parameters: clear logbook Result The content of the logbook is deleted. 12.1.4 fault report ack Description With this command, you acknowledge (delete) the messages of the "Cold/Warm start" event. Requirement You are in the Privileged EXEC mode.
  • Page 589: Commands In The Global Configuration Mode

    Diagnostics 12.1 Diagnostics 12.1.5 Commands in the global configuration mode This section describes commands that you can call up in the Global configuration mode. In Privileged EXEC mode, enter the configure terminal command to change to this mode. Commands relating to other topics that can be called in the Global configuration mode can be found in the relevant sections.
  • Page 590: Add Log

    Diagnostics 12.1 Diagnostics Commands relating to other topics that can be called in the Global configuration mode can be found in the relevant sections. ● If you exit the EVENTS configuration mode with the exit command, you return to the Global configuration mode.
  • Page 591: No Client Config

    Diagnostics 12.1 Diagnostics Requirement You are in the EVENTS Configuration mode. The command prompt is as follows: cli(config-events)# Syntax Call up the command with the following parameters: client config {syslog|trap|email|all} The parameters have the following meaning: Parameter Description Enables the client that sends the messages to the Syslog server syslog Enables the client that sends the SNMP traps trap...
  • Page 592: Event Config

    Diagnostics 12.1 Diagnostics The parameters have the following meaning: Parameter Description Disables the client that sends the messages to the Syslog server syslog Disables the client that sends the SNMP traps trap Disables the client that sends the e-mails email Disables all clients at once Result The client selected for the transfer is disabled.
  • Page 593 Diagnostics 12.1 Diagnostics ● Sending an e-mail ● Sending an SNMP trap ● Lighting up of the error LED Requirement You are in the EVENTS Configuration mode. The command prompt is as follows: cli(config-events)# Syntax Call up the command with the following parameters: event config {cold-warmstart | linkchange | authentication-failure | power-change | faultstate-change | stp-change | overlap-ap | wds | dfs | wlan-general | ipcf-cycle-time | ipcf-poll-size |all}...
  • Page 594: No Event Config

    Diagnostics 12.1 Diagnostics Parameter Description Client that sends the e-mails email Client that sends the SNMP traps trap The device triggers an error. The error LED lights up. faults All clients at once Result The setting deciding which message of the device is stored or forwarded is configured. Further notes You display the status of the events and the clients with the show events config command.
  • Page 595 Diagnostics 12.1 Diagnostics | wds | dfs | wlan-general | ipcf-cycle-time | ipcf-poll-size |all} {logtable | syslog | email | trap | faults | all} The parameters have the following meaning: Parameter Description Message if there is cold or warm restart cold-warmstart Message when there is a status change on a physical interface linkchange...
  • Page 596: Link

    Diagnostics 12.1 Diagnostics 12.1.6.6 link Description With this command, you configure and enable the monitoring of the physical network connections for cable breaks or for pulling of the connector. Requirement You are in the EVENTS Configuration mode. The command prompt is as follows: cli(config-events)# Syntax Call up the command with the following parameters:...
  • Page 597: Power

    Diagnostics 12.1 Diagnostics cli(config-events)# Syntax Call up the command with the following parameters: no link {up|down} The parameters have the following meaning: Parameters Description Range of values / note The message when establishing a connection is dis‐ abled The message when a connection is down is disabled - down Result The settings for monitoring the physical network connections have been configured.
  • Page 598: No Power

    Diagnostics 12.1 Diagnostics The parameters have the following meaning: Parameter Description Monitoring of power supply 1 Monitoring of power supply 2 Monitoring of the PoE power supply If you do not select any parameters from the parameter list, the default value "L1 and L2" is used.
  • Page 599: Power Pnio Redundancy

    Diagnostics 12.1 Diagnostics The parameters have the following meaning: Parameter Description No monitoring of power supply 1 No monitoring of power supply 2 No monitoring of the PoE power supply. If you do not select any parameters from the parameter list, the default value "L1 and L2" is used.
  • Page 600: Send Test Mail

    Diagnostics 12.1 Diagnostics The parameters have the following meaning: Parameter Description Monitoring of all power supply connectors by PROFINET. Monitoring of the power supply connectors L1 and L2 by PROFINET. l1-l2 Monitoring of the power supply connectors L1 and PoE by PROFINET. l1-poe Monitoring of the power supply connectors L2 and PoE by PROFINET.
  • Page 601: Severity

    Diagnostics 12.1 Diagnostics 12.1.6.12 severity Description With this command, you configure the threshold values for the sending of system event notifications. Requirement You are in the EVENTS Configuration mode. The command prompt is as follows: cli (config-events) # Syntax Call up the command with the following parameters: severity { mail | log | syslog | authlog } { info | warning | critical } The parameters have the following meaning:...
  • Page 602: No Severity

    Diagnostics 12.1 Diagnostics 12.1.6.13 no severity Description With this command, you disable the setting for the threshold values for the sending of system event notifications. Requirement You are in the EVENTS Configuration mode. The command prompt is as follows: cli (config-events) # Syntax Call up the command with the following parameters: no severity { mail | log | syslog | authlog }...
  • Page 603: 12.2 Syslog Client

    Diagnostics 12.2 Syslog client 12.2 Syslog client With the commands in this section, the following settings are configured: ● Transfer of the messages to the Syslog server ● Local buffering and storage of messages ● Receipt and forwarding of messages from other devices (relay mode) 12.2.1 The "show"...
  • Page 604: Syslogserver

    Diagnostics 12.2 Syslog client Commands relating to other topics that can be called in the Global configuration mode can be found in the relevant sections. ● If you exit the EVENTS configuration mode with the exit command, you return to the Global configuration mode.
  • Page 605: No Syslogserver

    Diagnostics 12.2 Syslog client Result The settings for the Syslog server are configured. The Syslog server was entered in the table. Further notes You delete the entry with the no syslogserver command. You can display the status of this function and other information with the show events config command.
  • Page 606 Diagnostics 12.2 Syslog client Result The Syslog server is deleted. Further notes You add a Syslog server with the syslogserver command. SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface Configuration Manual, 09/2017, C79000-G8976-C324-08...
  • Page 607: Index

    Index wds partner mac, wds partner wds id, wlan alternative channel, wlan beacon interval, Access Point wlan channel, dest-addr, 274 wlan data rate-11abg, force roaming ip-down, 208 wlan data rate-11n, interval, 276 wlan data rates-11abg selected only, lost, 275 wlan data rates-11n selected only, no force roaming ip-down, 209 wlan dtim, no port, 278...
  • Page 608 Index alias, 75 show wlan ssid-table, 199 no alias, 75 wlan any ssid, 224 allowed address, 538 wlan background scan interval, 226 no allowed address, 539 wlan background scan mode, 226 authorized-manager ip-source, 578 wlan background scan threshold, 227 no authorized-manager ip-source, 579 wlan client mac address, 231 auto-save, 104 wlan client mac mode, 230...
  • Page 609 Index ip domain used server, 352 ip echo-reply, 347 no ip echo-reply, 348 ip http, 443 enable, 62 no ip http, 444 ethernetip, 67 ip ipv6 neighbor event config, 592 no ipv6 neighbor, 363 no event config, 594 ip name server, 353 events, 589 no ip name server, 354 exit, 39...
  • Page 610 Index option value-string, 399 no option, 400 mac access-group, 549 no mac access-group, 549 mac access-list extended, 547 password, 96 no mac access-list extended, 548 no password, 97 mac-address-table aging, 285 password policy, 486 no mac-address-table aging, 286 permit, 551, 562 mac-address-table aging-time, 452 permit icmp, 565 mgmt vlan, 289...
  • Page 611 Index show allowed addresses, 498 show loadsave files, 85 show authlog, 581 show loadsave tftp, 85 show authorized-managers, 577 show logbook, 585 show cli-console-timeout, 49 show mac-address-table, 280 show coordinates, 50 show mac-address-table aging-status, 452 show dcp forwarding, 341 show mac-address-table aging-time, 451 show dcp server, 342 show mac-address-table count, 282 show device information, 50...
  • Page 612 Index show versions, 58 snmp engineid migrate, 419 show vlan, 282 snmp filterprofile, 421 show vlan device info, 283 snmp group, 423 show vlan learning params, 284 no snmp group, 424 show vlan port config, 284 snmp notify, 424 show web-session-timeout, 114 no snmp notify, 425 show wlan advanced, 185 snmp targetaddr, 426...
  • Page 613 Index ssh-server, 448 vap communication with allowed-addresses no ssh-server, 448 only, 540 static-lease, 404 no vap communication with allowed-addresses no static-lease, 405 only, 541 Subnet mask, 34 vap communication with ethernet, 537 switchport acceptable-frame-type, 290 no vap communication with ethernet, 537 switchport access vlan, 291 vap communication with other-vaps, 535 no switchport access vlan, 292...
  • Page 614 Index wlan antenna gain-5GHz, 221 wlan iprp interface, 149 wlan antenna mode, 223 no wlan iprp interface, 150 wlan antenna type, 222 wlan iprp network, 151 wlan any ssid, 224 no wlan iprp network, 152 no wlan any ssid, 225 wlan max tx-power, 255 wlan background scan interval, 226 wlan min-ap-signal-strength, 247...
  • Page 615 Index write startup-config, 103 SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface Configuration Manual, 09/2017, C79000-G8976-C324-08...
  • Page 616 Index SCALANCE W770/W730 acc. to IEEE 802.11n Command Line Interface Configuration Manual, 09/2017, C79000-G8976-C324-08...

Table of Contents