You are here: Home > CLI Commands > Just_CLI_Topics > ap wifi-uplink-profile

ap wifi-uplink-profile

ap wifi-uplink-profile {default | <profile-name>}

allowed band {a | g | all}

bssid <bssid>

clone {default | <source> }

essid <essid>

no

opmode {opensystem | personal | static-wep}

wepkey1 <wepkey1>

wepkey2 <wepkey2>

wepkey3 <wepkey3>

wepkey4 <wepkey4>

weptxkey <weptxkey>

wpa-hexkey <wpa-hexkey>

wpa-passphrase <wpa-passphrase>

Description

This command configures a Wi-FiWi-Fi is a technology that allows electronic devices to connect to a WLAN network, mainly using the 2.4 GHz and 5 GHz radio bands. Wi-Fi can apply to products that use any 802.11 standard. uplink profile.

Syntax

Parameter

Description

Default

ap wifi-uplink-profile

<profile-name>

Name of this instance of the profile. The name must be 1–63 characters.

default

allowed band {a | g | all}

The radio bandBand refers to a specified range of frequencies of electromagnetic radiation.(s) on which the Wi-FiWi-Fi is a technology that allows electronic devices to connect to a WLAN network, mainly using the 2.4 GHz and 5 GHz radio bands. Wi-Fi can apply to products that use any 802.11 standard. uplink is used. Select one of the following options:

a: 802.11a802.11a provides specifications for wireless systems. Networks using 802.11a operate at radio frequencies in the 5 GHz band. The specification uses a modulation scheme known as orthogonal frequency-division multiplexing (OFDM) that is especially well suited to use in office settings. The maximum data transfer rate is 54 Mbps. bandBand refers to a specified range of frequencies of electromagnetic radiation. only (5 Ghz)

g: 802.11g802.11g offers transmission over relatively short distances at up to 54 Mbps, compared with the 11 Mbps theoretical maximum of 802.11b standard. 802.11g employs Orthogonal Frequency Division Multiplexing (OFDM), the modulation scheme used in 802.11a, to obtain higher data speed. Computers or terminals set up for 802.11g can fall back to speed of 11 Mbps, so that 802.11b and 802.11g devices can be compatible within a single network. bandBand refers to a specified range of frequencies of electromagnetic radiation. only (2.4 Ghz)

all: Both 802.11a802.11a provides specifications for wireless systems. Networks using 802.11a operate at radio frequencies in the 5 GHz band. The specification uses a modulation scheme known as orthogonal frequency-division multiplexing (OFDM) that is especially well suited to use in office settings. The maximum data transfer rate is 54 Mbps. and 802.11g802.11g offers transmission over relatively short distances at up to 54 Mbps, compared with the 11 Mbps theoretical maximum of 802.11b standard. 802.11g employs Orthogonal Frequency Division Multiplexing (OFDM), the modulation scheme used in 802.11a, to obtain higher data speed. Computers or terminals set up for 802.11g can fall back to speed of 11 Mbps, so that 802.11b and 802.11g devices can be compatible within a single network. bandsBand refers to a specified range of frequencies of electromagnetic radiation. (5 GHzGigahertz. and 2.4 GHzGigahertz.)

all

bssid <bssid>

Name of the required BSSIDBasic Service Set Identifier. The BSSID identifies a particular BSS within an area. In infrastructure BSS networks, the BSSID is the MAC address of the AP. In independent BSS or ad hoc networks, the BSSID is generated randomly. to which the client is associated.

clone

Copies data from another Wi-FiWi-Fi is a technology that allows electronic devices to connect to a WLAN network, mainly using the 2.4 GHz and 5 GHz radio bands. Wi-Fi can apply to products that use any 802.11 standard. uplink profile.

essid <essid>

Name of the required ESSIDExtended Service Set Identifier. ESSID refers to the ID used for identifying an extended service set. to which the client is associated.

no

Negates any configured parameter.

opmode

Name of the data encryption mode. Select one of the following modes:

opensystem— No authentication or encryption.

personal— A wildcard mode that matches several PSKPre-shared key. A unique shared secret that was previously shared between two parties by using a secure channel. This is used with WPA security, which requires the owner of a network to provide a passphrase to users for network access. mode key management suites and cipher suites, including WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption.-PSKPre-shared key. A unique shared secret that was previously shared between two parties by using a secure channel. This is used with WPA security, which requires the owner of a network to provide a passphrase to users for network access. -TKIPTemporal Key Integrity Protocol. A part of the WPA encryption standard for wireless networks. TKIP is the next-generation Wired Equivalent Privacy (WEP) that provides per-packet key mixing to address the flaws encountered in the WEP standard., WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption.-PSKPre-shared key. A unique shared secret that was previously shared between two parties by using a secure channel. This is used with WPA security, which requires the owner of a network to provide a passphrase to users for network access. -AESAdvanced Encryption Standard. AES is an encryption standard used for encrypting and protecting electronic data. The AES encrypts and decrypts data in blocks of 128 bits (16 bytes), and can use keys of 128 bits, 192 bits, and 256 bits., WPA2Wi-Fi Protected Access 2. WPA2 is a certification program maintained by IEEE that oversees standards for security over wireless networks. WPA2 supports IEEE 802.1X/EAP authentication or PSK technology, but includes advanced encryption mechanism using CCMP that is referred to as AES.-PSKPre-shared key. A unique shared secret that was previously shared between two parties by using a secure channel. This is used with WPA security, which requires the owner of a network to provide a passphrase to users for network access. -TKIPTemporal Key Integrity Protocol. A part of the WPA encryption standard for wireless networks. TKIP is the next-generation Wired Equivalent Privacy (WEP) that provides per-packet key mixing to address the flaws encountered in the WEP standard. and WPA2Wi-Fi Protected Access 2. WPA2 is a certification program maintained by IEEE that oversees standards for security over wireless networks. WPA2 supports IEEE 802.1X/EAP authentication or PSK technology, but includes advanced encryption mechanism using CCMP that is referred to as AES.-PSKPre-shared key. A unique shared secret that was previously shared between two parties by using a secure channel. This is used with WPA security, which requires the owner of a network to provide a passphrase to users for network access. -AESAdvanced Encryption Standard. AES is an encryption standard used for encrypting and protecting electronic data. The AES encrypts and decrypts data in blocks of 128 bits (16 bytes), and can use keys of 128 bits, 192 bits, and 256 bits..

static-wep— WEPWired Equivalent Privacy. WEP is a security protocol that is specified in 802.11b and is designed to provide a WLAN with a level of security and privacy comparable to what is usually expected of a wired LAN. with static keys.

opensystem

wepkey1 <wepkey1>

The first static WEPWired Equivalent Privacy. WEP is a security protocol that is specified in 802.11b and is designed to provide a WLAN with a level of security and privacy comparable to what is usually expected of a wired LAN. key associated with the key index. Can be 10 or 26 hex characters in length.

wepkey2 <wepkey2>

The second static WEPWired Equivalent Privacy. WEP is a security protocol that is specified in 802.11b and is designed to provide a WLAN with a level of security and privacy comparable to what is usually expected of a wired LAN. key associated with the key index. Can be 10 or 26 hex characters in length.

wepkey3 <wepkey3>

The third static WEPWired Equivalent Privacy. WEP is a security protocol that is specified in 802.11b and is designed to provide a WLAN with a level of security and privacy comparable to what is usually expected of a wired LAN. key associated with the key index. Can be 10 or 26 hex characters in length.

wepkey4 <wepkey4>

The fourth static WEPWired Equivalent Privacy. WEP is a security protocol that is specified in 802.11b and is designed to provide a WLAN with a level of security and privacy comparable to what is usually expected of a wired LAN. key associated with the key index. Can be 10 or 26 hex characters in length.

weptxkey <weptxkey>

The key index to specify which static WEPWired Equivalent Privacy. WEP is a security protocol that is specified in 802.11b and is designed to provide a WLAN with a level of security and privacy comparable to what is usually expected of a wired LAN. key is to be used. Can be 1, 2, 3, or 4.

1

wpa-hexkey <wpa-hexkey>

The WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. Pre-Shared Key (PSKPre-shared key. A unique shared secret that was previously shared between two parties by using a secure channel. This is used with WPA security, which requires the owner of a network to provide a passphrase to users for network access. ). This key must be of 64 hexadecimal characters.

wpa-passphrase <wpa-passphrase>

The WPAWi-Fi Protected Access. WPA is an interoperable wireless security specification subset of the IEEE 802.11 standard. This standard provides authentication capabilities and uses TKIP for data encryption. password that generates the PSKPre-shared key. A unique shared secret that was previously shared between two parties by using a secure channel. This is used with WPA security, which requires the owner of a network to provide a passphrase to users for network access. . The passphrase must be between 8–63 characters, inclusive

 

When both wpa-hexkey and wpa-passphrase parameters are configured, wpa-hexkey takes precedence.

Example

The following commands create a Wi-FiWi-Fi is a technology that allows electronic devices to connect to a WLAN network, mainly using the 2.4 GHz and 5 GHz radio bands. Wi-Fi can apply to products that use any 802.11 standard. uplink profile:

(host)[mynode](config)# ap wifi-uplink-profile test-uplink

(host)[mynode](WiFi uplink profile "test-uplink")# essid uplink-new

(host)[mynode](WiFi uplink profile "test-uplink")# wpa-passphrase ********

(host)[mynode](WiFi uplink profile "test-uplink")# opmode personal

(host)[mynode](WiFi uplink profile "test-uplink")# exit

Command History

Release

Modification

ArubaOS 8.5.0.0

Command introduced.

Command Information

Platforms

License

Command Mode

All platforms

Base operating system, except for noted parameters.

Config mode on Mobility Master.

/*]]>*/