Printronix Network Interface Card Network Card User Manual


 
Chapter 15 Complete Command List
308
WLAN
ADAPTER,
WLAN
Defines the authentication scheme:
store ifc <ifnum> wlan auth <auth-method>
(eg. open, shared, leap, kerb)
“Open” system authentication allows all devices that have the
authentication algorithm number for open system to
authenticate.
“Shared” key authentication involves a four step process using
secure or encrypted text by means of WEP.
“Leap” is to enable/disable LEAP operation.
“Kerb” is for Kerberos.
WLAN
ADAPTER,
WLAN
Define a auth-user-name to be used in the LEAP operation:
store ifc <ifnum> wlan user <auth-user-name>J/F3 1 Tf9.96 0 0 9.96 243 ( a4“)-6.6 9•rn8( a)-1228(u)-0.1(th-)6228(u)-0.1scmeen the usn a be e(te)-12.2(r)5.8(e)-122(du)-0.1 .96c0 nu
the LEPEiceusis(.)]TJ/F2 1 Tf11.5355 0 0 12 190.8 0-6.64 Tm-0.0077 Tc0 Tw[(WLA)6.9(N)]TJ-2.0805 -1.17 TD-0.0146 Tc[(AD)-10.4(AP)-13.4(T)-7(E)-3(R,)]TJ2.0805 -1.17 TD-0.0077 Tc[(WLA)6.9(N)]TJ/F3 1 Tf9.96 0 0 9.96 243 0-6.64 Tm-0.0017 Tc0.0008 Tw[(Defi)-864(ne)-28( a au)-21(th-)61(p-0.1 a)-12(s)4.3(s)-7.7wnforu(s)-7.7ednthn APA( one)-28rtion: