WLAN
Wireless LAN (WLAN) is a technology based on the IEEE 802.11 standard that operates at the physical and data link layers of the OSI model which allows the connection of wireless devices. In OSDX, the WLAN configuration is defined by two elements, Controllers and Interfaces. Controllers model the physical related characteristics of the wireless link while interfaces focus on the logical ones.
Regulatory domains
A regulatory domain defines a set of restrictions applicable to WLAN capable devices. Due to the existing regulations, all OSDX WLAN capable devices are shipped with predefined regulatory domain that cannot be changed through of configuration. The following table shows all the regulatory domains supported by OSDX devices.
Regulatory domain |
Default country |
Description |
---|---|---|
|
|
European Telecommunications Standards Institute |
|
|
Federal Communications Commission |
|
|
Norma Oficial Mexicana |
|
|
Rest of the world |
Note that, for each domain there is a default country. Use the following table to find out the regulatory domain present in your target country.
Country list:
Country code |
Country name |
Regulatory domain |
---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Controllers
Physical-related parameters and common interface ones are configured by mean of the WLAN controllers. All WLAN controllers are pre-allocated during boot-up, meaning the creation and deletion actions are not supported. Depending on the characteristics of the associated radio module, some parameters will only accept a specific set values. OSDX provides a command that lists all the relevant information from the CLI.
admin@Kaio$ controllers wlan show capabilities
Phy: wifi0
modes: 802.11ax,802.11g,802.11n
stations: 512
bandwidths: 20MHz,40MHz
bands: 2.4GHz
tx-power: 11,10,13,12,15,14,17,16,19,18,5,8,7,6,9,20
vht-capabilities: [SU-BEAMFORMEE][RXLDPC][BF-ANTENNA-4][TX-STBC-2BY1][MU-BEAMFORMER][SOUNDING-DIMENSION-4][SU-BEAMFORMER][MAX-MPDU-11454][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN][RX-STBC-1][MAX-A-MPDU-LEN-EXP7]
supported-channels: 11,10,13,12,14,1,3,2,5,4,7,6,9,8
vaps: 16
spatial-streams: 1,3,2,4
ht-capabilities: [DSSS_CCK-40][LDPC][TX-STBC][MAX-AMSDU-7935][RX-STBC1][SMPS-DYNAMIC]
max-tx-power: 20
Phy: wifi1
modes: 802.11a,802.11ax,802.11ac,802.11n
stations: 512
bandwidths: 20MHz,80MHz,40MHz
bands: 5GHz
tx-power: 11,10,13,12,15,14,17,16,19,18,22,21,5,8,7,6,9,20,23
vht-capabilities: [SU-BEAMFORMEE][RXLDPC][TX-STBC-2BY1][MU-BEAMFORMER][SOUNDING-DIMENSION-4][SU-BEAMFORMER][MAX-MPDU-11454][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN][RX-STBC-1][MAX-A-MPDU-LEN-EXP7]
supported-channels: 153,157,60,132,116,64,136,112,177,173,48,44,40,144,140,149,120,108,124,169,128,165,100,161,104,56,36,52
vaps: 16
spatial-streams: 1,3,2,4
ht-capabilities: [DSSS_CCK-40][LDPC][TX-STBC][MAX-AMSDU-7935][RX-STBC1][SMPS-DYNAMIC]
max-tx-power: 23
Default values may apply if a parameter is not configured.
Warning
Note that, regardless of the default values, at least one controller
parameter must
be set to consider the configuration valid.
Wlan Channels
Channel selection depends on several factors: regulatory domain
, band
and bandwidth
. The following tables can be used
to know which channels will be available on the selected band. Note that depending on the configured bandwidth
, some channels
will not be available since some of the frequencies could fall out of the spectrum.
Frequency |
Channel |
Regulatory Domains |
---|---|---|
2412 |
1 |
|
2417 |
2 |
|
2422 |
3 |
|
2427 |
4 |
|
2432 |
5 |
|
2437 |
6 |
|
2442 |
7 |
|
2447 |
8 |
|
2452 |
9 |
|
2457 |
10 |
|
2462 |
11 |
|
2467 |
12 |
|
2472 |
13 |
|
2484 |
14 |
|
Frequency |
Channel |
Installation |
CAC |
Regulatory domains |
---|---|---|---|---|
5180 |
36 |
indoor ( |
|
|
5200 |
40 |
indoor ( |
|
|
5220 |
44 |
indoor ( |
|
|
5240 |
48 |
indoor ( |
|
|
5260 |
52 |
indoor ( |
1 min |
|
5280 |
56 |
indoor ( |
1 min |
|
5300 |
60 |
indoor ( |
1 min |
|
5320 |
64 |
indoor ( |
1 min |
|
5500 |
100 |
indoor/outdoor ( |
1 min |
|
5520 |
104 |
indoor/outdoor ( |
1 min |
|
5540 |
108 |
indoor/outdoor ( |
1 min |
|
5560 |
112 |
indoor/outdoor ( |
1 min |
|
5580 |
116 |
indoor/outdoor ( |
1 min |
|
5600 |
120 |
indoor/outdoor ( |
10 mins |
|
5620 |
124 |
indoor/outdoor ( |
10 mins |
|
5640 |
128 |
indoor/outdoor ( |
10 mins |
|
5660 |
132 |
indoor/outdoor ( |
1 min |
|
5680 |
136 |
indoor/outdoor ( |
1 min |
|
5700 |
140 |
indoor/outdoor ( |
1 min |
|
5720 |
144 |
1 min |
|
|
5745 |
149 |
1 min |
|
|
5765 |
153 |
1 min |
|
|
5785 |
157 |
1 min |
|
|
5805 |
161 |
1 min |
|
|
5825 |
165 |
1 min |
|
Interfaces
Network-specific parameters are configured under the interface wlan
section, with
phy
and type
being mandatory. The maximum number of interfaces allowed depends
on the platform and can be checked using the show capabilities
command
described in the Controllers section.
Router capable devices, like the Teldat M2 and M10 models have pre-allocated
WLAN interfaces that only accept a specific phy
and type
when configured:
Interface |
Phy |
Type |
---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
There are two types
of WLAN interfaces supported by all wireless capable devices:
access-point and station. An additional mode, called monitor, is also
supported by the APs. These three types are described in the following
sections.
Once the device has at least one interface configured on top of a controller, the
status
of the device can be check using the show status
command.
admin@osdx# run controllers wlan show status
Phy: wifi0
Status: up
Band: 2.4GHz
Channel: 13
Bandwidth: 20MHz
Tx-Power: 15dBm
Phy: wifi1
Status: cac (13 seconds remaining)
Access-point
This type implements the infrastructure mode where wireless devices connect to an access-point that forwards the packets between the connected stations and the wired network. Note that the access-point is the center point for all communications (unlike what happens with the ad-hoc mode, where connections between stations are point-to-point).
Security
All OSDX WLAN capable devices support the following security modes for the access-point role:
mode |
akms |
security framework |
unicast ciphers |
pmf |
---|---|---|---|---|
none |
||||
WPA personal |
|
|
|
|
WPA2 personal |
|
|
|
|
WPA/WPA2 personal |
|
|
|
|
WPA3 personal |
|
|
|
pmf required |
WPA2/WPA3 personal |
|
|
|
pmf optional / pmf required ( |
WPA enterprise |
|
|
|
|
WPA2 enterprise |
|
|
|
|
WPA/WPA2 enterprise |
|
|
|
|
WPA3 enterprise |
|
|
|
pmf required |
WPA2/WPA3 enterprise |
|
|
|
pmf optional |
Note that some security modes may call for additional parameters to be configured. On such cases, the CLI will report an error message to inform the user about the problem.
For example, the following lines show how to configure an access-point
interface in
WPA3 personal mode:
set interfaces wlan wlan0 bridge-group bridge br0
set interfaces wlan wlan0 phy wifi1
set interfaces wlan wlan0 type access-point security akm sae
set interfaces wlan wlan0 type access-point security psk-passphrase 1234567890
set interfaces wlan wlan0 type access-point security pairwise-ciphers aes-ccmp
set interfaces wlan wlan0 type access-point security pmf required
set interfaces wlan wlan0 type access-point ssid test_network
Note that the security framework is automatically configured based on the values
set under akm
, pairwise-ciphers
and wpav1 pairwise-ciphers
.
Station
This type implements the station
or client mode where the interface connects to
an access point operating in infrastructure mode to provide connectivity through
the air.
Client mode is configured via networks. A network
is just a set of rules
that is evaluated when looking for a valid target so the first valid one with the
highest priority is used. The network priority is identified by mean of the index
and is evaluated in descending order (1 being the highest priority and 16 the
lowest). This configuration method gives the administrator a lot of flexibility when
working in complex deployments allowing the interface to connect
to different networks based on many conditions.
Warning
Note that only 1 interface in station
mode per radio is supported in OSDX.
The security configuration is almost the same as the one described under the Access-point
section. The only difference is that the owe-transition
mode is not allowed,
since it doesn’t make sense in station
mode. For example, the following
excerpt shows how to configure an interface in station
mode using WPA3 personal
security:
set interfaces wlan wlan0 phy wifi1
set interfaces wlan wlan0 type station network 1 security akm sae
set interfaces wlan wlan0 type station network 1 security pmf required
set interfaces wlan wlan0 type station network 1 security psk-passphrase 1234567890
set interfaces wlan wlan0 type station network 1 ssid test_24ghz
Eap methods MSCHAPv2
, TTL
, TTLS
(with MD5
, MSCHAPv2
and TTL
)
and PEAP
(with MD5
with MSCHAPv2
) are also supported. On the next example,
a station will try to connect to a network with WPA3 Enterprise security using the
TTLS-TTL EAP method (that is, a TTL tunnel with certificates). Make sure the device
has the ca.pem, client.pem and client.key certificates in the
/config/auth/certificates
folder.
set interfaces wlan wlan0 phy wifi0
set interfaces wlan wlan0 type station network 1 security akm cnsa
set interfaces wlan wlan0 type station network 1 security ca-certificate 'running://auth/certificates/ca.pem'
set interfaces wlan wlan0 type station network 1 security client-certificate 'running://auth/certificates/client.pem'
set interfaces wlan wlan0 type station network 1 security client-private-key 'running://auth/certificates/client.key'
set interfaces wlan wlan0 type station network 1 security client-private-password whatever
set interfaces wlan wlan0 type station network 1 security eap-method ttls inner-method tls
set interfaces wlan wlan0 type station network 1 security framework rsn
set interfaces wlan wlan0 type station network 1 security identity user
set interfaces wlan wlan0 type station network 1 security pmf required
set interfaces wlan wlan0 type station network 1 ssid test_radius
Monitor
In monitor
mode, the interface is able to capture the traffic on the configured
channel without being connected to the target network.
Warning
Monitor mode is only supported by the APs. Only 1 interface in monitor
mode
per radio is supported in OSDX.
For example, the following configuration shows how to set an AP to capture the traffic on channel 36 of the 5GHz band.
set controllers wlan installation indoor
set controllers wlan radios wifi1 channel 36
set interfaces wlan wlan0 phy wifi1
set interfaces wlan wlan0 type monitor
The traffic can be later analyzed with the traffic dump
tool with the wlan0
interface as filter.
admin@osdx$ traffic dump monitor interface wlan0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wlan0, link-type IEEE802_11_RADIO (802.11 plus radiotap header), capture size 262144 bytes
03:33:52.448859 8198636505us tsft bad-fcs 12.0 Mb/s 5180 MHz 11a -98dBm signal 0dBm noise antenna 0 unknown 802.11 ctrl frame subtype (5)
03:33:52.466432 8198654122us tsft 6.0 Mb/s 5180 MHz 11a -98dBm signal 0dBm noise antenna 0 Beacon (SSID) [6.0* 9.0 12.0* 18.0 24.0* 36.0 48.0 54.0 Mbit] ESS CH: 36, PRIVACY
03:33:52.467060 8198654767us tsft 6.0 Mb/s 5180 MHz 11a -99dBm signal 0dBm noise antenna 0 Beacon () [6.0* 9.0 12.0* 18.0 24.0* 36.0 48.0 54.0 Mbit] ESS CH: 36, PRIVACY
03:33:52.568841 8198756521us tsft 6.0 Mb/s 5180 MHz 11a -99dBm signal 0dBm noise antenna 0 Beacon (SSID) [6.0* 9.0 12.0* 18.0 24.0* 36.0 48.0 54.0 Mbit] ESS CH: 36, PRIVACY
03:33:52.569468 8198757166us tsft 6.0 Mb/s 5180 MHz 11a -100dBm signal 0dBm noise antenna 0 Beacon () [6.0* 9.0 12.0* 18.0 24.0* 36.0 48.0 54.0 Mbit] ESS CH: 36, PRIVACY
03:33:52.569742 8198757433us tsft 6.0 Mb/s 5180 MHz 11a -99dBm signal 0dBm noise antenna 0 Data IV:ed72 Pad 20 KeyID 1
Examples
Here, you can find different examples of these options.
Command Summary
Configuration commands
controllers wlan radios <txt> auto-channel-selection blocked-channels <txt>
controllers wlan radios <txt> background-scanning sweep-interval <u32>
interfaces wlan <txt> dhcp client fallback <ipv4cidr|ipv6cidr>
interfaces wlan <txt> dhcp client send dhcp-client-identifier
interfaces wlan <txt> dhcp client send dhcp-client-identifier base-mac
interfaces wlan <txt> dhcp client send dhcp-client-identifier serial-number
interfaces wlan <txt> dhcp client send dhcp-client-identifier string <id>
interfaces wlan <txt> dhcp client send vendor-class-identifier
interfaces wlan <txt> dhcp client send vendor-class-identifier string <id>
interfaces wlan <txt> ip igmp last-member-query-interval <u32>
interfaces wlan <txt> ip ospf authentication encrypted-password <password>
interfaces wlan <txt> ip ospf authentication message-digest <id>
interfaces wlan <txt> ip ospf authentication message-digest <id> encrypted-password <password>
interfaces wlan <txt> ip ospf authentication message-digest <id> password <txt>
interfaces wlan <txt> ip rip authentication encrypted-password <password>
interfaces wlan <txt> ip rip authentication message-digest <u32>
interfaces wlan <txt> ip rip authentication message-digest <u32> encrypted-password <password>
interfaces wlan <txt> ip rip authentication message-digest <u32> password <txt>
interfaces wlan <txt> ipv6 address prefix-from-provider <id>
interfaces wlan <txt> ipv6 address prefix-from-provider <id> ifc-ID <ipv6net>
interfaces wlan <txt> ipv6 ospfv3 authentication hmac-sha-256 <u32>
interfaces wlan <txt> ipv6 ospfv3 authentication hmac-sha-256 <u32> encrypted-password <password>
interfaces wlan <txt> ipv6 ospfv3 authentication hmac-sha-256 <u32> password <txt>
interfaces wlan <txt> ipv6 ospfv3 authentication md5 <u32> encrypted-password <password>
interfaces wlan <txt> ipv6 ospfv3 authentication md5 <u32> password <txt>
interfaces wlan <txt> ipv6 ripng split-horizon poison-reverse
interfaces wlan <txt> ipv6 router-advert cur-hop-limit <u32>
interfaces wlan <txt> ipv6 router-advert default-lifetime <u32>
interfaces wlan <txt> ipv6 router-advert default-preference <txt>
interfaces wlan <txt> ipv6 router-advert other-config-flag <txt>
interfaces wlan <txt> ipv6 router-advert prefix <ipv6net> autonomous-flag <txt>
interfaces wlan <txt> ipv6 router-advert prefix <ipv6net> on-link-flag <txt>
interfaces wlan <txt> ipv6 router-advert prefix <ipv6net> preferred-lifetime <u32|id>
interfaces wlan <txt> ipv6 router-advert prefix <ipv6net> valid-lifetime <u32|id>
interfaces wlan <txt> ipv6 router-advert reachable-time <u32>
interfaces wlan <txt> ipv6 router-advert retrans-timer <u32>
interfaces wlan <txt> ipv6 router-advert used-prefixes autonomous-flag <txt>
interfaces wlan <txt> ipv6 router-advert used-prefixes on-link-flag <txt>
interfaces wlan <txt> ipv6 router-advert used-prefixes preferred-lifetime <u32|id>
interfaces wlan <txt> ipv6 router-advert used-prefixes valid-lifetime <u32|id>
interfaces wlan <txt> traffic nat destination rule <u32> address <ipv4|ipv4net|ipv4range|id>
interfaces wlan <txt> traffic nat destination rule <u32> description <txt>
interfaces wlan <txt> traffic nat destination rule <u32> log
interfaces wlan <txt> traffic nat destination rule <u32> log level <txt>
interfaces wlan <txt> traffic nat destination rule <u32> log prefix <txt>
interfaces wlan <txt> traffic nat destination rule <u32> network <ipv4net>
interfaces wlan <txt> traffic nat destination rule <u32> port <u32|id>
interfaces wlan <txt> traffic nat destination rule <u32> protocol <txt>
interfaces wlan <txt> traffic nat destination rule <u32> selector <txt>
interfaces wlan <txt> traffic nat source rule <u32> address <ipv4|ipv4net|ipv4range|id>
interfaces wlan <txt> traffic nat source rule <u32> description <txt>
interfaces wlan <txt> traffic nat source rule <u32> log level <txt>
interfaces wlan <txt> traffic nat source rule <u32> log prefix <txt>
interfaces wlan <txt> traffic nat source rule <u32> network <ipv4net>
interfaces wlan <txt> traffic nat source rule <u32> port <u32|id>
interfaces wlan <txt> traffic nat source rule <u32> protocol <txt>
interfaces wlan <txt> traffic nat source rule <u32> selector <txt>
interfaces wlan <txt> traffic policy in <txt> priority <txt>
interfaces wlan <txt> traffic policy local-in <txt> priority <txt>
interfaces wlan <txt> traffic policy local-out <txt> priority <txt>
interfaces wlan <txt> traffic policy out <txt> priority <txt>
interfaces wlan <txt> type access-point disable-broadcast-ssid
interfaces wlan <txt> type access-point disable-rates 802.11a <txt>
interfaces wlan <txt> type access-point disable-rates 802.11g <txt>
interfaces wlan <txt> type access-point dot11k radio-resource-management
interfaces wlan <txt> type access-point dot11r fast-transition
interfaces wlan <txt> type access-point dot11r fast-transition over-the-air
interfaces wlan <txt> type access-point dot11r fast-transition over-the-ds
interfaces wlan <txt> type access-point dot11v network-assisted-roaming
interfaces wlan <txt> type access-point mac-filter allow-mac <anymacaddr>
interfaces wlan <txt> type access-point max-clients hard-limit <u32>
interfaces wlan <txt> type access-point security aaa accounting <id>
interfaces wlan <txt> type access-point security aaa authentication <id>
interfaces wlan <txt> type access-point security akm dot1x-256
interfaces wlan <txt> type access-point security akm ft-dot1x
interfaces wlan <txt> type access-point security akm none transition
interfaces wlan <txt> type access-point security akm none transition wlan-ifc <txt>
interfaces wlan <txt> type access-point security akm owe transition
interfaces wlan <txt> type access-point security akm owe transition wlan-ifc <txt>
interfaces wlan <txt> type access-point security akm psk-256
interfaces wlan <txt> type access-point security encrypted-passphrase <password>
interfaces wlan <txt> type access-point security group-rekeying
interfaces wlan <txt> type access-point security group-rekeying interval <u32>
interfaces wlan <txt> type access-point security group-rekeying strict <bool>
interfaces wlan <txt> type access-point security nas-identifier <txt>
interfaces wlan <txt> type access-point security opportunistic-key-caching
interfaces wlan <txt> type access-point security pairwise-ciphers
interfaces wlan <txt> type access-point security pairwise-ciphers aes-ccmp
interfaces wlan <txt> type access-point security pairwise-ciphers aes-ccmp-256
interfaces wlan <txt> type access-point security pairwise-ciphers aes-gcmp-128
interfaces wlan <txt> type access-point security pairwise-ciphers aes-gcmp-256
interfaces wlan <txt> type access-point security pairwise-ciphers tkip
interfaces wlan <txt> type access-point security pmf optional
interfaces wlan <txt> type access-point security pmf required
interfaces wlan <txt> type access-point security psk-passphrase <txt>
interfaces wlan <txt> type access-point security wpav1 pairwise-ciphers
interfaces wlan <txt> type access-point security wpav1 pairwise-ciphers aes-ccmp
interfaces wlan <txt> type access-point security wpav1 pairwise-ciphers tkip
interfaces wlan <txt> type station network <u32> bssid <macaddr>
interfaces wlan <txt> type station network <u32> security akm
interfaces wlan <txt> type station network <u32> security akm cnsa
interfaces wlan <txt> type station network <u32> security akm dot1x
interfaces wlan <txt> type station network <u32> security akm dot1x-256
interfaces wlan <txt> type station network <u32> security akm ft-dot1x
interfaces wlan <txt> type station network <u32> security akm ft-psk
interfaces wlan <txt> type station network <u32> security akm ft-sae
interfaces wlan <txt> type station network <u32> security akm none
interfaces wlan <txt> type station network <u32> security akm owe
interfaces wlan <txt> type station network <u32> security akm psk
interfaces wlan <txt> type station network <u32> security akm psk-256
interfaces wlan <txt> type station network <u32> security akm sae
interfaces wlan <txt> type station network <u32> security ca-certificate <file>
interfaces wlan <txt> type station network <u32> security client-certificate <file>
interfaces wlan <txt> type station network <u32> security client-private-encrypted-password <txt>
interfaces wlan <txt> type station network <u32> security client-private-key <file>
interfaces wlan <txt> type station network <u32> security client-private-password <txt>
interfaces wlan <txt> type station network <u32> security eap-method
interfaces wlan <txt> type station network <u32> security eap-method mschapv2
interfaces wlan <txt> type station network <u32> security eap-method peap
interfaces wlan <txt> type station network <u32> security eap-method peap inner-method
interfaces wlan <txt> type station network <u32> security eap-method peap inner-method md5
interfaces wlan <txt> type station network <u32> security eap-method peap inner-method mschapv2
interfaces wlan <txt> type station network <u32> security eap-method tls
interfaces wlan <txt> type station network <u32> security eap-method ttls
interfaces wlan <txt> type station network <u32> security eap-method ttls inner-method
interfaces wlan <txt> type station network <u32> security eap-method ttls inner-method md5
interfaces wlan <txt> type station network <u32> security eap-method ttls inner-method mschapv2
interfaces wlan <txt> type station network <u32> security eap-method ttls inner-method tls
interfaces wlan <txt> type station network <u32> security encrypted-passphrase <password>
interfaces wlan <txt> type station network <u32> security framework
interfaces wlan <txt> type station network <u32> security framework rsn
interfaces wlan <txt> type station network <u32> security framework wpav1
interfaces wlan <txt> type station network <u32> security identity <txt>
interfaces wlan <txt> type station network <u32> security pairwise-ciphers
interfaces wlan <txt> type station network <u32> security pairwise-ciphers aes-ccmp
interfaces wlan <txt> type station network <u32> security pairwise-ciphers aes-ccmp-256
interfaces wlan <txt> type station network <u32> security pairwise-ciphers aes-gcmp-128
interfaces wlan <txt> type station network <u32> security pairwise-ciphers aes-gcmp-256
interfaces wlan <txt> type station network <u32> security pairwise-ciphers tkip
interfaces wlan <txt> type station network <u32> security passphrase <txt>
interfaces wlan <txt> type station network <u32> security pmf
interfaces wlan <txt> type station network <u32> security pmf optional
interfaces wlan <txt> type station network <u32> security pmf required