WLAN
Wireless LAN (WLAN) is a technology based on the IEEE 802.11 standard that operates at the physical and data link layers of the OSI model which allows the connection of wireless devices. In OSDX, the WLAN configuration is defined by two elements, Controllers and Interfaces. Controllers model the physical related characteristics of the wireless link while interfaces focus on the logical ones.
Regulatory domains
A regulatory domain defines a set of restrictions applicable to WLAN capable devices. Due to the existing regulations, all OSDX WLAN capable devices are shipped with predefined regulatory domain that cannot be changed through of configuration. The following table shows all the regulatory domains supported by OSDX devices.
Regulatory domain |
Default country |
Description |
|---|---|---|
|
|
European Telecommunications Standards Institute |
|
|
Federal Communications Commission |
|
|
Norma Oficial Mexicana |
|
|
Rest of the world |
Note that, for each domain there is a default country. Use the following table to find out the regulatory domain present in your target country.
Country list:
Country code |
Country name |
Regulatory domain |
|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Controllers
Physical-related parameters and common interface ones are configured by mean of the WLAN controllers. All WLAN controllers are pre-allocated during boot-up, meaning the creation and deletion actions are not supported. Depending on the characteristics of the associated radio module, some parameters will only accept a specific set values. OSDX provides a command that lists all the relevant information from the CLI.
admin@Kaio$ controllers wlan show capabilities
Phy: wifi0
modes: 802.11ax,802.11g,802.11n
stations: 512
bandwidths: 20MHz,40MHz
bands: 2.4GHz
tx-power: 11,10,13,12,15,14,17,16,19,18,5,8,7,6,9,20
vht-capabilities: [SU-BEAMFORMEE][RXLDPC][BF-ANTENNA-4][TX-STBC-2BY1][MU-BEAMFORMER][SOUNDING-DIMENSION-4][SU-BEAMFORMER][MAX-MPDU-11454][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN][RX-STBC-1][MAX-A-MPDU-LEN-EXP7]
supported-channels: 11,10,13,12,14,1,3,2,5,4,7,6,9,8
vaps: 16
spatial-streams: 1,3,2,4
ht-capabilities: [DSSS_CCK-40][LDPC][TX-STBC][MAX-AMSDU-7935][RX-STBC1][SMPS-DYNAMIC]
max-tx-power: 20
Phy: wifi1
modes: 802.11a,802.11ax,802.11ac,802.11n
stations: 512
bandwidths: 20MHz,80MHz,40MHz
bands: 5GHz
tx-power: 11,10,13,12,15,14,17,16,19,18,22,21,5,8,7,6,9,20,23
vht-capabilities: [SU-BEAMFORMEE][RXLDPC][TX-STBC-2BY1][MU-BEAMFORMER][SOUNDING-DIMENSION-4][SU-BEAMFORMER][MAX-MPDU-11454][RX-ANTENNA-PATTERN][TX-ANTENNA-PATTERN][RX-STBC-1][MAX-A-MPDU-LEN-EXP7]
supported-channels: 153,157,60,132,116,64,136,112,177,173,48,44,40,144,140,149,120,108,124,169,128,165,100,161,104,56,36,52
vaps: 16
spatial-streams: 1,3,2,4
ht-capabilities: [DSSS_CCK-40][LDPC][TX-STBC][MAX-AMSDU-7935][RX-STBC1][SMPS-DYNAMIC]
max-tx-power: 23
Default values may apply if a parameter is not configured.
Warning
Note that, regardless of the default values, at least one controller parameter must
be set to consider the configuration valid.
Wlan Channels
Channel selection depends on several factors: regulatory domain, band and bandwidth. The following tables can be used
to know which channels will be available on the selected band. Note that depending on the configured bandwidth, some channels
will not be available since some of the frequencies could fall out of the spectrum.
Frequency |
Channel |
Regulatory Domains |
|---|---|---|
2412 |
1 |
|
2417 |
2 |
|
2422 |
3 |
|
2427 |
4 |
|
2432 |
5 |
|
2437 |
6 |
|
2442 |
7 |
|
2447 |
8 |
|
2452 |
9 |
|
2457 |
10 |
|
2462 |
11 |
|
2467 |
12 |
|
2472 |
13 |
|
2484 |
14 |
|
Frequency |
Channel |
Installation |
CAC |
Regulatory domains |
|---|---|---|---|---|
5180 |
36 |
indoor ( |
|
|
5200 |
40 |
indoor ( |
|
|
5220 |
44 |
indoor ( |
|
|
5240 |
48 |
indoor ( |
|
|
5260 |
52 |
indoor ( |
1 min |
|
5280 |
56 |
indoor ( |
1 min |
|
5300 |
60 |
indoor ( |
1 min |
|
5320 |
64 |
indoor ( |
1 min |
|
5500 |
100 |
indoor/outdoor ( |
1 min |
|
5520 |
104 |
indoor/outdoor ( |
1 min |
|
5540 |
108 |
indoor/outdoor ( |
1 min |
|
5560 |
112 |
indoor/outdoor ( |
1 min |
|
5580 |
116 |
indoor/outdoor ( |
1 min |
|
5600 |
120 |
indoor/outdoor ( |
10 mins |
|
5620 |
124 |
indoor/outdoor ( |
10 mins |
|
5640 |
128 |
indoor/outdoor ( |
10 mins |
|
5660 |
132 |
indoor/outdoor ( |
1 min |
|
5680 |
136 |
indoor/outdoor ( |
1 min |
|
5700 |
140 |
indoor/outdoor ( |
1 min |
|
5720 |
144 |
1 min |
|
|
5745 |
149 |
1 min |
|
|
5765 |
153 |
1 min |
|
|
5785 |
157 |
1 min |
|
|
5805 |
161 |
1 min |
|
|
5825 |
165 |
1 min |
|
Interfaces
Network-specific parameters are configured under the interface wlan section, with
phy and type being mandatory. The maximum number of interfaces allowed depends
on the platform and can be checked using the show capabilities command
described in the Controllers section.
Router capable devices, like the Teldat M2 and M10 models have pre-allocated
WLAN interfaces that only accept a specific phy and type when configured:
Interface |
Phy |
Type |
|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
There are two types of WLAN interfaces supported by all wireless capable devices:
access-point and station. An additional mode, called monitor, is also
supported by the APs. These three types are described in the following
sections.
Once the device has at least one interface configured on top of a controller, the
status of the device can be check using the show status command.
admin@osdx# run controllers wlan show status
Phy: wifi0
Status: up
Band: 2.4GHz
Channel: 13
Bandwidth: 20MHz
Tx-Power: 15dBm
Phy: wifi1
Status: cac (13 seconds remaining)
Access-point
This type implements the infrastructure mode where wireless devices connect to an access-point that forwards the packets between the connected stations and the wired network. Note that the access-point is the center point for all communications (unlike what happens with the ad-hoc mode, where connections between stations are point-to-point).
Security
All OSDX WLAN capable devices support the following security modes for the access-point role:
mode |
akms |
security framework |
unicast ciphers |
pmf |
|---|---|---|---|---|
none |
||||
WPA personal |
|
|
|
|
WPA2 personal |
|
|
|
|
WPA/WPA2 personal |
|
|
|
|
WPA3 personal |
|
|
|
pmf required |
WPA2/WPA3 personal |
|
|
|
pmf optional / pmf required ( |
WPA enterprise |
|
|
|
|
WPA2 enterprise |
|
|
|
|
WPA/WPA2 enterprise |
|
|
|
|
WPA3 enterprise |
|
|
|
pmf required |
WPA2/WPA3 enterprise |
|
|
|
pmf optional |
Note that some security modes may call for additional parameters to be configured. On such cases, the CLI will report an error message to inform the user about the problem.
For example, the following lines show how to configure an access-point interface in
WPA3 personal mode:
set interfaces wlan wlan0 bridge-group bridge br0
set interfaces wlan wlan0 phy wifi1
set interfaces wlan wlan0 type access-point security akm sae
set interfaces wlan wlan0 type access-point security psk-passphrase 1234567890
set interfaces wlan wlan0 type access-point security pairwise-ciphers aes-ccmp
set interfaces wlan wlan0 type access-point security pmf required
set interfaces wlan wlan0 type access-point ssid test_network
Note that the security framework is automatically configured based on the values
set under akm, pairwise-ciphers and wpav1 pairwise-ciphers.
Station
This type implements the station or client mode where the interface connects to
an access point operating in infrastructure mode to provide connectivity through
the air.
Client mode is configured via networks. A network is just a set of rules
that is evaluated when looking for a valid target so the first valid one with the
highest priority is used. The network priority is identified by mean of the index
and is evaluated in descending order (1 being the highest priority and 16 the
lowest). This configuration method gives the administrator a lot of flexibility when
working in complex deployments allowing the interface to connect
to different networks based on many conditions.
Warning
Note that only 1 interface in station mode per radio is supported in OSDX.
The security configuration is almost the same as the one described under the Access-point
section. The only difference is that the owe-transition mode is not allowed,
since it doesn’t make sense in station mode. For example, the following
excerpt shows how to configure an interface in station mode using WPA3 personal
security:
set interfaces wlan wlan0 phy wifi1
set interfaces wlan wlan0 type station network 1 security akm sae
set interfaces wlan wlan0 type station network 1 security pmf required
set interfaces wlan wlan0 type station network 1 security psk-passphrase 1234567890
set interfaces wlan wlan0 type station network 1 ssid test_24ghz
Eap methods MSCHAPv2, TTL, TTLS (with MD5, MSCHAPv2 and TTL)
and PEAP (with MD5 with MSCHAPv2) are also supported. On the next example,
a station will try to connect to a network with WPA3 Enterprise security using the
TTLS-TTL EAP method (that is, a TTL tunnel with certificates). Make sure the device
has the ca.pem, client.pem and client.key certificates in the
/config/auth/certificates folder.
set interfaces wlan wlan0 phy wifi0
set interfaces wlan wlan0 type station network 1 security akm cnsa
set interfaces wlan wlan0 type station network 1 security ca-certificate 'running://auth/certificates/ca.pem'
set interfaces wlan wlan0 type station network 1 security client-certificate 'running://auth/certificates/client.pem'
set interfaces wlan wlan0 type station network 1 security client-private-key 'running://auth/certificates/client.key'
set interfaces wlan wlan0 type station network 1 security client-private-password whatever
set interfaces wlan wlan0 type station network 1 security eap-method ttls inner-method tls
set interfaces wlan wlan0 type station network 1 security framework rsn
set interfaces wlan wlan0 type station network 1 security identity user
set interfaces wlan wlan0 type station network 1 security pmf required
set interfaces wlan wlan0 type station network 1 ssid test_radius
Monitor
In monitor mode, the interface is able to capture the traffic on the configured
channel without being connected to the target network.
Warning
Monitor mode is only supported by the APs. Only 1 interface in monitor mode
per radio is supported in OSDX.
For example, the following configuration shows how to set an AP to capture the traffic on channel 36 of the 5GHz band.
set controllers wlan installation indoor
set controllers wlan radios wifi1 channel 36
set interfaces wlan wlan0 phy wifi1
set interfaces wlan wlan0 type monitor
The traffic can be later analyzed with the traffic dump tool with the wlan0
interface as filter.
admin@osdx$ traffic dump monitor interface wlan0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wlan0, link-type IEEE802_11_RADIO (802.11 plus radiotap header), capture size 262144 bytes
03:33:52.448859 8198636505us tsft bad-fcs 12.0 Mb/s 5180 MHz 11a -98dBm signal 0dBm noise antenna 0 unknown 802.11 ctrl frame subtype (5)
03:33:52.466432 8198654122us tsft 6.0 Mb/s 5180 MHz 11a -98dBm signal 0dBm noise antenna 0 Beacon (SSID) [6.0* 9.0 12.0* 18.0 24.0* 36.0 48.0 54.0 Mbit] ESS CH: 36, PRIVACY
03:33:52.467060 8198654767us tsft 6.0 Mb/s 5180 MHz 11a -99dBm signal 0dBm noise antenna 0 Beacon () [6.0* 9.0 12.0* 18.0 24.0* 36.0 48.0 54.0 Mbit] ESS CH: 36, PRIVACY
03:33:52.568841 8198756521us tsft 6.0 Mb/s 5180 MHz 11a -99dBm signal 0dBm noise antenna 0 Beacon (SSID) [6.0* 9.0 12.0* 18.0 24.0* 36.0 48.0 54.0 Mbit] ESS CH: 36, PRIVACY
03:33:52.569468 8198757166us tsft 6.0 Mb/s 5180 MHz 11a -100dBm signal 0dBm noise antenna 0 Beacon () [6.0* 9.0 12.0* 18.0 24.0* 36.0 48.0 54.0 Mbit] ESS CH: 36, PRIVACY
03:33:52.569742 8198757433us tsft 6.0 Mb/s 5180 MHz 11a -99dBm signal 0dBm noise antenna 0 Data IV:ed72 Pad 20 KeyID 1
Examples
Here, you can find different examples of these options.
Command Summary
Configuration commands
controllers wlan radios <txt> auto-channel-selection blocked-channels <txt>controllers wlan radios <txt> background-scanning sweep-interval <u32>interfaces wlan <txt> dhcp client fallback <ipv4cidr|ipv6cidr>interfaces wlan <txt> dhcp client send dhcp-client-identifierinterfaces wlan <txt> dhcp client send dhcp-client-identifier base-macinterfaces wlan <txt> dhcp client send dhcp-client-identifier serial-numberinterfaces wlan <txt> dhcp client send dhcp-client-identifier string <id>interfaces wlan <txt> dhcp client send vendor-class-identifierinterfaces wlan <txt> dhcp client send vendor-class-identifier string <id>interfaces wlan <txt> ip igmp last-member-query-interval <u32>interfaces wlan <txt> ip ospf authentication encrypted-password <password>interfaces wlan <txt> ip ospf authentication message-digest <id>interfaces wlan <txt> ip ospf authentication message-digest <id> encrypted-password <password>interfaces wlan <txt> ip ospf authentication message-digest <id> password <txt>interfaces wlan <txt> ip rip authentication encrypted-password <password>interfaces wlan <txt> ip rip authentication message-digest <u32>interfaces wlan <txt> ip rip authentication message-digest <u32> encrypted-password <password>interfaces wlan <txt> ip rip authentication message-digest <u32> password <txt>interfaces wlan <txt> ipv6 address prefix-from-provider <id>interfaces wlan <txt> ipv6 address prefix-from-provider <id> ifc-ID <ipv6net>interfaces wlan <txt> ipv6 ospfv3 authentication hmac-sha-256 <u32>interfaces wlan <txt> ipv6 ospfv3 authentication hmac-sha-256 <u32> encrypted-password <password>interfaces wlan <txt> ipv6 ospfv3 authentication hmac-sha-256 <u32> password <txt>interfaces wlan <txt> ipv6 ospfv3 authentication md5 <u32> encrypted-password <password>interfaces wlan <txt> ipv6 ospfv3 authentication md5 <u32> password <txt>interfaces wlan <txt> ipv6 ripng split-horizon poison-reverseinterfaces wlan <txt> ipv6 router-advert cur-hop-limit <u32>interfaces wlan <txt> ipv6 router-advert default-lifetime <u32>interfaces wlan <txt> ipv6 router-advert default-preference <txt>interfaces wlan <txt> ipv6 router-advert other-config-flag <txt>interfaces wlan <txt> ipv6 router-advert prefix <ipv6net> autonomous-flag <txt>interfaces wlan <txt> ipv6 router-advert prefix <ipv6net> on-link-flag <txt>interfaces wlan <txt> ipv6 router-advert prefix <ipv6net> preferred-lifetime <u32|id>interfaces wlan <txt> ipv6 router-advert prefix <ipv6net> valid-lifetime <u32|id>interfaces wlan <txt> ipv6 router-advert reachable-time <u32>interfaces wlan <txt> ipv6 router-advert retrans-timer <u32>interfaces wlan <txt> ipv6 router-advert used-prefixes autonomous-flag <txt>interfaces wlan <txt> ipv6 router-advert used-prefixes on-link-flag <txt>interfaces wlan <txt> ipv6 router-advert used-prefixes preferred-lifetime <u32|id>interfaces wlan <txt> ipv6 router-advert used-prefixes valid-lifetime <u32|id>interfaces wlan <txt> traffic nat destination rule <u32> address <ipv4|ipv4net|ipv4range|id>interfaces wlan <txt> traffic nat destination rule <u32> description <txt>interfaces wlan <txt> traffic nat destination rule <u32> loginterfaces wlan <txt> traffic nat destination rule <u32> log level <txt>interfaces wlan <txt> traffic nat destination rule <u32> log prefix <txt>interfaces wlan <txt> traffic nat destination rule <u32> network <ipv4net>interfaces wlan <txt> traffic nat destination rule <u32> port <u32|id>interfaces wlan <txt> traffic nat destination rule <u32> protocol <txt>interfaces wlan <txt> traffic nat destination rule <u32> selector <txt>interfaces wlan <txt> traffic nat source rule <u32> address <ipv4|ipv4net|ipv4range|id>interfaces wlan <txt> traffic nat source rule <u32> description <txt>interfaces wlan <txt> traffic nat source rule <u32> log level <txt>interfaces wlan <txt> traffic nat source rule <u32> log prefix <txt>interfaces wlan <txt> traffic nat source rule <u32> network <ipv4net>interfaces wlan <txt> traffic nat source rule <u32> port <u32|id>interfaces wlan <txt> traffic nat source rule <u32> protocol <txt>interfaces wlan <txt> traffic nat source rule <u32> selector <txt>interfaces wlan <txt> traffic policy in <txt> priority <txt>interfaces wlan <txt> traffic policy local-in <txt> priority <txt>interfaces wlan <txt> traffic policy local-out <txt> priority <txt>interfaces wlan <txt> traffic policy out <txt> priority <txt>interfaces wlan <txt> type access-point disable-broadcast-ssidinterfaces wlan <txt> type access-point disable-rates 802.11a <txt>interfaces wlan <txt> type access-point disable-rates 802.11g <txt>interfaces wlan <txt> type access-point dot11k radio-resource-managementinterfaces wlan <txt> type access-point dot11r fast-transitioninterfaces wlan <txt> type access-point dot11r fast-transition over-the-airinterfaces wlan <txt> type access-point dot11r fast-transition over-the-dsinterfaces wlan <txt> type access-point dot11v network-assisted-roaminginterfaces wlan <txt> type access-point mac-filter allow-mac <anymacaddr>interfaces wlan <txt> type access-point max-clients hard-limit <u32>interfaces wlan <txt> type access-point security aaa accounting <id>interfaces wlan <txt> type access-point security aaa authentication <id>interfaces wlan <txt> type access-point security akm dot1x-256interfaces wlan <txt> type access-point security akm ft-dot1xinterfaces wlan <txt> type access-point security akm none transitioninterfaces wlan <txt> type access-point security akm none transition wlan-ifc <txt>interfaces wlan <txt> type access-point security akm owe transitioninterfaces wlan <txt> type access-point security akm owe transition wlan-ifc <txt>interfaces wlan <txt> type access-point security akm psk-256interfaces wlan <txt> type access-point security encrypted-passphrase <password>interfaces wlan <txt> type access-point security group-rekeyinginterfaces wlan <txt> type access-point security group-rekeying interval <u32>interfaces wlan <txt> type access-point security group-rekeying strict <bool>interfaces wlan <txt> type access-point security nas-identifier <txt>interfaces wlan <txt> type access-point security opportunistic-key-cachinginterfaces wlan <txt> type access-point security pairwise-ciphersinterfaces wlan <txt> type access-point security pairwise-ciphers aes-ccmpinterfaces wlan <txt> type access-point security pairwise-ciphers aes-ccmp-256interfaces wlan <txt> type access-point security pairwise-ciphers aes-gcmp-128interfaces wlan <txt> type access-point security pairwise-ciphers aes-gcmp-256interfaces wlan <txt> type access-point security pairwise-ciphers tkipinterfaces wlan <txt> type access-point security pmf optionalinterfaces wlan <txt> type access-point security pmf requiredinterfaces wlan <txt> type access-point security psk-passphrase <txt>interfaces wlan <txt> type access-point security wpav1 pairwise-ciphersinterfaces wlan <txt> type access-point security wpav1 pairwise-ciphers aes-ccmpinterfaces wlan <txt> type access-point security wpav1 pairwise-ciphers tkipinterfaces wlan <txt> type station network <u32> bssid <macaddr>interfaces wlan <txt> type station network <u32> security akminterfaces wlan <txt> type station network <u32> security akm cnsainterfaces wlan <txt> type station network <u32> security akm dot1xinterfaces wlan <txt> type station network <u32> security akm dot1x-256interfaces wlan <txt> type station network <u32> security akm ft-dot1xinterfaces wlan <txt> type station network <u32> security akm ft-pskinterfaces wlan <txt> type station network <u32> security akm ft-saeinterfaces wlan <txt> type station network <u32> security akm noneinterfaces wlan <txt> type station network <u32> security akm oweinterfaces wlan <txt> type station network <u32> security akm pskinterfaces wlan <txt> type station network <u32> security akm psk-256interfaces wlan <txt> type station network <u32> security akm saeinterfaces wlan <txt> type station network <u32> security ca-certificate <file>interfaces wlan <txt> type station network <u32> security client-certificate <file>interfaces wlan <txt> type station network <u32> security client-private-key <file>interfaces wlan <txt> type station network <u32> security client-private-password <txt>interfaces wlan <txt> type station network <u32> security eap-methodinterfaces wlan <txt> type station network <u32> security eap-method mschapv2interfaces wlan <txt> type station network <u32> security eap-method peapinterfaces wlan <txt> type station network <u32> security eap-method peap inner-methodinterfaces wlan <txt> type station network <u32> security eap-method peap inner-method md5interfaces wlan <txt> type station network <u32> security eap-method peap inner-method mschapv2interfaces wlan <txt> type station network <u32> security eap-method tlsinterfaces wlan <txt> type station network <u32> security eap-method ttlsinterfaces wlan <txt> type station network <u32> security eap-method ttls inner-methodinterfaces wlan <txt> type station network <u32> security eap-method ttls inner-method md5interfaces wlan <txt> type station network <u32> security eap-method ttls inner-method mschapv2interfaces wlan <txt> type station network <u32> security eap-method ttls inner-method tlsinterfaces wlan <txt> type station network <u32> security encrypted-passphrase <password>interfaces wlan <txt> type station network <u32> security frameworkinterfaces wlan <txt> type station network <u32> security framework rsninterfaces wlan <txt> type station network <u32> security framework wpav1interfaces wlan <txt> type station network <u32> security identity <txt>interfaces wlan <txt> type station network <u32> security pairwise-ciphersinterfaces wlan <txt> type station network <u32> security pairwise-ciphers aes-ccmpinterfaces wlan <txt> type station network <u32> security pairwise-ciphers aes-ccmp-256interfaces wlan <txt> type station network <u32> security pairwise-ciphers aes-gcmp-128interfaces wlan <txt> type station network <u32> security pairwise-ciphers aes-gcmp-256interfaces wlan <txt> type station network <u32> security pairwise-ciphers tkipinterfaces wlan <txt> type station network <u32> security passphrase <txt>interfaces wlan <txt> type station network <u32> security pmfinterfaces wlan <txt> type station network <u32> security pmf optionalinterfaces wlan <txt> type station network <u32> security pmf required