x 203282-BWorking with Access Points ...........................................................................................5-4Performing Actions on a Single Access Point ..........................................................5-4Performing Actions on a Multiple Access Points ......................................................5-6Viewing Access Point Activity .........................................................................................5-8Checking Access Point Status ......................................................................................5-10Configuring your WEP Settings ..............................................................................5-10BOOTP Table .........................................................................................................5-10Adding a BOOTP Entry ................................................................................... 5-11Changing a BOOTP Entry ...............................................................................5-13Removing a BOOTP Entry ..............................................................................5-14Setting BOOTP Restrictions ............................................................................5-14Assigning a Dynamic IP Address ....................................................................5-16Viewing the AP Manager Version .................................................................................5-16Chapter 6Command Line InterfaceAccessing the CLI ...........................................................................................................6-1Starting a Telnet Session .........................................................................................6-2CLI Command List ..........................................................................................................6-3Basic Commands ...........................................................................................................6-6ACL (Access Control List) Commands .....................................................................6-6Adapter Commands ........................................................................................................6-8AUL (Associated User List) Commands ...................................................................6-9Authentication Commands ...........................................................................................6-10Configuration Commands ............................................................................................. 6-11Encapsulation Commands ..................................................................................... 6-11Fail-Over Commands .............................................................................................6-12IAPP (Inter-Access-Point Protocol) Commands .....................................................6-14Log Commands ......................................................................................................6-15MAC Commands ....................................................................................................6-16PHY Commands ....................................................................................................6-17SNMP Commands .................................................................................................6-19System Commands ................................................................................................6-20WEP (Wired Equivalent Privacy) Commands ........................................................6-22