The keep-service enable allow new-access command enables the APs in fault state to allow access of new STAs.
The undo keep-service enable command disables the APs in fault state from allowing access of new STAs.
By default, the APs in fault state are disabled from allowing access of new STAs.
Parameter |
Description |
Value |
---|---|---|
no-auth |
Allows access of STAs using Portal or MAC address authentication. |
- |
Usage Scenario
The networks with low security requirements, which apply to hospitals or warehouses, require that the APs in fault state still allow access of new STAs when link faults occur between the APs and AC. After the keep-service enable allow new-access command is run, new STAs can still connect to the APs in fault state when the CAPWAP link between the APs and AC is disconnected.
Precautions
The command does not take effect on a WDS network.
After this command is executed, if the wids device detect enable and wids contain enable commands are configured to enable device detection and containment, the AP will continue providing data services after going offline. However, the AC considers the AP as a rogue or interference device and adds it to the containment list. The containment mechanism will disable the AP from allowing access of new STAs. Therefore, the function of enabling an offline AP to allow access of new STAs does not take effect in this case.
To enable an offline AP to allow access of new STAs using Portal or MAC address authentication, configure the no-auth parameter.
This function is applicable to scenarios where service data is forwarded in direct mode, the STA authentication mode is Portal, MAC address, open, WEP, or WPA/WPA2-PSK authentication.