Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
INDEX 802.11b/g/n Cisco APs > Configure page Numerics 7-51, D-36 802.11 bands 11n Mode parameter 4-18 1250 series access points and PoE Status field 7-62 7-61 transmit power settings when using PoE 7920 AP CAC parameter 7-61 clients 5-9 7-66 6-35 using the CLI 4-20 to 4-22 using the GUI 4-17 to 4-19 devices 4-17 802.11n (2.4 GHz) High Throughput page 6-33 802.1Q VLAN trunk port 6-33 4-18 3-5 802.1X 802.11a (or 802.11b) > Client Roaming page 4-41 configuring 6-20 802.11a (or 802.11b) > Video Parameters page 4-54 described 802.11a (or 802.11b) > Voice Parameters page 4-53 dynamic key settings 802.11a (or 802.11b/g) > EDCA Parameters page 4-64 802.11a (or 802.11b/g) Global Parameters > Auto RF page 10-8 802.11a (or 802.11b/g) Global Parameters page 4-14, 10-37 802.11a (or 802.11b/g) Network Status parameter 4-14 802.11a/n (or 802.11b/g/n) Cisco APs > Configure page 6-42, 10-26 802.11a/n (or 802.11b/g/n) Radios page 802.11a > Pico Cell page 4-14 configuring 6-33 7921 support mode 4-14 to 4-15 802.11n 7920 support mode described configuring using the GUI 6-35 7920 Client CAC parameter configuring 4-15 to 4-17 802.11g Support parameter operating modes when using PoE 3DES IPSec data encryption configuring using the CLI 6-21 802.1X+CCKM configuring described 6-22 6-21 802.1X authentication for access points configuring the switch 4-58, 10-25 10-42 6-20 7-12 using the CLI 7-10 to 7-12 using the GUI 7-9 to 7-10 described 7-7 802.11a > Pico Cell page with pico cell mode V2 parameters 10-42 802.1x Authentication parameter 802.11a > RRM > Coverage page 802.3 bridging 802.11a > RRM > DCA page 10-15 10-12 configuring using the CLI 4-33 configuring using the GUI 4-32 to 4-33 802.11a > RRM > Dynamic Channel Assignment (DCA) page 10-12 802.3 Bridging parameter 802.11a > RRM > General page 802.3 frames 10-17 802.11a > RRM > Tx Power Control (TPC) page 10-10 7-9 4-33 4-32 802.3X flow control, enabling 4-31 Book Title 78-xxxxx-xx IN-1 Index A AAA override configuring using the CLI 5-79 using the GUI 5-78 to 5-79 described using the CLI 6-46 using the GUI 6-45 to 6-46 described 6-43 illustrated 6-44 access point manager interface, configuring using the configuration wizard 4-5 access points 5-77 Access Control List Name parameter 5-55 access control lists (ACLs) 20-MHz channelization 10-26 40-MHz channelization 10-26 applying to an interface assisted roaming 4-40 using the CLI 5-64 authorization list 7-17 using the GUI 5-58 to 5-59 authorizing applying to a WLAN using MICs 7-16 using the CLI 5-64 using SSCs 7-16 using the GUI 5-60 to 5-61 using the CLI 7-17 applying to the controller CPU using the GUI 7-16 using the CLI 5-64 configuring hybrid REAP using the CLI using the GUI 5-59 to 5-60 embedded 5-62 to 5-64 using the GUI 5-54 to 5-58 counters configuring using the CLI 5-63 configuring using the GUI 5-55 rules interpreting D-2 priming 5-74 Access Control Lists > Edit page 5-57 Access Control Lists > New page 5-55 Access Control Lists > Rules > New page Access Control Lists page 5-54 access point groups assigning access points to using the CLI 6-47 using the GUI 6-47 D-14 B-7 to B-8 supported for use with hybrid REAP supporting oversized images 12-2 7-25 troubleshooting 5-56 the join process 7-19 to 7-22 using Telnet or SSH 4-27, 4-28 access point event logs, viewing B-2 to B-8 rules for operating in Taiwan D-30 to D-31 3-4 7-2 regulatory information using with the debug facility creating 7-65 number supported per controller 5-54, 5-56, 5-63 Access Mode parameter configuring migrating from the -J regulatory domain to the -U regulatory domain 7-46 to ?? 5-54 identity networking B-6 LEDs using the CLI described 7-13 guidelines for operating in Japan configuring 12-13 to 12-14 VCI strings D-38 7-18 verifying that they join the controller Accounting Server parameters 7-3 6-52 accounting servers, disabling per WLAN 6-51 ACL. See access control lists (ACLs) ACL Name parameter 5-59, 5-60 Book Title IN-2 78-xxxxx-xx Index ACS server configuration page Action parameter active exploits All APs page 6-49 Allow AAA Override parameter 5-57 Add AAA Client page (on CiscoSecure ACS) 5-5, 5-20 Add Interface-Mapping button Add New Rule button Antenna Gain parameter Antenna parameter 9-17 Admin Status parameter 4-24 Admission Control (ACM) parameter AES CBS IPSec data encryption 5-9 6-21 Aggregated MAC Protocol Data Unit (A-MPDU) Aggregated MAC Service Data Unit (A-MSDU) 4-20 4-20 7-13 AP Authentication Policy page 5-67, 10-34 AP Failover Priority parameter 7-39 AP Group Name parameter 4-20 AP Groups VLAN page AirMagnet Enterprise Analyzer D-35 AP-manager interface configuring using the CLI 6-42 configuring using the GUI 6-40 Alarm Trigger Threshold parameter All APs > Details (Advanced) page assigning access point groups using the GUI 3-11 to 3-13 3-7 of four AP-manager interfaces AP Policies page 7-58 3-37 10-34, 12-12, D-36 7-17 AP Primary Discovery Timeout parameter 7-62 ASLEAP detection 7-9 All APs > Details (H-REAP) page 12-12 All APs > Details (Inventory) page 7-54 asymmetric tunneling 7-34, 7-38 7-34 5-117 Assignment Method parameter 12-11 All APs > Details (High Availability) page 10-34, D-36 3-38 3-36 to 3-40 AP Mode parameter 7-43 3-39 of three AP-manager interfaces using multiple 4-69 All APs > Details (General) page 3-39 to 3-40 of two AP-manager interfaces 6-47 All APs > Details (Credentials) page All APs > Details page 3-15 illustration 10-34 All APs > Access Point Name > VLAN Mappings page 12-13 configuring PoE using the CLI described configuring link latency 6-45 6-45, 6-46, 6-56 creating multiple interfaces D-35 configuring country codes 6-45, 6-47 configuring 6-25, 6-40 Aironet IEs configuring CDP 6-45 AP Groups VLAN Feature Enable parameter aggregation method, specifying Airopeek 4-58 4-58 AP Group Description parameter 6-22 Aironet IE parameter 10-27 AP > Clients > Traffic Stream Metrics page AP801 access point 4-53, 4-54 5-44 10-27 AP > Clients page 3-22 5-34, 5-37 10-27 Antenna Type parameter 4-24 administrator usernames and passwords, configuring AES parameter 10-13 Anonymous Provision parameter 6-46 5-55 Add Web Server button AES-CCMP AnchorTime parameter 11-4 anonymous local authentication bind method 12-17 administrator access 5-79 anchor controller in inter-subnet roaming 5-117 Add AP button 10-33, 12-11 10-26, 10-28 11-26 authenticated local authentication bind method Authentication Priority parameter Authentication Protocol parameter Auth Key Mgmt parameter 5-34, 5-37 5-11, 5-25 4-29 6-22 Book Title 78-xxxxx-xx IN-3 Index Authority ID Information parameter Authority ID parameter Back-up Secondary Controller Name parameter 5-44, 12-20, 12-21 bandwidth-based CAC 5-44, 12-20 Authorize APs Against AAA parameter described 7-17 Authorize Self Signed Certificate (SSC) parameter 4-50 enabling 7-17 authorizing access points using the CLI 4-60 4-53 using the CLI 7-17 using the GUI using the GUI 7-16 Base MAC Address parameter auto-anchor mobility Beacon Period parameter 4-14 configuring Bind Password parameter 5-34 5-34 3-28 using the CLI 11-23 to 11-24 Bind Username parameter using the GUI 11-21 to 11-23 bootup script for configuration wizard guidelines overview bridge protocol data units (BPDUs) 11-21 Buffered Log Level parameter 11-20 to 11-21 AutoInstall Burst Data Rate parameter described DHCP addresses for interfaces TFTP server information D-9 4-45, 4-48 C 4-7 4-7 CAC 4-6 configuring for 7920 phones selecting configuration file using 3-24 4-9 obtaining overview 4-4 4-45, 4-48 Burst Real-Time Rate parameter 4-6, 4-9 example operation 7-34 4-8 described 4-6 6-33 4-50 enabling auto RF, configuring using the configuration wizard Average Data Rate parameter 4-6 4-44, 4-48 Average Real-Time Rate parameter Avoid Cisco AP Load parameter 4-45, 4-48 4-61 using the GUI 4-54 viewing using the CLI 10-13 Avoid Foreign AP Interference parameter using the CLI 4-62 Canadian compliance statement 10-13, 11-18 Avoid Non-802.11a (802.11b) Noise parameter B-3 Catalyst 3750G Integrated Wireless LAN Controller Switch 10-13 described 1-11 logical connectivity diagram and associated software commands E-4 to E-5 B ports backup controllers CCA Sensitivity Threshold parameter configuring 10-43 CCKM using the CLI 7-35 to 7-37 using the GUI 7-33 to 7-35 described 3-3, 3-5 configuring described 7-32 6-21 hybrid-REAP groups Back-up Primary Controller IP Address parameter Back-up Primary Controller Name field 6-22 7-34 7-34 Back-up Secondary Controller IP Address parameter with mobility 12-15 11-7 CCX 7-34 Book Title IN-4 78-xxxxx-xx Index downloading configuring Aironet IEs using the CLI 6-42 using the CLI 8-13 to 8-14 using the GUI 6-40 using the GUI 8-12 described link test overview 6-39 8-12 using with local EAP 7-55 viewing a client’s version 5-40, 5-45 Certificate Issuer parameter 5-43 using the CLI 6-42 Certificate Password parameter using the GUI 6-40 to 6-42 Certificate Type parameter CCX Layer 2 client roaming 8-10 7-17 Change Rules Priority parameter configuring 5-88 Channel Assignment Leader parameter using the CLI 4-42 Channel Assignment Method parameter using the GUI 4-41 to 4-42 channel bonding in the 5-GHz band debugging using the CLI described Channel parameter 4-43 10-14 10-13 10-27 10-25, D-37 channels 4-40 to 4-41 obtaining information using the CLI 4-43 CCX radio management configuring statically assigning using the CLI 10-29 statically assigning using the GUI 10-25 to 10-29 Channel Scan Duration parameter 10-18 using the CLI 10-38 Channel Width parameter using the GUI 10-37 to 10-38 Check Against CA Certificates parameter debugging using the CLI features Check Certificate Date Validity parameter 10-40 chokepoints for RFID tag tracking 10-36 hybrid-REAP considerations 10-36 obtaining information using the CLI 10-39 to 10-40 CCXv5 clients CCXv5 Req button 5-101 CIDS Sensors List page 5-100 configuring described D-22 CDP > AP Neighbors > Detail page described CDP > Global Configuration page 6-22, 6-24 6-22 CDP > Interface Neighbors page 4-71 4-69 4-69 4-70 Certificate Authority (CA) certificates 1-8 1-16 to 1-17 3-2, 3-3, 3-4 Cisco 28/37/38xx Integrated Services Router described 4-71 CDP Protocol Status parameter features not supported ports 4-73 CDP Advertisement Version parameter B-8 network connections 4-70 4-7 1-8 FCC statement 4-69 CDP > Interface Neighbors > Detail page CDP AP Neighbors page 4-77 5-104 AutoInstall interfaces 4-72 4-72 CDP > Traffic Metrics page 5-43 Cisco 2100 Series Wireless LAN Controllers 6-41 CDP > AP Neighbors page 5-43 ciphers 4-84 D-15 to D-30 CCX Version parameter CDP State parameter CIDS Sensor Add page CIDS Shun List page enabling location presence troubleshooting 10-14, 10-26 1-11 logical connectivity diagram and associated software commands E-3 ports 3-3, 3-4, 4-87 Book Title 78-xxxxx-xx IN-5 Index using Cisco Wireless Control System (WCS) 4-87 versions Cisco WiSM 1-11 configuring the Supervisor 720 Cisco 4400 Series Wireless LAN Controllers AutoInstall interfaces described models 4-86 logical connectivity diagram and associated software commands E-2 to E-3 B-9 3-4 maximum number supported by router chassis 1-17 to 1-18 ports 3-2, 3-3, 3-4 supporting more than 48 access points Cisco 7920 Wireless IP Phones 6-33 Cisco 7921 Wireless IP Phones 6-33 Cisco AV-pairs 7-14 CKIP configuring 6-48, 6-49 Cisco Clean Access (CCA) 1-10 3-3, 3-4 SSC key-hash 3-35 to 3-40 Cisco Centralized Key Management (CCKM). See CCKM using the CLI 6-27 using the GUI 6-25 to 6-26 described 6-52 6-25 Cisco Client Extensions (CCX). See CCX clearing the controller configuration Cisco Discovery Protocol (CDP) Clear Stats button 8-22 11-19 CLI configuring basic commands using the CLI 4-74 using the GUI 4-68 to 4-70 debugging using the CLI described 4-86 to ?? 1-9 to 1-11 guidelines network connections ports described 4-7 1-9 FCC statement 1-2 enabling wireless connections logging into 4-76 logging out 4-66 enabling using the GUI sample network using using the CLI 4-75 to 4-76 using the GUI 4-70 to 4-74 using the CLI 4-75 using the GUI 4-73 client MFP Cisco high-power switches Cisco Logo parameter 9-10 Cisco NAC Appliance 6-52 1-8 5-65 Client Protection parameter 4-70 5-69 configuring using the CLI D-24 to D-27 configuring using the GUI D-21 to D-24 described 7-63 CiscoSecure Access Control Server (ACS) D-15 Client Reporting page D-23 client roaming, configuring 5-4 Cisco Unified Wireless Network (UWN) Solution 1-3 5-43 client reporting Cisco Discovery Protocol parameter illustrated D-5 to D-7 2-7 to 2-9 client location, using WCS viewing traffic information 1-2 to 1-5 2-9 Client Certificate Required parameter viewing neighbors described 2-7 to 2-8 troubleshooting commands 4-66 2-9 2-8 navigating 4-69 to 4-70 4-68 supported devices 2-9 4-39 to 4-43 clients connecting to WLANs 12-14 viewing using the CLI 7-69 to 7-70 Book Title IN-6 78-xxxxx-xx Index using the GUI Console Log Level parameter 7-65 to 7-69 viewing CCX version controller failure detection time, reducing using the CLI 6-42 using the GUI 6-40 to 6-42 baud rate 4-57 versions 3-3 3-4 controllers 4-57 configuration Clients > Detail page configuring client reporting viewing client details clearing D-22 viewing a client’s CCX version erasing 6-41 viewing voice and video settings 7-30 8-22 8-22 saving 7-30, 7-68 viewing the status of workgroup bridges 8-21 connections 1-12 discovery process 4-56 Clients page 7-2 multiple-controller deployment performing a link test viewing clients 7-56 7-66 viewing the status of workgroup bridges viewing voice and video settings Client Type parameter 7-30, 7-31 Community Name parameter conditional web redirect 7-29 4-55 Commands > Reset to Factory Defaults page 4-3 overview 1-7 to 1-8 platforms 1-8 to 1-11 1-4 to 1-5 resetting factory default settings using the CLI 4-3 using the GUI 4-3 single-controller deployment 1-3 to 1-4 synchronizing with location appliance 4-26 types of memory 6-48 configuring upgrading software 6-51 guidelines using the GUI 6-50 using the CLI 8-6 to 8-8 using the GUI 8-4 to 8-5 6-48 Conditional Web Redirect parameter 6-50, 6-51 Configuration File Encryption parameter configuration files 8-17, 8-19 8-2 to 8-3 Controller Spanning Tree Configuration page Controller Time Source Valid parameter Control Path parameter downloading 8-20 to 8-21 using the GUI 8-19 to 8-20 5-69 7-43 country codes commonly used uploading 7-40 configuring using the CLI 8-18 to 8-19 using the CLI using the GUI 8-17 to 8-18 using the configuration wizard configuration wizard running 3-27 11-23 Country Code parameter using the CLI described 4-83 1-15 using the CLI described 7-32 controller network module Clients > AP > Traffic Stream Metrics page Clients > AP page D-9 using the GUI described 4-2 Japanese 4-4 to 4-6 Configure option for RRM override Confirm Password parameter 12-10 10-25 7-43 to 7-46 7-41 to 7-43 7-40 7-47 viewing using the CLI Country page 4-5 7-45 7-41 Book Title 78-xxxxx-xx IN-7 Index Coverage Exception Level per AP parameter coverage hole detection and correction CPU Access Control Lists page 10-4 5-60 CPU ACL Mode parameter 5-60 Current Channel parameter 10-28 Custom Signatures page 10-16 using with local EAP 5-40, 5-45 DHCP configuring using the CLI 6-9 configuring using the GUI 6-8 DHCP Addr. Assignment Required parameter 6-9 DHCP option 43, in controller discovery process 5-109 7-2 DHCP option 82 configuring D described Data Path parameter 11-23 Data Rates parameter 4-15 example date configuring manually 4-10 setting using the CLI 4-11 using the GUI 4-10 5-53 DHCP proxy, configuring 4-22 to 4-23 DHCP Scope > Edit page 6-11 configuring using the CLI 6-12 to 6-13 using the GUI 6-10 to 6-11 described DCA Channel Sensitivity parameter DCA Channels parameter 10-14 debug commands, sending 7-22 10-13 6-10 DHCP Scopes page 6-10 DHCP server discovery 7-2 DHCP Server IP Addr parameter configuring configuring using the configuration wizard D-30 to D-31 7-4 Default Mobility Group parameter Default Routers parameter 11-11 6-11 Delivery Traffic Indication Map (DTIM). See DTIM period Deny Counters parameter Description parameter 5-58 5-31, 12-10 external 6-6 to 6-8 internal 6-6 configuring using the CLI D-17 to D-21 using the GUI D-16 to D-17 described D-15 3-28 Diagnostic Channel parameter DES IPSec data encryption 5-9 directed roam request 5-56 Destination Port parameter Direction parameter 5-57 device certificates 4-41 5-57 disabled clients, configuring a timeout distribution system ports 6-14 7-36 3-4 to 3-5 using the CLI 8-10 to 8-11 Diversity parameter using the GUI 8-9 to 8-10 DNS Domain Name parameter 8-9 D-16 discovery request timer, configuring downloading 4-5 diagnostic channel Designated Root parameter Destination parameter 6-9 DHCP servers D-31 to D-34 default enable password overview 6-9 DHCP Server Override parameter debug facility described 5-52 DHCP scopes 4-10 configuring through NTP server 5-52 to 5-54 10-28 DNS Servers parameter 6-11 6-11 Book Title IN-8 78-xxxxx-xx Index document EAP Profile Name parameter Download button EAP-TLS parameter downloading a CA certificate downloading a configuration file Edit QoS Profile page 8-20 downloading a customized web authentication login page 9-19 downloading a device certificate downloading a signature file 8-10 4-65 4-44 Edit QoS Role Data Rates page Egress Interface parameter Email Input parameter 5-109 4-48 9-27 9-28 Enable AP Local Authentication parameter Download File to Controller page downloading a customized web authentication login page 9-18 downloading CA certificates 5-42 EDCA Profile parameter 8-13 5-44 8-12 Enable Check for All Standard and Custom Signatures parameter 5-110 Enable Controller Management to be accessible from Wireless Clients parameter 2-10, 5-52 downloading configuration files 8-19 Enable Counters parameter downloading device certificates 8-10 Enable Coverage Hole Detection parameter downloading IDS signatures DSCP parameter 5-57 DTIM period, configuring for MAC filtering DTPC Support parameter 5-55 Enable CPU ACL parameter 5-108 6-14 dynamic channel assignment (DCA) Enable Dynamic AP Management parameter 3-40 Enable EAP-FAST Authentication parameter 12-20 4-36 Enable LEAP Authentication parameter 20-MHz channelization 10-4, 10-14 Enable Link Latency parameter 40-MHz channelization 10-4, 10-14 Enable Low Latency MAC parameter configuring Enable Password parameter 4-65 7-5 10-19 to 10-20 Enable Server Status parameter using the GUI 10-12 to 10-15 Encryption Key parameter 6-26 end user license agreement C-2 to C-4 10-3 sensitivity thresholds 7-49 to 7-50 dynamic interface configuring configuring using the CLI 4-65 to 4-66 configuring using the GUI 4-64 to 4-65 enhanced neighbor list using the CLI 3-19 described using the GUI 3-17 to 3-18 request (E2E) described 5-34 enhanced distributed channel access (EDCA) parameters 10-14 dynamic frequency selection 12-19 7-59 using the CLI described 10-15 5-60 Enable IGMP Snooping parameter 4-15 12-18 EoIP port 3-9 dynamic transmit power control, configuring dynamic WEP, configuring 6-20 E EAP-FAST Method Parameters page EAP-FAST parameter 5-42 5-43 4-15 epings 4-40 4-40 11-23, 11-29 11-23, 11-29 erasing the controller configuration 8-22 Ethernet connection, using remotely 2-8 Ethernet Multicast Mode parameter 4-36 European declaration of conformity B-4 to B-5 event reporting for MFP 5-66 Expedited Bandwidth parameter 4-54 Book Title 78-xxxxx-xx IN-9 Index expedited bandwidth requests described Federal Information Processing Standards (FIPS) file transfers 4-51 enabling 5-11 1-14 File Type parameter using the CLI 4-60 downloading a CA certificate using the GUI 4-54 downloading a configuration file Extensible Authentication Protocol (EAP) configuring downloading a device certificate 5-45 to 5-46 timeout and failure counters per access point per client extension channel 5-49 8-5 uploading a configuration file 8-17 8-15 filter, using to view clients Fingerprint parameter 7-66 to 7-67 5-102 flashing LEDs, configuring F 8-10 upgrading controller software uploading PACs 5-49 10-28 8-19 downloading a customized web authentication login page 9-18 6-20 setting local timers 8-12 7-65 foreign controller in inter-subnet roaming Forward Delay parameter factory default settings 3-28, 3-29 Fragmentation Threshold parameter resetting using the CLI 4-3 resetting using the GUI 4-3 Friendly Rogue > Create page FTP server guidelines failover priority for access points 11-4 4-14 5-88 8-2 configuring using the CLI 7-39 using the GUI 7-38 to 7-39 described G General (controller) page 7-37 viewing using the CLI failover protection configuring an RF group 1-15 to 1-16 fake access point detection Fast Ethernet port configuring 802.3 bridging 7-39 5-117 enabling multicast mode 3-4 General (security) page fast heartbeat timer using the CLI 7-36 using the GUI 7-34 gigabit Ethernet port 10-7 3-34 4-35 5-30, 5-117 Generate Password parameter configuring described enabling link aggregation 4-32 9-5 3-4 Global AP Failover Priority parameter 7-38 Global Configuration page 7-32 configuring authentication for access points fast SSID changing configuring using the CLI 4-31 configuring using the GUI 4-31 FCC declaration of conformity B-2 to B-3 configuring backup controllers 7-9 7-33 configuring failover priority for access points configuring global credentials for access points 7-38 7-5 global credentials for access points FCC statement 2100 series controllers B-8 4400 series controllers B-9 configuring using the CLI 7-6 to 7-7 Book Title IN-10 78-xxxxx-xx Index using the GUI described HREAP Groups page 7-4 to 7-6 H-REAP Local Switching parameter 7-4 overriding using the CLI 7-6 using the GUI 7-5 H-REAP Mode AP Fast Heartbeat Timer State parameter 7-34 10-8, 11-17 Group Name parameter 11-12, 12-17 HTTP Access parameter Group Setup page (on CiscoSecure ACS) Guest LAN parameter 9-26 guest N+1 redundancy 11-20 5-22 2-3 HTTPS Access parameter 2-3 hybrid REAP access points supported bandwidth restriction creating as a lobby ambassador 9-4 to 9-6 9-7 using the GUI 9-6 Guest User parameter guest WLAN, creating 5-31, 12-10 9-5 access points using the CLI 12-13 to 12-14 access points using the GUI 12-11 to 12-13 guidelines 12-4 illustrated 12-2 overview enabling wireless connections 2-9 12-2 12-2 hybrid-REAP groups 2-2 backup RADIUS server 2-2 CCKM 2-2 12-15 12-15 configuring H using the CLI 12-20 using the GUI 12-16 to 12-20 described Headline parameter 9-10 Hello Time parameter help, obtaining 12-6 to 12-10 number of access points supported GUI using 12-2 controller using the GUI 5-31, 12-10 Guest User Role parameter 12-2 to 12-4 configuring viewing opening 12-2 authentication process 9-2 to 9-7 guidelines 2-3 HTTP Configuration page guest user accounts using the CLI 12-8 H-REAP Mode AP Fast Heartbeat Timeout parameter 7-34 Group Mode parameter creating 12-17 example 3-28, 3-29 12-15 12-15 local authentication 2-2 Hysteresis parameter hex2pcap sample output 12-16 4-42 D-33 high-density network benefits 10-41 example 10-41 overview I identity networking 10-40 Holdtime parameter configuring 3-28, 4-69 Honeypot access point detection 5-117 HREAP Group Name parameter 12-12 HREAP Groups > Edit page 5-73 to 5-76 described 1-12 to 1-14 overview 5-73 RADIUS attributes 5-74 to 5-76 12-17, 12-18, 12-19 Book Title 78-xxxxx-xx IN-11 Index IDS inter-controller roaming 5-100 described IDS sensors configuring 4-39 example 11-3 using the CLI 5-102 to 5-103 Interface Name parameter using the GUI 5-100 to 5-102 Interface parameter described 6-46, 6-54, 6-56 6-9 interfaces 5-100 and identity networking IDS signature events viewing using the CLI 5-115 to 5-116 assigning WLANs viewing using the GUI 5-111 to 5-113 configuring IDS signatures configuring using the CLI 5-113 to 5-115 using the GUI 5-107 to 5-111 5-75 6-14 using the CLI 3-14 to 3-16 using the GUI 3-12 to 3-13 overview 3-6 to 3-9 Interfaces > Edit page described 5-105 applying an ACL to an interface frequency 5-111 configuring dynamic interfaces MAC frequency pattern creating multiple AP-manager interfaces 5-111 Interfaces > New page 5-111 quiet time Interfaces page 5-111, 5-114 tracking method interference 5-111 uploading or downloading using the GUI 5-107 to 5-109 6-55 3-39 3-17, 3-39 3-12 10-3 Interference threshold parameter 10-17 Internet Group Management Protocol (IGMP) viewing configuring using the CLI 5-115 to 5-116 using the GUI 5-111 to 5-113 IGMP Timeout parameter 4-36 IKE Diffie Hellman Group parameter IKE Phase 1 parameter Index parameter for IDS components described 5-10 4-37 using the GUI 4-36 4-33 inter-subnet mobility 11-7 inter-subnet roaming 5-101 5-66 described 4-40 illustrated 11-3 to 11-4 Interval parameter 5-65 10-13, 10-37 intra-controller roaming Infrastructure MFP Protection parameter Infrastructure Protection parameter 5-69 Infrastructure Validation parameter 5-69 Ingress Interface parameter using the CLI snooping 5-10 infrastructure MFP 5-68 4-39 illustrated 11-2 7-53 Invoke Channel Update Now button 7-61 intelligent power management (IPM) described Inventory page 9-27 Injector Switch MAC Address parameter inline power 3-18 configuring NAC out-of-band integration 5-111, 5-114 measurement interval 5-59 7-63 Invoke Power Update Now button IP Mask parameter 7-63 IPSec parameter 10-13 10-11 4-26 5-9 Book Title IN-12 78-xxxxx-xx Index IPv6 bridging operation configuring 1-6 security using the CLI 6-39 configuring using the GUI 6-38 to 6-39 described described guidelines 6-19 to 6-27 5-2 Layer 2 Security parameter 6-37 6-22, 6-26, 6-50 Layer 3 6-37 IPv6 bridging and IPv4 web authentication example IPv6 Enable parameter 6-38 LWAPP discovery operation 6-39 7-2 1-6 security configuring J described Japanese country codes 6-28 to 6-30 5-3 Layer 3 Security parameter 7-47 Japanese regulations for migrating access points from the -J to the -U regulatory domain 7-46 to ?? for VPN passthrough 6-29 for web authentication for web redirect 6-30 6-50 for wired guest access K 9-27 LDAP Keep Alive Count parameter 11-22 Keep Alive Interval parameter Key Encryption Key (KEK) parameter Key Format parameter Key Index parameter choosing server priority order 11-22 configuring 5-8 6-26 6-26 described using the CLI 5-36 to 5-38 using the GUI 5-33 to 5-36 local EAP methods supported key permutation configuring 5-33, 5-39 LDAP server 6-26, 6-27 assigning to WLANs 6-25 Key Size parameter 5-35 to 5-36 choosing local authentication bind method Key Permutation parameter 6-26 6-26 Key Wrap Format parameter Key Wrap parameter 5-8 using the CLI 5-37 using the GUI 5-34 LDAP Servers > New page 5-8 LDAP Servers page LEAP parameter L LAG Mode on Next Reboot parameter 5-2 3-34 LWAPP discovery 10-14 10-11 configuring 7-65 interpreting D-2 license agreement Lifetime parameter Layer 2 6-11 LEDs Last Auto Channel Assignment parameter Last Power Level Assignment parameter 5-45 5-42 Lease Time parameter LAG. See link aggregation (LAG) 5-33 5-33 LDAP Servers parameter Layer 1 security 5-35 C-2 to C-4 5-31, 9-5, 12-10 Lightweight Access Point Protocol (LWAPP) 7-2 7-2 lightweight mode, reverting to autonomous mode 7-15 Book Title 78-xxxxx-xx IN-13 Index limited warranty Lobby Ambassador Guest Management > Guest Users List page 9-4, 9-6 C-4 to C-6 link aggregation (LAG) configuring neighboring devices described 3-35 local EAP configuring 3-30 to 3-31 enabling using the CLI 3-35 using the GUI 3-34 example 3-33 illustrated 3-32 using the GUI 5-40 to 5-45 described example 5-49 5-38 to 5-40 5-39 viewing information using the CLI verifying settings using the CLI 3-35 Local EAP Authentication parameter Local EAP Profiles > Edit page link latency Local EAP Profiles page configuring 7-60 using the GUI 7-58 to 7-59 described 5-41 Local Management Users page option 7-56 Local Net Users page link test 7-33 5-31, 12-9 5-30, 9-6 configuring using the CLI 5-32 configuring using the GUI 5-29 to 5-32 local user database, capacity 7-55 9-2 location performing calibration using the CLI 7-57 using the GUI 7-56 to 7-57 types of packets 7-55 Link Trap parameter 3-23 Load-based AC parameter 10-37 viewing settings using the CLI 4-83 to 4-86 location appliance installing certificate location-based services location presence 4-51 4-81 to 4-82 synchronizing with controller 4-53 load-based CAC described 7-34 local network users 7-57 described 9-3 9-2 Local Net Users > New page 7-56 5-42 Local Mode AP Fast Heartbeat Timer parameter 3-21 Link Test button 5-44 Local Mode AP Fast Heartbeat Timeout parameter 7-58 Link Status parameter 5-48 Local Management Users > New page using the CLI page 5-45 to 5-49 debugging 3-31 guidelines using the CLI 4-83 10-36 4-84 logical connectivity diagram enabling using the CLI 4-60 using the GUI 4-53 Catalyst 3750G Integrated Wireless LAN Controller Switch E-4 Cisco 28/37/38xx Integrated Services Router lobby ambassador account Cisco WiSM creating using the CLI 9-3 creating using the GUI 9-2 to 9-3 Lobby Ambassador Guest Management > Guest Users List > New page 9-4 E-3 E-2 logs roaming RSNA D-16, D-27 to D-28 D-16, D-27 to D-29 Book Title IN-14 78-xxxxx-xx Index syslog management interface D-16, D-27 to D-29 configuring long preambles described 5-50 enabling on SpectraLink NetLink phones using the CLI 5-51 using the GUI 5-50 using the GUI 3-12 to 3-13 3-6 to 3-7 management over wireless described configuring a static IP address 7-24 enabling memory core dumps 5-52 enabling 7-25 7-22 disabling the reset button guidelines 3-14 described LWAPP-enabled access points debug commands using the CLI using the CLI 5-52 using the GUI 5-52 Master Controller Configuration page 7-24 Master Controller Mode parameter 7-14 Layer 2 discovery Max Age parameter 7-2 MAC addresses displayed on controller GUI receiving debug commands from controller reverting to autonomous mode 7-22 7-15 to 7-16 sending crash information to controller 7-23 sending radio core dumps to controller 7-23 sending SSCs to controller 7-24 Maximum Age parameter 3-29 maximum local database entries configuring using the CLI 5-117 configuring using the GUI 5-117 Maximum Local Database Entries parameter Maximum RF Usage Per AP parameter 7-16 MCS data rates M MAC address of access point, displayed on controller GUI 7-24 MAC filtering 4-18 using the CLI 5-69 to 5-70 using the GUI 5-67 to 5-68 guidelines types 1-15 7-12 message logs configuring described 7-24 Message Authentication Code Key (MACK) parameter 5-8, 5-12 management frame protection (MFP) debugging 11-12 core dumps from converted access points mesh access points 6-14 4-45 memory types 6-13 to 6-14 5-30, 5-117 4-53, 4-55 Member MAC Address parameter DTIM period 7-3 3-28 Max RF Bandwidth parameter configuring on WLANs 7-3 configuring 5-72 5-66 5-65 using the GUI D-7 Management Frame Protection parameter 5-69 Management Frame Protection Settings page 5-66 using the CLI D-13 using the GUI D-9 to D-10 See also system logging 5-70 to 5-72 management frame validation D-10 to D-13 viewing 5-65 to 5-66 viewing settings using the CLI 5-69 Message Logs page D-10 Message parameter for web authentication Metrics Collection parameter 9-10 4-54 Book Title 78-xxxxx-xx IN-15 Index MFP Client Protection parameter 5-68 MFP Frame Validation parameter 5-68 MIC mobility group statistics types 11-16 viewing 6-21, 6-25 migrating access points from the -J to the -U regulatory domain 7-46 to ?? Min Failed Client Count per AP parameter Minimum RSSI parameter 10-16 4-42 using the CLI 11-19 using the GUI 11-16 to 11-19 mobility list described mirror mode. See port mirroring, configuring 11-6 detecting failed members MMH MIC 11-20 number of controllers supported configuring described 6-26, 6-27 ping requests to members 6-25 11-7 11-20 Mobility Multicast Messaging > Edit page MMH Mode parameter 6-26 Mobile Announce messages Mobility Multicast Messaging page 11-7 mobility ping tests, running mobility 11-13 11-29 mobility services information, viewing failover 11-20 overview Mobility Statistics page 11-2 11-22, 11-27 Mobility Anchor Create button Mode parameter 11-23 Mobility Anchors page mpings 11-22 10-18 11-23, 11-29 3-23 multicast groups 11-11 Mobility Group Members > Edit All page 11-13 mobility groups viewing using the CLI 4-38 viewing using the GUI 4-36 Multicast Groups page configuring 4-36 multicast mode using the CLI 11-14 configuring using the configuration wizard using the GUI 4-5 11-11 to 11-13 with one NAT device 11-8 with two NAT devices 11-9 determining when to include controllers difference from RF groups illustrated 4-41, 10-37 Multicast Appliance Mode parameter 11-22, 11-26 Mobility Group Member > New page examples 7-15, 7-24 monitor intervals, configuring using the GUI mobility anchors. See auto-anchor mobility Mobility Anchors option 4-86 11-17 MODE access point button Mobility Anchor Config page 11-14 11-7 10-5 using the GUI 4-35 to 4-36 described 4-33 to 4-34 guidelines 4-35, 7-26 Multicast page 4-36 configuration guidelines 11-5 7-41 configuring 11-7 number of access points supported number of controllers supported prerequisites 4-37 multiple country codes 11-7 messaging among using the CLI 11-5, 11-6 11-5 11-9 to 11-10 using with NAT devices using the CLI 7-44 using the GUI 7-42 to 7-43 multiple country support, using the configuration wizard 4-5 11-8 to 11-9 Book Title IN-16 78-xxxxx-xx Index security N software NAC in-band mode 6-52 12-5 Override Interface ACL parameter oversized access point images using the CLI 6-57 to 6-58 using the GUI 6-54 to 6-57 diagram 7-6, 7-10 5-61 7-25 over-the-air provisioning (OTAP) 7-2 6-52 to 6-53 P 6-53 guidelines 6-53 to 6-54 NAC State parameter P2P Blocking parameter 6-56 password guidelines NAT devices in mobility groups Native VLAN ID parameter 11-8 to 11-9 Netbios Name Servers parameter Netmask parameter for access points 6-11 for local net users 6-11 for PACs 7-5 5-31, 12-10 5-42 peer-to-peer blocking D-35 configuring Omnipeek D-35 Wireshark D-35 Network Mobility Services Protocol (NMSP) active connections 4-77 4-85 modifying the notification interval for clients, RFID tags, and rogues 4-82 viewing counters 4-85 6-11 configuring to obtain time and date setting in the configuration wizard Number of Hits parameter using the CLI 6-18 to 6-19 using the GUI 6-17 to 6-18 described 6-16 examples 6-17 guidelines 6-17, 6-53 Physical Mode parameter 3-22 Physical Status parameter 3-21 pico cell mode NTP server 5-58 configuring 4-10 4-6 using the CLI 10-44 using the GUI 10-42 to 10-43 debugging using the CLI guidelines overview O versions online help, using 2-2 open source terms C-8 OpenSSL license issues operating system 7-9 8-15 PEAP parameter D-35 Network parameter 7-9 for access point authentication 10-18 network analyzer supported software AirMagnet 6-18 Password parameter 12-12 Neighbor Packet Frequency parameter Airopeek 9-21, 9-28 Over-ride Global Credentials parameter configuring described 1-5 Override Global Config parameter NAC out-of-band integration and hybrid REAP 1-5 to 1-6 10-41 10-40 to 10-41 10-42 Pico Cell Mode parameter ping link test C-6 to C-8 ping tests 10-45 10-42 7-55 11-29 PMK cache lifetime timer 6-24 Book Title 78-xxxxx-xx IN-17 Index PMKID caching for external web server 6-24 PoE Status parameter Preauthentication ACL parameter 7-62 Pool End Address parameter Pre-Standard State parameter 6-11 Pool Start Address parameter Port > Configure page priming access points 3-23 to 3-24 Priority parameter 5-34 for wired guest access Port parameter for IDS Profile Details page 5-24 4-29 D-24 Profile Name parameter 9-26 6-4, 9-26, 12-7 protected access credentials (PACs) 5-101 overview ports 8-14 uploading 3-20 to 3-30 on 2100 series controllers 3-2, 3-3, 3-4 using the CLI 8-16 on 4400 series controllers 3-2, 3-3, 3-4 using the GUI 8-15 on Catalyst 3750G Integrated Wireless LAN Controller Switch 3-3, 3-5 on Cisco 28/37/38xx Series Integrated Services Router 3-3 to 3-4, 4-87, 7-19 Ports page 5-11, 5-25 3-29 Privacy Protocol parameter 5-8 for TACACS+ server overview 5-35 Priority Order > Management User page 3-21 on Cisco WiSM 12-17 7-2 Priority Order > Local-Auth page for RADIUS server configuring 7-35 Primary RADIUS Server parameter Port Number parameter for LDAP server 5-62, 6-50 7-63 Primary Controller parameters 6-11 3-21 port mirroring, configuring for controller 9-16, 12-9 using with local EAP Protection Type parameter Protocol parameter 5-67, 10-34 5-56 Protocol Type parameter 3-3, 3-4 5-40, 12-20 4-45 PSK 3-2 to 3-5 configuring 3-20 Power Assignment Leader parameter Power Injector Selection parameter Power Injector State parameter 7-63 6-21 PSK Format parameter 6-23 public key cryptography (PKC), with mobility 7-63 Power Neighbor Count parameter described 10-11 6-23 11-7 10-11 Power over Ethernet (PoE) Q configuring QBSS using the CLI 7-64 using the GUI 7-62 to 7-63 described configuring 1-14, 7-61 Power Over Ethernet (PoE) parameter Power Threshold parameter 3-22 10-11 preauthentication access control list (ACL) applying to a WLAN using the CLI 5-64 using the GUI 5-61 to 5-62 using the CLI 6-35 using the GUI 6-34 to 6-35 described guidelines 6-33 6-33 QoS identity networking levels 5-74 4-43, 6-31 translation values 6-31 Book Title IN-18 78-xxxxx-xx Index with CAC CCX features. SeeCCX radio management 4-50 configuring QoS profiles monitor intervals using the GUI assigning to a WLAN using the CLI 6-32 using the CLI using the GUI 6-31 to 6-32 using the configuration wizard configuring 4-46 using the GUI 4-44 to 4-45 assigning for use with hybrid REAP 12-10 configuring using the CLI 4-49 to 4-50 using the GUI 4-47 to 4-48 QoS Roles for Guest Users page 10-21 configuring using the GUI 10-15 to 10-16 described 4-47 6-32 quarantined VLAN 10-32 using the GUI 10-32 overriding RRM 10-24 to 10-32 10-2 specifying channels 3-12, 3-18 12-4 with NAC out-of-band integration Quarantine parameter for dynamic interface 6-55 using the CLI 10-29 using the GUI 10-25 to 10-29 update interval 3-18 for management interface 10-12 to 10-14 statically assigning channel and transmit power settings 12-8 3-12 NAC out-of-band integration Queue Depth parameter 10-24 using the CLI overview Query Interval parameter 10-4 disabling dynamic channel and power assignment Quality of Service (QoS) parameter with hybrid REAP 10-9 to 10-18 configuring using the CLI debugging configuring 4-6 coverage hole detection QoS roles using 10-18 to 10-21 using the GUI using the CLI 10-18 6-55 5-102 10-6, 10-9 viewing using the CLI 10-22 to 10-23 Wireless > 802.11a/n (or 802.11b/g/n) > RRM > TPC parameter 10-10 radio resource monitoring 4-45 10-2 RADIUS accounting 5-3 authentication R 5-3 configuring radio core dumps 7-23 radio measurement requests configuring 10-38 on the GUI 10-37 viewing status using the CLI 5-50 radio resource management (RRM) benefits using the GUI 5-6 to 5-11 described 5-11 KEK parameter 10-39 5-4 5-3 FIPS standard 10-36 radio preamble 5-11 to 5-14 configuring on ACS on the CLI overview using the CLI MACK parameter 5-12 5-12 server fallback behavior 5-10 using with hybrid REAP 12-15 10-5 Book Title 78-xxxxx-xx IN-19 Index RADIUS accounting attributes viewing information using the CLI 5-17 to 5-18 Redirect URL After Login parameter Refresh-time Interval parameter RF-Network Name parameter 9-10 10-7 RLDP. See Rogue Location Discovery Protocol (RLDP) 4-69 roaming and real-time diagnostics regulatory information for 2100 series controllers B-8 configuring using the CLI for 4400 series controllers B-9 described for lightweight access points B-2 to B-8 logs described Reserved Roaming Bandwidth parameter viewing Reset Link Latency button Re-sync button 4-54, 4-55 alarm 5-104 10-32 RF domain. See RF groups B-5 RF group leader 10-6 RF group name entering 5-81 5-80 5-83 to 5-84 detecting using the CLI 10-35 using the GUI 10-33 to 10-35 5-79 rule-based classification support tagging, location, and containment 10-6 RF groups configuring using the CLI 5-80 using the CLI 5-96 to 5-100 using the GUI 5-91 to 5-95 WCS support for rule-based classification 10-7 using the configuration wizard using the GUI 5-80 viewing and classifying 10-7 4-5 Rogue AP Detail page 10-5 10-5 to 10-6 viewing status 5-83 5-92 Rogue AP Ignore-List page 10-7 difference from mobility groups overview classifying managing 10-8 described 10-34 configuring RLDP RF exposure declaration of conformity viewing 4-41 classification mapping table 11-26 RF Channel Assignment parameter described D-27 to D-28 rogue access points 8-22 reverse path filtering (RPF) D-16 roam reason report 7-59 D-27 to D-30 D-15 Remote Authentication Dial-In User Service. See RADIUS resetting the controller 4-79 to 4-80 5-95 rogue classification rules configuring using the CLI 5-88 to 5-91 configuring using the GUI 5-85 to 5-88 using the CLI 10-9 Rogue Client Detail page using the GUI 10-8 Rogue Location Discovery Protocol (RLDP) 5-93 configuring RFID tags described 4-76 formats supported 4-76 number supported per controller 4-77 tracking using the CLI 5-84 using the GUI 5-83 to 5-84 defined 5-80 Rogue Location Discovery Protocol parameter configuring using the CLI debugging using the CLI 4-78 4-80 Rogue Rule > Edit page 5-83 5-87 Rogue Rules > Priority page 5-88 Book Title IN-20 78-xxxxx-xx Index rogue states connecting 5-81, 5-82 Role Name parameter Role parameter root bridge timeout 4-47 2-7 2-8 Server Address parameter 5-31, 12-10 Server Index (Priority) parameter 3-24 Root Cost parameter 3-28 Root Port parameter 3-28 for LDAP server 5-34 for RADIUS server RSNA logs for TACACS+ server described 5-8, 5-24, 5-34 Server IP Address parameter RRM. See radio resource management (RRM) configuring 5-101 for wireless sniffer D-27 to D-29 Server Key parameter D-16 Rx Sensitivity Threshold parameter 5-8 5-24 D-37 5-44, 12-20 Server Status parameter 10-43 5-9, 5-24 Server Timeout parameter service port S 5-9, 5-25, 5-35 3-5 service-port interface safety warnings configuring A-1 to ?? Save and Reboot button saving configuration settings Scan Threshold parameter Scope Name parameter Search Clients page using the CLI 8-10, 8-13 using the configuration wizard 8-21 using the GUI 4-42 described 6-10 3-11 to 3-13 3-9 configuring 7-35 Secondary RADIUS Server parameter 12-17 secure web mode described using the CLI 6-28 using the GUI 6-27 described 2-2 6-27 Set to Factory Default button enabling 10-18 using the CLI 2-3 Severity Level Filtering parameter using the GUI 2-2 Shared Secret Format parameter Shared Secret parameter security D-8 5-8, 5-24 5-8, 5-24 overview 5-2 Short Preamble Enabled parameter solutions 5-2 to 5-3 short preambles Security Policy Completed parameter LWAPP-enabled access points sending to controller 7-16 5-56 serial port baud rate setting 7-16 7-30 shunned clients described self-signed certificate (SSC) Sequence parameter 12-18 5-103 viewing using the CLI 5-104 using the GUI 5-104 Signature Events Detail page 5-112 Signature Events Summary page 2-8 5-50 5-50 Show Wired Clients option 6-38 Select APs from Current Controller parameter used to authorize access points 4-4 session timeout 7-67 Secondary Controller parameters 3-16 5-111 Signature Events Track Detail page 5-113 Book Title 78-xxxxx-xx IN-21 Index Simple Bind parameter configuring 5-34 sniffing. See wireless sniffing Sniff parameter D-35 D-36 SNMP, configuring using the CLI 6-5 using the GUI 6-4 described 4-25 SNMP community string 6-3 SSL certificate changing default values using the CLI 4-27 changing default values using the GUI 4-26 to 4-27 SNMP v1 / v2c Community > New page SNMP v1 / v2c Community page 4-26 loading using the CLI 2-5 to 2-7 using the GUI ?? to 2-5 Standard Signature > Detail page 4-26 SNMP v3 users Standard Signatures page 5-110 5-109 changing default values using the CLI 4-29 State parameter changing default values using the GUI 4-27 to 4-29 Static Mobility Group Members page SNMP V3 Users > New page SNMP V3 Users page for DHCP scopes 4-28 for guest LANs using the CLI 8-6 to 8-8 for WLANs using the GUI 8-4 to 8-5 STP Mode parameter Source Port parameter 6-11 9-27 for SNMP community 8-2 to 8-3 Source parameter for ACLs 4-27 6-5 3-26 STP Port Designated Bridge parameter 5-56 5-57 Spanning Tree Algorithm parameter 3-29 Spanning Tree Protocol (STP) 3-25 STP Port Designated Port parameter 3-26 3-25 STP Port Forward Transitions Count parameter using the CLI 3-29 to 3-30 STP Port ID parameter using the GUI 3-25 to 3-29 STP Port Path Cost Mode parameter STP Port Priority parameter 3-24 Spanning Tree Specification parameter 3-28 SpectraLink NetLink phones STP State parameter strong passwords enabling long preambles 5-51 configuring using the GUI 5-50 described 3-27 3-26 3-25 7-9 4-86 to ?? 4-86 switch, configuring at the remote site 5-50 Spectralink Voice Priority parameter 4-65 SSC key-hash on Cisco WiSM Switch IP Address (Anchor) parameter 12-5 to 12-6 11-23 SX/LC/T small form-factor plug-in (SFP) modules 6-48 Splash Page Web Redirect parameter 6-50, 6-51 3-4 symmetric mobility tunneling configuring 7-14 SSH, troubleshooting access points SSID 3-26 Supervisor 720 using the CLI splash page web redirect 3-26 3-25 STP Port Path Cost parameter 3-24 spanning-tree root overview 3-25 STP Port Designated Cost parameter STP Port Designated Root parameter configuring described 11-11 Status parameter 4-28 software, upgrading guidelines 5-102, 5-111 D-38 using the CLI 11-28 using the configuration wizard 4-5 Book Title IN-22 78-xxxxx-xx Index using the GUI illustrated overview TACACS+ (Cisco) page (on CiscoSecure ACS) 11-27 to 11-28 TACACS+ Administration .csv page (on CiscoSecure ACS) 5-28, 5-29 11-26 11-25 to 11-27 Symmetric Mobility Tunneling Mode parameter 11-27 telemetry 4-76 Telnet, troubleshooting access points syslog described levels logs terminal emulator settings D-16 text2pcap sample output D-27 to D-29 7-35 D-33 TFTP server guidelines D-8 D-38 2-8 Tertiary Controller parameters D-9 Syslog Facility parameter 5-21 8-2 time, configuring syslog server number supported by controller removing from controller severity level filtering D-8 D-8 4-11 using the GUI 4-10 using the NTP server D-8 Syslog Server IP Address parameter using the CLI 4-10 time-length-values (TLVs), supported for CDP 4-66 to 4-67 D-8 system logging timeout, configuring for disabled clients configuring Time Since Topology Changed parameter using the CLI D-10 to D-13 using the GUI D-7 to D-9 setting severity level 3-28 timestamps, enabling or disabling in log and debug messages D-13 D-9 system logs, viewing using the CLI 6-14 Time to Live for the PAC parameter D-13 5-44, 12-20 time zone T configuring using the CLI 4-12 configuring using the GUI 4-11 TKIP TACACS+ configuring accounting 5-19 authentication authorization 5-18 5-11, 5-25 configuring using the CLI 5-25 to 5-27 using the GUI 5-23 to 5-25 configuring on ACS roles described 6-21 parameter 6-22 Topology Change Count parameter 5-18 choosing authentication priority order described 6-22, 6-24 traffic specifications (TSPEC) request described 4-51 examples 4-51 traffic stream metrics (TSM) configuring 5-19 to 5-23 5-18 to 5-19 5-18, 5-22 viewing administration server logs 3-28 5-27 to 5-29 TACACS+ (Authentication, Authorization, or Accounting) Servers > New page 5-24 TACACS+ (Authentication, Authorization, or Accounting) Servers page 5-23 using the CLI 4-60 using the GUI 4-54 described 4-52 viewing statistics using the CLI 4-62 to 4-64 using the GUI 4-57 to 4-59 Transfer Mode parameter Book Title 78-xxxxx-xx IN-23 Index downloading a CA certificate Upload button 8-13 downloading a configuration file 8-19 downloading a customized web authentication login page 9-18 downloading a device certificate 8-10 upgrading controller software 8-5 uploading a configuration file 8-17 uploading a PAC 4-42 statically assigning using the CLI 10-29 statically assigning using the GUI 10-25 to 10-29 10-28 Transmit Power parameter URL parameter Use AES Key Wrap parameter transmit power threshold, decreasing 5-7 9-3 user accounts, managing 9-1 to 9-20 User Attribute parameter 5-34 User Base DN parameter 5-34 5-35 User Name parameter 5-31, 12-10 Username parameter 7-5, 7-9, 7-10 User Object Type parameter User parameter 10-43 8-15, 8-17 9-17 User Credentials parameter transmit power transmit power levels Upload File from Controller page User Access Mode parameter 8-15 Transition Time parameter 5-109, 8-15 5-34 8-15 User Profile Name parameter 4-28 10-19 troubleshooting access point join process CCXv5 clients problems D-15 to D-30 Validity parameter D-5 to D-7 VCI strings using Telnet or SSH D-38 tunnel attributes and identity networking Tx Power Level Assignment parameter Type parameter V 7-19 to 7-22 6-4, 9-26, 12-7 8-15 7-18 Verify Certificate CN Identity parameter 5-76 10-32 5-43 video settings configuring using the CLI 4-61 using the GUI 4-54 to 4-55 viewing U U-APSD described 4-52 4-62 using the GUI 4-56 5-4 11-23, 11-29 unicast mode 4-55 to 4-59 using the CLI 3-15 using the configuration wizard using the GUI described 4-33 4-5 3-11 to 3-13 3-7 to 3-9 VLAN Identifier parameter unique device identifier (UDI) described using the GUI configuring using the CLI UDP port 4-62 to 4-64 virtual interface viewing status UDP, use in RADIUS using the CLI 7-53 for AP-manager interface for dynamic interface retrieving 3-13 3-17, 3-18 for management interface using the CLI 7-55 using the GUI 7-53 to 7-54 VLAN ID parameter 3-12 6-54, 12-13 VLAN interface. See dynamic interface Book Title IN-24 78-xxxxx-xx Index VLAN Mappings button page assigning per WLAN 12-13 12-13 VLANs using the CLI 9-22 using the GUI 9-21 choosing the default described 3-9 guidelines 3-11 VLAN Support parameter VLAN tag, and identity networking using the GUI 9-10 to 9-11 4-65 4-65 voice-over-IP (VoIP) telephone roaming 9-20 customizing from an external web server 5-75 Voice & Video Optimized parameter Voice RSSI parameter 9-11 to 9-12 customized example 12-12 Voice Optimized parameter using the CLI 4-40 using the CLI 9-17 using the GUI 9-16 to 9-17 default 9-8 downloading a customized login page 10-16 guidelines voice settings configuring using the CLI 4-59 to 4-60 using the GUI 4-53 to 4-54 using the CLI 9-19 using the GUI 9-18 to 9-19 modified default example viewing previewing using the CLI 4-62 to 4-64 using the GUI 4-55 to 4-59 VPN Gateway Address parameter 9-17 9-13 9-10, 9-19 verifying settings using the CLI Web Authentication option 6-29 VPN passthrough 9-20 9-27 Web Authentication Type parameter 9-10, 9-17, 9-19 Web Auth Type parameter 9-21, 9-28 9-7 configuring using the CLI 6-29 web-browser security alert configuring using the GUI 6-29 Web Login page 9-10, 9-16 web mode configuring W warnings translated warranty using the GUI 2-2 2-2 Web Passthrough option C-4 to C-6 webauth bundle 2-3 described A-1 to ?? webauth.tar files using the CLI Web Policy parameter 9-21 web redirect 9-17 9-27 5-62, 6-50 6-48 Web Server IP Address parameter web authentication configuring a WLAN for WEP keys, configuring 6-19 using the CLI 6-30 WGB parameter using the GUI 6-30 WGB Wired Clients page described process 7-29 7-30 wired guest access 9-7 configuration overview 9-7 to 9-9 successful login page 9-17 9-9 web authentication login page 9-25 configuring using the CLI 9-28 to 9-34 Book Title 78-xxxxx-xx IN-25 Index using the GUI described configuring AAA override 9-26 to 9-28 configuring infrastructure MFP for a WLAN 9-23 to 9-25 guidelines 5-79 configuring IPv6 bridging 9-25 6-39 one-controller example 9-24 configuring NAC out-of-band integration two-controller example 9-25 configuring the diagnostic channel wireless sniffing WLANs > Edit (QoS) page configuring 5-68 6-56 D-16 6-34 WLANs > Edit (Security > AAA Servers) page using the GUI prerequisites assigning LDAP servers to a WLAN D-35 to D-37 choosing RADIUS or LDAP servers for external authentication 9-21 D-35 supported software 5-36 D-35 disabling accounting servers on a WLAN WLAN override configuring using the CLI 6-43 configuring using the GUI 6-42 to 6-43 WLAN Override parameter 5-44 WLANs > Edit (Security > Layer 2) page 6-22, 6-26 WLANs > Edit (Security > Layer 3) page 6-42 WLAN Profile parameter enabling local EAP on a WLAN 6-51 5-31, 12-10 applying a preauthentication ACL to a WLAN configuring a WLAN for VPN Passthrough WLANs assigning web login, login failure, and logout pages using the CLI 9-22 using the GUI 9-21 configuring web redirect 6-20 WLANs > Edit page 6-4, 9-26, 12-7 WLANs > New page 6-4, 9-26, 12-7 WLANs page configuring conditional web redirect 6-48 to 6-51 static and dynamic WEP 6-20 connecting clients to 6-3, 11-22 WLAN SSID parameter configuring for guest user creating WLANs creating 6-5 using the GUI 6-3 to 6-5 9-5 12-7 6-4 identifying the guest LAN using the CLI 9-27 creating a centrally switched WLAN 12-14 6-29 6-50 configuring wired guest access checking security settings 5-62 9-26 mapping an access point group to a WLAN 6-46 WMM deleting configuring using the CLI 6-6 using the GUI 6-4 described 1-12, 3-10 to 3-11, 6-3 described 6-33 with CAC 4-50 WMM parameter session timeout configuring described 4-19, 6-34, 6-35 WMM Policy parameter 6-27 splash page web redirect wired security solution 6-34 workgroup bridges (WGBs) 6-27 using the same SSID 4-65 debugging 6-48 described 6-4 1-6 WLANs > Edit (Advanced) page applying an ACL to a WLAN 5-61 7-32 7-26 guidelines 7-26 illustrated 7-26 sample configuration 7-29 Book Title IN-26 78-xxxxx-xx Index viewing status using the CLI 7-31 using the GUI 7-29 to 7-31 world mode 4-15, 4-16 WPA1+WPA2 configuring using the CLI 6-23 using the GUI 6-22 to 6-23 described 6-20 WPA2 Policy parameter WPA Policy parameter 6-22 6-22 Book Title 78-xxxxx-xx IN-27 Index Book Title IN-28 78-xxxxx-xx