Download PDF - This Chapter (845.0 KB)

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
INDEX
802.11b/g/n Cisco APs > Configure page
Numerics
7-51, D-36
802.11 bands
11n Mode parameter
4-18
1250 series access points
and PoE Status field
7-62
7-61
transmit power settings when using PoE
7920 AP CAC parameter
7-61
clients
5-9
7-66
6-35
using the CLI
4-20 to 4-22
using the GUI
4-17 to 4-19
devices
4-17
802.11n (2.4 GHz) High Throughput page
6-33
802.1Q VLAN trunk port
6-33
4-18
3-5
802.1X
802.11a (or 802.11b) > Client Roaming page
4-41
configuring
6-20
802.11a (or 802.11b) > Video Parameters page
4-54
described
802.11a (or 802.11b) > Voice Parameters page
4-53
dynamic key settings
802.11a (or 802.11b/g) > EDCA Parameters page
4-64
802.11a (or 802.11b/g) Global Parameters > Auto RF
page 10-8
802.11a (or 802.11b/g) Global Parameters page
4-14, 10-37
802.11a (or 802.11b/g) Network Status parameter
4-14
802.11a/n (or 802.11b/g/n) Cisco APs > Configure
page 6-42, 10-26
802.11a/n (or 802.11b/g/n) Radios page
802.11a > Pico Cell page
4-14
configuring
6-33
7921 support mode
4-14 to 4-15
802.11n
7920 support mode
described
configuring using the GUI
6-35
7920 Client CAC parameter
configuring
4-15 to 4-17
802.11g Support parameter
operating modes when using PoE
3DES IPSec data encryption
configuring using the CLI
6-21
802.1X+CCKM
configuring
described
6-22
6-21
802.1X authentication for access points
configuring
the switch
4-58, 10-25
10-42
6-20
7-12
using the CLI
7-10 to 7-12
using the GUI
7-9 to 7-10
described
7-7
802.11a > Pico Cell page with pico cell mode V2
parameters 10-42
802.1x Authentication parameter
802.11a > RRM > Coverage page
802.3 bridging
802.11a > RRM > DCA page
10-15
10-12
configuring using the CLI
4-33
configuring using the GUI
4-32 to 4-33
802.11a > RRM > Dynamic Channel Assignment (DCA)
page 10-12
802.3 Bridging parameter
802.11a > RRM > General page
802.3 frames
10-17
802.11a > RRM > Tx Power Control (TPC) page
10-10
7-9
4-33
4-32
802.3X flow control, enabling
4-31
Book Title
78-xxxxx-xx
IN-1
Index
A
AAA override
configuring
using the CLI
5-79
using the GUI
5-78 to 5-79
described
using the CLI
6-46
using the GUI
6-45 to 6-46
described
6-43
illustrated
6-44
access point manager interface, configuring using the
configuration wizard 4-5
access points
5-77
Access Control List Name parameter
5-55
access control lists (ACLs)
20-MHz channelization
10-26
40-MHz channelization
10-26
applying to an interface
assisted roaming
4-40
using the CLI
5-64
authorization list
7-17
using the GUI
5-58 to 5-59
authorizing
applying to a WLAN
using MICs
7-16
using the CLI
5-64
using SSCs
7-16
using the GUI
5-60 to 5-61
using the CLI
7-17
applying to the controller CPU
using the GUI
7-16
using the CLI
5-64
configuring hybrid REAP using the CLI
using the GUI
5-59 to 5-60
embedded
5-62 to 5-64
using the GUI
5-54 to 5-58
counters
configuring using the CLI
5-63
configuring using the GUI
5-55
rules
interpreting
D-2
priming
5-74
Access Control Lists > Edit page
5-57
Access Control Lists > New page
5-55
Access Control Lists > Rules > New page
Access Control Lists page
5-54
access point groups
assigning access points to
using the CLI
6-47
using the GUI
6-47
D-14
B-7 to B-8
supported for use with hybrid REAP
supporting oversized images
12-2
7-25
troubleshooting
5-56
the join process
7-19 to 7-22
using Telnet or SSH
4-27, 4-28
access point event logs, viewing
B-2 to B-8
rules for operating in Taiwan
D-30 to D-31
3-4
7-2
regulatory information
using with the debug facility
creating
7-65
number supported per controller
5-54, 5-56, 5-63
Access Mode parameter
configuring
migrating from the -J regulatory domain to the -U
regulatory domain 7-46 to ??
5-54
identity networking
B-6
LEDs
using the CLI
described
7-13
guidelines for operating in Japan
configuring
12-13 to 12-14
VCI strings
D-38
7-18
verifying that they join the controller
Accounting Server parameters
7-3
6-52
accounting servers, disabling per WLAN
6-51
ACL. See access control lists (ACLs)
ACL Name parameter
5-59, 5-60
Book Title
IN-2
78-xxxxx-xx
Index
ACS server configuration page
Action parameter
active exploits
All APs page
6-49
Allow AAA Override parameter
5-57
Add AAA Client page (on CiscoSecure ACS)
5-5, 5-20
Add Interface-Mapping button
Add New Rule button
Antenna Gain parameter
Antenna parameter
9-17
Admin Status parameter
4-24
Admission Control (ACM) parameter
AES CBS IPSec data encryption
5-9
6-21
Aggregated MAC Protocol Data Unit (A-MPDU)
Aggregated MAC Service Data Unit (A-MSDU)
4-20
4-20
7-13
AP Authentication Policy page
5-67, 10-34
AP Failover Priority parameter
7-39
AP Group Name parameter
4-20
AP Groups VLAN page
AirMagnet Enterprise Analyzer
D-35
AP-manager interface
configuring using the CLI
6-42
configuring using the GUI
6-40
Alarm Trigger Threshold parameter
All APs > Details (Advanced) page
assigning access point groups
using the GUI
3-11 to 3-13
3-7
of four AP-manager interfaces
AP Policies page
7-58
3-37
10-34, 12-12, D-36
7-17
AP Primary Discovery Timeout parameter
7-62
ASLEAP detection
7-9
All APs > Details (H-REAP) page
12-12
All APs > Details (Inventory) page
7-54
asymmetric tunneling
7-34, 7-38
7-34
5-117
Assignment Method parameter
12-11
All APs > Details (High Availability) page
10-34, D-36
3-38
3-36 to 3-40
AP Mode parameter
7-43
3-39
of three AP-manager interfaces
using multiple
4-69
All APs > Details (General) page
3-39 to 3-40
of two AP-manager interfaces
6-47
All APs > Details (Credentials) page
All APs > Details page
3-15
illustration
10-34
All APs > Access Point Name > VLAN Mappings
page 12-13
configuring PoE
using the CLI
described
configuring link latency
6-45
6-45, 6-46, 6-56
creating multiple interfaces
D-35
configuring country codes
6-45, 6-47
configuring
6-25, 6-40
Aironet IEs
configuring CDP
6-45
AP Groups VLAN Feature Enable parameter
aggregation method, specifying
Airopeek
4-58
4-58
AP Group Description parameter
6-22
Aironet IE parameter
10-27
AP > Clients > Traffic Stream Metrics page
AP801 access point
4-53, 4-54
5-44
10-27
AP > Clients page
3-22
5-34, 5-37
10-27
Antenna Type parameter
4-24
administrator usernames and passwords, configuring
AES parameter
10-13
Anonymous Provision parameter
6-46
5-55
Add Web Server button
AES-CCMP
AnchorTime parameter
11-4
anonymous local authentication bind method
12-17
administrator access
5-79
anchor controller in inter-subnet roaming
5-117
Add AP button
10-33, 12-11
10-26, 10-28
11-26
authenticated local authentication bind method
Authentication Priority parameter
Authentication Protocol parameter
Auth Key Mgmt parameter
5-34, 5-37
5-11, 5-25
4-29
6-22
Book Title
78-xxxxx-xx
IN-3
Index
Authority ID Information parameter
Authority ID parameter
Back-up Secondary Controller Name parameter
5-44, 12-20, 12-21
bandwidth-based CAC
5-44, 12-20
Authorize APs Against AAA parameter
described
7-17
Authorize Self Signed Certificate (SSC) parameter
4-50
enabling
7-17
authorizing access points
using the CLI
4-60
4-53
using the CLI
7-17
using the GUI
using the GUI
7-16
Base MAC Address parameter
auto-anchor mobility
Beacon Period parameter
4-14
configuring
Bind Password parameter
5-34
5-34
3-28
using the CLI
11-23 to 11-24
Bind Username parameter
using the GUI
11-21 to 11-23
bootup script for configuration wizard
guidelines
overview
bridge protocol data units (BPDUs)
11-21
Buffered Log Level parameter
11-20 to 11-21
AutoInstall
Burst Data Rate parameter
described
DHCP addresses for interfaces
TFTP server information
D-9
4-45, 4-48
C
4-7
4-7
CAC
4-6
configuring for 7920 phones
selecting configuration file
using
3-24
4-9
obtaining
overview
4-4
4-45, 4-48
Burst Real-Time Rate parameter
4-6, 4-9
example operation
7-34
4-8
described
4-6
6-33
4-50
enabling
auto RF, configuring using the configuration wizard
Average Data Rate parameter
4-6
4-44, 4-48
Average Real-Time Rate parameter
Avoid Cisco AP Load parameter
4-45, 4-48
4-61
using the GUI
4-54
viewing using the CLI
10-13
Avoid Foreign AP Interference parameter
using the CLI
4-62
Canadian compliance statement
10-13, 11-18
Avoid Non-802.11a (802.11b) Noise parameter
B-3
Catalyst 3750G Integrated Wireless LAN Controller
Switch
10-13
described
1-11
logical connectivity diagram and associated software
commands E-4 to E-5
B
ports
backup controllers
CCA Sensitivity Threshold parameter
configuring
10-43
CCKM
using the CLI
7-35 to 7-37
using the GUI
7-33 to 7-35
described
3-3, 3-5
configuring
described
7-32
6-21
hybrid-REAP groups
Back-up Primary Controller IP Address parameter
Back-up Primary Controller Name field
6-22
7-34
7-34
Back-up Secondary Controller IP Address parameter
with mobility
12-15
11-7
CCX
7-34
Book Title
IN-4
78-xxxxx-xx
Index
downloading
configuring Aironet IEs
using the CLI
6-42
using the CLI
8-13 to 8-14
using the GUI
6-40
using the GUI
8-12
described
link test
overview
6-39
8-12
using with local EAP
7-55
viewing a client’s version
5-40, 5-45
Certificate Issuer parameter
5-43
using the CLI
6-42
Certificate Password parameter
using the GUI
6-40 to 6-42
Certificate Type parameter
CCX Layer 2 client roaming
8-10
7-17
Change Rules Priority parameter
configuring
5-88
Channel Assignment Leader parameter
using the CLI
4-42
Channel Assignment Method parameter
using the GUI
4-41 to 4-42
channel bonding in the 5-GHz band
debugging using the CLI
described
Channel parameter
4-43
10-14
10-13
10-27
10-25, D-37
channels
4-40 to 4-41
obtaining information using the CLI
4-43
CCX radio management
configuring
statically assigning using the CLI
10-29
statically assigning using the GUI
10-25 to 10-29
Channel Scan Duration parameter
10-18
using the CLI
10-38
Channel Width parameter
using the GUI
10-37 to 10-38
Check Against CA Certificates parameter
debugging using the CLI
features
Check Certificate Date Validity parameter
10-40
chokepoints for RFID tag tracking
10-36
hybrid-REAP considerations
10-36
obtaining information using the CLI
10-39 to 10-40
CCXv5 clients
CCXv5 Req button
5-101
CIDS Sensors List page
5-100
configuring
described
D-22
CDP > AP Neighbors > Detail page
described
CDP > Global Configuration page
6-22, 6-24
6-22
CDP > Interface Neighbors page
4-71
4-69
4-69
4-70
Certificate Authority (CA) certificates
1-8
1-16 to 1-17
3-2, 3-3, 3-4
Cisco 28/37/38xx Integrated Services Router
described
4-71
CDP Protocol Status parameter
features not supported
ports
4-73
CDP Advertisement Version parameter
B-8
network connections
4-70
4-7
1-8
FCC statement
4-69
CDP > Interface Neighbors > Detail page
CDP AP Neighbors page
4-77
5-104
AutoInstall interfaces
4-72
4-72
CDP > Traffic Metrics page
5-43
Cisco 2100 Series Wireless LAN Controllers
6-41
CDP > AP Neighbors page
5-43
ciphers
4-84
D-15 to D-30
CCX Version parameter
CDP State parameter
CIDS Sensor Add page
CIDS Shun List page
enabling location presence
troubleshooting
10-14, 10-26
1-11
logical connectivity diagram and associated software
commands E-3
ports
3-3, 3-4, 4-87
Book Title
78-xxxxx-xx
IN-5
Index
using
Cisco Wireless Control System (WCS)
4-87
versions
Cisco WiSM
1-11
configuring the Supervisor 720
Cisco 4400 Series Wireless LAN Controllers
AutoInstall interfaces
described
models
4-86
logical connectivity diagram and associated software
commands E-2 to E-3
B-9
3-4
maximum number supported by router chassis
1-17 to 1-18
ports
3-2, 3-3, 3-4
supporting more than 48 access points
Cisco 7920 Wireless IP Phones
6-33
Cisco 7921 Wireless IP Phones
6-33
Cisco AV-pairs
7-14
CKIP
configuring
6-48, 6-49
Cisco Clean Access (CCA)
1-10
3-3, 3-4
SSC key-hash
3-35 to 3-40
Cisco Centralized Key Management (CCKM). See CCKM
using the CLI
6-27
using the GUI
6-25 to 6-26
described
6-52
6-25
Cisco Client Extensions (CCX). See CCX
clearing the controller configuration
Cisco Discovery Protocol (CDP)
Clear Stats button
8-22
11-19
CLI
configuring
basic commands
using the CLI
4-74
using the GUI
4-68 to 4-70
debugging using the CLI
described
4-86 to ??
1-9 to 1-11
guidelines
network connections
ports
described
4-7
1-9
FCC statement
1-2
enabling wireless connections
logging into
4-76
logging out
4-66
enabling using the GUI
sample network
using
using the CLI
4-75 to 4-76
using the GUI
4-70 to 4-74
using the CLI
4-75
using the GUI
4-73
client MFP
Cisco high-power switches
Cisco Logo parameter
9-10
Cisco NAC Appliance
6-52
1-8
5-65
Client Protection parameter
4-70
5-69
configuring using the CLI
D-24 to D-27
configuring using the GUI
D-21 to D-24
described
7-63
CiscoSecure Access Control Server (ACS)
D-15
Client Reporting page
D-23
client roaming, configuring
5-4
Cisco Unified Wireless Network (UWN) Solution
1-3
5-43
client reporting
Cisco Discovery Protocol parameter
illustrated
D-5 to D-7
2-7 to 2-9
client location, using WCS
viewing traffic information
1-2 to 1-5
2-9
Client Certificate Required parameter
viewing neighbors
described
2-7 to 2-8
troubleshooting commands
4-66
2-9
2-8
navigating
4-69 to 4-70
4-68
supported devices
2-9
4-39 to 4-43
clients
connecting to WLANs
12-14
viewing
using the CLI
7-69 to 7-70
Book Title
IN-6
78-xxxxx-xx
Index
using the GUI
Console Log Level parameter
7-65 to 7-69
viewing CCX version
controller failure detection time, reducing
using the CLI
6-42
using the GUI
6-40 to 6-42
baud rate
4-57
versions
3-3
3-4
controllers
4-57
configuration
Clients > Detail page
configuring client reporting
viewing client details
clearing
D-22
viewing a client’s CCX version
erasing
6-41
viewing voice and video settings
7-30
8-22
8-22
saving
7-30, 7-68
viewing the status of workgroup bridges
8-21
connections
1-12
discovery process
4-56
Clients page
7-2
multiple-controller deployment
performing a link test
viewing clients
7-56
7-66
viewing the status of workgroup bridges
viewing voice and video settings
Client Type parameter
7-30, 7-31
Community Name parameter
conditional web redirect
7-29
4-55
Commands > Reset to Factory Defaults page
4-3
overview
1-7 to 1-8
platforms
1-8 to 1-11
1-4 to 1-5
resetting factory default settings
using the CLI
4-3
using the GUI
4-3
single-controller deployment
1-3 to 1-4
synchronizing with location appliance
4-26
types of memory
6-48
configuring
upgrading software
6-51
guidelines
using the GUI
6-50
using the CLI
8-6 to 8-8
using the GUI
8-4 to 8-5
6-48
Conditional Web Redirect parameter
6-50, 6-51
Configuration File Encryption parameter
configuration files
8-17, 8-19
8-2 to 8-3
Controller Spanning Tree Configuration page
Controller Time Source Valid parameter
Control Path parameter
downloading
8-20 to 8-21
using the GUI
8-19 to 8-20
5-69
7-43
country codes
commonly used
uploading
7-40
configuring
using the CLI
8-18 to 8-19
using the CLI
using the GUI
8-17 to 8-18
using the configuration wizard
configuration wizard
running
3-27
11-23
Country Code parameter
using the CLI
described
4-83
1-15
using the CLI
described
7-32
controller network module
Clients > AP > Traffic Stream Metrics page
Clients > AP page
D-9
using the GUI
described
4-2
Japanese
4-4 to 4-6
Configure option for RRM override
Confirm Password parameter
12-10
10-25
7-43 to 7-46
7-41 to 7-43
7-40
7-47
viewing using the CLI
Country page
4-5
7-45
7-41
Book Title
78-xxxxx-xx
IN-7
Index
Coverage Exception Level per AP parameter
coverage hole detection and correction
CPU Access Control Lists page
10-4
5-60
CPU ACL Mode parameter
5-60
Current Channel parameter
10-28
Custom Signatures page
10-16
using with local EAP
5-40, 5-45
DHCP
configuring using the CLI
6-9
configuring using the GUI
6-8
DHCP Addr. Assignment Required parameter
6-9
DHCP option 43, in controller discovery process
5-109
7-2
DHCP option 82
configuring
D
described
Data Path parameter
11-23
Data Rates parameter
4-15
example
date
configuring manually
4-10
setting
using the CLI
4-11
using the GUI
4-10
5-53
DHCP proxy, configuring
4-22 to 4-23
DHCP Scope > Edit page
6-11
configuring
using the CLI
6-12 to 6-13
using the GUI
6-10 to 6-11
described
DCA Channel Sensitivity parameter
DCA Channels parameter
10-14
debug commands, sending
7-22
10-13
6-10
DHCP Scopes page
6-10
DHCP server discovery
7-2
DHCP Server IP Addr parameter
configuring
configuring using the configuration wizard
D-30 to D-31
7-4
Default Mobility Group parameter
Default Routers parameter
11-11
6-11
Delivery Traffic Indication Map (DTIM). See DTIM
period
Deny Counters parameter
Description parameter
5-58
5-31, 12-10
external
6-6 to 6-8
internal
6-6
configuring
using the CLI
D-17 to D-21
using the GUI
D-16 to D-17
described
D-15
3-28
Diagnostic Channel parameter
DES IPSec data encryption
5-9
directed roam request
5-56
Destination Port parameter
Direction parameter
5-57
device certificates
4-41
5-57
disabled clients, configuring a timeout
distribution system ports
6-14
7-36
3-4 to 3-5
using the CLI
8-10 to 8-11
Diversity parameter
using the GUI
8-9 to 8-10
DNS Domain Name parameter
8-9
D-16
discovery request timer, configuring
downloading
4-5
diagnostic channel
Designated Root parameter
Destination parameter
6-9
DHCP servers
D-31 to D-34
default enable password
overview
6-9
DHCP Server Override parameter
debug facility
described
5-52
DHCP scopes
4-10
configuring through NTP server
5-52 to 5-54
10-28
DNS Servers parameter
6-11
6-11
Book Title
IN-8
78-xxxxx-xx
Index
document
EAP Profile Name parameter
Download button
EAP-TLS parameter
downloading a CA certificate
downloading a configuration file
Edit QoS Profile page
8-20
downloading a customized web authentication login
page 9-19
downloading a device certificate
downloading a signature file
8-10
4-65
4-44
Edit QoS Role Data Rates page
Egress Interface parameter
Email Input parameter
5-109
4-48
9-27
9-28
Enable AP Local Authentication parameter
Download File to Controller page
downloading a customized web authentication login
page 9-18
downloading CA certificates
5-42
EDCA Profile parameter
8-13
5-44
8-12
Enable Check for All Standard and Custom Signatures
parameter 5-110
Enable Controller Management to be accessible from
Wireless Clients parameter 2-10, 5-52
downloading configuration files
8-19
Enable Counters parameter
downloading device certificates
8-10
Enable Coverage Hole Detection parameter
downloading IDS signatures
DSCP parameter
5-57
DTIM period, configuring for MAC filtering
DTPC Support parameter
5-55
Enable CPU ACL parameter
5-108
6-14
dynamic channel assignment (DCA)
Enable Dynamic AP Management parameter
3-40
Enable EAP-FAST Authentication parameter
12-20
4-36
Enable LEAP Authentication parameter
20-MHz channelization
10-4, 10-14
Enable Link Latency parameter
40-MHz channelization
10-4, 10-14
Enable Low Latency MAC parameter
configuring
Enable Password parameter
4-65
7-5
10-19 to 10-20
Enable Server Status parameter
using the GUI
10-12 to 10-15
Encryption Key parameter
6-26
end user license agreement
C-2 to C-4
10-3
sensitivity thresholds
7-49 to 7-50
dynamic interface
configuring
configuring using the CLI
4-65 to 4-66
configuring using the GUI
4-64 to 4-65
enhanced neighbor list
using the CLI
3-19
described
using the GUI
3-17 to 3-18
request (E2E)
described
5-34
enhanced distributed channel access (EDCA) parameters
10-14
dynamic frequency selection
12-19
7-59
using the CLI
described
10-15
5-60
Enable IGMP Snooping parameter
4-15
12-18
EoIP port
3-9
dynamic transmit power control, configuring
dynamic WEP, configuring
6-20
E
EAP-FAST Method Parameters page
EAP-FAST parameter
5-42
5-43
4-15
epings
4-40
4-40
11-23, 11-29
11-23, 11-29
erasing the controller configuration
8-22
Ethernet connection, using remotely
2-8
Ethernet Multicast Mode parameter
4-36
European declaration of conformity
B-4 to B-5
event reporting for MFP
5-66
Expedited Bandwidth parameter
4-54
Book Title
78-xxxxx-xx
IN-9
Index
expedited bandwidth requests
described
Federal Information Processing Standards (FIPS)
file transfers
4-51
enabling
5-11
1-14
File Type parameter
using the CLI
4-60
downloading a CA certificate
using the GUI
4-54
downloading a configuration file
Extensible Authentication Protocol (EAP)
configuring
downloading a device certificate
5-45 to 5-46
timeout and failure counters
per access point
per client
extension channel
5-49
8-5
uploading a configuration file
8-17
8-15
filter, using to view clients
Fingerprint parameter
7-66 to 7-67
5-102
flashing LEDs, configuring
F
8-10
upgrading controller software
uploading PACs
5-49
10-28
8-19
downloading a customized web authentication login
page 9-18
6-20
setting local timers
8-12
7-65
foreign controller in inter-subnet roaming
Forward Delay parameter
factory default settings
3-28, 3-29
Fragmentation Threshold parameter
resetting using the CLI
4-3
resetting using the GUI
4-3
Friendly Rogue > Create page
FTP server guidelines
failover priority for access points
11-4
4-14
5-88
8-2
configuring
using the CLI
7-39
using the GUI
7-38 to 7-39
described
G
General (controller) page
7-37
viewing using the CLI
failover protection
configuring an RF group
1-15 to 1-16
fake access point detection
Fast Ethernet port
configuring 802.3 bridging
7-39
5-117
enabling multicast mode
3-4
General (security) page
fast heartbeat timer
using the CLI
7-36
using the GUI
7-34
gigabit Ethernet port
10-7
3-34
4-35
5-30, 5-117
Generate Password parameter
configuring
described
enabling link aggregation
4-32
9-5
3-4
Global AP Failover Priority parameter
7-38
Global Configuration page
7-32
configuring authentication for access points
fast SSID changing
configuring using the CLI
4-31
configuring using the GUI
4-31
FCC declaration of conformity
B-2 to B-3
configuring backup controllers
7-9
7-33
configuring failover priority for access points
configuring global credentials for access points
7-38
7-5
global credentials for access points
FCC statement
2100 series controllers
B-8
4400 series controllers
B-9
configuring
using the CLI
7-6 to 7-7
Book Title
IN-10
78-xxxxx-xx
Index
using the GUI
described
HREAP Groups page
7-4 to 7-6
H-REAP Local Switching parameter
7-4
overriding
using the CLI
7-6
using the GUI
7-5
H-REAP Mode AP Fast Heartbeat Timer State
parameter 7-34
10-8, 11-17
Group Name parameter
11-12, 12-17
HTTP Access parameter
Group Setup page (on CiscoSecure ACS)
Guest LAN parameter
9-26
guest N+1 redundancy
11-20
5-22
2-3
HTTPS Access parameter
2-3
hybrid REAP
access points supported
bandwidth restriction
creating as a lobby ambassador
9-4 to 9-6
9-7
using the GUI
9-6
Guest User parameter
guest WLAN, creating
5-31, 12-10
9-5
access points using the CLI
12-13 to 12-14
access points using the GUI
12-11 to 12-13
guidelines
12-4
illustrated
12-2
overview
enabling wireless connections
2-9
12-2
12-2
hybrid-REAP groups
2-2
backup RADIUS server
2-2
CCKM
2-2
12-15
12-15
configuring
H
using the CLI
12-20
using the GUI
12-16 to 12-20
described
Headline parameter
9-10
Hello Time parameter
help, obtaining
12-6 to 12-10
number of access points supported
GUI
using
12-2
controller using the GUI
5-31, 12-10
Guest User Role parameter
12-2 to 12-4
configuring
viewing
opening
12-2
authentication process
9-2 to 9-7
guidelines
2-3
HTTP Configuration page
guest user accounts
using the CLI
12-8
H-REAP Mode AP Fast Heartbeat Timeout
parameter 7-34
Group Mode parameter
creating
12-17
example
3-28, 3-29
12-15
12-15
local authentication
2-2
Hysteresis parameter
hex2pcap sample output
12-16
4-42
D-33
high-density network
benefits
10-41
example
10-41
overview
I
identity networking
10-40
Holdtime parameter
configuring
3-28, 4-69
Honeypot access point detection
5-117
HREAP Group Name parameter
12-12
HREAP Groups > Edit page
5-73 to 5-76
described
1-12 to 1-14
overview
5-73
RADIUS attributes
5-74 to 5-76
12-17, 12-18, 12-19
Book Title
78-xxxxx-xx
IN-11
Index
IDS
inter-controller roaming
5-100
described
IDS sensors
configuring
4-39
example
11-3
using the CLI
5-102 to 5-103
Interface Name parameter
using the GUI
5-100 to 5-102
Interface parameter
described
6-46, 6-54, 6-56
6-9
interfaces
5-100
and identity networking
IDS signature events
viewing using the CLI
5-115 to 5-116
assigning WLANs
viewing using the GUI
5-111 to 5-113
configuring
IDS signatures
configuring
using the CLI
5-113 to 5-115
using the GUI
5-107 to 5-111
5-75
6-14
using the CLI
3-14 to 3-16
using the GUI
3-12 to 3-13
overview
3-6 to 3-9
Interfaces > Edit page
described
5-105
applying an ACL to an interface
frequency
5-111
configuring dynamic interfaces
MAC frequency
pattern
creating multiple AP-manager interfaces
5-111
Interfaces > New page
5-111
quiet time
Interfaces page
5-111, 5-114
tracking method
interference
5-111
uploading or downloading using the
GUI 5-107 to 5-109
6-55
3-39
3-17, 3-39
3-12
10-3
Interference threshold parameter
10-17
Internet Group Management Protocol (IGMP)
viewing
configuring
using the CLI
5-115 to 5-116
using the GUI
5-111 to 5-113
IGMP Timeout parameter
4-36
IKE Diffie Hellman Group parameter
IKE Phase 1 parameter
Index parameter for IDS
components
described
5-10
4-37
using the GUI
4-36
4-33
inter-subnet mobility
11-7
inter-subnet roaming
5-101
5-66
described
4-40
illustrated
11-3 to 11-4
Interval parameter
5-65
10-13, 10-37
intra-controller roaming
Infrastructure MFP Protection parameter
Infrastructure Protection parameter
5-69
Infrastructure Validation parameter
5-69
Ingress Interface parameter
using the CLI
snooping
5-10
infrastructure MFP
5-68
4-39
illustrated
11-2
7-53
Invoke Channel Update Now button
7-61
intelligent power management (IPM)
described
Inventory page
9-27
Injector Switch MAC Address parameter
inline power
3-18
configuring NAC out-of-band integration
5-111, 5-114
measurement interval
5-59
7-63
Invoke Power Update Now button
IP Mask parameter
7-63
IPSec parameter
10-13
10-11
4-26
5-9
Book Title
IN-12
78-xxxxx-xx
Index
IPv6 bridging
operation
configuring
1-6
security
using the CLI
6-39
configuring
using the GUI
6-38 to 6-39
described
described
guidelines
6-19 to 6-27
5-2
Layer 2 Security parameter
6-37
6-22, 6-26, 6-50
Layer 3
6-37
IPv6 bridging and IPv4 web authentication example
IPv6 Enable parameter
6-38
LWAPP discovery
operation
6-39
7-2
1-6
security
configuring
J
described
Japanese country codes
6-28 to 6-30
5-3
Layer 3 Security parameter
7-47
Japanese regulations for migrating access points from the
-J to the -U regulatory domain 7-46 to ??
for VPN passthrough
6-29
for web authentication
for web redirect
6-30
6-50
for wired guest access
K
9-27
LDAP
Keep Alive Count parameter
11-22
Keep Alive Interval parameter
Key Encryption Key (KEK) parameter
Key Format parameter
Key Index parameter
choosing server priority order
11-22
configuring
5-8
6-26
6-26
described
using the CLI
5-36 to 5-38
using the GUI
5-33 to 5-36
local EAP methods supported
key permutation
configuring
5-33, 5-39
LDAP server
6-26, 6-27
assigning to WLANs
6-25
Key Size parameter
5-35 to 5-36
choosing local authentication bind method
Key Permutation parameter
6-26
6-26
Key Wrap Format parameter
Key Wrap parameter
5-8
using the CLI
5-37
using the GUI
5-34
LDAP Servers > New page
5-8
LDAP Servers page
LEAP parameter
L
LAG Mode on Next Reboot parameter
5-2
3-34
LWAPP discovery
10-14
10-11
configuring
7-65
interpreting
D-2
license agreement
Lifetime parameter
Layer 2
6-11
LEDs
Last Auto Channel Assignment parameter
Last Power Level Assignment parameter
5-45
5-42
Lease Time parameter
LAG. See link aggregation (LAG)
5-33
5-33
LDAP Servers parameter
Layer 1 security
5-35
C-2 to C-4
5-31, 9-5, 12-10
Lightweight Access Point Protocol (LWAPP)
7-2
7-2
lightweight mode, reverting to autonomous mode
7-15
Book Title
78-xxxxx-xx
IN-13
Index
limited warranty
Lobby Ambassador Guest Management > Guest Users List
page 9-4, 9-6
C-4 to C-6
link aggregation (LAG)
configuring neighboring devices
described
3-35
local EAP
configuring
3-30 to 3-31
enabling
using the CLI
3-35
using the GUI
3-34
example
3-33
illustrated
3-32
using the GUI
5-40 to 5-45
described
example
5-49
5-38 to 5-40
5-39
viewing information using the CLI
verifying settings using the CLI
3-35
Local EAP Authentication parameter
Local EAP Profiles > Edit page
link latency
Local EAP Profiles page
configuring
7-60
using the GUI
7-58 to 7-59
described
5-41
Local Management Users page
option
7-56
Local Net Users page
link test
7-33
5-31, 12-9
5-30, 9-6
configuring using the CLI
5-32
configuring using the GUI
5-29 to 5-32
local user database, capacity
7-55
9-2
location
performing
calibration
using the CLI
7-57
using the GUI
7-56 to 7-57
types of packets
7-55
Link Trap parameter
3-23
Load-based AC parameter
10-37
viewing settings using the CLI
4-83 to 4-86
location appliance
installing certificate
location-based services
location presence
4-51
4-81 to 4-82
synchronizing with controller
4-53
load-based CAC
described
7-34
local network users
7-57
described
9-3
9-2
Local Net Users > New page
7-56
5-42
Local Mode AP Fast Heartbeat Timer parameter
3-21
Link Test
button
5-44
Local Mode AP Fast Heartbeat Timeout parameter
7-58
Link Status parameter
5-48
Local Management Users > New page
using the CLI
page
5-45 to 5-49
debugging
3-31
guidelines
using the CLI
4-83
10-36
4-84
logical connectivity diagram
enabling
using the CLI
4-60
using the GUI
4-53
Catalyst 3750G Integrated Wireless LAN Controller
Switch E-4
Cisco 28/37/38xx Integrated Services Router
lobby ambassador account
Cisco WiSM
creating using the CLI
9-3
creating using the GUI
9-2 to 9-3
Lobby Ambassador Guest Management > Guest Users List
> New page 9-4
E-3
E-2
logs
roaming
RSNA
D-16, D-27 to D-28
D-16, D-27 to D-29
Book Title
IN-14
78-xxxxx-xx
Index
syslog
management interface
D-16, D-27 to D-29
configuring
long preambles
described
5-50
enabling on SpectraLink NetLink phones
using the CLI
5-51
using the GUI
5-50
using the GUI
3-12 to 3-13
3-6 to 3-7
management over wireless
described
configuring a static IP address
7-24
enabling memory core dumps
5-52
enabling
7-25
7-22
disabling the reset button
guidelines
3-14
described
LWAPP-enabled access points
debug commands
using the CLI
using the CLI
5-52
using the GUI
5-52
Master Controller Configuration page
7-24
Master Controller Mode parameter
7-14
Layer 2 discovery
Max Age parameter
7-2
MAC addresses displayed on controller GUI
receiving debug commands from controller
reverting to autonomous mode
7-22
7-15 to 7-16
sending crash information to controller
7-23
sending radio core dumps to controller
7-23
sending SSCs to controller
7-24
Maximum Age parameter
3-29
maximum local database entries
configuring using the CLI
5-117
configuring using the GUI
5-117
Maximum Local Database Entries parameter
Maximum RF Usage Per AP parameter
7-16
MCS data rates
M
MAC address of access point, displayed on controller
GUI 7-24
MAC filtering
4-18
using the CLI
5-69 to 5-70
using the GUI
5-67 to 5-68
guidelines
types
1-15
7-12
message logs
configuring
described
7-24
Message Authentication Code Key (MACK)
parameter 5-8, 5-12
management frame protection (MFP)
debugging
11-12
core dumps from converted access points
mesh access points
6-14
4-45
memory
types
6-13 to 6-14
5-30, 5-117
4-53, 4-55
Member MAC Address parameter
DTIM period
7-3
3-28
Max RF Bandwidth parameter
configuring on WLANs
7-3
configuring
5-72
5-66
5-65
using the GUI
D-7
Management Frame Protection parameter
5-69
Management Frame Protection Settings page
5-66
using the CLI
D-13
using the GUI
D-9 to D-10
See also system logging
5-70 to 5-72
management frame validation
D-10 to D-13
viewing
5-65 to 5-66
viewing settings
using the CLI
5-69
Message Logs page
D-10
Message parameter for web authentication
Metrics Collection parameter
9-10
4-54
Book Title
78-xxxxx-xx
IN-15
Index
MFP Client Protection parameter
5-68
MFP Frame Validation parameter
5-68
MIC
mobility group statistics
types
11-16
viewing
6-21, 6-25
migrating access points from the -J to the -U regulatory
domain 7-46 to ??
Min Failed Client Count per AP parameter
Minimum RSSI parameter
10-16
4-42
using the CLI
11-19
using the GUI
11-16 to 11-19
mobility list
described
mirror mode. See port mirroring, configuring
11-6
detecting failed members
MMH MIC
11-20
number of controllers supported
configuring
described
6-26, 6-27
ping requests to members
6-25
11-7
11-20
Mobility Multicast Messaging > Edit page
MMH Mode parameter
6-26
Mobile Announce messages
Mobility Multicast Messaging page
11-7
mobility ping tests, running
mobility
11-13
11-29
mobility services information, viewing
failover
11-20
overview
Mobility Statistics page
11-2
11-22, 11-27
Mobility Anchor Create button
Mode parameter
11-23
Mobility Anchors page
mpings
11-22
10-18
11-23, 11-29
3-23
multicast groups
11-11
Mobility Group Members > Edit All page
11-13
mobility groups
viewing using the CLI
4-38
viewing using the GUI
4-36
Multicast Groups page
configuring
4-36
multicast mode
using the CLI
11-14
configuring
using the configuration wizard
using the GUI
4-5
11-11 to 11-13
with one NAT device
11-8
with two NAT devices
11-9
determining when to include controllers
difference from RF groups
illustrated
4-41, 10-37
Multicast Appliance Mode parameter
11-22, 11-26
Mobility Group Member > New page
examples
7-15, 7-24
monitor intervals, configuring using the GUI
mobility anchors. See auto-anchor mobility
Mobility Anchors option
4-86
11-17
MODE access point button
Mobility Anchor Config page
11-14
11-7
10-5
using the GUI
4-35 to 4-36
described
4-33 to 4-34
guidelines
4-35, 7-26
Multicast page
4-36
configuration guidelines
11-5
7-41
configuring
11-7
number of access points supported
number of controllers supported
prerequisites
4-37
multiple country codes
11-7
messaging among
using the CLI
11-5, 11-6
11-5
11-9 to 11-10
using with NAT devices
using the CLI
7-44
using the GUI
7-42 to 7-43
multiple country support, using the configuration
wizard 4-5
11-8 to 11-9
Book Title
IN-16
78-xxxxx-xx
Index
security
N
software
NAC in-band mode
6-52
12-5
Override Interface ACL parameter
oversized access point images
using the CLI
6-57 to 6-58
using the GUI
6-54 to 6-57
diagram
7-6, 7-10
5-61
7-25
over-the-air provisioning (OTAP)
7-2
6-52 to 6-53
P
6-53
guidelines
6-53 to 6-54
NAC State parameter
P2P Blocking parameter
6-56
password guidelines
NAT devices in mobility groups
Native VLAN ID parameter
11-8 to 11-9
Netbios Name Servers parameter
Netmask parameter
for access points
6-11
for local net users
6-11
for PACs
7-5
5-31, 12-10
5-42
peer-to-peer blocking
D-35
configuring
Omnipeek
D-35
Wireshark
D-35
Network Mobility Services Protocol (NMSP)
active connections
4-77
4-85
modifying the notification interval for clients, RFID
tags, and rogues 4-82
viewing counters
4-85
6-11
configuring to obtain time and date
setting in the configuration wizard
Number of Hits parameter
using the CLI
6-18 to 6-19
using the GUI
6-17 to 6-18
described
6-16
examples
6-17
guidelines
6-17, 6-53
Physical Mode parameter
3-22
Physical Status parameter
3-21
pico cell mode
NTP server
5-58
configuring
4-10
4-6
using the CLI
10-44
using the GUI
10-42 to 10-43
debugging using the CLI
guidelines
overview
O
versions
online help, using
2-2
open source terms
C-8
OpenSSL license issues
operating system
7-9
8-15
PEAP parameter
D-35
Network parameter
7-9
for access point authentication
10-18
network analyzer supported software
AirMagnet
6-18
Password parameter
12-12
Neighbor Packet Frequency parameter
Airopeek
9-21, 9-28
Over-ride Global Credentials parameter
configuring
described
1-5
Override Global Config parameter
NAC out-of-band integration
and hybrid REAP
1-5 to 1-6
10-41
10-40 to 10-41
10-42
Pico Cell Mode parameter
ping link test
C-6 to C-8
ping tests
10-45
10-42
7-55
11-29
PMK cache lifetime timer
6-24
Book Title
78-xxxxx-xx
IN-17
Index
PMKID caching
for external web server
6-24
PoE Status parameter
Preauthentication ACL parameter
7-62
Pool End Address parameter
Pre-Standard State parameter
6-11
Pool Start Address parameter
Port > Configure page
priming access points
3-23 to 3-24
Priority parameter
5-34
for wired guest access
Port parameter for IDS
Profile Details page
5-24
4-29
D-24
Profile Name parameter
9-26
6-4, 9-26, 12-7
protected access credentials (PACs)
5-101
overview
ports
8-14
uploading
3-20 to 3-30
on 2100 series controllers
3-2, 3-3, 3-4
using the CLI
8-16
on 4400 series controllers
3-2, 3-3, 3-4
using the GUI
8-15
on Catalyst 3750G Integrated Wireless LAN
Controller Switch 3-3, 3-5
on Cisco 28/37/38xx Series Integrated Services
Router 3-3 to 3-4, 4-87, 7-19
Ports page
5-11, 5-25
3-29
Privacy Protocol parameter
5-8
for TACACS+ server
overview
5-35
Priority Order > Management User page
3-21
on Cisco WiSM
12-17
7-2
Priority Order > Local-Auth page
for RADIUS server
configuring
7-35
Primary RADIUS Server parameter
Port Number parameter
for LDAP server
5-62, 6-50
7-63
Primary Controller parameters
6-11
3-21
port mirroring, configuring
for controller
9-16, 12-9
using with local EAP
Protection Type parameter
Protocol parameter
5-67, 10-34
5-56
Protocol Type parameter
3-3, 3-4
5-40, 12-20
4-45
PSK
3-2 to 3-5
configuring
3-20
Power Assignment Leader parameter
Power Injector Selection parameter
Power Injector State parameter
7-63
6-21
PSK Format parameter
6-23
public key cryptography (PKC), with mobility
7-63
Power Neighbor Count parameter
described
10-11
6-23
11-7
10-11
Power over Ethernet (PoE)
Q
configuring
QBSS
using the CLI
7-64
using the GUI
7-62 to 7-63
described
configuring
1-14, 7-61
Power Over Ethernet (PoE) parameter
Power Threshold parameter
3-22
10-11
preauthentication access control list (ACL)
applying to a WLAN
using the CLI
5-64
using the GUI
5-61 to 5-62
using the CLI
6-35
using the GUI
6-34 to 6-35
described
guidelines
6-33
6-33
QoS
identity networking
levels
5-74
4-43, 6-31
translation values
6-31
Book Title
IN-18
78-xxxxx-xx
Index
with CAC
CCX features. SeeCCX radio management
4-50
configuring
QoS profiles
monitor intervals using the GUI
assigning to a WLAN
using the CLI
6-32
using the CLI
using the GUI
6-31 to 6-32
using the configuration wizard
configuring
4-46
using the GUI
4-44 to 4-45
assigning for use with hybrid REAP
12-10
configuring
using the CLI
4-49 to 4-50
using the GUI
4-47 to 4-48
QoS Roles for Guest Users page
10-21
configuring using the GUI
10-15 to 10-16
described
4-47
6-32
quarantined VLAN
10-32
using the GUI
10-32
overriding RRM
10-24 to 10-32
10-2
specifying channels
3-12, 3-18
12-4
with NAC out-of-band integration
Quarantine parameter
for dynamic interface
6-55
using the CLI
10-29
using the GUI
10-25 to 10-29
update interval
3-18
for management interface
10-12 to 10-14
statically assigning channel and transmit power
settings
12-8
3-12
NAC out-of-band integration
Queue Depth parameter
10-24
using the CLI
overview
Query Interval parameter
10-4
disabling dynamic channel and power assignment
Quality of Service (QoS) parameter
with hybrid REAP
10-9 to 10-18
configuring using the CLI
debugging
configuring
4-6
coverage hole detection
QoS roles
using
10-18 to 10-21
using the GUI
using the CLI
10-18
6-55
5-102
10-6, 10-9
viewing using the CLI
10-22 to 10-23
Wireless > 802.11a/n (or 802.11b/g/n) > RRM > TPC
parameter 10-10
radio resource monitoring
4-45
10-2
RADIUS
accounting
5-3
authentication
R
5-3
configuring
radio core dumps
7-23
radio measurement requests
configuring
10-38
on the GUI
10-37
viewing status using the CLI
5-50
radio resource management (RRM)
benefits
using the GUI
5-6 to 5-11
described
5-11
KEK parameter
10-39
5-4
5-3
FIPS standard
10-36
radio preamble
5-11 to 5-14
configuring on ACS
on the CLI
overview
using the CLI
MACK parameter
5-12
5-12
server fallback behavior
5-10
using with hybrid REAP
12-15
10-5
Book Title
78-xxxxx-xx
IN-19
Index
RADIUS accounting attributes
viewing information using the CLI
5-17 to 5-18
Redirect URL After Login parameter
Refresh-time Interval parameter
RF-Network Name parameter
9-10
10-7
RLDP. See Rogue Location Discovery Protocol (RLDP)
4-69
roaming and real-time diagnostics
regulatory information
for 2100 series controllers
B-8
configuring using the CLI
for 4400 series controllers
B-9
described
for lightweight access points
B-2 to B-8
logs
described
Reserved Roaming Bandwidth parameter
viewing
Reset Link Latency button
Re-sync button
4-54, 4-55
alarm
5-104
10-32
RF domain. See RF groups
B-5
RF group leader
10-6
RF group name
entering
5-81
5-80
5-83 to 5-84
detecting
using the CLI
10-35
using the GUI
10-33 to 10-35
5-79
rule-based classification support
tagging, location, and containment
10-6
RF groups
configuring
using the CLI
5-80
using the CLI
5-96 to 5-100
using the GUI
5-91 to 5-95
WCS support for rule-based classification
10-7
using the configuration wizard
using the GUI
5-80
viewing and classifying
10-7
4-5
Rogue AP Detail page
10-5
10-5 to 10-6
viewing status
5-83
5-92
Rogue AP Ignore-List page
10-7
difference from mobility groups
overview
classifying
managing
10-8
described
10-34
configuring RLDP
RF exposure declaration of conformity
viewing
4-41
classification mapping table
11-26
RF Channel Assignment parameter
described
D-27 to D-28
rogue access points
8-22
reverse path filtering (RPF)
D-16
roam reason report
7-59
D-27 to D-30
D-15
Remote Authentication Dial-In User Service. See RADIUS
resetting the controller
4-79 to 4-80
5-95
rogue classification rules
configuring using the CLI
5-88 to 5-91
configuring using the GUI
5-85 to 5-88
using the CLI
10-9
Rogue Client Detail page
using the GUI
10-8
Rogue Location Discovery Protocol (RLDP)
5-93
configuring
RFID tags
described
4-76
formats supported
4-76
number supported per controller
4-77
tracking
using the CLI
5-84
using the GUI
5-83 to 5-84
defined
5-80
Rogue Location Discovery Protocol parameter
configuring using the CLI
debugging using the CLI
4-78
4-80
Rogue Rule > Edit page
5-83
5-87
Rogue Rules > Priority page
5-88
Book Title
IN-20
78-xxxxx-xx
Index
rogue states
connecting
5-81, 5-82
Role Name parameter
Role parameter
root bridge
timeout
4-47
2-7
2-8
Server Address parameter
5-31, 12-10
Server Index (Priority) parameter
3-24
Root Cost parameter
3-28
Root Port parameter
3-28
for LDAP server
5-34
for RADIUS server
RSNA logs
for TACACS+ server
described
5-8, 5-24, 5-34
Server IP Address parameter
RRM. See radio resource management (RRM)
configuring
5-101
for wireless sniffer
D-27 to D-29
Server Key parameter
D-16
Rx Sensitivity Threshold parameter
5-8
5-24
D-37
5-44, 12-20
Server Status parameter
10-43
5-9, 5-24
Server Timeout parameter
service port
S
5-9, 5-25, 5-35
3-5
service-port interface
safety warnings
configuring
A-1 to ??
Save and Reboot button
saving configuration settings
Scan Threshold parameter
Scope Name parameter
Search Clients page
using the CLI
8-10, 8-13
using the configuration wizard
8-21
using the GUI
4-42
described
6-10
3-11 to 3-13
3-9
configuring
7-35
Secondary RADIUS Server parameter
12-17
secure web mode
described
using the CLI
6-28
using the GUI
6-27
described
2-2
6-27
Set to Factory Default button
enabling
10-18
using the CLI
2-3
Severity Level Filtering parameter
using the GUI
2-2
Shared Secret Format parameter
Shared Secret parameter
security
D-8
5-8, 5-24
5-8, 5-24
overview
5-2
Short Preamble Enabled parameter
solutions
5-2 to 5-3
short preambles
Security Policy Completed parameter
LWAPP-enabled access points sending to
controller 7-16
5-56
serial port
baud rate setting
7-16
7-30
shunned clients
described
self-signed certificate (SSC)
Sequence parameter
12-18
5-103
viewing
using the CLI
5-104
using the GUI
5-104
Signature Events Detail page
5-112
Signature Events Summary page
2-8
5-50
5-50
Show Wired Clients option
6-38
Select APs from Current Controller parameter
used to authorize access points
4-4
session timeout
7-67
Secondary Controller parameters
3-16
5-111
Signature Events Track Detail page
5-113
Book Title
78-xxxxx-xx
IN-21
Index
Simple Bind parameter
configuring
5-34
sniffing. See wireless sniffing
Sniff parameter
D-35
D-36
SNMP, configuring
using the CLI
6-5
using the GUI
6-4
described
4-25
SNMP community string
6-3
SSL certificate
changing default values using the CLI
4-27
changing default values using the GUI
4-26 to 4-27
SNMP v1 / v2c Community > New page
SNMP v1 / v2c Community page
4-26
loading
using the CLI
2-5 to 2-7
using the GUI
?? to 2-5
Standard Signature > Detail page
4-26
SNMP v3 users
Standard Signatures page
5-110
5-109
changing default values using the CLI
4-29
State parameter
changing default values using the GUI
4-27 to 4-29
Static Mobility Group Members page
SNMP V3 Users > New page
SNMP V3 Users page
for DHCP scopes
4-28
for guest LANs
using the CLI
8-6 to 8-8
for WLANs
using the GUI
8-4 to 8-5
STP Mode parameter
Source Port parameter
6-11
9-27
for SNMP community
8-2 to 8-3
Source parameter for ACLs
4-27
6-5
3-26
STP Port Designated Bridge parameter
5-56
5-57
Spanning Tree Algorithm parameter
3-29
Spanning Tree Protocol (STP)
3-25
STP Port Designated Port parameter
3-26
3-25
STP Port Forward Transitions Count parameter
using the CLI
3-29 to 3-30
STP Port ID parameter
using the GUI
3-25 to 3-29
STP Port Path Cost Mode parameter
STP Port Priority parameter
3-24
Spanning Tree Specification parameter
3-28
SpectraLink NetLink phones
STP State parameter
strong passwords
enabling long preambles
5-51
configuring
using the GUI
5-50
described
3-27
3-26
3-25
7-9
4-86 to ??
4-86
switch, configuring at the remote site
5-50
Spectralink Voice Priority parameter
4-65
SSC key-hash on Cisco WiSM
Switch IP Address (Anchor) parameter
12-5 to 12-6
11-23
SX/LC/T small form-factor plug-in (SFP) modules
6-48
Splash Page Web Redirect parameter
6-50, 6-51
3-4
symmetric mobility tunneling
configuring
7-14
SSH, troubleshooting access points
SSID
3-26
Supervisor 720
using the CLI
splash page web redirect
3-26
3-25
STP Port Path Cost parameter
3-24
spanning-tree root
overview
3-25
STP Port Designated Cost parameter
STP Port Designated Root parameter
configuring
described
11-11
Status parameter
4-28
software, upgrading
guidelines
5-102, 5-111
D-38
using the CLI
11-28
using the configuration wizard
4-5
Book Title
IN-22
78-xxxxx-xx
Index
using the GUI
illustrated
overview
TACACS+ (Cisco) page (on CiscoSecure ACS)
11-27 to 11-28
TACACS+ Administration .csv page (on CiscoSecure
ACS) 5-28, 5-29
11-26
11-25 to 11-27
Symmetric Mobility Tunneling Mode parameter
11-27
telemetry
4-76
Telnet, troubleshooting access points
syslog
described
levels
logs
terminal emulator settings
D-16
text2pcap sample output
D-27 to D-29
7-35
D-33
TFTP server guidelines
D-8
D-38
2-8
Tertiary Controller parameters
D-9
Syslog Facility parameter
5-21
8-2
time, configuring
syslog server
number supported by controller
removing from controller
severity level filtering
D-8
D-8
4-11
using the GUI
4-10
using the NTP server
D-8
Syslog Server IP Address parameter
using the CLI
4-10
time-length-values (TLVs), supported for
CDP 4-66 to 4-67
D-8
system logging
timeout, configuring for disabled clients
configuring
Time Since Topology Changed parameter
using the CLI
D-10 to D-13
using the GUI
D-7 to D-9
setting severity level
3-28
timestamps, enabling or disabling in log and debug
messages D-13
D-9
system logs, viewing using the CLI
6-14
Time to Live for the PAC parameter
D-13
5-44, 12-20
time zone
T
configuring using the CLI
4-12
configuring using the GUI
4-11
TKIP
TACACS+
configuring
accounting
5-19
authentication
authorization
5-18
5-11, 5-25
configuring
using the CLI
5-25 to 5-27
using the GUI
5-23 to 5-25
configuring on ACS
roles
described
6-21
parameter
6-22
Topology Change Count parameter
5-18
choosing authentication priority order
described
6-22, 6-24
traffic specifications (TSPEC) request
described
4-51
examples
4-51
traffic stream metrics (TSM)
configuring
5-19 to 5-23
5-18 to 5-19
5-18, 5-22
viewing administration server logs
3-28
5-27 to 5-29
TACACS+ (Authentication, Authorization, or
Accounting) Servers > New page 5-24
TACACS+ (Authentication, Authorization, or
Accounting) Servers page 5-23
using the CLI
4-60
using the GUI
4-54
described
4-52
viewing statistics
using the CLI
4-62 to 4-64
using the GUI
4-57 to 4-59
Transfer Mode parameter
Book Title
78-xxxxx-xx
IN-23
Index
downloading a CA certificate
Upload button
8-13
downloading a configuration file
8-19
downloading a customized web authentication login
page 9-18
downloading a device certificate
8-10
upgrading controller software
8-5
uploading a configuration file
8-17
uploading a PAC
4-42
statically assigning using the CLI
10-29
statically assigning using the GUI
10-25 to 10-29
10-28
Transmit Power parameter
URL parameter
Use AES Key Wrap parameter
transmit power threshold, decreasing
5-7
9-3
user accounts, managing
9-1 to 9-20
User Attribute parameter
5-34
User Base DN parameter
5-34
5-35
User Name parameter
5-31, 12-10
Username parameter
7-5, 7-9, 7-10
User Object Type parameter
User parameter
10-43
8-15, 8-17
9-17
User Credentials parameter
transmit power
transmit power levels
Upload File from Controller page
User Access Mode parameter
8-15
Transition Time parameter
5-109, 8-15
5-34
8-15
User Profile Name parameter
4-28
10-19
troubleshooting
access point join process
CCXv5 clients
problems
D-15 to D-30
Validity parameter
D-5 to D-7
VCI strings
using Telnet or SSH
D-38
tunnel attributes and identity networking
Tx Power Level Assignment parameter
Type parameter
V
7-19 to 7-22
6-4, 9-26, 12-7
8-15
7-18
Verify Certificate CN Identity parameter
5-76
10-32
5-43
video settings
configuring
using the CLI
4-61
using the GUI
4-54 to 4-55
viewing
U
U-APSD
described
4-52
4-62
using the GUI
4-56
5-4
11-23, 11-29
unicast mode
4-55 to 4-59
using the CLI
3-15
using the configuration wizard
using the GUI
described
4-33
4-5
3-11 to 3-13
3-7 to 3-9
VLAN Identifier parameter
unique device identifier (UDI)
described
using the GUI
configuring
using the CLI
UDP port
4-62 to 4-64
virtual interface
viewing status
UDP, use in RADIUS
using the CLI
7-53
for AP-manager interface
for dynamic interface
retrieving
3-13
3-17, 3-18
for management interface
using the CLI
7-55
using the GUI
7-53 to 7-54
VLAN ID parameter
3-12
6-54, 12-13
VLAN interface. See dynamic interface
Book Title
IN-24
78-xxxxx-xx
Index
VLAN Mappings
button
page
assigning per WLAN
12-13
12-13
VLANs
using the CLI
9-22
using the GUI
9-21
choosing the default
described
3-9
guidelines
3-11
VLAN Support parameter
VLAN tag, and identity networking
using the GUI
9-10 to 9-11
4-65
4-65
voice-over-IP (VoIP) telephone roaming
9-20
customizing from an external web server
5-75
Voice & Video Optimized parameter
Voice RSSI parameter
9-11 to 9-12
customized example
12-12
Voice Optimized parameter
using the CLI
4-40
using the CLI
9-17
using the GUI
9-16 to 9-17
default
9-8
downloading a customized login page
10-16
guidelines
voice settings
configuring
using the CLI
4-59 to 4-60
using the GUI
4-53 to 4-54
using the CLI
9-19
using the GUI
9-18 to 9-19
modified default example
viewing
previewing
using the CLI
4-62 to 4-64
using the GUI
4-55 to 4-59
VPN Gateway Address parameter
9-17
9-13
9-10, 9-19
verifying settings using the CLI
Web Authentication option
6-29
VPN passthrough
9-20
9-27
Web Authentication Type parameter
9-10, 9-17, 9-19
Web Auth Type parameter
9-21, 9-28
9-7
configuring using the CLI
6-29
web-browser security alert
configuring using the GUI
6-29
Web Login page
9-10, 9-16
web mode
configuring
W
warnings
translated
warranty
using the GUI
2-2
2-2
Web Passthrough option
C-4 to C-6
webauth bundle
2-3
described
A-1 to ??
webauth.tar files
using the CLI
Web Policy parameter
9-21
web redirect
9-17
9-27
5-62, 6-50
6-48
Web Server IP Address parameter
web authentication
configuring a WLAN for
WEP keys, configuring
6-19
using the CLI
6-30
WGB parameter
using the GUI
6-30
WGB Wired Clients page
described
process
7-29
7-30
wired guest access
9-7
configuration overview
9-7 to 9-9
successful login page
9-17
9-9
web authentication login page
9-25
configuring
using the CLI
9-28 to 9-34
Book Title
78-xxxxx-xx
IN-25
Index
using the GUI
described
configuring AAA override
9-26 to 9-28
configuring infrastructure MFP for a WLAN
9-23 to 9-25
guidelines
5-79
configuring IPv6 bridging
9-25
6-39
one-controller example
9-24
configuring NAC out-of-band integration
two-controller example
9-25
configuring the diagnostic channel
wireless sniffing
WLANs > Edit (QoS) page
configuring
5-68
6-56
D-16
6-34
WLANs > Edit (Security > AAA Servers) page
using the GUI
prerequisites
assigning LDAP servers to a WLAN
D-35 to D-37
choosing RADIUS or LDAP servers for external
authentication 9-21
D-35
supported software
5-36
D-35
disabling accounting servers on a WLAN
WLAN override
configuring using the CLI
6-43
configuring using the GUI
6-42 to 6-43
WLAN Override parameter
5-44
WLANs > Edit (Security > Layer 2) page
6-22, 6-26
WLANs > Edit (Security > Layer 3) page
6-42
WLAN Profile parameter
enabling local EAP on a WLAN
6-51
5-31, 12-10
applying a preauthentication ACL to a WLAN
configuring a WLAN for VPN Passthrough
WLANs
assigning web login, login failure, and logout pages
using the CLI
9-22
using the GUI
9-21
configuring web redirect
6-20
WLANs > Edit page
6-4, 9-26, 12-7
WLANs > New page
6-4, 9-26, 12-7
WLANs page
configuring
conditional web redirect
6-48 to 6-51
static and dynamic WEP
6-20
connecting clients to
6-3, 11-22
WLAN SSID parameter
configuring for guest user
creating WLANs
creating
6-5
using the GUI
6-3 to 6-5
9-5
12-7
6-4
identifying the guest LAN
using the CLI
9-27
creating a centrally switched WLAN
12-14
6-29
6-50
configuring wired guest access
checking security settings
5-62
9-26
mapping an access point group to a WLAN
6-46
WMM
deleting
configuring
using the CLI
6-6
using the GUI
6-4
described
1-12, 3-10 to 3-11, 6-3
described
6-33
with CAC
4-50
WMM parameter
session timeout
configuring
described
4-19, 6-34, 6-35
WMM Policy parameter
6-27
splash page web redirect
wired security solution
6-34
workgroup bridges (WGBs)
6-27
using the same SSID
4-65
debugging
6-48
described
6-4
1-6
WLANs > Edit (Advanced) page
applying an ACL to a WLAN
5-61
7-32
7-26
guidelines
7-26
illustrated
7-26
sample configuration
7-29
Book Title
IN-26
78-xxxxx-xx
Index
viewing status
using the CLI
7-31
using the GUI
7-29 to 7-31
world mode
4-15, 4-16
WPA1+WPA2
configuring
using the CLI
6-23
using the GUI
6-22 to 6-23
described
6-20
WPA2 Policy parameter
WPA Policy parameter
6-22
6-22
Book Title
78-xxxxx-xx
IN-27
Index
Book Title
IN-28
78-xxxxx-xx
Related documents